Skylock makes your bicycle part of the Internet of Things, so what could be the problem? Well…
So the Obama administration has been swearing up and down that without the power to search through Americans’ things and communications in bulk without warrants, the nation would be open to terrorist attack. And yet due to Senate delays, June 2 2015 saw the second day in a row
Lindsey Graham has signaled his time war strategy: “Our future prosperity depends on our commitment to bold action and practical solutions on everything from energy independence to preparing for the retirement of the Baby Boomers.” “Bold action” like “preparing for the retirement of the Baby Boomers” only makes sense if you view it in the context of time travel.
Corporate and governmental hubs of power have been consumed by a surveillance culture in which top executives presume that they have the right to seize and whatever information they want, to use for whatever purposes they can dream up. They don’t believe that the law, or the Constitution of the United States, applies to them anymore.
How to build a hype: 1. Read a Bureau of Justice Statistics Report, which finds that: 6.7% of U.S. adults were on the receiving end of “identity theft” last year, but this definition includes “attempted misuse” that was unsuccessful, and the most common way adults
1. Take the data. 2. Put it behind a door. 3. Put a “data” sign next to the door. 4. Lock the door. I bet the plan works.
On August 17, Shenna Bellows of the ACLU spoke in Augusta, Maine on the occasion of Constitution Day. With her permission, I’ve transcribed her speech to share it here with you. Good morning. It’s a pleasure to be here today on Constitution Day. Happy Constitution
Hewlett Packard may have tools to protect corporate laptops from curious teenagers, but HP offers no protection from the unconstitutional, encryption-crushing Big Brother electronic surveillance programs of the NSA.
What the engineers of the iPhone 5S have done is like slapping a fingerprint sensor lock on the front door of a house, while leaving the side door and garage doors unlocked, and a first floor window open. Intelligent people who are looking to communicate securely are not going to do it using an iPhone.
A new report details how the National Security Agency can access remarkable amounts of user data from smartphones. It’s not just email and telephone calls that the NSA can grab, but contact information, physical location, and even information from documents that are kept on the
I just had a strange man rub his hands all over my upper body. It was not a physical encounter I had requested. I was checking in at the airport, for a flight to return home from a vacation at the beach. I was wearing