A White House review of how the government and private sector use large sets of data has found that such information could be used to discriminate against Americans on issues such as housing and employment even as it makes their lives easier in many ways. Continue reading
The Obama administration has been conducting warrantless searches of Americans’ communications as part of the NSA’s surveillance operations that target foreigners located outside of the U.S., the administration’s top intelligence official confirmed in a letter to Congress disclosed Tuesday.
“The Department of Defense is on its way to building an elite, modern cyberforce,” Hagel said in a speech at the retirement of Gen. Keith Alexander as head of the U.S. Cyber Command and NSA. “This force is enhancing our ability to deter aggression in cyberspace, deny adversaries their objectives, and defend the nation from cyberattacks that threaten our national security.” Continue reading
President Obama announced that he wants Congress to stop the National Security Agency from gathering bulk phone records and holding them for five years. What’s at stake in the president’s push to limit the scope of U.S. surveillance? Gwen Ifill talks to Kate Martin of the Center for National Security Studies and Gary Schmitt of the American Enterprise Institute. Continue reading
Every telephone call made in a foreign country can be recorded and replayed by the National Security Agency through their voice interception program, the Washington Post reported Tuesday. Documents provided by Edward Snowden say that the surveillance technology, named MYSTIC, will record every phone call occurred in the country where it is deployed. Continue reading
The Washington Post reported Friday that the United States intends to give up federal government authority over the administration of the Internet.
WASHINGTON — U.S. intelligence officials are planning a sweeping system of electronic monitoring that would tap into government, financial and other databases to scan the behavior of many of the 5 million federal employees with secret clearances, current and former … Continue reading
Even though everyday internet and phone users are concerned about who can see and obtain their data, most are not aware of the tools available to help keep their information secure. Technology and privacy activists have been developing these types of tools for a decade, but the average but internet user doesn’t know how to use these tools. This issue was the focus at a recent hackathon in Washington, D.C., that brought together technologists, activists and community organizers to make these tools more user friendly. Developers labored over programs like Tor, which allows users to browse the internet anonymously, and Cryptocat, which encrypts your online chats. Continue reading