Surveillance State, Privacy & Citizenship

By Wesley Fryer | Articles and thoughts relating to our modern surveillance state (government and corporate) as well as privacy and citizenship. by @wfryer

How Surveillance Could Turn You Into a Second-Class Citizen

Surveillance used to be expensive. Even just a few years ago, tailing a person’s movements around the clock required rotating shifts of personnel …

Surveillance

FBI issues warning to parents about toys spying on their kids

The FBI yesterday released a public service announcement (PSA) alerting parents to the dangers potentially imposed by smart toys.<p>The document warns that connected toys with microphones, GPS tracking, Wi-Fi, and/or bluetooth connectivity could be giving criminals access to private information about …

Security

ISPs barred from telling users they’re under FBI investigation

Back in 2013, a federal judge ruled that the FBI couldn't force ISPs to hand over a users' private data without the suspect being informed first. Now, however, a change in the law means that's no longer the case. Thanks to a federal appeals court ruling on Monday, ISPs, financial institutions and …

Privacy

Here’s what you need to know now about US Customs searches of your phone

US Customs and Border Protection agents are allowed to search the contents of travelers’ phones but not their data stored exclusively on the cloud, according to a letter from federal officials.<p>The letter (pdf), published by NBC News this week, was a response to senator Ron Wyden, a Democrat from …

Privacy

Homeland Security says Americans who don't want faces scanned leaving the country "shouldn't travel" | ZDNet

Congress allowed the government to scan faces of foreign nationals to keep track of visa overstays. But now that's set to be extended to Americans, …

Surveillance

Russia and China to kill off VPNs, Tor browser

Russia and China are banning the use of virtual private networks, as their governments assert ever greater control over what citizens can see …

Censorship

Federal agents listened to over 3M phone calls, scored zero convictions

Using a single wiretap order as part of single drug investigation, US federal agents somehow managed to spy on millions — <i>millions</i> — of cell phone conversations.<p>The order was given as part of a narcotics investigation in the Middle District of Pennsylvania, the details being buried in the US Courts’ …

Surveillance

Can the CIA hack Linux? WikiLeaks' new dump reveals spy agency's OutlawCountry malware

The malware targets Linux systems and details yet another of the CIA's alleged hacking tools.<p>WikiLeaks has released the user manual for yet another …

Security

Obama’s secret struggle to punish Russia for Putin’s election assault

Russia

EU Proposes Enforcing Data Encryption and Banning Backdoors

The European Parliament's Committee on Civil Liberties, Justice, and Home Affairs has published draft proposals that would enforce end-to-end encryption on all digital communications and forbid backdoors that enable law enforcement to access private message data.<p>The proposed amendment relates to …

What Sen. Wyden Does When He’s Not Questioning Comey or Sessions - Note to Self

Wednesday 14 June 2017<p>Open in Pocket Casts<p>00:00<p>00:00<p>When Ron Wyden got to Congress, Oregon was known for its wood products and the Internet was a …

Weapons of Mass Surveillance - The Documentary

Thursday 15 June 2017<p>Open in Pocket Casts<p>00:00<p>00:00<p>How western high tech mass surveillance is being sold to governments in the Middle East<p>More ways …

If your home wifi router is on this list, it might be vulnerable to CIA hacking tools

For the past four months, WikiLeaks has been slowly publishing a series of documents that describe a plethora of hacking tools, which the anti-secrecy organization says belong to the US Central Intelligence Agency. The latest release, published June 15, is a batch of documents describing tools that …

How to Resist Trump’s Shock Doctrine

Shock. It’s a word that has come up a lot since November— for obvious reasons.<p>I’ve spent a lot of time thinking about shock. Ten years ago, I …

Why I won't recommend Signal anymore

One of the things I do is cryptography and infosec training for investigative journalists who have a need to keep either their sources and …

Theresa May to shut down the internet as we know it

Theresa May is planning to introduce huge regulations on the way the internet works, allowing the government to decide what is said online.<p>Particular …

Leaked NSA Document Indicates Russians Tried to Hack Voter...

Ken Dilanian breaks down the latest reports, via The Intercept, that Russians tried to conduct a cyber attack before the election and that the leaker …

Donald Trump

The biggest data breaches in recent history

Courtesy of: Visual Capitalist<p><i>This data visualization comes to us from Information is Beautiful. Go to their site to see the highly-recommended interactive format that visualizes the same data, while providing additional details on each specific hack.</i><p>The graphic above shows a timeline of some of …

10 million US car owners' personal data and VIN numbers left exposed to public

An unprotected database was found with sensitive data including names, addresses, phone numbers and more.<p>A massive database leak left sensitive and …

TrumpiLeaks

Signal<p>This is a free, end-to-end encrypted messaging app, which allows you to communicate directly with Michael Moore. You can send text messages, …

Printer Tracking Dots Back in the News

Several journalists and experts have recently focused on the fact that a scanned document published by <i>The Intercept</i> contained tiny yellow dots …

Privacy

You Already Bugged Your Own House Years Ago

If you're unnerved at the prospect of an always-on mic in your home, then take a second to consider the ones that are already there.<p>Yesterday, Apple announced the HomePod, a smart speaker in the style of the Google Home and Amazon Echo. Like those competing devices, it is voice-activated. Shout out …

Google Home

‘Colour printers spy on you’: Barely visible yellow dots lead to arrest of Reality Winner, alleged NSA leaker

Criminal investigations into national security leaks tend to be long, complicated and delicate affairs. Sources generally cover their tracks, …

National Security Agency (NSA)

Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election

The report indicates that Russian hacking may have penetrated further into U.S. voting systems than was previously understood. It states …

How to Opt Out of Twitter's New Privacy Settings

Since Wednesday night, Twitter users have been greeted by a pop-up notice about Twitter’s new privacy policy, which will come into effect June …

Privacy

EFF Publishes "Pwning Tomorrow," a Speculative Fiction Anthology

Popular Fiction

Snooper's Charter: Survey Finds Most UK Citizens Unaware Of Government Surveillance Capabilities | International Business Times

Citizens of the United Kingdom are worried about overreaching government surveillance, but seven in 10 remain unaware of the government’s ability to …