NLPWESSEX, natural law publishing |
nlpwessex.org |
|
|
SURVEILLANCE SOCIETY NEWS ARCHIVE - 2008 To 2011 | ||
To Go Direct To Current Surveillance News Reports - Click Here To Go Direct To 2008 - 2011 Surveillance News Reports Archive - Click Here | ||
Surveillance Society News Reports Current |
Selected News Extracts 2008 - 2011 2011 "Sir Richard
Dearlove, Britains former chief spymaster has said the country should start spying
on its Eurozone neighbours to protect the economy as the common currency is wracked by
national defaults. Sir Richard Dearlove, who served
as head of MI6 until 2004, said that Britain must not be 'squeamish' about using the
intelligence services to defend its economic interests. The former C said central banks
like the Bank of England maintained extensive networks of contacts to secure information
on future developments. But specialist intelligence agencies should also undertake the
task of financial security. 'I am addressing the future of the euro and how defaults
affect us economically,' he told the Global Strategy Forum. 'Efficient central bankers
should be able to handle themselves but I am indicating they could and might need help
from time to time on the currency issue.' Sir Richard added that 2008 financial crisis had
changed his views on the role of intelligence agencies in protecting the economy. Britain
needed to be 'forewarned and forearmed in anticipation of a future crisis. He said:
'I dont think we should be squeamish about using all means to protect ourselves
financially.'.... As one of the highest regarded global spy agencies, the Secret
Intelligence Service, or MI6, has deep ties with its intelligence counterparts across
Europe. Sir Richard acknowledged that MI6 was a leader in efforts to integrate
Europes intelligence agencies. By ordering the
foreign intelligence agency to actively spy on its partners, the government would risk a
backlash from the countrys closest neighbours and allies. Countries vulnerable to
quitting the euro would be sure to view the move as an act of selfishness at a time of
national weakness.... Sir Richard noted that the Bank of England had effectively intelligence
capabilities though it did not classify these
activities as spying. As such MI6 would play a subordinate
role to the Bank. Sir
Richard was appointed head of MI6 in 1999 and was head of the organisation during the
September 11 attacks on the US by al Qaeda. When he retired in 2004, the final year of his
career had been overshadowed by controversy over the dossier used by the government to
accuse Iraq of pursuing a secret Weapons of Mass Destruction programme.' 2010 "The
top-secret world the government created in response to the terrorist attacks of Sept. 11,
2001, has become so large, so unwieldy and so secretive that no one knows how much money
it costs, how many people it employs, how many programs exist within it or exactly how
many agencies do the same work.... In Washington and
the surrounding area, 33 building complexes for top-secret intelligence work are under
construction or have been built since September 2001. Together they occupy the equivalent
of almost three Pentagons or 22 U.S. Capitol buildings - about 17 million square feet of
space." 2009 "A
former head of MI5 has accused the government of exploiting the fear of terrorism and trying to bring in laws that restrict civil liberties. In an
interview in a Spanish newspaper, published in the Daily Telegraph, Dame Stella Rimington, 73,
also accuses the US of 'tortures'....Dame Stella, who stood down as the director general
of the security service in 1996, has previously been critical of the government's
policies, including its attempts to extend pre-charge detention for terror suspects to 42
days and the controversial plan to introduce ID cards. 'It would be better that the
government recognised that there are risks, rather than frightening people in order to be
able to pass laws which restrict civil liberties, precisely one of the objects of
terrorism - that we live in fear and under a police
state,' she told the Spanish newspaper La
Vanguardia...." "With Googles Latitude, parents
will be able to swoop down like helicopters on their children, whirr around their heads
and chase them away from the games arcade and back to do their French verbs....However
Orwellian it sounds, dont worry. The police and
security services can already track you down from your phone without any help from Google..." "Over the past few days, at trade
fairs from Las Vegas to Seoul, a constant theme has been the unstoppable advance of 'FRT',
the benign abbreviation favoured by industry insiders. We learnt that Apple's iPhoto
update will automatically scan your photos to detect people's faces and group them
accordingly, and that Lenovo's new PC will log on users by monitoring their facial
patterns....So let's understand this: governments and
police are planning to implement increasingly accurate surveillance technologies that are
unnoticeable, cheap, pervasive, ubiquitous, and searchable in real time. And private businesses, from bars to workplaces, will also operate such
systems, whose data trail may well be sold on or leaked to third parties - let's say,
insurance companies that have an interest in knowing about your unhealthy lifestyle, or
your ex-spouse who wants evidence that you can afford higher maintenance payments. Rather
than jump up and down with rage - you never know who is watching through the window - you have a duty now, as a citizen, to question this stealthy rush towards permanent individual surveillance. A
Government already obsessed with pursuing an unworkable and unnecessary identity-card
database must be held to account." 2008 "Our
privacy is being invaded by the world's security services in every second of every day, as a
routine matter. Vast quantities of information are
collected by commercial enterprises such as Google or Tesco. Against these invasions of our privacy we have little or no
protection." 2007 "Officials from the top of Government
to lowly council officers will be given unprecedented powers to access details of
every phone call in Britain under laws coming into force tomorrow. The new rules compel
phone companies to retain information, however private, about all landline and mobile calls, and
make them available to some 795 public bodies and quangos. The move, enacted by
the personal decree of Home Secretary Jacqui Smith, will give police and security services a right they have
long demanded: to delve at will into the phone records of British citizens and
businesses. The Government will be given access to details of every phone call in Britain.
....The initiative, formulated in the wake of the Madrid and London terrorist
attacks of 2004 and 2005, was put forward as a vital tool in the fight against terrorism .... Files will also be kept on the
sending and receipt of text messages. By 2009 the Government
plans to extend the rules to cover internet use: the websites we have visited, the people we have emailed and phone calls made over the net.... The new measures were
implemented after the Home Secretary signed a 'statutory instrument' on July 26. The
process allows the Government to alter laws 2006 "The
FBI appears to have begun using a novel form of electronic surveillance in criminal
investigations: remotely activating a mobile phone's
microphone and using it to eavesdrop on nearby conversations. ......Kaplan's opinion said
that the eavesdropping technique 'functioned whether the phone was powered on or off.'
Some handsets can't be fully powered down without removing the
battery.....Security-conscious corporate executives routinely remove the batteries from
their cell phones, he added....A BBC article
from 2004 reported that intelligence agencies routinely employ the remote-activiation
method. 'A mobile sitting on the desk of a politician or
businessman can act as a powerful, undetectable bug,' the
article said, 'enabling them to be activated at a later date to pick up sounds even when
the receiver is down.'........ A 2003 lawsuit revealed that the FBI
was able to surreptitiously turn on the built-in microphones in automotive systems like
General Motors' OnStar to snoop on passengers'
conversations. When FBI agents remotely activated
the system and were listening in, passengers in the vehicle could not tell that their
conversations were being monitored. Malicious hackers have followed suit. A report
last year said Spanish authorities had detained a man who write a Trojan horse that
secretly activated a computer's video camera and forwarded him the recordings." 2005 "Police in Israel say they have
uncovered a huge industrial spying ring which used computer viruses to probe the systems
of many major companies. At least 15 Israeli firms have been implicated in the espionage
plot, with 18 people arrested in Israel and two more held by British police. Among those under suspicion are major Israeli telecoms and media
companies. Police say the companies used a 'Trojan
horse' computer virus written by an Israeli to hack into rivals' systems. Interpol and the
authorities in Britain, Germany and the US are already involved in investigating the
espionage, which Israeli police fear may involve major international companies." |
|
MORE SURVEILLANCE INFORMATION SURVEILLANCE SOCIETY BULLETINS |
||
Contact | 'We Need A New Way Of Thinking' - Consciousness-Based Education |
2008 - 2011 Archive |
2011 - 2010 - 2009 - 2008 & Earlier |
2011 |
"Meet the Brossarts, a North
Dakota family deemed so dangerous that the local sheriff needed unleashed an unmanned
Predator drone to help bring them in. The Brossart's alleged crime? They wouldn't give
back three cows and their calves that wandered onto their 3,000-acre farm this summer. The
same aerial vehicles used by the CIA to track down and assassinate terrorists and
militants in Pakistan and Afghanistan are now being deployed by cops to spy on Americans
in their own backyards. ... The Brossarts are the
first known subjects of the high-flying new surveillance technology that the federal
government has made available to some local sheriffs and police chiefs - all without
Congressional approval or search warrants. Local authorities say the Brossarts are known
for being armed, anti-government separatists whose sprawling farm is used as a compound.
.... increasingly, the federal government and local police agencies are using ... drones
to spy criminal suspects in America with sophisticated high-resolution cameras, heat
sensors and radar. All of it comes without a warrant. ... Allowing local sheriffs and
police chiefs access to spy planes happened without public discussion or the approval of
Congress. And it has privacy advocates crying foul, saying the unregulated use of the
drones is intrusive.... All of the surveillance
occurred without a search warrant because the
Supreme Court has long ruled that anything visible from the air, even if it's on private
property, can be subject to police spying. However, privacy experts say that predator
drones, which can silently fly for 20 hours nonstop, dramatically surpasses the spying
power that any police helicopter or airplane can achieve." |
"Mass interception of entire
populations is not only a reality, it is a secret new industry spanning 25 countries. It
sounds like something out of Hollywood, but as of today, mass interception systems, built
by Western intelligence contractors, including for political opponents are a
reality. Today WikiLeaks began releasing a database of hundreds of documents from as many
as 160 intelligence contractors in the mass surveillance industry. Working with Bugged Planet and Privacy International, as well as media
organizations form six countries ARD in Germany, The Bureau of Investigative
Journalism in the UK, The Hindu in India, LEspresso in Italy, OWNI in France and the
Washington Post in the U.S. Wikileaks is shining a
light on this secret industry that has boomed since September 11, 2001 and is worth
billions of dollars per year. WikiLeaks has released
287 documents today, but the Spy Files project is ongoing and further information will be
released this week and into next year. International surveillance companies are based in
the more technologically sophisticated countries, and they sell their technology on to
every country of the world. This industry is, in practice, unregulated. Intelligence agencies, military forces and police authorities are
able to silently, and on mass, and secretly intercept calls and take over computers
without the help or knowledge of the telecommunication providers. Users physical
location can be tracked if they are carrying a mobile phone, even if it is only on stand
by. But the WikiLeaks Spy Files are more than just about good Western
countries exporting to bad developing world countries. Western companies
are also selling a vast range of mass surveillance equipment to Western intelligence
agencies. In traditional spy stories, intelligence agencies like MI5 bug the phone of one
or two people of interest. In the last ten years systems for indiscriminate, mass
surveillance have become the norm. Intelligence companies such as VASTech secretly sell
equipment to permanently record the phone calls of entire nations. Others record the
location of every mobile phone in a city, down to 50 meters. Systems to infect every
Facebook user, or smart-phone owner of an entire population group are on the intelligence
market...... In
January 2011, the National Security Agency broke ground on a $1.5 billion facility in the
Utah desert that is designed to store terabytes of domestic and foreign intelligence data
forever and process it for years to come.
Telecommunication companies are forthcoming when it comes to disclosing client information
to the authorities - no matter the country. Headlines during Augusts unrest in the
UK exposed how Research in Motion (RIM), makers of the Blackberry, offered to help the
government identify their clients. RIM has been in similar negotiations to share
BlackBerry Messenger data with the governments of India, Lebanon, Saudi Arabia, and the
United Arab Emirates. There are commercial firms that
now sell special software that analyze this data and turn it into powerful tools that can
be used by military and intelligence agencies.... Across the world, mass surveillance contractors are helping intelligence
agencies spy on individuals and communities of interest on an industrial scale. The
Wikileaks Spy Files reveal the details of which companies are making billions selling
sophisticated tracking tools to government buyers, flouting export rules, and turning a
blind eye to dictatorial regimes that abuse human rights." |
"A piece of keystroke-sniffing
software called Carrier IQ has been embedded so deeply in millions of HTC and
Samsung-built Android devices that its tough to spot and nearly impossible to
remove, as 25-year old Connecticut systems administrator Trevor Eckhart revealed in
a video Tuesday. Thats not just creepy, says Paul Ohm, a former Justice
Department prosecutor and law professor at the University of Colorado Law School. He
thinks its also likely grounds for a class action lawsuit based on a federal
wiretapping law. 'If CarrierIQ has gotten the
handset manufactures to install secret software that records keystrokes intended for text
messaging and the Internet and are sending some of that information back somewhere, this
is very likely a federal wiretap.' he says. 'And that gives the people wiretapped the
right to sue and provides for significant monetary damages.' As Eckharts analysis of
the companys training videos and the debugging logs on his own HTC Evo handset have
shown, Carrier IQ captures every keystroke on a device as well as location and other data,
and potentially makes that data available to Carrier IQs customers. ... Eckhart has found the application on Samsung, HTC, Nokia and RIM
devices, and Carrier IQ claims on its website that it has installed the program on more than 140 million handsets." |
"An Android app developer has
published what he says is conclusive proof that millions of smartphones are secretly
monitoring the key presses, geographic locations, and received messages of its users. In a
YouTube video posted on Monday, Trevor Eckhart showed how software from a Silicon Valley
company known as Carrier IQ recorded in real time the keys he pressed into a stock EVO
handset, which he had reset to factory settings just prior to the demonstration. Using a
packet sniffer while his device was in airplane mode, he demonstrated how each numeric tap
and every received text message is logged by the software. Ironically, he says, the Carrier IQ software recorded the 'hello world'
dispatch even before it was displayed on his handset. Eckhart then connected the device to
a Wi-Fi network and pointed his browser at Google. Even though he denied the search
giant's request that he share his physical location, the Carrier IQ software recorded it.
The secret app then recorded the precise input of his search query again, 'hello
world' even though he typed it into a page that uses the SSL, or secure sockets
layer, protocol to encrypt data sent between the device and the servers. 'We can see that
Carrier IQ is querying these strings over my wireless network [with] no 3G connectivity
and it is reading HTTPS,' the 25-year-old Eckhart says." |
"WikiLeaks founder Julian Assange blasted the mainstream media,
Washington, banks and the Internet itself as he addressed journalists in Hong Kong on
Monday via videolink from house arrest in England. Fresh from accepting a top award for
journalism from the prestigious Walkley Foundation in his native Australia on Sunday,
Assange spoke to the News World Summit in Hong Kong before keeping a regular appointment
with the police....The Internet itself had become
'the most significant surveillance machine that we have ever seen,' Assange said in
reference to the amount of information people give about themselves online. 'It's not an age of transparency at all ... the amount of secret
information is more than ever before,' he said, adding that information flows in but is
not flowing out of governments and other powerful organisations. 'I see that really is our
big battle. The technology gives and the technology takes away,' he added." |
"The most senior figure in the US military has warned that the
number of threats facing his country and its allies have increased over the last decade
and that the armed forces must be kept strong to fight back. In his first speech since
taking over as chairman of the joint chiefs of staff, General Martin Dempsey told an
audience in London on Monday that meeting the new challenges in a time of austerity would
require a transformation in military thinking. He
highlighted the cyber threat as one of the most pressing, and said more needed to be done
to counter the dangers online." |
"'Big Brother' technology which
monitors mobile phones remotely - without warning you that
this is happening - is already in use in many major British retail chains, MailOnline can
reveal. The technology has quietly been in use in the UK for four years in several 'major'
High Street malls and department stores, with little or no publicity. It raises serious
questions about privacy - and this weekend the launch of the technology in the U.S. for
the post-Thanksgiving sales was been greeted with a storm of controversy. Thanks to the
widespread use of CCTV, Britain is already the most 'watched' society on Earth. Unlike
with CCTV, though, victims of 'Footpaths' scanning often get no warning they are being
watched. The surveillance is not for their safety, either - it's for pure commercial gain.
'Our FootPath technology allows us to monitor the path you take as you travel through
premises belonging to any of our clients,' says Path Intelligence, the company behind the
technology. The technology is already in use in several 'major' retail chains in the UK -
although the company's CEO refused to say which. 'We have been installed in various places
since 2008,' CEO Sharon Biggar told MailOnline today. When entering premises with Footpath
technology, the customer receives no warning that their
mobile phone signal is being monitored bar a small sign
somewhere on the premises. Crucially, though, they
do not receive an option to 'opt-out' of being scanned. Customers on all networks will be
scanned by Footpath, and no current mobile phone has a 'defence' against such scanners.
The only way to be safe is simply to switch off. 'FootPath works by detecting a frequently
changing signal from your mobile phone,' says the company. 'This random signal is detected
by a number of our units within the premises. 'We combine the information detected from
the mobile phone signal with a proprietary mathematical algorithm developed by us. This
allows us to determine your path through premises equipped with our receiver units.' 'We
cannot store individual mobile phone numbers and do not read SMS texts or phone calls,'
says Ms Biggar. 'We 'hash' the data immediately so that no computer or person within Path
Intelligence ever knows the number.' Privacy advocates worry, though, that merely
harvesting that sort of data leaves stores open to hackers or employees misusing the
information. 'Store security cameras are a bigger privacy violation - they CAN identify
you.' 'Sat-navs such as TomTom also already scan for mobile phone signals to work out
where there are traffic jams.' Ms Biggar says the technology is largely used to help
stores redesign to maximise sales." |
"In recent weeks, Facebook has
been wrangling with the Federal
Trade Commission over whether the social media website is violating users' privacy by
making public too much of their personal information. Far more quietly, another debate is
brewing over a different side of online privacy: what Facebook is learning about those who
visit its website. Facebook officials are now acknowledging that the social media giant
has been able to create a running log of the web pages that each of its 800 million or so
members has visited during the previous 90 days. Facebook also keeps close track of where
millions more non-members of the social network go on the Web, after they visit a Facebook
web page for any reason. To do this, the company
relies on tracking cookie technologies similar to the controversial systems used by
Google, Adobe, Microsoft, Yahoo and others in the online advertising industry, says Arturo
Bejar, Facebook's engineering director. Facebook's efforts to track the browsing habits of
visitors to its site have made the company a player in the 'Do Not Track' debate, which
focuses on whether consumers should be able to prevent websites from tracking the
consumers' online activity. For online business and social media sites, such information
can be particularly valuable in helping them tailor online ads to specific visitors. But
privacy advocates worry about how else the information might be used, and whether it might
be sold to third parties. New guidelines for online privacy are being hashed out in
Congress and by the World Wide Web
Consortium, which sets standards for the Internet. If privacy advocates get their way,
consumers soon could be empowered to stop or limit tech companies and ad networks from
tracking them wherever they go online. But the online advertising industry has dug in its
heels, trying to retain the current self-regulatory system." |
"A council has been accused of a
staggering invasion of privacy after announcing it plans to record every
conversation that takes place in taxi cabs. Oxford City Council will fit all of its 652
taxis with at least one CCTV camera to record all conversations between passengers from
the moment the engine starts running. Civil
liberties campaign group Big Brother Watch has said it will complain to the Information
Commissioner over the scheme. Nick Pickles, the campaign group's director, said:
This is a staggering invasion of privacy, being done with no evidence, no
consultation and a total disregard for civil liberties.' Big Brother now has big
ears, and they are eavesdropping on your conversations with absolutely no
justification. He added: Given that one rail route to Witney [David Cameron's
constituency] is through Oxford, we'll be letting the Prime Minister know that his staff
might want to avoid using Oxford cabs. A spokeswoman for Oxford City Council said
video and audio would run all the time in the cabs but officials will only be allowed to
view the material if there has been a complaint.' The authority said complaints against
both taxi drivers and passengers had increased year on year and without CCTV the
allegations 'amount to one persons word against the other'. Complaints included
overcharging, sexual assaults and attacks on drivers." |
"When James Hay was invited to join Facebook by an old
university acquaintance on Friday, he began tapping in his registration details with a
hint of trepidation. Having ignored the social networking behemoth for several years, Hay,
27, figured he would be a 'Billy no-mates' and it would take him months to build up a
collection of online friends. Yet within seconds of keying in his email address Hay, who
works for a television production company in London, was surprised to be sent a list of 45
people he might know. 'It felt as if Facebook already knew a whole load of stuff about me
before I had even signed up,' he said. 'It was spooky.' It transpires that the company, which boasts 800m users worldwide,
has been accumulating information about people who have not even joined the site
and without their knowledge or consent. Many
who are invited to sign up receive a list of suggested friends before they even hand over
any personal details. These so-called
'shadow profiles' are mainly the result of two key actions by Facebook. The site stores
names that are searched for by existing users. If someone is not already on Facebook, they
could be alerted to who was looking for them when they do eventually sign up. The company also encourages users to synchronise the contacts in
their email address books with their Facebook account. This instantly gives the company
access to that users full list of real-life friends and acquaintances. The
acquisition of such information about non-users is now being investigated by
Irelands Data Protection Commissioner (IDPC) as part of a series of complaints about
Facebooks practices that challenge whether it has breached European privacy laws.
Facebook retains every IP address from which a user logs on to the site, helping the
company to identify home and work computers for each user." |
"The astonishing extent of
Britains surveillance society was revealed for the first time yesterday. Three
million snooping operations have been carried out over the past decade under controversial
anti-terror laws. They include tens of thousands of undercover missions by councils and
other state bodies which are not responsible for law enforcement. Cases include a family who were spied on to check they were not cheating
on school catchment area rules and so-called bin criminals.The campaign group
Justice is demanding the hugely controversial Regulation of Investigatory Powers Act
under which all the operations were authorised be scrapped altogether.
RIPA, billed as anti-terror legislation, was passed by Labour in 2000
supposedly to regulate snooping by public bodies. But Justice, which has campaigned on
privacy matters for decades, says the result has been a huge increase in intrusive
surveillance. Since the Act was passed, there have
been: More than 20,000 warrants for the interception of phone calls, emails and
internet use; * At least 2.7million requests
for communication data, including phone bills and location information; * More than 4,000
authorisations for intrusive surveillance, such as planting a bug in a persons
house; * At least 186,133 authorisations for directed (covert) surveillance by law
enforcement agencies; * 61,317 directed surveillance operations by other public bodies,
including councils; * 43,391 authorisations for covert human intelligence
sources. In total, the report says there have
been around three million decisions taken by state bodies under RIPA, not including authorisations given to the security and intelligence
services. Yet fewer than 5,000 of these just
0.16 per cent were approved by judges. In the
remaining cases, they required only the approval of a bureaucrat or, in a small number of
cases involving large scale intrusion, a Secretary of State." |
"During the last two years, Facebook has made a bewildering number of
changes to its site - many of which can see personal data being laid open to advertisers,
'friends of friends' or the world. These changes often happen with no warning, and little
explanation. In the last 18 months, Facebook has
changed its privacy policies eight times - including changes that automatically tell
people where you are, and a change that let third parties access users' telephone numbers
and addresses. In a survey, 48 of users agreed that,
'I can't keep up with the number of changes Facebook has made to its data security
settings.'Dr Robert Reid, scientific policy advisor for Which Computing, which conducted
the survey said, 'Multiple changes per month to long-winded policies that are barely
notified to users is leaving consumers of the social network feeling confused and
powerless.'Sixty per cent of the 953 users surveyed said that they felt worried about,
'People who are not my friends accessing information about me on Facebook.'... A worrying
19 per cent of users said that they had never changed their privacy settings. This
potentially leaves open information such as phone numbers, addresses and email addresses,
which could be used in identity theft." |
"Britain's largest police
force is operating covert surveillance technology that can
masquerade as a mobile phone network, transmitting a signal that allows authorities to
shut off phones remotely, intercept communications and gather data about thousands of
users in a targeted area. The surveillance system
has been procured by the Metropolitan police from
Leeds-based company Datong plc, which counts the US Secret Service, the Ministry of
Defence and regimes in the Middle East among its customers. Strictly classified under
government protocol as 'Listed X', it can emit a signal over an area of up to an estimated
10 sq km, forcing hundreds of mobile phones per minute to
release their unique IMSI and IMEI identity codes, which can be used to track a person's
movements in real time. The disclosure has caused concern among lawyers and privacy groups
that large numbers of innocent people could be unwittingly implicated in covert
intelligence gathering. The Met has refused to confirm whether the system is used in
public order situations, such as during large protests or demonstrations." |
"Google faced down demands from a US law enforcement agency to take
down YouTube videos allegedly showing police brutality earlier this year, figures released
for the first time show. The technology giant's biannual transparency report shows that Google
refused the demands from the unnamed authority in the first half of this year. According
to the report, Google separately declined orders by other police authorities to remove
videos that allegedly defamed law enforcement officials. The
demands formed part of a 70% rise in takedown requests from the US government or police,
and were revealed as part of an effort to highlight online censorship around the world.
Figures revealed for the first time show that the US demanded private information about
more than 11,000 Google users between January and June this year, almost equal to the
number of requests made by 25 other developed countries, including the UK and Russia. Governments around the world requested private data about 25,440 people in
the first half of this year, with 11,057 of those people in the US. It is the first time
Google has released details about how many of its users are targeted by authorities, as
opposed to the number of requests made by countries." |
"Facebook Ireland is under fire
for allegedly creating 'shadow profiles' on both users and nonusers alike. The startling charges against the social-networking giant come from the Irish Data Protection Commissioner (IDC),
which, Fox News reports today, is launching a 'comprehensive'
investigation against Facebook Ireland for extracting data from current users--without
their consent or knowledge--and building 'extensive profiles' on people who haven't even
signed on for the service. Names, phone numbers, e-mail addresses, work information, and
perhaps even more sensitive information such as sexual orientation, political
affiliations, and religious beliefs are being collected and could possibly be misused,
Irish authorities claim." |
"Council snoopers went through
the bins of more than 30,000 families last year. The figure was double that of the
previous year, despite a Coalition pledge to stamp out the intrusive practice. It was
revealed in response to a Freedom of Information Act request by the Daily Mail. We can reveal that inspectors are building up a disturbingly detailed
profile of families lives by rifling through their rubbish in secret. In some cases,
they divide the contents into 13 main categories and 52 sub-categories of waste. Councils
claim it is so householders can be targeted for future recycling efforts such as
leafleting campaigns. But campaigners fear this data could be passed to other departments
such as health or social services. The audits, which are held on a database, can reveal an
extraordinarily sophisticated portrait from what sort of foods are eaten and what kind of
goods are bought in a particular street. Inspectors, often hired in from the private
sector, check supermarket labels, types of unwanted food and even examine the
contents of discarded mail. Councils were accused yesterday of using Big Brother tactics
to spy on residents with alarming frequency and for ever more spurious
reasons." |
"A German hacker organization
claims to have cracked spying software allegedly used by German authorities. The Trojan
horse has functions which go way beyond those allowed by German law. The news has sparked
a wave of outrage among politicians and media commentators. It sounds like something out
of George Orwell's novel '1984' -- a computer program that can remotely control someone's
computer without their knowledge, search its complete contents and use it to conduct
audio-visual surveillance via the microphone or webcam. But the spy software that the
famous German hacker organization Chaos Computer Club has obtained is not used by
criminals looking to steal credit-card data or send spam e-mails. If the CCC is to be
believed, the so-called 'Trojan horse' software was used by German authorities. The case has already triggered a political shockwave in the country and
could have far-reaching consequences. On Saturday, the CCC announced that it had been
given hard drives containing a 'state spying software' which had allegedly been used by
German investigators to carry out surveillance of Internet communication. The organization
had analyzed the software and found it to be full of defects. They also found that it
transmitted information via a server located in the US. As well as its surveillance
functions, it could be used to plant files on an individual's computer. It was also not
sufficiently protected, so that third parties with the necessary technical skills could
hijack the Trojan horse's functions for their own ends. The software possibly violated
German law, the organization said. So-called Trojan horse software can be surreptitiously
delivered by a harmless-looking e-mail and installed on a user's computer without their
knowledge, where it can be used to, for example, scan the contents of a hard drive.... If
the CCC's claims are true, then the software has functions which were expressly forbidden
by Germany's highest court, the Federal Constitutional Court, in a landmark 2008
ruling which significantly restricted what was allowed in terms of online
surveillance. The court also specified that online spying was only permissible if there
was concrete evidence of danger to individuals or society. German politicians from all
sides of the political spectrum have reacted to the news with alarm. Government spokesman
Steffen Seibert said that Chancellor Angela Merkel was taking the CCC's allegations very
seriously." Electronic Surveillance Scandal Hits Germany Der Speigel, 10 October 2011 |
"While it had been rumored
it's unfortunately now confirmed that California governor Jerry Brown has sold out your
privacy to law enforcement. After a bad
court ruling gave law enforcement the ability to search your mobile phone during a
traffic stop, the California legislature realized the ridiculousness of the situation and
passed the bill requiring a warrant pretty quickly. But, unfortunately, despite widespread
support for it, Governor Brown has vetoed the bill, meaning that your mobile phones are fair game for
searches without a warrant." |
"Facebook has been caught
telling porkies by an Australian technologist whose revelations that the site tracks its
800 million users even when they are logged out have embroiled Facebook in a global public
policy and legal nightmare. Facebook's
assurances that 'we have no interest in tracking people' have been
laid bare by a new Facebook patent, dated this month, that describes a method 'for tracking
information about the activities of users of a social networking system while on another
domain'." |
"Many wireless carriers keep
people's cellphone data for more than a year, according to a Justice Department document
released by the American Civil Liberties Union. The
government document was meant to help law enforcement agents who were seeking cellphone
records for their investigations. The ACLU obtained the document as part of a Freedom of
Information Act request for records on how law enforcement agencies use cellphone data.
According to the 2010
document, the four national wireless carriers all keep records of which cellphone
towers a phone uses for at least a year. This information could potentially be used to
determine a person's location. T-Mobile officially keeps the cell tower data for four to
six months, but the document notes that the period is 'really a year or more.' AT&T
keeps all cell tower records since July 2008, Verizon keeps the data for one rolling year
and Sprint keeps the information for 18 to 24 months." |
"Internet companies such as
Google, Twitter and Facebook are increasingly co-opted for surveillance work as the
information they gather proves irresistible to law enforcement agencies, Web experts said
this week. Although such companies try to keep their users' information private, their
business models depend on exploiting it to sell targeted advertising, and when governments
demand they hand it over, they have little choice but to comply. Suggestions that BlackBerry maker RIM might give user data to British
police after its messenger service was used to coordinate riots this summer caused outrage
-- as has the spying on social media users by more oppressive governments. But the vast
amount of personal information that companies like Google collect to run their businesses
has become simply too valuable for police and governments to ignore, delegates to the
Internet Governance Forum in Nairobi said. 'When the possibility exists for information to
be obtained that wasn't possible before, it's entirely understandable that law enforcement
is interested,' Google's Chief Internet Evangelist Vint Cerf told Reuters in an
interview." |
"Microsoft allegedly tracks the
location of its mobile customers even after users request that tracking software be turned
off, according to a new lawsuit. The proposed class
action, filed in a Seattle federal court on Wednesday, says Microsoft intentionally
designed camera software on the Windows Phone 7 operating system to ignore customer
requests that they not be tracked. A Microsoft representative could not immediately be
reached for comment. The lawsuit comes after concerns surfaced earlier this year that
Apple's iPhones collected location data and stored it for up to a year, even when location
software was supposedly turned off. Apple issued a patch to fix the problem. However, the
revelation prompted renewed scrutiny of the nexus between location and privacy. At a
hearing in May, U.S. lawmakers accused the tech industry of exploiting location data for
marketing purposes -- a potentially multibillion-dollar industry -- without getting proper
consent from millions of Americans. The lawsuit against Microsoft cites a letter the
company sent to Congress, in which Microsoft said it only collects geolocation data with
the express consent of the user." |
"A sleepy Home Counties market
town has become the first in Britain to have every car passing through it tracked by
police cameras. Royston, in Hertfordshire, has had a set of police cameras installed on
every road leading in and out of it, recording the numberplate of every vehicle that
passes them. The automatic number-plate recognition
system will check the plates against a variety of databases, studying them for links to
crimes, and insurance and tax records, and alerting police accordingly. There were
just seven incidents of vehicle crime in the town last month, and residents believe the
unmarked cameras are an invasion of their privacy. The system, due to be switched on in
the next few days, also allows police to compile 'hotlists' of vehicles that they are
interested in... Details of the cars movements will stay on police records for two years,
or five if the car is connected to a crime, the Guardian reported." |
"Two key senators want to know
if the leader of the vast U.S. intelligence apparatus believes its legal for spooks
to track where you go through your iPhone. In a
letter that Sens. Mark Udall (D-Colorado) and Ron Wyden (D-Oregon) will send later on
Thursday, obtained by Danger Room, the senators ask Director of National Intelligence
James Clapper, 'Do government agencies have the authority to collect the geolocation
information of American citizens for intelligence purposes?' Both senators are members of
the panel overseeing the 16 intelligence agencies. In May, they sounded
warnings that the Obama administration was secretly reinterpreting the Patriot Act to
allow a broader amount of domestic surveillance than it had publicly disclosed....
Geolocation is a particular interest of Wydens. Technically, there are few obstacles
to clandestine geodata collection, since most mobile phones feature built-in GPS.... The
2008 FISA Amendments Act that blessed
the Bush administrations warrantless surveillance programs allowed intelligence
agencies greater leeway to collect metadata on Americans communications abroad.
Its unclear to the senators if that or any other law prompted the spy community to
move into geolocation collection. Thats why Wyden and Udall want 'unclassified
answers' from Clapper. If Clapper thinks his spies can go after U.S. citizens
geodata, they want the 'specific statutory basis' for that collection, along with a
description of any 'judicial review or approval by particular officials' that might
accompany it. They also want to know if Clapper thinks theres any affirmative legal
'prohibition' to geodata collection by spies, if the spy chief doesnt think
its legal." |
"Before hitting the streets, Oakland police officer Huy Nguyen's
routine usually goes something like this: Gun ready? Check. Bulletproof vest strapped?
Check. Body camera secured? Check. Wait, body camera? 'It feels uncomfortable when I don't
have it,' Nguyen said of the video camera that is
smaller than a smartphone and is worn on his chest.
'You can never be too safe.' Oakland and hundreds of other police departments across the
country are equipping officers with tiny body cameras to record anything from a traffic
stop to a hot vehicle pursuit to an unfolding violent crime. The mini cameras have even
spawned a new cable reality TV series, Police POV, which uses police video from
Cincinnati, Chattanooga and Fort Smith, Ark. Whether attached to shirt lapels or small
headsets, the cameras are intended to provide more transparency and security to officers
on the street and to reduce the number of misconduct complaints and potential
lawsuits." |
"Bugging a
phone is by several orders of seriousness a graver intrusion than accessing messages.... Hacking into the phone messages of a missing girl was one
grisly (and for the News of the World catastrophic) example of a species of espionage that
has been commonplace." |
"Sir Richard Dearlove,
Britains former chief spymaster has said the country should start spying on its
Eurozone neighbours to protect the economy as the common currency is wracked by national
defaults. Sir Richard Dearlove, who served as head
of MI6 until 2004, said that Britain must not be 'squeamish' about using the intelligence
services to defend its economic interests. The former C said central banks like the Bank
of England maintained extensive networks of contacts to secure information on future
developments. But specialist intelligence agencies should also undertake the task of
financial security. 'I am addressing the future of the euro and how defaults affect us
economically,' he told the Global Strategy Forum. 'Efficient central bankers should be
able to handle themselves but I am indicating they could and might need help from time to
time on the currency issue.' Sir Richard added that 2008 financial crisis had changed his
views on the role of intelligence agencies in protecting the economy. Britain needed to be
'forewarned and forearmed in anticipation of a future crisis. He said: 'I dont
think we should be squeamish about using all means to protect ourselves financially.'....
As one of the highest regarded global spy agencies, the Secret Intelligence Service, or
MI6, has deep ties with its intelligence counterparts across Europe. Sir Richard
acknowledged that MI6 was a leader in efforts to integrate Europes intelligence
agencies. By ordering the foreign intelligence agency
to actively spy on its partners, the government would risk a backlash from the
countrys closest neighbours and allies. Countries vulnerable to quitting the euro
would be sure to view the move as an act of selfishness at a time of national weakness.... Sir Richard noted that the Bank
of England had effectively intelligence capabilities
though it did not classify these activities as spying. As
such MI6 would play a subordinate role to the Bank. Sir Richard was appointed head of MI6 in 1999 and was head of the
organisation during the September 11 attacks on the US by al Qaeda. When he retired in
2004, the final year of his career had been overshadowed by controversy over the dossier
used by the government to accuse Iraq of pursuing a secret Weapons of Mass Destruction
programme. |
"Authorities in Britain are more
likely to request details about internet users than in any other country, according to
Google. A report by the search engine website
reveals that law enforcement officials and government agencies made 1,162 separate
requests for data from the company in just six months. When population sizes are taken
into account, the figure puts Britain second in a table of 26 developed countries.
Singapore - which has been condemned by human rights groups for its authoritarian regime -
topped the table while Australia came third with 345 requests and France came fourth with
1,021 requests. The U.S. was fifth in the table with 4,601 requests for information in the
second half of last year." |
"Google has been forced to take
action after it was reported the search giant publicises the estimated locations of
millions of iPhones, laptios and other devices with wi-fi connections. The practice meant that if a user had wi-fi turned on, previous
whereabouts of your device - such as your home, office, or even restaurants you frequent -
were visible on the web for all to see. But when it was detailed in an exclusive CNET
report the practice launched a new row over embattled Google's privacy standards. Android
phones with location services enabled on them regularly beam the hardware IDs of wi-fi
devices in the area back to Google. The same happens with Microsoft, Apple and Skyhook
Wireless as part of each company's race to map the street addresses of various access
points and routers around the globe, CNET explained. However both Google and Skyhook
Wireless make the data publicly available on the internet. That means that if someone
knows your hardware ID - or your MAC address - they can trace a physical address that
Google associates with you, such as your home or office address. They can even trace your
favourite restaurant or your gym - anywhere you go frequently that has wi-fi." |
"When President Eisenhower left office in 1960, he provided the American people
with a warning. 'In the councils of government, we must guard against the acquisition
of unwarranted influence, whether sought or unsought, by the military-industrial complex.
The potential for the disastrous rise of misplaced power exists and will persist.' Sixty
years later, the military-industrial complex has been joined by another unprecedented
centre of what has increasingly proven to be 'misplaced power': the dozens of secretive
firms known collectively as the intelligence contracting industry. Last February, three of
these firms HBGary Federal, Palantir and Berico, known collectively as Team Themis
were
discovered to have conspired to hire out their information war capabilities to
corporations which hoped to strike back at perceived enemies, including US activist
groups, WikiLeaks and journalist Glenn
Greenwald. That such a dangerous new dynamic was now in play was only revealed due to a
raid by hackers associated with the Anonymous collective, resulting
in the dissemination
of more than 70,000 emails to and from executives at HBGary Federal and its parent
company HBGary. After having spent several months
studying those emails and otherwise investigating the industry depicted therein, I have revealed my summary of a classified US intelligence
programme known as Romas/COIN, as well as its upcoming replacement, known as Odyssey.
