Tracks on Flipboard

By Valdis Krebs | Who is mining, mapping and measuring the tracks you leave behind on the Internet.

Americans Consider Certain Kinds of Data to be More Sensitive than Others

Different kinds of information evoke varying levels of sensitivity among Americans. Social security numbers are universally considered to be the most …

Privacy

NSA is so overwhelmed with data, it's no longer effective, says whistleblower

NEW YORK -- A former National Security Agency official turned whistleblower has spent almost a decade and a half in civilian life. And he says he's …

NSA Phone Record Program Illegal, Appeals Court Finds

A federal appeals court in New York ruled Thursday the National Security Agency’s dragnet collection of U.S. phone records is illegal in a decision …

National Security Agency

A cybercrime wave is coming – brace yourself

Your new book is called Future Crimes. How is crime changing?
In the old days, you buy a gun or a knife, you go hide in a dark alley until some sucker …

Jeb Bush loves Obama('s NSA surveillance)

Who says bipartisanship is dead?

Jeb Bush's appeared on Michael Medved’s conservative talk radio to praise Obama's massive expansion of GWB's domestic surveillance program, and had some genuinely insightful things to say about how Obama is helping to destroy the fundamentals of democracy while …

http://t.co/JSrohwAuFp

Hacked Sony emails reveal that Sony had pirated books about hacking

Sony doesn't like pirates—except, perhaps, when Sony feels like pirating.

Hacked Sony Pictures Entertainment emails, published in full on Thursday by …

FBI Director Continues Crusade Against Encryption, Calls on Congress to Act » THE DISTRICT SENTINEL news co-op

FBI Director James Comey on Wednesday called on Congress to pass legislation that would undermine the ability of Americans to securely …

OLD saying : What tangled webs we weave NEW saying: What watched webs we weave cc: @chumulu http://t.co/Gq0X6plOYH

Social Network Analysis Reveals Full Scale of Kremlin’s Twitter Bot Campaign · Global Voices

Profile pictures from a large network of pro-Kremlin Twitter accounts. Image by Lawrence Alexander.

With the aid of open-source tools, Internet

Social Media

Facebook 'tracks all visitors, breaching EU law'

Facebook tracks the web browsing of everyone who visits a page on its site even if the user does not have an account or has explicitly opted out of tracking in the EU, extensive research commissioned by the Belgian data protection agency has revealed.

The report, from researchers at the Centre of …

How Facebook Knows You Better Than Your Friends Do

In the movie Her, Joaquin Phoenix’s character falls in love with his computer’s operating system, which through the magic of machine learning — and …

UnfollowMe tell governments to ban mass surveillance

Governments are snooping on everything we do online. State intelligence and security agencies are using mass surveillance to hoover up our private …

The Black Box Society: The Secret Algorithms that Control Money and Information, by Frank Pasquale

The big players in finance and technology misuse their power over our lives, says Paul Bernal

This book’s subtitle could easily have been taken …

Who’s bugging the Russian opposition?

In the last decade, Russia's intelligence services and law enforcement agencies have vastly increased their capability in this area. Seven separate …

App allows stalkers to track someone's activities closely

Right now, someone is stalking Maggie McKethan. As she strolls around Rice Village, someone is monitoring her calls, reading her texts, tracking her …

Reporters

TEDxRiga 2012 Valdis Krebs rediģēts

The law was being broken for years. If it’s now being upheld, that’s only thanks to Snowden

Libertarians and hawks will disagree about what intelligence agencies should be licensed to do, but both should surely agree that they shouldn’t break the law. A court ruled on Friday, however, that, in its dealings with the NSA, GCHQ had done that.

The court in question, the Investigatory Powers …

The Moral Hazard of Big Data

If you are a person in America, then there are equations trying to learn more about you. Some of these equations work for private companies and some …

Algorithms

Anyone who makes you choose between privacy and security wants you to have neither

An excellent op-ed from the Open Rights Group: "When ORG defends privacy, we are fighting to protect people from abuses of power that leave them vulnerable."

Yet for many people surveillance makes them less safe: it's not the security blanket politicians are holding it up to be. Job-seekers under …

Security

Scareware found hidden in Google Play apps downloaded by millions

Google has done a good job at keeping data-stealing Trojan apps out of Google Play, but attackers still find ways to monetize rogue apps through the …

Google

Fightback against internet giants’ stranglehold on personal data starts here

Whenever regulators gather to discuss market failures, the cliche “level playing field” eventually surfaces. When regulators finally get around to thinking about what happens in the online world, especially in the area of personal data, then they will have to come to terms with the fact that the …

Jaron Lanier

Science/AAAS | Special Issue: The end of privacy

30 January 2015 | News

Scientists can no longer guarantee patients' privacy. they're looking for new ways to build trust.

30 January 2015 | …

Security

With a Few Bits of Data, Researchers Identify ‘Anonymous’ People

Even when real names and other personal information are stripped from big data sets, it is often possible to use just a few pieces of the information to identify a specific person, according to a study to be published Friday in the journal Science.

In the study, titled “Unique in the Shopping Mall: …

Research

N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say

WASHINGTON — The trail that led American officials to blame North Korea for the destructive cyberattack on Sony Pictures Entertainment in November winds back to 2010, when the National Security Agency scrambled to break into the computer systems of a country considered one of the most impenetrable …

Korean Peninsula

Terrorists Made Their Emails Seem Like Spam to Hide From Intelligence Agencies

During David Petraeus and Paula Broadwell's affair, the two would communicate by leaving notes in the drafts folder of a private Gmail account. As a …

Email

Symposium

This one-day annual event brings leaders in industry, government, and academia, as well as students from Harvard and the Boston area, together for a …

In 2008 Mumbai Attacks, Piles of Spy Data, but an Uncompleted Puzzle

In the fall of 2008, a 30-year-old computer expert named Zarrar Shah roamed from outposts in the northern mountains of Pakistan to safe houses near the Arabian Sea, plotting mayhem in Mumbai, India’s commercial gem.

Mr. Shah, the technology chief of Lashkar-e-Taiba, the Pakistani terror group, and …

Spying

Meet The New Twitter Analytics Tools (From Twitter!)

Twitter opened up its analytics platform to all users in mid-2014, but is it any good? Contributor Larry Kim explores this question.