'Surveillance Society' - December 2010


'Stalin's Delight'
Wall St Journal Issues Surveillance Warning
About Smartphones

www.nlpwessex.org/docs/ssmobile.htm
'It's Always With Us, It's Always On'


"Few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner's real name—even a unique ID number that can never be changed or turned off. These phones don't keep secrets. They are sharing this personal data widely and regularly, a Wall Street Journal investigation has found. An examination of 101 popular smartphone 'apps'—games and other software applications for iPhone and Android phones—showed that 56 transmitted the phone's unique device ID to other companies without users' awareness or consent. Forty-seven apps transmitted the phone's location in some way. Five sent age, gender and other personal details to outsiders. The findings reveal the intrusive effort by online-tracking companies to gather personal data about people in order to flesh out detailed dossiers on them. .... 'In the world of mobile, there is no anonymity,' says Michael Becker of the Mobile Marketing Association, an industry trade group. A cellphone is 'always with us. It's always on.'... Smartphone users are all but powerless to limit the tracking."
Your Apps Are Watching You
Wall St Journal, 18 December 2010

"I'm On The train. No, Wait A Minute, There's More.  I'm On The Database."

phonetrain.jpg (30111 bytes)

'Stalin's Delight', Above - Your Innocent Looking Mobile Phone

Are you delighted that you increasingly lead most aspects of your life via your mobile phone or SD ('Stalin's Delight')? Commerce certainly is, and it wants to know everything about you in the process, including your real-time location. And it is succeeding, as the latest report from the Wall St Journal on 'smart phones' reveals (below).

The really big question, however, is not about commerce, but about the State. Does your government have this information also? And if not, how long will it be before it is able to get it? And when it does, what are going to be the political implications?

Whether you are on the Right and thinking about going on a protest in favour of fox hunting or 'the right to bear arms' (say), or you are on the Left and thinking about going on a protest against war or education cuts (say), how do you feel about that?

It's fairly obvious what Stalin or Hitler's views on the subject would have been, as it's hard to imagine a better tool for 'rounding people up' when things get really difficult.

But your mobile phone is only one part of the problem as the 'Surveillance State' spreads across the world in the digital age. Whilst governments continue to insist on protecting their own privacy (secrecy) they are busy eroding that of their citizens. Much of this is being promoted on the back of the alleged 'national security' needs of 'counter-terrorism'.

Yet statistically terrorism is a barely measurable source of death and injury in western society compared to other causes. Whilst both types of misfortune always involve deep personal tragedy, on average you are more likely to commit suicide as a result of the recession than you are to be killed by terrorists, despite an essentially unlimited number of unprotectable potential targets being permanently at their disposal.

In the words of the former Director of MI5, Dame Stella Rimington, "It would be better that the government recognised that there are risks, rather than frightening people in order to be able to pass laws which restrict civil liberties, precisely one of the objects of terrorism - that we live in fear and under a police state."'

nlpwessex.org

Keep Up To Date With Developments With 'Surveillance Society News'
Click Here

'The KGB Never Had Anything Like It'

"'About 90% of Americans are walking around with a portable tracking device all the time, and they have no idea,' says Christopher Calabrese, a lawyer with the American Civil Liberties Union's Washington office..... The federal government's position is that it should be able to get most of this data if it decides it is relevant to an investigation, with no need for a search warrant. ...... Without this requirement, the government can get locational data pretty much anytime it wants. It is not hard to imagine that the government could also one day use cell-phone data to stifle dissent. Cell-phone records could tell them who attended an antigovernment rally. It could also tell them who is going into the opposition party's headquarters or into the home of someone they have questions about. Cell-phone data may be the most efficient way ever invented for a government to spy on its people — since people are planting the devices on themselves and even paying the monthly bills. The KGB never had anything like it."
What Your Cell Phone Could Be Telling the Government
TIME, 15 September 2010

"Our privacy is being invaded by the world's security services in every second of every day, as a routine matter. Vast quantities of information are collected by commercial enterprises such as Google or Tesco. Against these invasions of our privacy we have little or no protection."
Lord Rees-Mogg
London Times, 25 July 2008

'Big Society' Or 'Big Brother'?
The Fat End Of A Massive Wedge As Cameron-Clegg Coalition Caves Into The State Security Apparatus

"Every email, phone call and website visit is to be recorded and stored after the Coalition Government revived controversial Big Brother snooping plans. It will allow security services and the police to spy on the activities of every Briton who uses a phone or the internet. Moves to make every communications provider store details for at least a year will be unveiled later this year sparking fresh fears over a return of the surveillance state. The plans were shelved by the Labour Government last December but the Home Office is now ready to revive them. It comes despite the Coalition Agreement promised to 'end the storage of internet and email records without good reason'. Any suggestion of a central 'super database' has been ruled out but the plans are expected to involve service providers storing all users details for a set period of time. That will allow the security and police authorities to track every phone call, email, text message and website visit made by the public if they argue it is needed to tackle crime or terrorism. The information will include who is contacting whom, when and where and which websites are visited, but not the content of the conversations or messages.... Isabella Sankey, director of policy at Liberty, said: 'One of the early and welcome promises of the new Government was to ‘end the blanket storage of internet and email records’.  'Any move to amass more of our sensitive data and increase powers for processing would amount to a significant U-turn. The terrifying ambitions of a group of senior Whitehall technocrats must not trump the personal privacy of law abiding Britons.' Guy Herbert, general secretary of the No2ID campaign group, said: 'We should not be surprised that the interests of bureaucratic empires outrank liberty.  It is disappointing that the new ministers seem to be continuing their predecessors' tradition of credulousness.'"
Every email and website to be stored
Daily Telegraph, 20 October 2010

From Baghdad To Baltimore
An Assault On The Citizen On All Fronts

"A semi-secret government contractor that calls itself Project Vigilant surfaced at the Defcon security conference Sunday with a series of revelations: that it monitors the traffic of 12 regional Internet service providers, hands much of that information to federal agencies, and encouraged one of its 'volunteers,' researcher Adrian Lamo, to inform the federal government about the alleged source of a controversial video of civilian deaths in Iraq leaked to whistle-blower site Wikileaks in April. Chet Uber, the director of Fort Pierce, Fl.-based Project Vigilant, says that he personally asked Lamo to meet with federal authorities to out the source of a video published by Wikileaks showing a U.S. Apache helicopter killing several civilians and two journalists in a suburb of Baghdad, a clip that Wikileaks labeled 'Collateral Murder.' ...... According to Uber, one of Project Vigilant’s manifold methods for gathering intelligence includes collecting information from a dozen regional U.S. Internet service providers (ISPs). Uber declined to name those ISPs, but said that because the companies included a provision allowing them to share users’ Internet activities with third parties in their end user license agreements (EULAs), Vigilant was able to legally gather data from those Internet carriers and use it to craft reports for federal agencies. A Vigilant press release says that the organization tracks more than 250 million IP addresses a day and can 'develop portfolios on any name, screen name or IP address.' 'We don’t do anything illegal,' says Uber. 'If an ISP has a EULA to let us monitor traffic, we can work with them. If they don’t, we can’t.' And whether that massive data gathering violates privacy? The organization says it never looks at personally identifying information, though just how it defines that information isn’t clear, nor is how it scrubs its data mining for sensitive details. ISP monitoring is just one form of intelligence that Vigilant employs, says Uber. It also gathers a variety of open source intelligence and employs numerous agents around the world."
Stealthy Government Contractor Monitors U.S. Internet Providers, Worked With Wikileaks Informant
Forbes (blog), 1 August 2010

In This Bulletin

Secrecy For The State
But Surveillance For The Citizen

The Spy In Your Pocket
How Much Do You Really Love Your Mobile Phone?

Surveillance Society
State Monitoring Of Legitimate Political Dissent

Surveillance Society Developments
In Britain

Surveillance Society Developments
In America

How Will You Feel When The Day Comes
That Google Is Obliged To Hand Its Records Over To The State?

'Google Has Enough Dirt To Destroy Every Marriage In America'

"I don't want to live in a world where everyone is watched all the time.... Everyone everywhere should be able to speak and read and form their own beliefs without being monitored..... It's not just the state. If it wanted to, Google could overthrow any country in the world. Google has enough dirt to destroy every marriage in America.... I love Google. And I love the people there. Sergey Brin and Larry Page are cool. But I'm terrified of the next generation that takes over. A benevolent dictatorship is still a dictatorship. At some point people are going to realize that Google has everything on everyone. Most of all, they can see what questions you're asking, in real time. Quite literally, they can read your mind."
Jacob Appelbaum, the only known American member of Wikileaks
The American Wikileaks Hacker
Rolling Stone, 1 December 2010

Permanent Real Time Individual Surveillance

"Over the past few days, at trade fairs from Las Vegas to Seoul, a constant theme has been the unstoppable advance of 'FRT', the benign abbreviation favoured by industry insiders. We learnt that Apple's iPhoto update will automatically scan your photos to detect people's faces and group them accordingly, and that Lenovo's new PC will log on users by monitoring their facial patterns.... So let's understand this: governments and police are planning to implement increasingly accurate surveillance technologies that are unnoticeable, cheap, pervasive, ubiquitous, and searchable in real time. And private businesses, from bars to workplaces, will also operate such systems, whose data trail may well be sold on or leaked to third parties - let's say, insurance companies that have an interest in knowing about your unhealthy lifestyle, or your ex-spouse who wants evidence that you can afford higher maintenance payments. Rather than jump up and down with rage - you never know who is watching through the window - you have a duty now, as a citizen, to question this stealthy rush towards permanent individual surveillance."
Let's face it, soon Big Brother will have no trouble recognising you
London Times, 13 January 2009


