NLPWESSEX, natural law publishing |
nlpwessex.org |
"I don't think in the last two or three hundred years we've faced
such a concatenation of problems all at the same time.... If we are to solve the issues that are ahead of us, we are going to need to think in completely different ways." Paddy Ashdown, High Representative for Bosnia and Herzegovina 2002 -2006 BBC Radio 4, 'Start The Week', 30 April 2007 |
SURVEILLANCE SOCIETY NEWS ARCHIVE 2016 |
||
To Go Direct To Current Surveillance
Society News Reports - Click Here To Go Direct To 2016 Surveillance
Society News Reports - Click Here |
||
Surveillance Society News Reports |
Some Highlights From 2016 "Councils
were given permission to carry out more than 55,000 days of covert surveillance over five
years, including spying on people walking dogs, feeding pigeons and fly-tipping, the
Guardian can reveal. A mass freedom of information
request has found 186 local authorities – two-thirds of the 283 that responded –
used the government’s Regulation of Investigatory Powers Act (Ripa) to gather
evidence via secret listening devices, cameras and private detectives. ...... “As
with any legislation, there is a significant risk that authorities will use powers in a
way that parliament never intended,” added Lord Paddick, calling for proper oversight
to ensure any surveillance is targeted and proportionate."
"If
you like your privacy, don’t fly the friendly skies with your phone connected to
in-flight networks. American and British intelligence have been surveilling phone use
aboard civil aircraft since at least 2005, according to a
new investigation by Le Monde based on secret documents from former National Security
Agency contractor Edward Snowden. Simply turning on your phone when the plane is flying
above 10,000 feet will reveal your location to the NSA, according to an
article from a classified internal newsletter. The spy agencies were able to extract a
range of information in near real-time under a program aptly named “Thieving
Magpie.” They include: * BlackBerry PINs and
email addresses * Email addresses * Skype identifying data Facebook identifying data. The
agencies then correlate this data with other facts, like the plane’s passenger list,
the flight number, and other details in order to pinpoint a particular user. The spies can
also see what you’re doing on your phone. For instance, the British intelligence
agency GCHQ said it found users were using their phones to check email, use Facebook and
Twitter, fire up travel apps like Google Maps and currency convertors, make calls, and
weirdly, download stuff on BitTorrent."
"The
UK's security services, including GCHQ, MI5 and MI6, have been unlawfully collecting and
using mass datasets of personal information for more than 10 years. The Investigatory
Powers Tribunal has ruled in a judgement published online that the
bodies had been collecting data without safeguards or supervision. The setups of 'Bulk
Communications Data' (BCD) and 'Bulk Personal Datasets' by the agencies did not comply
with the right to privacy (Article
8) in the European Convention on Human Rights..... Both types of datasets have
been used as part of criminal investigations, but have been criticised by privacy advocates for being overly
intrusive. The tribunal added that the massive
datasets (BPD) "include considerable volumes of data about biographical details,
commercial and financial activities, communications and travel"........ The court's ruling comes as the government's Investigatory Powers Bill (IP Bill)
is in the final stages of becoming
law – it is currently passed through the House of Commons and is being
debated by the House of Lords. The Bill has been heavily criticised
by numerous
committees and officials. Powers included in the IP Bill include bulk collection of data,
the ability to remotely hack mobile phones and computers, and the storing of website
history. The law is the first time these powers have been specifically written into
law." "Most
of the world’s international phone calls, internet traffic, emails, and other
communications are sent over a network of undersea cables that connect countries like
giant arteries. At spy outposts across the world, the NSA and its partners tap into these
cables to monitor the data flowing through them. But Menwith Hill is focused on a
different kind of surveillance: eavesdropping on communications as they are being
transmitted through the air. According to top-secret documents obtained by The Intercept
from NSA whistleblower Edward Snowden, Menwith Hill has two main spying capabilities. The
first is called FORNSAT, which uses powerful antennae contained within the golf ball-like
domes to eavesdrop on communications as they are being beamed between foreign satellites.
The second is called OVERHEAD, which uses U.S. government satellites orbiting above
targeted countries to locate and monitor wireless communications on the ground below
— such as cellphone calls and even WiFi traffic....
As of 2009, Menwith Hill’s foreign satellite surveillance mission, code-named
MOONPENNY, was monitoring 163 different satellite data links. The
intercepted communications were funneled into a variety of different
repositories storing phone calls, text messages, emails, internet browsing histories,
and other data. It is not clear precisely how many communications Menwith Hill is capable
of tapping into at any one time, but the NSA’s documents
indicate the number is extremely large. In a single 12-hour period in May 2011, for
instance, its surveillance systems logged more than 335 million metadata records, which
reveal information such as the sender and recipient of an email, or the phone numbers
someone called and at what time. To keep information about Menwith Hill’s
surveillance role secret, the U.S. and U.K. governments have actively misled the public
for years through a “cover story” portraying the base as a facility used to
provide “rapid radio relay and conduct communications research.” A classified U.S. document, dated
from 2005, cautioned
spy agency employees against revealing the truth. “It is important to know the
established cover story for MHS [Menwith Hill Station] and to protect the fact that MHS is
an intelligence collection facility,” the document stated. “Any reference to
satellites being operated or any connection to intelligence gathering is strictly
prohibited.”... roughly 600 of the personnel at
the facility are from U.K. agencies, including employees of the NSA’s British
counterpart Government Communications Headquarters, or GCHQ.... a new “collection posture” was introduced at the
base, the aim being to “collect it all, process it all, exploit it all.” In
other words, it would vacuum up as many communications within its reach as technologically
possible.... Fabian Hamilton, a member of Parliament
based in the nearby city of Leeds.......told The Intercept that he found the
secrecy shrouding Menwith Hill to be “offensive.” The revelations about the role
it has played in U.S. killing and capture operations, he said, showed there needed to be a
full review of its operations. “Any nation-state that uses military means to attack
any target, whether it is a terrorist, whether it is legitimate or not, has to be
accountable to its electorate for what it does,” Hamilton said. “That’s the basis of our Parliament, it’s the basis
of our whole democratic system. How can we say that Menwith can carry out operations of
which there is absolutely no accountability to the public? I don’t buy this idea that
you say the word ‘security’ and nobody can know anything. We need to know what
is being done in our name.”" "Police forces across the UK
have been responsible for “at least 2,315 data breaches” over the last five
years, according to research by Big Brother Watch, prompting concerns about the increasing
amount of data they're holding. Titled Safe in
Police Hands? the 138-page report is released today after months of requests made by the
campaign group under the Freedom of Information Act, covering police forces' breaches of
the Data Protection Act from June 2011 to December 2015. According to Big Brother Watch,
the results “show officers misusing their access to information for financial gain
and passing sensitive information to members of organised crime groups”. Over the last five years, more than 800 members of staff at police
forces “accessed personal information without a policing purpose” and
information was “inappropriately shared with third parties more than 800 times”.... “With the potential introduction of Internet Connection Records
(ICRs) as outlined in the Investigatory Powers Bill, the police will be able to access
data which will offer the deepest insight possible into the personal lives of all UK
citizens,” the group reported, adding that any breach of this information would be
“over and above” what was included in the report. Of the 2,315 breaches that Big
Brother Watch was informed of, more than 55 per cent (1,283) resulted in no formal
disciplinary action being taken, while in 11 per cent (258) of cases those responsible
received either a written or verbal warning. In 13 per cent of cases (297) the individuals
involved either resigned or were dismissed, while only 3 per cent (70) of breaches
resulted in either a criminal conviction or caution."
5 years, 2,300 data breaches. What'll police do with our Internet Connection Records?
The Register, 5 July 2016 "GCHQ
and the US National Security Agency (NSA) have access to intercepted emails sent and
received by all members of the UK Parliament and peers, including with their constituents,
a Computer Weekly investigation has established. The intelligence agency in Cheltenham has
been able to harvest traffic details of all parliamentary emails, including details of the
sender, recipient and subject matter, for at least three years. As a result, details of
private email correspondence between MPs and constituents are being collected by GCHQ as a
matter of routine. GCHQ documents classified above top secret, released by NSA
whistleblower Edward Snowden, also reveal that the spy agency has the capability to scan
the content of parliamentary emails for “keywords” through an established cyber
defence network that is connected to commercial software used to filter spam emails from
MPs’ inboxes. The disclosures, which come as
the House of Commons prepares for the Third Reading of the government’s controversial
Investigatory Powers Bill on Monday 6 June, raise new questions over the sweeping powers
to be granted in the bill to police and the security services.
"A
secretive police unit tasked with spying on alleged extremists intent on committing
serious crimes has been monitoring leading members of the Green party, the Guardian has
learned. Newly released documents show that the intelligence unit has been tracking the
political activities of the MP Caroline
Lucas and Sian Berry,
the party’s candidate for London mayor. Some of the monitoring took place as recently
as last year and seemed to contradict a pledge from Sir Bernard Hogan-Howe, the Metropolitan police commissioner,
that the unit would only target serious
criminals rather than peaceful protesters.
Extracts from the files show that the police have chronicled how the Green politicians had
been speaking out about issues such as government cuts, the far right, police violence,
and the visit of the pope. The police’s actions have been described as
“chilling” and come weeks after it was accused of abusing its powers by pursuing
prominent people over sex abuse claims. The disclosures bring to four the number of
elected Green
party politicians whose political movements are known to have been recorded in the
files of the unit. The files give no indication that they were involved in serious
criminal activity. The file on Lucas, which stretches
over eight years, records how she gave a
speech at an anti-austerity demonstration last June in London. Lucas accused the
government of conducting an “ideological war on welfare” at the rally, attended
by thousands. Another entry records how she attended a demonstration in February 2014 against disability
cuts in Brighton where she has been an MP since 2010. Police noted she “spoke with
some of the assembled” journalists. ..... Peter Francis, a
whistleblower who worked undercover for the Met, has alleged that the police
kept secret files in the 1990s on 10 Labour MPs, including the Labour
leader, Jeremy Corbyn, after they had been elected to parliament."
"Since 2005 successive Home Secretaries have authorised the collection of
vast amounts of telecommunications data, documents reveal. The documents also show that
MI5 secretly collected large amounts of "anonymised" financial data. Campaign
group Privacy International said the documents show "the staggering extent of UK
government surveillance". The Home Office said the data acquisition had "been
essential to the security and intelligence agencies". It added that the data had
provided "vital and unique intelligence". The disclosure of the documents was
made to Privacy International as it prepares for an Investigatory Powers Tribunal hearing
in July. The tribunal handles complaints against UK intelligence agencies MI5, MI6 and
GCHQ. The campaign group is challenging the agencies use and acquisition of "bulk
personal datasets" - very large amounts of personal data collected from public and
private organisations. The Home Office has repeatedly refused to list the datasets the
agencies hold, but the documents show the agencies could request a range of sensitive
information, including medical information, financial
information, and information about telephone and internet communications. The documents reveal that among other things this data is vital in
identifying "foreign fighters", possibly a reference to jihadists involved in
the conflict in Syria and Iraq. Privacy International said: "The intelligence
agencies have secretly given themselves access to potentially any and all recorded
information about us". But the Home Office told the BBC: "The acquisition and
use of bulk [data] provides vital and unique intelligence", adding: "The
security and intelligence agencies use the same techniques that modern businesses
increasingly rely on to analyse data in order to overcome the most significant national
security challenges". In several documents the risk that the public might become
aware of the powers is discussed. An MI5 policy issued in 2010 says the agency's access to
"anonymised" financial data would be against "public expectations". It
says that if the data is revealed the media response could be "unfavourable and
probably inaccurate". David Davis MP, a former
Conservative Shadow Home Secretary, told the BBC: "It's clear the agencies and the
government have been keeping information secret about what they've been doing not just for
security reasons, as is normally claimed, but to avoid both embarrassment and public
opposition." Every six months since 21 July
2005, Home Secretaries have authorised MI5 to collect in a database, information from
communication network providers, the documents reveal. This could include telephone data
and internet data. It does not include the content of communications. The documents say
the data is anonymous as it does not contain "subscriber information", but
privacy campaigners argue it would be possible work out the identity of an individual from
the data. MI5 says the data is deleted every 12 months. In the documents the data is said
to be of "significant security value." The
data is obtained under Section 94 of the Telecommunications Act 1984. The government's
independent reviewer of terrorism legislation, David Anderson QC, has previously told the
BBC the legislation was "so vague that anything could be done under it". The documents set out detailed procedures required to authorise the
collection and use of the data. But they reveal that misuse has occurred. One document
produced by MI6 gives examples of "individual users crossing the line" for
example, "looking up addresses in order to send birthday cards" and
"checking details of family members for personal reasons". The revelations will
add to the controversy surrounding the Investigatory Powers Bill currently working its way
through parliament." "Hackers
have again demonstrated that no matter how many security precautions someone takes, all a
hacker needs to track their location and snoop on their phone calls and texts is their
phone number. The hack, first demonstrated by German
security researcher Karsten Nohl in 2014 at a
hacker convention in Hamburg, has been shown to still be active by Nohl over a year
later for
CBS’s 60 Minutes. "
"WikiLeaks published a new set
of documents Tuesday claiming that the United States National Security Agency
(NSA) spied on meetings between world leaders, including the United Nations Secretary
General Ban Ki-Moon, German Chancellor Angela Merkel and Israel Prime Minister Benjamin
Netanyahu. WikiLeaks said in a statement released Tuesday that the documents were
classified as “Top Secret” and were the most highly
classified documents ever to be published by a media organization. The document said that the meeting
between Merkel and Ban was about climate change, over which an accord was signed by nearly
200 countries in December agreeing
to reduce greenhouse emissions to keep the effects of global warming at bay. The document
claims that the NSA spied on the meeting with a motive of protecting the
largest oil companies.... The document also revealed that U.S. officials tapped a
meeting in 2010 between Netanyahu and former Italian Prime Minister Silvio Berlusconi,
where the former asked for the Italian leader’s help to deal with U.S. President
Barack Obama. The documents also mentioned another meeting between Berlusconi and former
French President Nicolas
Sarkozy during which the former admitted that the Italian banking system was due to
“pop like a cork.” The documents further said that a private meeting
between Berlusconi, Merkel and Sarkozy was tapped by the NSA, which has been embroiled in
controversy since it was revealed by former U.S. spy agency contractor Edward Snowden that
the organization spied on many world leaders and collected phone
records of several Americans. In June last year, the Congress passed a law that ended
keeping such records on phone calls of American citizens and it was put in place in
November. Assange also said in the statement:
“The U.S. government has signed agreements with the U.N. that it will not engage in
such conduct against the U.N. — let alone its Secretary
General. It will be interesting to see the U.N.'s reaction, because if the Secretary
General can be targeted without consequence then everyone from world leader to street
sweeper is at risk.”" |
|
'We Need A New Way Of Thinking' - Consciousness-Based Education |
||
Latest Developments In 'Turnkey Totalitarianism' |
||
2016 - 2015 - 2014 - 2013 - 2012 - 2011 - 2010 - 2009 - 2008 & Earlier |
||
2016 |
"Councils
were given permission to carry out more than 55,000 days of covert surveillance over five
years, including spying on people walking dogs, feeding pigeons and fly-tipping, the
Guardian can reveal. A mass freedom of information
request has found 186 local authorities – two-thirds of the 283 that responded –
used the government’s Regulation of Investigatory Powers Act (Ripa) to gather
evidence via secret listening devices, cameras and private detectives. Among the detailed
examples provided were Midlothian council using the powers to monitor dog barking and
Allerdale borough council gathering evidence about who was guilty of feeding pigeons.
Wolverhampton used covert surveillance to check on the sale of dangerous toys and car
clocking; Slough to aid an investigation into an illegal puppy farm; and Westminster to
crack down on the selling of fireworks to children. Meanwhile, Lancaster city council used
the act, in 2012, for “targeted dog fouling enforcement” in two hotspots over 11
days. A spokeswoman pointed out that the law had since changed and Ripa could only now be
used if criminal activity was suspected. The permissions for tens of thousands of days
were revealed in a huge freedom of information exercise, carried out by the Liberal
Democrats. It found that councils then launched 2,800 separate surveillance operations
lasting up to 90 days each. Critics of the spying legislation
say the government said it would only be used when absolutely necessary to protect British
people from extreme threats. Brian Paddick, the Lib Dem peer who represents the party on
home affairs, said: “It is absurd that local authorities are using measures primarily
intended for combating terrorism for issues as trivial as a dog barking or the sale of
theatre tickets. Spying on the public should be a last resort not an everyday tool.”
