Posts

Edward Snowden’s Privacy Tips: “Get Rid Of Dropbox,” Avoid Facebook And Google

Photo Credit: TechCrunchAccording to Edward Snowden, people who care about their privacy should stay away from popular consumer Internet services like Dropbox, Facebook, and Google.

Snowden conducted a remote interview today as part of the New Yorker Festival, where he was asked a couple of variants on the question of what we can do to protect our privacy.

His first answer called for a reform of government policies. Some people take the position that they “don’t have anything to hide,” but he argued that when you say that, “You’re inverting the model of responsibility for how rights work”:

When you say, ‘I have nothing to hide,’ you’re saying, ‘I don’t care about this right.’ You’re saying, ‘I don’t have this right, because I’ve got to the point where I have to justify it.’ The way rights work is, the government has to justify its intrusion into your rights.

He added that on an individual level, people should seek out encrypted tools and stop using services that are “hostile to privacy.” For one thing, he said you should “get rid of Dropbox,” because it doesn’t support encryption, and you should consider alternatives like SpiderOak. (Snowden made similar comments over the summer, with Dropbox responding that protecting users’ information is “a top priority.”)

Read more from this story HERE.

FBI Quest for Smartphone Data Will Fuel Privacy Battle

In the battle over how much access law enforcement should have to your smartphone, don’t expect the government to be outsmarted without a fight.

FBI Director James Comey said as much Thursday in a speech at the Brookings Institution in Washington, suggesting the agency might ask congress to force companies to provide what amounts to a “back door” to law enforcement to obtain password-protected data on targeted personal mobile devices.

“We’re hoping to start a dialogue with congress” on updating laws that require tech companies to comply, he told the audience.

But he might find more than the usual resistance on Capitol Hill these days, and not just from known privacy critics and libertarians. A White House advisory panel convened in the wake of the Edward Snowden leaks about widespread government surveillance of Americans formally recommended that laws should “not in any way subvert, undermine, weaken or make vulnerable generally available commercial software.”

Moreover, typical law-and-order Republicans who might normally side with the FBI said they feel burned by government spying and want more assurances that Americans’ Fourth Amendment right against unreasonable search and seizures is protected.

Read more from this story HERE.

Snowden Movie Indicts Obama

Photo Credit: Showbiz 411Edward Snowden Doc Premieres: Shocking inside look at how he did it

Citizen Four is the shocking doc about Edward Snowden made by Glenn Greenwald and Laura Poitras. Just screened tonight was the two hour film will be released by the Weinstein Company this month. It doesn’t paint the Obama administration in a very good light as Snowden explains how the government has violated privacy rights on a massive scale. Also the filmmakers clearly indicate that all roads lead to POTUS, a fairly serious accusation. There may be serious repercussions.

Read more from this story HERE.

US Pushes 'Right-to-Snoop' Rule Online

Photo Credit: AlamyPrivate information stored online by British computer users could be scrutinised by American law enforcement agencies under a wide-ranging new right-to-snoop being pursued by the US government.

Federal authorities in the US are using the courts to try to force American-owned technology companies to disclose emails and other data held in the “Cloud” – the vast network of servers where data is stored for customers.

The claim would require companies such as Microsoft, Apple and Google to open up all their electronic records to agencies – such as the CIA, the NSA and the FBI – even if it is stored in Europe rather than on US soil.

A New York court this month ordered Microsoft to hand over to US prosecutors the emails of a European customer stored on its servers in Ireland, as part of a drugs trafficking investigation.

Loretta Preska, the judge, ruled that the technology giant must comply with the US warrant because the company is American, even though it could be breaking Irish and EU law if it did so.

Read more from this story HERE.

For Sale: Systems that Can Secretly Track Where Cellphone Users Go Around the Globe

tracking-teez-606Makers of surveillance systems are offering governments across the world the ability to track the movements of almost anybody who carries a cellphone, whether they are blocks away or on another continent.

