background preloader


Facebook Twitter

Supreme Court Rules In GPS Tracking Device Case. Glype proxy.

Your reputation

Self-guided bullet could hit laser-marked targets from a mile away. S self-guided bullet prototype can hit target a mile away. © 2014 Sandia Corporation Questions & Comments Employee & Retiree Resources Privacy & Security Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S.

s self-guided bullet prototype can hit target a mile away

Department of Energy’s National Nuclear Security Administration under contract DE-AC04-94AL85000. Reconstructing Speech from Human Auditory Cortex. Abstract How the human auditory system extracts perceptually relevant acoustic features of speech is unknown.

Reconstructing Speech from Human Auditory Cortex

A Brain Wave Worth a Thousand Words. Clothes Hook Hidden Camera. How To Permanently Delete Your Account on Popular Websites - Smashing Magazine. Advertisement.

How To Permanently Delete Your Account on Popular Websites - Smashing Magazine

Microsoft Online Surveillance Guide - Cryptome Leak. Cryptome, a whistleblower site that regularly leaks sensitive documents from governments and corporations, is in hot water again: this time, for publishing Microsoft’s “Global Criminal Compliance Handbook,” a comprehensive, 22-page guide running down the surveillance services Microsoft will perform for law enforcement agencies on its various online platforms, which includes detailed instructions for IP address extraction.

Microsoft Online Surveillance Guide - Cryptome Leak

You can find the guide here (warning: PDF). not anymore. Microsoft has demanded that Cryptome take down the guide — on the grounds that it constitutes a “copyrighted [work] published by Microsoft.” Yesterday, at 5pm, Cryptome editor John Young received a notice from his site’s host, Network Solutions, bearing a stiff ultimatum: citing the Digital Millenium Copyright Act (DMCA), Network Solutions told him that unless he takes the “copyrighted material” down, they will “disable [his] website” on Thursday, February 25, 2010.

Identity theft

Using remote tracking software to find stolen laptop may have violated federal wiretap statute. Clements-Jeffrey v.

Using remote tracking software to find stolen laptop may have violated federal wiretap statute

City of Springfield, Ohio, 2011 WL 3678397 (S.D. Ohio August 22, 2011) [PDF copy of opinion] Services that help track down stolen laptops and other lost mobile hardware are indispensable. Can the NSA and CIA use your phone to track your location? July 26, 2011, 12:43 PM — There's no need to panic, or start shopping for aluminum-foil headwear, but the super-secret National Security Agency has apparently been thinking frequently enough about whether the NSA is allowed to intercept location data from cell phones to track U.S. citizens that the agency's chief lawyer was able to speak intelligently about it off the cuff while interviewing for a different job.

Can the NSA and CIA use your phone to track your location?

"There are certain circumstances where that authority may exist," even if the NSA has no warrant to investigate a the person whose privacy it is invading or global permission to eavesdrop on everyone, according to Matthew Olsen, the NSA's general counsel. He didn't come to talk about that particularly; he said it yesterday in response to a question from the Senate Select Committee on Intelligence, which was considering whether he'd be a good choice to run the National Counterterrorism Center.

So far, though, no law. Breaking News on EFF Victory: Appeals Court Holds that Email Privacy Protected by Fourth Amendment. Browser-uniqueness.pdf (application/pdf Object) Breadcrumbs Tracker. Bug 147777 – :visited support allows queries into global history. EFF Publishes Study On Browser Fingerprinting. ‘MegaSearch’ Aims to Index Fraud Site Wares. A new service aims to be the Google search of underground Web sites, connecting buyers to a vast sea of shops that offer an array of dodgy goods and services, from stolen credit card numbers to identity information and anonymity tools.

‘MegaSearch’ Aims to Index Fraud Site Wares

MegaSearch results for BIN #423953 A glut of data breaches and stolen card numbers has spawned dozens of stores that sell the information. The trouble is that each shop requires users to create accounts and sign in before they can search for cards. Enter, which lets potential buyers discover which fraud shops hold the cards they’re looking for without having to first create accounts at each store.

This free search engine aggregates data about compromised payment cards, and points searchers to various fraud shops selling them. According to its creator, the search engine does not store the compromised card numbers or any information about the card holders. New York Police Working on Technology to Detect Concealed Weapons. Video the FBI does not want you to see. The Free IT Desktop. Untitled. Operator Operator YAPO is a new incarnation of an award-winning portable Opera package.


You can run Operator on any computer you want (company, library, your friend's computer) and without administration privileges as long as it's a Windows PC. Plus, unless you choose otherwise, no data will be stored at the host computer. Changes in the current release This initial release includes Opera 10.52. Charges Against the N.S.A.’s Thomas Drake. On June 13th, a fifty-four-year-old former government employee named Thomas Drake is scheduled to appear in a courtroom in Baltimore, where he will face some of the gravest charges that can be brought against an American citizen.