He argued that the new Investigatory Powers Act, which
will take in Ripa powers alongside a raft of new measures, would restrict the ability of
local authorities to monitor people’s communications. But he also said it would
give “mass surveillance powers to a huge number of government bodies”. “As
with any legislation, there is a significant risk that authorities will use powers in a
way that parliament never intended,” added Lord Paddick, calling for proper oversight
to ensure any surveillance is targeted and proportionate." "Starting
this week, for some foreigners travelling to the United States, the government has added a
new question about social media user information, as part of an effort to help identify
potential terrorist threats. In June, the U.S. Customs and Border Protection (CBP)
proposed adding an optional question to travel authorization applications. It asked
applicants to volunteer their social media account identifiers, as part of the
agency’s efforts to enhance its vetting of people who travel to the U.S. The Office of Management and Budget (OMB) approved the addition of the
question this month, the Department of Homeland Security told CBS News. Should
applicants provide the requested information about their social media accounts, CBP
officers would only be able to see what’s publicly available on the accounts
submitted -- applicants wouldn’t be asked to violate privacy settings or policies.
After CBP proposed the new question, several civil liberties and internet groups raised
objections. The Electronic Frontier Foundation (EFF) argued that there were “no
standards to ensure that innocent travelers would not be misjudged and denied entry into
the U.S.”... Starting this week, for some foreigners travelling to the United States,
the government has added a new question about social media user information, as part of an
effort to help identify potential terrorist threats. In June, the U.S. Customs and Border
Protection (CBP) proposed adding an optional question to travel authorization
applications. It asked applicants to volunteer their social media account identifiers, as
part of the agency’s efforts to enhance its vetting of people who travel to the U.S.
The Office of Management and Budget (OMB) approved the addition of the question this
month, the Department of Homeland Security told CBS News. Should applicants provide
the requested information about their social media accounts, CBP officers would only be
able to see what’s publicly available on the accounts submitted -- applicants
wouldn’t be asked to violate privacy settings or policies. After CBP proposed the new
question, several civil liberties and internet groups raised objections. The Electronic
Frontier Foundation (EFF) argued that there were “no standards to ensure that
innocent travelers would not be misjudged and denied entry into the U.S.”" "Yahoo
Inc's secret scanning of customer emails at the behest of a U.S. spy agency is part of a
growing push by officials to loosen constitutional protections Americans have against
arbitrary governmental searches, according to legal documents and people briefed on closed
court hearings. The order on Yahoo from the secret Foreign Intelligence Surveillance Court
(FISC) last year resulted from the government's drive to change decades of interpretation
of the U.S. Constitution's Fourth Amendment right of people to be secure against
"unreasonable searches and seizures," intelligence officials and others familiar
with the strategy told Reuters. The unifying idea,
they said, is to move the focus of U.S. courts away from what makes something a distinct
search and toward what is "reasonable" overall. The basis of the argument for
change is that people are making much more digital data available about themselves to
businesses, and that data can contain clues that would lead to authorities disrupting
attacks in the United States or on U.S. interests abroad. While it might technically count
as a search if an automated program trawls through all the data, the thinking goes, there
is no unreasonable harm unless a human being looks at the result of that search and orders
more intrusive measures or an arrest, which even then could be reasonable. Civil liberties
groups and some other legal experts said the attempt to expand the ability of law
enforcement agencies and intelligence services to sift through vast amounts of online
data, in some cases without a court order, was in conflict with the Fourth Amendment
because many innocent messages are included in the initial sweep." "If
you like your privacy, don’t fly the friendly skies with your phone connected to
in-flight networks. American and British intelligence have been surveilling phone use
aboard civil aircraft since at least 2005, according to a
new investigation by Le Monde based on secret documents from former National Security
Agency contractor Edward Snowden. Simply turning on your phone when the plane is flying
above 10,000 feet will reveal your location to the NSA, according to an
article from a classified internal newsletter. The spy agencies were able to extract a
range of information in near real-time under a program aptly named “Thieving
Magpie.” They include: * BlackBerry PINs and
email addresses * Email addresses * Skype identifying data Facebook identifying data. The
agencies then correlate this data with other facts, like the plane’s passenger list,
the flight number, and other details in order to pinpoint a particular user. The spies can
also see what you’re doing on your phone. For instance, the British intelligence
agency GCHQ said it found users were using their phones to check email, use Facebook and
Twitter, fire up travel apps like Google Maps and currency convertors, make calls, and
weirdly, download stuff on BitTorrent. “Data usage is largely as expected, with a
couple of exceptions,” the agency noted in a
presentation. Spying on people on planes is handy if you want to arrest them or
further surveil them when they land. The GCHQ presentation says the program can confirm
that subjects are aboard particular flights in “near real-time,” allowing
surveillance or arrest teams to be prepared when the plane lands. Air France appeared to
be of particular interest to the spooks. Named as a possible terrorist target, the airline
was the subject of a 2005 NSA memo that detailed how its flights could be tracked. The
airline told Le Monde that it “knew absolutely nothing” about the
surveillance.""
"One
can never be too wary of one’s friends, especially those who are
closest. Officially, Israel and the two most powerful English-speaking
intelligence services, the American NSA (National Security Agency) and
its British counterpart, the GCHQ (Government Communications
Headquarters) are united in a sacrosanct alliance. This unique
cooperation, which is intense, given the issue of survival for Israel
and its excellence in matters of espionage, and has grown considerably
stronger over the past ten years. But is has a darker side to it. New
documents from the archives of Edward Snowden given by the former NSA consultant to Glenn Greenwald and Laura Poitras, seen by Le Monde in collaboration with The Intercept, reveal
the extent of the surveillance by the GCHQ in respect of the Israeli
interests. The British have spied on Israeli diplomacy both in Jerusalem
and abroad. They have also targeted private firms in the defence
sector, State agencies responsible for international
cooperation and university research centres known for their excellence
in scientific matters. These targets appear in the form of email
addresses or telephone numbers in the interception reports of the GCHQ
technicians, pleased to demonstrate that they had succeeded in
identifying them in the flow of satellite telephone communications
between the African continent and the rest of the world. At the end of
each report, ithey state that the collection of this data can now become
automatic. In 2014, the Wall Street Journal showed that the NSA could both
support its Israeli partner, the ISNU (Israeli Sigint National Unit or
Unit 8200) and monitor the telephone calls of Prime Minister Benyamin
Netanyahou. In 2013, the German daily Der Spiegel observed that
in January 2009 the email addresses of the then Prime Minister, Ehud
Olmert, and the Minister for Defence, Ehud Barak, had both been spied on
by the GCHQ.... The surveillance of Israeli interests by the GCHQ has
also extended to
the MASHAV – the Israeli state agency responsible for international
cooperation and development. Suspected by the British of playing a
double game by supporting weak countries to consolidate the influence of
Israel, this agency is established and operates all over the world.
Finally, the British secret services have concentrated their attention
on the work of certain advanced research centres in the top-level Hebrew
University of Jerusalem They have also targeted the Racah Institute for
Physics where theoretical and practical research is carried out in
highly sensitive areas, in particular in nuclear physics....In its
top-secret internal newsletters, the GCHQ congratulates itself on
its good relations with the ISNU, the Israeli technical secret service.
One can actually read that the British have spied on email addresses
and telephone numbers at the request of the Israelis: ‘They thanked us
on many occasions.’This does not exclude humiliations. In March 2009,
the GCHQ noted:
‘Problems with Ruffle (the code name for the ISNU). Ruffle cancels work sessions
at the last minute. Requests for apologies made at the highest level
are not answered.’ In July 2009, on the other hand, the British observe:
‘Excellent cooperation throughout the Iranian election crisis (…). We
are trying to arrange a meeting in August but there is no answer to our
messages.’ Nevertheless summer 2009 witnessed for the first time the
organisation of a meeting of four people, at the head office of the GCHQ
‘with the NSA, the CSEC (Communications Security Establishment Canada)
and Ruffle’ for a sharing of information, in particular on Iran
and the Palestinians. This sharing was not without its difficulties,
because Israel is not a member of the very closed circle, the ‘Five
Eyes’, which includes only the English-speaking services (United States,
United Kingdom, Canada,
Australia and New Zealand). At the end of August 2009, the GCHQ even
observed that these meetings were ‘ a real nightmare in terms of
confidentiality and logistics’. When confronted with the two contradictory faces of the GCHQ, it is
not easy to define the true position of London vis-à-vis the Israeli
partner. To get closer we should perhaps resort to this analysis which
appears in another top secret GCHQ document in 2008: ‘The Israelis
remain a real threat to the stability of the region, in particular
because of the position of this country with respect to the Iranian
dossier’. Contacted by Le Monde, the Israeli government did not wish to comment." "TalkTalk's
handling of a wi-fi password breach is being criticised by several cyber-security experts.
The BBC has presented the company with evidence that many of its customers' router
credentials have been hacked, putting them at risk of data theft. The UK broadband
provider confirmed that the sample of stolen router IDs it had been shown was
real.....Hackers could not use the credentials to carry out a mass attack from afar - but
they could use the IDs to identify high value targets to travel to, or they could simply
drive through the streets hunting for a match. Prof
Alan Woodward said once a hacker was outside a vulnerable property, they could: * snoop in
the resident's data, which might be clearly visible or encrypted in ways that still
allowed the original information to be easily recovered * use the internet connection to
mount an onward attack. The hacker could do this to hide their own identity or to co-opt
the router to join an army of other compromised equipment in later DDoS (distributed
denial of service) attacks * log in to the router as the administrator and mount a
"man in the middle attack", where apparently secure communications could be
listened in on * substitute the router's firmware with a modified version that provided a
backdoor for later access even if the device was reset." "Researchers
at Israel's Ben Gurion University have created a proof-of-concept exploit that allows them
to turn normal headphones connected to a PC into microphones that can then be used by
potential hackers to eavesdrop on conversations.
According to a new paper titled, "Speake(a)r: Turn speakers to microphones for fun
and profit," the security researchers explained that many current PCs and laptops are
vulnerable to this particular kind of attack. The researchers designed a code dubbed
"Speake(a)r" that is able to secretly reconfigure a computer's output or
headphone jack to an input or microphone jack, allowing a hacker to listen in and even
record someone's private conversations. "The fact that headphones, earphones and
speakers are physically built like microphones and that an audio port's role in the PC can
be reprogrammed from output to input creates a vulnerability that can be abused by
hackers," professor Yuval Elovici, director of the BGU Cybersecurity Research Center
(CSRC), said in a statement. Researchers found that the audio chipsets used in modern
motherboards and sound cards include an option to alter the function of an audio port on a
software level using a type of programming called "jack retasking" or "jack
remapping." Researchers said that the experimental malware targets RealTek audio codec chips, which has this
option, to remotely reconfigure and swap the headphone jack for a microphone jack,
essentially allowing a potential hacker to turn a computer into an eavesdropping device
"even when the computer doesn't have a connected microphone." RealTek's audio
chipsets are currently used in a wide range of PC motherboards, researchers said....
Researchers noted that since the vulnerability currently lies in the RealTek chips, there
is not much users can do to fix the issue except completely disabling the audio hardware
to prevent the malware from accessing a computer's audio codec or "enforcing a strict
rejacking policy" across the industry. They added that anti-malware and intrusion
detection systems could also develop API monitoring to detect and block any unauthorised
speaker-to-mic retasking attempts. "This is the reason people like Facebook chairman
and chief executive officer Mark Zuckerberg tape up their mic and webcam," Mordechai
Guri, lead researcher and head of Research and Development at the CSRC, said. "You
might tape the mic, but would be unlikely to tape the headphones or speakers."" "The
Liberal Democrat peer Lord Strasburger, one of the leading voices against the
investigatory powers bill, said: “We do have to worry about a UK Donald Trump. If we
do end up with one, and that is not impossible, we have created the tools for repression.
If Labour had backed us up, we could have made the bill better. We have ended up with a
bad bill because they were all over the place.
“The real Donald Trump has access to all the data that the British spooks are
gathering and we should be worried about that.” The Investigatory Powers Act
legalises powers that the security agencies and police had been using for years without
making this clear to either the public or parliament. In October, the investigatory powers
tribunal, the only court that hears complaints against MI6, MI5 and GCHQ, ruled that they had been unlawfully
collecting massive volumes of confidential personal data without proper oversight for
17 years. One of the negative aspects of the legislation is that it fails to provide
adequate protection for journalists’ sources, which could discourage whistleblowing.
One of the few positives in the legislation is that it sets out clearly for the
first time the surveillance powers available to the intelligence services and the police.
It legalises hacking by the security agencies into computers and mobile phones and allows
them access to masses of stored personal data, even if the person under scrutiny is not
suspected of any wrongdoing. Privacy
groups are challenging the surveillance powers in the European court of human rights and
elsewhere. Jim Killock, the executive director of Open Rights Group, said: “The UK
now has a surveillance law that is more suited to a dictatorship than a democracy. The
state has unprecedented powers to monitor and analyse UK citizens’ communications
regardless of whether we are suspected of any criminal activity.” Renate Samson, the
chief executive of Big Brother Watch, said: “The passing of the investigatory powers
bill has fundamentally changed the face of surveillance in this country. None of us online
are now guaranteed the right to communicate privately and, most importantly, securely.”"
"France’s government last week
announced the creation of a highly controversial new database that will collect and store
personal information on nearly everyone living in the country who holds a French identity
card or passport. The massive database, known as Secure
Electronic Documents (Titres électroniques sécurisés or TES), was decreed by the
government on October 30 in an effort to crack down on identity theft. The move sparked
immediate outrage in the French media, with weekly magazine L’Observateur describing
it as “terrifying”,
and daily newspaper Libération calling it a “mega
database that will do no good”. The TES will affect 60 million people and marks
the first time the country has collected population data on such a scale since the start
of the Nazi Occupation in 1940. The database will include all the same information
included on a French identity card or passport, depending on which a person holds: The
first and last names, address, eye colour, weight, marital status, a photograph and the
fingerprints of nearly everyone in France (with the exception of children under the age of
12) will be compiled into a single centralised system. The information taken from
passports will be stored for 15 years while identity card information will be kept for
20.... The database has sparked just as many ethical objections as it has political.
Critics fear that the increased security it promises will come at the expense of
individual civil liberties and privacy. “Despite the government’s denials, the
database’s contents could eventually be paired, for example, with information
collected from surveillance cameras,” Cheron explained. Authorities might then
someday be able to cross-reference ID photos with video footage to geolocate any
individual in France at any given time, in a scenario worthy of an Orwell novel. Back in
2012 Urvoas wrote a blog post entitled, “Against the
honest people’s file”, in which he warned against another possible risk of
creating a database like TES: hacking." "One of the reforms designed to rein
in the surveillance authorities of the National Security Agency has perhaps inadvertently
solved a technical problem for the spy outfit and granted it potential access to much more
data than before, a former top official told ABC News. Before the signing of the USA
Freedom Act in June 2015, one of the NSA's most controversial programs was the mass
collection of telephonic metadata from millions of Americans — the information about
calls, including the telephone numbers involved, the time and the duration but not the
calls' content — under a broad interpretation of the Patriot Act's Section 215. From
this large "haystack," as officials have called it, NSA analysts could get
approval to run queries on specific numbers purportedly linked to international terrorism
investigations....The USA Freedom Act ended the NSA's bulk collection of metadata but
charged the telecommunications companies with keeping the data on hand. The NSA and other U.S. government agencies now must request
information about specific phone numbers or other identifying elements from the
telecommunications companies after going through the Foreign Intelligence Surveillance Act
(FISA) court and arguing that there is a "reasonable, articulable suspicion" that the number is associated
with international terrorism. As a result, the NSA
no longer has to worry about keeping up its own database and, according to Inglis, the
percentage of available records has shot up from 30 percent to virtually 100. Rather than
one internal, incomplete database, the NSA can now query any of several complete ones. The
new system "guarantees that the NSA can have access to all of it," Inglis said.
