Feb 192015

Via:  http://www.bbc.com/news/uk-31070114


Social media in now part of psychological operations with a rebranding of unconventional means.

Sep 252014

Via:  http://www.itnews.com.au/News/396179,senate-rejects-attempt-to-limit-asios-access-to-devices.aspx



New laws in Australia would allow for access to any number of devices on a network.

The warrant is self signed.

Dec 282013

The 2014 National Defense Authorization Act (NDAA) still has its indefinite detention option 🙂



Two other interesting court cases:


and now http://www.usatoday.com/story/news/nation/2013/12/27/new-york-nsa-phone-surveillance/4219055/

Welcome to the world of third party collection 🙂

Dec 092013

Via:  http://www.theage.com.au/technology/technology-news/telstras-data-vacuum-20131205-2yucb.html


How Australia’s telephone and Web 2.0 use is tracked:  In bulk and filtered later.

Welcome to the world of the special projects group.

Aug 072013

Via:  http://www.businessinsider.com.au/tsa-vipr-teams-security-searches-2013-8


Welcome to the world of “special needs” or “administrative searches” – at train stations or events near you.


May 292013

Via:  www.wired.com/dangerroom/2013/05/pentagon-cyberwar-angry-birds/


The US is trading the need for skilled hackers for new offensive cyber war technology.

Will offensive cyber war infrastructure really allow a on click victory?

Will 3rd parties really  leave their consumer OS that exposed?

May 182013

Via:  freedom-to-tinker.com/blog/felten/calea-ii-risks-of-wiretap-modifications-to-endpoints/


Will US secure communication devices come with a new generation of backdoors?

Where US device makers go, the world usually follows.