government surveillance

Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths
Tom Eston | | border crossing, Canadian Perspective, Cyber Security, cyber threat, Cybersecurity, Data Privacy, digital id, Digital Privacy, Enhanced Driver's License, Episodes, Federal Government, Flying, Google Wallet, government surveillance, Identity Surveillance, Information Security, Infosec, Interstate Travel, law enforcement, National ID Cards, passport, Personal Stories, Podcast, Podcasts, Political Discussion, Post 9/11, Privacy, REAL ID, Right To Travel, security, Security Concerns, technology, tsa, US Travel, Voter ID, Weekly Edition
Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and ...

US Border Searches and Protesting in the Surveillance Age
Tom Eston | | Civil Liberties, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Device Confiscation, Digital Privacy, Electronic Device Search, Episodes, government surveillance, Information Security, Infosec, Meshtastic, Podcast, Podcasts, Privacy, Protest, Protest Communication, Protest Safety, Protesting in the Surveillance Age, secure communication, security, Smartphone Security, surveillance, Surveillance Self Defense, technology, Travel Tips, Travel Warning, US Border Searches, Weekly Edition
Planning to travel to the United States? This episode covers recent travel advisories regarding US border agents searching electronic devices, regardless of your citizenship status. Learn essential tips on smartphone security and ...

Cybersecurity Insights with Contrast CISO David Lindner | 01/31/25
David Lindner, Director, Application Security | | AI censorship, Cloud Security, Crisis simulations, cyberattacks, data protection, DeepSeek AI, government surveillance, Incident Response, national security, Security Controls
Insight No. 1: You should be staging cyberattacks Cyberattacks are becoming more frequent and sophisticated, posing a significant threat to businesses of all sizes.Crisis simulations — one of which is now included ...

FBI’s Warrantless Spying on US Must Continue, Says FBI
Richi Jennings | | 4th Amendment, Democracy, FBI, FBI Director Christopher Wray, Federal Government, FISA, Fourth Amendment, government, government access, government surveillance, Government Surveillance Reform Act (GSRA), lawful surveillance, mass surveillance, nsa, police surveillance, Privacy, SB Blogwatch, Section 702, surveillance, US Constitution, US FBI, warrantless search
Privacy, schmivacy: FBI head Christopher Wray (pictured) doesn’t see what all the fuss is about. Just renew FISA section 702 already! ...
Security Boulevard

Apple Warns of Further Compromises by Israel’s NSO Group
The NSO Group, known for their suite of exploitation tools, has once again found itself at the center of unwanted attention when Apple revealed that it had warned a number of individuals, ...
Security Boulevard

Bad Apples: How CNA Attacks Put Everyone At Risk
On September 14, 2021, two unrelated incidents demonstrated not only the vulnerability of users to state-sponsored attacks but the fact that defenders are relegated to playing “cat and mouse” with attackers (including ...
Security Boulevard

Secret Govt. Spy Powers Coming Here—via Australia
Richi Jennings | | Australia, five eyes, government surveillance, If you've got nothing to hide you've got nothing to fear, Privacy, SB Blogwatch
The Australian government has given itself an enormous surveillance tool. Five Eyes means that rules in Oz can be used here, too ...
Security Boulevard

AI Surveillance in a Post-Pandemic World
Andrew Zola | | Artificial Intelligence, Contact Tracing, COVID-19, government surveillance, law enforcement
Artificial intelligence (AI) has made waves across industries including automotive, health care, entertainment, finance, manufacturing, and more, while still a nascent technology. Another area where it made a significant impact is law ...
Security Boulevard

FBI Wants to Invest in Social Media Surveillance Tool
Terrorist organizations know their way around the web, and they don’t shy away from using social networks to communicate with each other or to recruit new members. The FBI is looking into ...

Cyberattack Compromises US Customs and Border Protection Photo Database
Photos of people crossing the US border, taken over a month and a half, including images of their faces and vehicle numbers, were compromised in a malware attack on a subcontractor working ...