NSA general counsel Glenn Gerstell made a brief reference to the increased capacity in a post for the Lawfare blog in January after terrorist attacks at home
and abroad. "Largely overlooked in the debate that has ensued in the wake of recent
attacks is the fact that under the new arrangement, our national security professionals
will have access to a greater volume of call records subject to query in a way that is
consistent with our regard for civil liberties," he wrote. Mark Rumold, a senior staff attorney at the Electronic Frontier
Foundation, told ABC News he doesn't have much of a problem with the NSA's wider access to
telephone data, since now the agency has to go through a "legitimate" system
with "procedural protections" before jumping into the databases. "Their
ability to obtain records has broadened, but by all accounts, they're collecting a far
narrower pool of data than they were initially," he said, referring to returns on
specific searches. "They can use a type of legal process with a broader spectrum of
providers than earlier. To me, that isn't like a strike against it. That's almost
something in favor of it, because we've gone through this public process, we've had this
debate, and this is where we settled on the scope of the authority we were going to give
them." Rumold said he's still concerned about the NSA's ability to get information on
phone numbers linked to a number in question — up to two "hops" away —
but he said the USA Freedom Act "remains a step in the right direction." The trade-off of the new system, according to Inglis, is in the efficiency
of the searches. Whereas in the past the NSA could instantaneously run approved searches
of its database, now the agency must approach each telecommunications company to ask about
a number and then wait for a response." "While
connecting to the Wi-Fi might seem like a good way to save precious data, you might want
to think twice before logging on. A new system has been designed that uses Wi-Fi signals
to track where you are and who you're with. The system reveals that many external
applications have access to this sensitive information, which could be seen as an 'erosion
of privacy'. Researchers from the Technical University of Denmark devised the new system,
which they say could be used to spy on people. In
their paper, the researchers, led by Piotr Sapiezynski, write: 'The idea of exploiting
Wi-Fi signals for this purpose is not new. 'However, to our best knowledge, researchers
have not yet tested this approach in practice, over a long period, and in a large
population that interacts in various environments.' 'WiFi can be efficiently used for
high-resolution mobility tracking of entire populations… and infer who people
interact with, not only where they are,' they added. In their study, the system tracked
800 participants by studying which Wi-Fi networks they connected to, and when, to slowly
piece together their movements. But the system goes one step further than this, to work
out 'physical proximity between pairs of individuals' by looking at the Wi-Fi signals they
both pick up. For example, the system can track when two users are picking up the same
Wi-Fi signal which suggests that they are in the same place. The researchers suggest that
the main privacy issue with the system will affect Android users. They wrote: 'A vast
majority of the applications available in Google Play Store has access to Wi-Fi
information, including all the scan results requested by the system as often as every 15
seconds.' But they add that this problem has been addressed in the latest version of
Android." "The
UK's security services, including GCHQ, MI5 and MI6, have been unlawfully collecting and
using mass datasets of personal information for more than 10 years. The Investigatory
Powers Tribunal has ruled in a judgement published online that the
bodies had been collecting data without safeguards or supervision. The setups of 'Bulk
Communications Data' (BCD) and 'Bulk Personal Datasets' by the agencies did not comply
with the right to privacy (Article
8) in the European Convention on Human Rights. The two schemes "failed to
comply" with the ECHR protections until they were admitted and codes of practices
were put in place in 2015, the tribunal added. BCD consists of the 'where, when and what'
of messages sent between individuals. BPD allow officials to collect mass datasets that could cover health, tax, and
electoral information. Both types of datasets have
been used as part of criminal investigations, but have been criticised by privacy advocates for being overly
intrusive. The tribunal added that the massive
datasets (BPD) "include considerable volumes of data about biographical details,
commercial and financial activities, communications and travel". "While each of these datasets in themselves may be innocuous,
intelligence value is added in the interaction between multiple datasets," the court
documents state. BPD are used by GCHQ, MI5 and MI6; BCD is only obtained and used by GCHQ
and MI5. The court's ruling comes as the government's Investigatory Powers Bill (IP Bill)
is in the final stages of becoming
law – it is currently passed through the House of Commons and is being
debated by the House of Lords. The Bill has been heavily criticised
by numerous
committees and officials. Powers included in the IP Bill include bulk collection of data,
the ability to remotely hack mobile phones and computers, and the storing of website
history. The law is the first time these powers have been specifically written into
law." "Yahoo’s
reported willingness to search user email to assist U.S. government investigators has
revived concerns about court-approved surveillance programs that companies aren’t
allowed to disclose to the people using their services. Last year, Yahoo modified an existing version of its email security
program to flag the appearance of a digital “signature” the U.S. had linked to a
foreign terrorist group backed by another government, according to a report published
Wednesday by The New York Times. Copies of any incoming email containing the signature
were stored in Yahoo’s system and made available to the FBI. The Times quoted an
unnamed government official, following up an earlier Reuters story that had revealed
Yahoo’s email scanning activity without specifying what kind of information the
government sought. The revelations have conjured memories of a data-collection program set
up by the National Security Agency and major internet companies a few years ago under
other court orders issued in secret." "The head of MI6 has said the
information revolution represents both an "existential threat and a golden
opportunity". In rare public comments Alex
Younger, who took over as Chief of the Secret Intelligence Service in 2014, said it
had fundamentally changed the operating environment for the intelligence community. He
also said the actions of Edward
Snowden had undermined trust between intelligence agencies and technology companies,
and been "highly problematic". Mr Younger said the focus was on recruiting
officers of the "highest moral literacy". He said the intelligence
agencies could be the most important "communication vector" between
countries. Mr Younger appeared at a conference in the US alongside CIA Director John
Brennan and their Australian and Afghan counterparts.... Every president called on the CIA
to carry out covert action and that had a "paramilitary dimension," he said. But
he said more information about methods used by the intelligence community should be
publicly available. He said the American people had the right to know what was being done
on their behalf and "blind trust is a false currency". Referring to the
international nature of intelligence, he added: "We rely heavily on liaison
relationships and don't see how we could do business without them." Nick Warner,
Director-General of the Australian Secret Intelligence Service, said some intelligence
agencies could talk more candidly to each other than to diplomats to convey sensitive
messages.... Intelligence officials also warned the "internet of things" would
bring new threats. Chris Inglis, former deputy director of the US National Security
Agency, said people should "just say no" to having household appliances hooked
up to the internet." More than 760,000 “items of
communication” were obtained by British snoops – and others – in 2015,
according to the Interception of Communications Commissioner’s Office’s (IOCCO)
annual report. The report, which was published today and covers the annual year 2015,
revealed for the first time an accurate scale of communications slurped by public
authorities in the UK. Previous figures reported by IOCCO weren’t able to show how
much surveillance was taking place in the nation as only the number of notices given to
ISPs were recorded, not the amount of communications data which the notices covered. As
shown in today’s
92-page publication [PDF], 761,702 items of communications data were acquired by
public authorities during 2015. An item of data is a
request for data on a single identifier or other descriptor. IOCCO offers the example of
30 days of incoming and outgoing call data for a mobile phone as a single item of data.
145 public authorities acquired data in 2015, and most of these requests came from the
UK’s police forces and law enforcement agencies.
Law enforcement officers acquired 93.7 per cent of all data requested by public
authorities in 2015. Only 5.7 per cent of data was acquired by the intelligence agencies,
and a mere 0.6 by public authorities such as the Financial Conduct Authority, which have
the statutory ability to investigate criminal offences. 0.1 per cent of requests came from
local authorities such as councils." "A
Boston company has taken technology developed at MIT and turned it into special badges
that hang around your neck on a lanyard. Each has two microphones doing real-time voice
analysis, and each comes with sensors that follow where you are in the office, with motion
detectors to record how much you move. The beacons tracking your movements are
omitted from bathroom locations, to give you some privacy. “Within three or four
years, every single ID badge is going to have these sensors,” predicted Ben
Waber, chief executive of Humanyze, a Boston-based employee analytics company. “We are only scratching the surface right now.” Those concerned
about their privacy might be alarmed by the arrival of such badges. But Humanyze says it
doesn’t record the content of what people say, just how they say it. And the boss
doesn’t get to look at individuals’ personal data. It is also up to the employee
to decide whether they want to participate." "The radical shift in the
NSA's surveillance strategy to "collect it all" began in the UK, according to
new revelations in the latest cache of documents leaked by Edward Snowden. During a June
2008 visit to the Menwith Hill monitoring station in North Yorkshire, then-director of the
NSA Keith Alexander asked: "Why can’t we collect all the signals, all the
time?" He went on: "Sounds like a good summer homework project for
Menwith!" Menwith Hill Station—which formerly monitored Soviet signals and is
now the NSA's largest overseas spying base—expanded greatly in the wake of Alexander's
challenge, as The
Intercept reports in its coverage of the new Snowden documents... The leaked documents
reveal that, for years, the UK and US governments put out a "cover
story" that Menwith Hill Station was used to provide "rapid radio relay and
conduct communications research." In fact, its striking white domes—around 30 of
them—are used to eavesdrop on communications as they are sent through the air from
satellites. That method contrasts with the other NSA
and GCHQ bases that monitor signals passing through the fibre-optic cables linking
countries. Menwith Hill Station also draws on US spy satellites orbiting above target
countries around the world. The satellites can locate
and capture signals on the ground below generated by mobile phones and even Wi-Fi
networks. One of the most important tools used at
Menwith Hill Station was Ghosthunter,
the new leaks reveal, whose primary role was "to learn and establish pattern of life
for known terrorists who use Internet cafes to communicate." The focus on Internet
cafes is explained by the fact that in the areas of interest—mostly in the Middle
East—Internet connections are often routed via VSAT satellite systems,
which makes them easier to intercept." "Over
the past decade, the documents show, the NSA has pioneered groundbreaking new spying
programs at Menwith Hill to pinpoint the locations of suspected terrorists accessing the
internet in remote parts of the world. The programs — with names such as GHOSTHUNTER
and GHOSTWOLF — have provided support for conventional British and American military
operations in Iraq and Afghanistan. But they have
also aided covert missions in countries where the U.S. has not declared war. NSA employees
at Menwith Hill have collaborated on a project to help “eliminate” terrorism
targets in Yemen, for example, where the U.S. has waged a controversial drone bombing
campaign that has resulted in dozens of civilian deaths.... Most
of the world’s international phone calls, internet traffic, emails, and other
communications are sent over a network of undersea cables that connect countries like
giant arteries. At spy outposts across the world, the NSA and its partners tap into these
cables to monitor the data flowing through them. But Menwith Hill is focused on a
different kind of surveillance: eavesdropping on communications as they are being
transmitted through the air. According to top-secret documents obtained by The Intercept
from NSA whistleblower Edward Snowden, Menwith Hill has two main spying capabilities. The
first is called FORNSAT, which uses powerful antennae contained within the golf ball-like
domes to eavesdrop on communications as they are being beamed between foreign satellites.
The second is called OVERHEAD, which uses U.S. government satellites orbiting above
targeted countries to locate and monitor wireless communications on the ground below
— such as cellphone calls and even WiFi traffic....
As of 2009, Menwith Hill’s foreign satellite surveillance mission, code-named
MOONPENNY, was monitoring 163 different satellite data links. The
intercepted communications were funneled into a variety of different
repositories storing phone calls, text messages, emails, internet browsing histories,
and other data. It is not clear precisely how many communications Menwith Hill is capable
of tapping into at any one time, but the NSA’s documents
indicate the number is extremely large. In a single 12-hour period in May 2011, for
instance, its surveillance systems logged more than 335 million metadata records, which
reveal information such as the sender and recipient of an email, or the phone numbers
someone called and at what time. To keep information about Menwith Hill’s
surveillance role secret, the U.S. and U.K. governments have actively misled the public
for years through a “cover story” portraying the base as a facility used to
provide “rapid radio relay and conduct communications research.” A classified U.S. document, dated
from 2005, cautioned
spy agency employees against revealing the truth. “It is important to know the
established cover story for MHS [Menwith Hill Station] and to protect the fact that MHS is
an intelligence collection facility,” the document stated. “Any reference to
satellites being operated or any connection to intelligence gathering is strictly
prohibited.”... There
are some 2,200 personnel at Menwith Hill, the majority of whom are Americans. Alongside
NSA employees within the complex, the U.S. National Reconnaissance Office also has a major
presence at the site, running its own “ground station” from which it controls a
number of spy satellites. But the British government has publicly asserted as recently as
2014 that operations at the base “have always been, and continue to be” carried
out with its “knowledge and consent.” Moreover, roughly 600 of the personnel at
the facility are from U.K. agencies, including employees of the NSA’s British
counterpart Government Communications Headquarters, or GCHQ.... Jemima Stratford QC, a leading British human rights lawyer, told The
Intercept that there were “serious questions to be asked and serious arguments to be
made” about the legality of the lethal operations aided from Menwith Hill. The
operations, Stratford said, could have violated the European Convention on
Human Rights, an international treaty that the U.K. still remains bound to despite its
recent vote to leave the European Union. Article 2 of the Convention protects the
“right to life” and states that “no one shall be deprived of his life
intentionally” except when it is ordered by a court as a punishment for a crime.
Stratford has previously warned that if British officials have facilitated covert U.S.
drone strikes outside of declared war zones, they could even be implicated in murder. In
2014, she advised members of the U.K. Parliament that because the U.S. is not at war with
countries such as Yemen or Pakistan, in the context of English and international law, the
individuals who are targeted by drones in these countries are not “combatants”
and their killers are not entitled to “combatant immunity.”... The documents provided by Snowden shine light on some of the
specific technological changes. Most notably, they show that there has been significant
investment in introducing new and more sophisticated mass surveillance systems at Menwith
Hill in recent years. A crucial moment came in 2008, when then-NSA Director Keith
Alexander introduced a radical shift in policy. Visiting Menwith Hill in June that year,
Alexander set a challenge for employees at the base. “Why can’t we collect all
the signals, all the time?” he said,
according to NSA documents. “Sounds like a good summer homework project for
Menwith.” As a result, a new “collection posture” was introduced at the
base, the aim being to “collect it all, process it all, exploit it all.” In
other words, it would vacuum up as many communications within its reach as technologically
possible.... Fabian Hamilton, a member of Parliament
based in the nearby city of Leeds, has become a supporter of the campaign’s work,
occasionally attending events organized by the group and advocating for more transparency
at Menwith Hill. Hamilton, who represents the Labour Party, has doggedly attempted to find
out basic information about the base, asking the government at least 40 parliamentary
questions since 2010 about its activities. He has sought clarification on a variety of
issues, such as how many U.S. personnel are stationed at the site, whether it is involved
in conducting drone strikes, and whether members of a British parliamentary oversight
committee have been given full access to review its operations. But his efforts have been
repeatedly stonewalled, with British government officials refusing to provide any details
on the grounds of national security.... Hamilton told The Intercept that he found the
secrecy shrouding Menwith Hill to be “offensive.” The revelations about the role
it has played in U.S. killing and capture operations, he said, showed there needed to be a
full review of its operations. “Any nation-state that uses military means to attack
any target, whether it is a terrorist, whether it is legitimate or not, has to be
accountable to its electorate for what it does,” Hamilton said. “That’s the basis of our Parliament, it’s the basis
of our whole democratic system. How can we say that Menwith can carry out operations of
which there is absolutely no accountability to the public? I don’t buy this idea that
you say the word ‘security’ and nobody can know anything. We need to know what
is being done in our name.”" "Beyond
human identification and general gesture recognition, Wi-Fi signals can be used to discern
even the slightest of movements with extreme precision. A system called “WiKey”
presented at a conference last year could tell what keys a user was pressing on a
keyboard by monitoring minute finger movements. Once trained, WiKey could recognize a
sentence as it was typed with 93.5 percent accuracy—all using nothing but a
commercially available router and some custom code created by the researchers. And a group
of researchers led by a Berkeley Ph.D. student presented technology at a 2014 conference
that could “hear” what people were
saying by analyzing the distortions and reflections in Wi-Fi signals created by their
moving mouths. The system could determine which words from a list of lip-readable
vocabulary were being said with 91 percent accuracy when one person was speaking, and 74
percent accuracy when three people were speaking at the same time. Many researchers presented their Wi-Fi sensing technology as a way to
preserve privacy while still capturing important data. Instead of using cameras to monitor
a space—recording and preserving everything that happens in detail—a
router-based system could detect movements or actions without intruding too much, they
said. I asked the lead researcher behind WiKey, Kamran Ali, whether his technology could
be used to secretly steal sensitive data. Ali said the system only works in controlled
environments, and with rigorous training. “So, it is not a big privacy concern for
now, no worries there,” wrote Ali, a Ph.D. student at Michigan State University, in
an email. But as Wi-Fi “vision” evolves, it
may become more adaptable and need less training. And if a hacker is able to gain access
to a router and install a WiKey-like software package—or trick a user into connecting
to a malicious router—he or she can try to eavesdrop on what’s being typed
nearby without the user ever knowing." "Interception
of Canadians’ private communications by the federal electronic spy agency increased
26-fold last year, for reasons authorities won’t fully explain. And despite
commitments between Canada and its intelligence-sharing allies to respect the privacy of
each nation’s citizens, the volume of information on Canadians collected by allied
intelligence agencies and informally shared with Canada’s spies has grown to the
point that it now requires a formal mechanism to cope with all the data. At least one intelligence expert is concerned the change sidesteps the
spirit of Canadian privacy laws. Details are contained in the latest annual report by the
independent, external oversight organization that reviews activities of the Canadian
Security Establishment (CSE), Ottawa’s super-secret foreign signals intelligence
agency. Quietly tabled in Parliament July 20, the report concludes CSE’s 2015-16
activities were lawful. But the watchdog Office of the Commissioner of the Communications
Security Establishment notes CSE intercepted 342 private communications in 2014-15,
compared to just 13 for the previous year. By law, CSE can only target communications of
foreign entities outside Canada. If one end of that communication is in Canada, making it
a “private communication,” it requires a written authorization from the minister
of national defence, responsible for the CSE, and only if it is essential for
“international affairs, defence or security.”" "In
a revelation that shows how the National Security Agency was able to systematically spy on
many Cisco Systems customers for the better part of a decade, researchers have uncovered
an attack that remotely extracts decryption keys from the company's now-decommissioned
line of PIX firewalls. The discovery is significant because the attack code, dubbed
BenignCertain, worked on PIX versions Cisco released in 2002 and supported through 2009. Even after Cisco stopped providing PIX bug fixes in July 2009, the
company continued offering limited service and support for the product for
an additional four years. Unless PIX customers
took special precautions, virtually all of them were vulnerable to attacks that
surreptitiously eavesdropped on their VPN traffic. Beyond allowing attackers to snoop on
encrypted VPN traffic, the key extraction also makes it possible to gain full access to a
vulnerable network by posing as a remote user." "More
than 16 million images of people who may have committed no crime have been added to a
national police gallery which uses sophisticated facial recognition software, it has
emerged. And the number added to the gallery has continued to grow despite privacy
warnings from the courts, a House of Commons Select
Committee and a police watchdog. But the Home
Office is sitting on the conclusions of an inquiry into police use of personal images,
even though it received the findings at least seven months ago - when Theresa May, now
Prime Minister, was Home Secretary. Midlands MP Tom Watson, who is also Labour’s
deputy leader, said: “The fact police have assembled a photographic database of many
millions of people, the overwhelming majority of whom have never and will never commit a
crime, should alarm us all.”" "In his e-mails, Ceglia, 43, said he
was forced to flee due to a “very credible” threat that he would be arrested on
new charges, jailed and killed before trial. The
reason he was marked for death, he said, was fear that the trial would expose the
involvement of the Central Intelligence Agency’s venture-capital arm, In-Q-Tel, in
Facebook." "The
BBC is to spy on internet users in their homes by deploying a new generation of Wi-Fi
detection vans to identify those illicitly watching its programmes online. The
Telegraph can disclose that from next month, the BBC vans will fan out across the country
capturing information from private Wi-Fi networks in homes to “sniff out” those
who have not paid the licence fee. The corporation has been given legal
dispensation to use the new technology, which is typically only available to
crime-fighting agencies, to enforce the new requirement that people watching BBC
programmes via the iPlayer must have a TV licence....
