Experts Say iPhone 5S Fingerprint Security Feature Can Be Hacked

"While fingerprint sensors might seem like a nifty way to shorten the steps to your next brilliant tweet and keep your buddy from punking your Facebook with a fake status update, they’re more likely to create a false sense of security, thanks to statements like this, from Apple Senior Vice President Dan Riccio, in the introductory video for the new iPhone 5s: 'Your fingerprint is one of the best passwords in the world. It’s always with you, and no two are exactly alike.' Riccio is half-right. Your fingerprint is always with you, and no two are exactly alike. But that doesn’t make it one of the best passwords in the world. That actually makes it a potentially lousy password." Continue reading

Continue ReadingExperts Say iPhone 5S Fingerprint Security Feature Can Be Hacked

Secret terrorism court orders declassification of its own rulings

"Court cases before the Foreign Intelligence Surveillance Court — the court that reviews requests by the NSA to wiretap suspected terrorists’ communications — are generally classified. But Judge F. Dennis Saylor IV of the Foreign Intelligence Surveillance Court ordered the government to review the court’s opinions on the meaning, scope, and constitutionality of Section 215 of the Patriot Act, which authorizes the government to obtain 'any tangible things' relevant to foreign-intelligence or terrorism investigations. Section 215 is the legal basis the NSA claims legitimizes its mass phone records collection program." Continue reading

Continue ReadingSecret terrorism court orders declassification of its own rulings

ICANN: How top-down ‘implementation’ replaced bottom-up policymaking

"To understand the significance of this, suppose that the U.S. Congress or British Parliament had just passed a law, but one lobbying group didn’t like it. Suppose that the President or the British Prime Minister convened a closed meeting with a small group of invited 'stakeholders' and agreed on a 'strawman proposal' to amend the legislation. The new legislation makes the first group happy but most other stakeholders unhappy. But nevertheless, the chief executives went on to order its executive branch to implement the revised legislation without any review and approval by the Congress/Parliament. That is exactly what ICANN did." Continue reading

Continue ReadingICANN: How top-down ‘implementation’ replaced bottom-up policymaking

Google Glass looks silly now, but we’ll all be wearing mini-computers soon

"Add new sensors, as well as imaginative software, into these mini-computers and the impact could be significant. Non-invasive blood testing will soon be a reality, transformative for diabetics who will no longer have to puncture themselves several times a day, as well as those who have to monitor cholesterol. Health apps will be able to monitor those blood test results, and sync with the restaurant as the wearer walks in, to suggest the most suitable low-GI or low-cholesterol meal. The behavioural implications could be profound, but we need to be interested in understanding and exploring the potential so that we are ready for the debate about who has access to this data." Continue reading

Continue ReadingGoogle Glass looks silly now, but we’ll all be wearing mini-computers soon

Glenn Greenwald: Inside the mind of NSA chief Gen Keith Alexander

"Now, on the website of DBI Architects, Inc. of Washington and Reston, Virginia, there are what purports to be photographs of the actual Star-Trek-like headquarters commissioned by Gen. Alexander that so impressed his Congressional overseers. It's a 10,740 square foot labyrinth in Fort Belvoir, Virginia. The brochure touts how 'the prominently positioned chair provides the commanding officer an uninterrupted field of vision to a 22'-0' wide projection screen'. Its "primary function is to enable 24-hour worldwide visualization, planning, and execution of coordinated information operations for the US Army and other federal agencies.'" Continue reading

Continue ReadingGlenn Greenwald: Inside the mind of NSA chief Gen Keith Alexander

How the US government inadvertently created Wikileaks

"So here you have a non-US citizen at a foreign university doing graduate work studies, and the United States government came barreling in and not only snuffed out the funding and killed his studies, it also barred him from knowing what it was he had been funded to research. It was at that moment, Julian told me, that he decided he would devote himself to exposing organizations that attempted to keep secrets and withhold information in an effort keep the masses ignorant and disadvantaged. So you see, depending on who you ask, the US government actually helped create of Wikileaks. And the rest, as they say, is history." Continue reading

Continue ReadingHow the US government inadvertently created Wikileaks

Gov. Standards Agency Suggests Dropping NSA-Influenced Algorithm

"Documents provided by Edward Snowden suggest that the NSA has heavily influenced the standard, which has been used around the world. In its statement Tuesday, NIST acknowledged that the NSA participates in creating cryptography standards 'because of its recognized expertise' and because NIST is required by law to consult with the spy agency. Various versions of Microsoft Windows, including those used in tablets and smartphones, contain implementations of the standard, though the NSA-influenced portion isn’t enabled by default." Continue reading

Continue ReadingGov. Standards Agency Suggests Dropping NSA-Influenced Algorithm

How the NSA Spies on Smartphones Including the BlackBerry

"For an agency like the NSA, the data storage units are a goldmine, combining in a single device almost all the information that would interest an intelligence agency: social contacts, details about the user's behavior and location, interests (through search terms, for example), photos and sometimes credit card numbers and passwords. According to the documents, it set up task forces for the leading smartphone manufacturers and operating systems. Specialized teams began intensively studying Apple's iPhone and its iOS operating system, as well as Google's Android mobile operating system. Another team worked on ways to attack BlackBerry." Continue reading

Continue ReadingHow the NSA Spies on Smartphones Including the BlackBerry

Why Do They Need FATCA When They Have SWIFT?

"Given the growing ease with which people conduct transactions that don’t involve physical cash, or even leaving your house, one should wonder just how much financial data Uncle Sam’s spy network has, and why it feels entitled to it. What does this all mean? Hard to say. These days the American government is fairly cagey about its reasons for anything, but on the surface it appears as though the United States government will happily steal whatever information on the finances of ordinary people and financial institutions of other countries that it can’t coerce out of them through extra territorial law making schemes like FATCA. Whatever is going on, it’s not about taxes." Continue reading

Continue ReadingWhy Do They Need FATCA When They Have SWIFT?

With “Follow The Money”, NSA Knows All About Your Spending Habits

"While collecting credit card data was to be expected, what is even worse is that the NSA has also secretly planted itself in the nexus of the entire global USD-intermediated financial transactions system courtesy of SWIFT. In other words, America's unsupervised uber spies, when not checking in on their former significant others, spend the bulk of their time tracking who is buying what, where, and with whose money. They also know how much anyone in the world has spent on credit card-based purchases, what the source of that money is, and what the purchase was. In other words: absolute monetary and financial surveillance." Continue reading

Continue ReadingWith “Follow The Money”, NSA Knows All About Your Spending Habits