Posts

Top Democratic Senator Calls for Scrapping Key Snooping Patriot Act Section

Photo Credit: Susan Walsh

Photo Credit: Susan Walsh

The Senate’s senior lawmaker said Tuesday that its time to end the Patriot Act power that the intelligence community has relied on to collect all Americans’ phone records, saying it isn’t making the country safer.

“In my view, and I’ve discussed this with the White House, the Section 215 collection of Americans’ phone records must end,” said Sen. Patrick J. Leahy, Vermont Democrat and chairman of the SenateJudiciary Committee. “It is not making America safer and the government has not made its case this is an effective counterterrorism tool.”

Speaking at Georgetown Law Center, Mr. Leahy said he would hold a classified briefing this week and call an open hearing next week to try to look at the issues at stake.

The intelligence snooping has come under scrutiny since leaks earlier this year exposed that the U.S. government was collecting the time and phone numbers of calls made in the U.S., as well as combing through other electronic communications.

Since then, the intelligence community has admitted it has repeatedly broken its own rules — though officials say they have caught themselves and have generally not found any intentional efforts to abuse the programs.

Read more from this story HERE.

Report: Google Knows Nearly Every WiFi Password in the World

Photo Credit: AFP/Getty Images

Photo Credit: AFP/Getty Images

Google knows nearly every WiFi password in the world, according to a new report published Thursday in a prominent tech website.

Computerworld’s Michael Horowitz explained in his “Defensive Computing” blog that if you, or even a friend, have logged on your WiFi network with an Android device, chances are Google has your secret password stored in their servers.

“If an Android device (phone or tablet) has ever logged on to a particular Wi-Fi network, then Google probably knows the Wi-Fi password,” wrote Horowitz. “Considering how many Android devices there are, it is likely that Google can access most Wi-Fi passwords worldwide.”

Read more from this story HERE.

Zuckerberg: US Government ‘Blew It’ on NSA Surveillance

Photo Credit: Reuters

Photo Credit: Reuters

Mark Zuckerberg of Facebook and Marissa Mayer, the CEO of Yahoo, struck back on Wednesday at critics who have charged tech companies with doing too little to fight off NSA surveillance. Mayer said executives faced jail if they revealed government secrets.

Yahoo and Facebook, along with other tech firms, are pushing for the right to be allowed to publish the number of requests they receive from the spy agency. Companies are forbidden by law to disclose how much data they provide.

During an interview at the Techcrunch Disrupt conference in San Francisco, Mayer was asked why tech companies had not simply decided to tell the public more about what the US surveillance industry was up to. “Releasing classified information is treason and you are incarcerated,” she said.

Mayer said she was “proud to be part of an organisation that from the beginning, in 2007, has been sceptical of – and has been scrutinizing – those requests [from the NSA].”

Yahoo has previously unsuccessfully sued the foreign intelligence surveillance (Fisa) court, which provides the legal framework for NSA surveillance. In 2007 it asked to be allowed to publish details of requests it receives from the spy agency. “When you lose and you don’t comply, it’s treason,” said Mayer. “We think it make more sense to work within the system,” she said.

Read more from this story HERE.

NSA Disguised Itself as Google to Spy, say Reports

Photo Credit: CNET

Photo Credit: CNET

Here’s one of the latest tidbits on the NSA surveillance scandal (which seems to be generating nearly as many blog items as there are phone numbers in the spy agency’s data banks).

Earlier this week, Techdirt picked up on a passing mention in a Brazilian news story and a Slate article to point out that the US National Security Agency had apparently impersonated Google on at least one occasion to gather data on people. (Mother Jones subsequently pointed out Techdirt’s point-out.)

Brazilian site Fantastico obtained and published a document leaked by Edward Snowden, which diagrams how a “man in the middle attack” involving Google was apparently carried out.

A technique commonly used by hackers, a MITM attack involves using a fake security certificate to pose as a legitimate Web service, bypass browser security settings, and then intercept data that an unsuspecting person is sending to that service. Hackers could, for example, pose as a banking Web site and steal passwords.

The technique is particularly sly because the hackers then use the password to log in to the real banking site and then serve as a “man in the middle,” receiving requests from the banking customer, passing them on to the bank site, and then returning requested info to the customer — all the while collecting data for themselves, with neither the customer nor the bank realizing what’s happening. Such attacks can be used against e-mail providers too.

Read more from this story HERE.

NSA Shares Raw Data on Americans with Israeli Spy Agency

Photo Credit: AP

Photo Credit: AP

The Obama administration shares with Israeli intelligence the vast data dumps the National Security Agency vacuums up from the Internet without removing private information about Americans, even though Israel is one of the nations that spy most aggressively on the United States, according to leaked documents.

A copy of a top-secret deal inked in 2009 between the NSA and the Israeli Signals-intelligence National Unit (ISNU) was provided by NSA leaker Edward J. Snowden to the Guardian newspaper, which posted it Wednesday.

It reveals that the NSA “routinely” passed to its Israeli counterpart “raw” signals intelligence, referred to as “Sigint,” including the vast swathes of digital data traffic that the agency gathers under secret court authority from U.S. Internet providers.

So sensitive is this data that even before being disseminated to other U.S. agencies, the NSA has to subject it to a court-mandated process called minimization, under which the names of any Americans are removed unless they are essential for foreign intelligence interest.

But the U.S.-Israeli agreement states that the data shared with Israel “includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content.”

Read more from this story HERE.