The technology works by exploiting an essential fact of all cellular networks: They must keep detailed, up-to-the-minute records on the locations of their customers to deliver calls and other services to them. Surveillance systems are secretly collecting these records to map people’s travels over days, weeks or longer, according to company marketing documents and experts in surveillance technology.

The world’s most powerful intelligence services, such as the National Security Agency and Britain’s GCHQ, long have used cellphone data to track targets around the globe. But experts say these new systems allow less technically advanced governments to track people in any nation — including the United States — with relative ease and precision.

Users of such technology type a phone number into a computer portal, which then collects information from the location databases maintained by cellular carriers, company documents show. In this way, the surveillance system learns which cell tower a target is currently using, revealing his or her location to within a few blocks in an urban area or a few miles in a rural one.

It is unclear which governments have acquired these tracking systems, but one industry official, speaking on the condition of anonymity to share sensitive trade information, said that dozens of countries have bought or leased such technology in recent years. This rapid spread underscores how the burgeoning, multibillion-dollar surveillance industry makes advanced spying technology available worldwide.

Read more from this story HERE.

Numbers Tell the Story of Our Government's Watchlisting Binge

Photo Credit: ACLU

Photo Credit: ACLU

The government is adding people to its already bloated watchlisting system at breakneck pace, and it’s still hungry for more. That’s the unavoidable conclusion from documents published yesterday in The Intercept.

Those documents vindicate our concerns and warnings about a massive, virtually standardless government watchlisting scheme that ensnares innocent people and encourages racial and religious profiling.

The documents confirm what we have long suspected: It doesn’t take much to get yourself on a terrorist watchlist. The government’s recently leaked Watchlisting Guidance starts with a poorly defined “reasonable suspicion” standard and then subjects it to so many exceptions and caveats as to render it virtually toothless. The unsurprising result, as is clear from these documents, is a set of watchlists experiencing explosive growth.

Here are some of the numbers that stood out for us (unless otherwise indicated, as of August 2013):

1,000,000: The number of people in the Terrorist Identities Datamart Environment (TIDE). TIDE is the government’s central repository of classified information that serves as the basis for various watchlists, including the master watchlist, or Terrorist Screening Database. The National Counterterrorism Center has acknowledged that as of August 1, 2014, TIDE held 1.1 million names – roughly the combined population of Wyoming and Vermont. The documents show that when the government includes people in TIDE, it seeks out and adds to the secret database information, such as photos from state DMVs, and biometric data, like fingerprints, facial images, and DNA strands.

Read more from this story HERE.

Visit the Wrong Website, and the FBI Could End Up in Your Computer

Photo Credit: Getty

Photo Credit: Getty

Security experts call it a “drive-by download”: a hacker infiltrates a high-traffic website and then subverts it to deliver malware to every single visitor. It’s one of the most powerful tools in the black hat arsenal, capable of delivering thousands of fresh victims into a hackers’ clutches within minutes.

Now the technique is being adopted by a different kind of a hacker—the kind with a badge. For the last two years, the FBI has been quietly experimenting with drive-by hacks as a solution to one of law enforcement’s knottiest Internet problems: how to identify and prosecute users of criminal websites hiding behind the powerful Tor anonymity system.

The approach has borne fruit—over a dozen alleged users of Tor-based child porn sites are now headed for trial as a result. But it’s also engendering controversy, with charges that the Justice Department has glossed over the bulk-hacking technique when describing it to judges, while concealing its use from defendants. Critics also worry about mission creep, the weakening of a technology relied on by human rights workers and activists, and the potential for innocent parties to wind up infected with government malware because they visited the wrong website. “This is such a big leap, there should have been congressional hearings about this,” says ACLU technologist Chris Soghoian, an expert on law enforcement’s use of hacking tools. “If Congress decides this is a technique that’s perfectly appropriate, maybe that’s OK. But let’s have an informed debate about it.”

