Privacy Media ArticlesExcerpts of Key Privacy Media Articles in Major Media
Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
The US National Security Agency spied on civil rights leader Martin Luther King and boxer Muhammad Ali during the height of the Vietnam War protests, declassified documents reveal. The documents show the NSA also tracked journalists from the New York Times and the Washington Post and two senators. Some NSA officials later described the programme as "disreputable if not outright illegal", the documents show. The operation, dubbed "Minaret", was originally exposed in the 1970s. However, the names of those on the phone-tapping "watch list" had been kept secret until now. The secret papers were published after a government panel ruled in favour of researchers at George Washington University. The university's National Security Archive - a research institute that seeks to check government secrecy - described the names on the NSA's watch-list as "eye-popping". The agency eavesdropped on civil rights leaders Martin Luther King and Whitney Young as well as boxing champion Muhammad Ali, New York Times journalist Tom Wicker and Washington Post columnist Art Buchwald. The NSA also monitored the overseas phone calls of two prominent US senators - Democrat Frank Church and Republican Howard Baker. In 1967 the strength of the anti-war campaign led President Lyndon Johnson to ask US intelligence agencies to find out if some protests were being stoked by foreign governments. Many of those targeted were considered to be critics of US involvement in the Vietnam War. The NSA worked with other spy agencies to draw up the "watch lists" of anti-war critics, tapping their phone calls. The programme continued after Richard Nixon entered the White House in 1969.
Note: These names were kept secret until now allegedly for reason of "national security." Note how this term is repeatedly used to cover up illegal government activity solely to protect those who commit these crimes. For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
One of the most overlooked aspects of the NSA reporting in the US has been just how global of a story this has become. Last week it was revealed that Belgium's largest telecom, Belgacom, was the victim of a massive hacking attack which systematically compromised its system for as long as two years. Last week, using documents obtained from NSA whistleblower Edward Snowden, Laura Poitras and other Der Spiegel journalists reported in that paper that it was the GCHQ, Britain's intelligence agency, that was behind the attack. According to that report, the attack was carried out by targeting individual engineers at the telecom with malware that allowed GCHQ agents to "own" their computer and thus exploit their access to the telecommunications system. As the US and UK run around the world protesting the hacking activities of others and warning of the dangers of cyber-attacks, that duo is one of the most aggressive and malicious, if not the most aggressive and malicious, perpetrators of those attacks of anyone on the planet. Nobody hacks as prolifically and aggressively as the two countries who most vocally warn of the dangers of hacking. A coalition called Stop Watching Us has been formed by privacy and civil liberties groups from across the political spectrum. On October 26, the 12th anniversary of the enactment of the Patriot Act, they will hold an anti-surveillance rally in Washington DC.
Note: For more on the hidden realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents. The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show. Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor. Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth. The agency ... deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products [called "backdoors"].
US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden. The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments. The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – "the use of ubiquitous encryption across the internet". Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with "brute force", and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves. Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software. "Backdoors are fundamentally in conflict with good security," said Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union. "Backdoors expose all users of a backdoored system, not just intelligence agency targets, to heightened risk of data compromise."
The New York Police Department has secretly labeled entire mosques as terrorism organizations, a designation that allows police to use informants to record sermons and spy on imams, often without specific evidence of criminal wrongdoing. Designating an entire mosque as a terrorism enterprise means that anyone who attends prayer services there is a potential subject of an investigation and fair game for surveillance. Since the 9/11 attacks, the NYPD has opened at least a dozen "terrorism enterprise investigations" into mosques, according to interviews and confidential police documents. Many TEIs stretch for years, allowing surveillance to continue even though the NYPD has never criminally charged a mosque or Islamic organization with operating as a terrorism enterprise. The documents show in detail how, in its hunt for terrorists, the NYPD investigated countless innocent New York Muslims and put information about them in secret police files. As a tactic, opening an enterprise investigation on a mosque is so potentially invasive that while the NYPD conducted at least a dozen, the FBI never did one, according to interviews with federal law enforcement officials. The revelations about the NYPD's massive spying operations are in documents recently obtained by The Associated Press and part of a new book, Enemies Within: Inside the NYPD's Secret Spying Unit... The book ... is based on hundreds of previously unpublished police files and interviews with current and former NYPD, CIA and FBI officials.
Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.