electrical engineering experts said that the most likely explanation for how the BBC would
carry out its surveillance was a technique known as “packet sniffing”, which
involves watching traffic passing over a wireless internet network without hacking into
the connection or breaking its encryption. Researchers at University College London
disclosed that they had used a laptop running freely available software to identify
Skype internet phone calls passing over encrypted Wi-Fi, without needing to crack the
network password. Dr Miguel Rio, a computer network expert who helped to oversee
the doctoral thesis, said that licence-fee inspectors could sit outside a property
and view encrypted “packets” of data – such as their size and the frequency
with which they are emitted over the network – travelling over a home Wi-Fi network.
This would allow them to establish if devices at homes without television licences were
indeed accessing BBC programmes online. Dr Rio said: “They actually don’t
need to decrypt traffic, because they can already see the packets. They have control over
the iPlayer, so they could ensure that it sends packets at a specific size, and match them
up. They could also use directional antennae to ensure they are viewing the Wi-Fi
operating within your property.” Privacy campaigners described the
developments as “creepy and worrying”. A spokesman for Privacy International,
the human rights watchdog, said: “While TV Licensing have long been able to examine
the electromagnetic spectrum to watch for and investigate incorrect usage of their
services, the revelation that they are potentially developing technology to monitor home
Wi-Fi networks is startlingly invasive.”" "Your
computer, phone and even printer could be spying on you. Experts have warned everyday
machines such as these may be used to bug any kind of building remotely. A new king
of malware uses circuits found on most devices and radio frequency waves to turn them into
listening devices, without the hackers even accessing the machines. The malware, named
'Funtenna' by lead researcher Ang Cui from Red Balloon Security, would be hard to detect
because no traffic logs would catch data leaving the premises.... Funtenna exploits radio frequencies, or RF signals, to turn office
equipment into bugging devices. It uses 'all the common pieces of hardware that you find
in basically every embedded device,' Mr Cui told Motherboard in a YouTube video. It forces the
hardware to transmit a signal that sends data to the hacker. By uploading the malware to a
device, the hackers can vibrate the prongs on general-purpose input/output circuits, that
are found on most embedded devices, at a frequency of their choice. These vibrations can
be picked up by a radio antenna. Because the devices themselves are acting as
transmitters, the technique bypasses all conventional network security.... Or it can be
used to make a phone transmit the incoming data - by switching the input pin in an office
phone to go to output to make the phone think it was off the hook when it is not. One of
the most dangerous parts of this is that it was done through software, Mr Cui says, 'so
nobody had to sneak into this room to tamper with the phone, it was all just software
through the network.' In the example Mr Cui demonstrated in the video, the software was
delivered to the phone through a printer. The researchers sent a document, in the form of
a CV, to the printer, which was connected to the same network as the phone. 'The resume
rewrites the firmware on the printer to do whatever we want,' Mr Cui said. 'What we
want to do is find all the phones.' The printer was used to turn all the vulnerable phones
into listening devices. The same could be used on printers to cause them to vibrate,
transmitting the data as Morse code, that can be picked up by radio antennae. Mr Cui first
showed the system in action at the annual security conference Black Hat last year in Las
Vegas. An expert at the conferene called the malware 'hardware agnostic' and able to
operate with almost all modern computer systems and embedded devices. The tool's
development over the past three years is another illustration that a broadening array of
devices can be manipulated in unpredictable ways and that attackers increase their
advantage over defenders as gadgets grow more complex." "From
unlocking your smartphone, to scanning your fingerprint at the airport, your physical
attributes - or 'biometrics' - are regularly used to verify your identity. But experts
warn that using your unique features to confirm your identity could leave you susceptible
to being hacked. And unlike a password, which you can easily change, your biometrics
cannot be altered. A huge range of companies use
biometrics, from HSBC, who allow you to access your bank account just using a fingerprint,
to RightPatient, which allows medical facilities to retrieve a patient’s electronic
health record with one biometric scan. According to Marc Goodman, an advisor to Interpol
and the FBI, by 2019, biometrics could be a $25 billion (£19 billion) industry with 500
million scanners. With password logins, you must remember long sequences of numbers
and letters, whereas biometrics are much more convenient. A recent survey showed that
80 per cent of consumers prefer using biometric authentication to traditional
passwords. Additionally, 52 per cent of consumers said they would choose any other
option over traditional passwords. However, the main problem with using biometrics is
the fact that if you are hacked, you cannot replace them. Speaking to
NBC News, Mr Goodman said: 'You can always get a new credit card. You can always
create a new password. [It's] really hard to get new fingers. You only have ten of them
and once that information leaks, it's out and there's nothing you can do.' While most
companies that use biometrics say they will encrypt their data in the aim of safeguarding
biometrics, there have already been cases of large-scale hacks. For example, in December
2014, 22 million people had their personal data stolen from the Office of Personnel
Management, including personal information, and fingerprints. Ms Rebecca Balebako,
who had her data stolen during the hack, told NBC News: 'That information is going to
remain stolen, and I'm not going to change my fingerprints. 'I also don't know what
they're going to do with information about my children or about my husband or about his
family. Ms Balebako herself works in the security industry, but added: 'I'm a privacy
researcher and I don't know what to do. I can't see there's much I can do to protect
myself.'" "Police forces across the UK
have been responsible for “at least 2,315 data breaches” over the last five
years, according to research by Big Brother Watch, prompting concerns about the increasing
amount of data they're holding. Titled Safe in
Police Hands? the 138-page report is released today after months of requests made by the
campaign group under the Freedom of Information Act, covering police forces' breaches of
the Data Protection Act from June 2011 to December 2015. According to Big Brother Watch,
the results “show officers misusing their access to information for financial gain
and passing sensitive information to members of organised crime groups”. Over the last five years, more than 800 members of staff at police
forces “accessed personal information without a policing purpose” and
information was “inappropriately shared with third parties more than 800 times”.... “With the potential introduction of Internet Connection Records
(ICRs) as outlined in the Investigatory Powers Bill, the police will be able to access
data which will offer the deepest insight possible into the personal lives of all UK
citizens,” the group reported, adding that any breach of this information would be
“over and above” what was included in the report. Of the 2,315 breaches that Big
Brother Watch was informed of, more than 55 per cent (1,283) resulted in no formal
disciplinary action being taken, while in 11 per cent (258) of cases those responsible
received either a written or verbal warning. In 13 per cent of cases (297) the individuals
involved either resigned or were dismissed, while only 3 per cent (70) of breaches
resulted in either a criminal conviction or caution." "New
Jersey public transit was forced to remove the bugs it had installed on its light rail
system after a public outcry, but Baltimore's buses and subways remain resolutely under
audio surveillance, while in Oakland, the cops hid mics
around bus-shelters near the courthouses to capture audio of defendants and their
lawyers discussing their cases. The argument for
these things goes, "No one is listening to them unless a crime is committed, and then
they're of forensic value -- besides, you're in a public place, where you have no
expectation of privacy." We've seen that warehoused surveillance data is
intrinsically leaky (anything you collect will probably leak, anything you retain will
definitely leak); we've also seen that making the haystacks bigger doesn't make
it easier to find the needles hidden in them.
Then there's the chilling effect of knowing that you're under surveillance: it's the cornerstone
of the Chinese internet control model, which holds that the easiest way to manage
dissent and prevent the transmission of politically unpopular views is to simply let
everyone know that everything they say is on the record." "Secret
FBI rules allow agents to obtain journalists’ phone records with approval from
two internal officials — far less oversight than under normal judicial procedures.
The classified
rules, obtained by The Intercept and dating from 2013, govern the FBI’s use
of national security letters, which allow the bureau to obtain information about
journalists’ calls without going to a judge or informing the news organization
being targeted. They have previously been released
only in heavily
redacted form. Media advocates said the documents show that the FBI imposes few
constraints on itself when it bypasses the requirement to go to court and obtain subpoenas
or search warrants before accessing journalists’ information. The rules stipulate
that obtaining a journalist’s records with a national security letter (or NSL)
requires the signoff of the FBI’s general counsel and the executive assistant
director of the bureau’s National
Security Branch, in addition to the regular chain of approval. Generally speaking,
there are a variety of FBI officials, including the agents in charge of field offices, who
can sign off that
an NSL is “relevant” to a national security investigation." "The security services are to receive a licence for hacking into the phones
and laptops of a “major town” under the snooper’s charter legislation,
which reaches the House
of Lords next week.The broad nature of the hacking powers to be handed to GCHQ are
disclosed in an obscure case study in a background Home Office document setting
out the operational case for their use. This shows that all the phones and laptops in
a “major town” could be hacked into, as long as the town were overseas and the
action were necessary for national security purposes.
The example used in the case study is identifying the phones and laptops being used by a
terrorist group planning an attack on Western tourists in a major town. The home
secretary, Theresa May, has asked the official terror law watchdog, David Anderson QC, to
conduct a speedy review this summer of whether such “bulk powers” are needed by
the security services, and whether the information cannot be gained by less intrusive
means. The disclosure comes as the Liberal
Democrats, who have 108 peers, say they intend to mount a strong challenge to the
powers contained in the investigatory powers bill – as the snooper’s charter is
officially known – when it reaches the House of Lords on Monday." "The
Liberal Democrats are planning to meet the Investigatory Powers Bill with strong
resistance in the House of Lords, a list of key issues shared with The Register reveals.
The bill, which will bolster state surveillance in the United Kingdom, remains especially
unpopular amongst IT-literate members of the public, who are particularly aware of its
potential to undermine security standards and civil liberties. Encouraged by the
Labour party's comments, many expected this would provoke stronger opposition from
their elected representatives when it was debated in the House of Commons. Eventually it
passed through that chamber by 444 votes to 69 on 7 June. All eight Liberal Democrat MPs
voted against the Snooper's Charter. There are, however, 108 Lib Dem peers in the House of
Lords, who, along with 173 crossbenchers and 210 Labour peers, the party is ready to
campaign to demand heavy concessions from the 244 government peers. Speaking to The
Register, Brian Paddick, a Liberal Democrat peer and former Deputy Assistant Commissioner
of the Metropolitan Police said: “The experience with legislation is that is goes
through the House of Commons very quickly and is only considered in detail in the House of
Lords,” noting the Lords' 150 amendments to the Modern Slavery Act 2015 as an example
of the upper chamber's capability to improve legislation. There will be no immediate
fireworks when the bill receives its second reading in the Lords on 27 June. As the first
Monday after the EU referendum, which is likely to hold the public and media's focus, the
second reading will be an especially “vague and general canter over the bill as a
whole,” Paddick told us. “People don't normally speak for over ten minutes, and
a bill of this size and magnitude is hard to cover in 10 minutes,” he added, “so
it will be a means of giving an indication to other peers of what our concerns will
be.” “We're keeping our powder dry for the committee stage,” Paddick added.
This will take place two weeks after the second reading, and will consist of six days
during which the Lords will consider the bill line by line. “People are being
hoodwinked by the government over issues like Internet Connection Records (ICRs),” he
told us, explaining that “the argument is, and Dominic Grieve – who chairs the
Intelligence and Security Committee – said at a public meeting this week that ICRs
were 'necessary for national security', but MI5 and MI6 have said they don't need them,
only law enforcement does, so one has to question whether they are needed on national
security grounds.” The party believes that ICRs “are disproportionate and
misguided,” its Lords briefing document states. “Despite amounting to “the
collection of everyone in the United Kingdom’s web histories for 12 months by
individual Communication Service Providers (CSPs)” the “significance of this
data has been underplayed by government who have repeatedly tried to paint it as the
equivalent of telephony records.” “[Y]our web history reveals far more”
than telephony records “and would be more akin to having a CCTV camera installed in
your bedroom or a police officer following your every move,” opined the briefing
document.... “I was Deputy Assistant Commissioner for the Metropolitan Police
Service, I was the police spokesperson when the 7th July 2005 bombings happened, and I
know at first hand what impact terrorism and serious crime can have on individuals,”
said Paddick. He concluded: “I am not approaching this from a one-sided idealistic
libertarian standpoint, but this bill goes too far in trying to improve our security by
disproportionately undermining our right to privacy.”" "Hardware
security export Damien Zammit revealed some startling revelations in a recent SoftPedia about the
secret backdoor built in to new Intel CPUs that no one can touch or disable. The backdoor,
called the Intel Management Engine (ME) is works as a secret subsystem inside your
computer’s CPU and runs constantly even when your computer is not turned on. It works but setting up a TCP/IP server and since the subsystem has
complete uncontrolled access to your computer’s hardware, including the network card
and memory, it works without the knowledge of your computers operating system and can not
be disabled by the OS or by your computer’s firewall. No one outside of Intel has
seen the ME source code and security experts are warning the built-in backdoor has the
potential to explode into the worst root kit ever with every modern Intel based CPU
becoming compromised. Intel asserts it is secure from hackers and such attacks
because it is protected by 2048 bit RSA encryption which theoretically thought to be
uncrackable during the lifespan of everyone living on earth today." "A
new UK startup will “take a deep dive” into the intimate details of
people’s private lives by essentially strip-mining data from their social media
profiles — and then sell
what’s unearthed to just about anybody willing to pay. Score Assured, as the umbrella company, will
offer a suite of services to those desiring a more personal insight into applicants’
lives across a number of different sectors. Tenant
Assured, for instance — marketed to landlords — is already up and running. The
next program to go live, Recruit Assured, will target employers.... many immediately spurned
the idea when the story was first reported on by the Washington Post, and it’s not
difficult to grasp why. Even setting aside the blatant violations of an individual’s
basic right to privacy, some are finding fault with the indiscriminate methods these
programs use to collate data. For proprietors enrolled in Tenant Assured, for instance,
would-be renters are required — assuming they first consent — to hand unfettered
social media access over to potential landlords in the name of transparency with regard to
economic status. The program then dissects applicants’ online social media activity
— including conversation threads and even private messaging — using language
processing software and other analytics. The frequency of keywords like “poor”
and “staying in” and “no money” in online posts is noted, after which
the Tenant Assured program sends landlords a “financial stress level” report
— a purported measure of how likely would-be tenants will be able to pay their
rent." "New documents from
the Snowden trove reveal MI5 admitting that it was collecting "significantly
more than it is able to exploit fully." The 2010 report,
published by The Intercept, describes MI5 as the "principal collector and exploiter
of target's digital footprint in the domestic space," and noted that its efforts had
"grown significantly over the last few years." A second secret report
released today by The Intercept confirms the fact that the UK's intelligence agencies were
drowning in data: "There is an imbalance between collection and exploitation
capabilities, resulting in a failure to make effective use of some of the intelligence
collected today," the report noted. "With the exception of the highest priority
investigations, a lack of staff and tools means that investigators are presented with raw
and unfiltered DIGINT [digital intelligence] data. Frequently, this material is not fully
assessed because of the significant time required to review it." Although those
reports referred to the situation in 2010, the problems seem to have continued afterwards.
