| 
 | ||
| NLPWESSEX, natural law publishing | nlpwessex.org | |
| 
 | ||
| SURVEILLANCE SOCIETY NEWS ARCHIVE 2012 | ||
| To Go Direct To Current Surveillance News Reports - Click Here To Go Direct To 2012 Surveillance News Reports - Click Here | ||
| Surveillance Society News Reports | Selected News Extracts 2012 "[British] Home Secretary Theresa May said the proposed surveillance law would 'save lives' ....
    But the committee's MPs and peers are likely to encourage the police
    and law enforcement agencies to work out a much simpler scheme that the public can trust.
    The message is likely to be 'go back to the drawing board and come and talk to us when you
    have something fresh'. As regular Register readers
    will know, the surveillance plans now being re-examined have been touted to successive
    governments by the intelligence services for years with little change to any details other
    than the name. The MPs are likely to offer fierce opposition to the proposals, which would
    allow the Home Office to wire network traffic probes into the public internet anywhere it
    chose, for this or any successor government to use for any purpose it chose....The report will be another setback for the Home Secretary: in 2010 the
    former Director of Public Prosecutions Lord Macdonald was asked to review her plan to
    monitor citizens online. He previously
    called the project to mine the UK internet: A paranoid
    fantasy which would destroy everything that makes living worthwhile. This database would be an unimaginable hellhouse of personal private
    information. It would be a complete readout of every citizen's life in the most intimate
    and demeaning detail.... The two panels' highly
    critical reports will be an expected disappointment for the Home Office. They are the latest in a series of spectacular disasters for career spy Charles Farr, who three years ago had hoped
    to land the top job at the Secret Intelligence Service (MI6) and become 'C'." "The cable boxes
    of the future could be able to detect when viewers are cuddling on the sofa and
    automatically serve adverts for contraceptives. U.S. cable provider Verizon has applied to
    patent a set-top box technology that can observe what's going on in the room and show
    viewers adverts based on what it detects. In U.S. Patent Application 20120304206 the company
    suggests it could detect when people are 'cuddling' then show 'a commercial for a romantic
    getaway vacation, a commercial for a contraceptive, a commercial for flowers [...] etc.'. The technology would integrate a range of sensors into their products,
    including thermal imaging cameras, microphones and motion sensors, to detect the mood
    their audience and tailor media content to suit. Privacy
    campaigners called the new technology a 'privacy nightmare waiting around the corner' and
    called for it to be reined in 'before consumers lose control for good'. It has disturbing
    echoes of George Orwell's dystopia 1984, where the population were constantly watched by
    authorities through cameras integrated in their television screens....  This needs to be reined in
    before consumers lose control for good.'" "Everything we
    do on the Internet leaves a trail back to us. Search engine entries, shopping lists,
    e-mail addresses and so much more which is ripe for the taking. Now governments and their
    intelligence agencies want a piece of that action and they have new tools to ascertain our
    intentions and possible future actions.... There
    have been a series of related and interesting developments in the field of global
    intelligence gathering. The NSA is building a brand new data center in Utah in order to
    connect with some new intelligence sharing systems such as the Defense Intelligence
    Enterprise and the Global Information Grid.... most
    people would not appreciate their private conversations end
    up on foreign military or intelligence networks.... It goes on all the time, you could look at Project Echelon, Project
    Groundbreaker, Project Trailblazer and many others. Why do you think that the head of the
    CIA is gloating about being about to glean intelligence through your devices and
    net-centric applications. It is a gold mine for them and they have reaped a bonanza from
    it. CIA director David Petraeus put his cards on the
    table because he hinted about the next target, it
    will be all of data from the smart meters that have been put in place in the past few years. It
    wouldnt be hard to tell how many people are living in a certain home from
    electricity records or which appliances are used the most. Will we be deemed terrorists
    from some poorly programmed profiling software based on our paper and data trail? Mistakes
    happen all the time, from faulty no-fly lists to swat team wrong door raids." | |
| MORE SURVEILLANCE INFORMATION SURVEILLANCE SOCIETY BULLETINS | ||
| Contact | 'We Need A New Way Of Thinking' - Consciousness-Based Education | 
| 
 | 
| 2012 Archive | 
| "People branded criminals incorrectly have been paid £1.9million in
    redress over the last five years. Nearly 12,000 people have been wrongly convicted
    according to figures published by campaign group Big Brother Watch. Figures showed the
    most common errors involved information being disclosed by local police forces or the
    police national computer. In 3,519 cases, the wrong persons entry on the police
    national computer was disclosed, BB Watch said. The figures were obtained from the
    Criminal Records Bureau (CRB), which recently merged with the Independent Safeguarding
    Authority to form the Disclosure and Barring Service (DBS). According to the CRBs
    annual report in July, 4.1 million checks were carried out in 2011. BB Watch director Nick
    Pickles said: 'Every error has the potential to ruin someones reputation and career. 'The fact that thousands of cases have involved information held
    by local police forces, often never tested in court, shows how dangerous it is to create a
    culture of safety by database.' He added: 'The police hold a vast amount of information,
    from photographs to written notes, and the way forward must be to bring this murky system
    out into the open and ensure that only information that is absolutely necessary is held.'" | 
| "Benefit claimants will have their online job applications remotely
    monitored by the Government to see whether they are making serious attempts to find
    work.... From the beginning of next year, the unemployed will have to look for work
    through the Coalition's new Universal Jobmatch website or potentially risk losing their
    benefits. The website will scan the CVs of benefit claimants and automatically match them
    up with job openings that suit their skills. It will also allow employers to search for
    new workers among the unemployed and send messages inviting them to interviews. However,
    the activities of benefit claimants can also be tracked using devices known as 'cookies',
    so their Job Centre advisers can know how many searches they have been doing, suggest
    potential jobs and see whether they are turning down viable opportunities. Iain Duncan
    Smith, the Work and Pensions Secretary, said the scheme would 'revolutionise' the process
    of looking for work. The tracking element of the programme will not be compulsory as monitoring people's behaviour online without their consent would
    not be allowed under EU law. But job advisers are
    able to impose sanctions such as compulsory work placements or ultimately losing benefits
    if they feel the unemployed are not searching hard enough." | 
| "Top U.S. intelligence officials
    gathered in the White House Situation Room in March to debate a controversial proposal.
    Counterterrorism officials wanted to create a government dragnet, sweeping up millions of
    records about U.S. citizenseven people suspected of no crime. Not everyone was on board. 'This is a sea change in the way that the
    government interacts with the general public,' Mary Ellen Callahan, chief privacy officer
    of the Department of Homeland Security, argued in the meeting, according to people
    familiar with the discussions.   A week later, the attorney general signed the
    changes into effect. Through Freedom of Information Act requests and interviews with
    officials at numerous agencies, The Wall Street Journal has reconstructed the clash over
    the counterterrorism program within the administration of President Barack Obama. The debate was a
    confrontation between some who viewed it as a matter of efficiencyhow long to keep
    data, for instance, or where it should be storedand others who saw it as granting
    authority for unprecedented government surveillance of U.S. citizens. The rules now allow
    the little-known National Counterterrorism Center to examine the government files of U.S.
    citizens for possible criminal behavior, even if there is no reason to suspect them. That
    is a departure from past practice, which barred the agency from storing information about
    ordinary Americans unless a person was a terror suspect or related to an investigation....
