background preloader

JACOB APPELBAUM (MIRROR)

Facebook Twitter

Respect to border security. (b) The rule issued pursuant to subsection (a) shall include the following: A requirement that information collected during a border security search of an electronic device that is determined to be commercial information, including trade secrets, information subject to attorney-client privilege, information subject to doctor-patient privilege, or information subject to another privilege or protection shall be handled consistent with the laws, rules, and regulations governing such information and shall not be shared with a Federal, State, local, tribal, or foreign agency unless it is determined that such agency has the mechanisms in place to comply with such laws, rules, and regulations.

Respect to border security

Wikileaks, what's it all about?

JANUARY 2011

JULY 2010. Transcript of Speech & Privacy Online. BROOKE GLADSTONE: This is On the Media.

Transcript of Speech & Privacy Online

I'm Brooke Gladstone. BOB GARFIELD: And I'm Bob Garfield, with an update. After last summer’s post-election demonstrations in Iran, a programmer named Austin Heap invented Haystack, software he said would help Iranian activists access banned websites, encrypt their conversations and, most importantly, hide such activity within innocuous material that would not arouse the suspicions of sensors.

This spring, he announced that a version of Haystack was being tested by users in Iran and would soon roll out in three other countries, besides, and he brandished a waiver from the U.S. government to distribute Haystack in Iran as further evidence that the software was a success.