GEMALTO: How Spies stole the keys to the Encryption Castle. AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security …
Category: Fourth Amendment
Feb 23
Stingray: No such thing as a private phone conversation
For some reason, police don’t want you to know. The case against Tadrae McKenzie looked like an easy win for prosecutors. He and two buddies robbed a small-time pot dealer of $130 worth of weed using BB guns. Under Florida law, that was robbery with a deadly weapon, with a sentence of at least four …
Jan 02
Apple & Iphone: Victim, collaborator, or liar?
Recently, I posted an article that detailed how – via an implant called Dropout Jeep – the omnipresent NSA is able to remotely hack into your Iphone. Apple, for their part, has responded that it simply ain’t so. Or it ain’t so at least as far as they know: In the latest instance of a …
Dec 31
Don’t even think about committing a crime.
Sheesh! Ohio police arrested a driver because his car contained a compartment that could theoretically store illegal drugs, though no drugs were found at that time. The driver, 30-year-old Norman Gurley of Michigan, was pulled over for speeding. A highway patrolman noticed wires running to a secret compartment in the car and arrested Gurley, even …
Dec 31
More from the most transparent adminstration . . .
Just in case you need something else to worry about. NSA can hack WiFi devices from eight miles away. The NSA may have the ability to intercept data from around the world, but we now know that it has some impressive (and intimidating) equipment for snooping on nearby targets. Security guru Jacob Appelbaum told those …
Dec 31
How the NSA remotely hacks your Iphone.
Following up on the latest stunning revelations released yesterday by German Spiegel which exposed the spy agency’s 50 page catalog of “backdoor penetration techniques“, today during a speech given by Jacob Applebaum (@ioerror) at the 30th Chaos Communication Congress, a new bombshell emerged: specifically the complete and detailed description of how the NSA bugs, remotely, …
Aug 26
Toldya so. Part III
Oops! Google’s not-so-secret-dirty-little-secret, not a secret at all anymore. The Justice Department recently won a court battle to keep an Internet company from talking about federal demands for user data, arguing that even disclosing the company’s name would damage national security.’ But then, after months of arguments, the department appears to have been foiled by …
Aug 17
Why Privacy matters.
Here’s a good summary of why it matters. While I despise the governmental violation of the constitution, especially in the area of unreasonable searches and seizures, the voluntary (and perhaps) indirect surrender of privacy via Facebook and other media is, I fear, without remedy. Peggy Noonan sums it up: What is privacy? Why should we …
Mar 26
Vestiges of Liberty.
But just vestiges . . . and just barely. WASHINGTON (AP) — The Supreme Court ruled Tuesday that police cannot bring drug-sniffing police dogs onto a suspect’s property to look for evidence without first getting a warrant for a search, a decision which may limit how investigators use dogs’ sensitive noses to search out drugs, …
Mar 14
Feinstein takes the Fifth.
Senator Ted Cruz questions Dianne Feinstein on her limits of constitutional disregard. Rather than answer the question, she does what she does best: gets a little snippy. The Weekly Standard reports: “The question that I would pose to the senior senator from California is,” said Cruz to Feinstein, “Would she deem it consistent with the …
- 1
- 2