You are not logged in. LOG IN NOW >

Coming to Grips With Our Not-So-New Surveillance State

BY Matt Stoller | Tuesday, March 18 2014

An FBI agent collects the agency's one-hundred-millionth fingerprint (National Archives and Records Admin.)

In this op-ed, Matt Stoller looks at the history of surveillance in America and argues that the current conversation about the NSA's massive system of dragnet surveillance is missing perspective. We've been living in surveillance state for decades, he writes, one that has long merged commercial and state snooping into individuals' private lives. And we're not powerless to fight it. Read More

WeGov

A First: Reporters Without Borders Declares UK, US “Enemies of the Internet”

BY Jessica McKenzie | Monday, March 17 2014

Screenshot of a graphic from the Reporters Without Borders report

It's official: the surveillance activities of the NSA and the GCHQ have earned the United Kingdom and the United States a new title: “Enemy of the Internet.” They share the honor with the likes of China, Cuba, Iran, Russia, Saudi Arabia and Syria, among others.

Read More

WeGov

Snowden EU Testimony Renews Calls to Grant Asylum

BY Miranda Neubauer | Friday, March 7 2014

"Blame the Game" campaign screenshot

On Monday, Edward Snowden will participate in his first live discussion before an audience as part of SXSW Interactive through a video conference with his legal advisor Ben Wizner, director of the ACLU's Speech, Privacy & Technology Project, as well as digital privacy expert Christopher Soghoian. (Republican Rep. Mike Pompeo from Kansas, also a member of the House Intelligence Committee, has asked SXSW to cancel the webcast, The Hill reported). Snowden's discussion will come amidst renewed calls in Europe to grant him asylum. Read More

First POST: Dorian Mode

BY Micah L. Sifry | Friday, March 7 2014

Did Newsweek identify the wrong man as the inventor of Bitcoin?; defending Julian Assange from his critics; drone hobbyists get reason to rejoice; and much, much more. Read More

WeGov

Surveillance in the Overlooked Corners of Africa

BY Jessica McKenzie | Tuesday, March 4 2014

Screenshot of Appelbaum and Marques

In the video below, filmed during the Oslo Freedom Forum in May 2013, Jacob Appelbaum breaks it to Rafael Marques, an Angolan investigative journalist and anti-corruption activist, that his laptop is being surveilled through a crude backdoor in spite of the fact that he is using Tor. He opens up a file where they can see all the images that have been stored and are waiting to be collected by the hackers. Appelbaum tells an understandably concerned Marques: “Every computer that's targeted is compromisable,”

Read More

First POST: Whiz Kids

BY Micah L. Sifry | Thursday, February 27 2014

The inside story on how the HealthCare.gov site was saved; the limits of political moneyball; GCHQ captured millions of Yahoo webcam chat images; and much, much more. Read More

First POST: Secret-Spilling Machine

BY Micah L. Sifry | Monday, February 24 2014

Some unanswered questions about Ukraine's #EuroMaidan protests; Julian Assange's ghostwriter speaks out on his subject's megalomania; Gawker's Nick Denton on the end of privacy; and much, much more. Read More

First POST: Too Big to Read Our Mail

BY Micah L. Sifry | Friday, February 21 2014

Why and how the NSA should be broken up; Comcast's lobbying blitz; the vital role of social media in Ukraine and Venezuela; and much, much more. Read More

WeGov

Making "NSA-Proof" Social Networking Mainstream

BY Carola Frediani | Tuesday, February 18 2014

Even Internet Grandma Can Use It? (credit: KnowYourMeme)

Webmail services like Yahoo and Google and social networks like Facebook and Twitter are convenient and efficient platforms, as well as easy to use, but they collect massive amounts of user data that can facilitate intelligence spying and other types of snooping. Meanwhile, securer methods of communication are often cumbersome and overly technical for the average user who would like to send an email without having to download and set up various software. Yet after Edward Snowden’s leaks, an increasing demand for securer alternatives has led to the development of anti-surveillance products with an eye towards being user friendly. Read More

First POST: Fingerprints and Fire Insurance

BY Micah L. Sifry | Tuesday, February 18 2014

How the NSA and GCHQ targeted WikiLeaks, Anonymous and Pirate Bay; why collecting Americans' phone metadata is just like fingerprinting and buying fire insurance; how the paper lobby is hoping to keep the government from going online; and much, much more. Read More