Intelligence Analysts Use U.S. Smartphone Location Data Without Warrants, Memo Says

Intelligence Analysts Use U.S. Smartphone Location Data Without Warrants, Memo Says

In October, BuzzFeed reported on the existence of a legal memo from the Department of Homeland Security opining that it was lawful for law enforcement agencies to buy and use smartphone location data without a warrant.

DOD to move 18M biometric records on ‘threat actors’ to AWS’s cloud

DOD to move 18M biometric records on ‘threat actors’ to AWS’s cloud

The Department of Defense wants to modernize an 18-million-record system of biometric data on adversaries by moving it to Amazon Web Service‘s cloud, the department indicated in a request for information posted Tuesday.

Law Enforcement Purchasing Commercially-Available Geolocation Data is Unconstitutional

Law Enforcement Purchasing Commercially-Available Geolocation Data is Unconstitutional

But it violates the First and Fourth Amendments of the U.S. Constitution for the government to purchase commercially available location data it would otherwise have to get a warrant to acquire.

Time to Pardon Edward Snowden?

Time to Pardon Edward Snowden?

In 2013, Edward Snowden, a contractor with the NSA, leaked documents to journalists that exposed the United States mass surveillance program of Americans’ telephone records.

The Viking Snowden: Denmark spy chief 'relieved of duty' after whistleblower reveals illegal snooping on citizens

The Viking Snowden: Denmark spy chief 'relieved of duty' after whistleblower reveals illegal snooping on citizens

The TET clearly decided its authority and ability to oversee the intelligence services was at stake and notes that it sought, and received, repeat support from the Defense Minister in its investigation.

Securus sued for 'recording attorney-client jail calls, handing them to cops' – months after settling similar lawsuit

Securus sued for 'recording attorney-client jail calls, handing them to cops' – months after settling similar lawsuit

Jail phone telco Securus provided recordings of protected attorney-client conversations to cops and prosecutors, it is claimed, just three months after it settled a near-identical lawsuit.Just three months ago, in May this year, the company settled a similar class-action lawsuit this time covering jails in California.

Anomaly Six Accused Of Feeding U.S. Gov User Location Data From Hundreds Of Apps

Anomaly Six Accused Of Feeding U.S. Gov User Location Data From Hundreds Of Apps

A new Wall Street Journal report alleges that Anomaly Six, a company that was formed by two U.S. Military vets, is a federal contractor that has managed to get its location data SDK embedded into over 500 mobile applications that are used by hundreds of millions of smartphone owners.

Google is partnering with the Department of Defense to fight cybercrime

Google is partnering with the Department of Defense to fight cybercrime

Google Cloud has landed a deal to help the Department of Defense combat cyber threats worldwide.Google has landed a deal with the Department of Defense to use its Cloud tools to combat cyber threats.

Wyden, Rounds and Eshoo Lead Bipartisan Call to Secure U.S. Capitol Phone Networks

Wyden, Rounds and Eshoo Lead Bipartisan Call to Secure U.S. Capitol Phone Networks

– U.S. Senators Ron Wyden, D-Ore., and Mike Rounds, R-S.D., with Rep. Anna Eshoo, D-Calif., led 20 members of the House and Senate in a request to encrypt phone calls between the chambers to protect communications against foreign surveillance.

Social Security numbers stolen in defense agency data breach

Social Security numbers stolen in defense agency data breach

Department of Defense spokesperson Charles Prichard confirmed Thursday the agency had detected a breach of personally identifiable information on a system it hosts, and was in the process of notifying those affected by letter.

Following Mitsubishi, Pasco and Kobe Steel Disclose Data Breaches

Following Mitsubishi, Pasco and Kobe Steel Disclose Data Breaches

Both, Pasco and Kobe Steel’s official statements said that no damage has been done in either of the data breach attempts as no information leakage had been discovered so far during the joint investigations carried out by the Ministry of Defense and various government and state authorities.

A dark web tycoon pleads guilty. But how was he caught?

A dark web tycoon pleads guilty. But how was he caught?

“Perhaps the greatest overarching question related to the investigation of this case is how the government was able to pierce Tor’s veil of anonymity and locate the IP address of the server in France,” Marques’s defense lawyers wrote in a recent filing.

Do Ring Cameras Violate Wiretapping Laws? New Hampshire Is About to Find Out

Do Ring Cameras Violate Wiretapping Laws? New Hampshire Is About to Find Out

Assistant Strafford County Attorney Emily Garod, who is prosecuting Burke, told Motherboard that when she learned of the Ring audio recording she messaged a state-wide group of prosecutors to ask for advice or examples of similar cases.

The Military Is Building Long-Range Facial Recognition That Works in the Dark

The Military Is Building Long-Range Facial Recognition That Works in the Dark

The Army Research Lab has previously publicized research in this area, but these contracts, which started at the end of September 2019 and run until 2021, indicate the technology is now being actively developed for use in the field.“Sensors should be demonstrable in environments such as targets seen through automotive windshield glass, targets that are backlit, and targets that are obscured due to light weather (e.g., fog),” the Department of Defense indicated when requesting proposals.

Not so IDLE hands: FBI program offers companies data protection via deception

Not so IDLE hands: FBI program offers companies data protection via deception

Sometimes, that involves field agents proactively contacting companies when they have information of a threat—as two FBI agents did when they caught wind of researchers trying to alert casinos of vulnerabilities they said they had found in casino kiosk systems.

EXCLUSIVE: This Is How the U.S. Military’s Massive Facial Recognition System Works

EXCLUSIVE: This Is How the U.S. Military’s Massive Facial Recognition System Works

These contracts, combined with revelations surrounding the military’s massive biometric database initiatives, paint an alarming picture: A large and quickly growing network of surveillance systems operated by the U.S. military and present anywhere the U.S. has deployed troops, vacuuming up biometric data on millions of unsuspecting individuals.