There was a time when the U.S. National Security Agency was so secretive that government officials dared not speak its name in public. NSA, the joke went, stood for "No Such Agency." That same agency this month held an on-the-record conference call with reporters, issued a lengthy press release to rebut a newspaper story, and posted documents on a newly launched open website - icontherecord.tumblr.com (which stands for intelligence community on the record). The steps were taken under pressure as President Barack Obama's administration tries to calm a public storm over disclosures by former NSA contractor Edward Snowden. The NSA's moves out of the shadows were meant to show that it operates lawfully..., but not everyone is convinced that it is a fundamental shift toward more openness at the intelligence agencies. Jameel Jaffer, deputy legal director at the American Civil Liberties Union, said the [disclosures] should not be viewed as a huge shift toward transparency by the administration. "In fact, on the same day the president promised more transparency on surveillance issues, the CIA filed a brief in one of our 'targeted killing' cases arguing that it could not release legal memos about the drone program, could not release civilian casualty numbers, and for that matter could not even acknowledge that the agency had played any role in targeted killings," Jaffer said.
Note: For more on the realities of intelligence operations, see the deeply revealing reports from reliable major media sources available here.
The Guardian has agreed with the New York Times to give the U.S. newspaper access to some classified documents leaked by former National Security Agency contractor Edward Snowden, both papers said on [August 23]. In a brief story posted on its website, the Guardian said it "struck a partnership" with the Times after the British government threatened the Guardian with legal action unless it either surrendered or destroyed files it received from Snowden about Government Communications Headquarters - Britain's equivalent of NSA. The Times' executive editor, Jill Abramson, confirmed the collaboration. A source familiar with the matter said the partnership deal had been struck several weeks ago and that Abramson was personally involved in negotiating it. The Guardian said in its story that its partnership with the Times would enable it to "continue exposing mass surveillance by putting the Snowden documents on GCHQ beyond government reach." The Times and the Guardian previously collaborated on stories related to alleged phone hacking by British tabloid newspapers and on coverage of secret U.S. military and diplomatic documents made available by U.S. Army soldier Bradley Manning to the WikiLeaks website.
Note: For more on the NSA spying scandal, see the deeply revealing reports from reliable major media sources available here.
The federal government is making progress on developing a surveillance system that would pair computers with video cameras to scan crowds and automatically identify people by their faces, according to newly disclosed documents and interviews with researchers working on the project. The Department of Homeland Security tested a crowd-scanning project called the Biometric Optical Surveillance System — or BOSS — last fall after two years of government-financed development. Although the system is not ready for use, researchers say they are making significant advances. That alarms privacy advocates, who say that now is the time for the government to establish oversight rules and limits on how it will someday be used. In a sign of how the use of such technologies can be developed for one use but then expanded to another, the BOSS research began as an effort to help the military detect potential suicide bombers. But in 2010, the effort was transferred to the Department of Homeland Security to be developed for use instead by the police in the United States. The effort to build the BOSS system involved a two-year, $5.2 million federal contract given to Electronic Warfare Associates, a Washington-area military contractor with a branch office in Kentucky. Significant progress is already being made in automated face recognition using photographs taken under ideal conditions, like passport pictures and mug shots. The Federal Bureau of Investigation is spending $1 billion to roll out a Next Generation Identification system that will provide a national mug shot database to help local police departments verify identities.
Note: For more on government and corporate threats to privacy, see the deeply revealing reports from reliable major media sources available here.
Guardian editors on [August 20] revealed why and how the newspaper destroyed computer hard drives containing copies of some of the secret files leaked by Edward Snowden. The decision was taken after a threat of legal action by the government that could have stopped reporting on the extent of American and British government surveillance revealed by the documents. It resulted in one of the stranger episodes in the history of digital-age journalism. On Saturday 20 July, in a deserted basement of the Guardian's King's Cross offices, a senior editor and a Guardian computer expert used angle grinders and other tools to pulverise the hard drives and memory chips on which the encrypted files had been stored. As they worked they were watched by technicians from Government Communications Headquarters (GCHQ) who took notes and photographs, but who left empty-handed. The editor of the Guardian, Alan Rusbridger, had earlier informed government officials that other copies of the files existed outside the country and that the Guardian was neither the sole recipient nor steward of the files leaked by Snowden, a former National Security Agency (NSA) contractor. But the government insisted that the material be either destroyed or surrendered. The British government has attempted to step up its pressure on journalists, with the detention in Heathrow on Sunday of David Miranda, the partner of Glenn Greenwald, who has led the Guardian's US reporting on the files.
Note: For more on government attacks on civil liberties, see the deeply revealing reports from reliable major media sources available here.