The programme appears to allow for the large-scale monitoring of social networks by way of
such things as natural language processing, semantic analysis, latent semantic indexing
and IT intrusion. At the same time, it also entails the dissemination of some unknown
degree of information to a given population through a variety of means without any
hint that the actual source is US intelligence. Scattered
discussions of Arab translation services may indicate that the programme targets the
Middle East....Altogether, the existence and nature of Romas/COIN should confirm what many
had already come to realise over the past few years, in particular: the US and other
states have no intention of allowing populations to conduct their affairs without
scrutiny. Such states ought not complain when they find themselves subjected to similar
scrutiny as will increasingly become the case over the next several years." |
"If you have Wi-Fi turned on,
the previous whereabouts of your computer or mobile device may be visible on the Web for
anyone to see. Google publishes the estimated location of millions of iPhones, laptops,
and other devices with Wi-Fi connections, a practice that represents the latest twist in a
series of revelations
this year about wireless devices and privacy, CNET has learned. Android phones with location services enabled regularly beam the unique hardware IDs
of nearby Wi-Fi devices back to Google, a similar practice followed by Microsoft, Apple,
and Skyhook Wireless as part of each company's effort to map the street addresses of
access points and routers around the globe. That benefits users by helping their mobile
devices determine locations faster than they could with GPS alone..... Only Google and
Skyhook Wireless, however, make their location databases linking hardware IDs to street
addresses publicly available on the Internet, which raises novel privacy concerns when the
IDs they're tracking are mobile. If someone knows your hardware ID, he may be able to find
a physical address that the companies associate with you--even if you never intended it to
become public. Tests performed over the last week by CNET and security researcher Ashkan Soltani showed that approximately 10
percent of laptops and mobile phones using Wi-Fi appear to be listed by Google as
corresponding to street addresses. Skyhook Wireless' list of matches appears to be closer
to 5 percent. 'I was surprised to see such precise data on where my laptop--and I--used to
live,' says Nick Doty, a lecturer at the University of
California at Berkeley who co-teaches the Technology and Policy Lab. Entering Doty's
unique hardware ID into Google's database returns his former home in the Capitol Hill
neighborhood in Seattle. Here's how it works: Wi-Fi-enabled devices, including PCs,
iPhones, iPads, and Android phones, transmit a unique hardware identifier, called a MAC address, to anyone within a radius
of approximately 100 to 200 feet. If someone captures or already knows that unique
address, Google and Skyhook's services can reveal a previous location where that device
was located, a practice that can reveal personal information including home or work
addresses or even the addresses of restaurants frequented." |
"Private computer experts advised U.S. officials on how cyberattacks
could damage Libyas oil and gas infrastructure and rob Moammar Gadhafis regime
of crucial oil revenue, according to a study obtained by hackers. It remains unclear who commissioned 'Project Cyber Dawn' and how
much of a role the U.S. government played in it, but it shows the increasing amount of
work being done by private companies in exposing foreign governments vulnerabilities
to cyber attack. 'For the private sector to be making recommendations ... thats a
level of ambition that you would not have seen until very recently,' said Eli Jellenc, a
cyber security expert with VeriSign Inc. who is not linked to the study or its authors. The study outlined ways to disable the coastal refinery at Ras Lanouf
using a computer virus similar to the Stuxnet worm that led to a breakdown in Irans
enrichment program late last year. It catalogued several pieces of potentially exposed
computer hardware used at the refinery. The study was discussed in some of nearly 1,000
emails stolen by hacking group Lulz Security from Delaware-based Internet surveillance
firm Unveillance, LLC as part of an effort to show how vulnerable data can be. Most of the
emails detail the day-to-day trivia of running a small technology startup, but others
concern an effort to scout out vulnerabilities in Gadhafis electronic
infrastructure. Cyberwarfare has assumed an increasingly high profile following dramatic
computer attacks on Google, Inc., U.S. defense contractors and the IMF. This month, the
Pentagon is expected to release policy on whether some cyber attacks should be considered
acts of war and when a U.S. cyber attack might be justified." |
"When young dissidents in Egypt
were organizing an election-monitoring project last fall, they discussed their plans over
Skype, the popular Internet phone service, believing it to be secure. But someone else was
listening inEgypt's security service. An internal memo from the 'Electronic
Penetration Department' even boasted it had intercepted one conversation in which an
activist stressed the importance of using Skype 'because it cannot be penetrated online by
any security device." Skype, which Microsoft Corp. is acquiring for $8.5 billion, is
best known as a cheap way to make international phone calls. But the Luxembourg-based
service also is the communications tool of choice for dissidents around the world because
its powerful encryption technology evades traditional wiretaps. Throughout the recent Middle East uprisings, protesters have used Skype
for confidential video conferences, phone calls, instant messages and file exchanges. In
Iran, opposition leaders and dissidents used Skype to plot strategy and organize a
February protest. Skype also is a favorite among activists in Saudi Arabia and Vietnam,
according to State Department cables released by WikiLeaks. In March, following the
Egyptian revolution that toppled President Hosni Mubarak, some activists raided the
headquarters of Amn Al Dowla, the state security agency, uncovering the secret memo about
intercepting Skype calls. In addition, 26-year-old activist Basem Fathi says he found
files describing his love life and trips to the beach, apparently gleaned from intercepted
emails and phone calls. 'I believe that they were collecting every little detail they were
hearing from our mouths and putting them in a file,' he says. A cottage industry of U.S.
and other companies is now designing and selling tools that can be used to block or
eavesdrop on Skype conversations. One technique: Using special "spyware," or
software that intercepts an audio stream from a computerthereby hearing what's being
said and effectively bypassing Skype's encryption. Egypt's spy service last year tested
one product, FinSpy, made by Britain's Gamma International UK Ltd., according to Egyptian
government documents and Gamma's local reseller." |
"The Pentagon has concluded that
computer sabotage coming from another country can constitute an act of war, a finding that
for the first time opens the door for the U.S. to respond using traditional military
force. The Pentagon's first formal cyber strategy,
unclassified portions of which are expected to become public next month, represents an
early attempt to grapple with a changing world in which a hacker could pose as significant
a threat to U.S. nuclear reactors, subways or pipelines as a hostile country's military.
In part, the Pentagon intends its plan as a warning to potential adversaries of the
consequences of attacking the U.S. in this way. 'If you shut down our power grid, maybe we
will put a missile down one of your smokestacks,' said a military official. Recent attacks
on the Pentagon's own systemsas well as the sabotaging of Iran's nuclear program via
the Stuxnet computer wormhave given new urgency to U.S. efforts to develop a more
formalized approach to cyber attacks. A key moment occurred in 2008, when at least one
U.S. military computer system was penetrated. This weekend Lockheed Martin, a major
military contractor, acknowledged that it had been the victim of an infiltration, while
playing down its impact. The report will also spark a debate over a range of sensitive
issues the Pentagon left unaddressed, including whether the U.S. can ever be certain about
an attack's origin, and how to define when computer sabotage is serious enough to
constitute an act of war. These questions have already been a topic of dispute within the
military. One idea gaining momentum at the Pentagon is the notion of 'equivalence.' If a
cyber attack produces the death, damage, destruction or high-level disruption that a
traditional military attack would cause, then it would be a candidate for a 'use of force'
consideration, which could merit retaliation." |
"It is impossible to hear about
sexual or sex-crime scandals nowadays whether that involving Dominique Strauss-Kahn
or those of former New York Governor Eliot Spitzer, Italian Prime Minister Silvio
Berlusconi, or the half-dozen United States congressmen whose careers have ended in the
past couple of years without considering how they were
exposed. What does it mean to live in a society in which
surveillance is omnipresent? Like the heat beneath the proverbial boiling frogs, the level of
surveillance in Western democracies has been ratcheted up slowly but far faster
than citizens can respond. In the US, for example,
President George W. Bushs Patriot Act is being extended, following a series of
backroom deals. Americans do not want it, and they were not consulted when it was enacted
by their representatives under the pressure of a government that demanded more power in
the wake of the terrorist attacks of September 11, 2001. That does not seem to matter. A
concerted effort is underway in the US and in the United Kingdom to 'brand'
surveillance as positive. New York City subway passengers are now advised that they might
experience random searches of their bags. Activists in America are now accustomed to
assuming that their emails are being read and their phone calls monitored. Indeed, the
telecom companies Verizon and AT&T have established areas on their premises for
eavesdropping activity by the National Security Agency. The spate of sex scandals is a
sign of more serious corruption and degradation than most commentators seem to realize.
Yes, sex criminals must be punished; but political career after political career,
especially in America, is ending because of consensual affairs. Consensual sex between
adults is no one elses business. But now that public figures especially those
deemed to be 'of interest' to intelligence agencies are susceptible to being
watched three-dimensionally, the chances of being compromised are far higher than they
were in the days of the UKs Profumo affair, which brought down a British defense
secretary in the early 1960s. And there is no end to this crash-and-burn
surveillance strategy, owing to the nature of the information that is caught in the net.
After all, the human sex drive, especially if it compels risky or self-destructive
behavior, has held appeal for dramatists since the ancient Greeks, who originated the
story of Achilles and his vulnerability. And, because sex scandals are always interesting
to read about certainly compared to yet another undeclared war, or a bailout that
created jobs costing an estimated $850,000 each they will always be useful
diversions. Citizens attention can be channeled away from, say, major corporate
theft and government malfeasance toward narratives involving two hapless individuals (and
their wives and children, who are usually suffering quite enough without the medias
heavy breathing)." |
"Remember section 215? It was a notorious provision of the USA Patriot Act, renewed
on Thursday, that allowed the government to snoop on what library books you'd
borrowed, what videos you'd rented, your medical records anything, really, if
investigators thought it might have something to do with terrorism, no matter how
tangential. I
wrote about it for the Boston Phoenix in 2003, as an example of the then budding
excesses of the Bush-Cheney years. Well, section 215 is back not that it ever went
away. Charlie
Savage reports in Friday's New York Times that two Democratic senators, Ron Wyden of
Oregon and Mark Udall of Colorado, have accused the Obama administration of using Section
215 for purposes not intended by Congress. Russ
Feingold, then a Democratic senator for Wisconsin, raised similar alarms in 2009. The
senators know what the White House is up to because they were privy to secret testimony.
But under Senate rules, they can't reveal what they learned. Thus they have demanded that
the White House come clean with the public. 'Americans would be alarmed if they knew how
this law is being carried out,' Udall is quoted as saying." |
"Documents left behind by the
FBI in antiwar activist Mick Kelly's apartment are shedding light on why heavily armed
special agents raided the homes and businesses of Kelly and 22 others last September. They
believed that Kelly -- at 5-feet, 10 inches and 145 pounds -- was 'DANGEROUS,' according
to an operation order Kelly's partner found. Kelly legally owns a handgun and a rifle. But
what the misplaced paperwork really shows, several activists said on Wednesday, is that
they have been targeted based on their political beliefs, their travels and the people
they have met rather than any alleged support for terrorism. 'It reads like something out of the 1950s,' Kelly said, pointing to
questions left behind for agents to ask -- including whether Kelly belongs to a socialist
group or knows others who do. He does -- and that's not illegal, he said. FBI special
agent Steve Warfield, a spokesman for the Minneapolis division, said the documents found
by Kelly and his partner, Linden Gawboy, appear authentic. The case became public in
September when the FBI raided homes and businesses in Minneapolis, Chicago and Michigan
looking for evidence that people were providing 'material support' to terrorist groups in
Colombia and the Middle East. In all, 23 people have received subpoenas to appear before a
grand jury in Chicago. Officials with the U.S. attorney's office there have not given
details about who they are investigating or what people are alleged to have done. No one
has been charged in the case, and the activists have refused to testify. Gawboy found the
documents in a file cabinet in the apartment she and Kelly share on April 30. Attorney
Bruce Nestor, who has advised many of those who have been searched and subpoenaed, said
the government's expanded definition of what is considered 'material support' has allowed
agents to go beyond investigating those who give money or weapons -- which the Minnesota
activists deny -- to investigating those who meet with people who belong to 'suspect'
groups. The affidavits that justified the September searches have not been made public, he
said, but 'I suspect they will refer to people hosting speakers ... and they will try to
put that in an evil light.' Activists say the raids and subpoenas are the FBI's efforts to
stifle their rights to free speech and free assembly. For instance, many of the suggested
questions found in the paperwork dealt with who the activists know and with whom they have
met." |
"More than 99% of Android phones
are potentially leaking data that, if stolen, could be used to get the information they
store online. The data being leaked is typically used to get at web-based services such as
Google Calendar. The discovery was made by German
security researchers looking at how Android phones handle identification information.
Google has yet to comment on the loophole uncovered by the team. University of Ulm
researchers Bastian Konings, Jens Nickels, and Florian Schaub made their discovery while
watching how Android phones handle login credentials for web-based services. Many
applications installed on Android phones interact with Google services by asking for an
authentication token - essentially a digital ID card for that app. Once issued the token
removes the need to keep logging in to a service for a given length of time. Sometimes,
the study says, these tokens are sent in plain text over wireless networks. This makes the
tokens easy to spot so criminals eavesdropping on the wi-fi traffic would be able to find
and steal them, suggest the researchers. Armed with the token, criminals would be able to
pose as a particular user and get at their personal information. Even worse, found the
researchers, tokens are not bound to particular phones or time of use so they can be used
to impersonate a handset almost anywhere. '[T]he adversary can gain full access to the
calendar, contacts information, or private web albums of the respective Google user,' the
researchers wrote in a blog post explaining their findings. Abuse of the loophole
might mean some people lose data but other changes may be harder to spot. '...an adversary
could change the stored e-mail address of the victim's boss or business partners hoping to
receive sensitive or confidential material pertaining to their business,' the team
speculated." |
"Cellphones that collect
people's locations are only the tip of the iceberg: Auto makers, insurance companies and
even shopping malls are experimenting with new ways to use this kind of data. Location
information is emerging as one of the hottest commodities in the tracking
industrythe field of companies that are building businesses based on people's data. Some companies are using the data to build better maps or analyze traffic
patterns. Others send users advertisements for services near where they are located. Some
insurers hope to use the data to provide discounts to better drivers. On Tuesday in
Washington, D.C., a Senate Judiciary subcommittee plans a hearing to consider whether a
federal law is required to protect consumer privacy on mobile devices. The hearing was
spurred by the public outcry over recent findings that Apple
Inc. and Google
Inc. gather location-related data from iPhones and Android phones. Both companies are set
to testify.... Currently, there is no comprehensive federal law that protects personal
dataincluding locationfrom being shared or sold to commercial partners. Last
December, the Journal's 'What They Know' series found that 47 of the 101 most popular
smartphone apps sent location information to other companies. The use of this trove of
sensitive data is proving controversial. Last month, TomTom
NV, maker of in-car navigation devices, apologized for selling aggregated data from its
devices to the Dutch government, which was using it to set speed traps. .... 'We did not
foresee this type of usage,' said Harold Goddijn, TomTom's chief executive. He said the
company 'fully understands some of [our] customers do not like this' and is taking steps
to 'stop this type of usage in near future.' Insurance companies are starting to tap
location and other data when drivers agree. Italy's Octo Telematics SpA makes technology
that has been installed in more than 1.2 million cars in Europe that can send back
aggregated data about a car's location, acceleration and other driving characteristics,
said Nino Tarantino, Octo's chief in North America." |
"Kathy Thomas knew she was under surveillance. The animal rights and
environmental activist had been trailed daily by cops over several months, and had even
been stopped on occasion by police and FBI agents. But when the surveillance seemed to
halt suddenly in mid-2005 after she confronted one of the agents, she thought it was all
over. Months went by without a peep from the FBI surveillance teams that had been tracking
her in undercover vehicles and helicopters. Thats when it occurred to her to check
her car. Rumors had been swirling among activists that the FBI might be using GPS to track
them two activists in Colorado discovered mysterious devices attached to their car
bumpers in 2003 so Thomas (a pseudonym) went out to the vehicle in a frenzy and ran
her hands beneath the rear bumper. She was only half-surprised to find a small electronic
device and foot-long battery wand secured to her metal fender with industrial-strength
magnets. 'I think I must have found it right after they put it on, because there was no
grime on it at all,' she told Threat Level recently. The
use of GPS tracking devices is poised to become one of the most contentious privacy issues
before the Supreme Court, if it agrees to hear an appeal filed by the Obama administration
last month. The administration is seeking to
overturn a ruling by a lower court that law enforcement officials must obtain a warrant
before using a tracker." |
"WikiLeaks founder Julian
Assange called Facebook 'the most appalling
spying machine ever invented' in an interview with Russia
Today, pointing to the popular social networking site as one of the top tools for the
U.S. to spy on its citizens. 'Here we have the
world's most comprehensive database about people, their relationships, their names, their
addresses, their locations, their communications with each other and their relatives, all
sitting within the United States, all accessible
to US Intelligence,' he said. 'Facebook, Google, Yahoo, all
these major U.S. organizations have built-in infaces for US intelligence. Everyone should
understand that when they add their friends to Facebook they are doing free work for the
United States intelligence agencies,' he added." |
"After a week of silence, Apple
on Wednesday responded to widespread complaints about iPhones and iPads tracking their
users' whereabouts by saying 'the iPhone is not logging your location' and announcing an
upcoming mobile software update. The next version of
Apple's iOS will store data about a phone's location for only seven days instead of for
months, as was previously the case, the company says. Apple blamed the fact that so much
location data had been stored on users' phones and computers on a software 'bug.' 'The
reason the iPhone stores so much data is a bug we uncovered and plan to fix shortly,' the
company said in a news release. 'We don't think the iPhone needs to store more than seven
days of this data.' The software update will be released in a few weeks, Apple said. That
update also will fix another apparent bug, which prevented iPhone and iPad 3G users from
being able to turn off location logging on their mobile devices." |
"In an effort to enhance online security and privacy, the Obama
administration has proposed Americans obtain a single ID for all Internet sales and banking activity.
But a new Rasmussen Reports poll finds most Americans want nothing to do with such an ID
if the government is the one to issue it and hold the information. The Rasmussen Reports
national telephone survey shows that just 13% of American Adults favor the issuing of a
secure government credential to replace all traditional password protection systems for
online sales and banking activities. Sixty percent (60%) oppose such a credential.
Twenty-seven percent (27%) are not sure. Only eight percent (8%) of Americans would be
willing to submit their personal financial and purchasing information to the government or
a government contractor to receive a secure government credential for online transactions.
Seventy-six percent (76%) would not be willing to submit this information for that
purpose. Sixteen percent (16%) are undecided." |
"Like Apple and Google,
Microsoft collects records of the physical locations of customers who use its mobile
operating system. Windows Phone 7,
supported by manufacturers including Dell, HTC, LG, Nokia, and Samsung, transmits to
Microsoft a miniature data dump including a unique device ID, details about nearby Wi-Fi
networks, and the phone's GPS-derived exact latitude and longitude. A Microsoft representative was not immediately able to answer questions
that CNET posed this afternoon, including how long the location histories are stored and
how frequently the phone's coordinates are transmitted over the Internet. Windows Phone
currently claims about a 6 percent market share but, according to IDC, will capture about 21 percent by 2015 thanks to
Microsoft's partnership with
Nokia. Microsoft does say, however, that location histories are not saved directly on
the device. That's different from Apple's practice of recording the locations of visible
cell towers on iPhone
and iPad devices,
which can result in more than a year's worth of data being quietly logged. Google's
approach, by contrast, records
only the last few dozen locations on Android phones." |
"...the Buffalo homeowner didn't need long to figure out the reason
for the early morning wake-up call from a swarm of federal agents. That new wireless
router. He'd gotten fed up trying to set a password. Someone must have used his Internet
connection, he thought. 'We know who you are! You downloaded thousands of images at 11:30
last night,' the man's lawyer, Barry Covert, recounted the agents saying. They referred to
a screen name, 'Doldrum.' 'No, I didn't,' he insisted. 'Somebody else could have but I
didn't do anything like that.' 'You're a creep ... just admit it,' they said. Law enforcement officials say the case is a cautionary tale. Their
advice: Password-protect your wireless router...... It's
unknown how often unsecured routers have brought legal trouble for subscribers. Besides
the criminal investigations, the Internet is full of anecdotal accounts of people who've
had to fight accusations of illegally downloading music or movies. Whether you're guilty
or not, 'you look like the suspect,' said Orin Kerr, a professor at George Washington
University Law School, who said that's just one of many reasons to secure home routers.
Experts say the more savvy hackers can go beyond just connecting to the Internet on the
host's dime and monitor Internet activity and steal passwords or other sensitive
information. A study released in February provides a sense of how often computer users
rely on the generosity or technological shortcomings of their neighbors to
gain Internet access. The poll conducted for the Wi-Fi Alliance, the industry group that
promotes wireless technology standards, found that among 1,054 Americans age 18 and older,
32 percent acknowledged trying to access a Wi-Fi network that wasn't theirs. An estimated
201 million households worldwide use Wi-Fi networks, according to the alliance. The same
study, conducted by Wakefield Research, found that 40 percent said they would be more
likely to trust someone with their house key than with their Wi-Fi network password. For
some, though, leaving their wireless router open to outside use is a philosophical
decision, a way of returning the favor for the times they've hopped on to someone else's
network to check e-mail or download directions while away from home. 'I think it's
convenient and polite to have an open Wi-Fi network,' said Rebecca Jeschke, whose home
signal is accessible to anyone within range." |
"Online adverts could soon start
stalking you. A new way of working out where you are by looking at your internet
connection could pin down your current location to within a few hundred metres. Similar techniques are already in use, but they are much less accurate.
Every computer connected to the web has an internet protocol (IP) address, but there is no
simple way to map this to a physical location. The current best system can be out by as
much as 35 kilometres. Now, Yong
Wang, a computer scientist at the University of Electronic Science and Technology of
China in Chengdu, and colleagues at Northwestern University in Evanston, Illinois, have
used businesses and universities as landmarks to achieve much higher accuracy." |
"The most talked-about feature
of Apple's iPhones and iPads these days isn't a clever new software application. It's a
hidden digital record on every device of the locations where it has been used - a
numerical travelogue that effectively traces its owner's movements by noting the times and
places it has been used. The 'consolidated.db' file has been discussed by security researchers for months, but it didn't receive widespread
attention until the O'Reilly Radar
technology blog published an expose April 20. Within a day, two members of Congress had dashed off letters to Apple demanding more
information, including an explanation of why the data were being collected and stored in
unencrypted form. And now several European countries
are launching their own investigations. Apple has remained mum, as it often does when its
motives are questioned. But the issue here isn't what the company might do with the file.
Alex Levinson, a computer forensics researcher who uncovered the file last year, says he's
seen no evidence that Apple or application developers can extract it from iPhones or
iPads. The only exception, Levinson believes, would be if the user hacked the device to
install apps not approved by Apple. 'Jailbreaking' an iPhone or iPad undermines its
built-in protections, raising the chance of a malicious app copying data from
consolidated.db and transmitting it to someone else. The data can be examined, however, by
anyone who takes physical possession of the device - a jealous lover, a thief, an attorney
with a subpoena. The O'Reilly researchers greatly simplified the task by creating a program that culls the latitude
and longitude information, then displays it on a map. As privacy threats go, this one
seems pretty mild. The data don't show the precise locations where the device was used;
instead, they compile the GPS coordinates of the cellphone towers and Wi-Fi access points
the phone has been connected to. Unless you frequent the local red light district or lie
to your spouse about the 'errands' you run, there's not much in consolidated.db to get
worked up about. Granted, the data may be useful to the police, who have already started poring over suspects' phones for clues.
But for law-abiding citizens, consolidated.db is likely to be less revealing than the text
messages and emails stored on their devices. And although there doesn't seem to be a way
for users to stop the location data from being logged, it's easy enough for them to
program the device to scramble the information whenever it's removed to prevent it from
being read by anyone else.So why all the fuss? Some of it stems from the suspicion that
the devices are transmitting the logs back to Apple, which they don't appear to be doing.
But another reason is the mystery around why the information is being recorded in the
first place." |
"The row over the privacy of
mobile phone users escalated today as it was revealed that Google devices regularly
transmit user locations back to the company. The new
revelations come after Apple was this week slammed by several Congress members for the way
user locations are being stored in unencrypted databases on the iPhone and iPad, sometimes
stretching back several months. In Google's case an Android HTC phone tracked its location
every few seconds and transmitted the data back to Google several times an hour, according
to new research by security analyst Samy Kamkar for the Wall Street Journal. It also
transmitted the name, location and signal strength of any close Wi-Fi networks and the
phone's unique identifier. Both Google and Apple have previously admitted they are using
location data to build massive databases of Wi-Fi hotspots. This can then be used to
pinpoint individual's locations via their mobile phones, which in turn could help the
companies tap into the huge market for location-based services, currently worth
$2.9billion. This figure is expected to rise to a staggering $8.3billion in 2014,
according to research company Gartner. Location data is some of the most valuable
information a mobile phone can provide, since it can tell advertisers not only where
someone's been, but also where they might be going and what they might be inclined
to buy when they get there." |
"Apple Inc (AAPL.O) must clear
up 'a string of open questions' about user data stored by its iPhone, iPad, and other devices, a spokesman for
Germany's consumer protection ministry said on Thursday. The call follows a similar request made by U.S. Senator Al Franken on
Wednesday, which cited a report by security researchers alleging the company's iOS4
operating system secretly compiled customers' location data in a hidden file. 'Apple must
reveal where, for how long, and for what purpose the data is saved, who has access to it,
and how it is protecting against unauthorised access,' ministry spokesman Holger Eichele
said. 'The secret collection and storage of a smart phone's location data would be a major
invasion of privacy,' he added. Germany
has particularly strong data protection laws, and companies such as social networking site
Facebook and search engine Google have faced challenges here from regulators." |
"The 'Universal Forensic
Extraction Device' sounds like the perfect cell phone snooping gadget. Its maker,
Israel-based Cellbrite, says it can copy all the content in a cell phone -- including
contacts, text messages, call history, and pictures -- within a few minutes. Even deleted
texts and other data can be restored by UFED 2.0, the latest version of the product, it
says. And it really is a universal tool. The firm says UFED works with 3,000 cell phone
models, representing 95 percent of the handset market. Coming soon, the firm says on its website: 'Additional major
breakthroughs, including comprehensive iPhone physical solution; Android physical support
allowing bypassing of user lock code, (Windows Phone) support, and much more.' For
good measure, UFEC can extract information from GPS units in most cars....The
U.S. Supreme Court is currently mulling a related issue involving the use of
persistent GPS monitoring of suspects without a warrant. In that case, the FBI placed a
GPS monitoring device on a suspect's car without a warrant and then tracked his driving
for driving weeks. The Department of Justice says the technique is akin to surveillance on
public roads, but a federal appeals court ruled that such aggregation of movements over
time constituted a Fourth Amendment violation. Because the ruling conflicts with other
appeals court rulings in similar cases, the Department of Justice recently asked the
Supreme Court to take the case and settle the matter." |
"Security researchers have
discovered that Apple's iPhone keeps track of where you go
and saves every detail of it to a secret file on the device which is then copied to
the owner's computer when the two are synchronised. The file contains the latitude and
longitude of the phone's recorded coordinates along with a timestamp, meaning that anyone
who stole the phone or the computer could discover details about the owner's movements
using a simple program. For some phones, there could be almost a year's worth of data
stored, as the recording of data seems to have started with Apple's iOS 4 update to the
phone's operating system, released in June 2010. 'Apple has made it possible for almost
anybody a jealous spouse, a private detective with access to your phone or
computer to get detailed information about where you've been,' said Pete Warden, one of
the researchers. Only the iPhone records the user's
location in this way, say Warden and Alasdair Allan, the data scientists who discovered
the file and are presenting their findings at the Where 2.0 conference in San Francisco on
Wednesday. 'Alasdair has looked for similar tracking code in [Google's] Android phones and
couldn't find any,' said Warden. 'We haven't come across any instances of other phone
manufacturers doing this.' Simon Davies, director of the pressure group Privacy
International, said: 'This is a worrying discovery. Location is one of the most sensitive
elements in anyone's life just think where people go in the evening. The existence
of that data creates a real threat to privacy. The absence of notice to users or any
control option can only stem from an ignorance about privacy at the design stage.' Warden
and Allan point out that the file is moved onto new devices when an old one is replaced:
'Apple might have new features in mind that require a history of your location, but that's
our specualtion. The fact that [the file] is transferred across [to a new iPhone or iPad]
when you migrate is evidence that the data-gathering isn't accidental.' But they said it
does not seem to be transmitted to Apple itself....They have blogged about their discovery
at O'Reilly's
Radar site, noting that 'why this data is stored and how Apple intends to use it
or not are important questions that need to be explored.'... Apple can
legitimately claim that it has permission to collect the data: near the end of the
15,200-word terms and conditions
for its iTunes program, used to synchronise with iPhones, iPods and iPads, is an
86-word paragraph about 'location-based services'. It says that 'Apple and our partners
and licensees may collect, use, and share precise location data, including the real-time
geographic location of your Apple computer or device. This location data is collected
anonymously in a form that does not personally identify you and is used by Apple and our
partners and licensees to provide and improve location-based products and services. For
example, we may share geographic location with application providers when you opt in to
their location services." |
"Cellphone users say they want
more privacy, and app makers are listening. No, they're not listening to user requests.
They're literally listening to the sounds in your office, kitchen, living room and
bedroom. A new class of smartphone app has emerged that uses the microphone built into
your phone as a covert listening device -- a 'bug,' in common parlance. But according to
app makers, it's not a bug. It's a feature! The apps use ambient sounds to figure out what
you're paying attention to. It's the next best thing to reading your mind. The issue was
brought to the world's attention recently on a podcast called This Week in Tech. Host Leo Laporte and his panel shocked listeners by
unmasking three popular apps that activate your phone's microphone to collect sound
patterns from inside your home, meeting, office or wherever you are. The apps are Color, Shopkick and IntoNow,
all of which activate the microphones in users' iPhone
or Android
devices in order to gather contextual information that provides some benefit to the user.
Color
uses your iPhone's or Android phone's microphone to detect when people are in the same
room. The data on ambient noise is combined with color and lighting information from the
camera to figure out who's inside, who's outside, who's in one room, and who's in another,
so the app can auto-generate spontaneous temporary social networks of people who are
sharing the same experience. Shopkick works on both
iPhone and Android devices. One feature of the app is to reward users for simply walking
into participating stores, which include Target, Best Buy, Macy's, American Eagle
Outfitters, Sports Authority, Crate & Barrel and many others. Users don't have to
press any button. Shopkick listens through your cellphone for inaudible sounds generated
in the stores by a special device. IntoNow is an iOS app that allows social networking
during TV shows. The app listens with your iPhone or iPad
to identify what you're watching. The company claims 2.6 million 'broadcast airings' (TV
shows or segments) in its database. A similar app created for fans of the TV show Grey's
Anatomy uses your iPad's microphone to identify exactly where you are in the show, so it
can display content relevant to specific scenes. While IntoNow is based on the
company's own SoundPrint technology, the Grey's Anatomy app is built on Nielsen's
Media-Sync platform. Obviously, the idea that app companies are eavesdropping on private
moments creeps everybody out. But all these apps try to get around user revulsion by
recording not actual sounds, but sound patterns, which are then uploaded to a server as
data and compared with the patterns of other sounds....You should know that any data that
can be gathered, will be gathered. Since the new microphone-hijacking apps are still
around, we now know that listening in on users is OK. So, what's possible with current
technology? By listening in on your phone, capturing 'patterns,' then sending that data
back to servers, marketers can determine the following: * Your gender, and the gender of
people you talk to. * Your approximate age, and the ages of the people you talk to. * What
time you go to bed, and what time you wake up. * What you watch on TV and listen to on the
radio. * How much of your time you spend alone, and how much with others. * Whether you
live in a big city or a small town. *What form of transportation you use to get to
work." |
"The first time Greenpeace USA realised they had a security problem
was in April 2008 when Mark Floegel, senior investigator with the environmental
organisation, took a call from a colleague. 'He told me Jim Ridgeway, a reporter with
Mother Jones, was writing a piece and would call me for comment. I didn't know what he was
talking about,' Floegel said. Ridgeway revealed
Greenpeace had been 'targeted' by a private security company and that a trove of sensitive
documents was stashed in a Maryland storage locker. Greenpeace, no stranger to black ops -
covert, sometimes illicit and deniable operations - was about to get a window into an
alleged nexus between corporate titans and private security companies. The documents were stored by John Dodd, the millionaire heir to a local
beer distributorship and the prime investor in a now-defunct private security company,
Beckett Brown International. The company was set up in 1995 after a chance meeting in a
Maryland bar connected Dodd to several ex-Secret Service officers who wanted to get into
private security. Dodd provided $700,000 on the proviso he owned BBI until it was repaid.
Before long, business was booming. By 2001, relations between Dodd and BBI had soured.
When he learned staff were 'sterilising the office', shredding records before closing
shop, Dodd drove a truck to the firm's Maryland address and retrieved piles of documents.
Dodd began reading documents and, says Floegel, began to suspect 'criminal activity' and
contacted 'victims'. Greenpeace recovered 20 boxes of documents. They included
confidential employee details such as email passwords, Social Security numbers, donor
payments, privileged attorney-client conversations and strategic plans to fight climate
change, ocean pollution, genetic engineering and other campaigns. The boxes also had BBI
work logs, plus documents sent to defendants and clients such as Wal-Mart, Halliburton,
the National Rifle Association, the Carlyle Group and Monsanto. The documents, many posted
on the Greenpeace USA site, make intriguing reading. The 'BBI Targets' include Friends of
the Earth, the Centre for Food Safety and the National Environmental Trust/GE Food Alert,
and various scientists and individuals, as well as Greenpeace, with various handwritten
notes listing addresses and phone numbers. It is this cache that Greenpeace has mined for
evidence in a lawsuit levelled against a handful of ex-BBI employees. The defendants also
include two public relations firms, Dezenhall Resources and Ketchum and two
multinationals, chemical giants Dow Chemical and Sasol America. Greenpeace has filed a
detailed complaint and the case is proceeding in a Washington DC courtroom. 'It took
several months to sift through the records,' says Floegel. He says they reveal a narrative
of BBI activity, including client reports advising, 'Greenpeace will do this, Greenpeace
will do that'. It is a window into a murky world where BBI, whose staff included ex-CIA
and Secret Service officers, allegedly reported to Dezenhall and Ketchum who, in turn,
channelled confidential material, allegedly filched from Greenpeace, to Dow and Sasol. The
complaint accuses defendants of "clandestine and unlawful activities", claiming
they stole confidential documents, conducted illicit surveillance - sometimes using
off-duty policemen - and 'in all likelihood' broke into Greenpeace offices and other
locations between 1998-2000. It cites at least 200 illegal actions in this period. One
email, found in 'Ketchum Dow emails and docs', and addressed to Timothy Ward, then BBI's
'director of investigative services', reveals a global dimension to BBI activities, as the
BBI man discusses a 'sensitive all-source intelligence collection effort' on foreign
greens. The defendants' aim, says Greenpeace, was to disrupt campaigns against 'the
companies' activities that were damaging to the environment', including the impact of
toxins leaked from a Sasol plant in Louisiana and Dow's production of dioxins and
genetically modified organisms." |
"It's recently been revealed
that the U.S. government contracted HBGary Federal for the development of software which
could create multiple fake social media profiles to manipulate and sway public opinion on
controversial issues by promoting propaganda. It could also be used as surveillance to
find public opinions with points of view the powers-that-be didn't like. It could then
potentially have their 'fake' people run smear campaigns against those 'real' people. As disturbing as this is, it's not really new for U.S. intelligence or
private intelligence firms to do the dirty work behind closed doors. EFF previously warned that Big Brother wants to be
your friend for social media surveillance. While the FBI Intelligence Information Report Handbook (PDF) mentioned
using 'covert accounts' to access protected information, other government agencies
endorsed using security exploits to access protected
information..... The 6th Contracting Squadron at MacDill Air Force Base sought the
development of Persona Management Software which could be
used for creating and managing fake profiles on social media sites to distort the truth
and make it appear as if there was a generally accepted agreement on controversial issues.
'Personas must be able to appear to originate in nearly any part of the world and can
interact through conventional online services and social media platforms.'... According to Redacted News, the leaked emails showed how names can be
cross-referenced across social media sites to collect information on people and then used
to gain access to those social ciricles. The emails also talked of how Facebook could be
used to spread government messages..." |
"It's recently been revealed
that the U.S. government contracted HBGary Federal for the development of software which
could create multiple fake social media profiles to manipulate and sway public opinion on
controversial issues by promoting propaganda. It could also be used as surveillance to
find public opinions with points of view the powers-that-be didn't like. It could then
potentially have their "fake" people run smear campaigns against those
"real" people. As disturbing as this is,
it's not really new for U.S. intelligence or private intelligence firms to do the dirty
work behind closed doors....According
to Redacted News, the leaked emails showed how names can be cross-referenced across
social media sites to collect information on people and then used to gain access to those
social ciricles. The emails also talked of how Facebook could be used to spread government
messages: 'Even the most restrictive and security conscious of persons can be exploited.
Through the targeting and information reconnaissance phase, a person's hometown and high
school will be revealed. An adversary can create a classmates.com account at the same high
school and year and find out people you went to high school with that do not have Facebook
accounts, then create the account and send a friend request. Under the mutual friend
decision, which is where most people can be exploited, an adversary can look at a targets
friend list if it is exposed and find a targets most socially promiscuous friends, the
ones that have over 300-500 friends, friend them to develop mutual friends before sending
a friend request to the target. To that end friend's accounts can be compromised and used
to post malicious material to a targets wall. When choosing to participate in social media
an individual is only as protected as his/her weakest friend.'" Army of Fake Social Media Friends to Promote Propaganda PC World, 23 February 2011 |
"Some startling figures tumbled
out on rampant phone
tapping in the country when telecom service provider Reliance
Communications told the Supreme Court
on Monday that the authorities had asked it to tap 1.51 lakh phone numbers in a five-year
span between 2006 and 2010. This works out to an
average of over 30,000 telephone interceptions every year by a single service provider on
the orders of various law enforcing agencies. Or, over 82 telephones were intercepted
every day by a single service provider....If Reliance's ratio of phones tapped to the
number of its subscribers were to be taken as representative and applied to other service
providers, it is a fair assumption that government agencies were tapping more than one
lakh phones every year. In Delhi
alone, Reliance tapped a total of 3,588 phones in 2005 when the teledensity was low
compared to today. It also included Amar Singh's number which was put under surveillance
allegedly on a forged letter from Delhi Police." |
"Private spying by large
corporations into the affairs of environmental groups, as
revealed by the Guardian, is nothing new in the US. Last November, as
Mother Jones reported, Greenpeace went into federal district court in Washington,
seeking an injunction against Dow Chemical Company and Sasol North America for meddling in
its internal affairs. (Sasol is the big South
African energy company with operations, including chemicals, in the US.) Greenpeace is
claiming these two multinational chemical outfits between 1998 and 2000 set up a
clandestine operation to break into Greenpeace Washington offices to steal 'confidential
information and trade secrets', go through its trash cans, conducted surveillance of its
employees and ran an undercover operation to penetrate and disrupt the organisation's
campaigns involving climate change, genetic foods and chemical pollution. According to
the suit, the chemical companies and their PR firms employed a now-defunct private
detective firm called Beckett Brown International (BBI) to do the dirty work. The
companies have denied the allegations; detailed responses to the Greenpeace complaint are
due soon." |
"The Obama administration's
Justice Department has asserted that the FBI can obtain telephone records of international
calls made from the U.S. without any formal legal process or court oversight, according to
a document obtained by McClatchy. That assertion was
revealed perhaps inadvertently by the department in its response to a
McClatchy request for a copy of a secret Justice Department memo. Critics say the legal
position is flawed and creates a potential loophole that could lead to a repeat of FBI
abuses that were supposed to have been stopped in 2006. The controversy over the telephone
records is a legacy of the Bush administration's war on terror. Critics say the Obama
administration appears to be continuing many of the most controversial tactics of that
strategy, including the assertion of sweeping executive powers." |
"The US Justice Department wants
Internet service providers and cell phone companies to be required to hold on to records
for longer to help with criminal prosecutions....
Kate Dean, executive director of the Internet Service Provider Association, said broad
mandatory data retention requirements would be 'fraught with legal, technical and
practical challenges.' Dean said they would require 'an entire industry to retain billions
of discrete electronic records due to the possibility that a tiny percentage of them might
contain evidence related to a crime.'" |
"A police
spy married an activist he met while undercover in the environmental protest
movement and then went on to have children with her, the Guardian can reveal. He is the
fourth spy now to have been identified as an undercover police officer engaged in the
covert surveillance of eco-activists. Three of those
spies are accused of having had sexual relationships with the people they were targeting.
The details of the activities of the fourth spy, who is still a serving Metropolitan
police officer, emerged as the senior police officer managing the crisis in undercover
operations insisted that officers were strictly banned from having sexual relationships
with their targets. Jon Murphy, the chief constable of Merseyside, told the Guardian it
was 'never acceptable' for undercover officers to sleep with people they were
targeting.... The Guardian also today fully identifies two of the other undercover
officers involved in spying on the eco-activists, previously called Officer
A and B.Their
names and photographs were not used after representations from senior police, but both
have now been extracted from undercover roles in other investigations, and they can be
named as Lynn Watson and Mark Jacobs." |
"It's the flip-side of enjoying
instant communication with your friends. Facebook has courted a fresh privacy row by
allowing developers of apps access to sensitive information including telephone numbers
and addresses. The social networking site announced the change on its blog, saying: 'We
are now making a user's address and mobile phone number accessible.' Internet security
analysts and privacy experts are now advising people to remove their phone numbers and
addresses from the site. While Facebook users must
grant individual applications permission to access their details, it is likely that many
who have clicked their approval plenty of times before will not notice the change in
terms. They will pass on their contact details unknowingly, leaving them more vulnerable
to becoming victims of spam, it is feared. Graham Cluley, of IT security firm Sophos,
said: 'The ability to access users' home addresses will also open up more opportunities
for identity theft, combined with the other data that can already be extracted from
Facebook users' profiles. 'You have to ask yourself - is Facebook putting the safety of
its 500-plus million users as a top priority with this move?' Facebook, which gives
advertisers the ability to target users according to their stated interests, geographical
location and other insights, has been criticised increasingly over the years for how it
handles the privacy of its account holders.... it is often unclear who exactly is behind
the small and seemingly harmless pieces of software available via Facebook, which many
users enjoy signing up for in order to brighten up their profile pages or to play games or
quizzes with friends. Facebook has opted against a systematic program of vetting potential
applications, such as that by Apple. The website therefore inevitably hosts a number of
potentially rogue, independent applications that have been designed by third parties to
misleadingly gain access to users' information, and farm it out on as wide a scale as
possible." |
"An undercover policeman who
spent seven years living as an environmental activist has claimed that at least 15 other
agents had infiltrated the movement and disclosed
that sexual entanglements with them were commonplace. Mark Kennedy, 41, a former
Metropolitan Police officer who posed as a climate change protester known as 'Mark Stone',
spoke out about the 'grey and murky' world of undercover policing in which he said 'really
bad stuff' was secretly going on. Last week the £1 million trial of six environmental
activists accused of plotting to break into the Ratcliffe-on-Soar coal-fired power station
in Nottinghamshire collapsed amid questions over Mr Kennedys involvement. The
Independent Police Complaints Commission is now investigating whether Nottinghamshire
Police withheld secret recordings made by Mr Kennedy showing that those accused were
innocent of conspiracy from the prosecution. In an interview with the Mail on Sunday the
former policeman said he had been 'hung out to dry' by his former handlers in the National
Public Order Intelligence Unit (NPOIU) which sent him to infiltrate radical environmental
groups in 2003. He insisted that he had been instrumental in preventing 'bloodshed' amid
clashes between police and protesters and claimed that key intelligence he had gathered
had been passed to Tony Blair and other European leaders.... Mr Kennedy also disclosed
that he knew of at least 15 other undercover police who had infiltrated the movement and
said that by the time he left in 2009 there were at least four others. 'The world of
undercover policing is grey and murky,' he said. 'There is some bad stuff going on, really
bad stuff.' The scale of public money invested in such operations was also laid bare as he
disclosed that in addition to his £50,000-a-year salary, his handlers paid up to
£200,000 a year into a secret bank account to help him maintain his cover." |
"Police
chiefs are being called on to review the way long-term undercover operations are handled
amid growing concerns about the secretive unit at the heart of their
spying operation. The lawyer and former director
of public prosecutions Lord Macdonald said the handling of undercover officers appeared to
be 'alarming' and 'opaque' after Mark Kennedy was unmasked
as an undercover police officer spying on the environmental movement. 'There should be
published guidelines,' said Macdonald. 'It is particularly important that the public
understands what the principles and what the rules are. The fact this operation is so
opaque, nobody knows how it was run, what the objectives were, why it ran for so long, I
think that's quite alarming.' Claims made against police include that during his seven
years as a spy Kennedy acted as an agent provocateur and had a string
of sexual relationships with fellow activists. But the case has also highlighted the
role of the secretive police intelligence units overseen by the Association of Chief
Police Officers (Acpo) to which both Kennedy and a second
undercover officer known as Officer A had been seconded. 'There is this whole issue of
what Acpo is,' said Macdonald. 'It's a limited company. It's an odd sort of organisation.