    'It's breathtaking' in its scope, said a former
    senior administration official familiar with the White House debate." | 
| "The joint parliamentary
    committee scrutinising the governments Communications Data Bill - universally dubbed
    the 'Snoopers' Charter' - is set to slate the draft law in its official report published
    tomorrow. Most of the committee members felt the Home Office had failed to make a
    convincing case for the scale of requested powers required to monitor British citizens'
    activities online, The Register has learnt. Home Secretary Theresa May said the proposed surveillance law would 'save lives' and help cops
    catch more paedophiles and terrorists. But the
    committee's MPs and peers are likely to encourage the police and law enforcement agencies
    to work out a much simpler scheme that the public can trust. The message is likely to be
    'go back to the drawing board and come and talk to us when you have something fresh'. As regular Register readers will know, the surveillance plans now
    being re-examined have been touted to successive governments by the intelligence services
    for years with little change to any details other than the name. The MPs are likely to
    offer fierce opposition to the proposals, which would allow the Home Office to wire
    network traffic probes into the public internet anywhere it chose, for this or any
    successor government to use for any purpose it chose....The
    report will be another setback for the Home Secretary: in 2010 the former Director of
    Public Prosecutions Lord Macdonald was asked to review her plan to monitor citizens
    online. He previously
    called the project to mine the UK internet: A paranoid
    fantasy which would destroy everything that makes living worthwhile. This database would be an unimaginable hellhouse of personal private
    information. It would be a complete readout of every citizen's life in the most intimate
    and demeaning detail.... The two panels' highly
    critical reports will be an expected disappointment for the Home Office. They are the latest in a series of spectacular disasters for career spy Charles Farr, who three years ago had hoped
    to land the top job at the Secret Intelligence Service (MI6) and become 'C'." | 
| "For more than five years, Farr has been the secret hand behind the
    states electronic surveillance plan. Appointed by Gordon Brown in July 2007 as the
    first Director General of the Office for Security and Counter Terrorism and notionally as
    his National Security Adviser, Farr began by masterminding a strategy to mine private information. Within months, he had clawed £1bn from the Treasury for a new
    Interception Modernisation Programme (IMP), intended to give GCHQ spooks ISP-level access
    to all UK internet communications. The GCHQ plan  known internally as 'Mastering The
    Internet' (MTI) - was first and exclusively
    revealed by The Register in May 2009. Subsequent developments have confirmed the
    accuracy of El Regs scoop. When the coalition government took over, Con-Lib
    ministers had to come to terms with the clear promises they had made to block new
    surveillance laws. Farr had to bide his time for a year. His Labour-era Interception Modernisation
    Program was rebranded as the safer-sounding 'Communications Capability Development
    Program' (CCDP). Nothing else changed. Farr made elementary blunders in successive appearances before MPs and peers
    this year, pointing up the exercise as a smokescreen to distract attention from the core
    purpose of the new laws - to help GCHQ and defence contractors Detica install their
    planned data mining network at all major UK ISPs...." | 
| "Farr made elementary blunders in successive appearances before MPs and peers
    this year... At first, Farr refused to be seen or photographed, according to parliamentary sources,
    and repeatedly asked to give his evidence in secret and in private. This cut no ice with the scrutinising committee. His British TV debut can
    now be viewed on the UK Parliament website (audio
    only)....The government also prevented the heads of British intelligence from being
    examined by the MPs and peers as to the real reasons for the bill." | 
| "A study from the Federal
    Trade Commission has found that most mobile apps for kids are secretly collecting
    information from children including device IDs, phone numbers, locations, and other
    private information without their parents' knowledge or consent. Nearly 60% of the mobile apps the FTC reviewed from the Google
    Play and Apple App stores transmitted the device ID. They also often shared that ID
    with an advertising network, analytics company or another third party. Of those 235 mobile apps, 14 also transmitted the location of the
    device and the phone number, the FTC found. More
    than half of the apps also contained interactive features such as in-app purchases and
    advertising that were not disclosed to parents.... 'Illicit
    data collection from their mobile phones and tablets places kids at risk,' said Jeffrey
    Chester, executive director of the Center for Digital Democracy. No one should get access
    to kids' data, especially geo-location information, without prior consent from a parent.'" | 
| "Transit authorities in cities
    across the country are quietly installing microphone-enabled surveillance systems on
    public buses that would give them the ability to record and store private conversations,
    according to documents obtained by a news outlet.
    The systems are being installed in San Francisco, Baltimore, and other cities with funding
    from the Department of Homeland Security in some cases, according
    to the Daily, which obtained copies of contracts, procurement requests, specs and
    other documents. The use of the equipment raises serious questions about eavesdropping
    without a warrant, particularly since recordings of passengers could be obtained and used
    by law enforcement agencies. It also raises questions about security, since the IP
    audio-video systems can be accessed
    remotely via a built-in web server (.pdf), and can be combined with GPS data to track
    the movement of buses and passengers throughout the city." | 
| "Soon there may be a cellphone
    that can see though walls and into other objects as Caltech engineers have made tiny,
    low-cost terahertz imager chips that could be incorporated into cellphone cameras.... Hajimiri and postdoctoral scholar Kaushik Sengupta (PhD 12)
    describe the work in the December issue of IEEE Journal of Solid-State Circuits.