As Ars wrote last year, too
much data and stretched resources are common problems for European security services.
A UK government investigation into the murder of Lee Rigby revealed that his attackers
were known to MI5, but that it had not been possible to follow the leads because "MI5
has limited resources, and must continuously prioritise its investigations in order to
allocate those resources."... Other new Snowden documents reveal the "MILKWHITE"
programme, which GCHQ used to gather information about people’s
use of smartphone apps like WhatsApp and Viber, instant messenger services such as
Jabber, and social networking websites, including Facebook, MySpace, and LinkedIn.... According
to the Intercept: "GCHQ made some of its huge troves of metadata about
people’s online activities accessible to MI5, London’s Metropolitan Police, the
tax agency Her Majesty’s Revenue and Customs, the Serious Organised Crime Agency (now
merged into the National Crime Agency), the Police Service of Northern Ireland, and an
obscure Scotland-based surveillance unit called the Scottish Recording Centre." A
similarly-wide use of highly-revealing metadata is also an important aspect of the
Snooper's Charter. This new information that MI5 has been struggling to master the flow of
data is particularly relevant in the light of the current passage of the
Investigatory Powers Bill through UK parliament. One of the key features of the
proposed legislation is that ISPs can be required to store information about everyone's
Internet activities for a year (so-called Internet
connection records, ICRs). This will inevitably lead to even more data that needs to
be processed, making it more likely that important leads will be missed amidst the data
cacophony." "Edward
Snowden, a fugitive and former U.S. National Security Agency contractor who leaked
information from the agency in 2013, warned Saturday that all people in Japan are
subjected to mass surveillance initiated by the U.S. government. Snowden lived in Japan from 2009 to 2011. At the time, he was an employee
with computer giant Dell Inc. contracted out to the NSA, where he worked on a surveillance
program at the U.S.’s Yokota airbase in Fussa, Tokyo. “They know your …
religious faith. They know whom you love. They know whom you care about … This was
our job to establish the pattern of life of any individuals,” he said. Snowden made
the comments via video conferencing from Russia, where he resides to avoid U.S. criminal
prosecution, during a symposium Saturday in Tokyo on surveillance in contemporary society.
More than 200 people, including lawyers, journalists, and others, attended the discussion
held in an auditorium on the University of Tokyo campus. Snowden, 32, said all the
information that people input via cellphones or computers can be legally collected by the
U.S. intelligence agency for analysis. Serious issues facing Japan are its lack of citizen
engagement on privacy controls and weak civil controls over the government, he said. A
prime example of a threat to Japanese society, according to Snowden, is the controversial
state secrecy law enacted in 2013, which he said is “fundamentally dangerous to
democracy.” Officially known as the Act on the Protection of Specially Designated
Secrets, which went into effect in 2014, the law gives ministries and agencies discretion
to classify information in areas such as defense, counterterrorism and diplomacy as state
secrets. Leakers, including civil servants, could face up to 10 years in prison and those
who instigate such leaks, including journalists, could be subjected to five-year prison
terms. The law was steamrolled through the Diet in 2013 by the administration of Prime
Minister Shinzo Abe despite a mass public outcry over the obscure nature by which
information will be designated as a state secret. In an interview with the weekly magazine
Sunday Mainichi in its Tuesday edition, Snowden said the enactment of the controversial
law was requested and designed by the U.S. government to facilitate the NSA’s
espionage activities in Japan." "Google could have a
record of everything you have said around it for years, and you can listen to it yourself.
The company quietly records many of the conversations that people have around its
products. The feature works as a way of letting people search with their voice, and
storing those recordings presumably lets Google improve its language recognition tools as
well as the results that it gives to people....The
recordings can function as a kind of diary, reminding you of the various places and
situations that you and your phone have been in. But it’s also a reminder of just how
much information is collected about you, and how intimate that information can be." "Councils
across the country are switching off their closed-circuit television cameras, saying that
they are too costly and ineffective at preventing crime. Westminster council will discuss
next week a plan to turn off the 75 cameras it runs to save £1 million a year. The council argued that it needed to spend £1.7 million to update the
system on top of the running costs, which was unaffordable given spending cutbacks. Other
big metropolitan councils including Birmingham, Edinburgh and Leicester have already
reduced their cameras significantly because of austerity measures. Others have switched
off completely." "The
FBI wants to exempt its burgeoning national database of fingerprints and facial photos
from a federal law that gives Americans the right to sue for government violations of the
Privacy Act, such as refusing to tell a person if he or she is in the system. The bureau
also wants to shield its data storehouse from other Privacy Act rules, including one that
lets people ensure that the information the government holds about them is accurate. The proposed exemptions, published in May in the Federal Register, have
stirred objections from an array of privacy and civil rights advocates. They say that such
carve-outs remove a critical check on the use of the huge database in criminal
investigations." "GCHQ
and the US National Security Agency (NSA) have access to intercepted emails sent and
received by all members of the UK Parliament and peers, including with their constituents,
a Computer Weekly investigation has established. The intelligence agency in Cheltenham has
been able to harvest traffic details of all parliamentary emails, including details of the
sender, recipient and subject matter, for at least three years. As a result, details of
private email correspondence between MPs and constituents are being collected by GCHQ as a
matter of routine. GCHQ documents classified above top secret, released by NSA
whistleblower Edward Snowden, also reveal that the spy agency has the capability to scan
the content of parliamentary emails for “keywords” through an established cyber
defence network that is connected to commercial software used to filter spam emails from
MPs’ inboxes. The disclosures, which come as
the House of Commons prepares for the Third Reading of the government’s controversial
Investigatory Powers Bill on Monday 6 June, raise new questions over the sweeping powers
to be granted in the bill to police and the security services. The controversial decision
by Parliament to replace its internal email and desktop office software with
Microsoft’s Office 365 service in 2014, means that parliamentary data and documents
constantly pass in and out of the UK to Microsoft’s datacentres in Dublin and the
Netherlands, across the backbone of the internet. Because files and emails leave the
UK’s borders in this way, they are automatically accessible to GCHQ’s bulk
interception system, Tempora. According to previously published Snowden documents, Tempora
uses “probes” on commercial optical fibre cables crossing the Irish Sea and
English Channel to harvest data. Under existing law, GCHQ is permitted automatically to
store datasets containing details of the senders, recipients and headings of all emails in
and out of the UK, including internal UK-to-UK messages.... MPs’ communications have
been partially protected from interception for over 40 years under the “Wilson
Doctrine”, introduced by the former prime minister Harold Wilson in 1968. But
this offered no protection to communications that leave the UK’s borders,
which are subject to automatic bulk collection by GCHQ. “The House of Commons
administration has serious questions to answer,” according to former Home Office
minister and Conservative MP David Davis. “On whose authority was ‘consent’
granted to view members’ emails? How did they manage to obtain that consent from
every one of the 650 members whose constituents’ confidentiality is affected?
“The government too has questions to answer as to why it did not explain this when
asked on many occasions about the effect of the Wilson Doctrine,” he added. “The
government should also make it clear to parliament the extent to which scanning of all
mail by a US-controlled company has made Parliamentary communications vulnerable to
agencies of a foreign power, namely the American NSA." "British
people are not demanding more transparency from the intelligence services as loudly as
Americans, the former director of the US National Security Agency (NSA) and CIA has said. Michael Hayden
played a pivotal, leading role in American intelligence until he was replaced as director
of the CIA shortly into the presidency of Barack Obama. In a wide-ranging talk on the
fourth day of the Hay festival, Hayden addressed CIA torture, targeted killings, what he
thinks about Edward
Snowden and how Facebook is perhaps a greater threat to privacy than government.Hayden
said the security services were changing faster in the US than the UK. “You as a
population are far more tolerant of aggressive action on the part of your intelligence
services than we are in the United States,” he said...The US intelligence services would not have validation from the
American people unless there was a certain amount of knowledge, an increased transparency,
he said. Hayden talked about the tensions between the need to know and the need to
protect. In his newlypublished book Hayden calls Snowden naive and narcissistic and says
he wanted to put him on a “kill list”. On the next page he said Snowden
“highlighted the need for a broad cultural shift” in terms of transparency and
what constitutes consent. On Sunday he said there was no contradiction between the two
assertions....The privacy revelations quickened a conversation which had “hit the
beach” in the US but it “has not hit the beach here in Great Britain”.
Hayden was asked about how much information we give to social media companies and whether
the public is naive in trusting Mark
Zuckerberg and Facebook more than the NSA. “I have my views on that,” he
joked. “Your habits are all geared to protecting privacy against the government
because that was always the traditional threat. That is no longer the pattern, it is the
private sector … we are going through a cultural adjustment. “With regard to the
21st-century definition of reasonable privacy, Mark Zuckerberg is probably going to have a
greater influence on that than your or my government because of the rules we will embed
inside his Facebook
applications.”" "A
provision snuck into the still-secret text of the Senate’s annual intelligence
authorization would give the FBI the ability to demand individuals’ email data and
possibly web-surfing history from their service providers without a warrant and in
complete secrecy. If passed, the change would expand
the reach of the FBI’s already highly controversial national security letters. The
FBI is currently allowed to get certain types of information with NSLs — most
commonly, information about the name, address, and call data associated with a phone
number or details about a bank account. Since a 2008 Justice Department legal opinion, the
FBI has not been allowed to use NSLs to demand “electronic communication
transactional records,” such as email subject lines and other metadata, or URLs
visited. The spy bill passed the Senate Intelligence Committee on Tuesday, with the
provision in it. The lone no vote came from Sen. Ron Wyden, D-Ore., who wrote
in a statement that one of the bill’s provisions “would allow any
FBI field office to demand email records without a court order, a major expansion of
federal surveillance powers.”" "FBI
officials are warning private industry partners to be on the lookout for highly stealthy
keystroke loggers that surreptitiously sniff passwords and other input typed into wireless keyboards. The FBI's Private
Industry Notification is dated April 29, more than 15 months after whitehat hacker
Samy Kamkar released a KeySweeper, a proof-of-concept
attack platform that covertly logged and decrypted keystrokes from many Microsoft-branded
wireless keyboards and transmitted the data over cellular networks. To lower the
chances that the sniffing device might be discovered by a target, Kamkar designed it to
look almost identical to USB phone chargers that are nearly ubiquitous in homes and
offices. "If placed strategically in an office or other location where individuals
might use wireless devices, a malicious cyber actor could potentially harvest personally
identifiable information, intellectual property, trade secrets, passwords, or other
sensitive information," FBI officials wrote in last month's advisory. "Since the
data is intercepted prior to reaching the CPU, security managers may not have insight into
how sensitive information is being stolen."" "The
30 million or so surveillance cameras peering into nearly every corner of American life
might freak you out a bit, but you could always tell yourself that no one can access them
all. Until now. Computer scientists have created a way of letting law enforcement tap any
camera that isn’t password protected so they can determine where to send help or how
to respond to a crime. “It’s a way to help
people take advantage of information that’s out there,” says David Ebert, an
electrical and computer engineer at Purdue University. The system, which is just a proof
of concept, alarms privacy advocates who worry that prudent surveillance could easily lead
to government overreach, or worse, unauthorized use. It relies upon two tools developed
independently at Purdue. The Visual Analytics Law Enforcement Toolkit superimposes the
rate and location of crimes and the location of police surveillance cameras. CAM2 reveals
the location and orientation of public network cameras, like the one outside your
apartment. You could do the same thing with a search engine like Shodan, but CAM2 makes
the job far easier, which is the scary part. Aggregating all these individual feeds makes
it potentially much more invasive. Purdue limits access to registered users, and the terms
of service for CAM2 state “you agree not to use the platform to determine the
identity of any specific individuals contained in any video or video stream.” A
reasonable step to ensure privacy, but difficult to enforce (though the team promises the
system will have strict security if it ever goes online)." "By preying on the modern
necessity to stay connected, governments can reduce our dignity to something like that of
tagged animals, the primary difference being that we paid for the tags and they’re in
our pockets. It sounds like fantasist paranoia, but on the technical level it’s so
trivial to implement that I cannot imagine a future in which it won’t be attempted. It will be limited to the war zones at first, in accordance with our
customs, but surveillance technology has a tendency to follow us home. Here we see the
double edge of our uniquely American brand of nationalism. We are raised to be
exceptionalists, to think we are the better nation with the manifest destiny to rule. The
danger is that some people will actually believe this claim, and some of those will expect
the manifestation of our national identity, that is, our government, to comport itself
accordingly. Unrestrained power may be many things, but it’s not American. It is in
this sense that the act of whistleblowing increasingly has become an act of political
resistance. The whistleblower raises the alarm and lifts the lamp, inheriting the legacy
of a line of Americans that begins with Paul Revere. The individuals who make these
disclosures feel so strongly about what they have seen that they’re willing to risk
their lives and their freedom. They know that we, the people, are ultimately the strongest
and most reliable check on the power of government. The insiders at the highest levels of
government have extraordinary capability, extraordinary resources, tremendous access to
influence, and a monopoly on violence, but in the final calculus there is but one figure
that matters: the individual citizen. And there are more of us than there are of
them." "A
secretive police unit tasked with spying on alleged extremists intent on committing
serious crimes has been monitoring leading members of the Green party, the Guardian has
learned. Newly released documents show that the intelligence unit has been tracking the
political activities of the MP Caroline
Lucas and Sian Berry,
the party’s candidate for London mayor. Some of the monitoring took place as recently
as last year and seemed to contradict a pledge from Sir Bernard Hogan-Howe, the Metropolitan police commissioner,
that the unit would only target serious
criminals rather than peaceful protesters.
Extracts from the files show that the police have chronicled how the Green politicians had
been speaking out about issues such as government cuts, the far right, police violence,
and the visit of the pope. The police’s actions have been described as
“chilling” and come weeks after it was accused of abusing its powers by pursuing
prominent people over sex abuse claims. The disclosures bring to four the number of
elected Green
party politicians whose political movements are known to have been recorded in the
files of the unit. The files give no indication that they were involved in serious
criminal activity. The file on Lucas, which stretches
over eight years, records how she gave a
speech at an anti-austerity demonstration last June in London. Lucas accused the
government of conducting an “ideological war on welfare” at the rally, attended
by thousands. Another entry records how she attended a demonstration in February 2014 against disability
cuts in Brighton where she has been an MP since 2010. Police noted she “spoke with
some of the assembled” journalists. She is also
logged as attending a demonstration in Brighton in April 2014 opposing a
far-right march in the city. Lucas said: “Spending precious resources on
monitoring elected politicians is a clear waste of the public’s money – and
sends a chilling message to those who want to engage in peaceful political demonstrations.
Nobody should be subject to arbitrary surveillance. “It’s this kind of thinking
that has led police in this country to waste vast amounts of taxpayers’ money in
infiltrating environmental groups. The police should focus resources on fighting real
crime, not attempting to stifle legitimate protest.”...The
police’s domestic extremism unit – which operates across the country and is
based within the Met – has kept files on thousands of protesters, saying that it needed to
identify those who use, or may use, criminal methods to further their political aims.