There should be published guidelines, there should be a debate about it. The police should
invite comment and discussion ... The whole purpose is to maintain public confidence.' The
furtive apparatus that oversees the police fight against 'domestic extremists' dates back
to the late 1990s animal rights militants were its focus. Many were prepared to resort to
violence, intimidating scientists, sending letter bombs and, most notoriously, digging up a
grandmother's grave. The police took an
aggressive stance that led to the jailing of many of key animal rights figures. But
according to critics, once this threat had subsided the officers who had built up the
infiltration units sought new targets to justify their budgets and existence.
Environmentalists say the burgeoning green movement fitted the bill. They say police were
given licence to carry out widespread and intrusive surveillance of entire legitimate
organisations. In the late 1990s the remit was
extended to 'include all forms of domestic extremism, criminality and public disorder
associated with cause-led groups'. Police dismiss the claims, insisting they only monitor
the minority on the far left and right who might commit crimes such as damaging property
or trespass to promote their political aims. There are three little-known 'domestic
extremism' units working under the direction of Detective Chief Superintendent Adrian
Tudway. Concerns have been growing about their accountability and subject to agreement
they will be taken over by the Met under a 'lead force' agreement the same way the
Met has overall command of national counter-terrorism operations. Tudway, the 'national
co-ordinator for domestic extremism', commands about 100 staff and has a budget of about
£9m a year. By far the biggest segment of this 'domestic extremism' apparatus is the National Public Order Intelligence Unit (NPOIU), which has
been compiling a database of protesters and campaign groups across the country since 1999.
It is believed several undercover police officers including Kennedy and Officer A
had been living long-term in the environmental movement, feeding intelligence back
to NPOIU. With around 60 to 70 staff, NPOIU costs
£5m a year to run, according to the latest official figures. Its budget has doubled in
the last five years. Housed at a secret location in London, its official remit is 'to
gather, assess, analyse and disseminate intelligence and information relating to criminal
activities in the United Kingdom where there is a threat of crime or to public order which
arises from domestic extremism or protest activity'. Essentially it is
pooling intelligence from special branch officers, uniformed surveillance teams and
undercover officers that can be shared with police forces around the country. Sensitive information from undercover officers, other informants
in protest groups and covert intercepts are handled by a section of the NPOIU called the
Confidential Intelligence Unit. The database
contains descriptions of people, their nicknames or pseudonyms, reports of their
activities and photographs of them. The only activists so far confirmed to be on the
database are 85-year-old John Catt and his daughter Linda, two peaceful campaigners from
Brighton. John Catt often goes to demonstrations, where he likes to take out his sketch
pad and draw the scene. Police files revealed how the NPOIU had logged their presence at
more than 80 lawful demonstrations over four years, recording details such as their
appearance and slogans on their T-shirts.....Catt and his daughter deny any involvement in
criminal activity and neither of them have criminal records. Anton Setchell, the police
chief who was previously in charge of 'domestic extremism', told the Guardian in 2009 that
it was possible that protesters with no criminal record were on the database but police
would have to justify their inclusion. 'Just because
you have no criminal record does not mean that you are not of interest to the police,' he said. 'Everyone who has got a criminal record did not have one once.'
The second organisation is known as the National Extremism Tactical Co-ordination Unit
(Netcu). It gives out advice to police forces, companies, universities and other
organisations to cope with protests that it believes will be unlawful. The Cambridgeshire-based unit, set up in 2004, liaises with
thousands of companies in aviation, energy, research, farming and retail. The third unit, the National Domestic Extremism Team, was set up in 2005
and consists of detectives who assist police forces around the UK." |
"The California Supreme Court
allowed police Monday to search arrestees' cell phones without a warrant, saying
defendants lose their privacy rights for any items they're carrying when taken into
custody. Under U.S.
Supreme Court precedents, 'this loss of privacy allows police not only to seize
anything of importance they find on the arrestee's body ... but also to open and examine
what they find,' the state court said in a 5-2
ruling. The majority, led by Justice Ming Chin, relied on decisions in the 1970s by the
nation's high court upholding searches of cigarette packages and clothing that officers
seized during an arrest and examined later without seeking a warrant from a judge. The
dissenting justices said those rulings shouldn't be extended to modern cell phones that
can store huge amounts of data. Monday's decision allows police 'to rummage at leisure
through the wealth of personal and business information that can be carried on a mobile
phone or handheld computer merely because the device was taken from an arrestee's person,'
said Justice Kathryn Mickle Werdegar, joined in dissent by Justice Carlos Moreno. They
argued that police should obtain a warrant - by convincing a judge that they will probably
find incriminating evidence - before searching a cell phone." |
2010 |
"Police in Delaware may soon be unable to use global positioning
systems (GPS) to keep tabs on a suspect unless they have a court-signed warrant, thanks to
a recent ruling by a superior court judge who cited famed author George Orwell in her
decision. In striking down evidence obtained through warrantless GPS tracking, Delaware
Judge Jan R. Jurden wrote that 'an Orwellian state is now technologically feasible,'
adding that 'without adequate judicial preservation of privacy, there is nothing to
protect our citizens from being tracked 24/7.' The ruling goes against a federal appeals
court's decision last summer that allowed warrantless tracking by GPS. Jurden was ruling
on the case of Michael D. Holden, who police say was pulled over with 10 lbs. of marijuana
in his car last February. Holden was allegedly named by a DEA task force informant in
2009, and in early 2010, without obtaining a warrant, police placed a GPS device on his
car, allowing them to follow him whenever he used the vehicle." Judge warns of Orwellian state in warrantless GPS tracking case Raw Story, 30 December 2010 |
"Scores of foxhunters can sit easier in their saddles on the biggest
day of the sports calendar today after a judge cast doubt on the legality of covert
filming by anti-hunt activists. The ruling, in
a case that cannot yet be reported, lays down that covert surveillance by third parties
must be authorised in line with procedures in the Regulation of Investigating Powers Act
(Ripa). The Home Office says that the Act must be
used in accordance with the European Convention on Human Rights. 'It also requires, in
particular, those authorising the use of covert techniques to give proper consideration to
whether their use is necessary and proportionate,' official guidance states. This suggests
that the type of speculative surveillance carried out by some organisations and hunt
monitors cannot be authorised because it is not necessary or proportionate for the
prevention or detection of an offence under the Hunting Act. The Association of Chief
Police Officers (Acpo) is so anxious that forces may be acting unlawfully that it has
asked for advice from the Crown Prosecution Service." |
"Your digital camera may embed
metadata into photographs with the camera's serial number or your
location. Your printer may be incorporating a secret code on every page it prints which
could be used to identify the printer and potentially the person who used it. If Apple
puts a particularly creepy patent
it has recently applied for into use, you can look forward to a day when your iPhone may
record your voice, take a picture of your location, record your heartbeat, and send that
information back to the mothership. This is traitorware: devices that act behind your back to betray your privacy. Perhaps the most notable example of traitorware was the Sony rootkit. In 2005 Sony BMG produced CD's which clandestinely
installed a rootkit onto
PC's that provided administrative-level access to the users' computer. The copy-protected
music CDs would surreptitiously install its DRM
technology onto PCs. Ostensibly, Sony was trying prevent consumers from making
multiple copies of their CDs, but the software also rendered the CD incompatible
with many CD-ROM players in PCs, CD players in cars, and DVD players. Additionally,
the software left a back door open on all infected PCs which would give Sony, or any
hacker familiar with the rootkit, control over the PC. And if a consumer should have the
temerity to find the rootkit and try to remove the offending drivers, the software would
execute code designed to disable the CD drive and trash the PC. Traitorware is sometimes
included in products with less obviously malicious intent. Printer
dots were added to certain color laser printers as a forensics tool for law enforcement, where it could help authenticate documents or identify forgeries.
Apples scary-sounding patent for the iPhone is meant to help locate and disable the
phone if it is lost of stolen. Dont let these
good intentions fool yousoftware that hides itself from you while it gives your
personal data away to a third party is dangerous and dishonest. As the Sony BMG rootkit
demonstrates, it may even leave your device wide open to attacks from third parties." |
"One of the hallmarks of an
authoritarian government is its fixation on hiding everything it does behind a wall of
secrecy while simultaneously monitoring, invading and collecting files on everything its
citizenry does. Based on the Francis Bacon
aphorism that 'knowledge is power,' this is the extreme imbalance that renders the ruling
class omnipotent and citizens powerless. In The Washington Post today, Dana Priest and William Arkin continue their 'Top Secret America' series by describing how America's vast and growing Surveillance State now
encompasses state and local law enforcement agencies, collecting and storing
always-growing amounts of information about even the most innocuous activities undertaken
by citizens suspected of no wrongdoing.... Today, the Post reporters document how surveillance and enforcement methods pioneered in America's
foreign wars and occupations are being rapidly imported into domestic surveillance (wireless fingerprint scanners, military-grade infrared cameras,
biometric face scanners, drones on the border).... Meanwhile,
the Obama Department of Homeland Security has rapidly expanded the scope and invasiveness
of domestic surveillance programs -- justified, needless to say, in the name of Terrorism..... The results are predictable. Huge amounts of post/9-11
anti-Terrorism money flooded state and local agencies that confront virtually no Terrorism
threats, and they thus use these funds to purchase technologies -- bought from the
private-sector industry that controls and operates government surveillance programs -- for
vastly increased monitoring and file-keeping on
ordinary citizens suspected of no wrongdoing. The always-increasing cooperation
between federal, state and local agencies -- and among and within federal agencies -- has
spawned massive data bases of information containing the activities of millions of
American citizens. 'There are 96 million
sets of fingerprints' in the FBI's data base, the Post reports. Moreover,
the FBI uses its 'suspicious activities record' program (SAR) to collect and
store endless amounts of information about innocent Americans... Even the FBI admits the
huge waste all of this is -- ''Ninety-nine percent doesn't pan out or lead to anything'
said Richard Lambert Jr., the special agent in charge of the FBI's Knoxville office --
but, as history conclusively proves, data collected on citizens will be put to some use
even if it reveals no criminality. ... To
understand the breadth of the Surveillance State, recall this sentence from the original Priest/Arkin article: 'Every day, collection
systems at the National Security Agency intercept and store 1.7
billion e-mails, phone calls and other types of
communications.' As Arkin and Priest document today, there are few safeguards on how
all this data is used and abused. Local police departments routinely meet with
neoconservative groups insisting that all domestic Muslim communities are a potential
threat and must be subjected to intensive surveillance and infiltration. Groups engaged in plainly legal and protected political dissent have been
subjected to these government surveillance programs. What we have, in sum, is a vast,
uncontrolled and increasingly invasive surveillance state that knows and collects more and
more information about the activities of more and more citizens. But what makes all of
this particularly ominous is that -- as the WikiLeaks conflict demonstrates -- this
all takes place next to an always-expanding wall of secrecy behind which the Government's
own conduct is hidden from public view. Just
consider the Government's reaction to the disclosures by WikiLeaks of information which
even it -- in moments of candor -- acknowledges have caused no real damage:
disclosed information that, critically, was protected by relatively low-level secrecy
designations and (in contrast to the Pentagon Papers) none of which was designated
'Top Secret.'.... That's the mindset of the U.S.
Government: everything it does of any significance can and should be shielded
from public view; anyone who shines light on what it does is an Enemy who must be
destroyed; but nothing you do should be beyond its monitoring and storing eyes. And what's most remarkable about this -- though, given the
full-scale bipartisan consensus over it, not surprising -- is how eagerly submissive much
of the citizenry is to this imbalance. .... the
imbalance has become so extreme -- the Government now watches much of the citizenry behind
a fully opaque one-way mirror -- that the dangers should be obvious. And this is all
supposed to be the other way around: it's government officials who are supposed
to operate out in the open, while ordinary citizens are entitled to privacy. Yet
we've reversed that dynamic almost completely. And
even with 9/11 now 9 years behind us, the trends continue only in one direction." |
"Few devices know more personal details about people than the
smartphones in their pockets: phone numbers, current location, often the owner's real
nameeven a unique ID number that can never be changed or turned off. These phones don't keep secrets. They are sharing this personal data
widely and regularly, a Wall Street Journal investigation has found. An
examination of 101 popular smartphone 'apps'games and other software applications
for iPhone and Android phonesshowed that 56 transmitted the phone's unique device ID
to other companies without users' awareness or consent. Forty-seven apps transmitted the
phone's location in some way. Five sent age, gender and other personal details to
outsiders. The findings reveal the intrusive effort by online-tracking companies to gather
personal data about people in order to flesh out detailed dossiers on them. Among the apps
tested, the iPhone apps transmitted more data than the apps on phones using Google Inc.'s
Android operating system. Because of the test's size, it's not known if the pattern holds
among the hundreds of thousands of apps available. Apps sharing the most information
included TextPlus 4, a popular iPhone app for text messaging. It sent the phone's unique
ID number to eight ad companies and the phone's zip code, along with the user's age and
gender, to two of them.... 'In the world of mobile, there is no anonymity,' says Michael
Becker of the Mobile Marketing Association, an industry trade group. A cellphone is 'always with us. It's always on.'...
Smartphone users are all but powerless to limit the tracking. With few exceptions, app
users can't 'opt out' of phone tracking, as is possible, in limited form, on regular
computers. On computers it is also possible to block or delete 'cookies,' which are tiny
tracking files. These techniques generally don't work on cellphone apps.... The Journal
also tested its own iPhone app; it didn't send information to outsiders. The Journal
doesn't have an Android phone app. Among all apps tested, the most widely shared detail
was the unique ID number assigned to every phone. It is effectively a 'supercookie,' says
Vishal Gurbuxani, co-founder of Mobclix Inc., an exchange for mobile advertisers. On
iPhones, this number is the 'UDID,' or Unique Device Identifier. Android IDs go by other
names. These IDs are set by phone makers, carriers or makers of the operating system, and
typically can't be blocked or deleted. 'The great thing
about mobile is you can't clear a UDID like you can a cookie,' says Meghan
O'Holleran of Traffic Marketplace, an Internet ad network that is expanding into mobile
apps. 'That's how we track everything.' Ms. O'Holleran says Traffic Marketplace, a unit of
Epic Media Group, monitors smartphone users whenever it can. 'We watch what apps you
download, how frequently you use them, how much time you spend on them, how deep into the
app you go,' she says. She says the data is aggregated and not linked to an individual....
By tracking a phone's location, Mobclix also makes a 'best guess' of where a person lives,
says Mr. Gurbuxani, the Mobclix executive. Mobclix then matches that location with
spending and demographic data from Nielsen Co. In roughly a quarter-second, Mobclix can
place a user in one of 150 'segments' it offers to advertisers, from 'green enthusiasts'
to 'soccer moms.' For example, 'die hard gamers' are 15-to-25-year-old males with more
than 20 apps on their phones who use an app for more than 20 minutes at a time." Your Apps Are Watching You Wall St Journal, 18 December 2010 |
"I don't want to live in a world where everyone is watched all the
time.... Everyone everywhere should be able to speak and read and form their own beliefs
without being monitored..... It's not just the state.
If it wanted to, Google could overthrow any country in the world. Google has enough dirt
to destroy every marriage in America.... I love
Google. And I love the people there. Sergey Brin and Larry Page are cool. But I'm
terrified of the next generation that takes over. A benevolent dictatorship is still a
dictatorship. At some point people are going to
realize that Google has everything on everyone. Most of all, they can see what questions
you're asking, in real time. Quite literally, they can read your mind." |
"More than two years ago, Mother
Jones exposed a private security firm run by former Secret Service agents
that had spied on an array of environmental groups on behalf of corporate clients, in some
cases infiltrating unsuspecting organizations with operatives posing as activists. Now,
one of the targets of this corporate espionage is fighting back. On Monday, Greenpeace filed suit in federal
district court in Washington, DC, against the Dow Chemical Company and Sasol North
America, charging that the two multinational chemical manufacturers sought to thwart its
environmental campaigns against genetically engineered foods and chemical pollution
through elaborate undercover operations. Also named
in the suit are Dezenhall Resources and Ketchum, public relations firms hired by Sasol and
Dow respectively, and four ex-employees of that now-defunct security firm, Beckett Brown
International (BBI). The suit charges that between 1998 and 2000 the chemical companies,
the PR firms, and BBI 'conspired to and did surveil, infiltrate and steal confidential
information from Greenpeace with the intention of preempting, blunting or thwarting its
environmental campaigns. These unlawful activities included trespassing on the property of
Greenpeace, infiltrating its offices, meetings and electronic communications under false
pretenses and/or by force, and by these means, stealing confidential documents, data and
trade secrets from Greenpeace.' Greenpeace is seeking an injunction against further
trespass and thefts of trade secrets, as well as compensatory and punitive damages. The
lawsuit stems from an April 2008 Mother Jones article that detailed a series of black ops
carried out by BBI against Greenpeace and other environmental groups. The story was based
largely on internal BBI records made available to the magazine by John Dodd, a principal
investor and officer of BBI. At the time, Dodd said he decided to come forward after
discovering that BBI's employees had defrauded him and engaged in unscrupulous snooping on
activist groups and other targets. Mother Jones reporters sifted through thousands of
pages of internal documents that included billing records, surveillance reports, and email
correspondence from undercover operatives in Washington and Lake Charles, Louisiana.
Contained in the trove were a variety of internal Greenpeace records, including strategy
memos, campaign plans, donor lists, and documents that included credit card information
and the social security numbers of Greenpeace employees. Also unearthed were similar
records belonging to other organizations, including Friends of the Earth, GE Food Alert,
the Center for Food Safety, and Fenton Communications, a PR firm that represents various
environmental groups." |
"The police are seeking powers to shut down websites
deemed to be engaged in 'criminal' activity. The Serious and Organised Crime Agency (SOCA)
has tabled a plan for Nominet, which oversees .uk web addresses, to be given the domain
closing power. Nominet said the idea was only a proposal and invited people to join the
debate on the form of the final policy. IT lawyers
said the proposal would be 'worrying' if it led to websites going offline without judicial
oversight. 'It's not policy at this stage,' said
Eleanor Bradley, director of operations at Nominet." |
"Robert
S. Mueller III, the director of the Federal
Bureau of Investigation, traveled to Silicon Valley on Tuesday to meet with top
executives of several technology firms about a proposal to make it easier to wiretap
Internet users. Mr. Mueller and the F.B.I.s
general counsel, Valerie Caproni, were scheduled to meet with senior managers of several
major companies, including Google
and Facebook,
according to several people familiar with the discussions. How Mr. Muellers proposal
was received was not clear. 'I can confirm that F.B.I. Director Robert Mueller is visiting
Facebook during his trip to Silicon Valley,' said Andrew Noyes, Facebooks public
policy manager. Michael Kortan, an F.B.I. spokesman, acknowledged the meetings but did not
elaborate. Mr. Mueller wants to expand a 1994 law, the Communications Assistance for Law
Enforcement Act, to impose regulations on Internet companies. The law requires phone and
broadband network access providers like Verizon
and Comcast
to make sure they can immediately comply when presented with a court wiretapping order.
Law enforcement officials want the 1994 law to also cover Internet companies because
people increasingly communicate online. An interagency task force of Obama administration
officials is trying to develop legislation for the plan, and submit it to Congress early
next year. The Commerce Department and State
Department have questioned whether it would inhibit innovation, as well as whether
repressive regimes might harness the same capabilities to identify political dissidents,
according to officials familiar with the discussions. Under the proposal, firms would have to design systems to intercept and
unscramble encrypted messages. Services based overseas would have to route communications
through a server on United States soil where they could be wiretapped." |
"Britain is heading for a new
surveillance state of unmanned spy drones, GPS tracking of employees and profiling through
social networking sites, the information watchdog has warned. The relentless march of the surveillance society has seen snooping
techniques 'intensify and expand' at such a pace that regulators are struggling to keep
up, according to Christopher Graham, the Information Commissioner. Despite moves by the
Coalition Government to row back intrusions of privacy, a new wave of monitoring risks
making the spy state greater than ever. Mr Graham's predecessor warned in 2006 that the UK
could be 'sleepwalking into a surveillance society' and an updated report for him today
said such concerns are 'no less cogent' in 2010..... It said that 'visual, covert,
database and other forms of surveillance have proceeded apace' and that much of it 'goes
beyond the limits of what is tolerable in a society'. Britons are already the most watched
citizens in the democratic world because of an army of surveillance systems including
CCTV, cameras that track vehicles, vast Government databases and the sharing of personal
data such as air passenger details." |
"A mother took a council to court yesterday after it used
surveillance powers designed to combat terrorism to establish whether she had lied to get
her children into a 'good' school. Jenny Paton, her partner and three children were
followed for nearly three weeks by officers from Poole Borough Council, using the
Regulation of Investigatory Powers Act (Ripa). They wrongly suspected that she did not
live in the schools catchment area. Speaking before a two-day hearing of the
Investigatory Powers Tribunal, Ms Paton, 40, poured scorn on the councils actions.
She said: 'Some of the operational aspects are ludicrous and completely outrageous and I
think we all need protecting from the way local authorities are using Ripa. This is about
saying no more. Lets have more safeguards and better scrutiny.' She
asked why the officials, if they doubted her story, did not knock on her front door and
speak to her....Ripa was introduced in 2000 to define
when covert techniques, such as secret filming, could be used by police, local councils
and benefit fraud teams. The powers have been used almost 50,000 times by public
authorities such as local councils and the health service since 2002. After public alarm
the Government is about to curb the powers that councils have gained under Ripa. Local authorities have used legislation intended to tackle terrorism and
serious crime to deal with minor offences such as dog fouling. Conway council in Wales
used the Act to spy on a worker who claimed to be sick, and Kensington and Chelsea council
in London used it to monitor the misuse of a disabled parking badge. Under reform plans,
set out yesterday, junior council officials will lose their power to authorise
surveillance operations on behalf of local authorities. There are, however, plans to
extend its use to allow officials to trace parents who refuse to pay child support.
Investigators will be given access to the phone and internet records of thousands of
fathers who do not co- operate with the Child Maintenance and Enforcement
Commission." School place dispute mother sues council over use of terror powers London Times, 6 November 2009 |
"Vernon Bogdanor, the Professor of Government at the University of
Oxford, argues in his book The New British Constitution that a series of measures
including devolution legislation, the Human Rights Act and the abolition of the House of
Lords have already replaced one constitutional system with another. The fundamental codes that govern our relationship with the state
are being rewritten and we are supine. Yet increasingly the States tentacles
strangle us with a sinister if well-intentioned paternalism. The fear of paedophiles and
terrorists has made potential criminals of us all. We are watched by cameras, monitored by
agencies, registered on databases. The State can eavesdrop on phone calls, spy on our bank
accounts. British citizens can be detained without trial. We have no protection against
Parliament, when the party that dominates it decides to dominate us. It is time for a written constitution, ratified by the people. Professor
Bogdanor argues that one reason we have never codified our constitution is that statements
of citizens rights typically mark a new beginning, a birth, or rebirth of a new
state. Our tortuous relationship with Europe could be such a catalyst. Our country is
being reborn as a satellite of Europe yet, as the revolution is a bloodless one, it passes
without protest. We are alone among the member states in not having a written
constitution. This makes us vulnerable to European creep, and the dribbling away of civil
liberties." |
"Even the most law-abiding
driver might feel a shiver down the spine when spotting this speed camera at the roadside.
For as well as detecting speeding, it is packed with gizmos that check number plates to
make sure insurance and tax are up to date. It also
measures the distance between vehicles to spot tailgating and takes pictures of the inside
of the car to make sure you are wearing a seat belt. The latest weapon in speed
camera technology can capture footage from 150ft away. It is the first to detect multiple
offences at the same time and is connected to police computers via satellite, so that
prosecutions can be started within seconds of any offence. Development of the system,
known as Asset Advanced Safety and Driver Support for Essential Road Transport
is being funded with around £7million of European money. It is undergoing
testing in Finland and is expected to be deployed across Europe from 2013, with each unit
costing £50,000.... The Big Brother-style set-up takes various pictures
before filing details back to a central database via a GPS system. The equipment
automatically destroys images over a month old and those in which no traffic violation is
evident. Its testing comes at a time when the Government has cut central funding for speed
cameras and reduced the road safety budget by £38million." |
"Every email, phone call and
website visit is to be recorded and stored after the Coalition Government revived
controversial Big Brother snooping plans. It will allow security services and the police
to spy on the activities of every Briton who uses a phone or the internet. Moves to make
every communications provider store details for at least a year will be unveiled later
this year sparking fresh fears over a return of the surveillance state. The plans were
shelved by the Labour Government last December but the Home Office is now ready to revive
them. It comes despite the Coalition Agreement promised to 'end the storage of internet
and email records without good reason'. Any
suggestion of a central 'super database' has been ruled out but the plans are expected to
involve service providers storing all users details for a set period of time. That will
allow the security and police authorities to track every phone call, email, text message
and website visit made by the public if they argue it is needed to tackle crime or
terrorism. The information will include who is contacting whom, when and where and which
websites are visited, but not the content of the conversations or messages.... Isabella
Sankey, director of policy at Liberty, said: 'One of
the early and welcome promises of the new Government was to end the blanket storage
of internet and email records. 'Any move to amass more of our sensitive data
and increase powers for processing would amount to a significant U-turn. The terrifying
ambitions of a group of senior Whitehall technocrats must not trump the personal privacy
of law abiding Britons.' Guy Herbert, general
secretary of the No2ID campaign group, said: 'We should not be surprised that the
interests of bureaucratic empires outrank liberty. 'It is disappointing that the new
ministers seem to be continuing their predecessors' tradition of credulousness.'" |
"Law enforcement and
counterterrorism officials, citing lapses in compliance with surveillance orders, are
pushing to overhaul a federal law that requires phone and broadband carriers to ensure
that their networks can be wiretapped, federal officials say. The officials say tougher legislation is needed because some
telecommunications companies in recent years have begun new services and made system
upgrades that caused technical problems for surveillance. They want to increase legal
incentives and penalties aimed at pushing carriers like Verizon,
AT&T,
and Comcast
to ensure that any network changes will not disrupt their ability to conduct wiretaps. An
Obama administration task force that includes officials from the Justice and Commerce
Departments, the F.B.I.
and other agencies recently began working on draft legislation to strengthen and expand
the Communications Assistance to Law Enforcement Act, a 1994 law that says telephone and
broadband companies must design their services so that they can begin conducting
surveillance of a target immediately after being presented with a court order." |
"Fans of James Bond know that biometric systems can be fooled to gain
access to secure areas: now a US National Research Council report commissioned by the CIA, DARPA
and the Department of Homeland Security confirms it. Never mind using severed fingers or
'retinal transplants' to dupe security systems. The
natural changes that occur due to age and health - and the fact that prints from the same
finger can differ because of dirt or moisture - mean that anyone can unwittingly fool the
technology, leaving such systems 'inherently fallible', according to the report. It recommends that system designers wishing to improve their systems do
so by considering any identification as likely but not definitive, and by developing
methods to accommodate the inevitable mistakes." |
"A computer virus dubbed the
worlds 'first cyber superweapon' and which may have been designed to attack
Irans nuclear facilities has found a new target China. The Stuxnet computer
worm has wreaked havoc in China, infecting millions of computers around the country, state
media reported this week. Stuxnet is feared by
experts around the globe as it can break into computers that control machinery at the
heart of industry, allowing an attacker to assume control of critical systems like pumps,
motors, alarms and valves. It could, technically, make factory boilers explode, destroy
gas pipelines or even cause a nuclear plant to malfunction. The virus targets control
systems made by German industrial giant Siemens that are commonly used to manage water
supplies, oil rigs, power plants and other industrial facilities." |
"Developers of email, instant-messaging and
voice-over-internet-protocol applications would be forced to redesign their services so
their contents can be intercepted by law enforcement agents armed with legal wiretap
orders under federal legislation reported on
Monday by The New York Times. The legislation would, among other things, require
cellphone carriers, websites and other types of service providers to have a way to
unscramble encrypted communications traveling over their networks, the report said. It specifically mentions companies such as Research in Motion and
Skype, which are popular in part because their cellular communications and VoIP services
respectively are widely regarded as offering robust encryption that's impractical if not
impossible for government agents to crack." |
"Federal law enforcement and
national security officials are preparing to seek sweeping new regulations for the
Internet, arguing that their ability to wiretap criminal and terrorism suspects is 'going
dark' as people increasingly communicate online instead of by telephone. Essentially, officials want Congress to require all services that enable
communications including encrypted e-mail transmitters like BlackBerry, social
networking Web sites like Facebook
and software that allows direct 'peer to peer' messaging like Skype
to be technically capable of complying if served with a wiretap order. The mandate
would include being able to intercept and unscramble encrypted messages. The bill, which
the Obama administration plans to submit to lawmakers next year, raises fresh questions
about how to balance security needs with protecting privacy and fostering innovation. And
because security services around the world face the same problem, it could set an example
that is copied globally." |
"Cyberterrorism is such a threat
that the U.S. president should have the authority to shut down the Internet in the event
of an attack, Former CIA
Director Michael
Hayden said. Hayden made the comments during a visit to San Antonio where he was
meeting with military and civilian officials to discuss cyber security. The U.S.
military has a new Cyber Command which is to begin operations on October 1. Hayden
said the president currently does not have the authority to shut down the Internet in an
emergency." |
"A computer virus that has infected more than 60,000
machines in Iran may be a sophisticated cyber-warfare attack on Irans clandestine
nuclear arms programme, software experts have told The Times. The 'Stuxnet Worm'
was detected in July but has since evolved through a number of refinements. This virus is
distinct because it is designed to attack the software that controls machinery in a
specific industrial installation. Industry experts have speculated that the target could
be the Natanz facility, where Iran conducts its nuclear enrichment programme. Western
computer software engineers have spent months examining the virus, which remains focused
on Iran, although smaller outbreaks have occurred in Indonesia, India and Pakistan. 'It is
fairly safe to say that Iran or a specific organisation within Iran was the target,' Kevin
Hogan, head of the Dublin global response centre for Symantec, an internet security
company, said. While warning that much about the Stuxnet Worm remained unclear, he said:
'The virus searches for the Siemens Simatic Step 7 programme [which] allows a pipeline
substation to function or a petrol refinery, sewage treatment plant, potentially a nuclear
processing plant. Stuxnet modifies the programmes in those devices, it is very
implementation specific.' The Siemens software is used for controlling and monitoring
temperature within an industrial plant. Alan Bentley, senior vice-president of the IT
security specialist Lumension, described the virus as 'the most refined piece of malware
ever discovered'. Features of the Stuxnet
virus have led industry experts to speculate that a nation state may be behind its
creation, with Israel and the US the most obvious suspects. They cited as one such feature the sophisticated nature of the
programme, which exploits four previously unknown flaws within the Windows software used
by most computers." |
"The FBI improperly opened
investigations into Greenpeace and other animal rights and anti-war groups after the
September 11 attacks of 2001, the US government has admitted. Inspector-General Glenn Fine said the FBI tactics were 'troubling' because
they singled out some of domestic groups for investigations that ran for up to five years
and were extended 'without adequate basis'. He said: 'In several cases there was little
indication of any possible federal crimes. In some cases, the FBI classified some
investigations relating to non-violent civil disobedience under its Acts of Terrorism
classification.' As well as Greenpeace, groups that were investigated included People for
the Ethical Treatment of Animals and anti-war groups the Catholic Worker and the Thomas
Merton Centre in Pittsburgh." |
"Pennsylvania lawmakers plan to investigate claims that a company
hired to provide information to the state's Office of Homeland Security was gathering
information on groups who staged various protests and rallies. The Senate Veterans Affairs and Emergency Preparedness Committee
has scheduled a Sept. 27 hearing in Harrisburg regarding the Institute of Terrorism
Research and Response. Committee chair Sen. Lisa Baker, R-Luzerne, said she wants to know
if people were targeted for exercising their rights of free speech and assembly. Gov. Ed Rendell on Tuesday apologized to the groups, who became the
subject of regular anti-terrorism bulletins distributed by his homeland security director,
James Powers. The governor said he was embarrassed to learn of the bulletins, and added
he's canceling a $125,000 contract with the Philadelphia-based company. He did not fire
Powers. The bulletins were shared with representatives of the natural gas industry because
of concern over acts of vandalism at wells in the Marcellus Shale region." |
"FBI agents improperly opened
investigations into Greenpeace and several other domestic advocacy groups following the
Sept. 11 terror attacks in 2001, and put names of some of their members on terror watch
lists with evidence that turned out to be 'factually weak,' the Department of Justice said
Monday. However, the internal review by Inspector
General Glenn Fine did not conclude that the FBI purposely targeted the groups or their
members, as many civil liberties advocates had charged after anti-Iraq war rallies and
other protests were held during the administration of President George W. Bush. Rather,
Fine said, the FBI tactics appeared 'troubling' in singling out some of the domestic
groups for investigations that ran for up to five years, and were extended 'without
adequate basis.' He also questioned why the FBI continued to maintain investigative files
against the groups." |
"An obscure York nonprofit with
ties to Philadelphia University and Jerusalem is behind the state Homeland Security
agency's monitoring of protesters, environmentalists and gays, documents show. The
Institute of Terrorism Research and Response is headed by Michael Perelman, who formerly
worked for the York City Police Department, and Aaron Richman, a former police captain in
the Israeli capital, according to filings with the Pennsylvania Department of State. Gov. Ed Rendell apologized Tuesday after the disclosure that the state Office
of Homeland Security paid the institute $125,000 for weekly reports the agency used to put
Marcellus shale hearings and a gay and lesbian festival on terror watch lists for law
enforcement. 'We are appalled at what we have learned so far about these reports,' said
Witold Walczak, legal director for the ACLU of Pennsylvania. 'It all smacks of J. Edgar
Hoover. Saying that no harm was done is simplistic. Just raising questions about a group
or a person can cause harm. Dissent does not equal danger.' Perelman declined to comment
but provided a statement that explained in general terms what his organization
does..." |
"Smart phones do many things
these days: surf the Internet, send e-mail, take photos and video (and oh, yes
send and receive calls). But one thing they can do that phone companies don't
advertise is spy on you. As long as you don't leave home without your phone, that handy
gadget keeps a record of everywhere you go a record the government can then get
from your telephone company. The law is unclear about how easy it should be for the
government to get its hands on this locational data which can reveal whether you've
been going to church, attending a Tea Party rally, spending the night at a date's house or
visiting a cancer-treatment center. A federal
appeals court ruled last week that in some cases the government may need a search warrant.
And while that's a step forward, it's not good enough. The rule should be that the
government always needs a warrant to access your cell-phone records and obtain data about
where you have been. When you carry a cell phone, it is constantly sending signals about
where you are. It 'pings' nearby cell-phone towers about every seven seconds so it can be
ready to make and receive calls. When it does, the phone is also telling the company that
owns the towers where you are at that moment data the company then stores away
indefinitely. There is also a second kind of locational data that phone companies have,
thanks to a GPS chip that is embedded in most smart phones now. This is even more accurate
unlike the towers, which can only pinpoint a general area where you may be, GPS can
often reveal exactly where you are at any given moment within a matter of meters. 'About
90% of Americans are walking around with a portable tracking device all the time, and they
have no idea,' says Christopher Calabrese, a lawyer with the American Civil Liberties
Union's Washington office..... The federal government's position is that it should be able
to get most of this data if it decides it is relevant to an investigation, with no need
for a search warrant. If the government needs a warrant, it would have to show a judge
evidence that there was probable cause to believe that the cell-phone user committed a
crime an important level of protection. Without this requirement, the government
can get locational data pretty much anytime it wants. It
is not hard to imagine that the government could also one day use cell-phone data to
stifle dissent. Cell-phone records could tell them who attended an antigovernment rally.
It could also tell them who is going into the opposition party's headquarters or into the
home of someone they have questions about. Cell-phone data may be the most efficient way
ever invented for a government to spy on its people since people are planting the
devices on themselves and even paying the monthly bills. The KGB never had anything like
it. And, indeed, the U.S. government already appears
to be sweeping up a lot of data from completely innocent people. The ACLU recently told
Congress of a case in which, while looking for data on a suspect, the FBI apparently used
a dragnet approach and took data on another 180 people. The FBI has said that if it does
happen to gather data on innocent people in the course of conducting an investigation, it
keeps that information for as long as 20 years....Last week, the Philadelphia-based U.S.
Court of Appeals for the Third Circuit pushed back. A federal magistrate judge, in a good
and strong decision, had ruled that the government must always get a warrant if it wants
cell-phone data. The appeals court scaled that back a bit, ruling that magistrate judges
have the power to require the government to get a warrant, depending on the facts of the
particular case. The fight over cell-phone tracking is similar to one now going on in the
courts over GPS devices specifically, whether the government needs a warrant to
place a GPS device on someone's car." |
"Over the past several years,
entities closely linked to the private security firm Blackwater have provided
intelligence, training and security services to US and foreign governments as well as
several multinational corporations, including Monsanto, Chevron, the Walt Disney Company,
Royal Caribbean Cruise Lines and banking giants Deutsche Bank and Barclays, according to
documents obtained by The Nation. Blackwater's work
for corporations and government agencies was contracted using two companies owned by
Blackwater's owner and founder, Erik Prince: Total Intelligence Solutions and the
Terrorism Research Center (TRC). Prince is listed as the chairman of both companies in
internal company documents, which show how the web of companies functions as a highly
coordinated operation. Officials from Total Intelligence, TRC and Blackwater (which now
calls itself Xe Services) did not respond to numerous requests for comment for this
article. One of the most incendiary details in the documents is that Blackwater, through
Total Intelligence, sought to become the 'intel arm' of Monsanto, offering to provide
operatives to infiltrate activist groups organizing against the multinational biotech
firm.....Through Total Intelligence and the Terrorism Research Center, Blackwater also did
business with a range of multinational corporations. According to internal Total
Intelligence communications, biotech giant Monsantothe world's largest supplier of
genetically modified seedshired the firm in 200809. The relationship between
the two companies appears to have been solidified in January 2008 when Total Intelligence
chair Cofer Black traveled to Zurich to meet with Kevin Wilson, Monsanto's security
manager for global issues..... After the meeting in Zurich, Black sent an e-mail to other
Blackwater executives, including to Prince and Prado at their Blackwater e-mail addresses.
Black wrote that Wilson 'understands that we can span collection from internet, to reach
out, to boots on the ground on legit basis protecting the Monsanto [brand] name.... Ahead
of the curve info and insight/heads up is what he is looking for.' Black added that Total
Intelligence 'would develop into acting as intel arm of Monsanto.' Black also noted that
Monsanto was concerned about animal rights activists and that they discussed how
Blackwater 'could have our person(s) actually join [activist] group(s) legally.' Black
wrote that initial payments to Total Intelligence would be paid out of Monsanto's
'generous protection budget' but would eventually become a line item in the company's
annual budget. He estimated the potential payments to Total Intelligence at between
$100,000 and $500,000. According to documents, Monsanto paid Total Intelligence $127,000
in 2008 and $105,000 in 2009....Reached by telephone and asked about the meeting with
Black in Zurich, Monsanto's Wilson initially said, 'I'm not going to discuss it with you.'