Microsoft beats Amazon for Pentagon's $10 billion cloud computing contract

Microsoft beats Amazon for Pentagon's $10 billion cloud computing contract

In a book slated for publication Oct. 29, retired Navy commander Guy Snodgrass, who served as a speech writer to former Defense Secretary Jim Mattis, said Trump called Mattis and directed him to “screw Amazon” by preventing it from bidding on the JEDI contract, according to an excerpt of the book seen by Reuters ahead of its release.

Israel eased export controls on surveillance technologies amid criticism

Israel eased export controls on surveillance technologies amid criticism

Israel is a major exporter of surveillance technology, according to a June 2019 report by U.N. Special Rapporteur for Freedom of Expression David Kaye, which called for a global moratorium on such exports until a human rights compliant regime was put in place.

TSA: Forced Strip-Search No More Offensive Than Voluntarily Using a Locker Room

TSA: Forced Strip-Search No More Offensive Than Voluntarily Using a Locker Room

What we do know from the TSA’s 24-page reply to the lawsuit (.pdf), a motion to dismiss filed Friday in U.S. District Court for the Northern District of Oklahoma, is that they don’t think they should be held responsible.

Why the Air Force is investigating a cyber attack from the Navy

Why the Air Force is investigating a cyber attack from the Navy

The Air Force defense lawyer reported the tracking device to his information security manager, who concluded the malware was a “splunk tool,” which allowed the sender of the malware to gain “full access to his computer and all files on his computer,” Wilson wrote in the memo, which he sent to the chief of staff for the Navy’s Region Legal Service Offices.

Secret tracking device found in Navy email to Navy Times amid leak investigation raises legal, ethical questions

Secret tracking device found in Navy email to Navy Times amid leak investigation raises legal, ethical questions

Not using one could be a violation of existing privacy laws, including the Electronic Communications Privacy Act. Defense attorneys involved in the SEALs’ war crimes cases have said that 13 lawyers and paralegals on their team also received emails with a similar tracking device, according to court documents filed by the defense attorneys.

Microsoft, Amazon are the last bidders standing for the $10 billion DoD JEDI cloud contract

Microsoft, Amazon are the last bidders standing for the $10 billion DoD JEDI cloud contract

U.S. Department of Defense officials have decided this week that the only two cloud vendors able to meet their requirements for a huge, winner-take-all project are Amazon and Microsoft. Google dropped out of the JEDI bidding last year, acknowledging it couldn't meet the requirements (and citing its AI principles, as well).

Prosecutors Dropping Child Porn Charges After Software Tools Are Questioned

Prosecutors Dropping Child Porn Charges After Software Tools Are Questioned

Drawing upon thousands of pages of court filings as well as interviews with lawyers and experts, ProPublica found more than a dozen cases since 2011 that were dismissed either because of challenges to the software’s findings, or the refusal by the government or the maker to share the computer programs with defense attorneys, or both.

The US Military Is Creating the Future of Employee Monitoring

The US Military Is Creating the Future of Employee Monitoring

It’s not looking at any other cyber data that’s available” — perhaps 20 percent of the available digital information on a person, Nehmer said at a November briefing put on by company, C3, a California-based technology company serving as a partner on the pilot.

Pentagon Says All of Google’s Work on Drones Is Exempt From the Freedom of Information Act

Pentagon Says All of Google’s Work on Drones Is Exempt From the Freedom of Information Act

According to a Pentagon memo signed last year, however, no one at Google needed worry: All 5,000 pages of documents about Google’s work on the drone effort, known as Project Maven, are barred from public disclosure, because they constitute “critical infrastructure security information.”.

Reprising ‘Trust Sucks’. With Nick Espinosa

Reprising ‘Trust Sucks’. With Nick Espinosa

With Nick Espinosa Speaker: Nicole Stephensen Nick Espinosa, Chief Security Fanatic and host of the nationally syndicated radio show “The Deep Dive” (USA), shares an insightful view about Trust – in particular, the erosion of cognitive trust in our reliance on digital technologies and how governments, industry and others can address this.

Google Maps could point users down the wrong path

Google Maps could point users down the wrong path

Should a person call one of these institutions by accessing it through Google Maps, the inquiry will be answered by a fraudster who will then press the caller to divulge their bank details or credit card information before subsequently attempting to take as much money as possible.

Echoing Defense Industry Donors, Democrats Call for a Surveillance Wall

Echoing Defense Industry Donors, Democrats Call for a Surveillance Wall

These companies, which include Lockheed Martin, Northrop Grumman and General Dynamics, have been lobbying Congress on border technology appropriations for years, and they currently hold the largest border surveillance contracts with the Department of Homeland Security and U.S. Customs and Border Patrol.

Forget Face ID: Smartphones Will Monitor How Workers Walk, Type And "Spend Their Free Time"

Forget Face ID: Smartphones Will Monitor How Workers Walk, Type And "Spend Their Free Time"

Forget Face ID: a collaboration between the Defense Department and a NY-based company called TWOSENSE.AI, has birthed an artificial intelligence algorithm that could be embedded in smartphones and will be able to identify the device owner by the way they talk, type, walk and even by how "they spend their free time".

Japan lends its vision to 'Five Eyes' intelligence alliance

Japan lends its vision to 'Five Eyes' intelligence alliance

Aircraft from the U.S., Australia, Canada and New Zealand have been tasked with the bulk of surveillance, although British naval vessels also patrol the South China Sea. Japan has shared pictures of North Korean smuggling with each nation.