However, police have faced
criticism for tracking campaigners who have not committed crimes and for storing
mundane information, such as the sale
of political literature by an activist at the Glastonbury music festival. Hogan-Howe has said that in October 2013, the unit tightened up its
procedures so that it would focus on individuals who commit or plan “serious
criminal activity motivated by a political or ideological viewpoint”. He said it
would usually exclude “low levels of civil disobedience such as civil trespass or
minor obstruction”. Three of the four Green
politicians – including Ian Driver,
who was monitored between 2011 and 2014 while he was a Kent councillor and Baroness Jenny
Jones, the Green’s candidate for London mayor in 2012 – do not have a criminal
record. Lucas was fined for breaching the peace after she and other demonstrators blocked traffic outside a nuclear
weapons base in 2001. She was
acquitted of public order offences at an anti-fracking protest in Sussex in 2013. The
police file also records how she took part in environmental demonstrations in 2008 and
2009, while she was an MEP.... Peter Francis, a
whistleblower who worked undercover for the Met, has alleged that the police
kept secret files in the 1990s on 10 Labour MPs, including the Labour
leader, Jeremy Corbyn, after they had been elected to parliament." "In real life, Jim Angleton was a
formidable intellectual and canny bureaucrat who helped shape the ethos of the Central
Intelligence Agency we have today. His doctrine of counterintelligence was widely
influential, not only in the CIA but in the intelligence services of all the
English-speaking countries. He pioneered pre-digital
techniques of mass surveillance via an illicit mail-opening program called LINGUAL....Angleton acted zealously on a theory of history whose validity is hard
to accept and hard to dispute. He believed that secret intelligence agencies controlled
the destiny of mankind.... Yet it wasn’t until I went to Georgetown in search of one
of Angleton’s darkest secrets that I came away with a personal lesson in how the CIA
makes history — by erasing it..... By removing the Cram and Applewhite papers from
public view, the agency has, in essence, redacted some of the details of an embarrassing
chapter in the agency’s history. But while the records technically remain in the
hands of Georgetown and off-limits to FOIA [Freedom of Information Act], the CIA kept this
harmless material beyond the reach of law and the eyes of reporters and historians." "Since 2005 successive Home Secretaries have authorised the collection of
vast amounts of telecommunications data, documents reveal. The documents also show that
MI5 secretly collected large amounts of "anonymised" financial data. Campaign
group Privacy International said the documents show "the staggering extent of UK
government surveillance". The Home Office said the data acquisition had "been
essential to the security and intelligence agencies". It added that the data had
provided "vital and unique intelligence". The disclosure of the documents was
made to Privacy International as it prepares for an Investigatory Powers Tribunal hearing
in July. The tribunal handles complaints against UK intelligence agencies MI5, MI6 and
GCHQ. The campaign group is challenging the agencies use and acquisition of "bulk
personal datasets" - very large amounts of personal data collected from public and
private organisations. The Home Office has repeatedly refused to list the datasets the
agencies hold, but the documents show the agencies could request a range of sensitive
information, including medical information, financial
information, and information about telephone and internet communications. The documents reveal that among other things this data is vital in
identifying "foreign fighters", possibly a reference to jihadists involved in
the conflict in Syria and Iraq. Privacy International said: "The intelligence
agencies have secretly given themselves access to potentially any and all recorded
information about us". But the Home Office told the BBC: "The acquisition and
use of bulk [data] provides vital and unique intelligence", adding: "The
security and intelligence agencies use the same techniques that modern businesses
increasingly rely on to analyse data in order to overcome the most significant national
security challenges". In several documents the risk that the public might become
aware of the powers is discussed. An MI5 policy issued in 2010 says the agency's access to
"anonymised" financial data would be against "public expectations". It
says that if the data is revealed the media response could be "unfavourable and
probably inaccurate". David Davis MP, a former
Conservative Shadow Home Secretary, told the BBC: "It's clear the agencies and the
government have been keeping information secret about what they've been doing not just for
security reasons, as is normally claimed, but to avoid both embarrassment and public
opposition." Every six months since 21 July
2005, Home Secretaries have authorised MI5 to collect in a database, information from
communication network providers, the documents reveal. This could include telephone data
and internet data. It does not include the content of communications. The documents say
the data is anonymous as it does not contain "subscriber information", but
privacy campaigners argue it would be possible work out the identity of an individual from
the data. MI5 says the data is deleted every 12 months. In the documents the data is said
to be of "significant security value." The
data is obtained under Section 94 of the Telecommunications Act 1984. The government's
independent reviewer of terrorism legislation, David Anderson QC, has previously told the
BBC the legislation was "so vague that anything could be done under it". The documents set out detailed procedures required to authorise the
collection and use of the data. But they reveal that misuse has occurred. One document
produced by MI6 gives examples of "individual users crossing the line" for
example, "looking up addresses in order to send birthday cards" and
"checking details of family members for personal reasons". The revelations will
add to the controversy surrounding the Investigatory Powers Bill currently working its way
through parliament." "Hackers
have again demonstrated that no matter how many security precautions someone takes, all a
hacker needs to track their location and snoop on their phone calls and texts is their
phone number. The hack, first demonstrated by German
security researcher Karsten Nohl in 2014 at a
hacker convention in Hamburg, has been shown to still be active by Nohl over a year
later for
CBS’s 60 Minutes. The hack uses the network interchange service called Signalling System No. 7 (SS7), also
known as C7 in the UK or CCSS7 in the US, which acts as a broker between mobile phone
networks. When calls or text messages are made across networks SS7 handles details such as
number translation, SMS transfer, billing and other back-end duties that connect one
network or caller to another. By hacking into or otherwise gaining access to the SS7
system, an attacker can track a person’s location based on mobile phone mast
triangulation, read their sent and received text messages, and log, record and listen into
their phone calls, simply by using their phone number as an identifier..... The biggest
issue for consumers is that there is little they can do to safeguard against this kind of
snooping, short of turning off their mobile phone, as the attack happens on the network
side, regardless of the phone used. Nohl said: “The mobile network is independent
from the little GPS chip in your phone, it knows where you are. So any choices that a congressman could’ve made, choosing a
phone, choosing a pin number, installing or not installing certain apps, have no influence
over what we are showing because this is targeting the mobile network. That, of course, is not controlled by any one customer.” Hackers have
proven that they can break into SS7, but security
services, including the US National Security Agency, are also thought to use the system to
track and snoop on target users." "Uber
Technologies Inc on Tuesday released its first ever transparency report detailing the
information requested by not only U.S. law enforcement agencies, but also by regulators.
The ride-sharing company said that between July and December 2015, it had provided
information on more than 12 million riders and drivers to various U.S. regulators and on
469 users to state and federal law agencies. The
privately held company, valued at more than $60 billion, said the agencies requested
information on trips, trip requests, pickup and dropoff areas, fares, vehicles, and
drivers. Uber said it got 415 requests from law enforcement agencies, a majority of which
came from state governments, and that it was able to provide data in nearly 85 percent of
the cases. A large number of the law enforcement requests were related to fraud
investigations or the use of stolen credit cards, according to the report. Uber said it
had not received any national security letters or orders under the Foreign Intelligence
Surveillance act. The company has not disclosed such requests for information from other
countries." "According
to leaked documents published by German data protection authorities, Europe's most
influential privacy regulators are to say that the so-called 'Privacy Shield' accord
agreed by the EU and the US falls short of standards set by the European Court of Justice. ... Last year, the European Court Of Justice nullified the long-standing
EU-US 'Safe Harbour' data transfer treaty because it found that indiscriminate
surveillance by US authorities of EU citizens' data contravened fundamental European
rights. The ruling was the result of a case brought by Austrian student Max Schrems
against Facebook's Irish office. Mr Schrems argued
that revelations by the whistleblower Edward Snowden about US security agencies routinely
spying on Europeans' emails and messages meant that the transfer of EU citizens' personal
data to the US jurisdiction must not be allowed under European law. The ruling caused a political and legal stand-off that threatened
transatlantic trade and resulted in a new agreement called Privacy Shield." "FBI
Director James Comey has revealed he uses tape to cover up his laptop webcam to ensure
privacy. Speaking at an encryption and privacy Q&A session at Kenyon College last
week, Comey said: 'I saw something in the news, so I copied it. 'I put a piece of tape
— I have obviously a laptop, personal laptop — I put a piece of tape over the
camera. Because I saw somebody smarter than I am had a piece of tape over their camera.'
His comment was made last Wednesday in response to a question about growing public
awareness of the ways in which technology can spy on people . But many have commented
on the director's hypocrisy in doing this when he has said tech companies should not make
devices that are 'unhackable' to law enforcement. Activists argue that by putting duck
tape over his webcam, he is doing just that. Just two weeks ago, the FBI
dropped its court case attempting to force Apple to hack into an iPhone belonging to the
San Bernardino terrorists.... The FBI has long been able to activate a computer's camera
without triggering the 'recording light' to let the owner know the webcam is on, a former
assistant director of its tech division has said. Their usage of remote administration
tools (RATs) comes to light as the world's most powerful technology firms call on Barack
Obama to curb government spying on internet users. The FBI have been able to
use the spyware technology for years and have put it in place in terrorism cases or the
most serious criminal investigations, Marcus Thomas, former assistant director of the
FBI's Operational Technology Division in Quantico, told The Washington Post. The team use
the same technique as ratters, by infecting the computer with a malicious software –
'malware – through phishing. By sending an email with a link, which could be to a
website, an image or a video, the user is tricked into downloading a small piece of
software onto their machine. Once installed, the malware allows the FBI to take control of
the computer and the webcam at any time, working similarly to the system large
corporations use to update software and fix IT problems." "Government plans to track
every website visited by every British citizen could cost more than £1bn, privacy
campaigners have estimated. The £1bn estimate for
the cost of requiring phone and internet companies to retain everyone’s internet
connection records and store them for 12 months is based on a similar scheme in Denmark,
which was recently dropped on grounds of cost. The Don’t Spy on Us coalition, which
includes the Open Rights Group and Privacy
International, says that the £1bn price tag for the new powers for the police and
security services to access everyone’s web browsing history compares with the initial
official Home Office estimate of only £174m over 10 years. The British internet industry
has already made clear that it regards the £174m figure as an underestimate. The
president of BT Security has told MPs that the allocated amount would only cover BT’s
costs, and Virgin Media has said its costs will be “in the tens of millions”.
The Home Office is reconsidering its initial cost estimate. The Danish government recently
shelved similar proposals to monitor the web browsing habits of Danish citizens after
accountancy giant Ernst & Young, confirmed it would cost 1bn Danish kroner (£105m) to
implement. This estimate only covered the equipment investment and did not include annual
operating costs. Don’t Spy on Us says that as Britain’s population, at 64
million, is more than 11 times that of Denmark’s 5.6 million, the cost of a similar
internet record system in Britain would be more than £1bn. It estimates that this bill,
which is to be paid in full by the Home Office, is equivalent to the cost of employing
3,000 more full-time police officers." "Marc
Newlin and Balint Seeber are checking how far apart they can be while still being able to
hack into each other's computers. It turns out its pretty far - 180 meters - the length of a city block in
San Francisco. The pair work for Bastille, a startup
cyber security company that has uncovered a flaw they say leaves millions of networks and
billions of computers vulnerable to attack. Wireless mice from companies like HP,
Lenovo, Amazon and Dell use unencrypted signals to communicate with
computers. "They haven't encrypted the mouse traffic, that makes it possible for
the attacker to send unencrypted traffic to the dongle pretending to be a keyboard and
have it result as keystrokes on your computer. This would be the same as if the attacker
was sitting at your computer typing on the computer," said Newlin, a security
researcher at Bastille. A hacker uses an
antenna, a wireless chip called a dongle, both available for the less $20 (USD), and a
simple line of code to trick the wireless chip connected to the target computer into
accepting it as a mouse. "So the attacker can send data to the dongle, pretend it's a
mouse but say 'actually I am a keyboard and please type these letters'," added
Newlin. "If we sent unencrypted keyboard strokes as if we were a mouse it
started typing on the computer, typing at a 1000 words per minute," said Chris
Rouland, the CTO and Founder of Bastille. At a thousand words a minute, the hacker
can take over the computer or gain access to a network within seconds." "Today,
two representatives from the House Oversight & Government Reform Committee sent
a letter (PDF) to Michael Rogers, director of the National Security Agency (NSA),
asking him to discontinue any plans to expand the list of who the NSA shares certain
information with. In late February, The New York
Times reported
that the Obama administration was working with the NSA to craft new rules and
procedures to allow domestic law enforcement organizations like the Federal Bureau of
Investigation (FBI) and the Drug Enforcement Administration (DEA) access to the digital
communications information that the NSA collects through
programs like PRISM. Under the new rules, domestic law enforcement agencies would be
able to access raw information that the NSA collects, without the so-called 'minimization'
process that the NSA has formerly employed to scrub surveillance information of
identifying data pertaining to American citizens before handing it over to the requesting
agency. 'We are alarmed by press reports that state
National Security Agency (NSA) data may soon routinely be used
for domestic policing,' Representative Ted Lieu (D-Calif.)
and Representative Blake Farenthold (R-Tex.) wrote. 'If media accounts are true, this
radical policy shift by the NSA would be unconstitutional, and dangerous.'" "At
the Federal Bureau of Investigation’s request, a magistrate judge canceled a court
hearing scheduled for Tuesday to determine whether Apple should be compelled to help the
U.S. gain access to a locked iPhone used by an attacker who killed 14 people last year in
San Bernardino, California. The bureau said it was approached on Sunday by an unidentified
third party with a possible way to get into the phone without Apple’s help. The FBI’s new tactic may be subject to a relatively new and
little-known rule that would require the government to tell Apple about any vulnerability
potentially affecting millions of iPhones unless it can show a group of administration
officials that there’s a substantial national security need to keep the flaw secret.
This process, known as an equities review, was created by the Obama administration to
determine if new security flaws should be kept secret or disclosed, and gives the
government a specific time frame for alerting companies to the flaws. 'I do think it
should be subjected to an equities review,' said Chris Inglis, former National Security
Agency deputy director. 'The government cannot choose sides in the tension between
individual and collective security so the equities process should be run to put both on a
level playing field.'" "NSA whistleblower Edward Snowden
opened the Free Software Foundation's LibrePlanet
2016 conference on Saturday with a discussion of free software, privacy and security,
speaking via video conference from Russia. Snowden credited free software for his ability
to help disclose the U.S. government's far-reaching surveillance projects – drawing
one of several enthusiastic rounds of applause from the crowd in an MIT lecture hall.
"What happened in 2013 couldn't have happened without free software," he said,
particularly citing projects like Tor, Tails (a highly secure Linux distribution) and
Debian. Snowden argued that free software's transparency and openness are cornerstones to
preserving user privacy in the connected age. It
isn't that all commercial products are bad, nor that all corporations are evil – he
singled out Apple's ongoing spat with the FBI as an example of a corporation trying to
stand up for its users – merely that citizens should not have to rely on them to
uphold the right to privacy. "I didn't use Microsoft machines when I was in my
operational phase, because I couldn't trust them," Snowden stated. "Not because
I knew that there was a particular back door or anything like that, but because I couldn't
be sure." Private data, these days, only stays private at the sufferance of the major
tech companies that administer devices and services, he argued. Given the increasing
centrality of smartphones and social networks and the myriad of other digital
communication methods to modern life, simply trusting that those tech companies will
protect their users' privacy is insufficient. Relying
on corporations to protect private data is bad enough in a vacuum – but Snowden
pointed out that many tech giants have already proven more than willing to hand over user
data to a government they rely on for licensing and a favorable regulatory climate.He
particularly singled out service providers as being complicit in overreaching government
surveillance. "We can't control telecom partners," Snowden stated. "We're
very vulnerable to them."" "The US government is heavily invested
in an internal surveillance program that is unsustainable, ineffective, morally
reprehensible, inherently dangerous and ultimately counterproductive. In the months
following the US government’s initial charges against me over the release of
government records in 2010, the current administration formed the National
Insider Threat Task Force under the authority of the Office of the Director of
National Intelligence (ODNI), the Department of Justice, the Federal Bureau of
Investigation and several other US government agencies. The mission of this taskforce is
breathtakingly broad. It aims at deterring threats to national security by anyone 'who
misuses or betrays, wittingly or unwittingly, his or her authorized access to any US
Government resource'. Unfortunately, the methods it outlines amount to thousands of government personnel being effectively under total
surveillance. These kinds of operations usually result in doing more harm than good.
As articulated by James Detert and Ethan Burris in a recent Harvard
Business Review article, such training and surveillance programs greatly diminish
productive and innovative capabilities within organizations. They have a tendency to 'promote fear of embarrassment, isolation, low
performance ratings, lost promotions, and even firing'. When your employer is the US
government, that fear – of surveillance, public humiliation, warrants, arrest, trial,
exorbitant legal fees and imprisonment – is orders of magnitude higher. Flaws in the
program exacerbate these problems. There is a reliance on 'anonymous feedback' which can
create endless witch-hunts, 'general invitations' to report or file complaints through
so-called open door policies, and vagueness about what feedback is expected. According to
Deter and Burris, the program creates a perfect storm of conditions against innovation,
creativity and whistleblowing. The implementation of the Insider Threat program has shown
predictably troubling results. For example, an ODNI webinar, entitled Simple Steps and
Guidance to Secure Classified Networks, describes excessive surveillance protocols and
invasive secret investigations by the US government and military into their own officials.
