EU Data Centers are not safe from US Surveillance
Over the past 12 months I have noticed an increasingly worrying trend which is developing in the global technology arena and it is one which in my mind amounts to nothing less than a deliberate attempt...
View ArticleLooking for the worm in the Apple Watch?
Apple watch has been officially presented. As a sophisticated gadget that is highly desirable. Much more aesthetic than google glasses, Kashmir Hill describes its functionalities and privacy concerns....
View ArticleEuropean Commission tells citizens to stop using Facebook
Yesterday was a very important day for privacy and data protection in Europe. It was the day that Max Schrems was able to present arguments in the Court of Justice of the European Union (CJEU) with...
View ArticleGoogle’s latest assault on Privacy – Project-Fi
Google announced on their blog today that they are launching Project Fi – a new mobile network for owners of Nexus 6 devices. Basically Google have partnered with Sprint and T-Mobile to become a...
View ArticleIs Twitter misleading its users on Data Protection?
Recently I wrote an article about Amazon and other companies opening European Datacentres in an attempt to mitigate concerns over mass surveillance by the NSA and other intelligence agencies. The...
View ArticleQuis custodiet ipsos custodes?
The GCHQ will now be immune from prosecution from engaging in illegal hacking operations. This state of affairs is now made by possible as a result of amendments made to the Computer Misuse Act 1990....
View ArticleAn open letter to all members of the House of Commons
Our democracy hinges on trust. We rely on our Parliamentarians to ensure that all citizens can undertake their daily activities with the knowledge that they are safe and secure,without unauthorised...
View ArticleHacking Team Hacked
If you enjoy irony, this is one of your better days: Hacking Team, purveyors of spyware (DaVinci) beloved by repressive regimes around the world, has been hacked. And its dirty laundry is being hung...
View ArticleNSA is missing a trick, here …
Lonely Chinese are chatting with a smartphone program. “Since Xiaoice collects vast amounts of intimate details on individuals, the program inevitably raises questions about users’ privacy.” Siri,...
View ArticleThe agony of indecision – Windows 10
It’s just sitting there. Mostly it’s being quiet – but every now and again it pops up: ‘Here I am. What are you going to do about me.’ Well I don’t know. Do I install Windows 10 and obey the business...
View ArticleECJ Says Safe Harbor Is Not So Safe
‘A milestone’ or a ‘historical’ decision cry the media around the world. It is like a deluge of comments and articles. The Open Rights Group speaks of a ‘Landmark victory for Privacy rights’. Like a...
View ArticleiPhone and the FBI backdoor
Much is being written about the FBI’s court order instructing Apple to provide a backdoor into a terrorist’s iPhone. And much praise is being heaped upon Apple for its disinclination to do so. This...
View ArticleWhat reporters should know about infosec – press releases
Thank you, Kevin. As well as addressing the issue of reporter versus commentator (which we should probably deal with at another time), your piece could be nicely condensed into another principle: Don’t...
View ArticleWhat reporters should know about infosec – “hacker” reliability
Came across another report today from a journalist who had “received” stolen information from a group of “hackers.” (I shall delay, for now, discussion of what the term “hacker” really means.) Yet...
View ArticleLiars and Reliarbility
It is becoming my wont. Rob Slade is providing an excellent series on the weaknesses of modern infosec journalists. I must riposte. The subject is lies and reliability. You see, the problem with ‘liar,...
View ArticleSecondary legislation and the role of the House of Lords
Secondary legislation is an abomination. It allows the government – usually just the relevant Secretary of State – to alter, amend and expand an existing law without any reference to Parliament. It is...
View ArticleFree and open internet
I think I’ve slipped into a parallel universe where contradictions prove themselves. How else do you understand the NCSC, part of GCHQ, one of the Five Eyes, making this tweet: This was the very day...
View ArticleNHS Trusts and the threat from ransomware
Healthcare has become a major target for extortionists for two primary reasons: firstly, patients rather than profits are the priority with less being spent on IT and security than by outright...
View ArticleLiving the Nightmare
This is the stuff of nightmares. It is a nightmare set in a shadowy world of total government surveillance, where government can spy on anyone pretty much unhindered (IP Bill), and where citizens’...
View ArticlePompeo: Trump’s new head of the CIA
I published this article about Michael Richard Pompeo on an earlier blog on 8 March 2014. This is the man that Donald Trump has chosen to head up the CIA. On Monday this week Christopher Soghoian will...
View Article