Cases
2024
Mintpress News
How Israeli Spies Control Your VPN
2024
Fascinating
Frank Lucas' Opsec Fail
Frank Lucas, the drug lord who ruled Harlem in the 1970s, was so discreet that the police didn't know who he was in 1971 when he decided to wear a $100,000 full-length chinchilla coat — to a Muhammad Ali boxing match.
https://x.com/fasc1nate/status/1780671693448737030
2024
Rest Of World
The Changing Face Of Protest
2024
Tales From The Crypt
Major U.S. Carriers Fined $196 Million by FCC for Selling Customer Location Data
2023
WIRED
Germany Raises Red Flags About Palantir’s Big Data Dragnet
2024
The Guardian
Australian man says border force made him hand over phone passcode
2024
Forbes
New Police Tech Can Detect Phones, Pet Trackers And Library Books In A Moving Car
2024
Threema
Delete WhatsApp Day
Like Facebook and Instagram, WhatsApp requires users to disclose personally identifiable information, such as their phone number. For this reason, Meta is able to identify users across different services and combine their data from various platforms into comprehensive user profiles.
https://x.com/ThreemaApp/status/1790674229727265037
2024
What Bitcoin Did
The Bitcoin Scammer Uncensored
2024
Ars Technica
Connected cars’ illegal data collection and use now on FTC’s “radar”
2024
The Guardian
Katie Britt proposes federal database to collect data on pregnant people
2023
State Scoop
Why federal LGBTQI+ data collection should concern state, local officials
2024
F-Secure
LGBTQ+ People Deserve Privacy
2024
Opsec Failures
Opsec Failures
2020
EFF
Atlas Of Surveillance
2024
Homeland Security Today
Researcher Finds PcTattletale Stalkerware on U.S. Hotels, Corporate, and Law Firm Computers
2024
Homeland Security Today
Researcher Finds PcTattletale Stalkerware on U.S. Hotels, Corporate, and Law Firm Computers
2024
The Register
Stalkerware Usage Surging, Despite Data Privacy Concerns
2024
Tech Crunch
Hacked, Leaked, Exposed: Why You Should Never Use Stalkerware Apps
2023
New York Times
In A Post-Roe World, The Future Of Digital Privacy Looks Even Grimmer
2024
Euro News
Female Health Apps Aren't Doing Enough To Protect Sensitive Data, Study Says
A team of researchers in the UK found “problematic practices, including inconsistencies” regarding data privacy in several female health apps. They presented the research at the Conference on Human Factors in Computing Systems in Honolulu, Hawaii in the US this month. The researchers analysed 20 popular female health apps available on the US and UK Google Play Stores providing a service related to female reproductive health. They looked at the applications’ data privacy policies and practices.
Read the article: https://www.euronews.com/next/2024/05/31/female-health-apps-arent-doing-enough-to-protect-sensitive-data-study-says
2024
Joseph Cox
Dark Wire
2024
EFF
Section 702
We all deserve privacy in our communications, and part of that is trusting that the government will only access them within the limits of the law. But it's now clear that the government hasn’t respected any limits on the intelligence community or law enforcement. When it comes to Section 702, a law that continues to allow spying on Americans, they've ignored our rights. Text:
https://act.eff.org/action/tell-congress-absent-major-changes-702-should-not-be-renewed
2024
Haaretz
Israel Tried to Keep Sensitive Spy Tech Under Wraps. It Leaked Abroad
Documents reveal that Intellexa, which is run by Israelis but operates outside of Israel's exports regime, presented an ad-based spyware – considered the cutting edge of Israeli offensive cyber. [...] The documents include a demonstration of the Aladdin system, technical explanations on how it infects target devices, and even examples of potential malicious ads – seemingly targeting graphic designers and activists with job offers, through which the spyware will be introduced to their device. Text:
https://archive.ph/IGrTw#selection-1255.347-1255.643
2023
Forbes
Nebraska Mom Sentenced to Two Years in Prison over Abortion Pills
A Nebraska mother who helped her teenage daughter obtain abortion pills to end her pregnancy and later disposed of the fetus’ remains was sentenced to two years in prison on Friday, according to multiple reports, after breaking a state law that banned abortion after 20 weeks of pregnancy. Police said that while executing a search warrant they discovered evidence of internet searches related to medications “which could be used for the purpose of causing a miscarriage,” or abortion pills. Officers also said they found messages discussing the use of that medication after obtaining Facebook messages from Meta. Text:
https://www.forbes.com/sites/anafaguy/2023/09/22/nebraska-mom-who-gave-teen-daughter-abortion-pills-sentenced-to-two-years-in-prison/?sh=1518bdf7b1db
2023
Middle East Eye
School Girl Sentenced to 18 Years in Prison over Tweets
Saudi Arabia has sentenced a secondary schoolgirl to 18 years in jail and a travel ban for posting tweets in support of political prisoners, according to a rights group. Saudi human rights defenders and lawyers, however, disputed Mohammed bin Salman's allegations and said the crackdown on social media users is correlated with his ascent to power and the introduction of new judicial bodies that have since overseen a crackdown on his critics. "He is able, with one word or the stroke of a pen, in seconds, to change the laws if he wants," Taha al-Hajji, a Saudi lawyer and legal consultant with the European Saudi Organisation for Human Rights, told Middle East Eye this week. Text:
https://www.middleeasteye.net/news/saudi-arabia-sentences-schoolgirl-18-years-tweets
2023
Citizen Lab
Egyptian Presidential Candidate Targeted with Predator Spyware