NSA Can Track Smartphone Data by Breaking Through iPhone and Blackberry Security Measures

Photo Credit: AP

Photo Credit: AP

The NSA is able to crack protective measures on iPhones, BlackBerry and Android devices, giving it access to users’ data on all major smartphones, according to a report Sunday in German news weekly Der Spiegel.

The magazine cited internal documents from the U.S.’ National Security Agency and its British counterpart GCHQ in which the agencies describe setting up dedicated teams for each type of phone as part of their effort to gather intelligence on potential threats such as terrorists.

The data obtained this way includes contacts, call lists, SMS traffic, notes and location information, Der Spiegel reported.

The documents don’t indicate that the NSA is conducting mass surveillance of phone users but rather that these techniques are used to eavesdrop on specific individuals, the magazine said.

The article doesn’t explain how the magazine obtained the documents, which are described as ‘secret.’ But one of its authors is Laura Poitras, an American filmmaker with close contacts to NSA leaker Edward Snowden who has published several articles about the NSA in Der Spiegel in recent weeks.

Read more from this story HERE.

Thousands Show for German anti-NSA Protest

German_protestThousands took to the streets in Berlin Saturday in protests against Internet surveillance activities by the US National Security Agency and other intelligence agencies, and the German government’s perceived lax reaction to them.

Organisers, among them the opposition Greens, The Left and Pirates parties, said 20,000 people turned out. Police would not confirm the figure, saying only their “tally differs from that of the organisers”.

The protest was organised under the slogan “Freedom Rather Than Fear” and demonstrators carried banners saying: “Stop spying on us” and, more sarcastically: “Thanks to PRISM (the US government’s vast data collection programs) the government finally knows what the people want.”

Read more from this story HERE.

Microsoft and Yahoo Voice Alarm Over NSA’s Assault on Internet Encryption

Photo Credit: EPA

Photo Credit: EPA

Two of the world’s biggest technology companies, Microsoft and Yahoo, expressed deep concern on Friday about widespread attempts by the US and UK intelligence services to circumvent the online security systems that protect the privacy of millions of people online.

Microsoft said it had “significant concerns” about reports that the National Security Agency and its British counterpart, GCHQ, had succeeded in cracking most of the codes that protect the privacy of internet users. Yahoo said it feared “substantial potential for abuse”.

Google said it was not aware of any covert attempts to compromise its systems. However, according to a report in the Washington Post on Saturday, the company said that it had accelerated the encryption of information in its data centres in a bid to prevent snooping by the NSA and the intelligence agencies of other governments.

Documents obtained by whistleblower Edward Snowden and published jointly by the Guardian, the New York Times and the nonprofit news organisation ProPublica on Thursday show that agents at GCHQ have been working to undermine encrypted traffic on the “big four” service providers, named as Hotmail (the Microsoft email service now known as Outlook), Google, Yahoo and Facebook.

Yahoo responded with a strongly worded statement on Friday. “We are unaware of and do not participate in such an effort, and if it exists, it offers substantial potential for abuse. Yahoo zealously defends our users’ privacy and responds to government requests for data only after considering every applicable objection and in accordance with the law,” a spokesman said.

Read more from this story HERE.

The Most Dangerous Domestic Spying Program is Common Core

Photo Credit: ben swann

Photo Credit: ben swann

Earlier this year, revelations about the Department of Justice spying on the Associated Press were quickly followed by revelations that the NSA was collecting phone data on all Verizon, and then all American cell phone, users. Edward Snowden’s whistleblowing drew yet more attention to the issue, and domestic surveillance programs have remained a top issue in people’s minds ever since.

While Americans focus on institutions like the CIA and NSA, though, programs are being implemented which would lead to a much more institutional way of tracking citizens. Obamacare is one of these, but Common Core Standards – the federal educational program – is the most eyebrow-raising.

Bill Gates was one of the leaders of Common Core, putting his personal money into its development, implementation and promotion, so it’s unsurprising that much of this data mining will occur via Microsoft’s Cloud system.

Even the Department of Education, though, admits that privacy is a concern, and that that some of the data gathered may be “of a sensitive nature.” The information collected will be more than sensitive; much of it will also be completely unrelated to education. Data collected will not only include grades, test scores, name, date of birth and social security number, it will also include parents’ political affiliations, individual or familial mental or psychological problems, beliefs, religious practices and income.

In addition, all activities, as well as those deemed demeaning, self-incriminating or anti-social, will be stored in students’ school records. In other words, not only will permanently stored data reflect criminal activities, it will also reflect bullying or anything perceived as abnormal. The mere fact that the White House notes the program can be used to “automatically demonstrate proof of competency in a work setting” means such data is intended to affect students’ futures.

Read more from this story HERE.

Turning the Tables? Group Challenges Domestic Surveillance by Tracking Obama

Photo Credit: Tumblr

Photo Credit: Tumblr

In response to what some consider over-reaching surveillance programs conducted by U.S. intelligence agencies, which have been shown to collect thousands of communications with no terror connection, a group decrying the privacy implications of these programs is turning the tables on the president.

According to the Creator’s Project, “Where is Obama” pinpoints the location of President Barack Obama using what the group calls the ”Crowd-Sourced Positioning System, or CSPS.”

“The position of the president is a state secret. The White House website shows only Barack Obama’s schedule from the current day, but never dates beyond. The accuracy of this information is controversial. Obama, on the other hand, knows your entire calendar,” the creators Kim Asendorf, Ole Fach, Kyle McDonald and Jonas Lund said of the project. “Every person in the world can now participate in the supervision of the President.”

Read more from this story HERE.