Secrecy For The State
But Surveillance For The Citizen

The Difference Between The Government And The State

".... it's important to distinguish between the government - the temporary, elected authors of national policy - and the state - the permanent bureaucratic and military apparatus superficially but not fully controlled by the reigning government..... If secrecy is necessary for national security and effective diplomacy, it is also inevitable that the prerogative of secrecy will be used to hide the misdeeds of the permanent state and its privileged agents.....  I suspect that there is no scheme of government oversight that will not eventually come under the indirect control of the generals, spies, and foreign-service officers it is meant to oversee."
W. W - In defence of WikiLeaks
Economist (Democracy In America Blog), 29 November 2010

"One of the hallmarks of an authoritarian government is its fixation on hiding everything it does behind a wall of secrecy while simultaneously monitoring, invading and collecting files on everything its citizenry does.  Based on the Francis Bacon aphorism that 'knowledge is power,' this is the extreme imbalance that renders the ruling class omnipotent and citizens powerless. In The Washington Post today, Dana Priest and William Arkin continue their 'Top Secret America' series by describing how America's vast and growing Surveillance State now encompasses state and local law enforcement agencies, collecting and storing always-growing amounts of information about even the most innocuous activities undertaken by citizens suspected of no wrongdoing.... Today, the Post reporters document how surveillance and enforcement methods pioneered in America's foreign wars and occupations are being rapidly imported into domestic surveillance (wireless fingerprint scanners, military-grade infrared cameras, biometric face scanners, drones on the border).... Meanwhile, the Obama Department of Homeland Security has rapidly expanded the scope and invasiveness of domestic surveillance programs -- justified, needless to say, in the name of Terrorism..... The results are predictable.  Huge amounts of post/9-11 anti-Terrorism money flooded state and local agencies that confront virtually no Terrorism threats, and they thus use these funds to purchase technologies -- bought from the private-sector industry that controls and operates government surveillance programs -- for vastly increased monitoring and file-keeping on ordinary citizens suspected of no wrongdoing.  The always-increasing cooperation between federal, state and local agencies -- and among and within federal agencies -- has spawned massive data bases of information containing the activities of millions of American citizens.  'There are 96 million sets of fingerprints' in the FBI's data base, the Post reports.  Moreover, the FBI uses its 'suspicious activities record' program (SAR) to collect and store endless amounts of information about innocent Americans... Even the FBI admits the huge waste all of this is -- ''Ninety-nine percent doesn't pan out or lead to anything' said Richard Lambert Jr., the special agent in charge of the FBI's Knoxville office -- but, as history conclusively proves, data collected on citizens will be put to some use even if it reveals no criminality. ... To understand the breadth of the Surveillance State, recall this sentence from the original Priest/Arkin article:  'Every day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications.'  As Arkin and Priest document today, there are few safeguards on how all this data is used and abused.  Local police departments routinely meet with neoconservative groups insisting that all domestic Muslim communities are a potential threat and must be subjected to intensive surveillance and infiltration.  Groups engaged in plainly legal and protected political dissent have been subjected to these government surveillance programs.  What we have, in sum, is a vast, uncontrolled and increasingly invasive surveillance state that knows and collects more and more information about the activities of more and more citizens. But what makes all of this particularly ominous is that -- as the WikiLeaks conflict demonstrates -- this all takes place next to an always-expanding wall of secrecy behind which the Government's own conduct is hidden from public view.  Just consider the Government's reaction to the disclosures by WikiLeaks of information which even it -- in moments of candor -- acknowledges have caused no real damage:  disclosed information that, critically, was protected by relatively low-level secrecy designations and (in contrast to the Pentagon Papers) none of which was designated 'Top Secret.'.... That's the mindset of the U.S. Government:  everything it does of any significance can and should be shielded from public view; anyone who shines light on what it does is an Enemy who must be destroyed; but nothing you do should be beyond its monitoring and storing eyes.  And what's most remarkable about this -- though, given the full-scale bipartisan consensus over it, not surprising -- is how eagerly submissive much of the citizenry is to this imbalance. .... the imbalance has become so extreme -- the Government now watches much of the citizenry behind a fully opaque one-way mirror -- that the dangers should be obvious.  And this is all supposed to be the other way around:  it's government officials who are supposed to operate out in the open, while ordinary citizens are entitled to privacy.  Yet we've reversed that dynamic almost completely.  And even with 9/11 now 9 years behind us, the trends continue only in one direction."
Glenn Greenwald - The government's one-way mirror
Salon, 20 December 2010

"A semi-secret government contractor that calls itself Project Vigilant surfaced at the Defcon security conference Sunday with a series of revelations: that it monitors the traffic of 12 regional Internet service providers, hands much of that information to federal agencies, and encouraged one of its 'volunteers,' researcher Adrian Lamo, to inform the federal government about the alleged source of a controversial video of civilian deaths in Iraq leaked to whistle-blower site Wikileaks in April. Chet Uber, the director of Fort Pierce, Fl.-based Project Vigilant, says that he personally asked Lamo to meet with federal authorities to out the source of a video published by Wikileaks showing a U.S. Apache helicopter killing several civilians and two journalists in a suburb of Baghdad, a clip that Wikileaks labeled 'Collateral Murder.' Lamo, who Uber said worked as an 'adversary characterization' analyst for Project Vigilant, had struck up an online friendship with Bradley Manning, a former U.S. Army intelligence analyst who currently faces criminal charges for releasing the classified video. In June, Uber said he learned from Lamo’s father that the young researcher had identified Manning as the video’s source, and pressured him to meet with federal agencies to name Manning as Wikileaks’ whistleblower. He then arranged a meeting with employees of 'three letter' agencies and Lamo, who Uber said had mixed feelings about informing on Manning. 'I’m the one who called the U.S. government,' Uber said. 'All the people who say that Adrian is a narc, he did a patriotic thing. He sees all kinds of hacks, and he was seriously worried about people dying.' Uber says that Lamo later called him from the meeting, regretting his decision to inform on Manning. 'I’m in a meeting with five guys and I don’t want to do this,' Uber says Lamo told him at the time. Uber says he responded, 'You don’t have any choice, you’ve got to do this.' 'I said, ‘They’re not going to throw you in jail,’' Uber said. '‘Give them everything you have.'' Wikileaks didn’t immediately respond to a request for comment. IDG reporter Robert McMillan confirmed Uber’s relationship with Lamo, who told McMillan that 'Mr. Uber was, among a few others, an instrumental voice in helping me come to my ultimate decision.' Uber’s Wikileaks revelation is one of the first public statements from the semi-secret Project Vigilant. He says the 600-person 'volunteer' organization functions as a government contractor bridging public and private sector security efforts. Its mission: to use a variety of intelligence-gathering efforts to help the government attribute hacking incidents. 'Bad actors do bad things and you have to prove that they did them,' says Uber. 'Attribution is the hardest problem in computer security.' According to Uber, one of Project Vigilant’s manifold methods for gathering intelligence includes collecting information from a dozen regional U.S. Internet service providers (ISPs). Uber declined to name those ISPs, but said that because the companies included a provision allowing them to share users’ Internet activities with third parties in their end user license agreements (EULAs), Vigilant was able to legally gather data from those Internet carriers and use it to craft reports for federal agencies. A Vigilant press release says that the organization tracks more than 250 million IP addresses a day and can 'develop portfolios on any name, screen name or IP address.' 'We don’t do anything illegal,' says Uber. 'If an ISP has a EULA to let us monitor traffic, we can work with them. If they don’t, we can’t.' And whether that massive data gathering violates privacy? The organization says it never looks at personally identifying information, though just how it defines that information isn’t clear, nor is how it scrubs its data mining for sensitive details. ISP monitoring is just one form of intelligence that Vigilant employs, says Uber. It also gathers a variety of open source intelligence and employs numerous agents around the world."
Stealthy Government Contractor Monitors U.S. Internet Providers, Worked With Wikileaks Informant
Forbes (blog), 1 August 2010

'Data Mining' And 'Repressive Regimes'

"Robert S. Mueller III, the director of the Federal Bureau of Investigation, traveled to Silicon Valley on Tuesday to meet with top executives of several technology firms about a proposal to make it easier to wiretap Internet users. Mr. Mueller and the F.B.I.’s general counsel, Valerie Caproni, were scheduled to meet with senior managers of several major companies, including Google and Facebook, according to several people familiar with the discussions. How Mr. Mueller’s proposal was received was not clear. 'I can confirm that F.B.I. Director Robert Mueller is visiting Facebook during his trip to Silicon Valley,' said Andrew Noyes, Facebook’s public policy manager. Michael Kortan, an F.B.I. spokesman, acknowledged the meetings but did not elaborate. Mr. Mueller wants to expand a 1994 law, the Communications Assistance for Law Enforcement Act, to impose regulations on Internet companies. The law requires phone and broadband network access providers like Verizon and Comcast to make sure they can immediately comply when presented with a court wiretapping order. Law enforcement officials want the 1994 law to also cover Internet companies because people increasingly communicate online. An interagency task force of Obama administration officials is trying to develop legislation for the plan, and submit it to Congress early next year. The Commerce Department and State Department have questioned whether it would inhibit innovation, as well as whether repressive regimes might harness the same capabilities to identify political dissidents, according to officials familiar with the discussions. Under the proposal, firms would have to design systems to intercept and unscramble encrypted messages. Services based overseas would have to route communications through a server on United States soil where they could be wiretapped."
F.B.I. Seeks Wider Wiretap Law for Web
New York Times, 16 November 2010

