key going into lock
Continue Reading

FBI, Feds Want to be Able to Decrypt Your Encrypted Email and Messages

Both the Federal Senate Judiciary Committee and the Senate Intelligence Committee heard today from FBI Director James Comey, and from Deputy Attorney General Sally Quillian Yates, that they need a backdoor (or a “front door”, as Comey calls it) that allows them to decrypt encrypted email and messages in order to fight terrorism.

leet l337 speak
Continue Reading

NIFOC, BOGSAT, and 1000s More in FBI Glossary of Internet Slang Acronyms

The FBI glossary of Internet slang acronyms reads like a leet speak (l337 5p3@k) primer, albeit a massively over-inclusive one. Indeed, in the time it would take an FBI agent to skim through the Internet slang glossary looking for a particular term, one would hope they could have just inferred it from context. Put together by the FBI Intelligence Research Support Unit (IRSU) and starting with ADN (Any Day Now) and ending with ZOMG (“emphasized OMG”) and ZUP (“what’s up?”), and everything in between, the FBI primer on ‘net slang is a whopping 83 pages containing nearly 3000 terms, many of them, if not most of them, not even really a thing. Although we are fond of BOGSAT (bunch of guys sitting around talking) and are now using it every chance we get.

Continue Reading

The Tormail FBI Connection: The FBI Has the Entire Tormail Database

Move over, NSA, the FBI, having obtained the entire Tormail email database is the newest organization to be revealed to have engaged in massive breaches of email privacy.

The Internet Patrol default featured image
Continue Reading

FBI Says Using Internet Cafe May Point to Your Being a Terrorist

The FBI, in conjunction with the Bureau of Justice Assistance (BJA) has released their list of “Potential Indicators of Terrorist Activities Related to Internet Cafe” (sic). It may surprise you that your own Internet cafe activities render you suspicious. For example, if you attempt to shield your screen (like when, you know, you are entering a password?) you may be a terrorist. Or, if you travel an “illogical distance” to use an Internet cafe, you may be a terrorist. (We can’t help but hear Jeff Foxworthy’s voice as we read this list.) The list also includes suspicious computer activities and uses, as well as advice on what to do if you suspect that the guy next to you sipping his double light-foam mochaccino latte is a terrorist.

The Internet Patrol default featured image
Continue Reading

FBI Warrantlessly Attaching GPS to Cars to Track Suspects

GPS. It can be invaluable in helping you to get from Point A to Point B (of course, GPS can also lead you to a near death experience). However, it turns out that GPS can now be surreptitiously attached to the outside of your car, and used to track you – without a warrant – by the FBI (and who knows to what other law enforcement agencies this may extend).

The Internet Patrol default featured image
Continue Reading

Apple Sued for Colluding with Mafia in Bugging Man’s iPods

From our “Now I’ve heard it all” department, Gregory McKenna (misreported in many articles as “George McKenna”) is suing, among others, the St. Louis County Police Department, the FBI, and Apple Computers for allegedly allowing the Mafia to bug his iPods (along with his house, his cars, and more) and allowing them to play sinister songs with hidden messages to him on his iPods.

The Internet Patrol default featured image
Continue Reading

Anthrax Documents Available Online! Download and Read the Anthrax Papers Here!

The papers which underpinned the investigation into the anthrax scare and incidents of 2001 which included the death of five people, and which ultimately lead to the suicide of lead suspect Bruce Ivins last week, have not only been unsealed, but in record time they have been put on the Internet and made available to the public on the Department of Justice (DOJ) website.