Remove Accountability Remove Article Remove Surveillance
article thumbnail

Palantir's Surveillance Service for Law Enforcement

Schneier on Security

This can give a complete account of where someone has driven over any time period. All of this information is aggregated and synthesized in a way that gives law enforcement nearly omniscient knowledge over any suspect they decide to surveil. Read the whole article -- it has a lot of details. Boing Boing [link].

article thumbnail

On the Zero-Day Market

Schneier on Security

New paper: “ Zero Progress on Zero Days: How the Last Ten Years Created the Modern Spyware Market “: Abstract: Spyware makes surveillance simple. Second, this Article applies lessons from these failures to guide regulatory efforts going forward.

Marketing 330
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook Helped Develop a Tails Exploit

Schneier on Security

This is a weird story : Hernandez was able to evade capture for so long because he used Tails, a version of Linux designed for users at high risk of surveillance and which routes all inbound and outbound connections through the open-source Tor network to anonymize it. Another article. address of a person viewing a clip.

article thumbnail

Facebook and Cambridge Analytica

Schneier on Security

In the wake of the Cambridge Analytica scandal, news articles and commentators have focused on what Facebook knows about us. But for every article about Facebook's creepy stalker behavior, thousands of other companies are breathing a collective sigh of relief that it's Facebook and not them in the spotlight. A lot, it turns out.

article thumbnail

Apple dismisses lawsuit against surveillance firm NSO Group due to risk of threat intelligence exposure

Security Affairs

The IT giant fears that the disclosures of its threat intelligence related to commercial spyware operations could aid NSO and other surveillance firms. ” reads The court filing referenced an article published by The Guardian article reporting that Israeli officials seized files from NSO Group’s headquarters.

article thumbnail

ScarCruft surveilling North Korean defectors and human rights activists

SecureList

The victim was infected by PowerShell malware and we discovered evidence that the actor had already stolen data from the victim and had been surveilling this victim for several months. After a conversation on social media, the actor sent a spear-phishing email to the potential victim using a stolen email account. good articles).

article thumbnail

Cybersecurity Governance: The Road Ahead in an Era of Constant Evolution

SecureWorld News

In this article, we explore: The current state of cybersecurity governance Emerging challenges that threaten effective governance The future of governance models in a hyperconnected world The state of cybersecurity governance today 1. This article appeared originally on LinkedIn here. Where is cybersecurity governance going?