    Researchers have long touted the potential of the terahertz frequency range, from 0.3 to 3
    THz, for scanning and imaging. Such electromagnetic waves can easily penetrate packaging
    materials and render image details in high resolution..." | 
| "The cable boxes of the future
    could be able to detect when viewers are cuddling on the sofa and automatically serve
    adverts for contraceptives. U.S. cable provider Verizon has applied to patent a set-top
    box technology that can observe what's going on in the room and show viewers adverts based
    on what it detects. In U.S. Patent Application 20120304206 the company
    suggests it could detect when people are 'cuddling' then show 'a commercial for a romantic
    getaway vacation, a commercial for a contraceptive, a commercial for flowers [...] etc.'. The technology would integrate a range of sensors into their products,
    including thermal imaging cameras, microphones and motion sensors, to detect the mood
    their audience and tailor media content to suit. Privacy
    campaigners called the new technology a 'privacy nightmare waiting around the corner' and
    called for it to be reined in 'before consumers lose control for good'. It has disturbing
    echoes of George Orwell's dystopia 1984, where the population were constantly watched by
    authorities through cameras integrated in their television screens.... It describes 'a media content presentation system' that can detect
    'an ambient action performed by a user during the presentation of the media content' then
    select and present 'an advertisement associated with the detected ambient action'. The
    patent application adds: 'If detection facility detects one or more words spoken by a user
    (e.g., while talking to another user within the same room or on the telephone),
    advertising facility may utilise the one or more words spoken by the user to search for
    and/or select an advertisement associated with the one or more words.' The application
    says the sensors would be able to determine whether viewers were 'eating, exercising,
    laughing, reading, sleeping, talking, singing, humming, cleaning, playing a musical
    instrument, performing any other suitable action, and/or engaging in any other physical
    activity.'.... The technology could also determine whether pets or children were in the
    room, and even what kind of inanimate objects are there. It could detect the mood of those
    present by, for example, picking up if they are singing or hummming a 'happy' song, then
    select adverts configured to target happy people. It could even be used to determine the
    physical characteristics of the viewers present, including skin colour, giving it the
    disturbing potential to select which adverts to play based on racial profiling. Nick
    Pickles, director of privacy campaign group Big Brother Watch, said: 'Smart TVs with
    in-built cameras and microphones are a privacy nightmare waiting around the corner. It is
    only a matter of time before technology using facial recognition, audio analysis and
    monitoring what you watch is common place. What is essential is that consumers know
    exactly what they are buying and where the data is going. The tables could turn and now
    its Google searching your living room for data about you. In reality this might be
    some rather far fetched marketing gimmick, but the current consumer protections are badly
    lacking and some companies are happy to do whatever it takes to get as much information as
    possible and keep ahead of their competitors. This
    needs to be reined in before consumers lose control for good.'" | 
| "A new version of the Zeus
    botnet was used to steal about $47 million from European banking customers in the past
    year, security researchers report. Dubbed 'Eurograbber' by security vendors Versafe and
    Check Point Software Technologies in a report (PDF)
    released today, the malware is designed to defeat the two-factor authentication process
    banks use for transactions by intercepting bank messages sent
    to victims' phones. A
    variant of the Zeus malware used
    to steal more than $100 million, Eurograbber typically launched its attack when a
    victim clicked on a malicious link most likely included in a phishing attempt. After
    installing customized variants of the Zeus, SpyEye, and CarBerp trojans to the victim's
    computer, victims would be prompted by the malware during their first visit to the bank
    site after infection to enter their mobile phone number. During that first visit,
    Eurograbber would offer a "banking software security upgrade" that would infect
    victims' phones with a variant of the 'Zeus in the mobile' (ZITMO) Trojan, which was
    specifically designed to intercept the bank's text message containing the bank's
    transaction authorization number (TAN), the key element of the bank's two-factor
    authorization. Eurograbber would then quietly use the TAN to quietly transfer funds out of
    the victim's account.... First detected in Italy
    earlier this year, Eurograbber is responsible for the theft of 36 million euros from about
    30,000 commercial and personal bank accounts by initiating transfers ranging from 500
    euros ($656) to 250,000 euros ($328,000), according to the report." | 
| "Weeks of international intrigue
    about the whereabouts of tech millionaire John McAfee ended Tuesday after the Internet pioneer made an
    elementary digital mistake that highlighted the fraught relationship Americans have with
    what they once quaintly called 'the telephone.' That homely communication tool, wired into
    walls everywhere for the better part of a century, has become an untethered e-mailer,
    browser, banker, shopper, movie viewer, music player and  to an extent that few
    appreciate  digital spy of extraordinary power. McAfee, 67, who founded the
    popular antivirus company that bears his name, has been wanted for questioning by police
    in Belize since a neighbor turned up dead of a gunshot wound near McAfees beach-side
    home Nov. 11. The troubled tech savant, insisting that he had no role in the shooting,
    went on the run and has been taunting police by blog, Twitter
    and occasional podcast. Authorities couldnt catch him. But a hacker called Simple
    Nomad learned McAfees location shortly after journalists posted an image of him from
    his supposedly secret locale under the provocative headline, 'We are with John McAfee
    right now, suckers.' Embedded in that image, apparently taken by one of the journalists,
    was the sort of detailed data routinely collected by smartphone cameras and often
    transmitted along with images wherever they go  on e-mail, Facebook, online photo
    albums and, it turns out, to Vice magazines Web site. Simple Nomad, who declined to
    give any identifying personal details in an e-mail interview, examined the underlying data
    and quickly learned that McAfees image emanated from an iPhone 4S at the following
    location: 'Latitude/longitude: 15° 39 29.4 North, 88° 59 31.8 West,' at
    12:26 p.m. Monday. That put McAfee in a Guatemalan villa south of the border with Belize.
    .... the case resonated with privacy experts, who
    long have feared that most owners of smartphones have little idea how much information
    they collect and how easily it can be shared. Hackers can steal it. Police in many
    situations can review it for potential evidence. And users can accidentally transmit it,
    sometimes without even knowing they have done so....
    The rapid spread of smartphones has made it even harder for most users to monitor
    the creation and flow of personal information, Hoofnagle said. 'It has trapped a lot of
    people, this problem. Were often not aware of the metadata thats created.'.
    The McAfee case is all the more striking because of his presumed savviness in handling
    technology. " | 
| "The National Highway Traffic
    Safety Administration is expected to finalize a long-awaited proposal to make event data
    recorders standard on all new vehicles. In a notice
    posted Thursday, the White House Office of Management Budget said it has completed a
    review of the proposal to make so-called vehicle 'black boxes' mandatory in all cars and
    trucks, clearing the way for NHTSA to publish its final regulation. Nearly all vehicles
    currently have the devices. NHTSA's proposed rule, which would raise the percentage of
    vehicles required to have an EDR from 91.6 percent today to 100 percent of light-duty
    autos, would have an incremental cost of nearly $24.4 million, assuming the sale of 15.5
    million light vehicles per year. In 2010, Congress considered requiring EDRs in all
    vehicles by legislation. The Alliance of Automobile
    Manufacturers  the trade group representing Detroit's Big Three automakers, Toyota
    Motor Corp, and Volkswagen AG  said the government needs to take into account driver
    privacy. 'Event data recorders help our engineers
    understand how cars perform in the real world but looking forward, we need to make sure we
    preserve privacy. Automakers do not access EDR data without consumer permission, and any
    government requirements to install EDRs on all vehicles must include steps to protect
    consumer privacy,' said spokeswoman Gloria Bergquist." | 
| "Institutions have started to
    move their data and ICT operations into the cloud. It is becoming clear that this is
    leading to a decrease of overview and control over government access to data for law
    enforcement and national security purposes. This report looks at the possibilities for the U.S. government to obtain access to information
    in the cloud from Dutch institutions on the basis of U.S. law and on the basis of Dutch
    law and international co-operation. It concludes that the
    U.S. legal state of affairs implies that the transition towards the cloud has important
    negative consequences for the possibility to manage information confidentiality,
    information security and the privacy of European end users in relation to foreign
    governments. The Patriot Act from 2001 has started
    to play a symbolic role in the public debate. It is one important element in a larger,
    complex and dynamic legal framework for access to data for law enforcement and national
    security purposes. In particular, the FISA Amendments Act provision for access to data of
    non-U.S. persons outside the U.S. enacted in 2008 deserves attention. The report describes this and other legal powers for the U.S.
