Tag Archives: NSA
Support Apple’s Fight to Protect Digital Security
Sign the petition at https://petitions.whitehouse.gov/petition/apple-privacy-petition
Read the letter from Tim Cook http://www.apple.com/customer-letter/
GPG Suite for Mac – Privacy for People
The GPG Suite for Mac provides everything you need to get started with secure communication and encrypting files in one simple package. While no longer free unless you compile the code yourself, it is still worth the cost ($24 per major relase) untill Apple builds encryption into Mac Mail.
Use GPG Suite to encrypt, decrypt, sign and verify files or messages. Manage your GPG Keychain with a few simple clicks and experience the full power of GPG without too much hassle.
One shouldn't need to set up sophisticated encryption tools to protect their private mail, documents and records. Amendment IV to the U. S,. Constitution reads:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
James Bamford’s Edward Snowden Article from Wired
James Bamford’s Wired article on Edward Snowden from August 2014. http://www.wired.com/2014/08/edward-snowden/#ch-1
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices by Jonathan Zdziarski
Slides from the talk Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS by Jonathan Zdziarski at the 2014 Hope X conference in New York.
NSA surveillance program reaches ‘into the past’ to retrieve, replay phone calls
The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.
NSA Gadget Catalog – Stuff You Won’t See at CES
After years of speculation that electronics can be accessed by intelligence agencies through a back door, an internal NSA catalog reveals that such methods already exist for numerous end-user devices. Read the full article here.
NSA tracking cellphone locations worldwide, . Wht Can’t the NSA do the Health Exchange App?
The National Security Agency is gathering nearly 5 billion records a day on the whereabouts of cellphones around the world, according to top-secret documents and interviews with U.S. intelligence officials, enabling the agency to track the movements of individuals — and map their relationships — in ways that would have been previously unimaginable. FULL ARTICLE
How Microsoft handed the NSA access to encrypted messages
• Secret files show scale of Silicon Valley co-operation on Prism
• Outlook.com encryption unlocked even before official launch
• Skype worked to enable Prism collection of video calls
• Company says it is legally compelled to comply
By Glenn Greenwald, Ewen MacAskill, Laura Poitras, Spencer Ackerman and Dominic Rushe
Read on theGuardian site.
http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data
In Depth Review: New NSA Documents Expose How Americans Can Be Spied on Without A Warrant
Celebrate July 4th and the 4th Amendment with this EFF article about the recently released NSA documents.