The news that the National Security Agency (NSA) is routinely operating outside of the law and overstepping its legal authority by carrying out surveillance on American citizens is not really much of a surprise. This is what happens when you give the government broad powers and allow government agencies to routinely sidestep the Constitution. Consider that the government's Utah Data Center (UDC), the central hub of the NSA's vast spying infrastructure, will be a clearinghouse and a depository for every imaginable kind of information - whether innocent or not, private or public - including communications, transactions and the like. In fact, anything and everything you've ever said or done, from the trivial to the damning - phone calls, Facebook posts, Twitter tweets, Google searches, emails, bookstore and grocery purchases, bank statements, commuter toll records, etc. - will be tracked, collected, cataloged and analyzed by the UDC's supercomputers and teams of government agents. By sifting through the detritus of your once-private life, the government will come to its own conclusions about who you are, where you fit in, and how best to deal with you should the need arise. Surveillance of all citizens ... is not friendly to freedom. Frankly, we are long past the point where we should be merely alarmed. These are no longer experiments on our freedoms. These are acts of aggression.
Note: Former US Senator Frank Church warned of the dangers of creating a surveillance state in 1975. By 2013, it had become evident that the US did not heed his warning. For more along these lines, see concise summaries of deeply revealing news articles about intelligence agency corruption and the disappearance of privacy.
The partner of the Guardian journalist [Glenn Greenwald], who has written a series of stories revealing mass surveillance programmes by the US National Security Agency, was held for almost nine hours ... by UK authorities as he passed through London's Heathrow airport on his way home to Rio de Janeiro. David Miranda ... was returning from a trip to Berlin when he was stopped by officers at 8.05am and informed that he was to be questioned under schedule 7 of the Terrorism Act 2000. The controversial law, which applies only at airports, ports and border areas, allows officers to stop, search, question and detain individuals. The 28-year-old was held for nine hours, the maximum the law allows before officers must release or formally arrest the individual. According to official figures, most examinations under schedule 7 – over 97% – last less than an hour, and only one in 2,000 people detained are kept for more than six hours. Miranda was released, but officials confiscated electronics equipment including his mobile phone, laptop, camera, memory sticks, DVDs and games consoles. "This is a profound attack on press freedoms and the news gathering process," Greenwald said. "To detain my partner for a full nine hours while denying him a lawyer, and then seize large amounts of his possessions, is clearly intended to send a message of intimidation to those of us who have been reporting on the NSA and GCHQ. The actions of the UK pose a serious threat to journalists everywhere. But the last thing it will do is intimidate or deter us in any way from doing our job as journalists. Quite the contrary: it will only embolden us more to continue to report aggressively."
Note: For more on government attacks on civil liberties, see the deeply revealing reports from reliable major media sources available here.
Two US senators on the intelligence committee said [that] thousands of annual violations by the National Security Agency on its own restrictions were "the tip of the iceberg." "The executive branch has now confirmed that the rules, regulations and court-imposed standards for protecting the privacy of Americans' have been violated thousands of times each year," said senators Ron Wyden and Mark Udall, two leading critics of bulk surveillance, who responded [to] a Washington Post story based on documents provided by whistleblower Edward Snowden. "We have previously said that the violations of these laws and rules were more serious than had been acknowledged, and we believe Americans should know that this confirmation is just the tip of a larger iceberg." On July 31, Wyden, backed by Udall, vaguely warned other senators in a floor speech that the NSA and the director of national intelligence were substantively misleading legislators by describing improperly collected data as a matter of innocent and anodyne human or technical errors. In keeping with their typically cautious pattern when discussing classified information, Wyden and Udall did not provide details about their claimed "iceberg" of surveillance malfeasance. But they hinted that the public still lacks an adequate understanding of the NSA's powers to collect data on Americans under its controversial interpretation of the Patriot Act. "We believe the public deserves to know more about the violations of the secret court orders that have authorized the bulk collection of Americans' phone and email records under the Patriot Act," [they] said.
Note: For more on massive surveillance, see the deeply revealing reports from reliable major media sources available here.