Stella Rimington On The Creation Of A Police State

"A former head of MI5 has accused the government of exploiting the fear of terrorism and trying to bring in laws that restrict civil liberties. In an interview in a Spanish newspaper, published in the Daily Telegraph, Dame Stella Rimington, 73, also accuses the US of 'tortures'....Dame Stella, who stood down as the director general of the security service in 1996, has previously been critical of the government's policies, including its attempts to extend pre-charge detention for terror suspects to 42 days and the controversial plan to introduce ID cards. 'It would be better that the government recognised that there are risks, rather than frightening people in order to be able to pass laws which restrict civil liberties, precisely one of the objects of terrorism - that we live in fear and under a police state,' she told the Spanish newspaper La Vanguardia....Dame Stella's comments come as a study is published by the International Commission of Jurists (ICJ) that accuses the US and the UK of undermining the framework of international law. Former Irish president Mary Robinson, the president of the ICJ said: 'Seven years after 9/11 it is time to take stock and to repeal abusive laws and policies enacted in recent years. 'Human rights and international humanitarian law provide a strong and flexible framework to address terrorist threats.' The BBC's security correspondent Frank Gardner said the ICJ report would probably have more of an impact than Dame Stella's remarks because it was a wide-ranging, three-year study carried out by an eminent group of practising legal experts....Liberal Democrat foreign affairs spokesman Ed Davey said: 'This is damning testament to just how much liberty has been ineffectually sacrificed in the 'war on terror'.' Dame Stella became the first female head of MI5 in 1992."
Ministers 'using fear of terror'
BBC Online, 17 February 2009

John Major Warns Of 'Total Loss Of Privacy'
To Increasingly Scaremongering Authoritarian British State

Former British Prime Minister
Says War On Terror Measures Are 'Bogus'

www.nlpwessex.org/docs/ssmajor.htm


The Spy In Your Pocket
How Much Do You Really Love Your Mobile Phone?

'It's Always With Us, It's Always On'

"Few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner's real name—even a unique ID number that can never be changed or turned off. These phones don't keep secrets. They are sharing this personal data widely and regularly, a Wall Street Journal investigation has found. An examination of 101 popular smartphone 'apps'—games and other software applications for iPhone and Android phones—showed that 56 transmitted the phone's unique device ID to other companies without users' awareness or consent. Forty-seven apps transmitted the phone's location in some way. Five sent age, gender and other personal details to outsiders. The findings reveal the intrusive effort by online-tracking companies to gather personal data about people in order to flesh out detailed dossiers on them. Among the apps tested, the iPhone apps transmitted more data than the apps on phones using Google Inc.'s Android operating system. Because of the test's size, it's not known if the pattern holds among the hundreds of thousands of apps available. Apps sharing the most information included TextPlus 4, a popular iPhone app for text messaging. It sent the phone's unique ID number to eight ad companies and the phone's zip code, along with the user's age and gender, to two of them.... 'In the world of mobile, there is no anonymity,' says Michael Becker of the Mobile Marketing Association, an industry trade group. A cellphone is 'always with us. It's always on.'... Smartphone users are all but powerless to limit the tracking. With few exceptions, app users can't 'opt out' of phone tracking, as is possible, in limited form, on regular computers. On computers it is also possible to block or delete 'cookies,' which are tiny tracking files. These techniques generally don't work on cellphone apps.... The Journal also tested its own iPhone app; it didn't send information to outsiders. The Journal doesn't have an Android phone app. Among all apps tested, the most widely shared detail was the unique ID number assigned to every phone. It is effectively a 'supercookie,' says Vishal Gurbuxani, co-founder of Mobclix Inc., an exchange for mobile advertisers. On iPhones, this number is the 'UDID,' or Unique Device Identifier. Android IDs go by other names. These IDs are set by phone makers, carriers or makers of the operating system, and typically can't be blocked or deleted. 'The great thing about mobile is you can't clear a UDID like you can a cookie,' says Meghan O'Holleran of Traffic Marketplace, an Internet ad network that is expanding into mobile apps. 'That's how we track everything.' Ms. O'Holleran says Traffic Marketplace, a unit of Epic Media Group, monitors smartphone users whenever it can. 'We watch what apps you download, how frequently you use them, how much time you spend on them, how deep into the app you go,' she says. She says the data is aggregated and not linked to an individual.... By tracking a phone's location, Mobclix also makes a 'best guess' of where a person lives, says Mr. Gurbuxani, the Mobclix executive. Mobclix then matches that location with spending and demographic data from Nielsen Co. In roughly a quarter-second, Mobclix can place a user in one of 150 'segments' it offers to advertisers, from 'green enthusiasts' to 'soccer moms.' "
Your Apps Are Watching You
Wall St Journal, 18 December 2010

How Do You Know If Your Phone Has Been Compromised? You Don't

"... suspicious spouses, protective parents, and concerned companies are turning to cheap and hard-to-detect commerical spyware apps to monitor your mobile communications..... A decade ago the idea that anyone with little technical skill could turn a cell phone into a snooping device was basically unrealistic. But as the smart-phone market proliferates—it grew 86 percent in the United States alone last year—so do all the ethical kinks that come with it. Among them is a growing sector of perfectly legal smart-phone spyware apps that are peddled as tools for catching a cheating spouse or monitoring the kids when they’re away from home. But what they can effectively do, for as little as $15 or as much as several hundred, is track a person with a precision once relegated to federal authorities. 'Not only can you look at a person’s e-mail or listen to their calls, in some cases you can also just turn on the microphone [on a smart phone] and listen to what the person is doing any time you want,' says Chris Wysopal, cofounder and CTO of Veracode, a software-security company....Turning what is essentially cell-phone-bugging software into a business model is not a bad idea, technically speaking. The smart-phone market—largely dominated by the Symbian, Research in Motion, and iPhone operating systems—has 47 million users in the United States and is expected to exceed 1 billion worldwide by 2014, according to Parks Associates, a market-research firm. In most cases, people’s lives are tethered to these handsets. It’s how we e-mail, text, search, and, on occasion, even call someone. And the dependence just continues to grow. Last year consumers paid for and downloaded more than 670 million apps that can turn a phone into everything from a book reader to a compass. Smart-phone users effectively carry a real-time snapshot of what happens in their daily lives. This is what makes the smart phone the perfect way to track someone....Among the top commercial spyware vendors who have ventured into this space are FlexiSPY, MobiStealth, and Mobile Spy. While the services vary, what they do is essentially the same. According to all three spyware Web sites, a person must have legal access to a smart phone to install a piece of spyware. For example, if you’re spying on a family member, that means the phone is family property. If you’re an employer monitoring your employee, the phone should be company-owned. To install the spyware, you have to have the phone in your possession for at least a few minutes to download the app. (There are apps that can be downloaded remotely, but that’s less common and not legal.) In Mobile Spy’s case, once the software is installed, you can log into your Mobile Spy web account to view e-mails, text messages, pictures taken, videos shot, calendar entries, incoming and outgoing calls, and GPS coordinates. MobiStealth and FlexiSPY take it a step further and allow a person to remotely record any conversations that take place near the cell phone. 'The most threatening [part] is that it’s pretty impossible to tell if this is happening to you,' says Mislan. That’s because once the spyware app is on the phone it is virtually undetectable to the average user. There is no typical corresponding app icon, nor is it listed on any menu. At best, it may show up with a generic name like 'iPhone app' or 'BlackBerry app,' so that it appears to be a regular part of the system. There is nothing illegal about making these apps, and almost all makers have disclaimers on their Web sites warning people not to use their products illegally.... If the software is already on a phone, Mislan says there is little that consumers can do on their own to confirm this. Even if you’re positive you are being spied on, doing something like replacing the SIM card is not always enough to wipe a phone clean of the problem. In some cases, Mislan advises consumers to reach out to companies like SMobile Systems that offer security solutions for cell phones—a growing market in themselves. Wysopal says that as with so much that’s technology-related, something big has to break before things change in the smart phone–spyware space. 'You’ll have to see someone important, like a politician, have their phone compromised,' he says. 'If that happened, it would be a wake-up call.'
Is Someone Spying On Your Cell-Phone Calls?
Newsweek, 29 June 2010

'The KGB Never Had Anything Like It'

"Smart phones do many things these days: surf the Internet, send e-mail, take photos and video (and — oh, yes — send and receive calls). But one thing they can do that phone companies don't advertise is spy on you. As long as you don't leave home without your phone, that handy gadget keeps a record of everywhere you go — a record the government can then get from your telephone company. The law is unclear about how easy it should be for the government to get its hands on this locational data — which can reveal whether you've been going to church, attending a Tea Party rally, spending the night at a date's house or visiting a cancer-treatment center. A federal appeals court ruled last week that in some cases the government may need a search warrant. And while that's a step forward, it's not good enough. The rule should be that the government always needs a warrant to access your cell-phone records and obtain data about where you have been. When you carry a cell phone, it is constantly sending signals about where you are. It 'pings' nearby cell-phone towers about every seven seconds so it can be ready to make and receive calls. When it does, the phone is also telling the company that owns the towers where you are at that moment — data the company then stores away indefinitely. There is also a second kind of locational data that phone companies have, thanks to a GPS chip that is embedded in most smart phones now. This is even more accurate — unlike the towers, which can only pinpoint a general area where you may be, GPS can often reveal exactly where you are at any given moment within a matter of meters. 'About 90% of Americans are walking around with a portable tracking device all the time, and they have no idea,' says Christopher Calabrese, a lawyer with the American Civil Liberties Union's Washington office..... The federal government's position is that it should be able to get most of this data if it decides it is relevant to an investigation, with no need for a search warrant. If the government needs a warrant, it would have to show a judge evidence that there was probable cause to believe that the cell-phone user committed a crime — an important level of protection. Without this requirement, the government can get locational data pretty much anytime it wants. It is not hard to imagine that the government could also one day use cell-phone data to stifle dissent. Cell-phone records could tell them who attended an antigovernment rally. It could also tell them who is going into the opposition party's headquarters or into the home of someone they have questions about. Cell-phone data may be the most efficient way ever invented for a government to spy on its people — since people are planting the devices on themselves and even paying the monthly bills. The KGB never had anything like it. And, indeed, the U.S. government already appears to be sweeping up a lot of data from completely innocent people. The ACLU recently told Congress of a case in which, while looking for data on a suspect, the FBI apparently used a dragnet approach and took data on another 180 people. The FBI has said that if it does happen to gather data on innocent people in the course of conducting an investigation, it keeps that information for as long as 20 years....Last week, the Philadelphia-based U.S. Court of Appeals for the Third Circuit pushed back. A federal magistrate judge, in a good and strong decision, had ruled that the government must always get a warrant if it wants cell-phone data. The appeals court scaled that back a bit, ruling that magistrate judges have the power to require the government to get a warrant, depending on the facts of the particular case. The fight over cell-phone tracking is similar to one now going on in the courts over GPS devices — specifically, whether the government needs a warrant to place a GPS device on someone's car."
What Your Cell Phone Could Be Telling the Government
TIME, 15 September 2010