In August and September 2023, Eltantawy’s Vodafone Egypt mobile connection was persistently selected for targeting via network injection; when Eltantawy visited certain websites not using HTTPS, a device installed at the border of Vodafone Egypt’s network automatically redirected him to a malicious website to infect his phone with Cytrox’s Predator spyware. Given that Egypt is a known customer of Cytrox’s Predator spyware, and the spyware was delivered via network injection from a device located physically inside Egypt, we attribute the network injection attack to the Egyptian government with high confidence. Text:
https://citizenlab.ca/2023/09/predator-in-the-wires-ahmed-eltantawy-targeted-with-predator-spyware-after-announcing-presidential-ambitions/
2023
Danielle Citron
The Fight for Privacy
2023
Tech Crunch
Telegram Leaks User IP Addresses To Contacts
The popular messaging app Telegram can leak your IP address if you simply add a hacker to your contacts and accept a phone call from them. TechCrunch verified the researcher’s findings by adding Simonov to the contacts of a newly created Telegram account. Simonov then called the account, and shortly after provided TechCrunch with the IP address of the computer where the experiment was being carried out. Telegram boasts 700 million users all over the world, and has always marketed itself as a “secure” and “private” messaging app, even though experts have repeatedly warned that Telegram is not secure. Text:
https://techcrunch.com/2023/10/19/telegram-is-still-leaking-user-ip-addresses-to-contacts
2021
Hacker Noon
Seven Reasons to Question Telegram's Privacy Claims
2019
Yasha Levine
Surveillance Valley
In Surveillance Valley: The Secret Military History of the Internet, Yasha Levine traces the history of the internet back to its beginnings as a Vietnam-era tool for spying on guerrilla fighters and antiwar protesters–a military computer networking project that ultimately envisioned the creation of a global system of surveillance and prediction. Levine shows how the same military objectives that drove the development of early internet technology are still at the heart of Silicon Valley today. Spies, counterinsurgency campaigns, hippie entrepreneurs, privacy apps funded by the CIA. From the 1960s to the 2010s — this revelatory and sweeping story will make you reconsider what you know about the most powerful, ubiquitous tool ever created.Text:
http://surveillancevalley.com/
2018
WIRED
Encrypted Messaging Isn't Magic
As the adage goes, there's no such thing as perfect security. And feeling invincible could get you in trouble. End-to-end encryption transforms messages into unintelligible chunks of data as soon as a user presses send. From there, the message isn't reconstituted into something understandable until it reaches the receiver's device. Along the way, the message is unreadable, protected from prying eyes. It essentially amounts to a bodyguard who picks you up at your house, rides around with you in your car, and walks you to the door of wherever you're going. You're safe during the transport, but your vigilance shouldn't end there. [...] It's easy to forget in practice that people you message with could show the chat to someone else, take screenshots, or retain the conversation on their device indefinitely. You also need to keep track of how many devices you've stored your encrypted messages on. If you sync chats between, say, your smartphone and your laptop, or back them up in the cloud, there are potentially more opportunities for the data to be exposed. Your chats may be encrypted, but your backups may not. Text:
https://joindeleteme.com/blog/opt-out-guides/
2018
Meta
Facebook Connect
Facebook Connect, also called Log in with Facebook, is a set of authentication APIs from Facebook that developers can use to help their users connect and share with such users' Facebook friends (on and off Facebook) and increase engagement for their website or application. When so used, Facebook members can log on to third-party websites, applications, mobile devices and gaming systems with their Facebook identity and, while logged in, can connect with friends via these media and post information and updates to their Facebook profile. But sometimes, especially on lesser known websites, using Facebook's universal login feature may carry security risks, according to research from Princeton University. The tracking scripts documented by Steven Englehardt, Gunes Acar, and Arvind Narayanan represent a small slice of the invisible tracking ecosystem that follows users around the web largely without their knowledge. Facebook says the ability to scrape data through Facebook Connect has been patched. Text:
https://www.wired.com/story/security-risks-of-logging-in-with-facebook/
1982
James Bamford
The Puzzle Palace
The Video Privacy Protection Act of 1988 (codified at 18 U.S.C. § 2710 (2002)) was passed in reaction to the disclosure of Supreme Court nominee Robert Bork's video rental records in a newspaper. The Act is not often invoked, but stands as one of the strongest protections of consumer privacy against a specific form of data collection. Generally, it prevents disclosure of personally identifiable rental records of "prerecorded video cassette tapes or similar audio visual material." The act was envoked in 2008 in a class action law suit against Blockbuster Inc. over participation in Facebook's discontinued Beacon Program , which formed part of Facebook's advertisement system that sent data from external websites to Facebook for the purpose of allowing targeted advertisements and allowing users to share their activities with their friends. Beacon reported to Facebook on Facebook's members' activities on third-party sites that also participated with Beacon even when users were not connected to Facebook, and happened without the knowledge of the Facebook user. A similar lawsuit was brought against Netflix in 2009, when it disclosed insufficiently anonymous information about nearly half-a-million customers as part of its $1 million contest to improve its recommendation system leading to the alleged outing of a lesbian mother. Text:
https://archive.epic.org/privacy/vppa/