The National Security Agency has broken privacy rules or overstepped its legal authority thousands of times each year since Congress granted the agency broad new powers in 2008, according to an internal audit and other top-secret documents. Most of the infractions involve unauthorized surveillance of Americans or foreign intelligence targets in the United States, both of which are restricted by statute and executive order. They range from significant violations of law to typographical errors that resulted in unintended interception of U.S. e-mails and telephone calls. The documents, provided earlier this summer to The Washington Post by former NSA contractor Edward Snowden, include a level of detail and analysis that is not routinely shared with Congress or the special court that oversees surveillance. In one of the documents, agency personnel are instructed to remove details and substitute more generic language in reports to the Justice Department and the Office of the Director of National Intelligence. In one instance, the NSA decided that it need not report the unintended surveillance of Americans. The NSA audit obtained by The Post, dated May 2012, counted 2,776 incidents in the preceding 12 months of unauthorized collection, storage, access to or distribution of legally protected communications. Many involved failures of due diligence or violations of standard operating procedure. The most serious incidents included a violation of a court order and unauthorized use of data about more than 3,000 Americans and green-card holders.
Note: For more on the realities of intelligence agency operations, see the deeply revealing reports from reliable major media sources available here.
[The] fact that a car is not a simple machine of glass and steel but a hackable network of computers, is what [Charlie Miller and Chris Valasek] have spent the last year trying to demonstrate. Miller, a 40-year-old security engineer at Twitter, and Valasek, the 31-year-old director of security intelligence at the Seattle consultancy IOActive, received an $80,000-plus grant last fall from [the] Defense Advanced Research Projects Agency to root out security vulnerabilities in automobiles. The need for scrutiny is growing as cars are increasingly automated and connected to the Internet. Practically every American carmaker now offers a cellular service or Wi-Fi network like General Motors’ OnStar, Toyota’s Safety Connect and Ford’s SYNC. Without better security it’s all potentially vulnerable, and automakers are remaining mum or downplaying the issue. As I drove their vehicles for more than an hour, Miller and Valasek showed that they’ve reverse-engineered enough of the software of the [Ford] Escape and the Toyota Prius (both the 2010 model) to demonstrate a range of nasty surprises: everything from annoyances like uncontrollably blasting the horn to serious hazards like slamming on the Prius’ brakes at high speeds. They sent commands from their laptops that killed power steering, spoofed the GPS and made pathological liars out of speedometers and odometers. Finally they directed me out to a country road, where Valasek showed that he could violently jerk the Prius’ steering at any speed, threatening to send us into a cornfield or a head-on collision.
Note: Don't miss the unbelievable video at the above link which shows how a good hacker can take control of your car's steering, brakes, and much more. For more on the OnStar system in most GM cars now and how it allows spying on you, read the CNN article titled "OnStar's 'brazen' data tracking comes under fire" at this link. For more on government and corporate digital security invasions, see the deeply revealing reports from reliable major media sources available here.
Josh del Sol got curious in the summer of 2011 after a friend linked a serious illness to the recent installation of a "smart meter." Del Sol subsequently learned that electrical utilities across North America had been quietly installing "smart grids" that ... monitor Internet-connected meters and appliances in homes and businesses. Now, del Sol is on the verge of premiering a feature-length documentary ... titled Take Back Your Power, disclosing questionable industry practices in support of implementing networked control systems for power plants. The film links billing mistakes, invasive monitoring, even human illnesses to the rising use of smart grids in the U.S. and Europe. "Take Back Your Power delivers an ominous, powerful message about the energy industry's shift to closely watching how customers use energy in their home in an invasive, controversial manner," says Lee Waterworth, president of Yekra, a video-on-demand company. Del Sol says access to industry sources was tough. "We had a difficult time getting anyone in the industry to talk to us on camera once they found out that we were wanting to get to the bottom of some of these concerns," he says. The filmmaker was surprised by the contrast between the views of industry officials and those of ordinary citizens trying to get to the bottom of safety, privacy and health concerns. Del Sol hopes the documentary helps to prompt the electricity industry "to provide more transparency, accountability and clarity on the issues we explore in the film."
Note: You can find this documentary on the Internet. For more, read how solar providers are using "smart" systems to help their customers save money while traditional utilities use these systems only to cut their own costs. Meanwhile, concerns about the health impacts of wireless tech and the ongoing erosion of privacy rights continue to grow.
A Texas-based encrypted email service recently revealed to be used by Edward Snowden - Lavabit - announced yesterday it was shutting itself down in order to avoid complying with what it perceives as unjust secret US court orders to provide government access to its users' content. "After significant soul searching, I have decided to suspend operations," the company's founder, Ladar Levinson, wrote in a statement to users posted on the front page of its website. He said the US directive forced on his company "a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit." He chose the latter. CNET's Declan McCullagh ... speculates that Lavabit was served "with [a] federal court order to intercept users' passwords" to allow ongoing monitoring of emails; specifically: "the order can also be to install FedGov-created malware." After challenging the order in district court and losing - all in a secret court proceeding, naturally - Lavabit shut itself down to avoid compliance while it appeals to the Fourth Circuit. What is particularly creepy about the Lavabit self-shutdown is that the company is gagged by law even from discussing the legal challenges it has mounted and the court proceeding it has engaged. In other words, the American owner of the company believes his Constitutional rights and those of his customers are being violated by the US Government, but he is not allowed to talk about it. Lavabit has been told that they would face serious criminal sanctions if they publicly discuss what is being done to their company.
