National Security Agency (NSA)

See the following -

Twitter Breaks Rank, Threatens To Fight NSA Gag Orders

Brendan Sasso | Nextgov | February 6, 2014

Twitter threatened to launch a legal battle with the Obama administration on Thursday over gag orders that prevent it from disclosing information about surveillance of its users. Read More »

Unnecessary And Disproportionate: How The NSA Violates International Human Rights Standards

David Greene and Katitza Rodriguez | Electronic Frontier Foundation | May 28, 2014

Even before Ed Snowden leaked his first document, human rights lawyers and activists were concerned about law enforcement and intelligence agencies spying on the digital world. One of the tools developed to tackle those concerns was the development of the International Principles on the Application of Human Rights to Communications Surveillance (the “Necessary and Proportionate Principles”)...

Read More »

UPDATE 1-Apple, Google, Dozens Of Others Urge U.S. Surveillance Disclosures

Staff Writer | Reuters | July 19, 2013

Dozens of companies, non-profits and trade organizations including Apple Inc, Google Inc and Facebook Inc sent a letter on Thursday pushing the Obama administration and Congress for more disclosures on the government's national security-related requests for user data. Read More »

US Firms Worry Edward Snowden Is Wrecking Their Business, But The Patriot Act Was Already Doing That

Leo Mirani | Quartz | August 7, 2013

Shortly after a meeting of an EU-sponsored program to push European cloud-computing capabilities in Estonia last month, a high-ranking EC official noted that the biggest losers from Edward Snowden’s revelation about US surveillance would be US businesses: Read More »

Vote All You Want. The Secret Government Won’t Change.

Jordan Michael Smith | The Boston Globe | October 19, 2014

The people we elect aren’t the ones calling the shots, says Tufts University’s Michael Glennon...

Read More »

Want A Cloud Where You Call The Shots? Consider ownCloud

Steven J. Vaughan-Nichols | ZDNet | June 25, 2013

Nervous about the NSA, PRISM and your public cloud? Not sure you want to put all your data eggs in one Amazon Web Services zone basket? Read More »

What Does Screening Your Phone Records Have To Do With Health Care?

Joseph Kvedar | The cHealth Blog | June 25, 2013

I have been following  the news about the National Security Agency (NSA) access to our phone records with great interest.  If we as a society don’t sort some of this out, we’ll see a repeat in the health sector a few years from now. Read More »

What Scares Me About Healthcare & Electric Power Security

John B. Dickson | Information Week | October 28, 2014

...As a security guy, what industries scare you most?” I get that question more frequently than you might imagine and my answer is always the same -- the healthcare and electrical power industries...

Read More »

What Transparency Reports Don't Tell Us

Ryan Budish | The Atlantic | December 19, 2013

These reports give us a lot of numbers, but very little information about how hard these companies fight on the behalf of users. Read More »

What Will Happen If The Feds Get Warrantless Access To Phone Location Data

Christopher Mims | The Atlantic | September 6, 2012

On Tuesday prosecutors for the Obama administration argued that records of location data gathered by cell-phone companies should be available to law enforcement even when no search warrant has previously been issued by a judge. Read More »

What Your Email Metadata Told The NSA About You

Rebecca Greenfield | The Atlantic Wire | June 27, 2013

President Obama said "nobody is listening to your telephone calls," even though the National Security Agency could actually track you from cellphone metadata. Well, the latest from the Edward Snowden leaks shows [the following]. Read More »

When It's At The Border, Your Data Is Fair Game — Even On Your Laptop

Philip Bump | The Atlantic Wire | September 10, 2013

Americans are protected from warrantless search in America — but not at the nation's borders. The imaginary line separating the United States from the rest of the world has become a critical demarcation for the privacy of the country's citizens, as new documents from the ACLU and the ongoing Snowden leaks make clear. Read More »

Who Controls Your Smartphone? And How to Leverage Open Source to Prevent it from Spying on You

There are many things about today’s world that warrant us asking that question. Do you or the mobile vendor control your smartphones? If you are a consumer, small or medium business (SMB) -- the answer is the vendor...What if you are a large enterprise or a government agency? The answer is still the vendor...How can the user regain control? Not all vendors have locked devices and walled gardens. Google’s line of Pixel hardware, for example, is a mid-market solution whose bootloader allows locking and re-locking. Pixels support two versions of Android. Google Mobile Services (GMS), where free services are tied to data monetization and a UX like Apple and Samsung devices. Secondly, Pixels can run Android Open-Source Project (AOSP) code that shares the same strengths as the GMS build, but the customer controls the code base and updates. There are several companies that are selling AOSP operating system builds for Pixel and other unlockable/lockable mobile phones and tablets...

Read More »

Who is spying on you? And do you care?

Several of our interns and younger editorial staff at Open Health News (OHN) have made a point of collecting and posting news clips about NSA and government spying on web sites. Read More »

Who’s Logging Your Face?

Alvaro Bedoya | The Washington Post | March 22, 2017

In 1892, Sir Francis Galton published a treatise in which he argued that the patterns on our fingers were “an incomparably surer criterion of identity than any other bodily feature.” Today, fingerprinting is ubiquitous. But the limits of the technique are clear: Fingerprinting is a targeted, one-off process whereby a single person is identified, typically through an in-person or on-site interaction. Advanced face recognition, on the other hand, lets police identify people from far away and without interacting with them...

Read More »