"iPhones generally store more data than other high-end phones -- and investigators such as Fazio frequently can tap in to that information for evidence. And while some phone users routinely delete information from their devices, that step is seldom as final as it seems. 'When you hit the delete button, it's never really deleted,' Fazio said. The devices can help police learn where you've been, what you were doing there and whether you've got something to hide. Former hacker Jonathan Zdziarski, author of iPhone Forensics (O'Reilly Media) for law enforcement, said the devices 'are people's companions today. They organize people's lives.' And if you're doing something criminal, something about it is probably going to go through that phone: • Every time an iPhone user closes out of the built-in mapping application, the phone snaps a screenshot and stores it. Savvy law-enforcement agents armed with search warrants can use those snapshots to see if a suspect is lying about whereabouts during a crime. • iPhone photos are embedded with GEO tags and identifying information, meaning that photos posted online might not only include GPS coordinates of where the picture was taken, but also the serial number of the phone that took it. • Even more information is stored by the applications themselves, including the user's browser history. That data is meant in part to direct custom-tailored advertisements to the user, but experts said some of it could be useful to police. Clearing out user histories isn't enough to clean the device of that data, said John B. Minor, a member of the International Society of Forensic Computer Examiners. Just as users can take and store a picture of their iPhone's screen, the phone itself automatically shoots and stores hundreds of such images as people close out one application to use another. 'Those screen snapshots can contain images of e-mails or proof of activities that might be inculpatory or exculpatory,' Minor said. • The keyboard cache logs everything that you type in to learn autocorrect so that it can correct a user's typing mistakes. Apple doesn't store that cache very securely, Zdziarski contended, so someone with know-how could recover months of typing in the order in which it was typed, even if the e-mail or text it was part of has long since been deleted."
Cops love iPhone data trail
Chicago Sun-Times, 1 August 2010

"Apple updated its privacy policy today, with an important, and dare we say creepy new paragraph about location information. If you agree to the changes, (which you must do in order to download anything via the iTunes store) you agree to let Apple collect store and share 'precise location data, including the real-time geographic location of your Apple computer or device.' Apple says that the data is 'collected anonymously in a form that does not personally identify you,' but for some reason we don't find this very comforting at all. There appears to be no way to opt-out of this data collection without giving up the ability to download apps."
Privacy Change: Apple Knows Where Your Phone Is And Is Telling People
The Consumerist, 21 June 2010

"Even though police are tapping into the locations of mobile phones thousands of times a year, the legal ground rules remain unclear, and federal privacy laws written a generation ago are ambiguous at best. On Friday, the first federal appeals court to consider the topic will hear oral arguments (PDF) in a case that could establish new standards for locating wireless devices. In that case, the Obama administration has argued that warrantless tracking is permitted because Americans enjoy no 'reasonable expectation of privacy' in their--or at least their cell phones'--whereabouts. U.S. Department of Justice lawyers say that 'a customer's Fourth Amendment rights are not violated when the phone company reveals to the government its own records' that show where a mobile device placed and received calls. Those claims have alarmed the ACLU and other civil liberties groups, which have opposed the Justice Department's request and plan to tell the U.S. Third Circuit Court of Appeals in Philadelphia that Americans' privacy deserves more protection and judicial oversight than what the administration has proposed. 'This is a critical question for privacy in the 21st century,' says Kevin Bankston, an attorney at the Electronic Frontier Foundation who will be arguing on Friday. 'If the courts do side with the government, that means that everywhere we go, in the real world and online, will be an open book to the government unprotected by the Fourth Amendment.'"
Feds push for tracking cell phones
CNET News, 11 February 2010

"We've heard a lot about security issues with the iPhone, but the BlackBerry isn't immune to threats from malicious apps. Tyler Shields, a senior researcher at the Veracode Research Lab, has written a piece of spyware that allowed me to shoot an SMS command to his phone and have his contact list forwarded to my e-mail address in a demonstration. With another short text command, I was able to get his BlackBerry to e-mail me any SMS messages he sends. And if I had wanted--and he had allowed me--I could have seen a log of all his calls, monitored his inbound text messages, tracked his location in real-time based on the GPS (Global Positioning System) in his device and turned his microphone on to listen to conversations in the room and record them. 'It's trivial to write this type of code using the mobile provider's own API [application programming interface] they provide to any developer,' Shields said in an interview in advance of his talk on the spyware scheduled for the ShmooCon security show on Sunday....He calls his program 'TXSBBSpy' and is releasing the source code but not an executable version of it. 'My goal is to show how easy it is to create mobile spyware,' he said. TXSBBSpy 'can take data from the phone, both in real-time and in snapshots, and send it off via SMS or e-mail to any Web server or TCP [Transmission Control Protocol] or UDP [User Diagram Protocol] network connections,' Shields said. While I was able to control the spyware using text messages sent from my mobile phone, the spyware had to be first installed on his BlackBerry for the snooping to work. This can be done by sending the target victim an e-mail or text with a link to a Web page where the spyware is surreptitiously installed. Or it can be hidden inside a legitimate-looking app downloaded from the App Store.  The risks are similar to those posed by Swiss researcher Nicolas Seriot in his iPhone spyware demo at the Black Hat DC security conference on Wednesday. 'These types of behaviors we're demonstrating will be universal across all mobile platforms,' Shields said."
BlackBerry has spyware risk too, researcher says
CNET News, 7 February 2010

Every MP Who Has An Extra-Martial Affair And A Mobile Phone Is Vulnerable To Blackmail
(About Half Of Them? - Even The Most Unlikely: John Major, John Prescott, Paddy Ashdown, etc)

"Coulsongate is throwing some very important light into a very murky area. It now seems clear that the police knew that the private investigator Glenn Mulcaire and the News of the World royal reporter Clive Goodman had illegally intercepted the voicemail messages of many more politicians, sportsmen, celebrities and others than just the 8 for which they were jailed.  The New York Times has quoted detectives, however,  as alleging they did not pursue these investigations because of their close relationship with Murdoch’s newspaper. This raises key questions about Britain’s power structure and how it works..... A central tenet of a civilised and democratic society is that the various power institutions – the political system, the banks and financial sector, industrial corporations, criminal justice and security services, and the media – must operate independently and at arm’s length from each other in a manner that is transparent and accountable.   If they are found covertly to collude with each other in order to give surreptitious and improper assistance to one of the other powerful forces in society, it is a very serious threat about which Parliament should be urgently demanding a thorough and comprehensive public inquiry."
Police in league with Murdoch?
Michael Meacher MP (Blog), 5 September 2010

Who Tipped Off The News Of The World?

"John Prescott tonight demanded the Metropolitan police reopen its investigation into the News of the World phone-hacking scandal as the Observer revealed that Scotland Yard holds News International documents suggesting that he was a target when deputy prime minister. Two invoices held by the Met mention Prescott by name. They appear to show that News International, owner of the NoW, paid Glenn Mulcaire, the private investigator at the heart of the scandal, for his help on stories relating to the deputy PM. Lord Prescott spoke of his anger that the information, spelled out in a letter from the Yard's legal services directorate, emerged only after he was given a series of personal reassurances by detectives at the highest level that there was 'no evidence' his phone may have been hacked. The invoices are both dated May 2006, at a time when Prescott was the subject of intense media scrutiny following revelations that he had had an affair with his secretary, Tracey Temple. There is also a piece of paper obtained from Mulcaire on which the name 'John Prescott' is written. The only other legible word on this document is 'Hull'."
John Prescott furious over unrevealed link to phone-hacking scandal
Guardian, 4 September 2010

"Mark Oaten is sitting in his eyrie in Westminster, wearing a blue and white striped shirt, sipping from a carton of Ribena and ruminating on the mental health of MPs. Three years ago this clean-cut Home Counties Liberal Democrat pin-up was exposed by the News of the World for making regular visits to rent boys. Overnight he saw his leadership ambitions destroyed and his marriage almost disintegrate."
Mark Oaten: my dark days should serve as a warning to other politicians
London Times, 19 September 2009

How Do We Know The 'Wilson Doctrine' Isn't Ignored Anyway?