In a subsequent e-mail to The Nation, Wilson confirmed he met Black in Zurich and that
Monsanto hired Total Intelligence in 2008 and worked with the company until early
2010." |
"A mind reading machine is a
step closer to reality after scientists discovered a way of translating people's thoughts
into words. Researchers have been able to translate
brain signals into speech using sensors attached to the surface of the brain for the first
time. The breakthrough, which is up to 90 per cent accurate, offers a way to communicate
for paralysed patients who cannot speak and could eventually lead to being able to read
anyone thoughts. .... The experimental breakthrough came when the team attached two button
sized grids of 16 tiny electrodes to the speech centres of the brain of an epileptic
patient. The sensors were attached to the surface of the brain The patient had had part of
his skull removed for another operation to treat his condition. Using the electrodes, the
scientists recorded brain signals in a computer as the patient repeatedly read each of 10
words that might be useful to a paralysed person: yes, no, hot, cold, hungry, thirsty,
hello, goodbye, more and less. Then they got him to
repeat the words to the computer and it was able to match the brain signals for each word
76 per cent to 90 per cent of the time. The computer picked up the patinet's brain waves
as he talked and did not use any voice recognition software. Because just thinking a word
and not saying it is thought to produce the same brain signals, Prof Greger
and his team believe that soon they will be able to have translation device and voice box
that repeats the word you are thinking." |
"Fears about loss of privacy are being voiced as India gears up to
launch an ambitious scheme to biometrically identify and number each of its 1.2 billion
inhabitants. In September, officials from the Unique Identification Authority of India
(UIDAI), armed with fingerprinting machines, iris scanners and cameras hooked to laptops,
will fan out across the towns and villages of southern Andhra Pradesh state in the first
phase of the project whose aim is to give every Indian a lifelong Unique ID (UID) number.
'The UID is soft infrastructure, much like mobile telephony, important to connect
individuals to the broader economy,' explains Nandan Nilekani, chairman of the UIDAI and
listed in 2009 by Time magazine as among the world's 100 most influential people..... In
talks and television interviews, Nilekani has maintained that the benefits of the UID
project far outweigh its risks.' 'It's worth taking on the project and trying to mitigate
the risks so that we get the outcomes we want,' he told the CNN-IBN television channel in
an interview. But the possibility of religious
profiling by state governments or misuse by caste lobbies is real. This is because the central government has decided to include caste as a
category in the UID questionnaire to be filled out by applicants.Because identity is
already a potent issue and the trigger for frequent identity-related conflict such
as the 2002 anti-Muslim riots in Gujarat that left 2,000 people dead any exercise
that enhances identification is fraught." |
"Coulsongate is throwing some very important light into a very murky
area. It now seems clear that the police knew that the private investigator Glenn
Mulcaire and the News of the World royal reporter Clive Goodman had illegally intercepted
the voicemail messages of many more politicians, sportsmen, celebrities and others than
just the 8 for which they were jailed. The New York Times has quoted detectives,
however, as alleging they did not pursue these investigations because of their close
relationship with Murdochs newspaper. This raises key questions about
Britains power structure and how it works..... A
central tenet of a civilised and democratic society is that the various power institutions
the political system, the banks and financial sector, industrial corporations,
criminal justice and security services, and the media must operate independently
and at arms length from each other in a manner that is transparent and
accountable. If they are found covertly to collude with each other in order to
give surreptitious and improper assistance to one of the other powerful forces in society,
it is a very serious threat about which Parliament should be urgently demanding a thorough
and comprehensive public inquiry." |
"The policeman who found the body of MI6 codebreaker Gareth Williams
said it was submerged in fluid, The Mail on Sunday has learned. An inquest
heard last week that the 31-year-old spy was padlocked in a sports hold-all and left in
the bath of his two-bedroom flat in Pimlico, Central London. But the disclosure that he
was also covered by liquid not thought to be blood or water has raised fears
that a substance was used to accelerate decay and complicate toxicology tests..... speculation that he was the victim of a professional
hit was given credence last night after further details of his work were
disclosed. He was involved in some very sensitive projects, known as codeword
protected, said a security expert. This meant that only the people in his cell
would know what he was working on, and nobody else in his organisation. You are
signed in to these projects and once you finish one you are signed out and you no longer
have access to any data or news about what is happening in the project.
......It is an aggressive form of Bluetooth or similar wireless technology,
said the security expert. He said such devices would be used by spies on the ground
to steal data from the handsets of unsuspecting terrorists, organised criminals or
officers from rival intelligence agencies. 'Traditionally,
there has been a separation of MI6 and GCHQ, said the expert. MI6 has been
full of the James Bond types working on the ground and GCHQ is filled with boffins with
beards who are doing their scientific stuff. But recently there has been a
merger of these agencies work and Williams was at the forefront of that. This was
why he was on secondment to MI6. He added that Mr Williams did similar work when he
had stints at the National Security Agency in America. The NSA is the equivalent of GCHQ
and has been leading the Wests attempts to intercept communication between Al Qaeda
cells. Mr Williams worked for the Special Delivery Team, a unit set up in the NSA to
create advanced bugging and intercepting devices." |
"John Prescott tonight demanded
the Metropolitan police reopen its investigation into the News of the World phone-hacking
scandal as the Observer revealed that Scotland Yard holds News International documents
suggesting that he was a target when deputy prime minister. Two invoices held by the Met
mention Prescott by name. They appear to show that
News International, owner of the NoW, paid Glenn Mulcaire, the private investigator at the
heart of the scandal, for his help on stories relating to the deputy PM. Lord Prescott
spoke of his anger that the information, spelled out in a letter from the Yard's legal
services directorate, emerged only after he was given a series of personal reassurances by
detectives at the highest level that there was 'no evidence' his phone may have been
hacked. The invoices are both dated May 2006, at a time when Prescott was the subject of
intense media scrutiny following revelations that he had had an affair with his secretary,
Tracey Temple. There is also a piece of paper
obtained from Mulcaire on which the name 'John Prescott' is written. The only other
legible word on this document is 'Hull'." |
"Investigators have found no evidence so far that murdered MI6 spy
Gareth Williams was gay, it emerged yesterday. His family and friends have said there was
nothing to suggest he was gay and have reacted furiously to untruths that he
led a colourful homosexual lifestyle, claiming the rumours could be government smears
aimed at discrediting him. Police inquiries have supported their view that he was not gay.
Scotland Yard has denied speculation that gay paraphernalia was discovered in the flat or
that there is any link to a male escort. Mr Williams was found dead last Monday at his
£400,000 flat in Pimlico, central London, just half a mile from MI6 headquarters. His
body was discovered in the bath stuffed into a sports holdall.... One line of enquiry is
that the cipher and codes specialist could have died in a bizarre accident and that his
body was later put in the bag. Detectives are also looking at whether he may have been
killed by a foreign intelligence agency seeking to stop his work on intercepting messages
and code-breaking, the Telegraph reported. The Metropolitan police continue to describe
his death as suspicious and unexplained. A security source said any
unexplained movements of money in the Mr Williams bank accounts were
being scrutinised for clues as to how he met his death. It emerged yesterday that Mr
Williams was thought to have made at least two trips to Afghanistan, helping break coded
Taliban messages at MI6s key listening station in Kabul. He is also said to have played an important role in the development of a
highly sensitive and secret electronic intelligence gathering system called Echelon and was helping with a new system to
monitor internet phone calls such as Skype." |
"The Pentagon is contemplating an aggressive approach to defending
its computer systems that includes preemptive actions such as knocking out parts of an
adversary's computer network overseas - but it is still wrestling with how to pursue the
strategy legally. The department is developing a range of weapons capabilities, including
tools that would allow 'attack and exploitation of adversary information systems' and that
can 'deceive, deny, disrupt, degrade and destroy' information and information systems,
according to Defense Department budget documents. But officials are reluctant to use the
tools until questions of international law and technical feasibility are resolved, and
that has proved to be a major challenge for policymakers. Government
lawyers and some officials question whether the Pentagon could take such action without
violating international law or other countries' sovereignty." |
"Government agents can sneak
onto your property in the middle of the night, put a GPS device on the bottom of your car
and keep track of everywhere you go. This doesn't violate your Fourth Amendment rights,
because you do not have any reasonable expectation of privacy in your own driveway - and
no reasonable expectation that the government isn't tracking your movements. That is the
bizarre - and scary - rule that now applies in California and eight other Western states.
The U.S. Court of Appeals for the Ninth Circuit, which covers this vast jurisdiction,
recently decided the government can monitor you in this way virtually anytime it wants -
with no need for a search warrant. It is a dangerous
decision - one that, as the dissenting judges warned, could turn America into the sort of
totalitarian state imagined by George Orwell. It is particularly offensive because the
judges added insult to injury with some shocking class bias: the little personal privacy
that still exists, the court suggested, should belong mainly to the rich.... if government
agents can track people with secretly planted GPS devices virtually anytime they want,
without having to go to a court for a warrant, we are one step closer to a classic police
state with technology taking on the role of the KGB or the East German Stasi.
Fortunately, other courts are coming to a different conclusion from the Ninth Circuit's
including the influential U.S. Court of Appeals for the District of Columbia
Circuit. That court ruled, also this month, that tracking for an extended period of time
with GPS is an invasion of privacy that requires a warrant. The issue is likely to end up
in the Supreme Court." |
"Israeli government claims that it does not spy on the United States
are intended for the media and popular consumption. The reality is that Israels
intelligence agencies target the United States intensively, particularly in pursuit of
military and dual-use civilian technology. Among nations considered to be friendly to
Washington, Israel leads all others in its active espionage directed against American
companies and the Defense Department. It also
dominates two commercial sectors that enable it to extend its reach inside Americas
domestic infrastructure: airline and telecommunications security. Israel is believed to
have the ability to monitor nearly all phone records originating in the United States,
while numerous Israeli air-travel security companies are known to act as the local Mossad
stations....FBI sources indicate that the increase
in Mossad activity is a major problem, particularly when Israelis are posing as U.S.
government officials, but they also note that there is little they can do to stop it as
the Justice Department refuses to initiate any punitive action or prosecutions of the
Mossad officers who have been identified as involved in the illegal activity.....Stewart
Nozette appears to be headed towards eventual freedom as his case drags on through the
District of Columbia courts. Nozette, an aerospace scientist with a top secret clearance
and access to highly sensitive information, offered to sell classified material to a man
he believed to be a Mossad officer, but who instead turned out to be with the FBI. Nozette
has been in jail since October, but he has now been granted an additional 90-day delay so
his lawyers can review the documents in the governments case, many of which are
classified. If Nozette demands that sensitive information be used in his defense, his case
will likely follow the pattern set in the nine-times-postponed trial of AIPAC spies Steve
Rosen and Keith Weissman, who were ultimately acquitted in April 2009 when prosecutors
determined that they could not make their case without doing significant damage to
national security. A month after Rosen and Weissman were freed, Ben-Ami Kadish, who
admitted to providing defense secrets to Israel while working as an engineer at Picatinny
Arsenal in New Jersey, walked out of a Manhattan court after paying a fine. He did no jail
time and continues to receive his substantial Defense Department pension. The mainstream
media reported the Rosen and Weissman trial intermittently, but there was virtually no
coverage of Ben-Ami Kadish, and there has been even less of Nozette." |
"A Liberal
Democrat adviser to Nick Clegg has called on Scotland Yard to explain why it held his
details as well as Cleggs name on a secret police database. Fiyaz Mughal, who
advises the deputy prime minister on combating violent extremism, wrote to Sir Paul
Stephenson, the Metropolitan police commissioner, last week demanding to know why
surveillance officers logged his identity on the database after he spoke at a peaceful
rally in Trafalgar Square. A spokesman for
Clegg, who will be running the country this week while David Cameron is on holiday, said
he would look into the matter. Details of the surveillance appear on a police criminal
intelligence report of a rally last year to protest against the BBCs refusal to
broadcast a charity appeal for Gaza. A team of surveillance officers from the forward
intelligence team of the Mets public order unit were watching the demonstration to
gather information about various protesters linked to groups including Stop the War and
the Socialist Workers party. Although they were spying only on the demonstrators, they
noted the presence of several speakers. One of them was Mughal, who was identified in the
log as 'the inter-faith adviser to Nick Clegg of the Liberal Democrats'. Another was
Jeremy Corbyn, the Labour MP for Islington North. Corbyn was unavailable for comment this
weekend. But Mughal expressed his fury in a letter to Stephenson. 'It seems that simply
speaking at a lawful demonstration warrants a criminal intelligence report,' he wrote.
'Such activity by the Met, in my opinion, is tantamount to an intrusion into the human and
civil rights of citizens who are undertaking their legitimate right to demonstrate.' Shami
Chakrabarti, director of Liberty, the human rights group, said the Met needed stricter
controls on what information is placed in databases. 'It
is bad enough that swaggering officers from so-called forward intelligence use
aggressive photography and other tactics to discourage peaceful protest and turn activists
into enemies of the state,' she said." |
"....online stalking is prompted by tiny files hidden
inside... computers. These secretly identify their age, location, favourite movies, love
of gadgets, the books they buy sometimes even the words they type into websites.
This data is packaged and sold to companies seeking customers. Welcome to the shadowy
world of 'behavioural advertising', where the tastes, dreams, desires and family size of
unsuspecting internet users are for sale to advertisers and even governments. ... How does
it work? At its heart the technique relies on innocuous-sounding programs or software
called cookies and beacons. They are either dumped onto your computer or identify it (and
you) when you log onto a website. This allows all your movements on the internet to be
tracked, often in real time.... Last week The Wall Street Journal tested the worlds
top 50 websites to find out just how many cookies, beacons and other trackers they fed
into your computer. The 50 sites installed 3,180 tracking files on a test computer used in
the survey. Only one, the online encyclopedia Wikipedia, installed none. One of those
studied, the search engine Google, insisted last week that it did not store details of
what individuals searched for, other than anonymously. So if you searched for something
such as 'hair loss treatments', it would not sell on that information to interested
parties. However, users of Googles email service have been astonished by its seeming
perspicacity....When you visit the auction site eBay or the travel site Expedia,
information about what you were looking for and some basic information on the sort of
person you are will be auctioned within seconds on a data exchange run by BlueKai, a
Seattle-based firm. Every day BlueKai sells 50m pieces of information about
individuals browsing habits so that advertisers can respond immediately.
'Advertisers have always collected information on people,' according to Emma Wilson,
managing director of Harvest Digital, an ad agency. 'In the last year or so that has
multiplied exponentially. You dont know the specifics of each person no one
has my name and address, for instance but ads that know my age, where I live and
what I buy can follow me around Facebook or track me across the internet.' Some tracking
companies pair up your online behaviour with data from other sources about household
income, geography, family size and education to make well informed guesses in real time
about what you might be about to do or how much you might be able to spend
and sell those conclusions....Advertisers argue that the information they collect is
anonymous but Professor Lilian Edwards, who teaches internet law at Sheffield University,
warns that 'it is incredibly easy to de-anonymise data. If you are a household with more
than an average number of children, for example, you are very easy to identify.'.... Data
monitoring of this kind has alarmed campaigners for some time. In 2004 Richard Thomas, the then information commissioner, whose job it
is to protect the publics private information, sounded an urgent warning: 'My
anxiety is that we are sleepwalking into a surveillance society where much more
information is collected about people, accessible to far more people shared across many
more boundaries than British society would feel comfortable with.' Edwards fears that that point has already arrived. 'Things have
got desperately out of control,' she said. 'The problem isnt just the ads, its
the entire database held on you and how that database is combined with external research
using quantitative methods. How do you know they havent made two plus two equal
five? You may be branded a credit risk or affiliated with terrorist organisations without
knowing it. And once its out, it is very, very hard to put the genie back in the
bottle.' There is no doubt governments are
in the market for this kind of data. Last
week Saudi Arabia and the United Arab Emirates announced that they would ban some services
available on BlackBerry smartphones. The problem was that the encryption on the phones was
so good that it made it very difficult for the governments to spy on peoples email
messages. Most observers agree that many people are unaware they can opt out of the
constant monitoring and also that the means of doing so is too complex. Until recently the
social media site Facebook required users to click 50 times to activate privacy
settings." |
"A semi-secret government
contractor that calls itself Project Vigilant surfaced at the Defcon security conference
Sunday with a series of revelations: that it monitors the traffic of 12 regional Internet
service providers, hands much of that information to federal agencies, and encouraged one
of its 'volunteers,' researcher Adrian Lamo, to inform the federal government about the
alleged source of a controversial video of
civilian deaths in Iraq leaked to whistle-blower site Wikileaks in April. Chet Uber, the director of Fort Pierce, Fl.-based Project Vigilant, says
that he personally asked Lamo to meet with federal authorities to out the source of a
video published by Wikileaks showing a U.S. Apache helicopter killing several civilians
and two journalists in a suburb of Baghdad, a clip that Wikileaks labeled 'Collateral Murder.' Lamo, who Uber said worked as
an 'adversary characterization' analyst for Project Vigilant, had struck up an online
friendship with Bradley Manning, a former U.S. Army intelligence analyst who currently
faces criminal charges for releasing the classified video. In
June, Uber said he learned from Lamos father that the young researcher had
identified Manning as the videos source, and pressured him to meet with federal
agencies to name Manning as Wikileaks whistleblower. He then arranged a meeting with employees of 'three letter' agencies and
Lamo, who Uber said had mixed feelings about informing on Manning. 'Im the one who
called the U.S. government,' Uber said. 'All the people who say that Adrian is a narc, he
did a patriotic thing. He sees all kinds of hacks, and he was seriously worried about
people dying.' Uber says that Lamo later called him from the meeting, regretting his
decision to inform on Manning. 'Im in a meeting with five guys and I dont want
to do this,' Uber says Lamo told him at the time. Uber says he responded, 'You dont
have any choice, youve got to do this.' 'I said, Theyre not going to
throw you in jail,' Uber said. 'Give them everything you have.'
Wikileaks didnt immediately respond to a request for comment. IDG reporter Robert
McMillan confirmed
Ubers relationship with Lamo, who told McMillan that 'Mr. Uber was, among a few
others, an instrumental voice in helping me come to my ultimate decision.' Ubers Wikileaks revelation is one of the first public
statements from the semi-secret Project Vigilant. He
says the 600-person 'volunteer' organization functions as a government contractor bridging
public and private sector security efforts. Its mission: to use a variety of
intelligence-gathering efforts to help the government attribute hacking incidents. 'Bad
actors do bad things and you have to prove that they did them,' says Uber. 'Attribution is
the hardest problem in computer security.' According
to Uber, one of Project Vigilants manifold methods for gathering intelligence
includes collecting information from a dozen regional U.S. Internet service providers
(ISPs). Uber declined to name those ISPs, but said that because the companies included a
provision allowing them to share users Internet activities with third parties in
their end user license agreements (EULAs), Vigilant was able to legally gather data from
those Internet carriers and use it to craft reports for federal agencies. A Vigilant press
release says that the organization tracks more than 250
million IP addresses a day and can 'develop portfolios on any
name, screen name or IP address.' 'We dont do
anything illegal,' says Uber. 'If an ISP has a EULA
to let us monitor traffic, we can work with them. If
they dont, we cant.' And whether that massive data gathering violates privacy?
The organization says it never looks at personally identifying information, though just
how it defines that information isnt clear, nor is how it scrubs its data mining for
sensitive details. ISP monitoring is just one form of
intelligence that Vigilant employs, says Uber. It also gathers a variety of open source
intelligence and employs numerous agents around the world." |
"iPhones generally store more data than other high-end phones -- and
investigators such as Fazio frequently can tap in to that information for evidence. And
while some phone users routinely delete information from their devices, that step is
seldom as final as it seems. 'When you hit the delete button, it's never really deleted,'
Fazio said. The devices can help police learn where
you've been, what you were doing there and whether you've got something to hide. Former hacker Jonathan Zdziarski, author of iPhone Forensics (O'Reilly
Media) for law enforcement, said the devices 'are people's companions today. They organize
people's lives.' And if you're doing something criminal, something about it is probably
going to go through that phone: Every
time an iPhone user closes out of the built-in mapping application, the phone snaps a
screenshot and stores it. Savvy law-enforcement agents armed with search warrants can use
those snapshots to see if a suspect is lying about whereabouts during a crime. iPhone photos are
embedded with GEO tags and identifying information, meaning that photos posted online
might not only include GPS coordinates of where the picture was taken, but also the serial
number of the phone that took it. Even
more information is stored by the applications themselves, including the user's browser
history. That data is meant in part to direct custom-tailored advertisements to the user,
but experts said some of it could be useful to police. Clearing out user histories isn't
enough to clean the device of that data, said John B. Minor, a member of the International
Society of Forensic Computer Examiners. Just as users
can take and store a picture of their iPhone's screen, the phone itself automatically
shoots and stores hundreds of such images as people close out one application to use
another. 'Those screen snapshots can contain images
of e-mails or proof of activities that might be inculpatory or exculpatory,' Minor said.
The keyboard cache logs everything that
you type in to learn autocorrect so that it can correct a user's typing mistakes. Apple
doesn't store that cache very securely, Zdziarski contended, so someone with know-how
could recover months of typing in the order in which it was typed, even if the e-mail or
text it was part of has long since been deleted." |
"One of the fastest-growing
businesses on the Internet, a Wall Street Journal investigation has found, is the business
of spying on Internet users. The Journal conducted a comprehensive study that assesses and
analyzes the broad array of cookies and other surveillance technology that companies are
deploying on Internet users. It reveals that the tracking of consumers has grown both far
more pervasive and far more intrusive than is realized by all but a handful of people in
the vanguard of the industry. The study found
that the nation's 50 top websites on average installed 64 pieces of tracking technology
onto the computers of visitors, usually with no warning. A dozen sites each installed more
than a hundred. The nonprofit Wikipedia installed none. Tracking technology is
getting smarter and more intrusive. Monitoring used to be limited mainly to
"cookie" files that record websites people visit. But the Journal found new
tools that scan in real time what people are doing on a Web page, then instantly assess
location, income, shopping interests and even medical conditions. Some tools
surreptitiously re-spawn themselves even after users try to delete them. These
profiles of individuals, constantly refreshed, are bought and sold on stock-market-like
exchanges that have sprung up in the past 18 months. The new technologies are transforming
the Internet economy. Advertisers once primarily bought ads on specific Web pagesa
car ad on a car site. Now, advertisers are paying a premium to follow people around the
Internet, wherever they go, with highly specific marketing messages. In between the
Internet user and the advertiser, the Journal identified more than 100
middlementracking companies, data brokers and advertising networkscompeting to
meet the growing demand for data on individual behavior and interests." |
"The Obama administration is
seeking to make it easier for the FBI to compel companies to turn over records of an
individual's Internet activity without a court order
if agents deem the information relevant to a terrorism or intelligence investigation. The
administration wants to add just four words -- 'electronic communication transactional
records' -- to a list of items that the law says the
FBI may demand without a judge's approval. Government
lawyers say this category of information includes the addresses to which an Internet user
sends e-mail; the times and dates e-mail was sent and received; and possibly a user's
browser history. It does not include, the lawyers hasten to point out, the 'content' of
e-mail or other Internet communication. But what officials portray as a technical
clarification designed to remedy a legal ambiguity strikes industry lawyers and privacy
advocates as an expansion of the power the government wields through so-called national
security letters. These missives, which can be issued by an FBI field office on its own
authority, require the recipient to provide the
requested information and to keep the request secret.
They are the mechanism the government would use to obtain the electronic records." |
"The privacy of millions of
Facebook users has been jeopardised after some of their details were harvested and
published on the internet. An online security consultant who wished to highlight the
social networking site's privacy issues published a list of data taken from more than
100million users' profiles. Ron Bowles used a piece
of code to scan Facebook profiles, collecting data not hidden by the user's privacy
settings. The list has been shared as a downloadable file which has now spread rapidly
across the internet, prompting anger and concern from millions of users around the
world....Simon Davies, from the watchdog Privacy International, told BBC news that
Facebook had been given ample warning that something like this would happen. He said:
'Facebook should have anticipated this attack and put measures in place to prevent it. 'It
is inconceivable that a firm with hundreds of engineers couldn't have imagined a trawl of
this magnitude and there's an argument to be heard that Facebook have acted with
negligence. 'It adds to the confusion which has long surrounded the privacy settings -
people don't fully understand them and this is the result,' he said." Facebook privacy fears for 100m users as their personal details are published on file-sharing site Daily Mail, 29 July 2010 |
"The Archbishop of York
yesterday revealed he has been stopped and searched by police eight times, as he warned
new anti-terrorist powers are a threat to civil liberties. Dr John Sentamu said police should not be able to ask for someone's bank
accounts to be frozen merely because they are suspected of terrorism. The Ugandan-born
Archbishop told peers that he had been stopped and searched by officers because he had
been suspected of crime, warning that the new asset-freezing law could lead to people
losing their money and property just because their faces did not fit. His warning is
likely to carry weight with ministers because of his powerful record both as an opponent
of racism and a critic of left-wing 'multiculturalism'. Dr
Sentamu, who is second to the Archbishop of Canterbury in the Church of England hierarchy,
was speaking in the Lords on the Terrorist Asset-Freezing Bill. The law, which is not
opposed by Labour, would allow the courts to freeze assets on 'reasonable suspicion' that
someone is a terrorist, rather than the more demanding rules that there must be a
'reasonable belief' of their involvement in terrorism. Revealing his experience of being stopped and searched, the Archbishop
said: 'When the policeman suddenly realised that I was a bishop, that didn't stop me being
stopped and searched.' And he claimed that such police checks were often on the basis of
'he doesn't look like one of us'." |
"The personal details of several
Kiwi celebrities have been released by hackers as proof they have cracked Hell Pizza's
customer database. Private information including passwords, email and home addresses,
phone numbers - plus pizza orders - have fallen into the hands of the anonymous cyber
hackers. Hell have called in police and it has
raised fears that they could access the personal details of hundreds of thousands of New
Zealanders. The company warned its 230,000 customers to change their internet passwords in
an email on Friday night.... Executive director Martin Cocker from NetSafe said if Hell
Pizza has been breached it was embarrassing for them not to know. However, he said it was
good Hell Pizza had warned customers as there was no legal obligation to do so." |
"The Ministry of Truth was how George Orwell described the mechanism
used by government to control information in his seminal novel 1984. A recent trip to
Europe has convinced me that the governments of the world have been rocked by the power of
the internet and are seeking to gain control of it so that they will have a virtual
monopoly on information that the public is able to access. In
Italy, Germany, and Britain the anonymous internet that most Americans are still familiar
with is slowly being modified. If one goes into an internet café it is now legally
required in most countries in the European Union to present a government issued form of
identification. When I used an internet connection at a Venice hotel, my passport was
demanded as a precondition and the inner page, containing all my personal information, was
scanned and a copy made for the Ministry of the Interior -- which controls the police
force. The copy is retained and linked to the transaction. For home computers, the IP
address of the service used is similarly recorded for identification purposes. All records
of each and every internet usage, to include credit information and keystrokes that
register everything that is written or sent, is accessible to the government authorities
on demand, not through the action of a court or an independent authority. That means that
there is de facto no right to privacy and a government bureaucrat decides what can and
cannot be 'reviewed' by the authorities. Currently, the records are maintained for a
period of six months but there is a drive to make the retention period even longer.... all
of the arguments for intervention are essentially themselves fraudulent and are in reality
being exploited by those who favor big government and state control. The anonymity and low cost nature of the internet means that it can be
used to express views that are unpopular or unconventional, which is its strength. It is
sometimes used for criminal behavior because it is a mechanism, not because there is
something intrinsic in it that makes it a choice of wrongdoers. Before it existed, fraud
was carried out through the postal service and over the telephone. Pornography circulated
freely by other means. As for the security argument,
the tiny number of actual terrorists who use the internet do so because it is there and it
is accessible. If it did not exist, they would find other ways to communicate, just as
they did in pre-internet days. In fact, intelligence sources report that internet use by
terrorists is rare because of persistent government monitoring of the websites..... The real reason for controlling the internet is to restrict access
to information, something every government seeks to do. If the American Departments of
Defense and Homeland Security and Senator Lieberman have their way, new cybersecurity laws
will enable Obama's administration to take control of the internet in the event of a
national crisis. How that national crisis might be defined would be up to the White House
but there have been some precedents that suggest that the response would hardly be
respectful of the Bill of Rights. Many countries already monitor and censor the internet
on a regular basis, forbidding access to numerous sites that they consider to be
subversive or immoral. During recent unrest, the governments of both Iran and China
effectively shut down the internet by taking control of or blocking servers.... As this
article was being written, a story broke reporting that Wordpress host Blogetery had been
shut down by United States authorities along with all 73,000 Blogetery-hosted blogs. The
company's ISP is claiming that it had to terminate Blogetery's account immediately after
being ordered to do so by law enforcement officials 'due to material hosted on the
server.' The extreme response implies a possible
presumed terrorist connection, but it is important to note that no one was charged with
any actual offense, revealing that the government can close down sites based only on
suspicion. It is also likely only a matter of time
before Obama's internet warfare teams surface either at the Defense Department or at
State. Deliberately overloading and attacking the internet to damage its credibility,
witness the numerous sites that have been 'hacked' and have had to cease or restrict their
activities. But the moves afoot to create a legal framework to completely shut the
internet down and thereby control the 'message' are far more dangerous. American citizens
who are concerned about maintaining their few remaining liberties should sound the alarm
and tell the politicians that we don't need more government abridgement of our First
Amendment rights." |
"A controversial covert
surveillance system that records the public's conversations is being used in Britain. The technology, called Sigard, monitors movements and speech to detect
signs of threatening behaviour. Its designers claim the system can anticipate anti-social
behaviour and violence by analysing the information picked up its sensors. They say alerts
are then sent to police, nightclub bouncers or shop security staff, which allow them to
nip trouble in the bud before arguments spiral into violence. The devices are designed to
distinguish between distress calls, threatening behaviour and general shouting. The
system, produced by Sound Intelligence, is being used in Dutch prisons, city centres and
Amsterdam's Central Rail Station. Coventry City Council is funding a pilot project which
has for six months and has installed seven devices in the nightlife area on the High
Street. Dylan Sharpe, from Big Brother Watch, said: 'There can be no justification for
giving councils or the police the capability to listen in on private conversations. 'There
is enormous potential for abuse, or a misheard word, causing unnecessary harm with this
sort of intrusive and overbearing surveillance.' A CV1 spokesman said: 'We had the system
for six months. It is no longer in use.' No one from the organisation was available to
comment on whether the trial was a success. The new Coalition Government has announced a
review of the use of CCTV with a pledge to tilt the balance away from snooping by the
authorities to defend civil liberties." |
"Europe has signed a deal to
hand over all bank transaction data to the US in order to help the ongoing war on
terrorism. The SWIFT agreement was signed yesterday
in Brussels by Spanish minister for home affairs Alfredo Pérez Rubalcaba and the US
embassy's economic economic officer to the EU, Michael Dodman." Europe approves US mass data grab The Register, 29 June 2010 |
"... suspicious spouses, protective parents, and concerned companies
are turning to cheap and hard-to-detect commerical spyware apps to monitor your mobile
communications..... A decade ago the idea that anyone with little technical skill could
turn a cell phone into a snooping device was basically unrealistic. But as the smart-phone market proliferatesit grew 86 percent in the United
States alone last yearso do all the ethical kinks that come with it. Among them is a
growing sector of perfectly legal smart-phone spyware apps that are peddled as tools for
catching a cheating spouse or monitoring the kids when theyre away from home. But
what they can effectively do, for as little as $15 or as much as several hundred, is track
a person with a precision once relegated to federal authorities. 'Not only can you look at a persons e-mail or listen to
their calls, in some cases you can also just turn on the microphone [on a smart phone] and
listen to what the person is doing any time you want,' says Chris Wysopal, cofounder and CTO of Veracode, a software-security
company....Turning what is essentially cell-phone-bugging software into a business model
is not a bad idea, technically speaking. The smart-phone marketlargely dominated by
the Symbian, Research in Motion, and iPhone operating
systemshas 47 million users in the United States and is expected to exceed 1 billion
worldwide by 2014, according to Parks Associates, a market-research firm. In most cases, peoples lives are tethered to these handsets.
Its how we e-mail, text, search, and, on occasion, even call someone. And the
dependence just continues to grow. Last year
consumers paid for and downloaded more than 670 million apps that can turn a phone into
everything from a book reader to a compass. Smart-phone users effectively carry a
real-time snapshot of what happens in their daily lives. This
is what makes the smart phone the perfect way to track someone....Among the top commercial spyware vendors who have ventured into this
space are FlexiSPY,
MobiStealth,
and Mobile Spy. While
the services vary, what they do is essentially the same. According to all three spyware
Web sites, a person must have legal access to a smart phone to install a piece of spyware.
For example, if youre spying on a family member, that means the phone is family
property. If youre an employer monitoring your employee, the phone should be
company-owned. To install the spyware, you have to have the phone in your possession for
at least a few minutes to download the app. (There are apps that can be downloaded
remotely, but thats less common and not legal.) In
Mobile Spys case, once the software is installed, you can log into your Mobile Spy
web account to view e-mails, text messages, pictures taken, videos shot, calendar entries,
incoming and outgoing calls, and GPS coordinates. MobiStealth and FlexiSPY take it a step
further and allow a person to remotely record any conversations that take place near the
cell phone. 'The most threatening [part] is that its pretty impossible to tell if
this is happening to you,' says Mislan. Thats because once the spyware app is on the
phone it is virtually undetectable to the average user. There is no typical corresponding app icon, nor is it listed on any menu.
At best, it may show up with a generic name like 'iPhone app' or 'BlackBerry app,' so that
it appears to be a regular part of the system. There is nothing illegal about making these
apps, and almost all makers have disclaimers on their Web sites warning people not to use
their products illegally.... If the software is
already on a phone, Mislan says there is little that consumers can do on their own to
confirm this. Even if youre positive you are being spied on, doing something like
replacing the SIM card is not always enough to wipe a phone clean of the problem. In some cases, Mislan advises consumers to reach out to companies like
SMobile Systems that offer security solutions for cell phonesa growing market in
themselves. Wysopal says that as with so much
thats technology-related, something big has to break before things change in the
smart phonespyware space. 'Youll have to see someone important, like a
politician, have their phone compromised,' he says. 'If that happened, it would be a
wake-up call.' |
"Details of a spying deal between Britain and the US are
made public today, more than 60 years after it came into force. Headed 'top secret', the
UKUSA Agreement was drawn up after the Second World War to enable the two allies to share
almost all information gathered on foreign governments, military forces and other
organisations. The seven-page document, released by
the National Archives, formed the basis for co-operation between London and Washington
throughout the Cold War and beyond, in an arrangement unparalleled in Western
intelligence. Ed Hampshire, principal
records specialist at the National Archives, said: 'The agreement represented a crucial
moment in the development of the special relationship between the two wartime
allies and captured the spirit and practice
of the signals intelligence co-operation which had evolved on an ad hoc basis during the
Second World War. Today intelligence sharing between Britains MI6 and the US is well
established, although it has come under pressure recently because of concerns over alleged
human rights violations, including the secret rendition by the CIA of British residents.
National sensitivities were overcome and the deal was finalised on March 5, 1946, although
it took 60 years for Britains Government Communications Headquarters (GCHQ) to
confirm that it even existed. The areas covered are listed as: '1) collection of traffic;
2) acquisition of communication documents and equipment; 3) traffic analysis; 4)
cryptanalysis; 5) decryption and translation; 6) acquisition of information regarding
communication organisations, practices, procedures, and equipment.' The pact stressed that
the exchange of intelligence would be unrestricted, except when both sides agreed that
specific information could be excluded. 'It is the intention of each party to limit such
exceptions to the absolute minimum.' Britain and Washington also pledged not to collect
intelligence against each other or to tell any 'third party' about the accords
existence.The UKUSA Agreement was extended later to include three other English-speaking
nations: Canada in 1948 and Australia and New Zealand in 1956. It forms the foundation for
co-operation in signals intelligence between these five countries today." |
"Apple updated its privacy
policy today, with an important, and dare we say creepy new paragraph about location
information. If you agree to the changes, (which you must do in order to download anything
via the iTunes store) you agree to let Apple collect store and share 'precise location
data, including the real-time geographic location of your Apple computer or device.' Apple says that the data is 'collected anonymously in a form that does not
personally identify you,' but for some reason we don't find this very comforting at all.
There appears to be no way to opt-out of this data collection without giving up the
ability to download apps." |
"Every Google web search could
be stored for up to two years under a controversial new EU plan that has the backing of
more than 300 Euro-MEPs. 'Written Declaration 29' is
intended to be used as an early warning system to stop paedophiles by logging what they
look for using search engines. But civil liberty groups have hit out at the proposal which
they say is a 'completely unjustifiable' intrusion into citizens' privacy. And they claim
that there is no evidence that it would even be effective in trapping paedophiles who
would never use search engines like Google to look for child pornography. The declaration,
sponsored by an Italian and a Slovakian MEP, claims that it is 'essential to ensure that
the internet continues to afford a high level of virtual democracy, which does not present
any threat to women and children.' The motion asks for Directive 2006/24/EC to be extended
to all web search engines, which would include Google, as part of a European early warning
system for paedophiles. The directive came into effect in the March following the 2005
London terror attacks and lets EU member states monitor and store personal emails and
other internet activity for up to two years for counter-terrorism puposes. Simon Davies,
director of Privacy International which campaigns for tougher privacy laws, said: 'Most
paedophiles operate through chatrooms and private communication rather than search engines
like Google so they would not be affected,' he added." |
"Some of Britains biggest firms were last night accused of
spying on their customers after they admitted listening in on
disgruntled conversations on the internet. The
companies include BT, which uses specially developed software to scan for negative
comments about it on websites including Twitter, Facebook and YouTube. Budget airline easyJet, mobile-phone retailer Carphone Warehouse and
banks including Lloyds TSB are also monitoring social networking sites to see what is
being said about them. The firms claim there is nothing sinister about the practice, with
BT insisting it is merely acting as a fly on the wall to listen and
engage with our customers. But privacy campaigners have accused them of
outright spying while legal experts have suggested that firms making
unsolicited approaches to customers could fall foul of data protection laws." |
"The
£4.5bn national identity card scheme is to be scrapped within 100 days, the home
secretary, Theresa May, announced today. The 15,000 identity cards already issued are to
be cancelled without any refund of the £30 fee to holders within a month of the
legislation reaching the statute book. Abolishing the cards and associated register will
be the first piece of legislation introduced to parliament by the new government. May said
the identity documents bill will invalidate all existing cards. The role of the identity
commissioner, created in an effort to prevent data blunders and leaks, will be abolished.
