Thursday, February 11, 2010
Student detained at airport because of Arabic flash cards
Tuesday, January 19, 2010
FBI violates your privacy... again
An anonymous reader writes to tell us of a report from the Washington Post which alleges that the FBI "illegally collected more than 2,000 US telephone call records between 2002 and 2006 by invoking terrorism emergencies that did not exist or simply persuading phone companies to provide records."
Friday, January 09, 2009
FBI Looking for Terrorists contributes to pervasive Financial Fraud
Sunday, August 31, 2008
FBI, Police Detaining GOP Convention Protest Group Members
FBI involvement:
http://www.salon.com/opinion/greenwald/2008/08/31/raids/index.html
Police raids:
http://www.salon.com/opinion/greenwald/2008/08/30/police_raids/index.html
Friday, August 22, 2008
FBI Pushing for Warantless Investigations
Monday, June 30, 2008
FBI amassing eye scan database
Saturday, March 15, 2008
FBI Abusing NSL
Thursday, November 08, 2007
Eating falafel? You're a terrorist!
Our tax dollars are going to _this_? Check out the Boing Boing comments for some well-deserved ridicule.
Wednesday, August 29, 2007
Point and Click Surveillance
Columbia's Bellovin says the flaws are appalling and show that the FBI fails to appreciate the risk from insiders.
"The underlying problem isn't so much the weaknesses here, as the FBI attitude towards security," he says. The FBI assumes "the threat is from the outside, not the inside," he adds, and it believes that "to the extent that inside threats exist, they can be controlled by process rather than technology."
Bellovin says any wiretap system faces a slew of risks, such as surveillance targets discovering a tap, or an outsider or corrupt insider setting up unauthorized taps. Moreover, the architectural changes to accommodate easy surveillance on phone switches and the internet can introduce new security and privacy holes.
"Any time something is tappable there is a risk," Bellovin says. "I'm not saying, 'Don't do wiretaps,' but when you start designing a system to be wiretappable, you start to create a new vulnerability. A wiretap is, by definition, a vulnerability from the point of the third party. The question is, can you control it?"
Well it's a good thing that we can completely trust the FBI to understand the scope of its responsibilities and the limits of its power because it has never abused the privileges entrusted to it in the past. Oh, wait.