In its early stages, it has become clear that this program conflates any attempt to seek
redress, transparency or the promotion of legitimate public interests with grave threats
to national security." "Thanks largely to whistleblower
Edward Snowden’s revelations in 2013, most Americans now realize that the
intelligence community monitors and archives all sorts of online behaviors of both foreign
nationals and US citizens. But did you know that the very fact that you know this could
have subliminally stopped you from speaking out online on issues you care about? Now
research suggests that widespread awareness of such mass surveillance could undermine
democracy by making citizens fearful of voicing dissenting opinions in public. A paper published last week in Journalism and Mass Communication
Quarterly, the flagship peer-reviewed journal of the Association for Education in
Journalism and Mass Communication (AEJMC), found that "the government’s online
surveillance programs may threaten the disclosure of minority views and contribute to the
reinforcement of majority opinion.' The NSA’s
'ability to surreptitiously monitor the online activities of US citizens may make online
opinion climates especially chilly' and 'can contribute to the silencing of minority views
that provide the bedrock of democratic discourse," the researcher found." "It’s been eight months since a
pair of security researchers proved beyond any doubt that car hacking is more than an action movie plot
device when they remotely killed
the transmission of a 2014 Jeep Cherokee as I drove it down a St. Louis highway. Now the FBI has caught up with that news, and it’s warning
Americans to take the risk of vehicular cybersabotage seriously. In a public service
announcement issued together with the Department of Transportation and the National
Highway Traffic and Safety Administration, the FBI on Thursday released a warning to
drivers about the threat of over-the-internet attacks on cars and trucks. The announcement doesn’t reveal any sign that the agencies have
learned about incidents of car hacking that weren’t already public. But it cites all
of last year’s car hacking research to offer a list of tips about how to keep
vehicles secure from hackers and recommendations about what to do if you believe your car
has been hacked—including a request to notify the FBI. In a public service
announcement issued together with the Department of Transportation and the National
Highway Traffic and Safety Administration, the FBI on Thursday released a warning to
drivers about the threat of over-the-internet attacks on cars and trucks. The announcement
doesn’t reveal any sign that the agencies have learned about incidents of car hacking
that weren’t already public. But it cites all of last year’s car hacking
research to offer a list of tips about how to keep vehicles secure from hackers and
recommendations about what to do if you believe your car has been hacked—including a
request to notify the FBI....After
hackers Charlie Miller and Chris Valasek hacked the Jeep in July, Chrysler issued a 1.4 million vehicle recall and mailed USB drives with software updates
to affected drivers. And the next month, researchers from the University of California at
San Diego showed that a common insurance dongle plugged into a Corvette’s dashboard could be
hacked to turn on the car’s windshield wipers or disable its brakes." "Bulk data gathering programs used by
US intelligence have no effect in combating terrorism and have failed to prevent any
attacks in their 10 years of operation, whistleblower and former NSA contactor Edward
Snowden, claims in a recent interview. 'In the wake
of the revelations of mass surveillance the [US] president [Barack Obama] appointed two
independent commissions to review the efficiency of these [surveillance] programs, what
they really did and what effect they had in combating terrorism. [The commissions
comprised] the highest priests of these programs, they found these programs had never
stopped a single terrorist attack and never made a concrete difference in a terrorist
investigation,' Snowden told Spanish TV channel Sexta.The
whistleblower went on saying, that 'they [the NSA, CIA] violated the constitution and the
rights of 330 million Americans for 10 years. We have to ask ourselves: was it ever worth
it?'He also stated that despite being justified by preventing terrorist attacks,
surveillance programs are more often used for completely different purposes. "It was
diplomatic manipulation, economic spying and social control. It was about power, and there
is no doubt that mass surveillance increases the power of the government." Snowden
stressed that bulk data collection is 'more aggressive and invasive today than it was
before. Law enforcement and intelligence structures do not any longer bother to pick up a
suspect and hack his cell phone, they cut in into all lines and communications […] at
the heart of the society.' According to the whistleblower, the US is by far not the only
country using methods of this form of surveillance, with Spanish, French, German and
British governments also spying on their people extensively because progress in
communication technologies 'had made it cheap, had made it easy, had made it simple
[…] The paradigm we had inherited from the past had changed, so instead of watching a
particular individual we began watching everyone all of the time because of the advances
in technology had made it cheap easy simple – just in case they became interesting
later.'" "The first thing to understand about
Apple’s latest fight with the FBI—over a court order to help
unlock the deceased San Bernardino shooter’s phone—is that it has very
little to do with the San Bernardino shooter’s phone.It’s not even, really, the
latest round of the Crypto Wars—the long running debate about how law enforcement and
intelligence agencies can adapt to the growing ubiquity of uncrackable encryption tools.
Rather, it’s a fight over the future of high-tech surveillance, the trust
infrastructure undergirding the global software ecosystem, and how far technology
companies and software developers can be conscripted as unwilling suppliers of hacking
tools for governments. It’s also the public face of a conflict that will undoubtedly
be continued in secret—and is likely already well underway....Most ominously, the effects of a win for the FBI in this case
almost certainly won’t be limited to smartphones. Over the past year I worked with a
group of experts at Harvard Law School on a report
that predicted governments will to respond to the challenges encryption poses by turning
to the burgeoning “Internet of Things” to create a global network of
surveillance devices. Armed with code blessed by the developer’s secret key,
governments will be able to deliver spyware in the form of trusted updates to a host of
sensor-enabled appliances. Don’t just think of the webcam and microphone on your
laptop, but voice-control devices like Amazon’s Echo, smart televisions, network
routers, wearable computing devices and even Hello
Barbie. The global market for both traditional
computing devices and the new breed of networked appliances depends critically on an
underlying ecosystem of trust—trust that critical security updates pushed out by
developers and signed by their cryptographic keys will do what it says on the tin,
functioning and interacting with other code in a predictable and uniform way. The
developer keys that mark code as trusted are critical to that ecosystem, which will become
ever more difficult to sustain if developers can be systematically forced to deploy those
keys at the behest of governments. Users and
consumers will reasonably be even more distrustful if the scope of governments’
ability to demand spyware disguised as authentic updates is determined, not by a clear
framework, but a hodgepodge of public and secret court decisions. These, then, are the high stakes of Apple’s resistance to the
FBI’s order: not whether the federal government can read one dead terrorism
suspect’s phone, but whether technology companies can be conscripted to undermine
global trust in our computing devices. That’s a staggeringly high price to pay for
any investigation." "A "Data Mining Research Problem
Book" marked "top secret strap 1" has been leaked that details some of the
key techniques used by GCHQ to sift through the huge volumes of data it pulls continuously
from the Internet. Originally obtained by Edward Snowden, the 96-page e-book has been
published by Boing Boing, along with a second short document entitled "What's the
worst that can happen?". Boing Boing describes this as "a kind of checklist for
spies who are seeking permission to infect their adversaries' computers or networks with
malicious software." The data
mining handbook was written by researchers from the Heilbronn Institute for
Mathematical Research in Bristol, a partnership between GCHQ and the University of
Bristol. According to
Boing Boing, "Staff spend half their time working on public research, the other
half is given over to secret projects for the government." The handbook provides
valuable insights into some of the details of GCHQ's data mining work, at least as it was
in September 2011, when the document was written....When Ars asked GCHQ whether the leaked
document was genuine, a spokesperson said: "We have no comment to make on the
story," and simply offered its boilerplate reply to all such requests: "It is
longstanding policy that we do not comment on intelligence matters. Furthermore, all of
GCHQ's work is carried out in accordance with a strict legal and policy framework, which
ensures that our activities are authorised, necessary and proportionate, and that there is
rigorous oversight, including from the Secretary of State, the Interception and
Intelligence Services Commissioners and the Parliamentary Intelligence and Security
Committee. All our operational processes rigorously support this position. In addition,
the UK's interception regime is entirely compatible with the European Convention on Human
Rights." That last claim is about to be tested in court. As
Ars reported recently, the European Court of Human Rights (ECtHR) has said that blanket
surveillance without sufficient safeguards is a violation of basic rights. A ruling by
the EctHR on whether GCHQ's activities are "entirely compatible with the European
Convention on Human Rights" is expected soon." "Shodan,
a search engine for the Internet of Things (IoT), recently launched a new
section that lets users easily browse vulnerable webcams. The feed includes images of
marijuana plantations, back rooms of banks, children, kitchens, living rooms, garages,
front gardens, back gardens, ski slopes, swimming pools, colleges and schools,
laboratories, and cash register cameras in retail stores, according to Dan Tentler, a security researcher who has spent
several years investigating webcam security. "It's all over the place," he told
Ars Technica UK. "Practically everything you can think of." We did a quick
search and turned up some alarming results: The cameras are vulnerable because they use
the Real Time Streaming Protocol (RTSP, port 554) to share video but have no password
authentication in place. The image feed is available
to paid Shodan members at images.shodan.io. Free
Shodan accounts can also search using the filter port:554
has_screenshot:true. Shodan crawls the Internet at random looking for IP addresses
with open ports. If an open port lacks authentication and streams a video feed, the new
script takes a snap and moves on. While the privacy implications here are obvious,
Shodan’s new image feed also highlights the pathetic state of IoT security, and
raises questions about what we are going to do to fix the problem. Of course insecure
webcams are not exactly a new thing. The last several years have seen report after report
after report hammer home the point. In 2013, the FTC
sanctioned webcam manufacturer TRENDnet for exposing “the private lives of
hundreds of consumers to public viewing on the Internet.” Tentler told Ars he
estimates there are now millions of such insecure webcams connected and easily
discoverable with Shodan. That number will only continue to grow. Tentler told Ars
that webcam manufacturers are in a race to bottom. Consumers do not perceive value in
security and privacy. As a rule, many have not shown a willingness to pay for such things.
As a result, webcam manufacturers slash costs to maximize their profit, often on narrow
margins. Many webcams now sell for as little as £15 or $20.... "The bigger picture
here is not just personal privacy, but the security of IoT devices," security
researcher Scott Erven told Ars Technica UK.
"As we expand that connectivity, when we get into systems that affect public safety
and human life—medical devices, the automotive space, critical
infrastructure—the consequences of failure are higher than something as shocking as a
Shodan webcam peering into the baby's crib." "WikiLeaks published a new set
of documents Tuesday claiming that the United States National Security Agency
(NSA) spied on meetings between world leaders, including the United Nations Secretary
General Ban Ki-Moon, German Chancellor Angela Merkel and Israel Prime Minister Benjamin
Netanyahu. WikiLeaks said in a statement released Tuesday that the documents were
classified as “Top Secret” and were the most highly
classified documents ever to be published by a media organization. The document said that the meeting
between Merkel and Ban was about climate change, over which an accord was signed by nearly
200 countries in December agreeing
to reduce greenhouse emissions to keep the effects of global warming at bay. The document
claims that the NSA spied on the meeting with a motive of protecting the
largest oil companies.... The document also revealed that U.S. officials tapped a
meeting in 2010 between Netanyahu and former Italian Prime Minister Silvio Berlusconi,
where the former asked for the Italian leader’s help to deal with U.S. President
Barack Obama. The documents also mentioned another meeting between Berlusconi and former
French President Nicolas
Sarkozy during which the former admitted that the Italian banking system was due to
“pop like a cork.” The documents further said that a private meeting
between Berlusconi, Merkel and Sarkozy was tapped by the NSA, which has been embroiled in
controversy since it was revealed by former U.S. spy agency contractor Edward Snowden that
the organization spied on many world leaders and collected phone
records of several Americans. In June last year, the Congress passed a law that ended
keeping such records on phone calls of American citizens and it was put in place in
November. Assange also said in the statement:
“The U.S. government has signed agreements with the U.N. that it will not engage in
such conduct against the U.N. — let alone its Secretary
General. It will be interesting to see the U.N.'s reaction, because if the Secretary
General can be targeted without consequence then everyone from world leader to street
sweeper is at risk.”" "A
spokesman for the German interior ministry announced on Monday that the government had
approved the usage of Trojans to monitor suspected citizens. The interior ministry
spokesman defended the government's decision, saying 'basically we now have the skills in
an area where we did not have this kind of skill.'
The program was already endorsed by members of the government in autumn 2015, the ministry
said. Trojans are software programs, also known as malware, specially designed to get into
users' computers. They are often used by hackers and thieves to gain access to somebody
else's data. In order to use the malware, government officials will have to get a court
order, allowing authorities to hack into a citizen's system. The approval will help
officials get access to the suspect's personal computer, laptop and smartphone. Once the spyware installs itself on the suspect's device, it can
skim data on the computer's hard drive and monitor ongoing chats and conversations." "A
secret memo has revealed the government's strategy for breaking into cell phones - from
bypassing encryption codes to changing the law. According to a 'decision memo' from
the National Security Council, seen by Bloomberg,
security agents were ordered to start finding ways to hack into encrypted devices last
November. In the memo, security officials are tasked with finding encryption code
'workarounds', told to identify laws that may need to be changed to allow access, and
estimating additional money required to do it. The
memo, produced by some of the country's top-ranking officials, was finalized days after
the government said it would not force companies to install 'backdoors' in their products.
Robert Knake, a senior fellow at the Council of Foreign Relations who formerly served as
White House Director of Cybersecurity Policy, said: 'My sense is that people have
over-read what the White House has said on encryption. 'They said they wouldn’t seek
to legislate "backdoors" in these technologies. They didn’t say they
wouldn’t try to access the data in other ways.' The memo was approved by the
NSC’s Deputies Committee, according to Bloomberg. While the deputies’ committee
changes depending on the subject matter, it typically includes at least a dozen
sub-cabinet level officials, among them the deputy attorney general, the vice chairman of
the joint chiefs of staff, and the deputy national security adviser. The memo was
revealed on Friday, days after Apple said it will fight a court order to create a
'backdoor' into its own products by FBI agents trying to get into the iPhone used by San
Bernardino killers Tashfeen Malik and Syed Farook." "The first thing to understand about
Apple’s latest fight with the FBI—over a court order to help
unlock the deceased San Bernardino shooter’s phone—is that it has very
little to do with the San Bernardino shooter’s phone. It’s not even, really, the
latest round of the Crypto Wars—the long running debate about how law enforcement and
intelligence agencies can adapt to the growing ubiquity of uncrackable encryption
tools.Rather, it’s a fight over the future of
high-tech surveillance, the trust infrastructure undergirding the global software
ecosystem, and how far technology companies and software developers can be conscripted as
unwilling suppliers of hacking tools for governments. It’s also the public face of a
conflict that will undoubtedly be continued in secret—and is likely already well
underway." "Tech giants Google and WhatsApp and
whistleblower Edward Snowden are backing Apple’s stance over the encryption
technology used in its iPhone smartphones. Apple has been ordered
by a US federal magistrate to help the FBI unlock the iPhone belonging to one of the
San Bernardino shooters, but in a
letter published on the company’s website, chief executive Tim Cook said his
company would fight the move. Now Google chief
executive Sundar Pichai has given the stance his backing. “Important post by
@tim_cook. Forcing companies to enable hacking could compromise users’ privacy,”
wrote Google’s boss, as part of a short series of tweets addressing the issue." "Hacking of computers, networks
and smartphones in the UK or abroad by GCHQ staff does not breach human rights, a security
tribunal has ruled. A panel of five members of the investigatory powers tribunal (IPT)
decided on Friday that computer network exploitation (CNE), which may involve remotely
activating microphones and cameras on electronic devices without the owners’
knowledge, is legal. In a
lengthy judgment, the IPT, which deals with complaints about surveillance and the
intelligence services, found in favour of the Cheltenham-based monitoring agency and the
Foreign Office. It dismissed complaints brought by the campaign group Privacy
International and seven internet service providers from around the world. The case, which was
heard last year, was the first in which GCHQ admitted to carrying out
“persistent” hacking in the UK and overseas. Some sessions of the IPT are closed
and held in secret." "James
Clapper, the US director of national intelligence, told lawmakers Tuesday that governments
across the globe are likely to employ the Internet of Things as a spy tool, which will add
to global instability already being caused by infectious disease, hunger, climate change,
and artificial intelligence. Clapper addressed two different committees on
Tuesday—the Senate Armed Services Committee and the Senate Select Committee on
Intelligence Committee—and for the first time suggested that the Internet of Things
could be weaponized by governments. He did not name
any countries or agencies in regard to the IoT, but a recent Harvard study
suggested US authorities could harvest the IoT for spying purposes. "Smart devices
incorporated into the electric grid, vehicles—including autonomous vehicles—and
household appliances are improving efficiency, energy conservation, and convenience.
However, security industry analysts have demonstrated that many of these new systems can
threaten data privacy, data integrity, or continuity of services. In the future,
intelligence services might use the loT for identification, surveillance, monitoring,
location tracking, and targeting for recruitment, or to gain access to networks or user
credentials," Clapper said (PDF),
according to his prepared testimony before the Senate Select Committee on Intelligence.