The government said the move will save £86m over four years and avoid £800m in costs
over the next 10 years that would have been raised by increased charges. An allied
decision to cancel the next generation of biometric fingerprint passports will save a
further £134m over four years. Savings to the public under the whole package will total
£1bn. The publication of the identity documents bill today marks the end of an eight-year
Whitehall struggle over compulsory identity cards since they were first floated by the
then-home secretary David Blunkett in the
aftermath of 9/11. More than 5.4m combined passport and identity cards were due to be
issued when the scheme was started in earnest next year. This was projected to rise to 10m
ID cards/passports being issued ever year from 2016 onwards.... The next generation of 'biometric' passports is also due to be
cancelled. They were due to include electronic
fingerprints alongside the existing digitised photograph already included in chips in the
latest passports." |
"Google
Inc. said an internal investigation has discovered that the roving vans the company uses
to create its online mapping services were mistakenly collecting data about websites
people were visiting over wireless networks. The Internet giant said it would stop
collecting Wi-Fi data from its StreetView vans, which workers drive to capture street
images and to locate Wi-Fi networks. The company said it would dispose of the data it had
accidentally collected. Alan Eustace, senior vice president of engineering and research
for Google, wrote in a blog post that the company uncovered the mistake while responding
to a German data-protection agency's request for it to audit the Wi-Fi data, amid mounting
concerns that Google's practices violated users' privacy. Google
had previously said it was collecting the location of Wi-Fi hot spots from its StreetView
vehicles, but not the information being transmitted over those networks by users." |
"Google has refused to rule out
extending controversial facial recognition technology, despite being hit by a storm of
complaints over privacy. The internet search giant
already offers one facial recognition feature through its Picasa photo software, which
scans your pictures and suggests matches with other pictures that may include the same
people. Google's CEO Eric Schmidt would not rule out a further roll-out, saying: 'It is
important that we continue to innovate.'.... With facial recognition a face is detected
and tagged by the user. It is then rotated so that the eyes are level and scaled to a
uniform size and compared with all the other pictures on the user's database. The system
then displays any close matches. There are fears this technology could be added to the
Google Goggles tool, which was launched last year. This currently allows people to search
for inanimate objects, like the Eiffel Tower, on the internet by taking a picture of it on
a mobile phone. However, if combined with facial recognition software, customers could use
it to identify strangers on the street. In theory this could make it very easy to track
someone's private information down just by taking a picture of them." |
"Identity cards will be scrapped
under plans announced by the new Conservative and Lib Dem coalition government, new Home Secretary Theresa May has said. Their abolition is among
measures the parties have agreed to reverse what they say was 'the substantial erosion' of
civil liberties in recent years. Other proposals
include reforms to the DNA database, tighter regulation of CCTV and a review of libel
laws. Labour claims ID cards help tackle benefit
fraud and identity theft. The Tories and Lib Dems have both opposed ID cards from the
outset, arguing they are expensive, intrusive and have done little to tackle the most
serious threats to society such as terrorism and organised crime. In a statement, the Home
Office said it would announce 'in due course' how the process of rescinding ID cards and
the accompanying National Identity Register would move forward.... The new government is also proposing to scrap all future biometric
passports and the Contact Point Database as part of a new so-called 'Freedom or Great
Repeal Bill'. It wants to 'roll back' powers it says
were taken by the state under Labour and has pledged to defend trial by jury, restore
rights to non-violent protest, end the storage of internet and email records without good
reason, introduce safeguards against the 'misuse' of anti-terrorism legislation. The new
government also wants extra safeguards over the retention of people's DNA by the
police." |
"The US must prepare itself for
a full-scale cyber attack which could cause death and destruction across the country in
less than 15 minutes, the former anti-terrorism Tsar to Bill Clinton and George W Bush has
warned. Richard Clarke claims that America's lack of preparation for the annexing of its
computer system by terrorists could lead to an 'electronic Pearl Harbor'. In his warning, Mr Clarke paints a doomsday scenario in which the
problems start with the collapse of one of Pentagon's computer networks. Soon internet
service providers are in meltdown. Reports come in of large refinery fires and explosions
in Philadelphia and Houston. Chemical plants malfunction, releasing lethal clouds of
chlorine. Air traffic controllers report several mid-air collisions, while subway trains
crash in New York, Washington and Los Angeles. More than 150 cities are suddenly blacked
out. Tens of thousands of Americans die in an attack comparable to a nuclear bomb in its
devastation. Yet it would take no more than 15 minutes and involve not a single terrorist
or soldier setting foot in the United States. The scenario is contained the pages of his
book, Cyber War: The Next National Security Threat, written with Robert Knake.... 'The
biggest secret about cyber war may be that at the very same time the US prepares for
offensive cyber war, it is continuing policies that make it impossible to defend
effectively from cyber attack,' says the book. In part, the US has been hampered by the
unforeseeable success of the internet and expansion of computerised networks, which are
now used in almost every aspect of industry but have led to a hazardous degree of
over-dependence..... Meanwhile America may have invented the internet, but at least 30
nations have created offensive cyber-war capabilities, which aim to plant a variety of
viruses and bugs into key utility, military and financial systems of other states. The
authors are convinced that there will at some point be a cyber-war between two nations and
are concerned that such a conflict would 'lower the threshold' for a war with bombs and
bullets. Ironically, the United States is currently far more vulnerable to cyberwar than
Russia or China, or even North Korea, because those countries have not only concentrated
on their cyber defences but are less reliant on the internet. 'We must have the ability to turn off our connection to the internet and still be able to continue to
operate,' Mr Knake, a senior fellow at the Council on Foreign Relations, told the Daily
Telegraph. 'Relying on a system as precarious as the
internet is a big mistake. It is a fundamentally insecure ecosystem that is ripe for
conflict and gives countries with disadvantages in conventional weapons an asymmetrical
advantage.' Britain, as a nanny state more tolerant of government interference, is far
better prepared than its giant ally across the Atlantic." Cyber attack 'could fell US within 15 minutes' Telegraph, 7 May 2010 |
"We marched into Baghdad on flimsy evidence and we might be about to
make the same mistake in cyberspace. Over the past few weeks, there has been a steady
drumbeat of alarmist rhetoric about potential threats online. At a Senate Armed Services
Committee hearing this month, chairman Carl Levin said that 'cyberweapons and cyberattacks
potentially can be devastating, approaching weapons of mass destruction in their
effects.'..... The cyberalarmist rhetoric conflates the various threats we might face into
one big ball of fear, uncertainty, and doubt. This week for example, the director of the
Central Intelligence Agency announced that a cyberattack could be the next Pearl Harbor.
Cyberwar, cyberespionage, cyberterrorism, cybercrime these are all disparate
threats. Some are more real than others, and they each have different causes, motivations,
manifestations, and implications. As a result, there will probably be different
appropriate responses for each. Unfortunately, the popular discussion largely clumps them
into the vague and essentially meaningless 'cyberthreat' category. Lets take a deep
breath. Before we can effectively address any of these amorphous 'cyberthreats,' we must
first identify what, specifically, these threats are and to what extent the federal
government plays a role in defending against them. The war metaphor may be useful
rhetoric, but it is a poor analogy to the dispersed and different threats that both public
and private information technology systems face. The fact is, as long as we have had
networks, they have been under attack. But over the past 20 years network operators have
developed effective detection, prevention, and mitigation strategies. This is why we
should be wary of calls for more government supervision of the Internet...And theres
the fact that we have seen a wasteful military-industrial complex develop before, and in
this rush to 'protect' we might be seeing a new one blossoming now. The greater the threat
is perceived to be and the less clearly it is defined the better it is for
defense contractors like Booz Allen Hamilton, which last week landed $34 million in
Defense Department cybersecurity contracts.....At the
heart of calls for federal involvement in cybersecurity is the proposition that we
reengineer the Internet to facilitate better tracking of users in order to pinpoint the
origin of attacks. The Rockefeller-Snowe bill looks
to develop such a 'secure domain name addressing system.' Thats a slippery slope.
And theres the fact that we have seen a wasteful military-industrial complex develop
before, and in this rush to 'protect' we might be seeing a new one blossoming now. The
greater the threat is perceived to be and the less clearly it is defined the
better it is for defense contractors like Booz Allen Hamilton, which last week landed $34
million in Defense Department cybersecurity contracts. That money could certainly be put
to better use right now. Anyone concerned about net
neutrality or civil liberties in particular online privacy and anonymity
should take notice. Before the country is swept by fear and we react too quickly to the
'gathering threat' of cyberattacks, we should pause to calmly consider the risks involved
and the alternatives available to us." |
"US software firm Retina-X
Studios on Tuesday released a more vigilant version of its Mobile Spy program that
captures every email and picture from BlackBerry smartphones. 'We invite you to open your eyes to the real actions of what your child or
employee does on your BlackBerry device,' Retina-X chief executive James Johns said in a
release. 'What if they are being dishonest or worse? The advantages of knowing the answers
are far better than not knowing at all.' The previous version of Mobile Spy software kept
track of text messaging and telephone calls, providing online access to data by employers,
parents or whoever else is paying for smartphone accounts. New Mobile Spy 4.0 software
also provides employers or parents with smartphone contacts, calendar events, memos and
records of which mobile phone towers a device was within range range of, according to
Retina-X. 'These new abilities help parents and employers track the activities of their monitored
phones with greater accuracy,' the Arizona-based company said in a release. 'This new
feature gives parents a way to monitor whether or not a teenager is sending naughty
pictures. Employers can find out if company secrets are being snapped for later
retrieval.' Versions of Mobile Spy are available for iPhone devices as well as for
smartphones running on Android, Symbian, or Windows Mobile software, according to the
Retina-X website." Spy software watches BlackBerry email/photos Agence France Presse, 27 April 2010 |
"The first town in Britain to
scrap fixed speed cameras has seen no increase in accidents, it was revealed yesterday. But the number of motorists prosecuted for speeding there
dropped by more than 40 per cent. Swindon switched off its cameras over claims they were a
' blatant tax on the motorist' which did nothing to improve safety. Yesterday, supporters
of the move hailed the figures as proof they were right. Now the Conservative-run council
has urged other authorities to follow suit, saying the money can be better spent on other
measures to cut casualties. In the six months after the fixed cameras were switched off at
the end of July, nine accidents were recorded - the same number as in the equivalent
period the year before. Between August last year and January, there were seven minor
injury accidents and two serious ones - neither fatal - at the four sites monitored by the
cameras. In the six months from August 2008 there were eight minor accidents and one
fatal. A comparison of speeding fines issued over the two six-month periods reveals a drop
of 42 per cent - from 3,681 to 2,120. Of the 2008-09 total, 1,393 motorists were caught by
the fixed cameras that have now been deactivated - the rest by mobile cameras, which
remain in use. The fall was revealed in figures released under the Freedom of Information
Act. It means the Government - which receives income from the fixed cameras - has lost
revenue of around £80,000. Yesterday, Swindon Council leader Roderick Bluh said: 'Fixed
speed cameras are more about fund-raising than road safety. These figures completely
vindicate our position.'" |
"Speed cameras which communicate
with each other by satellite are being secretly tested on British roads. The hi-tech
devices can follow drivers progress for miles to calculate whether they have broken
speed limits. Combining number plate recognition technology with global positioning
satellites, they can be set up in a network to monitor tens of thousands of cars over huge
areas for the smallest breach. Known as SpeedSpike, the system uses similar methods of
recognition as the cameras which enforce the congestion charge in London, and allow two
cameras to 'talk' to each other if a vehicle appears to have travelled too far in too
short a space of time. After a covert national trial
which has not been publicised until now, just days after a report showed motorists have
been fined almost £1billion in speeding tickets under Labour, authorities hope the new
cameras will enable them to re-create the system used on motorway contraflows....
Conservative MP Geoffrey Cox, whose Devon constituency is close to the Cornish test site,
said fundamental questions had to be addressed before such an 'alarming' level of
surveillance was extended. He said: 'You always have to ask if it is really necessary to
watch over people, to spy on them and film them. 'We will get to a point where it becomes
routine and it should never be a matter of routine that the state spies on its
citizens.'" |
"MI5 used hidden electronic
surveillance equipment to secretly monitor 10 Downing Street, the Cabinet and at least
five Prime Ministers, The Mail on Sunday can reveal. The extraordinary disclosure comes
despite a succession of parliamentary statements that no such bugging ever took place. And
it follows a behind-the-scenes row in which senior Whitehall civil servants backed
by Prime Minister Gordon Brown attempted to suppress the revelation. The Mail on
Sunday has learned that top-secret files held by the Security Service show it installed
electronic listening devices in three highly sensitive areas of No10 the Cabinet
Room, the Waiting Room and the Prime Ministers study. It means that for nearly 15
years, all Cabinet meetings, the offices of senior officials and all visitors to the Prime
Minister including foreign leaders were being bugged. The disclosure is
highly shocking in its own right but it will also bring genuine concerns as to why the
Cabinet Office still wants to suppress it. Comments
from MI5 chief Jonathan Evans suggest that the attempted block was not done on grounds of
national security but for wider public interest reasons. This must raise the possibility that the bugging was carried out for
political purposes and officials do not want to admit it went on in the past because similar operations are continuing today. It is understood that the top-secret MI5 file on the operation is short
and does not reveal why the bugs were installed. Crucially, the documents also fail to
answer whether all the Prime Ministers in office during the period of the operation, from
1963 to 1977, were told that their conversations were monitored. The files also contain no
product transcripts of conversations overheard by the devices
suggesting that the bugs, while working, were not being actively used by MI5. It is unknown, however, if the devices were being monitored by any other
agency, including GCHQ, the Governments eavesdropping centre, or MI6.
Details of the surveillance operation were due to be revealed in The Defence Of The Realm,
the official history of MI5 written by highly respected Cambridge University historian
Professor Christopher Andrew. It is understood MI5 believed there were no national
security concerns over the disclosures. But weeks before the books publication late
last year, the Cabinet Office which oversees MI5 for the Prime Minister
ruled that the references had to be removed on unspecified public interest grounds. Its
insistence led to a behind-the-scenes row with Prof Andrew, who wrote of one
significant excision which was I believe, hard to justify. The comments
by the historian have prompted significant speculation over what he was forced to remove. Now this newspaper can reveal the deletions relate to the
eavesdropping devices that were first installed in Downing Street in July 1963 at the
request of the then Prime Minister, Harold Macmillan..... The bugs remained in Downing
Street throughout Douglas-Homes term and also the premierships of his successors
Harold Wilson and Edward Heath. In all, the
equipment monitored the most sensitive areas of Downing Street for around 15 years. It was
finally removed on the orders of James Callaghan in about 1977, the year after he took
office. The files do not make it clear whether Prime Ministers Heath and Wilson knew there
were surveillance devices in No10. The revelation
that there were bugs in Downing Street will add to conspiracy theories surrounding the
alleged plot to overthrow Wilson. Indeed Wilsons actions while in office suggest he
was never told his office had been bugged. Seemingly obsessed by the idea that he and
other MPs were under surveillance, he introduced the Wilson Doctrine still in place
today which bans the bugging of MPs telephone calls..... After Wilson stepped
down, he co-operated with a book suggesting there had been a plot by Right-wing intelligence officers to undermine
him. The claim was later supported by former senior
MI5 officer Peter Wright in his banned Spycatcher memoir. It also prompted Callaghan,
Wilsons successor, to launch an investigation into the allegations. The MI5 files indicate that it was Callaghan who finally ordered
the surveillance devices to be removed from Downing Street. Despite this, Callaghan made a
statement to the House of Commons denying that No10 had ever been bugged. He said: The Prime Minister is satisfied that at no time has the
Security Service or any other British intelligence or security agency, either of its own
accord or at someone elses request, undertaken electronic surveillance in No 10
Downing Street. The first indication of the Whitehall cover-up over the bugging
operation was revealed by Prof Andrew in the preface of his book." |
"When Harold Macmillan called in MI5 in 1963 and asked it to bug his
office, he thought the whole world was coming apart, writes Stephen Dorrill. He was trying
to keep a lid on an unprecedented level of scandal that threatened to undermine his Tory
Government and confidence in the British Establishment.... Macmillan felt he could not
trust anybody but turned for counsel to Dick
White, director-general of foreign intelligence service MI6. It is possible that White suggested installing the listening devices in
No10 as some kind of insurance policy..... The level of official paranoia at the time
cannot be underestimated. But it is the revelation that the bugs were still in place in
Downing Street during Harold Wilsons two administrations, between 1964 and 1970 and
1974 to 1976, which is the most startling. Wilson
believed that elements of the Establishment and members of MI5 and MI6 were plotting against him.... Now,
despite countless official denials, it appears that Wilson whose claims that he was
under surveillance are often dismissed as the ramblings of an ill and paranoid man
was right." |
"At a warehouse in New Jersey,
6,000 used copy machines sit ready to be sold. CBS News chief investigative correspondent
Armen Keteyian reports almost every one of them holds a secret. Nearly every digital
copier built since 2002 contains a hard drive - like the one on your personal computer -
storing an image of every document copied, scanned, or emailed by the machine. In the
process, it's turned an office staple into a digital time-bomb packed with highly-personal
or sensitive data. If you're in the identity theft business it seems this would be a
pot of gold. 'The type of information we see on
these machines with the social security numbers, birth certificates, bank records, income
tax forms,' John Juntunen said, 'that information would be very valuable.' Juntunen's
Sacramento-based company Digital
Copier Security developed software called 'INFOSWEEP' that can scrub all the data on
hard drives. He's been trying to warn people about the potential risk - with no luck.
'Nobody wants to step up and say, 'we see the problem, and we need to solve it,' Juntunen
said. This past February, CBS News went with Juntunen to a warehouse in New Jersey,
one of 25 across the country, to see how hard it would be to buy a used copier loaded with
documents. It turns out ... it's pretty easy." |
"In 2006 and 2007, Siobhan Gorman, a highly regarded intelligence
reporter for the Baltimore Sun, wrote
a series of articles about how the National Security Agency was (mis)managing a highly
sensitive, very expensive collection program known as Trailblazer. Relying on interviews
with current and former senior intelligence officials as well as internal documents,
Gorman was able to show that the NSA's 'state-of-the art tool for sifting through an ocean
of modern-day digital communications' was a boondoggle of sorts -- and that the agency had removed several of the privacy safeguards that were
put in place to protect domestic conversations and e-mails from being stored and
monitored. A program known as 'Thin
Thread,' which had proved its worth to the NSA before 9/11 and which contained several
civil liberties safeguards, was abandoned in favor of Trailblazer because the latter
program, according to Gorman's sources, 'had more political support' and was a favorite of
then NSA-director Michael Hayden's." |
"The home secretary has revealed
plans for primary legislation requiring passport applicants to be fingerprinted and
enrolled on the National Identity Register.
Alan Johnson said the move would convert the current small-scale identity card programme
into a scheme eventually covering the vast majority of the population. In response to a
question from his Conservative shadow Chris Grayling, Johnson said: 'The provisions of the
Identity Cards Act 2006 will be amended by further primary legislation, so that everyone
aged 16 and over who applies for a British passport will have the choice of being issued
with an identity card or a passport (or both documents) and for their identity details,
including facial image and fingerprint biometrics, to be recorded on the same National
Identity Register.' The use of primary legislation could make such a bill hard to pass
through parliament, even if Labour forms the next government, as the Liberal Democrat as
well as Conservative parties oppose identity cards. With an election likely to be held on
6 May, opinion polls suggest a narrow victory for the Conservatives or a hung parliament
as the likely outcome. As the government plans to link passport applications to the ID scheme by 2012, legislation would be required in the first couple of years
of the new parliament. Research by Kable last year found that scrapping identity cards and fingerprinting for passports would save £3.08bn
over a decade, whereas scrapping the cards but retaining fingerprinting would reduce the
saving to £2.2bn. The government plans to require all 10 fingerprints for passport and ID
applications, although only two will be held on the document's chip." |
"All counter-terrorism laws
passed since 11 September 2001 should be reviewed to see if they are still necessary, says
a committee of MPs and peers. It questioned whether ministers could legitimately argue,
nine years on, that a 'public emergency threatening the life of the nation' remained..... It said the government should drop entirely its plan to
extend the period terrorism suspects can be held without charge from 28 to 42 days. The
plan was shelved in the face of opposition in the House of Lords but remains as a draft
bill, to be enacted if needed. The committee said the draft bill was 'alarmingly broad'.
The need for the current 28-day limit, extended from 14 days in 2005, should be revisited
and bail should be considered 'in principle' for some terrorist suspects, the committee
said. It complained that the intelligence agencies' insistence on control over the
examination and transcription of intercept evidence - like phone taps - amounted to a 'de
facto veto' of efforts to see it used as evidence in court.... It added: 'In our view it devalues the idea of a 'public emergency' to
declare it in 2001, and then to continue to assert it more than eight years later.' The committee has already called for a full inquiry into claims UK
security services were complicit in the torture of terrorism suspects - a claim denied by
the head of MI6..... The wide-ranging report also says the independent reviewer of
terrorism laws - currently Lord Carlisle - should be appointed by, and report directly to
Parliament and criticises the head of MI5, Jonathan Evans, for choosing not to appear
before the committee in public. The committee's chairman, the Labour MP Andrew Dismore,
said: 'There is no question that we face a serious threat from terrorism, or that we need
legislation to counter that threat. The question is, are the counter-terror measures we
have in place justifiable, on an ongoing basis, in light of the most up-to-date
information we have.'" |
"All public services could be delivered online within four years
under an ambitious pledge by Gordon Brown to create a paperless state and save billions of
pounds, The Times has learnt. Tens of thousands of public sector jobs could go in
Jobcentres, benefit offices, passport centres and town halls if face-to-face transactions
are scrapped in favour of cheaper and more efficient online form-filling. On Monday the
Prime Minister will announce plans that he claims could save billions of pounds over four
years by making dealing with the State as easy as internet banking or shopping on Amazon.
Cash will also be saved on postage stamps, telephone calls and government buildings as the
switch to the internet leads to the phasing out of call centres and benefit offices. The aim is that within a year, everybody in the country should have a
personalised website through which they would be able to find out about local services and
do business with the Government. A unique identifier will allow citizens to apply for a
place for their child at school, book a doctors appointment, claim benefits, get a
new passport, pay council tax or register a car from their computer at home. Over the next
three years, the secure site will be expanded to allow people to interact with their
childrens teachers or ask medical advice from their doctor through a government
version of Facebook. But union leaders and privacy experts
immediately warned that the Governments record on IT projects was already
catastrophic and there would be key concerns about privacy, data protection and fraud.
In addition many elderly, disabled and undereducated people
find it difficult to carry out transactions online." |
"Harry was a Russian secret service agent who spoke perfect English
and wore cowboy boots with his uniform. I never knew what his face looked like because he
wore a mask during the lengthy interrogation sessions he put me through during five days
of captivity in Federal Security Service (FSB) hands in Chechnya in 1999. The first item
taken from me by Harry and his friends was my laptop. I was as much unnerved as relieved
when it was returned on my release. 'I can have it back?' 'Yeah, have it back,' the FSB
agent replied, and laughed. Within 24 hours of arriving home in London the laptop was
deluged with spam, pornography and Russian hate mail, eventually crashing completely. The
act was more a digital slap on the wrist than the attacks that the Russians would
allegedly inflict on entire countries several years later, but it was my first experience
of cyberwar. The incident came to mind eight years later on a February morning in Helmand,
southern Afghanistan, when I heard a Royal Marines colonel briefing his officers. He
mentioned, almost as an aside, that one of the mens e-mail accounts had been closed
after being compromised by a 'hostile intelligence agency'. In other words, someone hacked
into a soldiers computer to see what might be found there. Last December, in Sri
Lanka, a senior UN official confided to me that his e-mails were being intercepted by a
'key log' program that allowed everything he wrote and received to be read by an
intelligence agency. Today barely a week passes without the phrase 'cyberattack' in the
news. It is a loose term, incorporating everything from criminal hacking and commercial
espionage to attempts to seize control of weapon systems or sabotage national
infrastructures. Britain is treating the surge of hostile computer activity seriously
enough to have established two organisations last year to co-ordinate, assess and expand
its cyber strategy. The Office for Cyber Security (OCS), established by the Cabinet
Office, was created in the autumn after a warning by intelligence chiefs that China may
have acquired the ability to cripple key points of infrastructure such as
telecommunications. Whitehall departments were allegedly first targeted by Chinese hackers
in 2007. Later that year Jonathan Evans, director-general of MI5, wrote to 300 chief
executives warning of potential Chinese hacking attacks and data theft. In the year up to
November 2009 Britain suffered 300 cyber intrusions defined as a sophisticated
attempt, successful or not, to steal data or sabotage systems on government and
military networks..... The majority of attacks have been to obtain funds from commercial
organisations, and a full assault on a countrys banks, stock market, energy grid,
telecommunications and health systems is more likely if countries are already in a 'hot'
war. There are several other potential triggers, however. In 2007 Estonian ministries,
banks and newspapers were bombarded with denial-of-service attacks mass requests
for information that cause systems to crash for several days after the Government
moved a Soviet war memorial in the capital, Tallinn. In 2008 Georgia complained of similar
attacks during its brief conflict with Russia over the breakaway province of South
Ossetia. The Russians were blamed in both cases, although they denied involvement.... The
murky world of cyberwar is inhabited by small-time hackers, criminal syndicates and people operating with the support of their government. 'Everything that happens to us is called an attack,' said a
senior official with a lead role in British cyber operations, '[but] most of what we see
on a large scale ... is about the exfiltration of data theft, not an attack.' There
exists, however, an overlap between the interests of hostile state intelligence agencies
and cybercriminal syndicates seeking to steal intellectual data for profit. Russian
cybercrime syndicates, better known as partnerka, lead commercial espionage in Europe and
are known to have links with Harry and his comrades in the FSB. China has its own
dedicated cyber operations headquarters within the Peoples Liberation Army but also
holds top rank in the league of cyberhostile countries the list used by Western
security companies to warn business clients of cyber-threat. The Wests nuclear
strategy was based on deterrence the assurance that a guaranteed second strike
would prevent a first strike from coming. Yet cyberwar is more complex because the attacks
have certain things in common: they are fast, cheap and hard
to trace. 'Attribution
is unbelievably difficult,' admitted Lord West. 'These guys could attack [as if it was
from] your site the attacks would come in from different nodes in a strange way
that you cant even identify. Follow the attack back and it gets to you but it
wasnt you.' The sophistication of commercial
and state-sponsored activity has developed immensely since the attacks on Estonia and Georgia, with
denial-of-service operations now considered relatively low-grade. More worrying is
'zero-day malware' an unidentifiable new generation of Trojan programs that are
implanted into a host computer and lie dormant until activated. 'Lets say that
someone has received an e-mail that looks like its from someone they know, about a
subject they feel comfortable with,' said Ian McGurk, associate director for information
security at Control Risks, a security consultancy. 'As a consequence they trust the
material. If theres an attachment a photograph, a Word document, whatever
embedded within that attachment is some sort of malicious code that is going to
install itself on the machine. That machine is then compromised, and a Trojan is installed
that can search for information.' As well as
transmitting information back to its handler, zero-day malware can also hand a computer to
outside control before going on to infect an entire system. Raimund Genes, the chief technical officer ofTrend Micro, said: 'We grew
up fearing the mushroom cloud, now we should fear a roomful of hackers with their
electricity and internet bills paid for by a government.' |
"Almost 1,700 people, also
including car park attendants and dog wardens, already have powers to hand out a string of
fines and even take photographs of low level offenders under the Community Safety
Accreditation Scheme. But the Government has quietly announced it plans to review the
scheme with chief police officers to see how it can be expanded
further. Rank and file
officers warned the move is 'blurring the lines' of legitimate law enforcement and is
creating a 'third tier' of policing. Even chief constables are now cautious over the
scheme following it's rapid growth, which has seen numbers increase by a fifth in just 12
months. It will further fuel concerns that, with increasing budget pressures, the
Government is keen to push for policing on the cheap." |
"Elvis died in 1977. But that didnt prevent hackers from
inserting his digital photo into a U.K. passport, and using it at a self-service passport
machine at Amsterdams Schiphol airport to gain clearance to board a plane.This
incident occurred in September 2008. But this security vulnerability persists, as proven
by the recent assassination of Mahmoud al-Mabhouh, a senior Hamas operative, in a Dubai
hotel on January 20
The alleged killers of Mr. Mabhouh included 11 people holding
U.K. and other European passports. All of the killers used passports containing fake
photographs and signatures. Naturally, this wasnt supposed to happen. When
governments began issuing digitally encoded passports a few years ago, it was supposed to
improve border security....the 'ultra-secure' RFID
chips digital passports contain can be cloned with about $100 worth of off-the-shelf
electronic equipment. As a result, we have teams of
assassins and who-knows-who-else roaming the world with digitally modified passports.
Indeed, digital passports actually are far less secure than their predecessors.The reason
is that digital passportsand indeed digital data in generalsuffers from an
inherent security flaw
If you take a non-digital passport and try to modify it
physically, its very hard to do so without leaving some evidence of what youve
done. There might be smudges, ink marks, or microscopic impressions of a razor blade used
to cut out an old photo and insert a new one.But with our new 'ultra-secure' digital
passports, if you figure out how to change the data on the RFID chip, the earlier data
vanishes. Theres absolutely no trace of the tampering.... even before governments
issued the first digital passports, hackers cracked the encryption codes. Indeed, as far back as 2006, hackers demonstrated how a simple
microchip reader purchased off the Internet could clone all the information in a U.K.
passports 'ultra-secure' RFID chip.... Surely,
the governments that assured us that RFID passports represented a huge security advance
knew the risks of relying on digital technology. The only possible conclusion was that
they had a hidden agenda for introducing theman agenda having nothing to do with
security....The purpose of the database is to create a 'lifetime personal travel history'
of anyone who holds a passport. Your photograph, your fingerprints, and details of each
entry, exit or transit will be part of your dossier in a 'biographic and biometric travel
history database.' This data can be shared with anyone your government chooses.
Potentially, it could be shared with any of the 150 countries that have introduced, or
have promised to introduce, RFID-equipped passports." |
"Who remembers Echelon, the
top-secret telecommunications spy network said to be run by the US and allied Anglophone
nations, and to be triggered as soon as certain key words or phrases are spoken on the
phone? A lot of you, we'd guess. So it's interesting
to note that Pentagon boffins have now stated that perhaps the most intriguing reputed
capability of Echelon - the ability to automatically pick out words of interest and flag
that conversation up as important to its human masters - doesn't work. Or anyway, it only
works on good, clear lines: a noisy or degraded signal frustrates it. The news comes as
part of a solicitation from the Pentagon crazytech bureau, DARPA, in which the maverick
military mayhem mavens request assistance with building a Robust Automatic Transcription
of Speech (RATS) system. According to DARPA: Existing transcription and translation and
speech signal processing technologies are insufficient for working with noisy or degraded
speech signals that are of importance to current and future Department of Defense (DoD)
operations. Currently, there is no technological solution [our emphasis] which effectively
addresses this kind of noisy and distorted speech signal, so operational units are forced
to allocate significant human resources for this task. One should note that America's
feared National Security Agency (NSA, generally thought to be in charge of Echelon) is
actually an arm of the DoD, not a civilian organisation. DARPA says that the proposed RATS
system should be able to tackle noisy audio signals and tell on its own whether they are
speech or something else such as music. It should then be able to identify the language
being spoken, and tell whether the speaker is a person of interest using voiceprint
technology. Finally, the RATS software should be able to 'identify specific words or
phrases from a list of items in the language being spoken' - just what Echelon is supposed
to be able to do already, only DARPA assure us that no such tech exists. Or anyway, none
able to tackle a noisy signal....The DARPA solicitation can be read here
in pdf." |
"Even though police are tapping into the locations of mobile phones
thousands of times a year, the legal ground rules remain unclear, and federal privacy laws
written a generation ago are ambiguous at best. On Friday, the first federal appeals court
to consider the topic will hear oral
arguments (PDF) in a case that could establish new standards for locating wireless
devices. In that case, the Obama administration has
argued that warrantless tracking is permitted because Americans enjoy no 'reasonable
expectation of privacy' in their--or at least their cell phones'--whereabouts. U.S. Department of Justice lawyers say that 'a customer's Fourth
Amendment rights are not violated when the phone company reveals to the government its own
records" that show where a mobile device placed and received calls. Those claims have
alarmed the ACLU and other civil liberties groups, which have opposed the Justice
Department's request and plan to tell the U.S. Third Circuit Court of Appeals in
Philadelphia that Americans' privacy deserves more protection and judicial oversight than
what the administration has proposed. 'This is a critical question for privacy in the 21st
century,' says Kevin Bankston, an attorney at the Electronic
Frontier Foundation who will be arguing on Friday. 'If the courts do side with the
government, that means that everywhere we go, in the real world and online, will be an
open book to the government unprotected by the Fourth Amendment.'" |
"Chip-and-PIN readers can be
tricked into accepting transactions without a valid personal identification number, opening the door to fraud, researchers have found. Researchers at Cambridge University have found a fundamental flaw in the EMV
Europay, MasterCard, Visa protocol that underlies chip-and-PIN validation
for debit and credit cards. As a consequence, a device can be created to modify and
intercept communications between a card and a point-of-sale terminal, and fool the
terminal into accepting that a PIN verification has succeeded. 'Chip and PIN is
fundamentally broken,' Professor Ross Anderson of Cambridge University told ZDNet UK.
'Banks and merchants rely on the words 'Verified by PIN' on receipts, but they don't mean
anything.' The researchers
conducted an attack that succeeded in tricking a card reader into authenticating a
transaction, even though no valid PIN was entered. In a later test, they managed to
authenticate transactions, without the correct PIN, with valid cards from six different
card issuers. Those issuers were Barclaycard,
Co-operative Bank, Halifax, Bank of
Scotland, HSBC and John Lewis." |
"Privacy campaigners expressed
shock last night after it emerged that large amounts of confidential personal information
held about British citizens on a giant computer network spanning the European Union could be accessed by more
than 500,000 terminals. The figure was revealed in a
Council of the European Union document examining proposals to establish a new agency,
based in France, that would manage much of the 27 EU member states' shared data. But the
sheer number of access points to the Schengen Information System (SIS) which holds
information regarding immigration status, arrest warrants, entries on the police
national computer and a multitude of personal details has triggered concerns
about the security of the data. Statewatch, a group that monitors civil liberties in
Europe, said it was aware of a case in Belgium where personal information extracted from
the system by an official was sold to an organised criminal gang." |
"We've heard a lot about security issues with the iPhone, but the
BlackBerry isn't immune to threats from malicious apps. Tyler Shields, a senior researcher
at the Veracode Research Lab, has written a piece of spyware that allowed me to shoot an
SMS command to his phone and have his contact list forwarded to my e-mail address in a
demonstration. With another short text command, I was able to get his BlackBerry to e-mail
me any SMS messages he sends. And if I had wanted--and he had allowed me--I could have
seen a log of all his calls, monitored his inbound text messages, tracked his location in
real-time based on the GPS (Global Positioning System) in his device and turned his
microphone on to listen to conversations in the room and record them. 'It's trivial to
write this type of code using the mobile provider's own API [application programming
interface] they provide to any developer,' Shields said in an interview in advance of his
talk on the spyware scheduled for the ShmooCon
security show on Sunday....He calls his program 'TXSBBSpy' and is releasing the source
code but not an executable version of it. 'My goal is to show how easy it is to create
mobile spyware,' he said. TXSBBSpy 'can take data from the phone, both in real-time and in
snapshots, and send it off via SMS or e-mail to any Web server or TCP [Transmission
Control Protocol] or UDP [User Diagram Protocol] network connections,' Shields said. While
I was able to control the spyware using text messages sent from my mobile phone, the
spyware had to be first installed on his BlackBerry for the snooping to work. This can be
done by sending the target victim an e-mail or text with a link to a Web page where the
spyware is surreptitiously installed. Or it can be hidden inside a legitimate-looking app
downloaded from the App Store. The risks are similar to those posed by Swiss
researcher Nicolas Seriot in his iPhone spyware demo at the Black Hat DC security
conference on Wednesday. 'These types of behaviors we're demonstrating will be universal
across all mobile platforms,' Shields said." |
"Britain's armed forces could be
used on a regular basis on the streets of Britain to
confront the threat of terrorism, under the terms of a strategic defence review announced
yesterday. Two of the six 'key questions' to be considered by the SDR will focus on
domestic threats which 'cannot be separated from international security', according to a
Green Paper setting out the grounds for a full scale review to start after the election.
Decisions need to be made on the 'balance between focusing on our territory and region and
engaging threats at a distance' and 'what contribution the armed forces should make in
ensuring security and contributing to resilience within the UK'." |
"The Home Office has created a
new unit to oversee a massive increase in surveillance of the internet, The Register has
learned, quashing suggestions the plans are on hold until after the election. The new
Communications Capabilities Directorate (CCD) has been created as a structure to implement
the £2bn Interception Modernisation Programme (IMP), sources said. The CCD is staffed by
the same officials who have have been working on IMP since 2007, but it establishes the
project on a more formal basis in the Home Office. It
is not yet included on the Home Office's list
of directorates. The intelligence and law enforcement agencies have pushed hard for new
laws to force communications providers to store details of who contacts whom, when, where
and how via the internet. However, following a consultation last year, when the Home
Office's plans were heavily
criticised by ISPs and mobile companies, it was widely assumed progress on IMP would
slow or stop. The CCD has continued meeting with industry to try to allay concerns about
the project's costs, effect on customer privacy and technical feasibility.....Officials envisage communications providers will maintain giant
databases of everything their customers do online, incluing email, social networking, web
browsing and making VoIP calls. They want providers to process the mass of data to link it
to individuals, to make it easier for authorities to access. Access to communications data is currently governed by the Regulation of
Investigatory Powers Act. Under European legslation ISPs are required to retain basic
information about what their customers do online, but not to open their data packets to
record who they contact on Facebook, for example." |
"Internet users are being spied on in their own home as the
Government uses the threat of terrorism and the spread of child pornography to justify
launching a dramatic expansion of surveillance society, according to a leading academic.
The authorities have taken 'advantage of the terrorist bombing in London' to erode civil
liberties, according to Professor Ian Walden, an expert on internet communication and
online security. He said todays 'Orwellian' surveillance of our online habits was
even more intrusive than the introduction of CCTV on Britain's streets. 'You can now hide
cameras but generally cameras are a physical manifestation of surveillance. With the
internet, you are sitting at home which you think is private, but of course it is declared
a public space because your service provider knows everywhere youve gone, everything
youve downloaded, it knows everything, potentially', he told The Daily Telegraph.
His comments come after the Government announced it was pressing ahead with privately held
'Big Brother' databases that opposition leaders said amounted to 'state-spying' and a form
of 'covert surveillance' on the public. The police and security services are set to
monitor every phone call, text message, email and website visit made by private citizens.
The details are set to be stored for a year and will be available for monitoring by
government bodies. All telecoms companies and internet service providers will be required
by law to keep a record of every customer's personal communications, showing who they have
contacted, when and where, as well as the websites they have visited. Ministers had
originally wanted to store the information on a single government run database, but backed
down after privacy concerns were raised. 'Once happy to leave cyberspace
unregulated, Governments, including that of the UK, seem increasingly willing
to encroach on what we do, say and see over the Internet,' said Professor Walden, head of
the Institute of Computer and Communications Law at Queen Mary, University of London. He
warned that increasing use of social networking sites such as Facebook and Twitter will
give the authorities access to information about individuals' private lives....Professor
Walden, a former trustee on the Internet Watch Foundation, the industry self regulatory
body, said that problems such as child pornography, illegal file sharing and terrorism are
used to justify Big Brother-like scrutiny of all internet activity, even
though the vast majority of web users are law abiding. 'The police clearly took advantage
of the terrorist bombing in London to get an agenda, which has been around for years,
pushed to the forefront' he said. 'They would never have got Government support for data
retention, which became a European issue, without the Madrid and London bombings.' The
2004 Madrid bombers used one shared web based email account to make plans, rather than
exchanging messages that could be intercepted....'Concerns from civil liberty groups are
we will lose the liberties that we thought we had without necessarily notifying us. Why
does the data on all of us have to be retained in order to find out about those that are
bad?' He highlighted the danger of laws created to catch dangerous criminals later being
manipulated to spy on millions on households. Local councils have been criticised for
using anti-terrorism (RIPA) laws to snoop on residents suspected of littering and dog
fouling offences. 'My concern is that its easy
policy-making
if you say its against terrorism and its against child
pornography then nobody is going to say no.' His comments echo those made by Dame Stella
Rimington, the former head of MI5, who last year accused ministers of interfering with
people's privacy and playing straight into the hands of terrorists, by creating a 'police state'. The shift towards greater state control of online content, and how it will
impinge on our rights, will be discussed by Professor Walden in his inaugural lecture at
Queen Mary, University of London on Wednesday 3 February 2010." |
"A series of botched IT projects has left taxpayers with a bill of
more than £26bn for computer systems that have suffered severe delays, run millions of
pounds over budget or have been cancelled altogether. An investigation by The Independent has found that the total cost of
Labour's 10 most notorious IT failures is equivalent to more than half of the budget for
Britain's schools last year. Parliament's spending watchdog has described the projects as
'fundamentally flawed' and blamed ministers for 'stupendous incompetence' in managing
them." |
"The £8.1 billion rollout of
smart meters in Britain could be knocked off course unless the Government and Ofgem, the
energy regulator, act urgently to convince the public that the information provided by the
meters will be held securely. Fears that data on energy consumption could be misused by
criminals, police or insurance companies have curtailed the compulsory introduction of the
meters in the Netherlands, according to a report by Datamonitor, the market analyst. Dutch
consumer and privacy organisations were concerned that information relayed as frequently
as every 15 minutes could allow employees of utility companies to see when properties were
empty or when householders had bought expensive new gadgets. Smart meters, which are due to be rolled out to the UKs 26 million
households by 2020, are fitted with information and communications technology so that they
can send data and receive instructions. The intention is that they will transform the
energy industry enabling the transition to a low-carbon economy but
utilities have been frustrated at the delay to agreeing a common model and standards for
use. Now Datamonitor is warning that the introduction of smart metering will rival the
creation of the internet as a telecommunications project and will stretch utility industry
practices and processes to breaking point." |
2009 |
"Telecoms firms have accused the Government of acting like the East
German Stasi over plans to force them to store the details of every phone call for at
least a year. Under the proposals, the details of every email sent and website visited
will also be recorded to help the police and security services fight crime and terrorism.
But mobile phone companies have attacked the plans as a massive assault on privacy and
warned it could be the first step towards a centralised Big Brother database.
They have also told the Home Office that the scheme is deeply flawed. The criticism
of Britains growing surveillance culture was made in a series of
responses to an official consultation on the plans, which have been obtained by The Mail
on Sunday. T-Mobile said in its submission that it was a particularly
sensitive time as many people were commemorating the 20th anniversary of the
protests that led to the collapse of surveillance states in Eastern Europe. Martin Hopkins, head of data protection and disclosure, said:
It would be extremely ironic if we at T-Mobile (UK) Ltd had to acquire the
surveillance functionality envisaged by the Consultation Document at the same time that
our parent company, headquartered in Germany, was celebrating the 20th anniversary of the
demise of the equivalent systems established by the Stasi in the federal states of the
former East Germany." |
"Scores of foxhunters can sit easier in their saddles on the biggest
day of the sports calendar today after a judge cast doubt on the legality of covert
filming by anti-hunt activists. The ruling, in
a case that cannot yet be reported, lays down that covert surveillance by third parties
must be authorised in line with procedures in the Regulation of Investigating Powers Act
(Ripa). The Home Office says that the Act must be
used in accordance with the European Convention on Human Rights. 'It also requires, in
particular, those authorising the use of covert techniques to give proper consideration to
whether their use is necessary and proportionate,' official guidance states. This suggests
that the type of speculative surveillance carried out by some organisations and hunt
monitors cannot be authorised because it is not necessary or proportionate for the
prevention or detection of an offence under the Hunting Act. The Association of Chief
Police Officers (Acpo) is so anxious that forces may be acting unlawfully that it has
asked for advice from the Crown Prosecution Service." Judge casts doubt on legality of covert filming by anti-hunt activists London Times, 26 December 2009 |
"A plan to allow phone tap evidence in courts was left in tatters
today as a review said it was unworkable. In a victory for M15, Gordon Brown's proposal to
introduce intercept evidence at criminal trials was quietly shelved as a report said it
would cost billions. Critics said the decision marked another creeping extension of the
Government's secret justice agenda. It means that potentially important information gained
via phone tap recordings and email interceptions will not be available to juries. Civil liberty campaigners say the bar on intercept evidence will
only be used as an excuse for more secret inquiries. Ministers have already forced through
plans for secret hearings into controversial deaths to replace a jury inquest if sensitive
intelligence information forms part of the evidence. It also means that authorities will
have to continue using the secret Special Immigration Appeals Commission and control order
hearings to keep tabs on suspects, who cannot be prosecuted as the intercept evidence
against them cannot be put before a jury. Since
2007, the Government has been considering the use of covert surveillance intelligence in
trials of terrorists and major crime bosses in a bid to secure more convictions. Legal and
counter-terrorism sources believe that the extremist cleric Abu Hamza al-Masri could have
been jailed for involvement in international kidnapping had intercept material been
available to prosecutors. But the prospect of secret evidence ever being used in criminal
courts in England and Wales appeared remote today as a review concluded it was not legally
viable. A Whitehall official said storing all phone tap and email correspondence for use
in criminal trials would require vast 'electronic warehouses', costing billions of pounds.
