By samzenpus from Slashdot's taking-a-good-look department
An anonymous reader points out this Vice story with new information about the NSA's search of Edward Snowden's emails. Last year, the National Security Agency (NSA) reviewed all of Edward Snowden's available emails in addition to interviewing NSA employees and contractors in order to determine if he had ever raised concerns internally about the agency's vast surveillance programs. According to court documents the government filed in federal court September 12, NSA officials were unable to find any evidence Snowden ever had.
In a sworn declaration, David Sherman, the NSA's associate director for policy and records, said the agency launched a "comprehensive" investigation after journalists began to write about top-secret NSA spy programs upon obtaining documents Snowden leaked to them. The investigation included searches of any records where emails Snowden sent raising concerns about NSA programs "would be expected to be found within the agency." Sherman, who has worked for the NSA since 1985, is a "original classification authority," which means he can classify documents as "top-secret" and process, review, and redact records the agency releases in response to Freedom of Information Act (FOIA) requests.
In his declaration, Sherman detailed steps he said agency officials took to track down any emails Snowden wrote that contained evidence he'd raised concerns inside the agency. Sherman said the NSA searched sent, received, deleted emails from Snowden's account and emails "obtained by restoring back-up tapes." He noted that NSA officials reviewed written reports and notes from interviews with "NSA affiliates" with whom the agency spoke during its investigation.Read Replies (0)
By samzenpus from Slashdot's watch-and-learn department
writes "Oculus Rift isn't just for gaming. Brendan Iribe, CEO of the VR company, says the immersive tech will be "one of the most transformative platforms for education of all time." In an interview with Chronicle of Higher Education, he imagined laser-scanning every object in the Smithsonian for students to explore, and collaborating in shared virtual spaces rather than campuses. "The next step past that is when you have shared space, and not only do you believe that this object is right there in front of me, but I look around and I see other people just like we see each other now, and I really, truly believe that you’re right in front of me. We can look at each others’ eyes. If you look down at something, I can look down at the same time. And it’s every bit as good as this. And if we can make virtual reality every bit as good as real reality in terms of communications and the sense of shared presence with others, you can now educate people in virtual classrooms, you can now educate people with virtual objects, and we can all be in a classroom together [virtually], we can all be present, we can have relationships and communication that are just as good as the real classroom," he says.Read Replies (0)
By samzenpus from Slashdot's lets-see-what-you're-doing department
writes with the latest accusations about NSA spying activity in Germany.
According to top-secret documents from the NSA and the British agency GCHQ, the intelligence agencies are seeking to map the entire Internet
Furthermore, every single end device that is connected to the Internet somewhere in the world — every smartphone, tablet and computer — is to be made visible. Such a map doesn't just reveal one treasure. There are millions of them. The breathtaking mission is described in a Treasure Map presentation from the documents of the former intelligence service employee Edward Snowden which SPIEGEL has seen. It instructs analysts to "map the entire Internet — Any device, anywhere, all the time." Treasure Map allows for the creation of an "interactive map of the global Internet" in "near real-time," the document notes. Employees of the so-called "FiveEyes" intelligence agencies from Great Britain, Canada, Australia and New Zealand, which cooperate closely with the American agency NSA, can install and use the program on their own computers. One can imagine it as a kind of Google Earth for global data traffic, a bird's eye view of the planet's digital arteries.Read Replies (0)
By samzenpus from Slashdot's looking-too-far department
An anonymous reader writes In a 2-1 decision, the 9th Circuit Court ruled that Navy investigators regularly run illegally broad online surveillance operations that cross the line of military enforcement and civilian law. The findings overturned the conviction of Michael Dreyer for distributing child pornography. The illegal material was found by NCIS agent Steve Logan searching for "any computers located in Washington state sharing known child pornography on the Gnutella file-sharing network." The ruling reads in part: "Agent Logan's search did not meet the required limitation. He surveyed the entire state of Washington for computers sharing child pornography. His initial search was not limited to United States military or government computers, and, as the government acknowledged, Agent Logan had no idea whether the computers searched belonged to someone with any "affiliation with the military at all." Instead, it was his "standard practice to monitor all computers in a geographic area," here, every computer in the state of Washington. The record here demonstrates that Agent Logan and other NCIS agents routinely carry out broad surveillance activities that violate the restrictions on military enforcement of civilian law. Agent Logan testified that it was his standard practice to "monitor any computer IP address within a specific geographic location," not just those "specific to US military only, or US government computers." He did not try to isolate military service members within a geographic area. He appeared to believe that these overly broad investigations were permissible, because he was a "U.S. federal agent" and so could investigate violations of either the Uniform Code of Military Justice or federal law."Read Replies (0)
By Soulskill from Slashdot's no-behavioral-incentive-strong-enough department
An anonymous reader writes: While legislators and police try to tackle the epidemic of distracted driving through education, regulation, and enforcement, Scott Tibbitts is trying to solve it through engineering. He developed a small device which, when plugged into a vehicle, would determine which phone belonged to the driver and shut off its texting and voice call capabilities. "The telematics box sends a wireless message that the car is moving. The phone sends its own message about its location. Both sets of information — from the car and phone — are sent to Katasi's servers. Then, an algorithm weighs the incoming data with other information, like the location of the phones belonging to all the people who drive the car and the starting point of the trip; if the trip starts at Junior's high school, and mom and dad's phones are at work, the driver has been identified — Junior is driving."
The problem is that Tibbitts can't get anyone interested in setting up a system to make these devices ubiquitous. Consumers can't be sold on such a product: all evidence suggests people are increasingly unwilling to be cut off from constant communication. So, he tried working with carriers. Sprint partnered with Tibbitts long enough to test the device, but they were afraid of the legal risks involved. Now, Tibbitts is nursing the technology along, looking for a way to get it into cars and make people safer.Read Replies (0)