• Former CIA chief: NYPD surveillance would have prevented Boston-like attacks

    Former CIA director Michael Hayden said a terror attack like the Boston Marathon bombings would never have taken place in New York City. Hayden, who also headed the National Security Agency (NSA), said the New York Police Department’s (NYPD) broad campaign of spying on the Muslim communities in the city would have helped officials identify the radical tendencies of the alleged bombers, thus preventing the attack.

  • Canadian company provides software to U.S. intelligence agencies

    A Canadian company has spent the last few years locking up contracts to provide security software to U.S. federal agencies such as the NSA, CIA, and FBI. The company moved from the United States to Canada because the Canadian government gives tax credits for high-tech companies coming to Canada, and Canadian government agencies help the company break into new markets by sponsoring his company in international conferences. It was in one of these conferences that he once met “some NSA folks.”

  • Tamerlan Tsarnaev's name was on U.S. terror watchlist since 2011

    In March 2011, after being contacted by the Russian security services, the CIA added the name of Tamerlan Tsarnaev to the U.S. government’s terror watchlist. DHS secretary Janet Napolitano said that Tamerlan’s travel to Dagestan, and his arrival back in the United States, were “pinged” by the department. Leading lawmakers have raised questions about whether the U.S. intelligence community and law enforcement agencies have dropped the ball on the Tsarnaev brothers.

  • Exploring the human brain to support national security

    The other day, at a White House event, President Barack Obama unveiled a new research initiative designed to revolutionize the understanding of the human brain. DARPA plans $50 million in 2014 investments to translate this increased understanding of brain function to create new capabilities.

  • view counter
  • Pervasive surveillance threatens privacy, gives power advantage to the watcher

    Surveillance is everywhere, from street corner cameras to the subject of books and movies. A researcher says that pervasive surveillance menaces our intellectual privacy and it gives the watcher a power advantage over the watched, which can be used for blackmail, persuasion, or discrimination.

  • FBI wants 1994 online surveillance law updated

    The FBI said the agency’s top priority this year is to update a surveillance law so authorities can monitor in real time Web activities of Americans suspected of committing crimes. The 1994 law, known as the Communications Assistance for Law Enforcement Act (CALEA), applies to telecommunication companies, but only partially to Web-based companies.

  • view counter
  • In 2012, Microsoft received 70,665 law-enforcement requests for customer information

    On Thursday, Microsoft released the number of law enforcement requests it has received for information on its hundreds of millions of customers. By releasing the information, Microsoft is now putting itself on the same team as Google, Twitter, Yahoo, and other Web businesses which have published reports on law-enforcement request for customer information. In 2012 Microsoft received a total of 70,665 law-enforcement requests for customer information.

  • WOT distorting focus, resource allocation of U.S. intelligence community: experts

    The U.S. Intelligence Advisory Board, a panel of fourteen highly regarded and experienced experts, many of whom past holder of high-level national security positions, has submitted a secret report to President Obama in which they say that the intense, 12-year focus of the intelligence community on finding and fighting terrorism has distorted the priorities, resource allocation, and training within that community. Former Senator David Boren, a member of the panel, asks: “in the long run, what’s more important to America: Afghanistan or China?”

  • Widely used FBI surveillance method ruled unconstitutional

    A national security letters (NSLs) is an administrative subpoena which allows the FBI to ask Internet companies and communication service providers to turn over subscriber information on American customers, while prohibiting the providers from informing these customers that their personal information has been turned over to the FBI. Since the 9/11 attacks, the bureau has issued an average of 50,000 NSLs a year. A federal judge in California says this is “rendering the statute impermissibly overbroad.”

  • Google’s assault on privacy: a reminder

    A year ago, on 1 March 2012, Goggle launched its privacy-eroding policy of combining and collating users’ information across all of Goggle’s products. Google offers no opt-out option. Forcing consumers to share every aspect and nuance of their Internet practices with the company was not enough for Google. Yesterday, the attorney generals of thirty-eight states reached an agreement with Google concerning Google’s practice of spying on Wi-Fi users. The company sheepishly admitted that its Street View Vans collected 600GB of user data from unprotected Wi-Fi networks, and was fined a measly $7 million.

  • Spotting and extracting relevant information from mountains of data

    The term “Big Data” refers to a technology phenomenon that has arisen over the past thirty years. As computers have improved, growing storage and processing capacities have provided new and powerful ways to gain insight into the world by sifting through the infinite quantities of data available. This insight, discoverable in previously unseen patterns and trends within these phenomenally large data sets, can be hard to detect without new analytic tools that can comb through the information and highlight points of interest. Experts convene to address growing need for Big Data analysis tools.

  • DHS grant to fund technology for tracking mobile devices

    The University Of Alabama at Birmingham(UAB) has been given a $583,000 grant from the Department of Homeland Securityto build a system for verifying the location history and chorological track of cell phones and smart phones, tablets, and other mobile devices. The system being built could also be used to eliminate contest fraud, verify the origin of sea food, and protect national security.

  • DNA sequencing a serious risk to privacy

    The growing ease of DNA sequencing has led to enormous advancements in the scientific field. Through extensive networked databases, researchers can access genetic information to gain valuable knowledge about causative and preventative factors for disease, and identify new targets for future treatments. The wider availability of such information, however, also has a significant downside — the risk of revealing personal information. New study finds that new policies are needed to safeguard participants’ identity in genetic studies.

  • Google wants to limit law enforcement’s access to e-mails, users’ information

    In 2012 Google received 16,407 requests for user data, which affected 31,072 users or accounts. More than half of the requests were accompanied with a subpoena, the others were not. Google is planning on lobbying Washington this year to persuade lawmakers that they should make it harder for law enforcement to gain access to  e-mails and other digital messages.

  • New Hampshire bill would limit searches, expand expectation of privacy

    New Hampshire State Representative Neal Kurk ® says state residents do not expect,when they throw something out in their trash or leave a drinking glass with their saliva on it at a public place, that law enforcement, insurance companies, or data miners would use the trash left behind to glean  personally identifiable information.