An official report also warned that introducing such evidence would expose the techniques
used in covert surveillance operations to terrorists and serious criminals.....Currently,
police and the Security Service are not required to keep all the intercept material they
record. Much of the conversation overheard through phone taps is not transcribed, with
full records being kept only of key passages - none of which can be revealed to a jury in
a suspect's trial. But evidence from phone tapping
and other interceptions is widely used in other countries, including Australia and the
United States, where it has been used to secure
convictions against Mafia gangsters. Isabella Sankey, policy director at Liberty, said:
'The bar on intercept evidence is used by Government to justify a dangerous parallel legal
system. 'Whether its control orders that bring punishment without trial, or
secret inquests for those killed on the States watch, the bar is used as
excuse for ever more secrecy. 'We are the only common law country in the world to maintain
such an illogical ban; its abolition is already long overdue.' MPs from across the
political spectrum have urged the Government to reconsider. They argue that the use of
intercept evidence, which is also supported by the former Director of Public Prosecutions
Sir Ken Macdonald, could secure more terrorist convictions and reduce the need for some
suspects to be placed under control orders. Liberal Democrat home affairs spokesman Chris
Huhne said: 'If Australia and the United States can both use intercept evidence in court
without the world coming to an end, it cannot be beyond the realms of British ingenuity to
do the same." |
"Many government buildings are now ringed with security barriers, and
most senior politicians have got used to having bodyguards or armed policemen outside
their homes. The threat of terrorism has also
justified the proliferation of CCTV cameras and the storage of credit card transactions,
mobile phone records and email, all of which have been produced in court whenever there is
a major terrorist trial....." |
"The CIA is to be given broad access to the bank records of
millions of Britons under a European Union plan to fight terrorism. The Brussels
agreement, which will come into force in two months time, requires the 27 EU member
states to grant requests for banking information made by the United States under its
terrorist finance tracking programme. In a little
noticed information note released last week, the EU said it had agreed that Europeans
would be compelled to release the information to the CIA 'as a matter of urgency'. The
records will be kept in a US database for five years before being deleted. Critics say the system is 'lopsided' because there is no reciprocal
arrangement under which the UK authorities can easily access the bank accounts of US
citizens in America. They also say the plan to sift
through cross-border and domestic EU bank accounts gives US intelligence more scope to
consult our bank accounts than is granted to law enforcement agencies in the UK or the
rest of Europe. In Britain and most of Europe a judge must authorise a specific search
after receiving a sworn statement from a police officer. This weekend civil liberties
groups and privacy campaigners said the surveillance programme, introduced as an emergency
measure in 2001, was being imposed on Britain without a proper debate. Shami Chakrabarti,
director of Liberty, said: 'The massive scope for transferring personal information from
Europe to the United States is extremely worrying, especially in the absence of public
debate or parliamentary scrutiny either at EU or domestic level.'.... The terrorist finance tracking programme mines thousands of
transactions by sifting through records from the nerve centre of the global banking
industry, a Belgian co-operative known as Swift. This routes about £3 billion between
banks and other financial institutions each day. According to the EU information note, the
United States can request general data sets under the scheme based on broad
categories including 'relevant message types, geography and perceived terrorism threats'.
The scheme is run out of the CIAs headquarters in Langley, Virginia. The covert
spying operation remained secret until 2006." |
"Anyone who's a regular Google search user will know that the only
way to avoid the company tracking your online activities is to log out of Gmail or
whatever Google account you use. Not any more. As of
last Friday, even searchers who aren't logged into Google in any way have their data
tracked in the name of providing a 'better service'. The
company explained: 'What we're doing today is expanding Personalized Search so that we
can provide it to signed-out users as well. This addition enables us to customise search
results for you based upon 180 days of search activity linked to an anonymous cookie in
your browser.' However, if you've previously been a fan of the log-out method to avoid
being tracked, there's still the option to disable the cookie by clicking a link at the
top right of a search results page." |
"Yahoo isnt happy that a detailed menu of the spying services
it provides law enforcement agencies has leaked onto the web. Shortly after Threat Level
reported this week that Yahoo
had blocked the FOIA release of its law enforcement and intelligence price list,
someone provided a copy of the companys spying guide to the whistleblower site
Cryptome. The 17-page guide describes Yahoos data retention policies and the surveillance
capabilities it can provide law enforcement, with a
pricing list for these services. Cryptome also published lawful data-interception guides
for Cox Communications, SBC, Cingular, Nextel, GTE and other telecoms and service
providers. But of all those companies, it appears to be Yahoos lawyers alone who
have issued a DMCA takedown notice to Cryptome demanding the document be removed. Yahoo
claims that publication of the document is a copyright violation, and gave Cryptome owner
John Young a Thursday deadline for removing the document. So far, Young has refused....The
price list that Yahoo tried to prevent the government from releasing to Soghoian appears
in one small paragraph in the 17-page leaked document. According to this list, Yahoo
charges the government about $30 to $40 for the contents, including e-mail, of a
subscribers account. It charges $40 to $80 for the contents of a Yahoo group." |
".... it's important to distinguish between the
government - the temporary, elected authors of national policy - and the state - the
permanent bureaucratic and military apparatus superficially but not fully controlled by
the reigning government..... If secrecy is necessary for national security and effective
diplomacy, it is also inevitable that the prerogative of secrecy will be used to hide the
misdeeds of the permanent state and its privileged agents..... I suspect that there
is no scheme of government oversight that will not eventually come under the indirect
control of the generals, spies, and foreign-service officers it is meant to oversee." |
"Plans to store information
about every phone call, email and internet visit in the United Kingdom have in effect been
abandoned by the Government. The Home Office confirmed the 'Big Brother' scheme had been
delayed until after the election amid protests that it would be intrusive and open to
abuse. Although ministers publicly insisted yesterday that they remained committed to the
scheme, they have decided not to include the contentious measure in next week's Queen's
Speech, the Government's final legislative programme before the election. The effect of this move could be to kill off the plans for years. The
Conservatives have not ruled out reviving the idea but remain sceptical about the
practicality of Labour's proposals....A Whitehall source told The Independent last night
that the project, estimated to cost up to £2bn over 10 years, was 'in the very long
grass'. Civil rights campaigners welcomed the move but warned that ministers were already
responsible for introducing a range of databases and surveillance measures that breached
basic liberties. The data retention proposals have been championed by the intelligence
agencies and police as a vital tool for tracking terror plots and international crime
syndicates....Civil liberties groups welcomed the shelving of the plan, but said basic
freedoms remain under attack on a variety of fronts. Among the most controversial is the
ID card scheme which has already been trialled at some airports. The scheme is set to be
rolled out nationally by the end of the year, beginning in Manchester. Ministers now say
that it will be voluntary." |
"All telecoms companies and
internet service providers will be required by law to keep a record of every customer's
personal communications, showing who they are contacting, when, where and which websites
they are visiting. Despite widespread opposition over Britain's growing surveillance
society, 653 public bodies will be given access to the confidential information, including
police, local councils, the Financial Services Authority, the Ambulance Service, fire
authorities and even prison governors. They will not require the permission of a judge or
a magistrate to access the information, but simply the authorisation of a senior police
officer or the equivalent of a deputy head of department at a local authority. Ministers had originally wanted to store the information on a massive
Government-run database, but chose not to because of privacy concerns. However the
Government announced yesterday it was pressing ahead with privately-held 'Big Brother'
databases which opposition leaders said amount to 'state-spying' and a form of 'covert
surveillance' on the public. It is doing so despite its own consultation showing there is
little public support for the plans. The Home Office admitted that only a third of
respondents to its six-month consultation on the issue supported its proposals, with 50
per cent fearing that the scheme lacked sufficient safeguards to protect the highly
personal data from abuse. The new law will increase the amount of personal data which can
be accessed by officials through the controversial Regulation of Investigatory Powers Act
(RIPA), which is supposed to be used for combatting terrorism. Although most private firms
already hold details of every customer's private calls and emails for their own business
purposes, most only do so on an ad hoc basis and only for a period of several months. The
new rules, known as the Intercept Modernisation Programme, will not only force
communication companies to keep their records for longer, but to expand the type of data
they keep to include details of every website their customers visit effectively
registering every click online. While public authorities will not be able to view the
contents of these emails or phone calls but they can see the internet addresses,
dates, times and users of telephone numbers and texts. The firms involved in keeping the
data, such as as Orange, BT and Vodafone, will be reimbursed at a cost to the taxpayer of
£2billion over 10 years. Chris Grayling, shadow home secretary, said he had fears about
the abuse of the data. 'The big danger in all of this is 'mission creep'. This Government
keeps on introducing new powers to tackle terrorism and organised crime which end up being
used for completely different purposes. We have to stop that from happening'. David Davis,
the former shadow home secretary, added: 'What is being proposed is a highly intrusive
procedure which would allow Government authorities to maintain covert surveillance on
public use of telephones, texts, emails and internet access.' He added that the permission
to access the data should be granted by judges or magistrates.....The latest figures on
the use of the RIPA legislation by public bodies, show that state bodies including town
halls made 519,260 requests last year - one every minute - to spy on the phone records and
email accounts of members of the public. The number of requests has risen by 44 per cent
in two years to a rate of 1,422 new cases every day, leading to claims of an abuse of
using the powers for trivial matters such as littering and dog fouling. Shami Chakrabarti,
director of Liberty, said: 'The Big Brother ambitions of a group of senior Whitehall
technocrats are delayed but not diminished....'" |
"The Home Office says it will
push ahead with plans to ask communications firms to monitor all internet use. Ministers
confirmed their intention despite concerns and opposition from some in the industry. The proposals include asking firms to retain information on how people
use social networks such as Facebook. Some 40% of respondents to the Home Office's
consultation opposed the plans - but ministers say communication interception needs to be
updated. Both the police and secret security services have legal powers in the UK to
intercept communications in the interests of combating crime or threats to national
security. But the rules largely focus on communications over telephones and do not cover
the whole range of internet communications now being used. The Home Office says it wants
to change the law to compel communication service providers (CSPs) to collect and retain
records of communications from a wider range of internet sources, from social networks
through to chatrooms and unorthodox methods, such as within online games. Ministers say that they do not want to create a single
government-owned database and only intend to ask CSPs to hold a record of a contact,
rather than the actual contents of what was said. Police and other agencies would then be
able to ask CSPs for information on when a communication was sent and between whom. In
theory, law enforcement agencies will be able to link that information to specific devices
such as an individual's smartphone or laptop. The
proposals are technically challenging, as they would require a CSP to sort and organise
all third-party traffic coming and going through their systems. The estimated £2bn bill
for the project includes compensation for the companies involved....Christopher Graham,
the Information Commissioner responsible for overseeing the protection of private
information, told the Home Office that while he recognised that the police needed to use
communication data to stop crime, this in itself was not a justification to collect all
possible data passing through the internet. 'The proposal represents a step change in the
relationship between the citizen and the state,' said Mr Graham. 'For the first time, this
proposal is asking CSPs to collect and create information they would not have previously
held and to go further in conducting additional processing on that information. 'Evidence
for this proposal must be available to demonstrate that such a step change is necessary
and proportionate." |
"Vernon Bogdanor, the Professor of Government at the University of
Oxford, argues in his book The New British Constitution that a series of measures
including devolution legislation, the Human Rights Act and the abolition of the House of
Lords have already replaced one constitutional system with another. The fundamental codes that govern our relationship with the state
are being rewritten and we are supine. Yet increasingly the States tentacles
strangle us with a sinister if well-intentioned paternalism. The fear of paedophiles and
terrorists has made potential criminals of us all. We are watched by cameras, monitored by
agencies, registered on databases. The State can eavesdrop on phone calls, spy on our bank
accounts. British citizens can be detained without trial. We have no protection against
Parliament, when the party that dominates it decides to dominate us. It is time for a written constitution, ratified by the people. Professor
Bogdanor argues that one reason we have never codified our constitution is that statements
of citizens rights typically mark a new beginning, a birth, or rebirth of a new
state. Our tortuous relationship with Europe could be such a catalyst. Our country is
being reborn as a satellite of Europe yet, as the revolution is a bloodless one, it passes
without protest. We are alone among the member states in not having a written
constitution. This makes us vulnerable to European creep, and the dribbling away of civil
liberties." |
"A mother took a council to court yesterday after it used
surveillance powers designed to combat terrorism to establish whether she had lied to get
her children into a 'good' school. Jenny Paton, her partner and three children were
followed for nearly three weeks by officers from Poole Borough Council, using the
Regulation of Investigatory Powers Act (Ripa). They wrongly suspected that she did not
live in the schools catchment area. Speaking before a two-day hearing of the
Investigatory Powers Tribunal, Ms Paton, 40, poured scorn on the councils actions.
She said: 'Some of the operational aspects are ludicrous and completely outrageous and I
think we all need protecting from the way local authorities are using Ripa. This is about
saying no more. Lets have more safeguards and better scrutiny.' She
asked why the officials, if they doubted her story, did not knock on her front door and
speak to her....Ripa was introduced in 2000 to define
when covert techniques, such as secret filming, could be used by police, local councils
and benefit fraud teams. The powers have been used almost 50,000 times by public
authorities such as local councils and the health service since 2002. After public alarm
the Government is about to curb the powers that councils have gained under Ripa. Local authorities have used legislation intended to tackle terrorism and
serious crime to deal with minor offences such as dog fouling. Conway council in Wales
used the Act to spy on a worker who claimed to be sick, and Kensington and Chelsea council
in London used it to monitor the misuse of a disabled parking badge. Under reform plans,
set out yesterday, junior council officials will lose their power to authorise
surveillance operations on behalf of local authorities. There are, however, plans to
extend its use to allow officials to trace parents who refuse to pay child support.
Investigators will be given access to the phone and internet records of thousands of
fathers who do not co- operate with the Child Maintenance and Enforcement
Commission." |
"Councils are to have their powers to snoop on the public curbed
under government plans aimed at addressing alarm at the expansion of the surveillance
state. Local authorities have used legislation intended to tackle terrorism and serious
crime to deal with minor offences such as dog fouling. Under the plans, published today,
relatively junior council officials will lose their power to authorise surveillance
operations on behalf of local authorities. Alan Johnson, the Home Secretary, will say that
only council chief executives and officials at
director level will have the right to order investigations involving techniques such as
eavesdropping, tracking vehicles and secret filming.....
But the proposals stop short of meeting demands from the Local
Government Association for greater involvement by councillors and the public in
authorising and overseeing Ripa powers. The association called for local people to be
co-opted on to a committee overseeing surveillance and also for senior local councillors
to be responsible for authorising surveillance." |
"When governments turn their minds to economic stimulus, they usually
end up in well-ploughed furrows. A tax break here, a consumer spending voucher there, and
a nice public-works binge to round it all off. China may be among the first to realise
there may be a useful stimulus effect from scaring the bejeezus out of the international
business community. A rich seam of paranoia is already there, waiting to be mined. A
senior executive at a global car manufacturer recently told me he had been warned by 'a
three-letter agency from Virginia' to use a separate
set of personal electronics when in China: a second laptop, BlackBerry and mobile. Otherwise, the (American spook) adviser added darkly, 'they' (Chinese
spooks) will steal everything from the secret plans for car door handles to that online
birthday card from your auntie. I asked a 'risk mitigation' expert (ex-British spook) what
he thought of this. 'Everyone should have two of everything; basic sense,' he explained.
How handy for the Chinese electronics industry, which produces most of these gizmos and is
desperate to rekindle exports." |
"An astonishing £380 a minute
will be spent on surveillance in a massive expansion of the Big Brother state. The
£200million-a-year sum will give officials access to details of every internet click made
by every citizen - on top of the email and telephone records already available. It is a
1,700 per cent increase on the cost of the current surveillance regime. Last night LibDem
home affairs spokesman Chris Huhne described the sum as 'eye-watering'. 'There is already enough concern at the level of Government snooping,' he
said. 'In an era of tough spending choices, it cannot be a justified response to the
problems we face as a country to lavish millions of pounds a year on state spying. ' The
increase in money spent on tapping phones and emails is all the more baffling when Britain
is still one of the few countries not to allow intercept evidence in court, even in
terrorist cases.' State bodies including councils are already making one request every
minute to spy on the phone records and email accounts of members of the public. The number
of snooping missions carried out by police, town halls and other government departments
has rocketed by 44 per cent in two years to a rate of 1,381 new cases every day. Ministers
say the five-year cost of the existing regime is £55.61million, an average of £11million
a year. This is paid to phone companies and service providers to meet the cost of keeping
and providing private information about customers. The cost of the new system emerged in a
series of Parliamentary answers. It is to cover payments to internet service providers so
they can store mountains of information about every customer for a minimum of 12 months,
and set up new systems to cope. The actual content of calls and emails is not be kept -
only who they were from or to, when they took place and where they were sent from. Police,
security services and other public authorities can then request access to the data as part
of investigations. Some 653 bodies are currently allowed access, including councils, the
Financial Services Authority, the Ambulance Service and fire authorities and prison
governors. The new rules allowing access to internet records will be introduced by
Parliament before the end of the year. They are known as the Intercept Modernisation
Programme. Ministers had originally wanted to store the information on a massive
Government-run database, but chose not to because of privacy concerns. Yesterday Alex
Deane, director of campaign group Big Brother Watch, said: 'The Government is preparing to
make British people pay through the nose so that they can track our movements
online.'" |
"The man who led the
investigation into the Soham murders has attacked the Governments new vetting
scheme, which will force 11 million adults to have formal criminal record checks. Retired
Detective Chief Superintendent Chris Stevenson said that 'no amount of legislation, record
keeping or checking' could prevent future murders of children by paedophiles. He accused
ministers of creating a state of paranoia after the deaths of Holly Wells and Jessica
Chapman in 2002. Mr Stevenson said that he felt
compelled to voice his criticism after being ordered to stop taking pictures of his
grandson at a village football match. He said that efforts to keep paedophiles at bay had
gone too far and needed to get 'back on an even keel'.... Writing in The Times today, Mr Stevenson says: 'The furore that has
gripped the nation since [Soham] has made us all paranoid. Is it in the interests of
children?.... Are we feeding the paranoia that stops a grandfather taking a picture of his
nine-year-old grandson playing football? Surely this cannot continue, someone needs to put
things back on an even keel. Soham police officer attacks Governments new vetting scheme London Times, 15 September 2009 |
"The fears of Diana, Princess of Wales, for her safety and her
preoccupation with surveillance were 'entirely justified', Michael Mansfield says today.
The QC, the best-known brief at the Bar, says that the predictions of the late Princess
'came to pass' and that Britain has slid seamlessly into George Orwells 'Big
Brother' society. In an extract from his autobiography published in The Times
today, the QC says that it was 'utterly reasonable for the Princess to suppose that Big
Brother was looking over her shoulder, that her telephone communications were being tapped
and her movements by car were being tracked'. She had a 'credible and understandable basis
for her belief', he says in Memoirs of a Radical Lawyer.... In his book the QC, 67, who is stepping down from full-time work
at the Bar, condemns the 'surreal proposals' for a centralised database monitoring every
call or e-mail. 'That these surreal proposals should even be contemplated shows how far
beyond Orwells worst fears we have travelled.
'The whole idea of Big Brother is now part of mainstream cheap light entertainment . . .
this is both sinister and symbolic.Its Jim Carreys film The Truman Show
for real.' Diana was right to be worried, says top QC, Michael Mansfield London Times, 2 September 2009 |
"Internet companies and civil liberties groups were alarmed this spring when a
U.S. Senate bill proposed
handing the White House the power to disconnect private-sector computers from the
Internet. They're not much happier about a revised version that aides to Sen. Jay
Rockefeller, a West Virginia Democrat, have spent months drafting behind closed doors.
CNET News has obtained a copy of the 55-page draft of
S.773 (excerpt),
which still appears to permit the president to seize temporary control of private-sector
networks during a so-called cybersecurity emergency. The new version would allow the
president to 'declare a cybersecurity emergency' relating to 'non-governmental' computer
networks and do what's necessary to respond to the threat." Bill would give president emergency control of Internet CNet News, 28 August 2009 |
"The Home Office is unlikely to respond to an invitation to see how a
UK identity card was cracked and cloned. A Home Office spokesman confirmed it had received
an offer from Adam Laurie, an
expert in radio frequency identification (RFID) technology, to demonstrate how he cloned
a government-issued ID card with little more than
a mobile phone and a laptop. The spokesman said the
Home Office was developing an industry-wide approach to implementation and security issues
associated with the card and could not respond to individual matters. He could not give
details of how or when such an approach would be made.....Laurie told Computer Weekly that
he was waiting for the Home Office to respond to his offer to disclose how he did it. He
said it was normal among security researchers to give suppliers a chance to fix security
breaches in their systems before taking the matter further. Laurie said he had been
interested in security weaknesses with respect to the
RFID technology used in the UK's e-Passports. He had wondered if there were similar
weaknesses in the ID card, which is now being issued to foreign nationals. 'It turns out there are,' he said. Laurie corrected one aspect of earlier
reports that he had changed and added information to the original card. 'What I did was use the information on the card as a template for
a new card that I wrote my own data to,' he said. That data included a digitised picture
of himself, his digitised fingerprints, and a message that read, 'I am a terrorist - shoot
me on sight.' 'That data was read and accepted by
the Golden Reader tool, which is the same reader used at border control to read the
passports, and presumably by the readers that the Home Office has still to issue,' said
Laurie. The Golden
Reader tool was developed by secunet Security Networks AG for the German Federal
Office for Information Security (BSI). It is a piece of software designed to read
passports securely. It supports extensive cryptographic methods and has been used widely
to test the interoperability of ID systems. A German researcher, Lukas Grunwald, demonstrated at
the 2006 Black Hat security conference how he used Golden Reader to clone an ICAO
(International Civil Aviation Organisation) e-Passport of the type issued in
Britain." Home Office unlikely to accept ID card cloner's offer of demonstration Computer Weekly, 19 August 2009 |
"Twenty years ago today the world witnessed the power of the crowd.
Hungarys reformist communist Government permitted the pan-European picnic near the
city of Sopron, on the border with Austria, as a symbol of its commitment to a united
Europe. The border was to be opened so that about 100 dignitaries and officially approved
picnickers could cross freely back and forth. But Hungary was crowded with thousands of
East Germans desperate to escape to the West. Many camped near the site of the picnic,
waiting for the crucial moment. When the border was opened at three oclock they
surged forward. The guards did not open fire. They stepped back and allowed the East
Germans to break through. This, not the opening of the Berlin Wall in November, was the
tipping point. August 19, 1989, accelerated a chain of events that brought down communism
and the Soviet Union itself. Such is the power of the crowd. After
1989 Big Brother was no longer welcome in Budapest, Prague or Warsaw he moved to
London to be ever more warmly embraced by successive Labour administrations. The birthplace of political liberties, the home of the Magna Carta, is
now one of the most intrusive democracies in the world. Labour governments have introduced
surveillance and monitoring systems of which the communists could only dream. Of course,
Britain is not a real police state. But it is certainly sliding further into
authoritarianism.....supine citizens allow local and national government to intrude ever
further into their daily lives, logging, tracking and recording everything from household
waste disposal to mobile telephone use. These small changes seem to herald a more dramatic
constitutional shift: the rewriting of the social contract under which citizens are
apparently regarded not as active participants in society, but, at best as irritants to be
monitored, and at worst as potential criminals to be pre-emptively arrested, just as
George Orwell predicted in Nineteen Eighty-Four....When the communists [in Hungary]
took over a town, for example, they did not appoint the mayor, but a deputy, to work
behind the scenes and stealthily take control of the police and municipal administration.
In my more cynical moments I imagine Labour ministers following a similar methodology.
They would never say openly: 'We intend to criminalise public protest; to grant sweeping
blanket powers of arrest to the police and change the very foundation of law, making
citizens prove their innocence, rather than have the police and judiciary prove their
guilt while demonstrating.'....changes are introduced stealthily, rarely debated by
Parliament and are nodded through with the acquiescence of the Opposition, in the name of
that useful catch-all 'security'. Whether by design
or not, that seems to me to be happening. Adam LeBor - Freedom is now flowing from West to East London Times, 19 August 2009 |
"The extent of snooping in modern Britain is shocking. The scale
of the state's prying was buried in the back of the annual
report (pdf) from the interception of communications commissioner, Sir Paul Kennedy,
one of a flurry of reports released by the government just before MPs broke for the summer
recess. The report revealed that 504,073 requests for
communication data were made by public bodies last year a staggering 1,381 a day
one request for every minute of last year. Most
of these requests were made by the police and security services. Many will be justified
and proportionate. The sheer number of requests, however, is shocking. When requests first
hit the half million mark in 2007, it was suggested that this was just part of the
bedding-down process. In fact, surveillance seems to have settled at this level, 44%
higher than the more modest numbers of 2006. Surveillance has soared even though the
assessment of the terrorist threat has eased. State-sanctioned spying on one in every 78
adults every year cannot be a proportionate response to our problems. Neither the Home
Office nor the commissioner have presented figures showing how useful such interceptions
were in securing convictions, but we know that wholesale local authority use of physical
snooping powers is often ineffective as well as intrusive. Only 9% of such surveillance
helps with convictions. The argument in favour of such intrusion is always that those who
have nothing to fear have nothing to hide, but that was also the argument that used to be
made by the KGB in the Soviet Union to justify the recording of internal movements at
every hour of the day and night. Free citizens should not have to justify themselves to
their state, for it is the state that should serve the citizen. Privacy is a right in any
civilised society. We have sleepwalked into a surveillance state without serious debate
and without adequate safeguards. The government's infatuation with social control shows
that it has misunderstood the lessons of George Orwell's 1984, which
was a warning, and not a blueprint. We are not yet living under the Stasi, but we are
living in a country whose proud liberal history is under threat. The requests for communications data were made under the Regulation of Investigatory
Powers Act 2000. These 'Ripa' powers allowed the public bodies granted them the
ability to authorise themselves
to access 'communications data', details of when you sent or received an email or text or
made a phone call, and to whom. The government
promised when introducing them that these substantial powers would only be used to tackle
terrorism and other serious crime. In reality, however, Ripa powers of physical
surveillance have been used to spy on ordinary people for trivial offences,
such as dog-fouling, over-filling their bins or lying about their children's school
catchment area. It is the nature of bureaucratic creep: powers for one purpose prove handy
for another. We can assume the same has happened with
intercept. Originally, only nine organisations were
authorised under Ripa powers, such as the police and the security services but now over
800 are, including all councils....The Liberal Democrats want better checks and balances.
Leaving the power of issuing warrants for intercept communications with the home
secretary, who is also in charge of the police, is like asking the fox to guard the
henhouse. We must review the power to issue these warrants, restricting their use to
serious crime or introducing extra checks by independent magistrates. The Conservatives,
unbelievably, want to relax the rules governing the use of these powers for the police and
the security services. The Labour-Tory consensus lives. Only the Liberal Democrats now
stand four square against the surveillance state." Chris Hune - Fighting the surveillance state Guardian, Comment Is Free, 11 August 2009 |
"Britain has one and a half
times as many surveillance cameras as communist China,
despite having a fraction of its population,
shocking figures revealed yesterday. There are 4.2million closed circuit TV cameras here,
one per every 14 people. But in police state China, which has a population of 1.3billion,
there are just 2.75million cameras, the equivalent of one for every 472,000 of its
citizens. Simon Davies from pressure group Privacy International said
the astonishing statistic highlighted Britain's 'worrying obsession' with surveillance.
'Britain has established itself as the model state that the Chinese authorities would love
to have,' he said. 'As far as surveillance goes, Britain has created the blueprint for the
21st century non-democratic regime. 'It was not intended but it has certainly been
the consequence.' It is estimated that Britain has 20 per cent of cameras globally and
that each person in the country is caught on camera an average of 300 times daily." Revealed: Big Brother Britain has more CCTV cameras than China Daily Mail, 11 August 2009 |
"Last year Gordon Brown proposed limited use of intercept evidence,
gathered by intelligence agencies, in the courts.... Sir Paul Kennedy, the Interception of
Communications Commissioner, who inspects intelligence and law enforcement agencies to
ensure that intercept operations conform to the terms of the Regulation of Investigatory
Powers Act...recommended in his annual report that
the Wilson doctrine a 1966 ruling that MPs should never be subject to telephone
bugging should be abandoned. 'Why should MPs
not be in the same position as everyone else?' Sir Paul said....many senior police and
intelligence officials have serious concerns that disclosure of intercept material will
benefit criminal and terrorist organisations by exposing human sources and revealing the
sophisticated technology that they use in covert surveillance....Last year Downing Street
asked Sir John Chilcot, who will chair the inquiry into the Iraq war, to examine the
issues and he devised conditions under which intercept evidence might be introduced. Mr
Brown said that it should be possible to find a way to use some intercept material as
evidence, but added that key conditions on safeguarding national security would have to be
met. Sir Paul said in his report that those conditions which include agencies such
as MI5 retaining control over the intercepted material could not be met....In
another report published yesterday, the Chief Surveillance Commissioner complained that
senior police officers and public officials with powers to authorise covert surveillance
did not understand their powers and were unwilling to be trained. Sir Christopher Rose
said that he had been disturbed that one police force that was recommended to have
training in the operation of surveillance legislation had asked for a two-day course
instead of the required five days." Gordon Brown's plans to use phone tapping evidence in court thrown into chaos London Times, 22 July 2009 |
"A police force has suspended
searches of people under controversial anti-terror laws after figures exposed the futility
of the legislation. Hampshire Police conducted 3,481 stop and searches under Section 44 of
the Terrorism Act in 2007/8 but arrested no one in connection with terror. The statistics marked a huge increase on 2004/5, when the force carried
out 275 stop and searches under Section 44, and a large jump from 2006/7 when there were
580. They are in sharp contrast to the similarsized neighbouring force, Thames Valley,
which used the stop and search powers 244 times in 2007/08, making 40 arrests unconnected
to terrorism. The decision to stop implementing the anti-terror laws was welcomed by civil
liberties campaigners. Last month Lord Carlile, the independent reviewer of terror laws,
accused police of making unjustified and almost certainly illegal searches of
white people to provide racial balance to Government figures. In remarks which
deepened the controversy surrounding the powers, Lord Carlile said he knew of cases where
suspects were stopped by officers even though there was no evidence against them. Section
44 of the Terrorism Act 2000 gives police the right to stop and search anyone in a defined
area without having grounds of reasonable suspicion." Police force calls time on stop and search - after using power 3,400 times but failing to make single terror arrest Daily Mail, 16 July 2009 |
"CCTV, RFID tags and GPS-enabled
phones are among the technologies that can be used to keep track of your movements. The furore around the Chinese
governments Green Dam software has raised the issue of the way modern technology
is used to monitor our daily lives. Here, we list seven of the technologies that can be
used to keep track of your movements....Radio
frequency identification chips are already widely
used in supermarkets and shops for the purpose of stock control, but some people fear
their use could be widened to monitor the habits and behaviour of ordinary citizens. At the moment, these tags, which are little bigger than a grain of
sand, are embedded into pints of milk and library books. When paired with an RFID reader, the tags can help to provide detailed
information about items, such as their location, or how many there are. Although most people are happy for RFID tags to be used in stores
to monitor stock levels, theyre less happy about the idea of the chips still sending
out a signal once they leave the shop. On a benign
level, such tracking capabilities would mean a store would know that people in
Hertfordshire prefer blue cashmere jumpers, while those in Aberdeen favour the brown
versions. But on a more sinister level, it could also enable them to glean an
unprecedented insight into our personal lives, and target their brands to us accordingly. To those people who fear a 'surveillance culture', the ability to
tag and track everything from our food to our clothes would be the next step on an already
slippery slope.... It now appears that some of the
technology the Iranian authorities have been using to listen in on phone calls made on
fixed-line phones and mobile handsets was sold to the government by Nokia Siemens, a joint
venture between the Finnish phone maker and the German technology giant. Nokia Siemens
said it believed the product was being used by the government to monitor calls, but some
experts have speculated that it could also be used for a practice known as 'deep packet
inspection' a process that enables agencies to block communications, as well as
monitor the nature of conversations and even covertly
alter this for the purpose of propaganda and disinformation. Nokia Siemens, rocked by this
association with a repressive regime, have pointed out that Iran is not the only country
using its monitoring technology many Western governments, including the UK and US,
apparently use it for 'lawful intercepts'... Gunwharf Quays shopping centre
in Portsmouth shot to fame last year when it was revealed that surveillance software was
monitoring the signals given off by shoppers mobile phones to track their movements.
The technology allowed researchers to tell when someone entered the shopping centre, what
stores they visited, how long they spent in each one, and what time they left. It could
even tell what route they took, and the country they were visiting from." Big brother is watching: The technologies that keep track of you Daily Telegraph, 2 July 2009 |
"A secret NSA surveillance
database containing millions of intercepted foreign and domestic e-mails includes the
personal correspondence of former President Bill Clinton, according to the New York Times. An NSA
intelligence analyst was apparently investigated after
accessing Clintons personal correspondence in the database, the paper reports, though it didnt say how many of Clintons
e-mails were captured or when the interception occurred. The database, codenamed Pinwale,
allows NSA analysts to search through and read large volumes of e-mail messages, including
correspondence to and from Americans. Pinwale is likely the end point for data
sucked from internet backbones into NSA-run surveillance
rooms at AT&T
facilities around the country. Those rooms were
set up by the Bush administration following 9/11, and were finally legalized last
year when Congress passed the FISA Amendments Act. The law gives the telecoms immunity for
cooperating with the administration; it also opens the way for the NSA to lawfully spy on
large groups of phone numbers and e-mail addresses in bulk, instead of having to obtain a
warrant for each target. The NSA can collect the
correspondence of Americans with a court order, or without one if the interception
occurs incidentally while the agency is targeting people 'reasonably believed' to be
overseas. But in 2005, the agency 'routinely examined large volumes of
Americans e-mail messages without court warrants,' according to the Times, through
this loophole. The paper reports today that the NSA is continuing to over-collect e-mail
because of difficulties in filtering and distinguishing between foreign and domestic
correspondence. If an Americans correspondence pops up in search results when
analysts sift through the database, the analyst is allowed to read it, provided such
messages account for no more than 30 percent of a search result, the paper reported. The
NSA has claimed that the over-collection was inadvertent and corrected it each time the
problem was discovered. But Rep. Rush Holt (D-New Jersey), chairman of the House Select
Intelligence Oversight Panel, disputed this. 'Some actions are so flagrant that they
cant be accidental,' he told the Times." NSA Secret Database Ensnared President Clintons Private E-mail Wired, 17 June 2009 |
"All internet and phone traffic should be recorded to help the fight
against terrorism, according to one of the UK's former spy chiefs. Civil rights
campaigners have criticised ministers' plans to log details of such contact as
'Orwellian'. But Sir David Pepper, who ran the GCHQ listening centre for five years, told
the BBC lives would be at risk if the state could not track communication. Agencies faced
'enormous pressure' to keep up with technology, he said. 'It's a constant arms race, if
you like. As more technology, different technology becomes available, the balance will
shift constantly.' The work of GCHQ, which provides intelligence on foreign and domestic
threats, is so secretive that until the 1980s the government refused to discuss its
existence....Last year, then Home Secretary Jacqui
Smith announced plans for a database to record details of the times and dates of messages
and phone calls but said the content of conversations would not be kept. She said such data was used as 'important evidence in 95% of serious
crime cases' and in almost all security service operations....Details
of the times, dates, duration and locations of mobile phone calls, numbers called, website
visited and addresses e-mailed are already stored by telecoms companies for 12 months
under a voluntary agreement. However, the Liberal
Democrats said the government's plans were 'incompatible with a free country and a free
people'. In February, the Lords constitution committee said electronic surveillance and
collection of personal data had become 'pervasive' in British society. Its members said
the situation threatened to undermine democracy." |
"The use of closed-circuit
television in city and town centres and public housing estates does not have a significant
effect on crime, according to Home
Office-funded research to be distributed to all police forces in England and Wales
this summer. The review of 44 research studies on CCTV schemes by the Campbell
Collaboration found that they do have a modest impact on crime overall but are at their
most effective in cutting vehicle crime in car parks, especially when used alongside
improved lighting and the introduction of security guards. The authors, who include
Cambridge University criminologist, David Farrington, say while their results lend support
for the continued use of CCTV, schemes should be far more narrowly targeted at reducing
vehicle crime in car parks. Results from a 2007 study in Cambridge which looked at the
impact of 30 cameras in the city centre showed that they had no effect on crime but led to
an increase in the reporting of assault, robbery and other violent crimes to the police.
Home Office ministers cited the review last week in their official response to the
critical report from the House of Lords constitution committee on surveillance published earlier this
year. The peers warned that the steady expansion of
the 'surveillance society', including the spread of CCTV, risked undermining fundamental
freedoms, including the right to privacy....The
Campbell Collaboration report says that CCTV is now the single most heavily-funded crime
prevention measure operating outside the criminal justice system and its rapid growth has
come with a huge price tag. It adds that £170m was spent on CCTV schemes in town and city
centres, car parks and residential areas between 1999 and 2001 alone. "Over the last
decade, CCTV accounted for more than threequarters of total spending on crime prevention
by the British Home Office,' the report says. The Lords report said that £500 million was
spent in Britain on CCTV in the decade up to 2006, money which in the past would have gone
on street lighting or neighbourhood crime prevention initiatives." |
".... passports from 2011 will have the same
things as ID cards. They'll have a chip containing a facial picture, and also a
fingerprint. Now the computer system has to be upgraded because apparently it's out of
date. And most of that money is going to be spent on that. ID cards only represents just
over a billion pounds of the overall cost... [The Tories] can certainly scrap the little
plastic card which calls itself a British ID card. However, what they can't scrap is the database because that's
going to used to store details of people who have got passports, to keep passports secure.
And effectively if you wait ten years after 2011 you will have 80% of the population with
their details on a database - whatever you call it - and stored
in the same way that you would
have with ID cards." Rory Maclean - Reporter BBC Radio 4 Today Programme, 6 May 2009 - 06:32 am |
"Spy chiefs are pressing ahead
with secret plans to monitor all internet use and telephone calls in Britain despite an
announcement by Jacqui Smith, the home secretary, of a ministerial climbdown over public
surveillance. GCHQ, the governments
eavesdropping centre, is developing classified technology to intercept and monitor all
e-mails, website visits and social networking sessions in Britain. The agency will also be
able to track telephone calls made over the internet, as well as all phone calls to land
lines and mobiles.....The £1 billion snooping project called Mastering the
Internet (MTI) will rely on thousands of 'black box' probes being covertly inserted
across online infrastructure. Shami Chakrabarti, director of Liberty, said Smiths
announcement appeared to be a 'smokescreen'. 'We opposed the big brother database because
it gave the state direct access to everybodys communications. But this network of
black boxes achieves the same thing via the back door,' Chakrabarti said. Informed sources
have revealed that a £200m contract has been awarded to Lockheed Martin, the American
defence giant. A second contract has been given to Detica, the British IT firm which has
close ties to the intelligence agencies..... An industry insider, who has been briefed on
GCHQs plans, said he could not discuss the programme because he had signed the
Official Secrets Act. However, he admitted that the project would mark a step change in
the agencys powers of surveillance. At the moment the agency is able to use probes
to monitor the content of calls and e-mails sent by specific individuals who are the
subject of police or security service investigations. Every interception must be
authorised by a warrant signed by the home secretary or a minister of equivalent rank. The new GCHQ internet-monitoring network will shift the focus of
the surveillance state away from a few hundred targeted people to everyone in the UK.... Ministers have said they do not intend to snoop on the actual content
of e-mails or telephone calls. The monitoring will
instead focus on who an individual is communicating with or which websites and chat rooms
they are visiting.....GCHQ said it did not want to discuss how the data it gathered would
be used." Jacqui Smith's secret plan to carry on snooping Sunday Times, 3 May 2009 |
"Police who arrested the Conservative frontbencher Damian Green
trawled his private e-mails looking for information on Britains leading civil
liberties campaigner. Officers from Scotland Yards antiterror squad searched the
computer seized from his parliamentary office using the key words 'Shami Chakrabarti'
even though the Liberty director had nothing to do with the leaking of Home Office
documents that prompted the investigation. In an interview with The Times, Mr Green warned that his arrest and the raids on his Commons
office and homes smacked of a 'police state'.... Mr
Green said serious questions remained about the handling of the case by the police and the
Government. 'This was the first time since we became a democracy that an opposition MP had
been arrested for political work,' he said. 'Arresting opposition politicians is something
you associate with police states. We should be very vigilant that we dont take steps
towards that and this was quite a significant step towards it.' Mr Green said he found it
surprising that the police had not informed the Home Secretary that they were about to
arrest a Shadow frontbencher. 'I have spoken to former senior ministers of both parties
and everyone says, Of course we would have been told ' he said." Shami Chakrabarti was target in police search London Times, 18 April 2009 |
"A fortnight ago, I received an unexpected seasonal greeting via
email. 'Chag Sameach, Hilary,' it read - to translate, that's Hebrew for 'Happy holiday'.
