As the news broke on March 7, 2016, that U.S. drone strikes had killed 150 people in Somalia, the White House announced it will reveal, for the first time, the number of people killed by drones and manned airstrikes "outside areas of active hostilities" since 2009. This is a critical first step toward much-needed transparency. But it will not go far enough.
Silicon Valley celebrated last fall when the White House revealed it would not seek legislation forcing technology makers
So despite the fact that some of the Republican debaters were up in arms about it, the USA Freedom Act actually has produced only very marginal gains for privacy. The current state of affairs is mostly depressing, especially in light of the floodlight on these issues gifted to us by Snowden.
In an age of too many laws, too many prisons, too many government spies, and too many corporations eager to make a fast buck at the expense of the American taxpayer, there is no safe place and no watertight alibi.
Clinton critics are asking whether relevant data may have been deleted from a private email server. Understanding such accusations requires some background in computer forensics and the ways that files are stored, accessed, deleted, and recovered.
There was a time when the internet highway wasn't clogged the way it is now. These days everyone has a website; even the family dog has a social media account to showcase his latest, greatest, doggy accomplishment.
Following months of rumors, it's been revealed that Privacy and National Security were secretly married weeks ago in Las Vegas, Nevada. "We're tired of all the naysayers constantly describing us as incompatible. We'll show you. We'll show you all! Ha!" the couple wrote.
Congress has four days left in its current session to decide whether to reauthorize Section 215, amend it or let it die a natural death on June 1, 2015 (the date on which it will sunset if not reauthorized).
Data is the fundamental basis for our lives today. Future generations will able to look back at all our data -- via sources like Twitter, Facebook -- and paint an accurate picture us. And yet, the vast majority of us simply don't understand how data works.
Using purchase metadata with no credit card numbers, names or any other simple identifiers, the report's co-authors found they could track a specific person's purchases using three factors: a receipt, an Instagram and a Tweet about a new purchase or a Facebook post.