Country X: The Country That Shall Not Be Named

On Monday, 19 May 2014, Glenn Greenwald published his report entitled Data Pirates of the Caribbean: The NSA is recording every cell call in the Bahamas, in which he reported about the NSA SOMALGET program, which is part of the larger MYSTIC program. MYSTIC has been used to intercept the communications of several countries, namely… Continue reading Country X: The Country That Shall Not Be Named

Persecution of whistleblowers and journalists

I was also honoured to be able to attend the Sam Adams Associates’ award ceremony in Oxford, United Kingdom last month, and Chelsea Manning is a truly worthy recipient of the Sam Adams Award for Integrity in Intelligence. Her leaking of the Collateral Murder video to WikiLeaks (a video showing how U.S. Air Force personnel… Continue reading Persecution of whistleblowers and journalists

Gave Privacy By Design Talk At eth0

I gave my talk about privacy by design last Saturday at eth0 2014 winter edition, a small hacker get-together which was organised in Lievelde, The Netherlands this year. eth0 organizes conferences that aim at bringing people with different computer-related interests together. They organise two events per year, one during winter. I’ve previously given a very… Continue reading Gave Privacy By Design Talk At eth0

Privacy in danger, but there’s light at end of the tunnel

Note: This article is also available in Portuguese, translated by Anders Bateva. Last week I read an article about the plan by the National Police of the Netherlands to connect all CCTV cameras to the national camera network which is operated by the police. The upper echelon of the Dutch police is currently secretly writing… Continue reading Privacy in danger, but there’s light at end of the tunnel

The Rising Trend of Criminalizing Hackers & Tinkerers

Note: This article is also available in Portuguese, translated by Anders Bateva. There seems to be a rising trend of criminalizing hackers & tinkerers. More and more, people who explore the limits of the equipment, hardware and software they own and use, whether they tinker with it, re-purpose it, or expand its functionalities, are met… Continue reading The Rising Trend of Criminalizing Hackers & Tinkerers