    government to obtain data of non-U.S. persons located outside of the U.S. from cloud
    providers that fall under its jurisdiction. Such jurisdiction applies widely, namely to
    cloud services that conduct systematic business in the United States and is not dependent
    on the location where the data are stored, as is often assumed. For non-U.S. persons
    located outside of the U.S., constitutional protection is not applicable and the statutory
    safeguards are minimal. In the Netherlands and
    across the EU, government agencies have legal powers to obtain access to cloud data as
    well. These provisions can also be be used to assist the U.S. government, when it does not
    have jurisdiction for instance, but they must stay within the constitutional safeguards
    set by national constitutions, the European Convention on Human Rights and the EU
    Charter." Cloud Computing in Higher Education and Research Institutions and the USA Patriot Act Van Hoboken, Joris V. J., Arnbak, Axel and Van Eijk, Nico, Cloud Computing in Higher Education and Research Institutions and the USA Patriot Act (November 27, 2012) | 
| "Facebook has been accused of a
    massive 'data grab' after encouraging users to allow it to automatically synchronise
    photos from their mobile devices to the social networks servers. The social network from
    Friday began asking users of its mobile apps to activate its new Photo Sync, which will
    automatically upload each picture to a private album. Whether or not users decide share
    the photos on their public newsfeed, Facebook itself will still have access. That means it will be able to mine those files for their metadata,
    including the location where the photo was taken, as well as use its facial recognition
    technology to spot those pictured." | 
| "Access to private data has
    increased by 20 per cent by Australias law enforcement and government agencies
     and with no warrant. Australians are 26 times more prone to be placed under
    surveillance than people in other countries, local media report. In such a way, state structures accessed private information over 300,000
    times last year  or 5,800 times every week, figures from the federal Attorney
    Generals Department showcase. The data includes phone and internet account
    information, the details of out and inbound calls, telephone and internet access location
    data, as well as everything related to the Internet Protocol (IP) addresses visited, the
    Sydney Morning Herald (SMH) reports. Australian media report that every government agency
    and organization use the gathered telecommunications data, and those include the
    Australian Crime Commission, the Australian Securities and Investments Commission, the
    Australian Tax Office, Medicare and Australia Post. New South Wales (NSW) Police became
    the biggest users of the private data, with 103,824 access authorizations during the last
    year  a third of all information accessed by the security forces. The news triggered
    massive public outrage, with Australian Greens Senator Scott Ludlam telling SMH, This is the personal data of hundreds of thousands, indeed
    millions of Australians, and it seems that just about anyone in government can get it.' He
    said the move demonstrated the current data access regime was 'out of control' and
    amounted to the framework for a 'surveillance state'." | 
| "Home Secretary Theresa May was challenged by Labour last night after
    it emerged that a former MI6 spy in a relationship with her senior Tory adviser is tipped
    to be appointed top Home Office mandarin. The
    expected promotion of ex-spook Charles Farr, the official most closely linked to Big Brother Britain, has
    sparked a heated debate among senior civil servants  and MPs. Unmarried Mr Farr, 53, the most powerful spy figure in Whitehall, is
    currently Director of the Office for Security and Counter Terrorism in Mrs Mays
    department. He is frontrunner to succeed former Home Office Permanent Secretary Dame Helen
    Ghosh. Ambitious Mr Farr is said to have impressed Mrs May with his handling of sensitive
    security matters. At present he is responsible for the so-called Snoopers
    Charter laws giving police, security services and the taxman the power to monitor
    the publics every internet click. Labour MP Keith Vaz, who chairs the all-party
    Commons Select Committee on Home Affairs, wrote to Whitehall chiefs last week demanding to
    know if Mrs May will have a say in deciding who gets Dame Helens job. Mr Vaz claims
    the delay is causing chaos. He told The Mail on Sunday: There is a leadership vacuum
    at the top of the Home Office that must be resolved to deal with urgent issues. A senior Tory figure with close contacts at MI6 said: I am
    concerned at the prospect of Mr Farr running the Home Office. He was not popular at MI6
    and his secretive manner is not in keeping with the requirements of modern Whitehall.
    Having a Permanent Secretary who is in a relationship with a Conservative official who
    works for Mrs May could put the Home Secretary in a tricky position.... He was thwarted in his ambition
    to be head of MI6 when rival and super-smooth Foreign Office diplomat John Sawers was
    given the job in 2009. Friends say Mr Farr sees
    becoming chief mandarin at the Home Office as the next best thing." | 
| "The people who control the interception of the internet and, to some
    degree also, physically control the big data warehouses and the international fiber-optic
    lines. We all think of the internet as some kind of Platonic Realm where we can throw out
    ideas and communications and web pages and books and they exist somewhere out there.
    Actually, they exist on web servers in New York or Nairobi or Beijing, and information
    comes to us through satellite connections or through fiber-optic cables. So whoever
    physically controls this controls the realm of our ideas and communications. And whoever is able to sit on those communications channels, can
    intercept entire nations, and thats the new game in town, as far as state spying is
    concerned  intercepting entire nations, not individuals.... The US National Security Agency
    has been doing this for some 20-30 years. But it has now spread to mid-size nations, even
    Gaddafis Libya was employing the EAGLE system, which is produced by French company
    AMESYS, pushed there in 2009, advertised in its international documentation as a
    nationwide interception system. So whats happened over the last 10 years is the
    ever-decreasing cost of intercepting each individual now to the degree where it is cheaper
    to intercept every individual rather that it is to pick particular people to spy upon.... If...  the mere security guards, you know, the people who
    control the guns, are able to take control of our intellectual life, take control of all
    the ways in which we communicate to each other, then of course you can see how dreadful
    the outcome will be. Because it wont happen to just one nation, it will happen to
    every nation at once. It is happening to every nation
    at once as far as spying is concerned, because now every nation is merging its society
    with internet infrastructure..... People think,
    well, yeah, I use Facebook, and maybe the FBI if they made a request, could come and get
    it, and everyone is much more aware of that because of Petraeus. But thats not the
    problem. The problem is that all the time nearly
    everything people do on the internet is permanently recorded, every web search. Do you
    know what you were thinking one year, two days, three months ago? No, you dont know,
    but Google knows, it remembers.... You know, the Stasi had a 10 per cent penetration of
    East German society, with up to 1 in 10 people being informants at some time in their
    life. Now in countries that have the highest internet penetration, like Iceland, more than
    80 per cent of people are on Facebook, informing about their friends. That information
    doesnt [simply] go nowhere. Its not kept in Iceland, its sent back into
    the US where it IS accessed by US intelligence and where it is given out to any friends or
    cronies of US intelligence  hundreds of national security letters every day publicly
    declared and being issued by the US government.... We have this position where as we know knowledge is power, and
    theres a mass transfer as a result of literally billions of interceptions per day
    going from everyone, the average person, into the data vaults of state spying agencies for
    the big countries, and their cronies  the corporations that help build them that
    infrastructure. Those groups are already powerful, thats why they are able to build
    this infrastructure to intercept on everyone. So they are growing more powerful,
    concentrating the power in the hands of smaller and smaller groups of people at once,
    which isnt necessarily bad, but its extremely
    dangerous once there is any sort of corruption occurring in the power. Because absolute power corrupts, and when it becomes corrupt, it can
    affect a lot of people very quickly. Bill Binney,
    National Security Agency whistleblower, who was the research head of the National Security
    Agencys Signals Intelligence Division, describes this as a turnkey
    totalitarianism, that all the infrastructure has been built for absolute
    totalitarianism. Its just the matter of turning the key..... in general I think the
    prognosis is very grim. And we really are at this
    moment where it can go one way or the other way. To a degree, perhaps the best we can be
    sure, if we work, of achieving is that some of us are protected. It may only be a
    high-tech elite, hopefully expanded a bit more  people who can produce tools and
    information for others that they can use to protect themselves. It is not necessary that
    all of society is covered, all of society is protected. What's necessary is that the
    critical accountability components of society that stop it from going down the tubes
    entirely, that those people are protected. Those include corruption investigators,
    journalists, activists, and political parties. These have got to be protected. If they are
    not protected, then it's all lost.... if we are not able to protect a significant number
    of people from mass state spying, then the basic democratic and civilian institutions that
    we are used to  not in the West, I am no glorifier of the West, but in all societies
     are going to crumble away. They will crumble away, and they will do so all at once.