"The resignation of Liberal Democrat Home Affairs spokesman Mark Oaten, due to revelations published in the News of the World tabloid should give people who are thinking about amending the 'Wilson Doctrine' administrative ban on the interception of the phone calls of Members of Parliament [by the intelligence services], plenty to consider. How can the public be sure that if Members of Parliament (and therefore also their Constituents) are put under electronic surveillance for 'security' purposes, that information on scandalous, though not illegal activities such as this, which would have been gleaned in this case, could not have been used for political purposes by those in power ? Will the Liberal Democrats still be united in their opposition to the Identity Cards Bill and the Terrorism Bill etc. after the resignations of Charles Kennedy and Mark Oaten ?"
Mark Oaten scandal and the Wilson Doctrine
Spyblog, 22 January 2006

What Can Be Used For Genuine Law Enforcement Can Also Be Used For Commercial And Political Surveillance
Don't Want To Be Bugged Or Followed Via Your Own Mobile Phone? Then Remove The Battery

"The FBI appears to have begun using a novel form of electronic surveillance.... The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the 'roving bug' was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone. Kaplan's opinion said that the eavesdropping technique 'functioned whether the phone was powered on or off.' Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.... 'If a phone has in fact been modified to act as a bug, the only way to counteract that is to either have a bugsweeper follow you around 24-7, which is not practical, or to peel the battery off the phone,' Atkinson said. Security-conscious corporate executives routinely remove the batteries from their cell phones, he added..... A BBC article from 2004 reported that intelligence agencies routinely employ the remote-activiation method. 'A mobile sitting on the desk of a politician or businessman can act as a powerful, undetectable bug,' the article said, 'enabling them to be activated at a later date to pick up sounds even when the receiver is down.'"
FBI taps cell phone mic as eavesdropping tool
CNet News, 1 December 2006


Surveillance Society
State Monitoring Of Legitimate Political Dissent

"FBI agents improperly opened investigations into Greenpeace and several other domestic advocacy groups following the Sept. 11 terror attacks in 2001, and put names of some of their members on terror watch lists with evidence that turned out to be 'factually weak,' the Department of Justice said Monday. However, the internal review by Inspector General Glenn Fine did not conclude that the FBI purposely targeted the groups or their members, as many civil liberties advocates had charged after anti-Iraq war rallies and other protests were held during the administration of President George W. Bush. Rather, Fine said, the FBI tactics appeared 'troubling' in singling out some of the domestic groups for investigations that ran for up to five years, and were extended 'without adequate basis.' He also questioned why the FBI continued to maintain investigative files against the groups."
FBI began probes of Greenpeace, other groups, after 9/11
McClatchy-Tribune News Service, 20 September 2010

"An obscure York nonprofit with ties to Philadelphia University and Jerusalem is behind the state Homeland Security agency's monitoring of protesters, environmentalists and gays, documents show. The Institute of Terrorism Research and Response is headed by Michael Perelman, who formerly worked for the York City Police Department, and Aaron Richman, a former police captain in the Israeli capital, according to filings with the Pennsylvania Department of State. Gov. Ed Rendell apologized Tuesday after the disclosure that the state Office of Homeland Security paid the institute $125,000 for weekly reports the agency used to put Marcellus shale hearings and a gay and lesbian festival on terror watch lists for law enforcement. 'We are appalled at what we have learned so far about these reports,' said Witold Walczak, legal director for the ACLU of Pennsylvania. 'It all smacks of J. Edgar Hoover. Saying that no harm was done is simplistic. Just raising questions about a group or a person can cause harm. Dissent does not equal danger.' Perelman declined to comment but provided a statement that explained in general terms what his organization does..."
Ex-police devised 'terror list' in Pennsylvania
Pittsburg Tribune-Review, 16 September 2010

Who's Trying To Scare The Public The Most? The Terrorists Or The Authorities?
FBI Helps Ineffectual Loner With 'Weapon Of Mass Destruction'

"A Somali-born teenager who thought he was detonating a car bomb at a packed Christmas tree-lighting ceremony downtown here was arrested by the authorities on Friday night after federal agents said that they had spent nearly six months setting up a sting operation. The bomb, which was in a van parked off Pioneer Courthouse Square, was a fake - planted by F.B.I. agents as part of the elaborate sting - but 'the threat was very real,' Arthur Balizan, the F.B.I.'s special agent in charge in Oregon, said in a statement released by the Department of Justice. An estimated 10,000 people were at the ceremony on Friday night, the Portland police said. Mr. Balizan identified the suspect as Mohamed Osman Mohamud, 19, a naturalized United States citizen. He graduated from Westview High School in Beaverton, Ore., a Portland suburb, and had been taking classes at Oregon State in Corvallis until Oct. 6, the university said Saturday. Mr. Mohamud was charged with trying to use a weapon of mass destruction. ... The F.B.I.'s surveillance started in August 2009 after agents intercepted his e-mails with a man he had met in Oregon who had returned to the Middle East, according to a law enforcement official who described the man as a recruiter for terrorism. According to the affidavit, the man had moved to Yemen and then northwest Pakistan, a center of terrorism activity. Mr. Mohamud was then placed on a watch list and stopped at the Portland airport in June 2010 when he tried to fly to Alaska for a summer job. Later in June, aware of Mr. Mohamud's frustrated attempts to receive training as a jihadist overseas, an undercover agent first made contact with him, posing as an associate of the man in Pakistan. On the morning of July 30, the F.B.I. first met with Mr. Mohamud in person to initiate the sting operation..... For the next several weeks, the F.B.I. let the plot play out, assisting Mr. Mohamud with the details, providing him with cash, scoping out a parking spot near the square, sketching out the plan on paper. At the end of September, Mr. Mohamud mailed bomb components to agents he thought were fellow operatives who would assemble the device. Planning to leave the country afterward, he sent passport pictures to the undercover agent. On Nov. 4, Mr. Mohamud went with undercover agents to a remote spot where they exploded a bomb in a backpack. .... Although Mr. Mohamud's arrest marks another episode in which a Somali-American has been accused of radical attempts at violence, there was no evidence that Mr. Mohamud had any current link to Somalia or was a sympathizer of the Shabab, a militant Islamic group in Somalia. And despite Mr. Mohamud's contacts with militants abroad, officials said he appeared to have acted alone in his pursuit of the bombing here. In a similar case in September 2009, a 19-year-old Jordanian was arrested after placing a fake bomb [supplied by the FBI] at a 60-story Dallas skyscraper. "
F.B.I. Says Oregon Suspect Planned Grand Attack
New York Times, 27 November 2010

'It Can't Happen Here'

"The FBI improperly opened investigations into Greenpeace and other animal rights and anti-war groups after the September 11 attacks of 2001, the US government has admitted. Inspector-General Glenn Fine said the FBI tactics were 'troubling' because they singled out some of domestic groups for investigations that ran for up to five years and were extended 'without adequate basis'. He said: 'In several cases there was little indication of any possible federal crimes. In some cases, the FBI classified some investigations relating to non-violent civil disobedience under its Acts of Terrorism classification.' As well as Greenpeace, groups that were investigated included People for the Ethical Treatment of Animals and anti-war groups the Catholic Worker and the Thomas Merton Centre in Pittsburgh."
FBI investigated Greenpeace for terror links after 9/11
Daily Telegraph, 21 September 2010

"Pennsylvania lawmakers plan to investigate claims that a company hired to provide information to the state's Office of Homeland Security was gathering information on groups who staged various protests and rallies. The Senate Veterans Affairs and Emergency Preparedness Committee has scheduled a Sept. 27 hearing in Harrisburg regarding the Institute of Terrorism Research and Response. Committee chair Sen. Lisa Baker, R-Luzerne, said she wants to know if people were targeted for exercising their rights of free speech and assembly. Gov. Ed Rendell on Tuesday apologized to the groups, who became the subject of regular anti-terrorism bulletins distributed by his homeland security director, James Powers. The governor said he was embarrassed to learn of the bulletins, and added he's canceling a $125,000 contract with the Philadelphia-based company. He did not fire Powers. The bulletins were shared with representatives of the natural gas industry because of concern over acts of vandalism at wells in the Marcellus Shale region."
Pa. Lawmakers to investigate security bulletins
ABC News, 18 September 2010

"A Liberal Democrat adviser to Nick Clegg has called on Scotland Yard to explain why it held his details as well as Clegg’s name on a secret police database. Fiyaz Mughal, who advises the deputy prime minister on combating violent extremism, wrote to Sir Paul Stephenson, the Metropolitan police commissioner, last week demanding to know why surveillance officers logged his identity on the database after he spoke at a peaceful rally in Trafalgar Square. A spokesman for Clegg, who will be running the country this week while David Cameron is on holiday, said he would look into the matter. Details of the surveillance appear on a police criminal intelligence report of a rally last year to protest against the BBC’s refusal to broadcast a charity appeal for Gaza. A team of surveillance officers from the forward intelligence team of the Met’s public order unit were watching the demonstration to gather information about various protesters linked to groups including Stop the War and the Socialist Workers party. Although they were spying only on the demonstrators, they noted the presence of several speakers. One of them was Mughal, who was identified in the log as 'the inter-faith adviser to Nick Clegg of the Liberal Democrats'. Another was Jeremy Corbyn, the Labour MP for Islington North. Corbyn was unavailable for comment this weekend. But Mughal expressed his fury in a letter to Stephenson. 'It seems that simply speaking at a lawful demonstration warrants a criminal intelligence report,' he wrote. 'Such activity by the Met, in my opinion, is tantamount to an intrusion into the human and civil rights of citizens who are undertaking their legitimate right to demonstrate.' Shami Chakrabarti, director of Liberty, the human rights group, said the Met needed stricter controls on what information is placed in databases. 'It is bad enough that swaggering officers from so-called ‘forward intelligence’ use aggressive photography and other tactics to discourage peaceful protest and turn activists into enemies of the state,' she said."
Clegg aide on secret Yard database
Sunday Times, 15 August 2010