Last week saw the start of the Jewish festival of Passover. How kind, I thought, at first.
But this was no ordinary greeting. It didn't come from a friend, relative or even a
colleague. It came from Ocado, the delivery partner of Waitrose. And, rather than being a
thoughtful gesture, it was actually an invitation to spend my hard-earned cash on Passover
groceries. Call me paranoid, but this direct - and ethnic - marketing ploy made me feel
slightly uneasy. How on earth, I wondered, did Ocado know I was Jewish? After racking my
brains, I decided that Ocado could only have concluded I was Jewish because I have
occasionally bought fried gefilte fish balls, a Jewish delicacy, as part of my monthly
shop. Now, you don't have to be Jewish to enjoy fishballs, but it helps. My non-Jewish
husband finds them repellent. Though I'm not a practising Jew, I am proud of my identity
and have no wish to conceal it. Yet, it concerns me that a shop should mark me out as
Jewish because I occasionally enjoy Jewish food. Had I bought a curry, would Ocado assume
I was Indian and send me 'Happy Diwali' greetings? And what else could they have concluded
about me, by recording what I buy? Does the supermarket think that because I like Jewish
food I must fit other racial stereotypes? Will it only be a matter of time before it sends
me special offers on Woody Allen DVDs and self-help books? As
the grandchild of German Jews persecuted by the Nazis and forced to wear yellow stars
before they fled to safety in Britain, being listed on any database as a Jew doesn't sit
comfortably with me. What if this information were to fall into the hands of nationalists
or extremists? Or what if a future government decided that people who eat fishballs are
undesirables? You might think I'm over-reacting, but
supermarket ethnic profiling has reportedly been used by the authorities to mark out
individuals for observation. Following the September 11 attacks, U.S. federal agents were
said to have reviewed the shopping records of the terrorists involved to create a profile
of ethnic tastes and shopping patterns associated with extremism." Supermarket Big Brother: The spy in your shopping basket... but how DOES Ocado know I'm Jewish? Daily Mail, 16 April 2009 |
"Fears that Britain was slipping into a surveillance society were
heightened yesterday as Brussels initiated legal action after declaring that UK laws
guaranteeing data protection were 'structurally flawed' and well below the European
standard. The criticism arose after the European
Commission investigated the use of 'behavioural advertising technology' by British
internet service providers, which it found was illegal under European but not
British law. 'I call on the UK authorities to change their national laws and ensure
that national authorities are duly empowered and have proper sanctions at their disposal
to enforce EU legislation on the confidentiality of communications,' Viviane Reding, the
European Commissioner for Information Society and Media, said. A Commission statement yesterday said that Brussels had sent several
letters to the British authorities since last July asking why
the Government had not taken action against BT after the company used Phorm technology
a covert method of targeting advertising based on user browsing habits to
secretly monitor the internet activity of 30,000 broadband customers in trials between
2006 and 2007....Richard Thomas, the Information
Commissioner, does not have any power to enforce the Regulation of Investigatory Powers
Act, which governs interception, and the Office of the Surveillance Commissioners can only
investigate interceptions by public authorities. In February Mr Thomas told The Times that
his office required more powers to investigate private companies suspected of data
breaches. He also criticised the Government for introducing a series of laws that risked
'hard-wiring surveillance' into the British way of life. The Government has two months to
respond to the 'infringement proceedings' the first stage of a legal process that
could end up in the European Court of Justice for an alleged breach of the EU Data
Protection Directive. Despite complaints from those affected by the trials, and privacy
campaigners, the Government took no action against BT or Phorm. City of London Police
dropped its investigation last year, saying the scheme was legal as customers had
'implicitly consented' to be monitored." Britain in the dock over secret tracking of internet accounts London Times, 15 April 2009 |
"If the Conservatives win the next General Election and cancel ID Cards,
there will be little in effect to cancel. The IT
infrastructure for passports is being combined with that of ID Cards. So the £650m worth of contracts which were awarded this week to CSC
and IBM for new ID Cards and passports IT will remain largely intact....The Treasury requires that the Identity and Passport Service is
self-funded. But it's not possible yet to split the costs of the infrastructure between ID
Cards and passports. So ID Card costs will be mixed into passport fee increases. Already
passports cost up to £114 - and officials don't deny that we're heading towards the £200
passport." Heading for the £200 passport to help pay for ID Cards? ComputerWeekly (Blog), 8 April 2009 |
"Internet service providers (ISPs) are required to store details of
user e-mails and net phone calls from Monday as a European Union directive comes into
force. Governments say it will protect citizens but civil liberty campaigners are not so
sure. To whom did you send your first e-mail today? I ask, because from today ISPs inside
the EU are legally required to store details of that e-mail for up to a year. And the same
goes for any internet phone call you make or website you visit. This so-called
communications data is now being held on the ISPs' servers just in case the authorities
want to come and look at it. Many ISPs have actually been holding on to this kind of data
as a matter of course - to help defeat spam, to monitor and manage their own networks and
because governments have asked them to do so voluntarily. The
difference now is that it is a legal requirement. To be clear, the contents of the e-mails
are not logged, nor are the contents of any net phone calls. This is about connections
between people and organisations. Governments believe that they can look for patterns in
these relationships that would help them flag potentially dangerous individuals or
organisations....'Technology makes it very easy to
collect, store and process data,' said Jim Killock, executive director of the Open Rights
Group. 'The problem is there is a growing temptation from the security services and police
to say we want more, we want to do more and keep more of our data.' He said the problem
with traffic pattern analysis was that we became 'judged on our past mistakes'. 'There is
a basic risk we become a mere data trail - that rather than being able to exercise choice
we become who we are based on our history.' Mr Killock said the legislation could also
have the opposite effect to the one intended by governments. 'People who really do want to
do obnoxious things will simply hide themselves away - using encryption techniques and
anonymisers. 'It will make it harder for the security services that actually monitor the
people they think are a risk." Campaigners warn of user data creep BBC Online, 6 April 2009 |
"Millions of us are unwittingly signing away our rights to privacy
when we upgrade to flashy new mobile phones, warn campaigners. The latest handsets are so
advanced they can reveal the location of the owner to within a few yards - along with
their internet shopping habits, their interests and the names and addresses of their
friends. Although phone providers are not supposed to pass on this 'Big Brother' data
without permission, a 'worryingly large number' of people give consent for the information
to be sold to marketing companies, campaigners say. Simon Davies, of human rights group
Privacy International, said the danger came when customers signed up to contracts or
downloaded new mobile phone applications without reading the small print. One of the most
potentially intrusive applications is Google Latitude, which lets mobile phone owners
'share' their location with anyone in the world. Mr Davies added that the risks of such
snooping software on these 'smart phones' were far more sinister than Google's
controversial-Street View service. 'People are giving consent for mobile phone companies
to pass on this information without realising the consequences,' he said. 'Ninety per cent
are mesmerised by the shiny new phone and don't understand the implications of signing
away rights they would normally have under the Data Protection Act. 'People should care
because this sort of information can be passed to a third party such as a credit provider
or a credit reference company. It provides an
enormous database that could be cherry-picked by the Government or police. 'It provides a remarkable insight into who you are, what you do, who you
know and where you have been. Unless regulators get to grip with this we are all
doomed.' Records of website visits, messages, phone calls and even real-life
locations visited can be stored by a mobile phone company. Although each application is
relatively harmless on its own, combining data from several is potentially lucrative. Glyn
Read, a former marketing director of SAS Institute, a leading behavioural analysis
company, said the real worry would come when governments start to demand
access to the data.What is going on at the moment is the opening of a barn door in
your personal habits, he told the Guardian. The value of understanding
people's personal information is enormous - this will allow a form of subliminal
advertising.'...Neil Andrew, head of portal advertising for the mobile phone company 3,
said his company would only pass on information with the consent of a customer. But he
conceded: Mobile is the key to understanding
where a person is and what they have been browsing." 'Privacy risk' of new mobiles that give away location and stored details to marketing firms Daily Mail, 3 April 2009 |
"Should President Obama have the power to shut down domestic Internet
traffic during a state of emergency? Senators John Rockefeller (D-W. Va.) and Olympia
Snowe (R-Maine) think so. On Wednesday they introduced a bill to establish the Office of
the National Cybersecurity Advisoran arm of the executive branch that would have
vast power to monitor and control Internet traffic to protect against threats to critical
cyber infrastructure. That broad power is rattling some civil libertarians. The Cybersecurity Act of 2009
(PDF) gives the president the ability to 'declare a cybersecurity emergency' and shut down
or limit Internet traffic in any 'critical' information network 'in the interest of
national security.' The bill does not define a critical information network or a
cybersecurity emergency. That definition would be left to the president. The bill does not
only add to the power of the president. It also
grants the Secretary of Commerce 'access to all relevant data concerning [critical]
networks without regard to any provision of law, regulation, rule, or policy restricting
such access.' This means he or she can monitor or access any data on private or public
networks without regard to privacy laws....The
cybersecurity threat is real,' says Leslie Harris, head of the Center for Democracy and
Technology (CDT), 'but such a drastic federal intervention in private communications
technology and networks could harm both security and privacy.' The bill could undermine
the Electronic Communications Privacy Act (ECPA), says CDT senior counsel Greg Nojeim.
That law, enacted in the mid '80s, requires law enforcement seek a warrant before tapping
in to data transmissions between computers. 'It's an incredibly broad authority,' Nojeim
says, pointing out that existing privacy laws 'could fall to this authority.' Jennifer
Granick, civil liberties director at the Electronic Frontier Foundation, says that
granting such power to the Commerce secretary could actually cause networks to be less
safe. When one person can access all information on a network, 'it makes it more
vulnerable to intruders,' Granick says. 'You've basically established a path for the bad
guys to skip down.'" Should Obama Control the Internet? Mother Jones, 2 April 2009 |
"Drivers face having their every move tracked by a 'spy in the car'
black box. The system will constantly check a vehicle's speed - making cameras redundant -
and allow for pay-as-you-go tolls. The £36million EU project is partly funded by the UK
Government and backed by car makers and the telecoms industry. It will be unveiled later this year with a view to its integration
into future cars. Manufacturers suggest this could be as early as 2013. Vehicles fitted with the system will emit a constant 'heartbeat' pulse
revealing their location, speed and direction of travel. EU officials believe the
technology will significantly reduce road accidents, congestion and carbon emissions. But
civil liberties campaigners say it will have profound implications for privacy by creating
a Europe-wide system of Big Brother surveillance. The European Commission has already
asked governments to reserve a radio frequency for the system to operate on.
Engineers say the system will be able to track cars to within a yard, making it
significantly more accurate than existing satellite navigation technology....The
Department for Transport said there were no plans to make the system mandatory in new
cars. Its introduction will be on a voluntary basis, according to Paul Kompfner, manager
of the Cooperative-Vehicle-Infrastructure Systems project....Simon Davies, of Privacy
International, a watchdog, said: 'If you correlate car tracking data with mobile phone
data, which can also track people, there is the potential for an almost infallible
surveillance system.'" The black box that tracks every mile you drive and will make speed cameras obsolete Daily Mail, 1 April 2009 |
"Privacy campaigners expressed alarm today over government plans to monitor all conversations on social networking
sites in an attempt to crackdown on terror. A Home
Office spokesman said that the internet eavesdropping plan, which would be set out in the
next few weeks, would cover any social network that allows people to chat to one another,
including Facebook, MySpace, Bebo
and Twitter as well as internet calls on Skype. He said the proposal would update
existing plans to store information about every telephone call, email, and internet visit
made by anyone in the UK on a central database. 'We have no way of knowing whether Osama
bin Laden is chatting to Abu Hamza on Facebook. Or terrorists could be having a four-way
chat on Skype,' he said. He said the government was not interested in the contents of the
communication: 'What we want to monitor is that so-and-so is logged on to that site and
spoke to so-and-so. It's the who, when and where, not the content.' But he conceded that in 'high-profile cases' the
police would want to examine the contents of social network chatter. 'The security service
would want the ability to capture information that could lead to conviction,' he said.
Under the new proposals, the sites that host social networks could be required to hold
data about who users correspond with for up to a year....Privacy campaigners criticised
the plan, saying it would be another unwieldy, costly and unnecessary failure. Shami
Chakrabarti, director of human
rights group Liberty, said: 'The widescale use of social networking websites
highlights the enormity of government ambitions for a centralised communications database
for the surveillance of the entire population
Technological development is used as
an excuse for centralised snooping of a kind that ought never to be acceptable in the
oldest unbroken democracy on earth.'" Home Office defends plan to monitor social network conversations Guardian, 25 March 2009 |
"Not happy with pushing the EU Data Retention Directive which would make ISPs store communication data
for 12 months Vernon Coaker, the U.K. Home Office security minister, now wants all social networking sites and IM messaging service monitored
as well. The Interception Monderisation Programme (IMP) is the government proposal for
legislation to use mass monitoring of traffic data as an antiterrorism tool. The IMP has
two objectives; that the government use deep packet inspection to monitor the Web communications of
all U.K. citizens; and that all of the traffic data
relating to those communications are stored in a
centralized government database. The problem is that
social networking sites arent covered by the directive. There is some opposition to
this move but given the countrys predilection to treating
everyone as a subject of surveillance it is hard to
see this not happening." |
"From time to time, when low in spirits, I find solace in websites on
'How to Disappear'. It is not an urge to deceive loved ones and insurance companies like
the appalling canoe man, but merely to toy with the idea of slipping below the official
radar. Imagine walking cheerfully through the world: harmless and innocent, untraceable,
unlisted, unfollowed, private. The guides make it clear how hard this is. It is not only
CCTV and biometric passports that betray our whereabouts but also banking, bills, phones,
cars, laptops (how ironic , just as you completed your escape, to be outed by web records
showing you surfing for advice on how often to throw your prepay phone in the river). As
technology moves on, not only fingerprinting but facial scanning may betray you, and if -
while remembering your gloves and refraining from sneezing your DNA - you take your
sunglasses off to see the cash machine screen on your secret bank account, then
iris-recognition technology will get you, snap! Oh yes, we have all watched Spooks. Well,
it is a pleasantly paranoiac way to pass a depressed half-hour, and there is a thrill in
switching off the mobile, taking the bus to somewhere without CCTV and paying cash for
your tea. You and your innocence can spend an afternoon alone together, unseen by
officialdom. There is something fundamentally unnerving about being watched. After the fall of Ceausescu, our Romanian friends said that one of
the worst things under his regime was not lousy housing, shortages or even fear of arrest
but that 'They knew everything, they knew where you went'....'But,' splutters government when we jib at this, 'it's for your own
good! We're protecting you!'. The same tone of hurt ministerial outrage will be heard more
and more as people come to realise exactly what is involved in the vast new 'e-borders'
system, currently being set up to track everybody's international travel just because a
tiny minority are up to no good. A huge new database near Manchester will hold your
personal travel history and mine for up to ten years. A pilot is already running on
'high-risk' routes; by the end of April 100 million will be tracked, by next year all
rail, air and ferry travellers; by 2014, everyone. And what will they know? Who you are,
where you live, how you paid, your phone and e-mail, where you're going, who's with you,
where you plan to stay and when you'll be back. In most cases they want your intentions
logged a full day in advance. We may be forced to be 'EU citizens' in a hundred other
ways, but there'll be no more casual booze-cruises or spontaneous hops to the Normandy
gîte or Frankfurt office; not without telling Nanny. .... [there will be a] a £5,000
fine for not notifying your movements online 24 hours early.... Opposition voices have
pointed out the complexity, the cost, the paucity of consultation, the extraordinary power
given to the UK Border Agency by statutory instruments without parliamentary scrutiny.
Given the cases of councils already using anti-terrorist powers to catch litterbugs and
school admissions cheats, there is a real fear that e-borders will be used to trump up tax
claims or detect petty infringements like taking your children abroad in the school term.
And there is something profoundly dispiriting in the principle of us all being suspects:
universal surveillance rather than targeted concentration on known criminals and murderous
creeps with terrorist ambitions. All this began when Tony Blair was embarrassed by a
question about how many failed asylum seekers were here, and when it became clear that UK
immigration control is ludicrously ineffective in an enlarged, porous EU. The depressing
thing is that there used to be a reasonable system for knowing who was here - exit checks
on passports. These were largely abandoned in 2004 to save money. Under e-borders,
the idea is that the pendulum will swing back until they know everything about everyone.
And having so much information, they will become even more confused and give your plans to
some cowboy IT contractor, who will leave it on a train seat to be picked up by grateful
burglars, blackmailers and gossips. They'll write in saying this is a caricature.
It's not. It's an extrapolation, based on experience." |
"The travel plans and personal details of every holidaymaker,
business traveller and day-tripper who leaves Britain are to be tracked by the Government,
the Daily Telegraph can disclose. Anyone departing the UK by land, sea or air will have
their trip recorded and stored on a database for a decade. Passengers leaving every
international sea port, station or airport will have to supply detailed personal
information as well as their travel plans.... Even swimmers attempting to cross the
Channel and their support teams will be subject to the rules which will require the
provision of travellers' personal information such as passport and credit card details, home and email addresses and exact travel
plans....By the end of the year 60 per cent of
journeys made out of Britain will be affected with 95 per cent of people leaving the
country being subject to the plans by the end 2010.... In
most cases the information will be expected to be provided 24 hours ahead of travel and will then be stored on a Government database for around ten years.
The changes are being brought in as the Government tries to tighten border controls and
increase protection against the threat of international terrorism. Currently passports are
not checked as a matter of routine when people leave the country....Britain is not the
only country to require such information from travel operators. The USA also demands the same information be supplied from
passengers wishing to visit America. But the scale
of the scheme has alarmed civil liberties campaigners. 'Your travel data is much more
sensitive than you might think,' Phil Booth of the privacy group, NO2ID said. 'Given that
for obvious reasons we're encouraged not to put our home address on our luggage labels,
and especially given the Government's appalling record on looking after our data, it just
doesn't seem sensible for it to pass details like this and sensitive financial information
around.' 'It is a sad refection of the times that the dream of freedom of movement across
Europe has had to take second place to concerns about national security,' said Edmund
King, the AA's president.....The changes would mean that Eurostar, Eurotunnel and ferry
companies will now have to demand passport details from passengers at the time of booking,
along with the credit card information and email address which they would have taken at
the time of the reservation." All travel plans to be tracked by Government Daily Telegraph, 14 March 2009 |
"An increasing number of today's
schoolchildren are forgoing the humiliating daily name call of registration, and are
instead having to 'fingerswipe' in and out of class, or to give it its proper name:
biometric registration. According to campaign group LeaveThemKidsAlone, schools have
fingerprinted more than two million children this way, sometimes even without their
parents' consent. A
statement on its website claims: 'It's part of an enormous softening-up exercise,
targeting society's most impressionable, so they'll accept cradle-to-grave state snooping
and control.' Hard-pressed schools and local
councils with tight budgets are being enticed by a new generation of software that
promises to cut administration costs and time. In the last 18 months, several Guardian
readers have written into the paper expressing concern at this new technology being
trialled on their children. Everything from 'cashless catering schemes' to 'kiddyprints'
instead of library cards is being introduced by stealth into the nation's schools, it is
claimed....The implications are vast the nation's schools aren't exactly the safest
place for the storage of this sensitive data and anyone with access to the system
and a mobile SIM card can download the information from a computer, increasing the chances
of identity theft. Unless the computer system is professionally purged, before this data
has a chance to be leaked, it can remain in cyberspace for eternity to be retained for all
sorts of dubious purposes. It's odd that this drive towards fingerprinting children
coincides with the government's keenness to expand the national
DNA database we already have one of the largest in the world with more
than four million people on file, including nearly 1.1 million children. Odd too that
VeriCool is reported to be part of Anteon, an American
company that is responsible for the training of interrogators at Guantánamo and Abu
Gharib. The implications are vast the nation's schools aren't exactly the
safest place for the storage of this sensitive data and anyone with access to the
system and a mobile SIM card can download the information from a computer, increasing the
chances of identity theft. Unless the computer system is professionally purged, before
this data has a chance to be leaked, it can remain in cyberspace for eternity to be
retained for all sorts of dubious purposes. It's odd that this drive towards
fingerprinting children coincides with the government's keenness to expand the national
DNA database we already have one of the largest in the world with more
than four million people on file, including nearly 1.1 million children. Odd too that
VeriCool is reported to be part of Anteon, an American
company that is responsible for the training of interrogators at Guantánamo and Abu
Gharib. It seems that in the blink of an eyelid
(or iris scan), our children are losing the civil liberties and freedoms we are fighting
so hard to preserve." Why are we fingerprinting children? Guardian, Comment Is Free, 7 March 2009 |
"Privacy advocates are issuing warnings about a new radio chip plan
that ultimately could provide electronic identification for every adult in the U.S. and allow agents to compile attendance lists at anti-government
rallies simply by walking through the assembly. The
proposal, which has earned the support of Janet Napolitano, the newly chosen chief of the
Department of Homeland Security, would embed radio chips in driver's licenses, or
'enhanced driver's licenses.' 'Enhanced driver's licenses give confidence that the person
holding the card is the person who is supposed to be holding the card, and it's less
elaborate than REAL ID,' Napolitano said in a Washington Times report. REAL ID is a plan
for a federal identification system standardized across the nation that so alarmed
governors many states have adopted formal plans to oppose it. However, a privacy advocate
today told WND that the EDLs are many times worse....Participants could find themselves on
'watch' lists or their attendance at protests or rallies added to their government
'dossier.' She said even if such license programs are run by states, there's virtually no
way that the databases would not be linked and accessible to the federal government.
Albrecht said a hint of what is on the agenda was provided recently by California Gov.
Arnold Schwarzenegger. The state's legislature approved a plan banning the government from
using any radio chips in any ID documentation. Schwarzenegger's veto noted he did not want
to interfere with any coming or future federal programs for identifying people." Radio chip coming soon to your driver's license? WorldNetDaily, 28 February 2009 |
"Fraudulent bankers are more of a danger to society than terrorists
and the failure to reassure people that their money is safe is an 'absolute failure of
public policy', a former Director of Public Prosecutions says today. Writing in The Times,
Sir
Ken Macdonald says that the systems for regulating markets and for prosecuting market
crime have completely broken down...In his article, Sir Ken lambasts the 'liberty-sapping addictions' of the Home Office and the
'paranoiac paraphernalia of national databases and ID cards'. He also attacks the rush to 'bring in lots of terror law, the tougher the
better'. Rather than ensuring that people's money and financial security 'will not be
stolen from them', legislators wanted 'criminal justice to be an auction of fake
toughness', he says. Sir Ken has previously criticised government plans to extend the time
that terrorism suspects could be held without charge beyond 28 days; and, recently, plans for increased surveillance and data retention." Sir Ken Macdonald rounds on Britain's banking robbers London Times, 23 February 2009 |
"A former head of MI5 has
accused the government of exploiting the fear of terrorism and trying to bring in laws that restrict civil liberties. In an
interview in a Spanish newspaper, published in the Daily Telegraph, Dame Stella Rimington,
73, also accuses the US of 'tortures'....Dame Stella, who stood down as the director
general of the security service in 1996, has previously been critical of the government's
policies, including its attempts to extend pre-charge detention for terror suspects to 42
days and the controversial plan to introduce ID cards. 'It would be better that the
government recognised that there are risks, rather than frightening people in order to be
able to pass laws which restrict civil liberties, precisely one of the objects of
terrorism - that we live in fear and under a police
state,' she told the Spanish newspaper La
Vanguardia....Dame Stella's comments come as a study is published by the International
Commission of Jurists (ICJ) that accuses the US and the UK of undermining the framework of
international law. Former Irish president Mary Robinson, the president of the ICJ said:
"Seven years after 9/11 it is time to take stock and to repeal abusive laws and
policies enacted in recent years. 'Human rights and international humanitarian law provide
a strong and flexible framework to address terrorist threats.' The BBC's security
correspondent Frank Gardner said the ICJ report would probably have more of an impact than
Dame Stella's remarks because it was a wide-ranging, three-year study carried out by an
eminent group of practising legal experts....Liberal Democrat foreign affairs spokesman Ed
Davey said: 'This is damning testament to just how much liberty has been ineffectually
sacrificed in the 'war on terror'.' Dame Stella became the first female head of MI5 in
1992." |
"For most of the past century, Britain's
secret state bugged, blacklisted and spied on leftists, trade
unionists and peace campaigners, as well as Irish republicans and anyone else regarded
as a 'subversive' threat to the established order. That was all supposed to have been
brought to a halt in the wake of the end of the cold war in the early 1990s. MI5 now
boasts it has ended its
counter-subversion work altogether, having other jihadist fish to fry (it will have soon
doubled its staffing and budget on the back of the 9/11 backlash).Whether those claims
should be taken at face value must be open to question. But it now turns out that other
arms of the secret state have in any case been stepping up to the plate to fill the gap in
the market. The Association of Chief Police Officers (Acpo) insists that its confidential
intelligence unit reported last week to be now coordinating surveillance and
infiltration of 'domestic extremists', including anti-war
protesters and strikers is not in fact a new organisation, but has been part of
its public order intelligence operations since 1999, liaising with MI5 and its 44 forces'
special branch outfits across the country. But yes, Acpo's spokesman tells me, it is in
the business of targeting groups such as those
involved in the recent Gaza war protests, trade
unionists taking part in secondary industrial action and animal rights organisations
though only if they break the law or 'seek to break the law'. Now, that
qualification could be used to cover a very wide group of political and industrial
activists indeed: including all those
students who have been occupying university buildings since the new year in protest at
Israel's carnage in the Palestinian territories; all those engineering construction
workers who staged mass
walkouts at refineries and power stations over the past couple of weeks; and all those
who blocked streets or threw their shoes at police around the Israeli
embassy in London at the height of the Gaza bombardment in January. Add to that the fact
that Acpo, and the government as a whole for that matter, bandies around the term 'extremism' without being able to make even a face-saving
stab at what it actually means 'there doesn't seem to be a single, commonly agreed
definition', Acpo's spokesman concedes and
you have a recipe for a new lease of life for the
harassment and criminalisation of legitimate dissent, protest and industrial action. In case there were any doubt about the kind of thing this intelligence
outfit is up to, a recent advertisement for its new boss specified that the unit would be
specifically working with government departments, university authorities and private
corporations to 'remove the threat' of 'public disorder that arises from domestic
extremism' using 'secret data' and 'sensitive source material'. But since Acpo operates as
a private company outside the Freedom
of Information Act and the budget and staffing of its confidential intelligence
unit are, well, confidential who's going to hold them to genuine account?" Seamus Milne - We are all extremists now Guardian, Comment Is Free, 16 February 2009 |
"Forget about those old-school spy devices planted under phones and
inside vases. For the most covert spy operations, the U.S. government is planning to
create cyborg insects with micro-scopic sensors, video surveillance cameras, and global
positioning systems to aid the Department
of Defense. A 'solicitation notice' from the Defense
Advanced Research Projects Agency (DARPA) explains how HI-MEMS (hybrid insect
microelectromechanical systems) will introduce nanoscale
electronics in moths and other insects during their
early stages of metamorphic development. New tissue growth would accommodate the MEMS
implants in later metamorphic stages. The proposal also suggests the use of swimming and
hopping insects with embedded microphones for recording conversations and gas sensors for
detecting new chemical warfare testing. 'We are currently supporting three research teams
at the University
of Michigan, MIT, and Boyce Thompson Institute,' says Jan Walker, a DARPA
spokesperson. 'The insect species being investigated include large moths and horned
beetles.'" Future Watch: This Room is Bugged PC Magazine, 10 February 2009 |
"A Big Brother database is being built by the Government
to store details of millions of our international journeys for up to ten years. The computer system, housed at a secret location on the outskirts
of Manchester, will record names and dates of every movement in and out of the UK by air,
sea or rail. Reservation and payment details,
addresses and telephone numbers, names of travelling companions and even details of
luggage carried will also be stored. Ministers insist the database, part of the
Governments EBorders project, is vital to the fight against terrorism,
illegal immigration and organised crime. But as details emerged yesterday, opponents
warned that the spy system which will track the 250million journeys in and out of
the country each year amounted to another building block in Britains growing
surveillance society." Beware, Big Brother is watching your trips abroad: Government plans to store details of ordinary people's journeys into and out of UK Mail On Sunday, 8 February 2009 |
"Billions of times a day, people entrust Google with the details of
their lives. Every time you enter 'acne', 'coffin' or 'new car' into the Google search
bar, you are telling the Googlebots a tiny part of what you are up to. Many people, I
suspect, don't think about this and when they do, they don't care enough to change to a
different search engine. The reason is because, by and large, people trust Google not to
do anything evil with their anonymised personal information. So far, Google has earned
that trust....what worries people is that we have to
take it on trust that Google will not use all that personal information in a way we object
to in the future." Sure, the Googlebots know your deepest secrets - but it's worth it London Times, 6 Febuary 2009 |
"Electronic surveillance and
collection of personal data are 'pervasive' in British society and threaten to undermine
democracy, peers have warned. CCTV cameras and the
DNA database were two examples of threats to privacy, the Lords constitution committee
said. It called for compensation for people subject to illegal surveillance....Civil
liberties campaigners have warned about the risks of a 'surveillance society' in which the
state acquires ever-greater powers to track people's movements and retain personal
data.... According to a 2004 European Commission report, Britain has the highest density
of CCTV cameras in Europe. It found 40,000 cameras monitored public areas in 500 British
towns and cities, compared to fewer than 100 cameras in 15 German cities and no open
street CCTV at all in Denmark.....'The huge rise in surveillance and data collection by
the state and other organisations risks undermining the long-standing tradition of privacy
and individual freedom which are vital for democracy,' Lord Goodlad added. 'If the public
are to trust that information about them is not being improperly used, there should be
much more openness about what data is collected, by whom and how it is used.'... Human
rights campaigners Liberty welcomed the report. Director Shami Chakrabarti said:
'Liberty's postbag suggests that the House of Lords is more in touch with public concerns
that our elected government. 'Over the past seven years we've been told 'nothing to hide,
nothing to fear' but a stream of data bungles and abuses of power suggest that even the
innocent have a lot to fear." |
"New software that allows people to track friends, partners and
children has triggered privacy and safety concerns. Google Latitude, launched yesterday by
the internet search engine company for use with its Google maps software, allows users to
activate tracking software on their mobile phone or wi-fi device. That enables them to
appear on home computer maps so their friends and loved ones can see where they are. But
the technology has raised concerns that people will be able to spy on their partners from
home and fears that it could potentially place children at risk from paedophiles.
Helen Hughes, a family lawyer, said she feared that the device would be used by people to
track their partners. 'In abusive relationships there is an element of control. You will
see people checking receipts to find out when their partner was at the shops. This could
be abused by people seeking to control their spouses.' The software is extremely precise
as it uses the Global Positioning System which can calculate a person's location within
yards.Dr Andreas Komninos, a computing expert with Glasgow Caledonian University, said the
information could possibly be misused in the future. 'Google are always gathering data;
the problem is now this information is very personal. A phone number is very specific to
an individual,' he said. Google has stated it will not retain any information about users'
movements. But Dr Komninos said: 'I would take
Google's promise with a pinch of salt. I can foresee a situation in the future where
agencies could force the company to store the data, possibly for police or anti-terrorist
use.' Dr Komninos has also warned parents to be
watchful of their child's use of the new software. 'In theory, it is a possible security
risk,' he said." Fears over Google phone tracking Scotsman, 5 February 2009 |
"With Googles Latitude, parents will be able to swoop down like
helicopters on their children, whirr around their heads and chase them away from the games
arcade and back to do their French verbs....However Orwellian it sounds, dont worry.
The police and security services can already track
you down from your phone without any help from Google..." Sloping off could soon be a thing of the past London Times, 5 February 2009 |
"Privacy critics are panning Google's new Latitude application, which
allows users to track friends via GPS on their mobile phones, saying the application could
be abused by suspicious partners and paedophiles.... Critics have said the application is
a 'privacy minefield' and could be abused by overzealous employers, jealous spouses or
paedophiles. Others say it could be misused in the
future by police or government organisations to illegally track wanted individuals....Last
year Google was signed up by US intelligence agencies to help them better handle and share
information gathered about terrorist suspects. According to reports in the San Francisco
Chronicle the search giant is working with agencies such as the National Security Agency." Google's mobile phone tracking service under fire from privacy critics Brand Republic, 5 February 2009 |
"Since last autumn, BT under the 'Webwise' banner has been trialling a
technology called Phorm, which dials direct into your
internet service provider's network and intercepts communications between you and the
websites you visit, using information about the sorts of things you are viewing to serve
you targeted ads....should we tolerate Phorm? Thanks to hard work from campaigners at the Foundation for Information Policy Research and the Open Rights Group, and activists at dephormation.org.uk and nodpi.org, we now have that choice. The Information Commissioner's
Office has ruled that BT must ask the explicit permission of its customers to 'opt in'
before enrolling them into its Webwise trial (rather than the pernicious 'opt out' clauses
so beloved of marketers and junk mail operatives). ....Like
the MP, the journalist, the doctor and the priest, ISPs have the power to know the
intimate details of our lives. They should be prevented from abusing that power, and
shielded from the power of those (like the Home Office, with its widely reported plans to
'modernise' the state's interception capability) who would seek to force them to break
their confidence with us. If this does not happen, it is not only the digital economy that
will suffer, it is modern liberty itself." Your ISP is watching you Guardian, Comment Is Free, 2 February 2009 |
"It has taken less than 24 hours after
the Bush presidency ended for a former analyst at the National Security Agency to come
forward to reveal new allegations about how this
nation was spied on by its own government,
exclusively here on COUNTDOWN. Our third story tonight, Russell Tice has already stood up
for truth before this evening as one source for the revelation in 2005 by the 'New York
Times' that President Bush was eavesdropping on American citizens without warrants.
Tonight, the next chapter for Mr. Tice, a chapter he feared to reveal while George Bush
occupied the Oval Office, that under the collar of fighting terrorism, the Bush
administration was also targeting specific groups of Americans for surveillance, non-terrorist
Americans if you will. Mr. Tice prepared to name one of those groups tonight.
The NSA was already estimated to have collected millions of transmissions, e-mails and
phone calls of average Americans simply by patching into the networks of cooperative
telecommunications companies. You will recall the infamous room 641A at the AT&T
Folsom Street facility in San Francisco, in which the whole of AT&Ts portion of
the Internet was duplicated inside a room accessible only to the NSA. Mr. Tice,
however, was also involved in another program and told us that he was first directed to
focus on these specific groups in order to weed them out from legitimate surveillance
targets, but ultimately concluded that the weeding out was actually an internal NSA cover
story for a real goal, which was simply spying on those Americans. Initially, Mr.
Bush told the nation all his surveillance was legal." |
"A leading Chinese dissident who worked as an MI6 informant was
convicted yesterday of murdering a millionaire author to steal his identity....Most of the evidence was heard in secret after MI6 requested that
the press and public be excluded for almost all of the case. Jacqui Smith, the Home
Secretary, agreed to a Public Interest Immunity certificate, making it the first murder
trial covered by a secrecy order on the ground of national security." MI6 informant Wang Yam found guilty of killing millionaire author to steal his identity London Times, 17 January 2009 |
"A secrecy law frequently invoked by the federal government in
terrorism cases has been declared unconstitutional by an Ontario Superior Court judge,
amid fears a sprawling Toronto conspiracy case risks 'bogging down and becoming
unmanageable.' The landmark decision strikes down a portion of the Canada Evidence Act, a
controversial law passed by Parliament after the 9/11 terrorist attacks. The law
effectively directed debates involving government secrecy claims away from open trials and
toward specialized hearings in other courts....The
invariable effect of the law has been to take secrecy arguments away from main-stage
proceedings to a secretive side stage at the Federal Court of Canada, whose judges have specialized national security training and, until now,
exclusive jurisdiction of all Canada Evidence Act matters. Judges pondering the overall
cases have been forced to await the outcome of protracted Federal Court legal debates to
determine what information would be in play." |
"A U.S. Foreign Intelligence
court released a ruling Thursday upholding the right of the president and Congress to
wiretap private international phone conversations and intercept e-mail messages without a
court-issued warrant...While the court released the
once-secret opinion, Attorney General-designate Eric Holder was answering questions about
the legality of the nations controversial warrantless surveillance programs during his Senate
confirmation hearing. During his time in the Senate, President-elect Barack Obama endorsed the
latest version of the current administrations surveillance policy. That means that
Holder now must gingerly evaluate how the warrantless program came about, whether it is
working to its fullest extent, whether and to what extent it reaches too far in infringing
constitutional privacy rights, and what can be done if it does. On Thursday morning,
Holder was clear in telling the Senate Judiciary Committee that he believes the president
has power within Article II of the Constitution (like the power to eavesdrop) that the
Congress may not take away, writes Cohen." Federal Court Upholds Wiretap Law CBS News, 15 January 2009 |
"Over the past few days, at trade fairs from Las Vegas to Seoul, a
constant theme has been the unstoppable advance of 'FRT', the benign abbreviation favoured
by industry insiders. We learnt that Apple's iPhoto update will automatically scan your
photos to detect people's faces and group them accordingly, and that Lenovo's new PC will
log on users by monitoring their facial patterns....So
let's understand this: governments and police are planning to implement increasingly
accurate surveillance technologies that are unnoticeable, cheap, pervasive, ubiquitous,
and searchable in real time. And private businesses,
from bars to workplaces, will also operate such systems, whose data trail may well be sold
on or leaked to third parties - let's say, insurance companies that have an interest in
knowing about your unhealthy lifestyle, or your ex-spouse who wants evidence that you can
afford higher maintenance payments. Rather than jump up and down with rage - you never
know who is watching through the window - you have a
duty now, as a citizen, to question this stealthy rush towards permanent individual
surveillance. A Government already obsessed with
pursuing an unworkable and unnecessary identity-card database must be held to
account." Let's face it, soon Big Brother will have no trouble recognising you London Times, 13 January 2009 |
"Police have been given the
power to hack into personal computers without a court warrant. The Home Office is facing
anger and the threat of a legal challenge after granting permission. Ministers are also drawing up plans to allow police across the EU to
collect information from computers in Britain. The moves will fuel claims that the
Government is presiding over a steady extension of the 'surveillance society' threatening
personal privacy. Hacking known as 'remote searching' has been quietly
adopted by police across Britain following the development of technology to access
computers' contents at a distance. Police say it is vital for tracking cyber-criminals and
paedophiles and is used sparingly but civil liberties groups fear it is about to be vastly
expanded. Remote searching can be achieved by sending an email containing a virus to a
suspect's computer which then transmits information about email contents and web-browsing
habits to a distant surveillance team. Alternatively, 'key-logging' devices can be
inserted into a computer that relay details of each key hit by its owner. Detectives can
also monitor the contents of a suspect's computer hard-drive via a wireless network.
Computer hacking has to be approved by a chief constable, who must be satisfied the action
is proportionate to the crime being investigated. Last
month European ministers agreed in principle to allow police to carry out remote searches
of suspects' computers across the EU." New powers for police to hack your PC Independent, 5 January 2009 |
2008 |
"Activists in Pennsylvania say they're pressing ahead with a lawsuit
to ban touch-screen voting machines in the state's 67 counties. The suit alleges the
machines are vulnerable to computer hackers, don't leave a paper trail to verify votes are
accurately recorded and don't always work properly, said the League of Women Voters.
Joining the league in the suit are the NAACP, Public Interest Law Firm of Philadelphia and
incoming state Treasurer Rob McCord of Bucks County, the Pittsburgh Post-Gazette reported
Monday. The state Supreme Court last week gave the plaintiffs the OK to proceed with the
suit against the machines, which already are being used in 50 of the state's counties, the
Post-Gazette said." Activists sue to ban voting touch screens United Press International, 22 December 2008 |
"When police raided Tory MP Damian Greens home, they
sheepishly asked whether children were present before ransacking it. His wife
assumed they were being polite. But, under sinister new guidelines, officers must assess
all children they encounter including while searching premises
for a police database called MERLIN. This, in turn, feeds into a giant new Whitehall
database on Britains children, Contact Point, which goes live nationally in January.
