Police officers consistently use less respectful language with black community members than with white community members, the first systematic analysis of body camera footage shows.
The Supreme Court ruling of Brown v. Board of Education to desegregate U.S. public schools sparked protests across the country.
It’s a common assumption that being online means you’ll have to part ways with your personal data and there’s nothing you can do about it.
The high-profile police shooting of teen Laquan McDonald – combined with the city’s efforts to prevent the public from learning about it – prompted the investigation.
A civil rights march in August 28, 1963. Recent widespread attention to shocking instances of alleged police misconduct – the killings of Michael Brown, Eric Garner, Tamir Rice, and now Walter Scott – have rallied voices across the country in defense
In a post-Snowden world, anonymity is what people want online. Smartphone apps offering anonymous messaging are popping up everywhere – Secret, Whisper, and now Yik Yak. The latest additions to privacy-protecting technology, they claim to provide anonymous, location-based confession, expression, and discussion platforms.
An artist tests whether New Yorkers will give away their mother’s maiden name or part of their Social Security number for a homemade cookie.
Municipal struggles over mass surveillance take on increased significance. As it becomes more and more clear that these agencies are wastefully overfunded, as a bipartisan 2012 report on fusion centers found, communities must decide whether to stand up for their civil liberties when elected officials are no longer able to advocate for them.
Recently, documents unveiled by ProPublica, the New York Times and the Guardian showed that the NSA and its British counterpart, GCHQ, are not only capable of accessing your metadata but also capturing information sent by applications on your smartphone.
Since the first disclosures based on documents provided by former NSA contractor Edward Snowden, Obama has offered his own defenses of the programs. But not all of the president's claims have stood up to scrutiny. Here are some of the misleading assertions he has made.
The curious thing about a democratic system is that it contains the seeds of its own demise. Freedom is not something guaranteed by any parchment or promise. It is earned by each generation which must jealously protect it from threats, not only from outside, but from within a nation.
Soon after the very earliest reporting on Ed Snowden's leaked documents about PRISM, the folks from Datacoup put together the very amusing GETPRSM website, which looks very much like the announcement of a new social network, but (the joke is) it's really the NSA scooping up all our data and making the connections. It's pretty funny. Except, of course, when you find out that it's real.
Three-and-a-half months after National Security Agency leaker Edward Snowden came public on the the U.S. government’s massive spying operations at home and abroad, we spend the hour with Alan Rusbridger, editor-in-chief of The Guardian, the British newspaper that first reported on Snowden’s leaked documents.
A new exposé based on the leaks of Edward Snowden has revealed the National Security Agency has developed methods to crack online encryption used to protect emails, banking and medical records. "Encryption is really the system that lets the Internet function as an important commercial instrument all around the world.
Germans like posting baby pictures, party snapshots and witty comments on Facebook just like anyone else. They just do not want to get caught doing it. Many of us use fake names for their profiles 2013 silly puns, movie characters or anagrams and "remixes" of their real names. (Yes, I have one. No I'm not telling you the name.)
The outrage over the NSA's massive, sprawling data collection is different in the white community than in the black community, but why? Chris Hayes discusses with MSNBC contributor James Peterson and David Sirota, a columnist for Salon.com
Dan Rather, anchor and managing editor for "Dan Rather Reports" on AXS-TV, talks with Rachel Maddow about how abuse of power and general bungling by the NSA undermines the credibility of the United States and calls into question how the "war on terror" is being conducted almost 12 years after 9/11.
It seems that every day brings a new revelation about the scope of the NSA’s heretofore secret warrantless mass surveillance programs. And as we learn more, the picture becomes increasingly alarming. The chief judge of the Foreign Intelligence Surveillance Court said the court lacks the tools to independently verify how often the government’s surveillance breaks the court’s rules.
The President seemed unaware of the article that was published by The Guardian just 3 hours prior to the press conference as his handlers allowed the President to appear either untruthful or out of touch. In this article the Guardian disclosed that the NSA had at least a virtual "backdoor" if not an actual into their own systems that allowed them to skirt even the "rubber stamped" FISA Court spirit and restraints.
Lavabit, an encrypted email service believed to have been used by National Security Agency leaker Edward Snowden, has abruptly shut down. The move came amidst a legal fight that appeared to involve U.S. government attempts to win access to customer information.
It will require “coordinated dissent” from individuals, advocacy groups, and, yes, technology companies. Smart people like Ron Wyden (D-Oregon) warn that our inaction opens the door for such surveillance to become an irreversible and regrettable part of our society, but the hard truth is that citizens need to muster incredible will to demand or enact sorely needed privacy protections.
What information does the NSA collect and how? We don't know all of the different types of information the NSA collects, but several secret collection programs have been revealed:
The real problem with the NSA spying program is not that objectionable when used to catch "real" terrorism suspects or prevent actual attacks, a knack these programs have not yet accomplished that warrant the spending and effort put forth so far. Now the real problem is the slippery slope the NSA program provides. And it is slippery as other agencies are following NSA's lead and their own agendas.
Guardian Exclusive: Spy agency has secret backdoor permission to search databases for individual Americans' communications. The National Security Agency has a secret backdoor into its vast databases under a legal authority enabling it to search for US citizens' email and phone calls without a warrant, according to a top-secret document passed to the Guardian.
When the House of Representatives recently considered an amendment that would have dismantled the NSA's bulk phone records collection program, the White House swiftly condemned the measure. But only five years ago, Sen. Barack Obama, D-Ill. was part of a group of legislators that supported substantial changes to NSA surveillance programs. Here are some of the proposals the president co-sponsored as a senator.
The PRISM scandal confirmed our worst fears when it comes to state-level surveillance of the Internet, with the revelation that the NSA has created "backdoors" into major online services such as Google, Facebook, and Yahoo. These backdoors allegedly give intelligence agencies around the world access to user emails, Facebook posts, search queries, web history, and more, with little or no judicial oversight.
When Rochelle Bing bought her modest row home on a tattered block in North Philadelphia 10 years ago, she saw it as an investment in the future for her extended family — especially for her 18 grandchildren. Bing, 42, works full-time as a home health assistant for the elderly and disabled. In summer when school is out, her house is awash with grandkids whom Bing tends to while their parents work. And the home has been a haven in troubled times when her children needed help or a father went to jail. One of Bing's grandchildren lives there now.
CNET has learned the FBI has developed custom "port reader" software to intercept Internet metadata in real time. And, in some cases, it wants to force Internet providers to use the software.
A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden.