NSA the Golden Nugget
Continue Reading

NSA Mining Data from Smartphone Apps

Turns out there is another reason for rejecting all those insidious game invitations from smartphone apps and their Facebook counterparts: the New York Times has revealed today that the NSA and its British counterpart, GCHQ, are mining the data that your smartphone apps are generating, from location data, to contact lists, to phone logs and even the data embedded in images. Dubbed the “Mobile Surge” by the Brits, the intelligence community is giddy with glee over the trove of data served up by mobile apps.

nsa watching you
Continue Reading

NSA Co-Traveler Program Tracking Every Cell Phone Movement and Location

The newest reveal about the NSA’s surveillance activities is the existance of the NSA Co-Traveler program, through which the NSA is tracking the location and movements of the majority of cell phones on the planet, relationship-mapping every cell phone with every other cell phone.

The Internet Patrol default featured image
Continue Reading

SFMTA Refund List: Last Names Starting with Sl through Sz and Letters T, U and V

People and businesses owed a refund by the San Francisco Municipal Transportation Authority (SFMTA) last names starting with Sl and letters T, U and V (Original SFMTA list here) SLABACK STEPHANIE A 3WGK879 $37.00 SLACK JENNIFER G 3SAG183 $233.00 SLACK JESSICA LEE 3CJA938 $45.00 SLADE DONNA J 2TOX937 $30.00 SLADE…

The Internet Patrol default featured image
Continue Reading

SFMTA Refund List: Last Name Letters C through D

People and businesses owed a refund by the San Francisco Municipal Transportation Authority (SFMTA) letters C-D (Original SFMTA list here) C A KILGER MACHINE 3H51934 $30.00 C A KILGER MACHINE WORKS 3J56457 $33.00 C A SABAH/CO INC 5F76833 $25.00 C C WESTERN INC 9B47201 $35.00 C CONNOLLY 3RZG343 $15.00 c…

protonmail encrypted email
Continue Reading

ProtonMail Offers Truly Encrypted Email

Want a truly encrypted email program? If you are among those who worry about nosy agencies and others reading their email, you will appreciate Proton Mail, “End-to-end encrypted email, based in Switzerland.”

the fox guarding the henhouse
Continue Reading

Feinstein Says CIA Snuck on Computers, Deleted Documents – Why is Anyone Surprised?

This week there was an explosion in Washington, DC – specifically, Dianne Feinstein, chair of the Senate Intelligence Committee, exploded over documents vanishing from CIA provided computers at a CIA leased facility, and specifically relating to the CIA internal “Panetta Review”. While CIA director John Brennan and Feinstein argue, we can’t help but wonder: Just how naive do you have to be to believe that when the CIA produces documents on CIA provided computers, in a CIA leased facility, guarded by the CIA, that they won’t have left themselves a way to access those same computers? Or that they won’t use it?