"The Archbishop of York yesterday revealed he has been stopped and searched by police eight times, as he warned new anti-terrorist powers are a threat to civil liberties. Dr John Sentamu said police should not be able to ask for someone's bank accounts to be frozen merely because they are suspected of terrorism. The Ugandan-born Archbishop told peers that he had been stopped and searched by officers because he had been suspected of crime, warning that the new asset-freezing law could lead to people losing their money and property just because their faces did not fit. His warning is likely to carry weight with ministers because of his powerful record both as an opponent of racism and a critic of left-wing 'multiculturalism'. Dr Sentamu, who is second to the Archbishop of Canterbury in the Church of England hierarchy, was speaking in the Lords on the Terrorist Asset-Freezing Bill. The law, which is not opposed by Labour, would allow the courts to freeze assets on 'reasonable suspicion' that someone is a terrorist, rather than the more demanding rules that there must be a 'reasonable belief' of their involvement in terrorism. Revealing his experience of being stopped and searched, the Archbishop said: 'When the policeman suddenly realised that I was a bishop, that didn't stop me being stopped and searched.' And he claimed that such police checks were often on the basis of 'he doesn't look like one of us'."
Archbishop of York Dr John Sentamu stopped and searched by police EIGHT times
Daily Mail, 28 July 2010

Scaring The Public And Raiding The Homes Of Anti-War Activists

"Ever since 911 we've been reminded to remain vigilant while engaging in the routines of our daily lives. But aside from the few failed bomb plots, very little has happened to hold us in a constant state of alert. So it's easy to imagine most people have become complacent and even cynical about the so-called heightened state of security around the country. It's not cynicism though to think DHS Secretary Janet Napolitano is hyperventilating when she says that this new initiative 'is a crucial step in helping the millions of people who work in or visit our federal buildings every day identify and report suspicious activity indicators of terrorism, crime and other threats.' Federal buildings don't need citizen surveillance monitors. They're already under the watchful eyes of trained security personnel. Nor have they been the site of any serious terrorist attacks since security protocols came into effect after the 1995 Oklahoma City bombing. The problem isn't just that DHS is trying to breathe life into George Orwell's fictional Big Brother. Look at the record for New York City where the 'See Something, Say Something' program was first implemented. According to the New York Times, more than 16,000 calls were made to the city's counter-terrorism hotline last year. It's reasonable to conclude that few of those reports, if any, led to arrests or prevented an act of terrorism. Otherwise they would have been front page news like the Times Square car bomb attempt last June and the Christmas tree bomb plot in Portland four weeks ago. So what happens to the rest of the reports? How much law enforcement time is wasted checking out unusual but entirely benign situations? This month alone authorities shut down mass transit stations in Washington DC and Salt Lake City because someone reported seeing suspicious packages. Their investigations uncovered a blinking Christmas tree ornament and a homeless person's pillow. And a few days before Christmas TSA evacuated the Lafayette Regional Airport in Louisiana while investigating a package that turned out to be a frozen chicken with crawfish stuffing. Meanwhile, as Americans were calling in thousands of reports that led nowhere, the FBI was busy in September raiding the homes of anti-war activists in Chicago and Minneapolis."
Critical intelligence: Is it lost?
Juneau Empire, 29 December 2010


Surveillance Society Developments
In Britain

'Vast Government Databases'

"Britain is heading for a new surveillance state of unmanned spy drones, GPS tracking of employees and profiling through social networking sites, the information watchdog has warned. The relentless march of the surveillance society has seen snooping techniques 'intensify and expand' at such a pace that regulators are struggling to keep up, according to Christopher Graham, the Information Commissioner. Despite moves by the Coalition Government to row back intrusions of privacy, a new wave of monitoring risks making the spy state greater than ever. Mr Graham's predecessor warned in 2006 that the UK could be 'sleepwalking into a surveillance society' and an updated report for him today said such concerns are 'no less cogent' in 2010..... It said that 'visual, covert, database and other forms of surveillance have proceeded apace' and that much of it 'goes beyond the limits of what is tolerable in a society'. Britons are already the most watched citizens in the democratic world because of an army of surveillance systems including CCTV, cameras that track vehicles, vast Government databases and the sharing of personal data such as air passenger details."
Warning of new era of surveillance state
Daily Telegraph, 12 November 2010

"Every email, phone call and website visit is to be recorded and stored after the Coalition Government revived controversial Big Brother snooping plans. It will allow security services and the police to spy on the activities of every Briton who uses a phone or the internet. Moves to make every communications provider store details for at least a year will be unveiled later this year sparking fresh fears over a return of the surveillance state. The plans were shelved by the Labour Government last December but the Home Office is now ready to revive them. It comes despite the Coalition Agreement promised to 'end the storage of internet and email records without good reason'. Any suggestion of a central 'super database' has been ruled out but the plans are expected to involve service providers storing all users details for a set period of time. That will allow the security and police authorities to track every phone call, email, text message and website visit made by the public if they argue it is needed to tackle crime or terrorism. The information will include who is contacting whom, when and where and which websites are visited, but not the content of the conversations or messages.... Isabella Sankey, director of policy at Liberty, said: 'One of the early and welcome promises of the new Government was to ‘end the blanket storage of internet and email records’.  'Any move to amass more of our sensitive data and increase powers for processing would amount to a significant U-turn. The terrifying ambitions of a group of senior Whitehall technocrats must not trump the personal privacy of law abiding Britons.' Guy Herbert, general secretary of the No2ID campaign group, said: 'We should not be surprised that the interests of bureaucratic empires outrank liberty.  It is disappointing that the new ministers seem to be continuing their predecessors' tradition of credulousness.'"
Every email and website to be stored
Daily Telegraph, 20 October 2010

"The Home Office has created a new unit to oversee a massive increase in surveillance of the internet, The Register has learned, quashing suggestions the plans are on hold until after the election. The new Communications Capabilities Directorate (CCD) has been created as a structure to implement the £2bn Interception Modernisation Programme (IMP), sources said. The CCD is staffed by the same officials who have have been working on IMP since 2007, but it establishes the project on a more formal basis in the Home Office. It is not yet included on the Home Office's list of directorates. The intelligence and law enforcement agencies have pushed hard for new laws to force communications providers to store details of who contacts whom, when, where and how via the internet. However, following a consultation last year, when the Home Office's plans were heavily criticised by ISPs and mobile companies, it was widely assumed progress on IMP would slow or stop. The CCD has continued meeting with industry to try to allay concerns about the project's costs, effect on customer privacy and technical feasibility.....Officials envisage communications providers will maintain giant databases of everything their customers do online, incluing email, social networking, web browsing and making VoIP calls. They want providers to process the mass of data to link it to individuals, to make it easier for authorities to access. Access to communications data is currently governed by the Regulation of Investigatory Powers Act. Under European legslation ISPs are required to retain basic information about what their customers do online, but not to open their data packets to record who they contact on Facebook, for example."
Home Office spawns new unit to expand internet surveillance
The Register, 28 January 2010

"Internet users are being spied on in their own home as the Government uses the threat of terrorism and the spread of child pornography to justify launching a dramatic expansion of surveillance society, according to a leading academic. The authorities have taken 'advantage of the terrorist bombing in London' to erode civil liberties, according to Professor Ian Walden, an expert on internet communication and online security. He said today’s 'Orwellian' surveillance of our online habits was even more intrusive than the introduction of CCTV on Britain's streets. You can now hide cameras but generally cameras are a physical manifestation of surveillance. With the internet, you are sitting at home which you think is private, but of course it is declared a public space because your service provider knows everywhere you’ve gone, everything you’ve downloaded, it knows everything, potentially', he told The Daily Telegraph. His comments come after the Government announced it was pressing ahead with privately held 'Big Brother' databases that opposition leaders said amounted to 'state-spying' and a form of 'covert surveillance' on the public. The police and security services are set to monitor every phone call, text message, email and website visit made by private citizens. The details are set to be stored for a year and will be available for monitoring by government bodies. All telecoms companies and internet service providers will be required by law to keep a record of every customer's personal communications, showing who they have contacted, when and where, as well as the websites they have visited. Ministers had originally wanted to store the information on a single government run database, but backed down after privacy concerns were raised. 'Once happy to leave cyberspace ‘unregulated’, Governments, including that of the UK, seem increasingly willing to encroach on what we do, say and see over the Internet,' said Professor Walden, head of the Institute of Computer and Communications Law at Queen Mary, University of London. He warned that increasing use of social networking sites such as Facebook and Twitter will give the authorities access to information about individuals' private lives....Professor Walden, a former trustee on the Internet Watch Foundation, the industry self regulatory body, said that problems such as child pornography, illegal file sharing and terrorism are used to justify ‘Big Brother-like’ scrutiny of all internet activity, even though the vast majority of web users are law abiding. 'The police clearly took advantage of the terrorist bombing in London to get an agenda, which has been around for years, pushed to the forefront' he said. 'They would never have got Government support for data retention, which became a European issue, without the Madrid and London bombings.' The 2004 Madrid bombers used one shared web based email account to make plans, rather than exchanging messages that could be intercepted....'Concerns from civil liberty groups are we will lose the liberties that we thought we had without necessarily notifying us. Why does the data on all of us have to be retained in order to find out about those that are bad?' He highlighted the danger of laws created to catch dangerous criminals later being manipulated to spy on millions on households. Local councils have been criticised for using anti-terrorism (RIPA) laws to snoop on residents suspected of littering and dog fouling offences. 'My concern is that its easy policy-making… if you say it’s against terrorism and it’s against child pornography then nobody is going to say no.' His comments echo those made by Dame Stella Rimington, the former head of MI5, who last year accused ministers of interfering with people's privacy and playing straight into the hands of terrorists, by creating a 'police state'. The shift towards greater state control of online content, and how it will impinge on our rights, will be discussed by Professor Walden in his inaugural lecture at Queen Mary, University of London on Wednesday 3 February 2010."
Terrorism and child pornography used to justify surveillance society, says academic
Telegraph, 23 January 2010