    And that's an extremely dangerous phenomenon. It's not often where all the world goes down
    the tube all at once. Usually you have a few countries that are OK, and you can bootstrap
    civilization again from there.... The successes of WikiLeaks shouldnt be viewed
    merely as a demonstration of our organizations virility or the virility of the
    activist community on the internet. They are also a function of this hoarding of
    information by these national security [agencies]. The reason there was so much
    information to leak, the reason it could be leaked all at once is because they had hoarded
    so much. Why had they hoarded so much? Well, to gain extra power through knowledge. They
    wanted their own knowledge internally to be easily accessible to their people, to be
    searchable, so as much power could be extracted from it as possible." | 
| "Twitter users face the
    embarrassment of seeing their online past resurrected after the CEO of the microblogging
    site revealed plans to create an archive of every tweet ever sent. Currently, users of the site can only see their messages dating back to a
    certain point, allowing them to forget their online persona from years gone by. But that
    is all set to change towards the end of this year, when the site allows tweeters to
    download a full record of the activity on their accounts. The move could raise privacy
    fears, as it makes it easier for people to access the billions of tweets which have been
    sent since Twitter launched in July 2006. CEO Dick Costolo announced the change during a
    talk at the university of Michigan, and suggested it would be finalised by the end of the
    year." | 
| "If you're about to get rid of
    an old PC - to upgrade to a new Windows 8 machine, for example - it's wise to properly
    erase the drive if you want to sell it. Otherwise you could be handing an 'identity theft
    kit' to unscrupulous buyers. The truth is, erasing data on a PC isnt easy and the
    recycle bin is not going to stop anyone who really wants to poke around your old files and
    data once youve passed it to a new owner. To
    erase data and all digital traces of it, youre going to need extra software to do
    it, unless you physically remove the hard drive and deploy a mallet.  Before you
    start, remember to back up your files by either burning them on to DVDs, using an external
    hard drive or cloud-based online storage options like Dropbox, Microsoft SkyDive or Google
    Drive. You should also ensure you have your Windows discs that came with your PC or at
    least the code on the back of the disc packet which proves ownership. Whoever uses your PC
    after youve erased the hard drive will need to re-install the Windows operating
    system. Know your PC and discover how your PC is set up. Head to Control Panel and see
    what hard drives you have active on your PC. Your home drive is usually C but
    this may be divided into partitions and, depending on your PC, you may have two drives -
    one a standard hard drive and one a fast, flash-based memory drive frequently called a SSD
    or Solid State Drive. Erase both to be sure you've got rid of all your data. There are
    many software programs which allow you to erase data on your PC but the best free one is
    called DBAN or Dariks Boot and Nuke. DBAN is supplied as an ISO file, which needs to
    be burned to CD or DVD as your computer will be operating from your CD or DVD drive in
    order to erase the hard drive, which cannot be active when youre clearing all the
    data on it. You may already have software that allows you to burn DBAN to a disc as an ISO
    file - right click on the file and see if your computer offers you the option to burn as
    an ISO file. An ISO file differs from a simple file being copied to a disc. An ISO file
    allows a computer to boot the disc automatically and run the program - in this case,
    its DBAN. In order to download an ISO burning program, visit Free Iso Burner.
    Alternatively, you can try the popular Nero Burning Rom 12 software which isnt free
    but is very easy to use and currently offers a 15-day trial.... It is possible to use a
    USB stick to use programs like DBAN in the same way as you would use a CD drive, but
    its not straightforward and not recommended for anyone who isnt an IT
    professional..." | 
| "Nothing is
    private, especially not when it goes through Google (Gmail's) hands. If America's top
    spy, the head of the CIA, can get caught writing secret love letters to his girlfriend on
    Gmail, nobody's e-mails are safe. Petraeus and his clandestine girlfriend, Paula
    Broadwell, took some troubles to keep their illicit correspondence safe. They
    reportedly relied on a trick used by some al Qaeda operatives. They left messages
    to each other in the drafts folder of an account, the password to which they both knew,
    thinking they would remain for their eyes only. But it didn't work. When the FBI came calling, Google opened up its shockingly large
    files, as it does with shocking regularity. Google knows everything about you, and it
    frequently shares with those who ask. Google's own reports say it passed information to authorities in
    response to 93 percent of government requests in the second half of 2011. Nothing in
    Google's hands is guaranteed to remain private." | 
| "Government surveillance of citizens' online
    lives is rising sharply around the world, according to Google's
    latest report on requests to remove content and hand over user data to official
    agencies. In the first six months of this year, authorities worldwide made 20,939 requests
    for access to personal data from Google users, including search results, access to Gmail
    accounts and removal of YouTube videos. Requests have risen steeply from a low of 12,539
    in the last six months of 2009, when Google first published its Transparency Report. Authorities made 1,791 requests for Google to remove 17,746 pieces of
    content in the first half of 2012, almost twice as many as the 949 requests made in the
    same period last year, and up from 1,048 requests made in the last six months of 2011.
    'This is the sixth time we've released this data, and one trend has become clear:
    government surveillance is on the rise,' Google
    said in a blogpost. One of the sharpest rises came in requests from Turkey,
    which held an election on 12 June 2011. Google reported a 1,013% rise in requests from
    Turkish authorities in the latest reporting period, including 148 requests to remove 426
    YouTube videos, Blogger blogs, one Google document and one search result. The contested
    items allegedly criticised Mustafa Kemal Atatürk (the first president of Turkey), the
    government or 'national identity and values'. Google restricted Turkish users from
    accessing 63% of the YouTube videos. It did not remove the other content. The US accounted
    for the most requests, as it has consistently since the report was launched. US
    authorities asked for private details of Google users on 7,969 occasions, up from 6,321 in
    the last reporting period. The number is more than a third of the 20,938 requests for
    users' details worldwide. Google fully or partially complied with 90% of those requests.
    Over the six months, Google was asked to remove seven YouTube videos that criticised local
    and state agencies, police and other public officials. It did not comply with these
    requests. US figures represent a larger share of the requests for a variety of reasons.