The Tories have vowed to scrap it, arguing that it threatens family privacy and
childrens safety. But civil liberties campaigners say we must resist it now, before
it is too late. Since April 1, hundreds of thousands of State employees, from police to
teachers, youth and nursery workers, social workers and sports coaches, have been entitled
to interrogate children aged up to 19, using the Common Assessment Framework
(CAF), a creepy, eight-page, 60-section questionnaire. CAF includes eyewateringly intimate
questions about childrens sexual behaviour, their familys structure, culture
and religion, their views on discrimination, their friends, secret fears,
feelings and family income, plus any serious difficulties in their parents
relationship.How has such a terrifying
intrusion into private life crept, almost unnoticed, under the radar? The answer is New Labour has cleverly packaged CAF as an aid to
child protection and delivering better services as part of its Every Child
Matters project (ECM). The £224million programme has been beset by delays,
incomprehensible acronyms and New Labour gobbledegook. But let us not be deceived
it is about control, not care, and spying, not safety.... Tragically, Britain, the cradle
of parliamentary democracy, is becoming notorious worldwide for snooping on its citizens. Professor Nigel Parton, NSPCC Professor of Childhood Studies at
Huddersfield University, warned a recent international conference in Finland that the
Every Child Matters agenda means what we are witnessing is the emergence of the
preventive-surveillance state, with major implications for the civil
liberties and human rights of the citizen, particularly for children and parents. Once, people who warned of a growing police state seemed paranoid. The
Damian Green raid was a wake-up call. Let us now protect our children, our and our
countrys future, with all our might." Has your child been CAFed? How the Government plans to record intimate information on every child in Britain Mail, 7 December 2008 |
"State officials are to be given powers previously reserved for times
of war to demand a person's proof of identity at any time. Anybody who refuses the Big
Brother demand could face arrest and a possible prison sentence. The new rules come in
legislation unveiled in today's Queen's Speech. They are presented as a crackdown on
illegal immigration, but lawyers say they could be applied to anybody who has ever been
outside the UK, even on holiday. The civil rights group Liberty, which analysed clauses
from the new Immigration and Citizenship Bill, called them an attempt to introduce
compulsory ID cards by the back door. The move would effectively take Britain back to the
Second World War, when people were stopped and asked to 'show their papers'. Liberty said:
'Powers to examine identity documents, previously
thought to apply only at ports of entry, will be extended to criminalise anyone in Britain
who has ever left the country and fails to produce identity papers upon demand. 'We believe that the catch-all remit of this power is disproportionate
and that its enactment would not only damage community relations but represent a
fundamental shift in the relationship between the State and those present in the UK.' One
broadly-drafted clause would permit checks on anyone who has ever entered the UK - whether
recently or years earlier....No reasonable cause or suspicion is required, and checks can
be carried out 'in country' - not just at borders. The law would apply to British citizens
and foreign nationals, according to Liberty's lawyers. The
only people who would be exempt are the tiny minority who have never been abroad on
holiday or business....Currently, police are allowed
to ask for identity documents only if there is a reasonable suspicion that a person has
committed an offence. During the Second World War, ID cards were seen as a way of
protecting the nation from Nazi spies, but in 1952 Winston Churchill's government decided
they were not needed in peacetime. They were thought to be hindering the police because so
many people resented being asked to produce them. Liberty director Shami Chakrabarti said
last night: ' Sneaking in compulsory identity cards via the back door of immigration law
is a cynical escalation of this expensive and intrusive scheme.' .... LibDem spokesman
Chris Huhne said: 'Ministers seem to be breaking their promise that no one would ever have
to carry an ID card. This is a sly and underhand way of extending the ID card scheme by
stealth.' There was also concern last night that the Government is seeking to revive
controversial plans for secret inquests. The measure - which would have let
the authorities hold a hearing like the Jean Charles de Menezes inquest behind closed
doors - was removed from counter-terrorism legislation earlier this year. But
it could be re-introduced as part of a Coroners and Death Certification Bill." Big Brother police to get 'war-time' power to demand ID in the street - on pain of sending you to jail Daily Mail, 3 December 2008 |
"On Tuesday last week a judge at Kingston-upon-Thames Crown Court
threw out a case against Sally Murrer, a journalist charged with aiding and abetting
misconduct in a public office the same charge that the Met wants to pursue against
Mr Green. The Murrer case turned on Article 10 of the European Convention on Human Rights,
the right to freedom of expression. The court ruled, as courts across Europe have ruled,
that leaks to journalists are not criminal unless they involve matters of national
security or impair the investigation of serious crime. The evidence against her gained by planting bugging devices and
raiding her home and her office (sound familiar?) was ruled to have been obtained unlawfully." In light of Sally Murrers case, Damian Green's arrest was absurd London Times, 1 December 2008 |
"The House of Commons office of Damian Green, the Tories' immigration
spokesman, is routinely swept for electronic bugging devices, along with other offices
belonging to senior Conservatives, amid fears of covert monitoring, The Independent on
Sunday has discovered. Anger surrounding the shadow
immigration minister's arrest last week escalated dramatically last night over suspicions
of a major bugging scandal inside the Palace of Westminster. The IoS understands that even before his surprise arrest on
Thursday Mr Green was aware that his Commons office, phone calls and emails could be under
surveillance because of the sensitive nature of his job. The fresh revelations rocked the
Commons just days before the high point of the parliamentary calendar, the Queen's Speech,
which takes place on Wednesday. Tory leader David Cameron last night said the Prime
Minister must denounce the arrest of Mr Green or risk charges of hypocrisy because he
'made his career' from Whitehall leaks. Writing in the News of the World, Mr Cameron
added: 'If this approach had been in place in the 1990s, then Gordon Brown would have
spent most of his time under arrest.' Several offices
within the Commons and Portcullis House belonging to senior Tory MPs and officials are
checked regularly by security experts for listening devices and other surveillance
equipment. The IoS has learnt that there are 'major
concerns' at the highest levels of the Tory party over suspected monitoring by the
authorities. Any such monitoring may not be illegal but would be hugely controversial. Last night, a Conservative MP wrote to Gordon Brown demanding an
urgent review of the Wilson doctrine, the convention that protects MPs from phonetapping
but does not cover other surveillance techniques. It
is not known whether a covert device has ever been found during searches. But if the
suspicions are proved right, it would have major implications for the protection of
parliamentary privilege. Ben Wallace, the Conservative MP for Lancaster & Wyre, said
the Wilson doctrine, which dates back to 1966, needed to be changed to cover all forms of
surveillance, not just intercepting of calls. He said: 'It
is disturbing that the authorities may have exploited the difference between surveillance
and intercept in order to pursue Members of Parliament over the past 10 years.'" Bugging scandal inside the Commons Independent On Sunday, 30 November 2008 |
"The practice of using a brown envelope to pass on information is
commonplace in Westminster. At any one time, there are hundreds of MPs, researchers,
journalists and visitors at Portcullis House, and the handing over of an ordinary envelope
would rarely be noticed. As the IoS reveals today, the practice stems from a real concern that their movements are being monitored by MI5 or
Special Branch. Last Thursday's raid by nine
anti-terrorist police officers on Mr Green's office, just off the Portcullis House atrium,
has triggered accusations of contempt of parliamentary privilege. In four co-ordinated
raids at his home and offices, anti-terror police seized the MP's computers, mobile phone,
BlackBerry and bank statements as well as rifling through old love letters between
Mr Green and his wife. But the revelation that the
offices of senior frontbenchers are routinely swept for bugs will send shockwaves through
Westminster. It has serious repercussions for the
operation of the Wilson doctrine, the convention that protects MPs from phone-tapping. In
1966, following a series of allegations of bugging of MPs' telephones, the Prime Minister,
Harold Wilson, ordered a ban on phone-tapping on all MPs. Yet
the doctrine has failed to keep pace with modern technology, and MPs fear there is a
'wide-open door' to security services listening to the conversations and reading the
content of their emails, perfectly legally. The
doctrine covers only the intercept of communications tapping phone lines or
snatching data from mobile phone conversations, as well as the intercept of unopened
emails and post. What is not covered are already opened emails and post, and, crucially,
listening devices planted in an MP's office. One intelligence expert said it was possible
for legally available software to be planted on a computer that copies all emails sent
from that address....A Westminster source said last night: 'MPs need to take precautions.
The Damian Green case shows they are vulnerable to arrest, even if the information is not
a threat to national security. Sweeping of offices for bugs may be one precaution, but if
something is of great sensitivity, it is safer to pass things on in person.'" MPs fear security services now have 'open door' to snoop Independent On Sunday, 30 November 2008 |
"I was born in Milton Keynes when it was a village. I completed my
journalistic apprenticeship on one local newspaper and I was still there, 32 years later,
on another. I'd worked part-time for 20 years to fit in with the needs of my autistic son
James, but I knew the town inside out. My dog-eared contacts book bulged with trusted
names and numbers. There were councillors, local dignitaries, gossipy hairdressers,
teachers ... and, of course, police officers. That sun-soaked morning last year, there was
no flicker of premonition that my world was about to be torn apart in a frenzy of police
officers, criminal investigations and court proceedings that would threaten not just my
own family life but the country's perception of Press freedom. I hadn't a clue, as I
shopped in Laura Ashley, that eight plainclothes police officers were poised to arrest me,
lock me in a cell, interrogate me, strip-search me and finally put me in the dock for a
multi-million-pound Crown Court trial after which I could technically be sent to prison
for life. I had no understanding of what heinous crime they thought I'd committed.
Officially, I was charged with three counts of the ancient common-law offence of aiding
and abetting misconduct in a public office - the same charges levelled at Shadow
Immigration Minister Damian Green last week when he was arrested over claims he had leaked
confidential Government documents....It was only afterwards that it dawned on me what
sinister implication this case could have for journalists all over Britain....
Technically, thousands of my media colleagues could be arrested just like me.....At the
time I simply felt violated. How dare these people
bug my conversations and even download texts from my
daughters?......What I discovered was shattering. I came to realise that the case wasn't
about me at all, but the rights of every journalist in the country.My defence barrister,
Gavin Millar QC, told the court that, under Article 10 of the Human Rights Convention, my
right to freedom of expression had been breached by the State. Thames Valley Police had no
right to have bugged my conversations with Mark, a confidential source, and my arrest was
also unlawful.....Millar went on to argue that journalistic privilege, unless it posed a
genuine threat to national security, must extend to a reporter's sources, otherwise no
confidential source would ever again speak to a reporter. His argument, which ran for
eight-and-a-half hours, was described by Judge Richard Southwell as a masterclass on
journalistic human rights and the freedom of the Press....When I heard about the arrest of
Conservative MP Damian Green last week, I was amazed at the parallels between his
experience and my own....". Sally Murrer - I faced life in jail ... just for writing about Milton Keynes Daily Mail, 29 November 2008 |
"A Tory frontbencher was questioned by police last night after being
arrested as part of a leak inquiry. Damian Green, the Shadow Immigration Minister, was
arrested in Kent and had his home, constituency office and Commons office searched by counter-terrorism officers.
He may be charged for receiving documents allegedly passed by a male Home Office official
who was also arrested. Conservative sources said that David Cameron was furious about the
treatment of one of his team and described the arrest as 'Stalinesque'.....Mr Green, the
MP for Ashford, is facing questions about four leaks to the media between November last
year and September this year. They include a letter from the Home Secretary to Mr Brown
over the economic downturns impact on crime. It is understood that the Home Office
and Whitehall were alarmed at this disclosure because it was circulated among so few
people. Other damaging stories include a list,
prepared by Labour whips, of MPs likely voting intentions on legislation to extend
to 42 days detention without charge. Mr Green
was released and bailed to return to the police station in February. Speaking outside the
House of Commons early today, he said: 'I was astonished to have spent more than nine
hours under arrest for doing my job. I emphatically deny I have done anything wrong. In a
democracy, opposition politicians have a duty to hold the Government to account. I was
elected to the House of Commons precisely to do that and I certainly intend to continue
doing so.' Tory frontbench MP Damian Green arrested over leaks London Times, 28 November 2008 |
"Earlier this year the saga took a twist when it was revealed in Mr
Kearney's statement that he had been pressurised by the Metropolitan Police to bug Labour MP Sadiq Khan
while he met a constituent, Babar Ahmad, who was being held in the prison pending
extradition to the US. That led to a huge row about the bugging
of MPs." 'They said I would go to jail for life' BBC Online, 28 November 2008 |
"Ubiquitous computing will be enabled by widespread
tagging and networking of mundane objects (the
Internet of Things) such as food packages, furniture, room sensors, and paper documents.
Such items will be located and identified, monitored, and remotely controlled through enabling technologiesincluding
Radio Frequency Identifications, sensor networks, tiny embedded servers, and energy
harvestersconnected via the next-generation Internet using abundant, low cost, and
high-power computing." Global Trends 2025: A Transformed World US National Intelligence Council, November 2008 |
"Britain's intelligence chiefs want to crack down on the country's
media and are pursuing a law that would ban publication of 'sensitive' stories about the
services, according to a report from Joseph Farah's G2
Bulletin. The request came at a recent secret meeting with the Parliamentary
Intelligence and Security Committee, a team of members of Parliament who serve as
watchdogs for the country's intelligence services. The meeting appropriately was held in
the Cabinet Office complex adjoining Downing Street, a security facility at the heart of
Whitehall known as COBRA.....news has emerged of the
MI5 and MI6 joint request, which could lead to a dramatic shift in the relationship
between government and the media. The request comes at a time when Britain and its media
are the most spied on nation in the West. More than four million CCTV cameras keep
round-the-clock watch on citizens who are photographed on average over 400 times a day. A complex infrastructure of laws already ensures 'sensitive' stories are
protected on the grounds they can 'put national security at risk.' Those who
violate the Official Secrets Act can get heavy prison sentences. Others come under a group
of laws collectively known as D-Notices. They cover publications of details ranging from
the home addresses of a security chief and decisions on the design of nuclear weapons
stored at Harwell to specific research work done at Porton Down Britain's
Chemical-Biological Research Center and naming field agents." 'Sensitive' news reports face crackdown WorldNetDaily, 18 November 2008 |
"Britain's security agencies and
police would be given unprecedented and legally binding powers to ban the media from
reporting matters of national security, under proposals being discussed in Whitehall. The Intelligence and Security Committee, the parliamentary watchdog of
the intelligence and security agencies which has a cross-party membership from both
Houses, wants to press ministers to introduce legislation that would prevent news outlets
from reporting stories deemed by the Government to be against the interests of national
security. The committee also wants to censor reporting of police operations that are
deemed to have implications for national security. The ISC is to recommend in its next
report, out at the end of the year, that a commission be set up to look into its plans,
according to senior Whitehall sources. The ISC holds huge clout within Whitehall. It
receives secret briefings from MI5, MI6 and GCHQ and is highly influential in forming
government policy. Kim Howells, a respected former Foreign Office minister, was recently
appointed its chairman. Under the existing voluntary code of conduct, known as the
DA-Notice system, the Government can request that the media does not report a story.
However, the committee's members are particularly worried about leaks, which, they
believe, could derail investigations and the reporting of which needs to be banned by
legislation. Civil liberties groups say these restrictions would be 'very dangerous' and
'damaging for public accountability'. They also point out that censoring journalists when
the leaks come from officials is unjustified. But the committee, in its last annual
report, has already signalled its intention to press for changes. It states: 'The current
system for handling national security information through DA-Notices and the [intelligence
and security] Agencies' relationship with the media more generally, is not working as
effectively as it might and this is putting lives at risk.' According to senior Whitehall
sources the ISC is likely to advocate tighter controls on the DA-Notice system
formerly known as D-Notice which operates in co-operation and consultation between
the Government and the media." MPs seek to censor the media Independent, 10 November 2008 |
"Government claims of widespread public enthusiasm for ID cards
'beggar belief', critics have said, as it emerged the cost of cards may double.
Remarks by Home Secretary Jacqui Smith that people 'can't wait' for cards to be introduced
would 'haunt' her in the future, campaign group No 2 ID said. The
fresh criticism came amid concerns about the cost of providing biometric data and
fingerprints needed on cards. This requirement could add an estimated £29 on top of the
£30 cost of the card. Applicants will have to foot the cost of supplying their
fingerprints and biometric data such as an iris scan....The
first biometric cards are being issued to students from outside the EU and marriage visa
holders this month. Cards will then be issued on a voluntary basis to young people from
2010 and for everyone else from 2012. But speaking on Thursday, Ms Smith said there is
strong public demand for the cards and she has been 'regularly' approached by people who
say they do not want to wait several years to register. People applying for cards and
passports from 2012 will have to provide fingerprints, photographs and a
signature....Arguments over the cost of ID cards continue to dog the initiative, with the
Tories and Lib Dems calling for them to be scrapped. The overall cost of the scheme over
the next 10 years has risen by £50m to £5.1bn in the past six months, the government's
latest cost report has indicated." |
"Home secretary Jacqui Smith has insisted biometrics taken from people in high-street businesses will be secure. While anti-ID campaigners have said it will be almost impossible to lock
fingerprints to biographical details in a secure manner if those biometrics are taken
in a high-street business, Smith said on Thursday that the process would be secure. 'It is
clearly important, and part of the work we are doing and the plans we have in place, to
ensure the secure, controlled transfer of any biometrics,' Smith told ZDNet UK at a press
event. 'I believe it is technically possible to do that. I don't see the challenge is
greater because more people are accredited to do it.' Smith added that accredited
businesses would have a strong competitive reason to ensure that the biometric transfers
they perform are secure, as failure to do so would have an impact on their reputation.
However, so far the Home Office has given no
precise information as to how fingerprints would be linked to biographical data,
or any details about how the National Identity Scheme would be implemented....Conservative shadow home secretary Dominic Grieve told ZDNet UK in an
emailed statement that his party would discontinue the scheme, a move he said
would benefit security. 'We would scrap this expensive white elephant and use the
savings to do things that would actually improve our security,' Grieve said. 'The home
secretary should stop kidding herself, admit this project is dead and devote her energies
to carrying out her primary responsibility, which is ensuring the safety of the citizens
of this country.' Anti-ID card campaigner Phil Booth said that far from increasing
security, ID cards would be a risk. 'They are not introducing security and convenience,
they are doing exactly the opposite,' Booth told ZDNet UK. 'Enrolment in the high street
will introduce security holes a mile wide. People will link biometric details to false
biographical details, while the system will be plagued by systems errors.' The campaigner
added that biometric passports, drivers' licences and other forms of identification would
not be affected if ID cards were scrapped. 'This has nothing to do with passports, driving
licences, or anything else,' Booth said. 'Get rid of the ID cards scheme and all the
issues go away. There will be no 'black hole' left anywhere.'" Home secretary defends high-street biometrics plans ZDNet, 7 November 2008 |
"The cost of new
soon-to-be-launched UK ID card is set to skyrocket to nearly £60 as the cost of capturing
biometric data and fingerprint amounts to almost as much as the cost of the card holding
them. The Press Association understands that this
hidden charge will now be outsourced to external providers that could include the post
office, high street stores or even supermarkets. The Home Office secretary, Jacqui Smith,
said that the 'market' for providing the data collection service would be worth around
£200 million for the 7 million or so adults expected to sign for the new card. The card,
which will become compulsory for foreign nationals as early as next year, will replace
bank statements, driving license and other documents that can be used as proof of
identity. The estimated cost of rolling out the highly controversial scheme has increased
several times over the last decade and is currently standing at more than £4.7 billion
according to the latest estimates. Similarly, the cost of passport has risen from £18
back in 1997 to £100 today when the cost of capturing biometric data is factored in.
Speaking at the Social Market Foundation in London, Ms Smith said that the new ID card
could eventually be used to replace the "dictionary of different passwords",
which would pave the way for a massive roll-out of stand alone and embedded ID card
readers." Home Office Enlists Help Of Supermarkets, Post Office As ID Card Costs Double SecurityPortal, 7 November 2008 |
"Hundreds of drivers are being recruited to take part in
government-funded road-pricing trials that could result in charges of up to £1.30 a mile
on the most congested roads. The test runs will start early next year in four locations
and will involve fitting a satellite-tracking device to the vehicles of volunteers. An
on-board unit will automatically deduct payments from a shadow account set up in the
drivers name....The on-board unit could be used to collect all road charges, such as
congestion charges in London and Manchester and tolls for crossing bridges and using new
lanes on motorways. In the longer term the technology
could be used to introduce pricing on all roads,
with the price varying according to the time of day, direction of travel and the level of
congestion. Drivers would use the internet to check all their payments on a single bill.
They would choose whether the bill showed where they had travelled or simply the amounts
they had paid. Ministers hope to overcome concerns about loss of privacy by allowing
drivers to instruct the on-board unit not to transmit locations to the billing centre but
simply the number of miles driven at each charging rate." National road toll devices to be tested by drivers next year London Times, 5 November 2008 |
"Internet 'black boxes' will be
used to collect every email and web visit in the UK under the Government's plans for a
giant 'big brother' database, The Independent has learnt. Home Office officials
have told senior figures from the internet and telecommunications industries that the
'black box' technology could automatically retain and store raw data from the web before
transferring it to a giant central database controlled by the Government. Plans to create a database holding information about every phone call,
email and internet visit made in the UK have provoked a huge public outcry. Richard
Thomas, the Information Commissioner, described it as 'step too far' and the Government's
own terrorism watchdog said that as a 'raw idea' it was 'awful'. Nevertheless, ministers
have said they are committed to consulting on the new Communications Data Bill early in
the new year. News that the Government is already preparing the ground by trying to allay
the concerns of the internet industry is bound to raise suspicions about ministers' true
intentions. Further details of the database emerged on Monday at a meeting of internet
service providers (ISPs) in London where representatives from BT, AOL Europe, O2 and BSkyB
were given a PowerPoint presentation of the issues and the technology surrounding the
Government's Interception Modernisation Programme (IMP), the name given by the Home Office
to the database proposal. Whitehall experts working on the IMP unit told the meeting the
security and intelligence agencies wanted to use the stored data to help fight serious
crime and terrorism, and said the technology would allow them to create greater 'capacity'
to monitor all communication traffic on the internet. The 'black boxes' are an attractive
option for the internet industry because they would be secure and not require any direct
input from the ISPs. During the meeting Whitehall officials also tried to reassure the
industry by suggesting that many smaller ISPs would be unaffected by the 'black boxes' as
these would be installed upstream on the network and hinted that all costs would be met by
the Government. 'It was clear the 'back box' is the technology the Government will use to
hold all the data. But what isn't clear is what the Home Secretary, GCHQ and the security
services intend to do with all this information in the future,' said a source close to the
meeting. He added: 'They said they only wanted to return to a position they were in before
the emergence of internet communication, when they were able to monitor all correspondence
with a police suspect. The difference here is they will be in a much better position to
spy on many more people on the basis of their internet behaviour. Also there's a grey area
between what is content and what is traffic. Is what is said in a chat room content or
just traffic?' Ministers say plans for the database have not been confirmed, and that it
is not their intention to introduce monitoring or storage equipment that will check or
hold the content of emails or phonecalls on the traffic." Government black boxes will 'collect every email' Independent, 5 November 2008 |
"Google gathers so much detailed information about its users that one
critic says some state intelligence bureaus look 'like child protection services' in
comparison. A few German government bodies have mounted a resistance.....Google's Internet
empire has become a political issue here. And only a fraction of the company's data comes
from the car-mounted cameras. Theres also the popular Gmail service ("Google
Mail" in Germany), the YouTube video portal, a social network called Orkut, and the
Google Desktop program, which allows users to search their own computers. The company has
also introduced its own browser, called Chrome. And it's entered the world of mobile
communication with a new cell phone operating system called Android. The first
Android-compatible phones all but sold out before the official market launch in the US
last week, with 1.5 million advance orders. With its services, Google has established
itself as a global online power in just a decade. Through massive acquisition of Internet
services -- like YouTube -- it has built itself into a data-collection empire. One click
by a user lets Google take search data, along with a date and time, as well as specific
details like IP addresses, the type of browser used, language settings and even log-in
user names.....Its also well-known that Google checks for keywords in the content of
e-mails sent through its mail program, then displays relevant advertisements in a sidebar.
This clever exploitation of information for direct advertising has turned Google into a
multi-billion-dollar organization. The company brought in over $16 billion in revenue last
year. This is what makes the debate in Germany such bad news for the corporation. Denying
Google data cuts to the heart of its business model. More and more customers are
wondering: What does Google know about me? Well, compared to what Google knows about us,
many intelligence agencies look 'like child protection services,' says Hendrik Speck,
professor at the applied sciences university in Kaiserslautern, a southwestern German
city. Theoretically, he says, Google could record a query for pregnancy tests, then nine
months later provide advertisements for diapers. Or -- six years later -- it could show
offers for after-school homework help. 'The more data Google collects from its users, the
higher the price it can ask for advertisements,' says Speck..... As the companys
head of data protection, Fleischer is in charge of protecting hundreds of millions of
users' data -- 29 million in Germany alone. Its also his job to assuage the growing
unease on the part of many users and politicians about the Google 'data monster.' The
Molfsee citizens' concerns are just as unfounded, Fleischer says, and for the same reason:
'We collect a lot of data, but nothing that identifies any particular person,' he
insists.For Gerald Reischl, author of a book in German called 'The Google Trap,' such
assurances aren't enough. The corporation's 'machinations, hunger for power and dominance
need to be scrutinized,' says Reischl. Even those few Internet users who dont
regularly access Google sites end up with their data accessible to the company anyway,
thanks to a program called 'Google Analytics.' Google Analytics is a free program for web
site owners to keep track of usage patterns on their site. The data is also saved by
Google. Some sites dont even mention this to their users. 'Analytics is Google's
most dangerous opportunity to spy' says Reischl. According to some estimates the software
is integrated into 80 percent of frequently visited German-language Internet sites.
SPIEGEL ONLINE no longer uses Google Analytics. 'We want to ensure that data on our
users browsing patterns don't leave our site,' says Wolfgang Büchner, one of
SPIEGEL ONLINE's two chief editors.....According to Fleischer... 'We don't know our
users,' he says, 'nor do we want to.' He says Internet logs aren't related to individuals,
and stored IP addresses are nothing but numbers that connect computers to each other.
Under no circumstances, says Fleischer, would data from a conventional Internet search be
combined with the personal information saved through a service that requires a login, such
as Gmail....Thilo Weichert, head of Schleswig-Holsteins Independent State Agency for
Data Protection, based in Kiel, can relate experiences to the contrary....Googles
German headquarters tends to react negatively to Weicherts name. He doesnt
give them an easy time: The data protection specialist from northern Germany has already
issued a public warning on the Analytics program. 'Most users of the product aren't
entirely aware that by operating Google Analytics they're utilizing a service that
transfers data to the United States, to be broadly used and exploited,' he has written.
'This violates the data privacy laws protecting those who use the Web sites.' Google
reacted with a letter to the governor of Schleswig-Holstein, warning of economic losses
and demanding that Weichert be called off his attack. Such reactions only incite Weichert.
'The company operates in an unacceptably non-transparent manner,' he says. 'Their users
are basically standing naked in front of them, and Google itself discloses only what is
absolutely necessary about its data handling strategy, and then only under
pressure.'....Meanwhile, a top data protection specialist at Google named Peter Fleischer
likes to talk about whats to come. Google Health is a databank where
patients can store their medical records and retrieve them over the Internet. This service
could radically change the nature of the health system -- and it could change Google
itself as well. When the topic turns to health, most users are likely to sit up and take
notice. They start asking what happens with their data." Does Google Know Too Much? Der Spiegel, 30 October 2008 |
"It's not insane to be paranoid. That is the comforting message I
took from the speech given this week by Sir Ken Macdonald, the Director of Public
Prosecutions, who warned the Government not to abuse its 'enormous powers of access to
information'. In a direct hit on the Home Secretary's desire to record on an Orwellian
database every e-mail, phone call and website visited, he said that 'freedom's back is
broken' if ministers give in to the pressures of a State that is insatiable.....The same
problems beset the terrorist issue. The Government has been unable to point to a single
case where 42-day detention, or increased surveillance powers, would have made us safer.
Police officers can already get information on most suspects' phone calls and e-mails from
network providers. The suspicion is that the Government wants to hold that data centrally
only to mount fishing expeditions, looking for patterns of behaviour. 'We should take very
great care to imagine the world we are creating before we build it,' Sir Ken said. 'We
might end up living with something we can't bear.' Camilla Cavendish - I may be paranoid, but they are watching us London Times, 24 October 2008 |
"This years Privacy International survey put Britain bottom of
the European league for surveillance and civil intrusion, a miserable state of affairs for
the home of Magna Carta. [Home Secretary Jackie] Smiths GCHQ 'interception
modernisation programme', reportedly at a staggering £12 billion, will run alongside the
ID card register, the driving licence centre, the numberplate recognition computer and the
CCTV network in a 'pentagon' of control. Its data bank will one day and for sure fuse with
banking and employment records and that stumbling giant, the National Health Service
personal records computer, each polluting the other with crashing terminals, uncorrectable
inaccuracies and false trails. We know from Russian hacking services that such information
will be freely available because it cannot be kept secret from intruders, thieves or the
laptops of careless officials. That is why the pages of Computer Weekly are crammed with
snake-oil salesmen claiming 'total security' packages. I remember a shack in a Bangalore
suburb offering to 'break all computer encryptions known to man'. The spider at the centre
of this web of control, GCHQs Iain Lobban, appears to have so mesmerised Smith that
officials at the Home Office last week leaked a warning that his demands were
'impractical, disproportionate, politically unattractive and possibly unlawful'. Smith was
unmoved. Like every home secretary, she wants, at the flick of a switch, to know who is
doing what, when and where anywhere in Britain and in real time. This is truly Big Brother
stuff. Since 9/11 there has sprung into being a war-on-terror version of the
'military-industrial complex', against which Eisenhower warned Americans as the cold war
developed in the 1950s. The complex roams seminars and think tanks with blood-curdling
accounts of what Osama Bin Laden is planning. Visitors need go no further than the
biennial defence sales exhibition in Londons Docklands to see Eisenhowers
monsters on parade. They feed on the politics of fear, a leitmotif of this government. The
entire nation is regarded as under suspicion. Never was the adage of Louis Brandeis, the
US justice, more relevant: free men are naturally alert to the wiles of evil-minded rulers
but 'the greatest dangers to liberty lurk in insidious encroachments by men of zeal,
well-meaning but without understanding'. Last week GCHQ lobbyists took to the press
declaring that any opposition to Smiths surveillance plan would be 'disastrous' for
national security. They even wheeled out the familiar back-up argument for those who might
regard £12 billion as a ludicrous overreaction to terrorism alone. Without the 500,000
intercepts placed on mobile phone calls each year, The Times reported, 'we could not begin
to solve any kidnap whatever'. Likewise the proponents of ID cards call them 'vital' for
public services and those of the NHS computer 'a life saver' for accident victims. They
are nothing of the sort. A feature of this campaign is its sheer mendacity. Smith last
week promised that her surveillance regime would cover only details of electronic
communication, not contents. This is incredible. It reminds me of the old Home Office lie
that all phone taps 'require the home secretarys personal authority'. Smiths
apparatchiks want to read the lot. A similar line was spun last year by James Hall, the
head of Home Office 'identity and passport services', in claiming that identity details
would be safeguarded and not sent abroad. At the last Lisbon conference, European Union
members agreed to 'cross-border interoperability . . . highlighted in electronic identity
and e-procurement', with Lady Scotland, the attorney-general, in active participation.
Hall must have known this. ID cards were defended by David Blunkett, a former home
secretary, as to 'protect identity'. He knew they would be churned out from a Bombay back
street at £5 a time. The government does not know the meaning of the term 'safeguard'. A
year ago all 25m recipients of child benefit were told their personal details, addresses
and bank accounts had been handed to contractors and lost. Smith parrots the
totalitarians answer that 'the innocent have nothing to fear'. But they do. They
know from experience that government cannot be trusted with private information. In
addition, any errors in that information are almost impossible to correct. Ask anyone
whose credit rating has been falsely challenged by a bank computer." My farewell plea to MPs: defend liberty Sunday Times, 26 October 2008 |
"....theres only been three books on NSA, and I wrote all
three....NSA specializes in SIGINT, which is signals intelligence. And what that is is
eavesdropping. And thats actually where the US gets most of its intelligence....it
gets most of its intelligence from eavesdropping on communications, whether its
telephone calls or email or faxes, computer transfers of information between computers,
any kind of information like that, instant messages. It intercepts it. So NSA is the big
ear. And the way it works is, it picks up communications from satellites, it taps undersea
and underground fiber-optic cables, it gets information any way it can...This company,
Narus, which was founded in Israel and has large Israel connections, does
thebasically the tapping of the communications on AT&T. And Verizon chose
another company, ironically also founded in Israel and largely controlled by and developed
by people in Israel called Verint. So these two companies specialize in whats known
as mass surveillance. Their literatureI read this literature from Verint, for
exampleis supposed to only go to intelligence agencies and so forth, and it says, 'We specialize in mass surveillance,' and thats what they do. They put these mass surveillance equipment
in these facilities. So you have AT&T, for example, that, you know, considers
its their job to get messages from one person to another, not tapping into messages,
and you get the NSA that says, we want, you know, copies of all this. So thats where
these companies come in. These companies act as the intermediary basically between the
telecom companies and the NSA...this is a company that the US government is getting all
its tapped information from. Its a company that Verizon uses as its tapping company,
its eavesdropping company. And very little is known about these companies. Congress has
never looked into any of this. I dont knowI dont think they even know
that there isthat these companies exist. But the company that Verizon uses, Verint,
the founder of the company, the former head of the company, is now a fugitive
inhiding out in Africa in the country of Namibia, because hes wanted on a
number of felony warrants for fraud and other charges. And then, two other top executives
of the company, the general counsel and another top official of the parent company, have
also pled guilty to these charges. So, you know, youve got companiesthese
companies have foreign connections with potential ties to foreign intelligence agencies,
and you have problems of credibility, problems of honesty and all that. And these
companiesthrough these two companies pass
probably 80 percent or more of all US communications
at one point or another. . And its evengets even worse in the fact that these
companies also supply their equipment all around the world to other countries, to
countries that dont have a lot of respect for individual rightsVietnam, China,
Libya, other countries like that. And so, these countries use this equipment to filter out
dissident communications and people trying to protest the government. It gives them the
ability to eavesdrop on communications and monitor dissident email communications. And as
a result of that, people are put in jail, and so forth....These
conversations are transcribed. Theyreand then theyre recorded, and
theyre kept forever. Theres a big
building in Texas thats being built in San Antonio thats going to be used to
house a lot of these conversations. NSA is running out of space at Fort Meade, their
headquarters, so they had to expand, and theyre building this very big building.
Its reportedly going to be about the size of the Alamodome down there, to store all
thesethis huge amount of data communications. And when you think how much
information two gigabytes could be put on a small thumb drive, you can imagine how much of
information could be stored in a data warehouse the size ofalmost the size of the
Alamodome....the overall big problem is that there is a tremendous amount of eavesdropping
going on. Its all being stored, its all being analyzed, either electronically
or by a human. And the public really doesnt have much ofknowledge of all this
thats going on right now." James Bamford, author of The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America Democracy Now, 14 October 2008 |
Earlier |
"Officials from the top of Government to
lowly council officers will be given unprecedented powers to access details of every
phone call in Britain under laws coming into force tomorrow. The new rules compel phone
companies to retain information, however private, about all landline and mobile calls, and
make them available to some 795 public bodies and quangos. The move, enacted by
the personal decree of Home Secretary Jacqui Smith, will give police and security services a right they have
long demanded: to delve at will into the phone records of British citizens and
businesses. The Government will be given access to details of every phone call in Britain.
....The initiative, formulated in the wake of the Madrid and London terrorist
attacks of 2004 and 2005, was put forward as a vital tool in the fight against terrorism .... Files will also be kept on the
sending and receipt of text messages. By 2009 the Government
plans to extend the rules to cover internet use: the websites we have visited, the people we have emailed and phone calls made over the net.... The new measures were
implemented after the Home Secretary signed a 'statutory instrument' on July 26. The
process allows the Government to alter laws |
"The huge Commons majority he [Blair] enjoyed, the craven
pusillanimity of his party, the implosion of the Conservatives and the consequent absence
of opposition, other than in the Lords and, to an extent, in the courts
conspired with a genuine, though irrational,
fear of terrorism and rising street crime
to let the State take greater control over the citizen than it has enjoyed before
in modern peacetime..... Maya Evans found this out when she stood by the Cenotaph to
recite the names of Britains Iraqi war dead. For this she was arrested, arraigned
and left with a criminal record. It is hard to conceive of a police officer a generation
ago taking any notice of her since she was causing no public order problem at all. But Ms
Evans had fallen foul of a clause in the Serious and Organised Crime and Police Act
which established a one kilometre zone around the Palace of Westminster, within whose
boundaries political criticism can be voiced
only on application to the Commissioner of the Metropolitan Police.... recent research has uncovered 266 separate powers under which the police and other state agents
can enter your home, often using force to do so.... As Peter Lilley, the former minister who led the Cabinet revolt that
resulted in the abandonment of the last ID scheme, observed: 'There is no policy that has
been hawked, unsold, around Whitehall for longer than identity cards. It was always
brought to us as a solution looking for problems.' September
11 and the threat from international terrorism was the problem it had most been looking
for.... There are people who remember
carrying the old wartime ID cards, scrapped in 1952, and cannot see what all the fuss is
about. It is about the database, not the card. This is not about protecting our identities but
about placing them at the disposal of the
state and sundry other organisations that
will have access to them. .... this extension of state control
through the unfettered and unthinking deployment of modern
surveillance technology and databases for
which the Blair years (and those of his successor, unless he does something dramatic to
change course) will most be remembered. Our children, and theirs, will be perplexed as to
why their forebears came so easily, and with so little public debate, to allow the State to manipulate their lives." Philip Johnston, home affairs editor and assistant editor of The Daily Telegraph The Charles Douglas-Home Essay, 2007 - 'Are we a free country any more?' London Times, 20 July 2007 |
"Almost 450,000
requests were made to monitor peoples telephone calls, e-mails and post by secret agencies and other
authorised bodies in just over a year, the spying watchdog said yesterday. In the first
report of its kind from the Interceptions of
Communications Commissioner, it was also revealed
that nearly 4,000 errors were reported in a 15-month period from 2005 to 2006. .....
He said it was time to lift a ban on tapping the phones of
MPs and peers....." Privacy row as checks on phones and e-mails hit 439,000 London Times, 20 February 2007 |
"The
FBI appears to have begun using a novel form of electronic surveillance in criminal
investigations: remotely activating a mobile phone's
microphone and using it to eavesdrop on nearby conversations. ......Kaplan's opinion said
that the eavesdropping technique 'functioned whether the phone was powered on or off.'
Some handsets can't be fully powered down without removing the
battery.....Security-conscious corporate executives routinely remove the batteries from
their cell phones, he added....A BBC article
from 2004 reported that intelligence agencies routinely employ the remote-activiation
method. 'A mobile sitting on the desk of a politician or
businessman can act as a powerful, undetectable bug,' the
article said, 'enabling them to be activated at a later date to pick up sounds even when
the receiver is down.'........ A 2003 lawsuit revealed that the FBI
was able to surreptitiously turn on the built-in microphones in automotive systems like
General Motors' OnStar to snoop on passengers'
conversations. When FBI agents remotely activated
the system and were listening in, passengers in the vehicle could not tell that their
conversations were being monitored. Malicious hackers have followed suit. A report
last year said Spanish authorities had detained a man who write a Trojan horse that
secretly activated a computer's video camera and forwarded him the recordings." |
"The
U.S. National Security Agency asked AT&T Inc. to help it set up a domestic call
monitoring site seven months before the Sept. 11, 2001 attacks, lawyers claimed June 23 in
court papers filed in New York federal court. The allegation is part of a court filing
adding AT&T, the nation's largest telephone company, as a defendant in a breach of
privacy case filed earlier this month on behalf of Verizon Communications Inc. and
BellSouth Corp. customers. The suit alleges that the three carriers, the NSA and President
George W. Bush violated the Telecommunications Act of 1934 and the U.S. Constitution, and
seeks money damages. 'The Bush Administration asserted this became necessary after
9/11,' plaintiff's lawyer Carl Mayer said in a
telephone interview. 'This undermines that
assertion'. The lawsuit is related to an alleged NSA
program to record and store data on calls placed by subscribers. More than 30 suits have
been filed over claims that the carriers, the three biggest U.S. telephone companies,
violated the privacy rights of their customers by cooperating with the NSA in an effort to
track alleged terrorists.... Mayer and Afran said an
unnamed former employee of the AT&T unit provided them with evidence that the NSA
approached the carrier with the proposed plan. Afran
said he has seen the worker's log book and independently confirmed the source's
participation in the project. He declined to identify the employee." |
"Police in Israel say they have uncovered
a huge industrial spying ring which used computer viruses to probe the systems of many
major companies. At least 15 Israeli firms have been implicated in the espionage plot,
with 18 people arrested in Israel and two more held by British police. Among those under suspicion are major Israeli telecoms and media
companies. Police say the companies used a 'Trojan
horse' computer virus written by an Israeli to hack into rivals' systems. Interpol and the
authorities in Britain, Germany and the US are already involved in investigating the
espionage, which Israeli police fear may involve major international companies." |
|
||
NLPWESSEX,
natural law publishing |