Note: For more on government and corporate privacy invasions, see the deeply revealing reports from reliable major media sources available here.
During last week’s Black Hat computer security conference in Las Vegas, researchers from iSEC Partners demonstrated a vulnerability in 2012 models of Samsung’s line of Smart TVs, particularly the ones with that come with cameras designed for teleconferencing. The problem with the Samsung TVs highlights a much larger issue: The number of devices connected to the Internet is growing exponentially, and many of them have little or no security in place. Flaws may be found in almost any application on an Internet-connected platform that, if exploited, could allow access to the entire device, and then the user’s full network. Many of these unsecured devices can be found with a simple search. In fact, there’s a search engine devoted just to scouring the so-called “Internet of things” called Shadon. Playing around with it is an eye-opener. For example, in late July a writer for Forbes discovered an entire home automation product line with Internet-connected features that could be set up without a default password, and were visible to search engines. This would enable a hacker to search and find these systems on the Net, then access them at will. To prove her point, Kashmir Hill breached the home automation systems of random strangers, called them on the phone and demonstrated the vulnerability by turning their lights on and off.
Note: For more on corporate and government privacy invasions, see the deeply revealing reports from reliable major media sources available here.
A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin—not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence—information that could reveal entrapment, mistakes or biased witnesses. "I have never heard of anything like this at all," said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers. "It is one thing to create special rules for national security," Gertner said. "Ordinary crime is entirely different. It sounds like they are phonying up investigations."
Note: For more on government corruption, see the deeply revealing reports from reliable major media sources available here.
When you're watching TV ... you probably don't think someone could be on the other side watching you back. An alarming security flaw in Samsung's Smart-TVs makes this scenario possible. LAURIE SEGALL [CNN Money/Technology Correspondent]: We've spoken to a lot of folks and they're saying there are major vulnerabilities. YAVOR: One of the things we were able to do with the Smart-TV platform was abuse the browser so that we could actually gain access to the camera that's built into the TV. What we can prove here is that with a little bit of extra code, we can turn the camera on in your browser. This is something we can do invisibly and actually have it run behind the web page you're looking at. I could be sitting at a laptop in a cafe in Paris, and as long as I have a web connection, I would be able to get into your TV and access your camera. AARON GRATTAFIORI [security consultant]: The scary thing about it is that it doesn't give an indication that the camera is on and there is no LED that shows up when the camera is on. So they could actually be watching you and you would never even know. SEGALL: What is a Smart-TV, and why is it a playground, essentially, for hackers? GRATTAFIORI: It's a computer. So instead of being a tube and some other electronics, now it has a web browser and it has a lot of devices running Linux.
Note: To watch this video clip on CNN News, click here.
Today's high-end televisions are almost all equipped with "smart" PC-like features, including Internet connectivity, apps, microphones and cameras. But a recently discovered security hole in some Samsung Smart TVs shows that many of those bells and whistles aren't ready for prime time. The flaws in Samsung Smart TVs, which have now been patched, enabled hackers to remotely turn on the TVs' built-in cameras without leaving any trace of it on the screen. While you're watching TV, a hacker anywhere around the world could have been watching you. Hackers also could have easily rerouted an unsuspecting user to a malicious website to steal bank account information. Samsung quickly fixed the problem after security researchers at iSEC Partners informed the company about the bugs. Samsung sent a software update to all affected TVs. But the glitches speak to a larger problem of gadgets that connect to the Internet but have virtually no security to speak of. Security cameras, lights, heating control systems and even door locks and windows are now increasingly coming with features that allow users to control them remotely. Without proper security controls, there's little to stop hackers from invading users' privacy, stealing personal information or spying on people. In the case of Samsung Smart TVs, iSEC researchers found that they could tap into the TV's Web browser with ease, according to iSEC security analyst Josh Yavor. That gave hackers access to all the functions controlled by the browser, including the TV's built-in camera. "If there's a vulnerability in any application, there's a vulnerability in the entire TV," said Aaron Grattafiori, also an analyst at iSEC.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.