Speaking via video link (he uses Skype!) from Russia to the HopeX hackers’ conference in New York City July 19, Edward Snowden issued a call to arms to those present. Engineers, he said, “need to think now in adversarial terms to defeat government technical capabilities.” While the government now uses technology to shield themselves from accountability, software and hardware must “become a way to express our freedoms while protecting our freedoms.”
|By: Peter Van Buren Monday July 21, 2014 11:07 am|
|By: Peter Van Buren Thursday June 12, 2014 11:40 am|
Glenn Greenwald almost missed the story of his career because he didn’t understand how to communicate securely.
The person Greenwald now knows as Edward Snowden began contacting him via open email, urging Greenwald to learn how to use encryption and other web tools to receive sensitive information. When Greenwald was slow to act, Snowden even made a video tutorial to baby-step him through the necessary procedures. Absent these extraordinary efforts by Snowden, who knows when or even if his game-changing NSA information would have come to light.
|By: Peter Van Buren Tuesday June 10, 2014 10:00 am|
The Department of Veterans Affairs’ (VA) in-house watchdog has demanded that the Project On Government Oversight (POGO) turn over all information it has collected related to abuses and mismanagement at VA medical facilities, according to a subpoena delivered to POGO May 30.
|By: Kit OConnell Monday March 10, 2014 2:13 pm|
Edward Snowden, the NSA whistleblower in exile, spoke to the SXSW Interactive conference in Austin, Texas today. He appeared via a choppy videostream which was said to be routed through seven proxy servers. Joining the conversation in person were the ACLU’s Ben Wizner and Christopher Soghoian.
|By: Kevin Gosztola Friday October 4, 2013 11:37 am|
A presentation, classified top secret and obtained by The Guardian from former NSA contractor and whistleblower Edward Snowden, contains technical details on how the Mozilla Firefox browser used with Tor can be targeted.
As James Ball, Bruce Schneier and Glenn Greenwald report, targeting Firefox can give the “agency full control over targets’ computers, including access to files, all keystrokes and all online activity.”
|By: Jane Hamsher Monday August 5, 2013 9:25 am|
Nobody can argue with the FBI’s legitimate pursuit of removing child pornographers from the internet. However, in a country that equates whistleblowers with terrorists and charges them with espionage and aiding the enemy, there is also serious concern in the tech community today that the anonymity provided by the Tor network can now be compromised in ways that jeopardize secure legitimate communication.
|By: Kit OConnell Friday March 22, 2013 3:15 pm|
Can Anonymous be destroyed with enough arrests and punitive sentences?