"The huge Commons majority he [Blair] enjoyed, the craven pusillanimity of his party, the implosion of the Conservatives and the consequent absence of opposition, other than in the Lords – and, to an extent, in the courts – conspired with a genuine, though irrational, fear of terrorism and rising street crime to let the State take greater control over the citizen than it has enjoyed before in modern peacetime..... Maya Evans found this out when she stood by the Cenotaph to recite the names of Britain’s Iraqi war dead. For this she was arrested, arraigned and left with a criminal record. It is hard to conceive of a police officer a generation ago taking any notice of her since she was causing no public order problem at all. But Ms Evans had fallen foul of a clause in the Serious and Organised Crime and Police Act which established a one kilometre zone around the Palace of Westminster, within whose boundaries political criticism can be voiced only on application to the Commissioner of the Metropolitan Police.... recent research has uncovered 266 separate powers under which the police and other state agents can enter your home, often using force to do so.... As Peter Lilley, the former minister who led the Cabinet revolt that resulted in the abandonment of the last ID scheme, observed: 'There is no policy that has been hawked, unsold, around Whitehall for longer than identity cards. It was always brought to us as a solution looking for problems.' September 11 and the threat from international terrorism was the problem it had most been looking for.... There are people who remember carrying the old wartime ID cards, scrapped in 1952, and cannot see what all the fuss is about. It is about the database, not the card. This is not about protecting our identities but about placing them at the disposal of the state and sundry other organisations that will have access to them. .... this extension of state control through the unfettered and unthinking deployment of modern surveillance technology and databases for which the Blair years (and those of his successor, unless he does something dramatic to change course) will most be remembered. Our children, and theirs, will be perplexed as to why their forebears came so easily, and with so little public debate, to allow the State to manipulate their lives."
Philip Johnston, home affairs editor and assistant editor of The Daily Telegraph
The Charles Douglas-Home Essay, 2007 - 'Are we a free country any more?'
London Times, 20 July 2007


Surveillance Society Developments
In America

"Robert S. Mueller III, the director of the Federal Bureau of Investigation, traveled to Silicon Valley on Tuesday to meet with top executives of several technology firms about a proposal to make it easier to wiretap Internet users. Mr. Mueller and the F.B.I.’s general counsel, Valerie Caproni, were scheduled to meet with senior managers of several major companies, including Google and Facebook, according to several people familiar with the discussions. How Mr. Mueller’s proposal was received was not clear. 'I can confirm that F.B.I. Director Robert Mueller is visiting Facebook during his trip to Silicon Valley,' said Andrew Noyes, Facebook’s public policy manager. Michael Kortan, an F.B.I. spokesman, acknowledged the meetings but did not elaborate. Mr. Mueller wants to expand a 1994 law, the Communications Assistance for Law Enforcement Act, to impose regulations on Internet companies. The law requires phone and broadband network access providers like Verizon and Comcast to make sure they can immediately comply when presented with a court wiretapping order. Law enforcement officials want the 1994 law to also cover Internet companies because people increasingly communicate online. An interagency task force of Obama administration officials is trying to develop legislation for the plan, and submit it to Congress early next year. The Commerce Department and State Department have questioned whether it would inhibit innovation, as well as whether repressive regimes might harness the same capabilities to identify political dissidents, according to officials familiar with the discussions. Under the proposal, firms would have to design systems to intercept and unscramble encrypted messages. Services based overseas would have to route communications through a server on United States soil where they could be wiretapped."
F.B.I. Seeks Wider Wiretap Law for Web
New York Times, 16 November 2010

"Law enforcement and counterterrorism officials, citing lapses in compliance with surveillance orders, are pushing to overhaul a federal law that requires phone and broadband carriers to ensure that their networks can be wiretapped, federal officials say. The officials say tougher legislation is needed because some telecommunications companies in recent years have begun new services and made system upgrades that caused technical problems for surveillance. They want to increase legal incentives and penalties aimed at pushing carriers like Verizon, AT&T, and Comcast to ensure that any network changes will not disrupt their ability to conduct wiretaps. An Obama administration task force that includes officials from the Justice and Commerce Departments, the F.B.I. and other agencies recently began working on draft legislation to strengthen and expand the Communications Assistance to Law Enforcement Act, a 1994 law that says telephone and broadband companies must design their services so that they can begin conducting surveillance of a target immediately after being presented with a court order."
Officials Push to Bolster Law on Wiretapping
New York Times, 18 October 2010

"Developers of email, instant-messaging and voice-over-internet-protocol applications would be forced to redesign their services so their contents can be intercepted by law enforcement agents armed with legal wiretap orders under federal legislation reported on Monday by The New York Times. The legislation would, among other things, require cellphone carriers, websites and other types of service providers to have a way to unscramble encrypted communications traveling over their networks, the report said. It specifically mentions companies such as Research in Motion and Skype, which are popular in part because their cellular communications and VoIP services respectively are widely regarded as offering robust encryption that's impractical if not impossible for government agents to crack."
Feds want backdoors built into VoIP and email
The Register, 27 September 2010

"Federal law enforcement and national security officials are preparing to seek sweeping new regulations for the Internet, arguing that their ability to wiretap criminal and terrorism suspects is 'going dark' as people increasingly communicate online instead of by telephone. Essentially, officials want Congress to require all services that enable communications — including encrypted e-mail transmitters like BlackBerry, social networking Web sites like Facebook and software that allows direct 'peer to peer' messaging like Skype — to be technically capable of complying if served with a wiretap order. The mandate would include being able to intercept and unscramble encrypted messages. The bill, which the Obama administration plans to submit to lawmakers next year, raises fresh questions about how to balance security needs with protecting privacy and fostering innovation. And because security services around the world face the same problem, it could set an example that is copied globally."
U.S. Tries to Make It Easier to Wiretap the Internet
New York Times, 27 September 2010

"Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go. This doesn't violate your Fourth Amendment rights, because you do not have any reasonable expectation of privacy in your own driveway - and no reasonable expectation that the government isn't tracking your movements. That is the bizarre - and scary - rule that now applies in California and eight other Western states. The U.S. Court of Appeals for the Ninth Circuit, which covers this vast jurisdiction, recently decided the government can monitor you in this way virtually anytime it wants - with no need for a search warrant. It is a dangerous decision - one that, as the dissenting judges warned, could turn America into the sort of totalitarian state imagined by George Orwell. It is particularly offensive because the judges added insult to injury with some shocking class bias: the little personal privacy that still exists, the court suggested, should belong mainly to the rich.... if government agents can track people with secretly planted GPS devices virtually anytime they want, without having to go to a court for a warrant, we are one step closer to a classic police state — with technology taking on the role of the KGB or the East German Stasi. Fortunately, other courts are coming to a different conclusion from the Ninth Circuit's — including the influential U.S. Court of Appeals for the District of Columbia Circuit. That court ruled, also this month, that tracking for an extended period of time with GPS is an invasion of privacy that requires a warrant. The issue is likely to end up in the Supreme Court."
The Government Can Use GPS to Track Your Moves
TIME, 25 August 2010

"The Obama administration is seeking to make it easier for the FBI to compel companies to turn over records of an individual's Internet activity without a court order if agents deem the information relevant to a terrorism or intelligence investigation. The administration wants to add just four words -- 'electronic communication transactional records' -- to a list of items that the law says the FBI may demand without a judge's approval. Government lawyers say this category of information includes the addresses to which an Internet user sends e-mail; the times and dates e-mail was sent and received; and possibly a user's browser history. It does not include, the lawyers hasten to point out, the 'content' of e-mail or other Internet communication. But what officials portray as a technical clarification designed to remedy a legal ambiguity strikes industry lawyers and privacy advocates as an expansion of the power the government wields through so-called national security letters. These missives, which can be issued by an FBI field office on its own authority, require the recipient to provide the requested information and to keep the request secret. They are the mechanism the government would use to obtain the electronic records."
White House proposal would ease FBI access to records of Internet activity
Washington Post, 29 July 2010

"Should President Obama have the power to shut down domestic Internet traffic during a state of emergency? Senators John Rockefeller (D-W. Va.) and Olympia Snowe (R-Maine) think so. On Wednesday they introduced a bill to establish the Office of the National Cybersecurity Advisor—an arm of the executive branch that would have vast power to monitor and control Internet traffic to protect against threats to critical cyber infrastructure. That broad power is rattling some civil libertarians. The Cybersecurity Act of 2009 (PDF) gives the president the ability to 'declare a cybersecurity emergency' and shut down or limit Internet traffic in any 'critical' information network 'in the interest of national security.' The bill does not define a critical information network or a cybersecurity emergency. That definition would be left to the president. The bill does not only add to the power of the president. It also grants the Secretary of Commerce 'access to all relevant data concerning [critical] networks without regard to any provision of law, regulation, rule, or policy restricting such access.' This means he or she can monitor or access any data on private or public networks without regard to privacy laws....The cybersecurity threat is real,' says Leslie Harris, head of the Center for Democracy and Technology (CDT), 'but such a drastic federal intervention in private communications technology and networks could harm both security and privacy.' The bill could undermine the Electronic Communications Privacy Act (ECPA), says CDT senior counsel Greg Nojeim. That law, enacted in the mid '80s, requires law enforcement seek a warrant before tapping in to data transmissions between computers. 'It's an incredibly broad authority,' Nojeim says, pointing out that existing privacy laws 'could fall to this authority.' Jennifer Granick, civil liberties director at the Electronic Frontier Foundation, says that granting such power to the Commerce secretary could actually cause networks to be less safe. When one person can access all information on a network, 'it makes it more vulnerable to intruders,' Granick says. 'You've basically established a path for the bad guys to skip down.'"
Should Obama Control the Internet?
Mother Jones, 2 April 2009


How Will You Feel When The Day Comes
That Google Is Obliged To Hand Its Records Over To The State?

Does Google Really Collect Information On As An Anonymous Basis As It Claims?