During his live appearance before
the Senate Armed Services Committee, Clapper testified that "unpredictable
instabilities have become the new normal and this trend will continue for the
unforeseeable future." He said that infectious diseases like Zika,
government instability, and the 60 million displaced people across the globe are adding to
the world's instability. But there's more. "Extreme weather, climate change,
environmental degradation, rising demand for food and water, poor policy decisions and
inadequate infrastructure will magnify this instability," he said. But
"technological innovation," he added, "will have an even more significant
impact on our way of life. "This innovation is central to our economic prosperity but
it will bring new security vulnerabilities. The Internet of Things will connect tens of
billions of new physical devices that could be exploited. Artificial intelligence will
enable computers to make autonomous decisions about data and physical systems, and
potentially disrupt labor markets," Clapper told the Armed Services Committee.
Clapper's remarks on the Internet of Things are remarkable because they come from the
nation's top spy chief, and they likely mean that US spy agencies are trying to exploit
it. Two weeks ago, a Berkman Center for Internet
& Society report from Harvard University concluded that "If the Internet of
Things has as much impact as is predicted, the future will be even more laden with sensors
that can be commandeered for law enforcement surveillance; and this is a world far apart
from one in which opportunities for surveillance have gone dark. It is vital to appreciate
these trends and to make thoughtful decisions about how pervasively open to surveillance
we think our built environments should be—by home and
foreign governments, and by the companies who offer the
products that are transforming our
personal spaces." (PDF) As noted by
Trevor Timm, the executive director of the Freedom of the Press Foundation, the
importance of Clapper's IoT statements must be considered against the backdrop of the
increasing proliferation of Internet-connected devices, from refrigerators to cars." "BRITAIN’S
spies should not be allowed to bug dozens of phones and computers from any organisation at
once, a powerful committee of MPs has warned. Ministers
plan to give the sweeping power to MI5, MI6 and GCHQ as part of a major update to keep
pace with technology. ‘Bulk equipment interference’ warrants would allow spooks
to tap into phones and iPads and even use them as covert listening devices across an
entire hostile group, such as an enemy foreign embassy or a radical organisation. But the
Intelligence and Security Committee yesterday called for the controversial move to be
abandoned, as there is no “sufficiently compelling evidence” for it. The damning
verdict is one of a series of serious criticisms made by the Westminster grandees on the
landmark draft Investigatory Powers Bill." "A
planned British law to give spies and the police wide-ranging new surveillance powers is
rushed, does not do enough to protect people's privacy and requires major change, a
powerful committee of lawmakers said on Tuesday. The bill was unveiled in November after
police and intelligence agencies warned they had fallen behind those they were trying to
track, as advances in technology and the growth of services like Skype and Facebook
increasingly put criminals beyond their reach. Critics say the Draft Investigatory Powers
Bill would be the West's furthest-reaching surveillance law, while tech companies have
warned it would damage their own security systems.
It would force communications firms to collect and store vast reams of data about almost
every click of British online activity. The bill would also oblige service providers to
help intercept data and hack suspects' devices. "Overall, the privacy protections are
inconsistent and in our view need strengthening," parliament's Intelligence and
Security Committee (ISC) said in a report. "The draft bill appears to have suffered
from a lack of sufficient time and preparation," it added, saying the bill adopted a
"rather piecemeal approach" to privacy protection which it said should have
formed the backbone to the measure. Debate about how to protect privacy while helping
agencies operate in the digital age has raged since former U.S. intelligence contractor
Edward Snowden leaked details of mass surveillance by British and U.S. spies in 2013.The
British bill, which comes before parliament later this year, is being watched closely by
governments and tech companies around the world." "If
U.S. and British negotiators have their way, MI5, the British domestic security service,
could one day go directly to American companies such as Facebook or Google with a wiretap
order for the online chats of British suspects in a counterterrorism investigation. The
transatlantic allies have quietly begun negotiations this month on an agreement that would
enable the British government to serve wiretap orders directly on U.S. communication firms
for live intercepts in criminal and national security investigations involving its own
citizens. Britain would also be able to serve orders
to obtain stored data, such as emails. The previously undisclosed talks are driven by what
the two sides and tech firms say is an untenable situation in which foreign governments
such as Britain cannot quickly obtain data for domestic probes because it happens to be
held by companies in the United States. The issue highlights how digital data increasingly
ignores national borders, creating vexing challenges for national security and public
safety, and new concerns about privacy. The two countries recently concluded a draft
negotiating document, which will serve as the basis for the talks. The text has not been
made public, but a copy was reviewed by The Washington Post. The British government would
not be able to directly obtain the records of Americans if a U.S. citizen or resident
surfaced in an investigation. And it would still have to follow the country’s legal
rules to obtain warrants.Any final agreement will need congressional action, through
amendments to surveillance laws such as the Wiretap Act and the Stored Communications
Act." "Scottish
officials are questioning a U.K. government decision to allow an American flight over
Scottish airspace that attempted to capture NSA leaker Edward Snowden, The
National reports. The plane was sent from the
U.S. East Coast on June 24, 2013, one day after Snowden flew from Hong Kong to Moscow, on
a "rendition" mission, according to the website. The plane flew well above the
standard 45,000 feet and did not file a flight, plan Scottish journalist Duncan Campbell
reported. Some officials sympathetic to Snowden were unhappy with the news, feeling that
British official may have been complicit in violating his rights. "As a matter of
course and courtesy, any country, particularly an ally, should be open about the purposes
of a flight and the use of foreign airspace or indeed airports," said Alex Salmond,
Scottish National Party foreign affairs spokesman. "What we need to know now is, was
this information given to the U.K. government at the time. If so, then why did they give
permission? If not, then why not?" Salmond said. "As a minimum requirement, the
U.K. authorities should not allow any activity in breach of international law in either
its airspace or its airports."" "The
home secretary's plan to force internet service providers to store everyone's internet
activity is vague and confusing, says a committee of MPs. Police and security services
will be able to see names of sites visited in the past year without a warrant, under the
draft Investigatory Powers Bill. The science and technology Committee says its
requirements are confusing, and firms fear a rise in hacking....Committee chairman Nicola Blackwood said: "There
remain questions about the feasibility of collecting and storing internet connection
records (ICRs), including concerns about ensuring security for the records from hackers. ... Mrs May insisted in January that the Home Office had been clear about
what it meant by ICRs and was working closely with the industry on the legislation. The
science and technology committee also raised concerns about powers to allow spies to hack
into suspects' smartphones or computers, known as "equipment interference"....Ms
Blackwood said the technique may "occasionally be necessary", but added: "The tech industry has legitimate concerns about the reaction
of their customers to the possibility that electronic devices could be hacked by the
security services.'" "A
joint UK-US intelligence programme has been spying on electronic feeds – including
video – from
Israel’s military drones and jet fighters going back to 1998. In a
potentially embarrassing disclosure for Israel, which prides itself on its technical
capabilities, a new release from material held by the former NSA contractor Edward Snowden has revealed that
UK and US intelligence officials have been regularly accessing Israeli cockpit cameras
even in the midst of operations in Gaza and Lebanon. Codenamed
Anarchist, the programme was revealed by the
Intercept, a US website. The revelation – while played down by Israeli defence
sources – has demonstrated again the level of surveillance aimed at Israel by countries usually
regarded as friendly. The drone feeds were reportedly hacked using freely available
software similar to that used to access subscriber-only TV channels, the report said.
According to the Intercept, the surveillance operation is run from GCHQ in Cheltenham,
Gloucestershire, and the actual surveillance undertaken from a UK base in Cyprus. Last
month, the Wall Street Journal disclosed that the US had
continued spying on the Israeli prime minister, Binyamin Netanyahu, and other top
Israeli officials despite a promise after the Snowden revelations to stop intercepting the
communications of friendly heads of state. Yuval Steinitz, Israel’s energy minister
and a member of Netanyahu’s security cabinet, sought to play down the issue but said
lessons would be learned." "On
27th January 2015 the Mayor of London, Boris Johnson, signed an order that increased the
data collected by the police's network of Automatic Number Plate Recognition (ANPR)
cameras in the capital by 300%. At the time no-one
seems to have noticed. One year on the sound of silence is still deafening. Johnson
achieved this massive increase of blanket surveillance in London without erecting a single
new camera. Instead he allowed the police to share Transport for London's (TfL) network of
around 1400 ANPR cameras used for the London Congestion Charge, the Low Emission Zone and
other traffic monitoring. This was a policy tucked away in Johnson's 2012 mayoral crime
manifesto [2]. Since 2007 the Metropolitan Police Service has controversially been allowed
limited access to TfL's congestion charge cameras for "national security"
purposes only. The new camera sharing arrangement allows the police "general
access" to an expanded raft of number plate cameras. The mayor used powers given to
him by the Greater London Authority Act [3] whereby he can do anything that he considers
will further one or more of the Authority's principle purposes. In the case of expanding
police use of automatic checkpoint cameras he decided that it will "further the
promotion of social development in Greater London". Quite how Johnson came to this
conclusion is a mystery, as is the way in which he was so easily able to trade the
freedoms of so many car drivers in London by simply issuing a mayoral decison.... No CCTV
has repeatedly warned that the UK police's ANPR camera network is the biggest mass
surveillance network that no-one's ever heard of. We have laid out many of our concerns in
our report 'What's wrong with ANPR?' [7]. Police store the details of all cars that pass
ANPR cameras in a central database for a minimum of two years. There are currently
discussions within the police to extend this to seven years. Whilst the mainstream media
have all but ignored this massive expansion of the surveillance state it is worth pointing
out that writer and artist James Bridle made a series of Freedom of Information requests
in 2013/14 that reveal much of the disturbing progression of this policy." "In
a huge win for press freedom, a UK court
of appeal ruled that the detention of journalist Glenn Greenwald’s partner, David
Miranda, under the Terrorism Act violated his human rights as a journalist. Perhaps more
importantly, though, the court rebuked the government’s unprecedented and dangerous
definition of “terrorism” that would have encompassed all sorts of actions
regularly made by law-abiding citizens. Miranda was detained and interrogated for almost
nine hours without a lawyer at Heathrow airport in 2013 while returning to his home in
Brazil after visiting Academy award-winning filmmaker Laura Poitras in Germany. He was
assisting her and Greenwald’s reporting on the Snowden documents; Greenwald was
working for the Guardian at the time. The court overruled
a part of a prior ruling, making clear that “the stop power [under the Terrorism
Act], if used in respect of journalistic information or material is incompatible”
with the European convention on human rights. Miranda was detained and interrogated for
almost nine hours without a lawyer at Heathrow airport in 2013 while returning to his home
in Brazil after visiting Academy award-winning filmmaker Laura Poitras in Germany. He was
assisting her and Greenwald’s reporting on the Snowden documents; Greenwald was
working for the Guardian at the time. The court overruled
a part of a prior ruling, making clear that “the stop power [under the Terrorism
Act], if used in respect of journalistic information or material is incompatible”
with the European convention on human rights. As Greenwald has
already said, the court ruling is “an enormous victory, first and foremost for
press freedoms, because what the court ruled is that the UK parliament can’t purport
to allow its police to seize whatever they want to take from journalists by pretending
it’s a terrorism investigation”. He’s exactly right: journalists, or anyone
working on behalf of newspapers for that matter, should not be worried about being
detained, interrogated and having their source material confiscated for doing their job in
a democracy. But even more disturbing than the UK government’s willingness to detain
a journalist in violation of his human rights is what they attempted to claim after
Miranda’s detention to justify their actions. In
arguing that they had every right to detain Miranda under the Terrorism Act in 2013, the
government put forth a the radical and expansive definition of terrorism. Here is the
government’s exact
words from a court filing they made in November 2013: 'Additionally the disclosure [of
NSA/GCHQ documents], or threat of disclosure, is designed to influence a government and is
made for the purpose of promoting a political or ideological cause. This therefore falls
within the definition of terrorism...' Think about the implications of that for a minute: terrorism was
defined as publishing information designed to influence the government. That definition
includes no mention of violence or even a threat of violence, which David Miranda never came
anywhere near doing. In other words, any opinion or action the government does not like
could potentially have been decreed as “terrorism” under their warped
definition." "The
UK government's official voice encryption protocol, around which it is hoping to build an
ecosystem of products, has a massive backdoor that would enable the security services to
intercept and listen to all past and present calls, a researcher has discovered. Dr Steven
Murdoch of University College London has posted an extensive
blog post digging into the MIKEY-SAKKE spec in which he concludes that it has been
specifically designed to "allow undetectable and unauditable mass surveillance."
He notes that in the "vast majority of cases" the protocol would be
"actively harmful for security." Murdoch
uses the EFF's scorecard
as a way of measuring the security of MIKEY-SAKKE, and concludes that it only manages to
meet one of the four key elements for protocol design, namely that it provides end-to-end
encryption. However, due to the way that the system creates and shares encryption keys,
the design would enable a telecom provider to insert themselves as a man-in-the-middle
without users at either end being aware. The system would also allow a third party to
unencrypt past and future conversations. And it does not allow for people to be anonymous
or to verify the identity of the person they are talking to. In other words, it would be
the perfect model for the security services, who can apply pressure to a telecom company
and then carry out complete surveillance on an unidentified individual. While it is
surprising that the official UK government system would have such a significant backdoor,
it is perhaps less surprising when you consider who developed the spec: the information
security arm of the UK listening post GCHQ, the Communications-Electronics Security Group
(CESG). The CESG – and the UK's civil service – started pushing
the approach late last year and has incorporated it into a product spec called Secure
Chorus. It has also set itself up as an evaluator of other products and is trying to
market its approach commercially by pushing it as "government-grade security."
One example of a product already going through this evaluation is Cryptify Call, available
for iOS and Android." "In
some cases, hackers can send a text message -- and disable a car's brakes, according to
research presented by computer security experts on Monday. It's a
relatively simple hack. And while researchers only tested one type of device, it
raises serious questions about how dangerous it is to use them at all. Almost every car on the road right now has a computer port inside, usually
underneath the steering wheel. It accesses the computer networks in your car, so mechanics
can identify problems. That information is valuable. It can tell how and when you
accelerate, brake or steer. That's why insurance companies now give their customers tiny
tracking devices to plug into that port -- and offer discounts if you use them. These
device connects to the same cellular network as our mobile phones, so it can receive text
messages. Student engineers from the University of California, San Diego examined one from
Mobile Devices used by auto
insurer Metromile. They
discovered they could send it specially-coded text messages and remotely engage a car's
brakes or disable them completely. The good news? It only works if the car is at a slow
crawl -- 5 miles per hour or less. Perhaps worst of all, the device gets unfettered access
to a car's internal controls. And they're not even hidden from the rest of the world. It's
possible to find a specific car by its device's IP address or phone number. The team of
researchers presented their findings at the Usenix computer conference in Washington, D.C.
" "One
of the “teenage hackers” who broke
into the CIA director’s AOL email account last year hasn’t given up
targeting government intelligence officials. His latest victim is the Director of National
Intelligence James Clapper, Motherboard has learned. A
group of hackers calling themselves “Crackas With Attitude” or CWA made
headlines in October, hacking into CIA Director John Brennan’s email account and
apparently getting
access to several
online tools and portals used by US law enforcement agencies.The hackers' exploits
prompted the FBI to issue an alert warning
government officials of their attacks. One of the group’s hackers, who’s
known as “Cracka,” contacted me on Monday, claiming to have broken into a series
of accounts connected to Clapper, including his home telephone and internet, his personal
email, and his wife’s Yahoo email. While in control of Clapper’s Verizon FiOS
account, Cracka claimed to have changed the settings so that every call to his house
number would get forwarded to the Free Palestine Movement. When they gained
notoriety last year, Cracka and CWA claimed their actions were all in support of the
Palestine cause. “I’m pretty sure they don’t even know they've been
hacked,” Cracka told me in an online chat. But Brian Hale, a spokesperson for the
Office of the Director of National Intelligence, confirmed the hack to Motherboard on
Tuesday." |
".... if you look around and see what the world
is now facing I don't think in the last two or three hundred years we've faced such
a concatenation of problems all at the same time..... if we are to solve the issues
that are ahead of us, we are going to need to think
in completely different ways. " "Individual peace is the unit of world
peace. By offering Consciousness-Based
Education to the coming generation, we can promote a strong foundation for a
healthy, harmonious, and peaceful world.... Consciousness-Based education is not a luxury.
For our children who are growing up in a stressful, often frightening, crisis-ridden
world, it is a necessity." |
||
|
NLPWESSEX,
natural law publishing |