    Google has a larger number of US users, the US authorities are more familiar with working
    with Google and foreign countries sometimes make requests for information through US
    agencies. Those queries are logged as US requests, as Google is not told where the query
    originated from. Europe now accounts for five of the top 10 countries making requests for
    user data. France, Germany, Italy, Spain and the UK are all in the top 10 in terms of
    numbers of requests. The number of requests for content removal in the UK shot up 98% in
    the UK and 60% in Spain. In the UK, local police authorities unsuccessfully pressed for
    Google to remove links to sites that accused the police of obscuring crime and racism. The UK is currently considering a bill that would require internet and phone companies to
    track and store every citizen's web and mobile phone use, including social networking
    sites, without retaining their content, for 12 months." | 
| "The U.S. government -- and
    likely your own government, for that matter -- is either watching your online activity
    every minute of the day through automated methods and non-human eavesdropping techniques,
    or has the ability to dip in as and when it deems necessary -- sometimes with a warrant,
    sometimes without....Gen. David Petraeus, the former
    head of the U.S. Central Intelligence Agency, resigned over the weekend after he was found
    to have engaged in an extra-marital affair. What
    caught Petraeus out was, of all things, his usage of
    Google's online email service, Gmail. This has not only landed the former CIA chief in
    hot water but has ignited the debate over how, when, and why governments and law
    enforcement agencies are able to access ordinary citizens' email accounts, even if they
    are the head of the most powerful intelligence agency in the world. If it makes you feel any better, the chances are small that your own or a
    foreign government will snoop on you. The odds are much greater -- at least for the
    ordinary person (terrorists, hijackers et al: take note) -- that your email account will
    be broken into by a stranger exploiting your weak password, or an ex-lover with a grudge
    (see 'Fatal Attraction'). Forget
    ECHELON, or signals intelligence, or the interception of communications by black boxes
    installed covertly in data centers. Intelligence
    agencies and law enforcement bodies can access -- thanks to the shift towards Web-based
    email services in the cloud -- but it's not as exciting or as Jack Bauer-esque as one may
    think or hope for. The easiest way to access almost
    anybody's email nowadays is still through the courts. (Sorry to burst your bubble, but
    it's true.) Petraeus set up a private account under a pseudonym and composed email
    messages but never sent them. Instead, they
    were saved in draft. His lover, Paula Broadwell, would log in under the same account,
    read the email and reply, all without sending anything. The traffic would not be sent
    across the networks through Google's data centers, making it nigh on impossible for the
    National Security Agency or any other electronic signals eavesdropping agency (such as
    Britain's elusive GCHQ) to 'read' the traffic while it is in transit.... But surely IP addresses are logged and noted? When emails are
    sent and received, yes. But the emails were saved in draft and therefore were not sent.
    However, Google may still have a record of the IP addresses of those who logged into the
    account. However, most Internet or broadband providers offer dynamic IP addresses that
    change over time, and an IP address does not always point to the same computer, let alone
    the same region or state every time it is assigned to a user. Even then, recent U.S. court
    cases have found
    that IP addresses do not specifically point to a computer, meaning even if the
    authorities were sure that it was Petraeus, for instance -- though IP addresses very
    rarely give the exact house number and street address -- it would not stick in court. As is often the case, human error can land someone in the legal
    spotlight. 37-year-old Florida resident Jill Kelley, a family friend to the Petraeus',
    allegedly received emails from an anonymous account warning Kelley to stay away from the
    CIA chief. But when Broadwell sent these messages, it left behind little fragments of data
    attached to the email -- every email you send has this data attached -- which first led
    the FBI on a path that led up to the very door of Petraeus' office door in Langley,
    Virginia. There's no such thing as a truly 'anonymous' email account, and no matter how
    much you try to encrypt the contents of the email you are sending, little fragments of
    data are attached by email servers and messaging companies. It's how email works and it's
    entirely unavoidable. Every email
    sent and receive comes with 'communications data,' otherwise known as 'metadata' --
    little fragments of information that carries the recipient and the sender's address, and
    routing data such as the IP addresses of the sender and the servers or data center that
    it's passed through. Extracting this metadata is not a mystery or difficult, in fact
    anyone can do it, but if you have the legal tools and law enforcement power to determine
    where the email was passed through -- such as an IP address of one of Google's data center
    in the United States. The system is remarkably similar to the postal system. You can seal
    the envelope and hide what's inside, but it contains a postmark of where it came from and
    where it's going. It may even have your fingerprints on it. All of this information
    outside the contents is 'metadata.' That said, even if you use a disposable Gmail account
    -- such as iamananonymousemailsender@gmail.com, for instance -- it's clearly a Gmail
    account, and Gmail is operated by Google. Sometimes it just takes a smidgen of common
    knowledge. Ultimately, only Google had access to the emails. Because it's a private
    company, it does not fall
    under the scope of the Fourth Amendment. If the U.S. government or one of its law
    enforcement agencies wanted to access the private Petraeus email account, it would have to
    serve up a warrant. In this case, however, the Foreign Intelligence Services Act (FISA)
    would not apply. Even the Patriot Act would not necessarily apply in this case, even
    though it does allow the FBI and other authorized agencies to search email. However, in
    this case, above all else, the Stored Communications Act does apply -- part of the Electronic
    Communications Privacy Act. The act allows for
    any electronic data to be read if it has been stored for less than 180 days. In this case,
    the law was specifically designed -- albeit quite some time before email became a
    mainstream communications medium -- to allow server- or computer-stored data to be
    accessed by law enforcement. However, a court order must be issued after the 180 days, and
    in this case it was. Reporting from London, the BBC
    News' Mark Ward summed it up in a
    single sentence: Once it knew Ms. Broadwell was
    the sender of the threatening messages, the FBI got a warrant that gave it covert access
    to the anonymous email account. And that's how they do it. No matter which way you look at
    it, no matter how much the government or its law enforcement agencies want the data or the
    proof of wrongdoing, they must almost always get a court order. And Petraeus is no
    different from any other U.S. citizen, U.K. citizen, or European citizen -- and further
    afield for that matter. What it always boils down to is a court order, and it's as simple
    as that. It's not ECHELON or an episode of '24'
    using hacking or cracking techniques; it's an afternoon in a fusty courtroom with a
    semi-switched on (and preferably sober) judge. That said, it doesn't grant unfettered or
    unrestricted access to a user's inbox or email account, but when an alleged crime has been
    committed or law enforcement starts digging around, it allows a fairly wide berth of
    powers to request access to electronically stored data. Former assistant secretary to the
    U.S. Department of Homeland Security Stewart Baker told the Associated
    Press: The government can't just wander through your emails just because they'd like
    to know what you're thinking or doing. But if the government is investigating a crime, it
    has a lot of authority to review peoples emails. So there it is. A court order is
    all you need to access a person's inbox, but sufficient evidence is often required in
    order to do this -- particularly through the Stored Communications Act, or the Electronic
    Communications Privacy Act. It sounds obvious, of course, that's because it is. That said,
    if there is reasonable suspicion albeit lacking evidence, or a U.S. law enforcement agency
    is dealing with a foreign national outside of the United States, that normally requires a
    secret FISA court order to be granted in order to proceed with the interception of data or
    warranted access to an email account, for example.... But it's OK; you're in Europe, or
    Australia, or Asia. The U.S. can't use their laws against you in a foreign country
    because, well, you're outside of its jurisdiction. Again, sorry to burst your privacy
    bubble but that excuse didn't
    wash with the European Parliament, it shouldn't with you either. If you're a European citizen with a Microsoft, Google, Yahoo or Apple
    account -- or any email
    offered in the cloud by a U.S. company -- which is most consumer email services
    nowadays -- it is accessible to the U.S. courts and other nations through various acts of
    law, such as the Foreign Intelligence Surveillance Act (FISA) or the PATRIOT Act, in which
    the latter amended much of what the former had implemented in the first place....The
    trouble is even though there is some level of accountability via the FISA courts, these
    sessions are held in secret and there are no public minutes
    or record to go from, so swings and roundabouts. Only in exceptional cases where warrants
    are not issued is when there is an immediate threat to life. But because these courts are
    secret, there's no definitive and ultimate way to know for an absolute fact that the U.S.
