(Mon Mar 04 2019 00:00:00 GMT+0200 (Eastern European Standard Time)) Since the Terrorism Scare of 2001-2006ish the NSA has been collecting telephone records of every phone call made in the USA. The theory was to find the needle-in-the-haystack the NSA first needed the haystack, and that by having records of all phone calls the NSA could build a map of all associations and therefore find The Terrorists. The program became widely known with the Edward Snowden revelations, and was 'shut down' with a 2015 law, The Freedom Act. That act preserved parts of the program, and is due to expire at the end of the year unless the Trump Administration or Congress acts.
(Thu Jan 24 2019 00:00:00 GMT+0200 (Eastern European Standard Time)) We've just started the second month of Trump's government shutdown rooted in his unwarranted demand for a border wall to increase border security. The Democratic party has recently offered a different border security solution, rather than build a wall to build a 'smart wall' that would use technology and drones and stuff. While it's appealing to turn to more technology, this solution means the government will be funding and developing ever-more-powerful surveillance technology.
(Fri Jun 15 2018 00:00:00 GMT+0300 (Eastern European Summer Time)) Several governments have spy satellites in orbit tracking us, so why not focus our cameras on the spy satellites? Citizens can spy on the governments who spy on citizens. Modern technology makes it possible to track how they are tracking us. And it is an exercise in freedom to determine just how it is we are being tracked by the government.
(Tue Mar 07 2017 00:00:00 GMT+0200 (Eastern European Standard Time)) A new batch of 8,761 files was released on Tuesday by WikiLeaks that alleges that the U.S. Central Intelligence Agency (CIA) has a dedicated iOS exploit team —and lacks the ability to keep the attack vectors under lock and key. They either bought or developed in-house a large pile of iPhone hacking tools. They were collected by the CIA's Center for Cyber Intelligence (CCI), a group of over 5000 members, and have been used to directly target over 10,000 people. However, the tools have escaped the CIA and are now circulating among former U.S. government hackers and contractors in an unauthorized manner. It is one of those people who released the information to Wikileaks.