Justiça autoriza quebra de sigilo de quem pesquisou sobre Marielle na internet dias antes do crime

Justiça autoriza quebra de sigilo de quem pesquisou sobre Marielle na internet dias antes do crime

O delegado até então encarregado pela investigação do caso queria o levantamento de todos os computadores ou celulares usados para pesquisar as seguintes palavras no Google, num intervalo de cinco dias até o momento do assassinato: Marielle FrancoVereadora MarielleAgenda vereadora MarielleCasa das Pretas Rua dos Inválidos, 122Rua dos Inválidos A Justiça autorizou a quebra de sigilo no mesmo dia em que a polícia fez o pedido.

Govt. May Link Facebook, Twitter With Aadhaar, Mobile Number; But Why?

Govt. May Link Facebook, Twitter With Aadhaar, Mobile Number; But Why?

has understood the problem, and very soon, you can be asked to link your social media accounts with anyone Govt. For instance, a mobile number is required for creating a Twitter account, and moreover, they are offering Aadhaar and other Govt.

D.E.A. Secretly Collected Bulk Records of Money-Counter Purchases

D.E.A. Secretly Collected Bulk Records of Money-Counter Purchases

WASHINGTON — The Drug Enforcement Administration secretly collected data in bulk about Americans’ purchases of money-counting machines — and took steps to hide the effort from defendants and courts — before quietly shuttering the program in 2013 amid the uproar over the disclosures by the National Security Agency contractor Edward Snowden, an inspector general report found.

Huawei Security ‘Defects’ Are Found by British Authorities

Huawei Security ‘Defects’ Are Found by British Authorities

Garrett Marquis, a spokesman for the National Security Council, said the United States commended Britain “for taking a hard look at its telecommunications vendors in order to ensure the maximum security of its networks.” He added, “We share many of the concerns listed in the Oversight Board’s report.”.

Internet providers would need permission to use consumer data under proposed MT legislation

Internet providers would need permission to use consumer data under proposed MT legislation

HELENA — Rep. Daniel Zolnikov (R-Billings) says people have a right to be asked if internet service providers can use their personal data. Zolnikov said providers will still be able to use data to create profiles of people based on their browsing history to make targeted ads.

Pelosi says Democrats to introduce bill to bring back net neutrality this week

Pelosi says Democrats to introduce bill to bring back net neutrality this week

Speaker Nancy Pelosi Nancy Patricia D'Alesandro PelosiTrump accuses Dems of 'presidential harassment' as investigations ramp up House Democrats ramp up investigations of Trump Biden's experience is his greatest asset and biggest liability MORE (D-Calif.) announced Monday that Democrats will introduce a net neutrality bill to replace the open internet rules that were repealed in 2017.

This Is What Tech Companies Want in Any Federal Data Privacy Legislation

This Is What Tech Companies Want in Any Federal Data Privacy Legislation

Here’s what some tech companies and a key industry group want in any future privacy legislation: Google/Internet Association In general, both parties agree on the following Apple:

You may soon have to give your DNA to the state and pay $250 for the privilege

You may soon have to give your DNA to the state and pay $250 for the privilege

The proposed database appears to be focused on making it easier for law enforcement to use DNA in investigations, but Kaye said it's not targeting the right people to make a significant impact when it comes to solving cases.

That German-French Deal to "Rescue" the EU Copyright Directive? Everyone Hates It. EVERYONE.

That German-French Deal to "Rescue" the EU Copyright Directive? Everyone Hates It. EVERYONE.

This week started with a terrifying bang, when German and French negotiators announced a deal to revive the worst parts of the new EU Copyright Directive though a compromise on "Article 13," which requires copyright filters for any online service that allows the public to communicate.

China reportedly made an app to show people if they're standing near someone in debt — a new part of its intrusive 'social credit' policy

China reportedly made an app to show people if they're standing near someone in debt — a new part of its intrusive 'social credit' policy

The app, named the "map of deadbeat debtors," rolled out to people in Hebei, the state-run China Daily newspaper reported .

How the US Government Tried to Troll Me

How the US Government Tried to Troll Me

Throughout this time, I’d continued telling my friends about the things I was watching in the conspiracy videos, on one hand because I thought it was entertaining, on the other because I thought there could be some truth to it.

