Back doors, mobile phones, persuasion: the NSA does it all

The headlines about the NSA just keep on coming… N.S.A. Foils Much Internet Encryption | NY Times The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed […]

How journalists can protect their data and sources

1. Use threat modelling to understand your assets and risks The concept of threat modelling is a useful one. It’s about understanding what assets you have that need protecting, and what risk there is of them coming under attack. The Committee to Protect Journalist’s Journalist Security Guide is a highly useful resource. It recommends you start by understanding your assets […]

Diagram of NZ security & intelligence services oversight

While doing some catch-up reading on submissions to the Intelligence and Security Committee on the powers of the GCSB (Government Communications Security Bureau), I came across this chart on the Department of the Prime Minister and Cabinet website.   It depicts lines of accountability and which roles/committees are operational, decision makers, and monitors.