"It's not just the state. If it wanted to, Google could overthrow any country in the world. Google has enough dirt to destroy every marriage in America.... I love Google. And I love the people there. Sergey Brin and Larry Page are cool. But I'm terrified of the next generation that takes over. A benevolent dictatorship is still a dictatorship. At some point people are going to realize that Google has everything on everyone. "
Jacob Appelbaum, the only known American member of Wikileaks
The American Wikileaks Hacker
Rolling Stone, 1 December 2010

"....online stalking is prompted by tiny files hidden inside... computers. These secretly identify their age, location, favourite movies, love of gadgets, the books they buy — sometimes even the words they type into websites. This data is packaged and sold to companies seeking customers. Welcome to the shadowy world of 'behavioural advertising', where the tastes, dreams, desires and family size of unsuspecting internet users are for sale to advertisers and even governments. ... How does it work? At its heart the technique relies on innocuous-sounding programs or software called cookies and beacons. They are either dumped onto your computer or identify it (and you) when you log onto a website. This allows all your movements on the internet to be tracked, often in real time.... Last week The Wall Street Journal tested the world’s top 50 websites to find out just how many cookies, beacons and other trackers they fed into your computer. The 50 sites installed 3,180 tracking files on a test computer used in the survey. Only one, the online encyclopedia Wikipedia, installed none. One of those studied, the search engine Google, insisted last week that it did not store details of what individuals searched for, other than anonymously. So if you searched for something such as 'hair loss treatments', it would not sell on that information to interested parties. However, users of Google’s email service have been astonished by its seeming perspicacity....When you visit the auction site eBay or the travel site Expedia, information about what you were looking for and some basic information on the sort of person you are will be auctioned within seconds on a data exchange run by BlueKai, a Seattle-based firm. Every day BlueKai sells 50m pieces of information about individuals’ browsing habits so that advertisers can respond immediately. 'Advertisers have always collected information on people,' according to Emma Wilson, managing director of Harvest Digital, an ad agency. 'In the last year or so that has multiplied exponentially. You don’t know the specifics of each person — no one has my name and address, for instance — but ads that know my age, where I live and what I buy can follow me around Facebook or track me across the internet.' Some tracking companies pair up your online behaviour with data from other sources about household income, geography, family size and education to make well informed guesses in real time about what you might be about to do — or how much you might be able to spend — and sell those conclusions....Advertisers argue that the information they collect is anonymous but Professor Lilian Edwards, who teaches internet law at Sheffield University, warns that 'it is incredibly easy to de-anonymise data. If you are a household with more than an average number of children, for example, you are very easy to identify.'.... Data monitoring of this kind has alarmed campaigners for some time. In 2004 Richard Thomas, the then information commissioner, whose job it is to protect the public’s private information, sounded an urgent warning: 'My anxiety is that we are sleepwalking into a surveillance society where much more information is collected about people, accessible to far more people shared across many more boundaries than British society would feel comfortable with.' Edwards fears that that point has already arrived. 'Things have got desperately out of control,' she said. 'The problem isn’t just the ads, it’s the entire database held on you and how that database is combined with external research using quantitative methods. How do you know they haven’t made two plus two equal five? You may be branded a credit risk or affiliated with terrorist organisations without knowing it. And once it’s out, it is very, very hard to put the genie back in the bottle.' There is no doubt governments are in the market for this kind of data. Last week Saudi Arabia and the United Arab Emirates announced that they would ban some services available on BlackBerry smartphones. The problem was that the encryption on the phones was so good that it made it very difficult for the governments to spy on people’s email messages. Most observers agree that many people are unaware they can opt out of the constant monitoring and also that the means of doing so is too complex. Until recently the social media site Facebook required users to click 50 times to activate privacy settings."
Every click you make they’ll be watching you
Sunday Times, 8 August 2010

"One of the fastest-growing businesses on the Internet, a Wall Street Journal investigation has found, is the business of spying on Internet users. The Journal conducted a comprehensive study that assesses and analyzes the broad array of cookies and other surveillance technology that companies are deploying on Internet users. It reveals that the tracking of consumers has grown both far more pervasive and far more intrusive than is realized by all but a handful of people in the vanguard of the industry. • The study found that the nation's 50 top websites on average installed 64 pieces of tracking technology onto the computers of visitors, usually with no warning. A dozen sites each installed more than a hundred. The nonprofit Wikipedia installed none. • Tracking technology is getting smarter and more intrusive. Monitoring used to be limited mainly to 'cookie' files that record websites people visit. But the Journal found new tools that scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them. • These profiles of individuals, constantly refreshed, are bought and sold on stock-market-like exchanges that have sprung up in the past 18 months. The new technologies are transforming the Internet economy. Advertisers once primarily bought ads on specific Web pages—a car ad on a car site. Now, advertisers are paying a premium to follow people around the Internet, wherever they go, with highly specific marketing messages. In between the Internet user and the advertiser, the Journal identified more than 100 middlemen—tracking companies, data brokers and advertising networks—competing to meet the growing demand for data on individual behavior and interests."
The Web's New Gold Mine: Your Secrets
Wall St Journal, 30 July 2010

"The Ministry of Truth was how George Orwell described the mechanism used by government to control information in his seminal novel 1984. A recent trip to Europe has convinced me that the governments of the world have been rocked by the power of the internet and are seeking to gain control of it so that they will have a virtual monopoly on information that the public is able to access. In Italy, Germany, and Britain the anonymous internet that most Americans are still familiar with is slowly being modified. If one goes into an internet café it is now legally required in most countries in the European Union to present a government issued form of identification. When I used an internet connection at a Venice hotel, my passport was demanded as a precondition and the inner page, containing all my personal information, was scanned and a copy made for the Ministry of the Interior -- which controls the police force. The copy is retained and linked to the transaction. For home computers, the IP address of the service used is similarly recorded for identification purposes. All records of each and every internet usage, to include credit information and keystrokes that register everything that is written or sent, is accessible to the government authorities on demand, not through the action of a court or an independent authority. That means that there is de facto no right to privacy and a government bureaucrat decides what can and cannot be 'reviewed' by the authorities. Currently, the records are maintained for a period of six months but there is a drive to make the retention period even longer.... all of the arguments for intervention are essentially themselves fraudulent and are in reality being exploited by those who favor big government and state control. The anonymity and low cost nature of the internet means that it can be used to express views that are unpopular or unconventional, which is its strength. It is sometimes used for criminal behavior because it is a mechanism, not because there is something intrinsic in it that makes it a choice of wrongdoers. Before it existed, fraud was carried out through the postal service and over the telephone. Pornography circulated freely by other means. As for the security argument, the tiny number of actual terrorists who use the internet do so because it is there and it is accessible. If it did not exist, they would find other ways to communicate, just as they did in pre-internet days. In fact, intelligence sources report that internet use by terrorists is rare because of persistent government monitoring of the websites..... The real reason for controlling the internet is to restrict access to information, something every government seeks to do. If the American Departments of Defense and Homeland Security and Senator Lieberman have their way, new cybersecurity laws will enable Obama's administration to take control of the internet in the event of a national crisis. How that national crisis might be defined would be up to the White House but there have been some precedents that suggest that the response would hardly be respectful of the Bill of Rights. Many countries already monitor and censor the internet on a regular basis, forbidding access to numerous sites that they consider to be subversive or immoral. During recent unrest, the governments of both Iran and China effectively shut down the internet by taking control of or blocking servers.... As this article was being written, a story broke reporting that Wordpress host Blogetery had been shut down by United States authorities along with all 73,000 Blogetery-hosted blogs. The company's ISP is claiming that it had to terminate Blogetery's account immediately after being ordered to do so by law enforcement officials 'due to material hosted on the server.' The extreme response implies a possible presumed terrorist connection, but it is important to note that no one was charged with any actual offense, revealing that the government can close down sites based only on suspicion. It is also likely only a matter of time before Obama's internet warfare teams surface either at the Defense Department or at State. Deliberately overloading and attacking the internet to damage its credibility, witness the numerous sites that have been 'hacked' and have had to cease or restrict their activities. But the moves afoot to create a legal framework to completely shut the internet down and thereby control the 'message' are far more dangerous. American citizens who are concerned about maintaining their few remaining liberties should sound the alarm and tell the politicians that we don't need more government abridgement of our First Amendment rights."
Philip Giraldi - Former CIA Counter-Terrorism Officer
Obama's War on the Internet
Campaign For Liberty, 19 July 2010
Video - Former CIA officer Philip Giraldi on 'Spying on Americans' - Click Here

"Every Google web search could be stored for up to two years under a controversial new EU plan that has the backing of more than 300 Euro-MEPs. 'Written Declaration 29' is intended to be used as an early warning system to stop paedophiles by logging what they look for using search engines. But civil liberty groups have hit out at the proposal which they say is a 'completely unjustifiable' intrusion into citizens' privacy. And they claim that there is no evidence that it would even be effective in trapping paedophiles who would never use search engines like Google to look for child pornography. The declaration, sponsored by an Italian and a Slovakian MEP, claims that it is 'essential to ensure that the internet continues to afford a high level of virtual democracy, which does not present any threat to women and children.' The motion asks for Directive 2006/24/EC to be extended to all web search engines, which would include Google, as part of a European early warning system for paedophiles. The directive came into effect in the March following the 2005 London terror attacks and lets EU member states monitor and store personal emails and other internet activity for up to two years for counter-terrorism puposes. Simon Davies, director of Privacy International which campaigns for tougher privacy laws, said: 'Most paedophiles operate through chatrooms and private communication rather than search engines like Google so they would not be affected,' he added."
Every Google search to be logged and saved for two years under new Euro MP plan
Daily Mail, 7 June 2010

Keep Up To Date With Developments With 'Surveillance Society News'
Click Here


'We Need A New Way Of Thinking' - Consciousness-Based Education


NLPWESSEX, natural law publishing
nlpwessex.org