Google’s Earth: how the tech giant is helping the state spy on us

Google’s Earth: how the tech giant is helping the state spy on us

As it turns out, the same platforms and services that Google deploys to monitor people’s lives and grab their data could be put to use running huge swaths of the US government, including the military, spy agencies, police departments and schools.

EU governments agree to tougher stance on e-evidence

EU governments agree to tougher stance on e-evidence

BRUSSELS (Reuters) - EU governments agreed on Friday to toughen up draft rules allowing law enforcement authorities to get electronic evidence directly from tech companies such as Facebook (NASDAQ: ) and Google (NASDAQ: ) stored in the cloud in another European country.

Nearly 250 Pages of Devastating Internal Facebook Documents Posted Online By UK Parliament

Nearly 250 Pages of Devastating Internal Facebook Documents Posted Online By UK Parliament

They raise important questions about how Facebook treats users data, their policies for working with app developers, and how they exercise their dominant position in the social media market,” Collins tweeted.

Skills in Cybersecurity

Skills in Cybersecurity

In Europe - region where more cybersecurity experts are demanded- the 48% of the companies assure they cannot cover their needs. Also from the public administrations have admitted the need to foster this productive network in order to protect national and citizens security.

‘Surveillance State’ is alive, well — and operating against us all

‘Surveillance State’ is alive, well — and operating against us all

They reveal the CIA not only intercepted emails of U.S. citizens but they were emails of the most sensitive kind — written to Congress and involving whistleblowers reporting alleged wrongdoing within the Intelligence Community.

Spy and police chiefs demand passage of Australian encryption access law

Spy and police chiefs demand passage of Australian encryption access law

Without providing any evidence, Australian Security Intelligence Organisation (ASIO) chief Duncan Lewis told a parliamentary committee hearing on October 19 that suspected terrorists were using encrypted messages to plan potential attacks.

Five ways your privacy is compromised without you realising

Five ways your privacy is compromised without you realising

If you’re not already concerned about the police’s reach into your life, how do you feel about them reading your social media posts? In the same way, the trawling of our social media posts and photos just because we have an opinion about fracking or badgers should be cause for a lot of angry face emojis.

Tell these Senators to vote "no" on Supreme Court nomination

Tell these Senators to vote "no" on Supreme Court nomination

If Brett Kavanaugh is confirmed, we’ll no longer be able to rely on the federal judiciary to protect the rights of the most vulnerable people in our country.

Giving TSA facial-recognition software isn’t worth a faster security line

Giving TSA facial-recognition software isn’t worth a faster security line

Facial-recognition technology poses a unique surveillance threat and is being deployed without adequate privacy protections. In the wake of a terrorist attack or other violent incident, we should expect CBP to collect and share more data, including facial images, with other law enforcement agencies.

Internet lobby group hopes to guide federal privacy laws

Internet lobby group hopes to guide federal privacy laws

Your expectations as a user and certainly for companies trying to innovate, you can’t have 50 different standards; we want to have one robust national standard that protects people,” said Michael Beckerman, Internet Association CEO.

Wikileaks Confirms: CIA Are Conducting Operations on U.S. Soil

Wikileaks Confirms: CIA Are Conducting Operations on U.S. Soil

Per Wikileaks: In 2007, #Brennan praised Iran’s “positive engagement” & “important contributions” in Afghanistan pic.twitter.com/QBTsCYf0el — marina portnaya (@portnayanyc) Sour grapes: Brennan’s TAC complains over CIA snub During his time in the private sector, Brennan established an intelligence firm called The Analysis Corporation (TAC) that competed for government contracts, including one related to terrorist watch lists.

Schneier on Security

Schneier on Security

U.S. intelligence officers were also able to identify digital links between the covert communications system and the U.S. government itself, according to one former official -- links the Chinese agencies almost certainly found as well.

China Is Going to Outrageous Lengths to Surveil Its Own Citizens

China Is Going to Outrageous Lengths to Surveil Its Own Citizens

The Dove program’s bird-like drones have been flown over five provinces so far, and it’s perhaps no coincidence that they’ve been used extensively in one area in particular: Xinjiang, a northwestern region heavily populated by Uighurs, a largely Muslim ethnic minority.