Supreme Court Rules In GPS Tracking Device Case Washington DC police thought they had a good idea when they attached a global-positioning-system (GPS) device on the car of a suspected drug dealer in order to more effectively tail him and find his "safe house" stash. The police did, in fact, nail DC nightclub owner Antoine Jones. But the Supreme Court this week sided with the Appeals court that over-turned Jones's conviction on the grounds that police need to first obtain a search warrant before attaching such a device. The decision by the high court was unanimous, a relative rarity for this court that is usually politically divided. But the decision also opens up questions, legal scholars and some of the justices believe, about whether law enforcement will be allowed to track suspects by homing in on their cellphone with or without a warrant. View Gallery: GPS Tracking Devices Supreme Court Rules In GPS Tracking Device Case
glype proxy
your reputation

Self-guided bullet could hit laser-marked targets from a mile away A group of researchers at Sandia National Laboratories have built a prototype of a small-caliber bullet capable of steering itself towards a laser-marked target located approximately 2,000 meters (1.2 miles) away. The dart-like design has passed the initial testing stage, which included computer simulations as well as field-testing prototypes built from commercially available parts. The four-inch (10 cm) long projectile is to be used with smoothbore arms, meaning ones with non-rifled barrels. Rifling involves cutting helical grooves in the barrel to give the bullet a spin that, thanks to the gyroscopic effect, improves its aerodynamic stability and accuracy. Self-guided bullet could hit laser-marked targets from a mile away
s self-guided bullet prototype can hit target a mile away
Abstract How the human auditory system extracts perceptually relevant acoustic features of speech is unknown. To address this question, we used intracranial recordings from nonprimary auditory cortex in the human superior temporal gyrus to determine what acoustic information in speech sounds can be reconstructed from population neural activity. Reconstructing Speech from Human Auditory Cortex Reconstructing Speech from Human Auditory Cortex
ScienceShot: A Brain Wave Worth a Thousand Words Skip to main content Science/AAAS Subscribe Main menu ScienceShot: A Brain Wave Worth a Thousand Words
Clothes Hook Hidden Camera
Advertisement We all have an increasing number of sites and online services we’re members of, and sometimes it all gets a little overwhelming. At times, we just need to delete our memberships to some sites, either in an effort to simplify our lives or just because we’ve grown tired of a particular site or service. What we often don’t realize when signing up for all these accounts, though, is how difficult it can be to permanently delete our accounts when we’ve had enough. How To Permanently Delete Your Account on Popular Websites - Smashing Magazine How To Permanently Delete Your Account on Popular Websites - Smashing Magazine
Microsoft Online Surveillance Guide - Cryptome Leak Cryptome, a whistleblower site that regularly leaks sensitive documents from governments and corporations, is in hot water again: this time, for publishing Microsoft’s “Global Criminal Compliance Handbook,” a comprehensive, 22-page guide running down the surveillance services Microsoft will perform for law enforcement agencies on its various online platforms, which includes detailed instructions for IP address extraction. You can find the guide here (warning: PDF). not anymore. Microsoft has demanded that Cryptome take down the guide — on the grounds that it constitutes a “copyrighted [work] published by Microsoft.” Yesterday, at 5pm, Cryptome editor John Young received a notice from his site’s host, Network Solutions, bearing a stiff ultimatum: citing the Digital Millenium Copyright Act (DMCA), Network Solutions told him that unless he takes the “copyrighted material” down, they will “disable [his] website” on Thursday, February 25, 2010. Microsoft Online Surveillance Guide - Cryptome Leak
identity theft