    authorities don't just bypass the FISA courts and skip ahead with their investigations
    anyway..... On the third point, other countries do
    have similar laws and this should be noted. (I personally thought it was relatively common
    knowledge, forgive my naivety.) The U.K., for instance, has the
    Regulation of Investigatory Powers Act that can be used to acquire data from a
    third-country via a U.K.-based firm, just as the Patriot Act can be used on a U.S.
    firm to access data in a third-country via a local subsidiary. But in terms of where the major email and cloud providers are
    based -- the United States, notably on the West Coast -- it means that U.S. law must
    apply, in spite of foreign laws that attempt to or successfully counteract the provisions
    offered in U.S. law. Not many major cloud providers operate solely in the U.K., whereas
    Microsoft, Google, Apple and Amazon are all U.S. headquartered with a subsidiary in the
    U.K. and other countries. The lesson here? We're all
    as bad as each other and no legally or financially reasonable place is safe to store data
    if you're a massive criminal or looking to stash a bunch of secret or uncouth documents
    away from the authorities." | 
| "As is now widely
    reported, the FBI investigation began when Jill Kelley - a Tampa socialite friendly
    with Petraeus (and apparently very friendly
    with Gen. John Allen, the four-star U.S. commander of the war in Afghanistan) - received a
    half-dozen or so anonymous emails that she found vaguely threatening. She then informed a
    friend of hers who was an FBI agent, and a major FBI investigation was then launched that
    set out to determine the identity of the anonymous emailer. That is the first disturbing
    fact: it appears that the FBI not only devoted substantial resources, but also engaged in
    highly invasive surveillance, for no reason other than to do a personal favor for a friend
    of one of its agents, to find out who was very mildly harassing her by email. The emails
    Kelley received were, as the
    Daily Beast reports, quite banal and clearly not an event that warranted an FBI
    investigation... That this deeply personal motive was what spawned the FBI investigation
    is bolstered by the
    fact that the initial investigating agent 'was barred from taking part in the case
    over the summer due to superiors' concerns that he was personally involved in the case' -
    indeed, 'supervisors soon became concerned that the initial agent might have grown
    obsessed with the matter' - and was found to have 'allegedly sent shirtless photos' to
    Kelley, and 'is now under investigation by the Office of Professional Responsibility, the
    internal-affairs arm of the FBI'... What is most
    striking is how sweeping,
    probing and invasive the FBI's investigation then became, all without any evidence of
    any actual crime - or the need for any search warrant... So all based on a handful of
    rather unremarkable emails sent to a woman fortunate enough to have a friend at the FBI,
    the FBI traced all of Broadwell's physical locations, learned of all the accounts she
    uses, ended up reading all of her emails, investigated the identity of her anonymous lover
    (who turned out to be Petraeus), and then possibly read his emails as well. They dug
    around in all of this without any evidence of any real crime - at most, they had a case of
    'cyber-harassment' more benign than what regularly appears in my email inbox and that of
    countless of other people - and, in large part, without
    the need for any warrant from a court. But that
    isn't all the FBI learned. It was revealed
    this morning that they also discovered 'alleged inappropriate communication' to Kelley
    from Gen. Allen, who is not only the top commander in Afghanistan but was also just
    nominated by President Obama to be the Commander of US European Command and Supreme Allied
    Commander Europe (a nomination now 'on hold'). .... not
    only did the FBI - again, all without any real evidence of a crime - trace the locations
    and identity of Broadwell and Petreaus, and read through Broadwell's emails (and possibly
    Petraeus'), but they also got their hands on and read through 20,000-30,000 pages of
    emails between Gen. Allen and Kelley. This is a surveillance
    state run amok. It also highlights how any remnants of
    internet anonymity have been all but obliterated by the union between the state and
    technology companies." | 
| "A huge 'Big Brother' style
    database containing details of around eight million schoolchildren is being compiled
    without the knowledge of their parents. IT systems specialists are creating the database -
    including such information as a child's age, sex, and academic records - which can be
    shared among officials from other agencies such as the police, NHS and charities. Teachers are uploading information on pupils as often as six times a day
    to the database, created by Capita, one of the UK's largest contractors to both central
    and local government. The database is said to be already being used by as many as 100
    local authorities, according to The Sunday Times, with 22,000 schools nationwide uploading
    to the service to provide a 'thread' of data that is accessible to all those working with
    children. It is thought that youth offending teams, which include police officers, will
    also be offered access to the information. As well as basic details such as the child's
    address and attendance records, information about special needs and behavioural records
    are also included." | 
| "Some Americans who have access to sensitive information and who
    travel to China describe going
    to tremendous lengths to minimize government efforts to seize their data. Some copy
    and paste their passwords from USB thumb drives rather than type them out, for fear of
    key-logging software. They carry 'loaner' laptops and cellphones and pull out cellphone
    batteries during sensitive meetings, worried that the microphone could be switched on
    remotely. The New York Times called
    such extreme measures, which also apply in other countries, 'standard operating procedure
    for officials at American government agencies.'' | 
| "Yesterday, we got a rare look
    at how information on your public social media profilesincluding Twitter, Facebook
    and LinkedInis being harvested and resold by large consumer data companies.
    Responding to a congressional query, nine data companies provided answers to a detailed
    set of questions about what kinds of information they collect about individual Americans,
    and where they get that data. Their responses, released Thursday
    [1], show that some companies record  and then resell  your screen names, web
    site addresses, interests, hometown and professional history, and how many friends or
    followers you have. Some companies also collect and
    analyze information about users 'tweets, posts, comments, likes, shares, and
    recommendations,' according to Epsilon, a consumer data company. While many of these
    details were already available on the data companies websites, the lawmakers used
    the letters as a chance to raise awareness about an industry that they said has largely
    'operated in the shadows.' 'Posting to Facebook should not also mean putting personal
    information into the hands of data reapers seeking to profit from details of
    consumers personal lives,' Massachusetts Rep. Edward J. Markey told ProPublica in an
    e-mailed statement." | 
| "RFID
    (Radio Frequency Identification Devices), is a tracking technology. RFID technology is
    currently used on banking, library books, pets, cattle, autos, medications,
    and some humans (such as for patient identification purposes). The replacement of bar
    codes in grocery stores is another application of RFID chips, for the stated purpose of
    expediting the checking out process. YES, it is true, there are conveniences
    associated with RFID technology, but it boils down to tracking. Tracking sounds like being
    organized, or civilized. But when tracking goes into every facet of our lives, it has
    chilling consequences. Today, there are beta tests
    being conducted in some schools, in Florida, Mississippi, Texas, and Louisiana. This is to
    track children, if they get to class on time, or, spend too much time where they should
    not. They are being required to wear tracking necklaces. Tracking, and surveillance of
    smart things (phones, cards, chickens), are, in theory keeping us
    safe. Already, the US Department of Agriculture demands that ranchers use RFID chips
    to monitor their livestock. Tracking things is one thing, but tracking your biology? RFID
    systems generally consist of a transponder and reader. The reader is usually connected to
    a computer database. RFID chips have been around for a while. In fact, it is sophisticated
    enough that people are concerned about their information being stolen just upon walking in
    an airport, for instance. But, now comes the fun part: nanotechnology,
    the atomic and molecular computing technology, merging with RFID. Imagine a strand of hair
    with several hundred computers on it. These can track all sorts of things including
    biology, or biometrics. The science fiction story, 1984, by George Orwell seems to be
    unfolding with precision. Now that nanotechnology is quickly emerging, RFID chips can be
    implanted under the skin
and at some point, will not visible. Think about computer
    tracking under your skin, with external readers, and data collection mining. Creepy.