Charges Against the N.S.A.’s Thomas Drake

A former senior executive at the National Security Agency, the government’s electronic-espionage service, he is accused, in essence, of being an enemy of the state. According to a ten-count indictment delivered against him in April, 2010, Drake violated the Espionage Act—the 1917 statute that was used to convict Aldrich Ames, the C.I.A. officer who, in the eighties and nineties, sold U.S. intelligence to the K.G.B., enabling the Kremlin to assassinate informants.

Christopher Soghoian. Shopping Centre Tracking System Faces Civil Rights Campaigners’ Wrath. Civil rights campaigners have spoken out against a technology used by several shopping centres in the UK to track consumers using their mobile signals.

Shopping Centre Tracking System Faces Civil Rights Campaigners’ Wrath

The shopping centres claim that the technology helps them provide better services to consumers and retailers without compromising privacy. The system, called the Footpath, allows them to know how are people spending time in a shopping centre, which spots they visit the most and even the route they take while walking around in a shopping centre. Footpath has been developed by Hampshire based Path Intelligence. The system involves several trackers being installed in locations across the shopping centre and is capable of tracking consumers' position to up to 2 meters. According to The Guardian, several consumer and civil rights groups, including Big Brother Watch, have claimed that consumers must be given a choice on whether they want their movement tracked or not.

DHS Monitors Social Media For 'Political Dissent' Stealth. EPIC Obtains New Documents on DHS Media Monitoring, Urges Congress to Suspend Program. Disk encryption software. Disk encryption software is computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy disk, or USB device) by using disk encryption. Hardware-based full disk encryption. Hardware-based full disk encryption (FDE) is available from many hard disk drive (HDD) vendors, including: Seagate Technology, Hitachi, Western Digital, Samsung, Toshiba and also solid-state drive vendors such as SanDisk, Samsung, Micron and Integral.

The symmetric encryption key is maintained independently from the CPU, thus removing computer memory as a potential attack vector. In relation to hard disk drives, the term 'Self-Encrypting Drive' (SED) is in more common usage. Digital Investigation : The growing impact of full disk encryption on digital forensics. Full disk encryption is too good, says US intelligence agency. FBI indirectly admits to using Carrier IQ, but Big Brother scare tactics are overblown. Carrier IQ: Which phones are infected, and how to remove it. Carrier IQ is the best reason yet to switch to the iPhone. Earlier this month, security researcher Trevor Eckhart published information that showed how software manufactured by a company named Carrier IQ logs and transmits data on your personal cell phone without your consent.

EFF reverse engineers Carrier IQ. Don't Break the Internet. Two bills now pending in Congress—the PROTECT IP Act of 2011 (Protect IP) in the Senate and the Stop Online Piracy Act (SOPA) in the House—represent the latest legislative attempts to address a serious global problem: large-scale online copyright and trademark infringement. The Future of the Internet — And How to Stop It. Coders Are Already Finding Ways Around SOPA Censorship - Politics. A developer who calls himself T Rizk doesn't have much faith in Congress making the right decision on anti-piracy legislation, so he's built a work around for the impending censorship measures being considered: DeSOPA.

Firefox Add-On Bypasses SOPA DNS Blocking. ‘The Pirate Bay Dancing’ Add-On Killls DNS and IP Blockades. Efforts to censor the Internet are increasing in the Western world. In the US lawmakers are currently discussing legislation (SOPA/PIPA) that could take out The Pirate Bay, or disable access to it. Homeland Security Request to Take Down MafiaaFire Add-on « hja’s blog. Homeland Security Wants Mozilla to Pull “Domain Seizure” Add-On. Panopticlick. Microsoft's Web map exposes phone, PC locations. Lock It Down! How To Create A Simple Google Chrome App In Less Than 5 Minutes.

Who Owns Your PC? New Anti-Piracy Windows 7 Update "Phones Home" to Microsoft Every 90 Days. Tools for rooting out Web plagiarism, copyright violations. What Every Writer Should Know About Web Technology. How a New Police Tool for Face Recognition Works - Digits. How to surf anonymously without a trace. Newly Declassified Files Detail Massive FBI Data-Mining Project. The Drone as Privacy Catalyst. Could Domestic Surveillance Drones Spur Tougher Privacy Laws? Xqgdc1.jpg (JPEG Image, 1550x1050 pixels) - Scaled (55%)

12 Free Products You Need to Protect Your Privacy. Remove DRM protection. How to hide files in JPEG pictures.

Privacy: Resources

Privacy: Tools. Who Knows What GPS - The Complete Guide - Arduino based Global Positioning System. IP Geolocation & IP to Location Experts - Quova, Inc. Free Real-Time Visitor IP Geo Location API. The Freenet Project - /index. Government. Encryption. Telecom. Web tracking. Search privately. On line privacy.