The FBI’s use of malware is not new. The bureau calls the method an NIT, for “network investigative technique,” and the FBI has been using it since at least 2002 in cases ranging from computer hacking to bomb threats, child porn to extortion. Depending on the deployment, an NIT can be a bulky full-featured backdoor program that gives the government access to your files, location, web history and webcam for a month at a time, or a slim, fleeting wisp of code that sends the FBI your computer’s name and address, and then evaporates.

What’s changed is the way the FBI uses its malware capability, deploying it as a driftnet instead of a fishing line. And the shift is a direct response to Tor, the powerful anonymity system endorsed by Edward Snowden and the State Department alike.

Read more from this story HERE.

The Ultimate Goal of the NSA is Total Population Control

Photo Credit: Getty ImagesWilliam Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.

On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations.

“At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.”

The NSA will soon be able to collect 966 exabytes a year, the total of internet traffic annually. Former Google head Eric Schmidt once argued that the entire amount of knowledge from the beginning of humankind until 2003 amount to only five exabytes.

Binney, who featured in a 2012 short film by Oscar-nominated US film-maker Laura Poitras, described a future where surveillance is ubiquitous and government intrusion unlimited.

Read more from this story HERE.

Documents Show Court Gave NSA Broad Leeway in Surveillance

Photo Credit: Cliff Owen / APBy ELLEN NAKASHIMA AND BARTON GELLMAN.

Virtually no foreign government is off-limits for the National Security Agency, which has been authorized to intercept information “concerning” all but four countries, according to top-secret documents.

The United States has long had broad no-spying arrangements with those four countries — Britain, Canada, Australia and New Zealand — in a group known collectively with the United States as the Five Eyes. But a classified 2010 legal certification and other documents indicate the NSA has been given a far more elastic authority than previously known, one that allows it to intercept through U.S. companies not just the communications of its overseas targets but any communications about its targets as well.

The certification — approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden — lists 193 countries that would be of valid interest for U.S. intelligence. The certification also permitted the agency to gather intelligence about entities including the World Bank, the International Monetary Fund, the European Union and the International Atomic Energy Agency.

The NSA is not necessarily targeting all the countries or organizations identified in the certification, the affidavits and an accompanying exhibit; it has only been given authority to do so. Still, the privacy implications are far-reaching, civil liberties advocates say, because of the wide spectrum of people who might be engaged in communication about foreign governments and entities and whose communications might be of interest to the United States.

“These documents show both the potential scope of the government’s surveillance activities and the exceedingly modest role the court plays in overseeing them,” said Jameel Jaffer, deputy legal director for the American Civil Liberties Union, who had the documents described to him.

Read more from this story HERE.

_______________________________________________________________

Google Rebuffed by U.S. High Court on Privacy Lawsuit

By Greg Stohr.

The U.S. Supreme Court rejected an appeal by Google Inc. (GOOG), leaving the company to face lawsuits accusing it of violating a federal wiretapping law by secretly collecting personal data while developing its Street View maps.

The justices today left intact a federal appeals court ruling that the U.S. Wiretap Act protects the privacy of information on unencrypted in-home Wi-Fi networks.

Read more from this story HERE.

New Ruling Shows the NSA Can’t Legally Justify Its Phone Spying Anymore

Photo Credit: Getty Images The Eleventh Circuit Court of Appeals said no this week to tracking your movements using data from your cell phone without a warrant when it declared that this information is constitutionally protected.

The case, United States v. Davis , is important not only because it provides substantive and procedural protections against abuse of an increasingly common and highly invasive surveillance method. It also provides support for something Christopher Sprigman and I have said before — that the government’s other “metadata” collection programs are unconstitutional.

The Davis decision, in effect, suggests that the U.S. government’s collection of all kinds of business records and transactional data — commonly called “metadata” — for law enforcement and national security purposes may also be unconstitutional.

Your phone sends signals to the nearest cell towers so that the communications network system knows where to route a call should one come in. Many providers collect and store the location of towers a customer connects to at the beginning and end of the call for billing purposes. FBI agents in Davis obtained these records without a search warrant and used them to place the defendant, Quartavious Davis, near the scene of a number of robberies.

Read more from this story HERE.