Clements-Jeffrey v. City of Springfield, Ohio, 2011 WL 3678397 (S.D. Ohio August 22, 2011) [PDF copy of opinion] Using remote tracking software to find stolen laptop may have violated federal wiretap statute Using remote tracking software to find stolen laptop may have violated federal wiretap statute
Can the NSA and CIA use your phone to track your location? Can the NSA and CIA use your phone to track your location? July 26, 2011, 12:43 PM — There's no need to panic, or start shopping for aluminum-foil headwear, but the super-secret National Security Agency has apparently been thinking frequently enough about whether the NSA is allowed to intercept location data from cell phones to track U.S. citizens that the agency's chief lawyer was able to speak intelligently about it off the cuff while interviewing for a different job. "There are certain circumstances where that authority may exist," even if the NSA has no warrant to investigate a the person whose privacy it is invading or global permission to eavesdrop on everyone, according to Matthew Olsen, the NSA's general counsel. He didn't come to talk about that particularly; he said it yesterday in response to a question from the Senate Select Committee on Intelligence, which was considering whether he'd be a good choice to run the National Counterterrorism Center.
In a landmark decision issued today in the criminal appeal of U.S. v. Warshak, the Sixth Circuit Court of Appeals has ruled that the government must have a search warrant before it can secretly seize and search emails stored by email service providers. Closely tracking arguments made by EFF in its amicus brief, the court found that email users have the same reasonable expectation of privacy in their stored email as they do in their phone calls and postal mail. EFF filed a similar amicus brief with the 6th Circuit in 2006 in a civil suit brought by criminal defendant Warshak against the government for its warrantless seizure of his emails. Breaking News on EFF Victory: Appeals Court Holds that Email Privacy Protected by Fourth Amendment Breaking News on EFF Victory: Appeals Court Holds that Email Privacy Protected by Fourth Amendment
browser-uniqueness.pdf (application/pdf Object)
Breadcrumbs Tracker
Bug 147777 – :visited support allows queries into global history
EFF Publishes Study On Browser Fingerprinting
‘MegaSearch’ Aims to Index Fraud Site Wares ‘MegaSearch’ Aims to Index Fraud Site Wares A new service aims to be the Google search of underground Web sites, connecting buyers to a vast sea of shops that offer an array of dodgy goods and services, from stolen credit card numbers to identity information and anonymity tools. MegaSearch results for BIN #423953 A glut of data breaches and stolen card numbers has spawned dozens of stores that sell the information. The trouble is that each shop requires users to create accounts and sign in before they can search for cards.
New York Police Working on Technology to Detect Concealed Weapons
Please note that by playing this video YouTube and Google will place a long-term cookie on your computer. The woman who made this video is a Texas activist who received two FBI agents at her door. The agents inquired about her lawful protest activity. Watch how she handles the interview. Apparently the FBI keeps getting YouTube to remove the video, on the grounds that it infringes upon the privacy rights of the FBI agents involved. Video the FBI does not want you to see
The Free IT Desktop
unnamed pearl Operator Operator YAPO is a new incarnation of an award-winning portable Opera package. You can run Operator on any computer you want (company, library, your friend's computer) and without administration privileges as long as it's a Windows PC.
Charges Against the N.S.A.’s Thomas Drake On June 13th, a fifty-four-year-old former government employee named Thomas Drake is scheduled to appear in a courtroom in Baltimore, where he will face some of the gravest charges that can be brought against an American citizen. A former senior executive at the National Security Agency, the government’s electronic-espionage service, he is accused, in essence, of being an enemy of the state. According to a ten-count indictment delivered against him in April, 2010, Drake violated the Espionage Act—the 1917 statute that was used to convict Aldrich Ames, the C.I.A. officer who, in the eighties and nineties, sold U.S. intelligence to the K.G.B., enabling the Kremlin to assassinate informants.
Christopher Soghoian is a privacy researcher and activist, working at the intersection of technology, law and policy. He is the Principal Technologist with the Speech, Privacy and Technology Project at the American Civil Liberties Union. He is also a Visiting Fellow at Yale Law School's Information Society Project. Soghoian completed his Ph.D. at Indiana University in 2012, which focused on the role that third party service providers play in facilitating law enforcement surveillance of their customers. In order to gather data, he has made extensive use of the Freedom of Information Act, sued the Department of Justice pro se, and used several other investigative research methods. His research has appeared in publications including the Berkeley Technology Law Journal and been cited by several courts, including the 9th Circuit Court of Appeals and the New Jersey Supreme Court. Christopher Soghoian
Shopping Centre Tracking System Faces Civil Rights Campaigners’ Wrath
DHS Monitors Social Media For 'Political Dissent'
Stealth
EPIC Obtains New Documents on DHS Media Monitoring, Urges Congress to Suspend Program
Disk encryption software
Hardware-based full disk encryption
Digital Investigation : The growing impact of full disk encryption on digital forensics
Full disk encryption is too good, says US intelligence agency
FBI indirectly admits to using Carrier IQ, but Big Brother scare tactics are overblown
Carrier IQ: Which phones are infected, and how to remove it
Carrier IQ is the best reason yet to switch to the iPhone
EFF reverse engineers Carrier IQ
Don't Break the Internet - Stanford Law Review
:: The Future of the Internet — And How to Stop It
Coders Are Already Finding Ways Around SOPA Censorship - Politics
Firefox Add-On Bypasses SOPA DNS Blocking
‘The Pirate Bay Dancing’ Add-On Killls DNS and IP Blockades
Homeland Security Request to Take Down MafiaaFire Add-on « hja’s blog
Homeland Security Wants Mozilla to Pull “Domain Seizure” Add-On
Panopticlick
Microsoft's Web map exposes phone, PC locations | Privacy Inc.
Lock It Down!
How To Create A Simple Google Chrome App In Less Than 5 Minutes
Who Owns Your PC? New Anti-Piracy Windows 7 Update "Phones Home" to Microsoft Every 90 Days
Tools for rooting out Web plagiarism, copyright violations
What Every Writer Should Know About Web Technology
How a New Police Tool for Face Recognition Works - Digits
How to surf anonymously without a trace
Newly Declassified Files Detail Massive FBI Data-Mining Project | Threat Level
The Drone as Privacy Catalyst - Stanford Law Review
Could Domestic Surveillance Drones Spur Tougher Privacy Laws?
xqgdc1.jpg (JPEG Image, 1550x1050 pixels) - Scaled (55%)
12 Free Products You Need to Protect Your Privacy
Remove DRM protection
How to hide files in JPEG pictures
Privacy: Resources

Privacy: Tools

Who Knows What Youhavedownloaded.com?
GPS - The Complete Guide - Arduino based Global Positioning System
IP Geolocation & IP to Location Experts - Quova, Inc.
Free Real-Time Visitor IP Geo Location API | IPLocationTools.com
The Freenet Project - /index
Government

encryption

telecom

web tracking

search privately

on line privacy