Do people care that all of their cell phone records may have been seized by the NSA?
rousseau 1 year ago
I ask this because I’m extremely angry about it. Glenn Greenwald broke the story in The Guardian that Verizon was giving the NSA complete records of its business plan customers' activity - who they called, when they called them, where they were, etc. It’s also pretty clear that although only information about Verizon was leaked for the article, the same national security letters have gone out to the other US carriers. Thanks to Big Data, it is probably possible to aggregate this data and get a pretty clear picture of what an individual person was doing on any given day. No warrant, just a “national security letter” demanding everything. Just to be clear, I was against warrantless domestic surveillance when Bush was president, and I’m against just as strongly now that Obama is president. I think that this should be something that matters to people of all political leanings. But to quote Bob Dole (I think), “Where’s the outrage?!”
Topic: SecurityAnswer this Question
Ask a question
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found.
A U.S. district court judge has ruled against Microsoft in the company's effort to oppose a U.S. government search warrant for emails stored in Ireland.
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.
The number of government requests worldwide seeking Twitter users' data, or the removal of content, increased during the first half of 2014.
Despite greater security awareness, most C-suite executives continue to undervalue CISOs, survey shows.
Anonymity network hacked with sophisticated traffic correlation technique.
IBM has added to its security software portfolio with the purchase of Italian access control and identity management firm CrossIdeas for an undisclosed sum, the companies said Thursday.
A group of attackers with links to the Chinese hacking underground has been targeting companies from the entertainment and video game industries for years with the goal of stealing source code.
After years of cajoling their users into sharing every thought, emotion and selfie, online firms are seeing that providing more private online spaces might also be profitable.
Linux’s creator goes on another epic rant
White Papers & Webcasts