    Tracking health, your body fluids, your power usage, your whereabouts, your money, your
    food, eventually, your thoughts? No problem? Besides your information potentially
    leaking out such as your banking, social security number, or health status,
    think about atomic sized machines, potentially going into your cells." | 
| "The U.S. spent $75.4 billion on
    its military and civilian spy agencies in the last fiscal year, officials announced
    Tuesday. The U.S. intelligence budget
    is divided between the Military Intelligence Program, which the Pentagon said was $21.5 billion
    for fiscal 2012, and the National Intelligence
    Program, which was $53.9 billion, according to Director of National IntelligenceJames R. Clapper. The National Intelligence
    Program (NIP) funds the CIA
    and other civilian agencies and provides some funding for the major military agencies such
    as the National
    Security Agency and Defense
    Intelligence Agency. 'The NIP supports national decision-makers, so, to the extent
    that the NSA
    and other agencies in the Department
    of Defense provide intelligence to the president or other civilian leaders, they are
    funded from the NIP,' said Steven Aftergood of the
    Federation
    of American Scientists, who advocates for more transparency in U.S. intelligence funding.
    Mr. Aftergood said
    the fiscal 2012 NIP budget was $700 million lower than the previous years, noting
    that 'its the first drop in the NIP for many years.' The NIP budget had risen every
    year since it was first disclosed in 2007, he said." | 
| "A
    senior government official has sparked anger by advising internet users to give fake
    details to websites to protect their security. Andy Smith, an internet security chief at
    the Cabinet Office, said people should only give accurate details to trusted sites such as
    government ones. He said names and addresses posted on social networking sites 'can be
    used against you' by criminals. His advice was
    described by Labour MP Helen Goodman as 'totally outrageous'. Ms Goodman, shadow culture
    minister, told BBC News: 'This is the kind of behaviour that, in the end, promotes crime.
    'It is exactly what we don't want. We want more security online. It's anonymity which
    facilitates cyber-bullying, the abuse of children. 'I was genuinely shocked that a public
    official could say such a thing.' Mr Smith, who is in charge of security for what he
    described as the 'largest public services network in Europe', which will eventually be
    accessed by millions of people in the UK, said giving fake details to social networking
    sites was 'a very sensible thing to do'. 'When you put information on the internet do not
    use your real name, your real date of birth,' he told a Parliament and the Internet Conference
    in Portcullis House, Westminster. 'When you are putting information on social networking
    sites don't put real combinations of information, because it can be used against you.' But
    he stressed that internet users should always give accurate information when they were
    filling in government forms on the internet, such as tax returns. 'When you are
    interacting with government, or professional organisations - people who you know are going
    to protect your information - then obviously you are going to use the right stuff. But he
    said that fraudsters gather a lot of personal information 'from Google, social networking
    sites, from email footers, all sorts of places'. He added that they were 'bringing this
    information together and cross-correlating information and then they are using it against
    you'. Mr Smith's comments were backed by Lord Erroll, chairman of the Digital Policy
    Alliance, a not-for-profit policy studies group which claims to speak for industry and
    charities, who was chairing the panel. He said he had always given his date of birth as '1
    April 1900'.  The crossbench peer later told BBC Radio 4's PM programme Mr Smith had
    given people 'a very good bit of advice' - particularly as banks used date of birth as a
    means of verifying identity.... Citing an anecdote about novelist Salman Rushdie - who won
    a battle last year to use his commonly used middle name rather than his actual first name
    Ahmed on his profile page - he said: 'Facebook doesn't allow you to put on false details
    and they will take you off if they discover you have.' Simon Milner, Facebook's head of
    policy in the UK and Ireland, who was at the conference, also took issue with Mr Smith's
    comment. He told the audience of industry experts and MPs he had a 'vigorous chat' with
    the Cabinet Office official afterwards to persuade him to revise his view." | 
| "On 15 October, the Dutch
    ministry of Justice and Security proposed powers for the police to break into computers,
    install spyware, search computers and destroy data. These powers would extend to computers
    located outside the Netherlands. Dutch digital
    rights movement Bits of Freedom warns for the unacceptable risks to cybersecurity and
    calls on other countries to strongly oppose the proposal. The proposal
    (Dutch, PDF) would grant powers to the Dutch police to break into computers, including
    mobile phones, via the internet in order to: * install spyware, allowing the police to
    overtake the computer; * search data on the computer, including data on computers located
    in other countries; and * destroy data on the computer, including data on computers
    located in other countries. - If the location of the computer cannot be determined, for
    example in the case of Tor-hidden services, the police is not required to submit a request
    for legal assistance to another country before breaking in. Under the current text, it is
    uncertain whether a legal assistance request would be legally required, or merely
    preferred, if the location of the computer is known. The exercise of these powers requires
    a warrant from a Dutch court. This proposal poses unacceptable risks. If the Dutch government gets the power to break into foreign
    computers, this gives other governments the basis to break into Dutch computers which
    infringe the laws of their country. The end result could be less security for all computer
    users, instead of more. This is even more true with regard to the power to destroy data on
    foreign computers; it is likely that other governments would be very interested in using
    such a power against Dutch interests." | 
| "Verizon spying on its customers
    may seem bad for business, but according to the telecom giant's latest privacy policy
    update, that's exactly what they will be doing. Verizon wireless recently revealed that
    its new privacy agreement will allow them to spy on its user's web habits, including the
    websites you visit, the location data of your phone and where you use the browser. While the Verizon spying is supposed to be used only for commercial
    purposes, the whole thing seems very big brother-ish. Verizon says the purpose is to
    present users with more relevant ads, but the agreement says the data can be shared with
    third-party companies." | 
| "Lately, Mike Janke has
    been getting what he calls the 'hairy eyeball' from international government agencies. The
    44-year-old former Navy SEAL commando, together with two of the world's most renowned
    cryptographers, was always bound to ruffle some high-level feathers with his new project  a surveillance-resistant communications
    platform that makes complex encryption so simple your grandma can use it. This
    week, after more than two years of preparation, the finished product has hit the market.
    Named Silent Circle, it is in essence a series of applications that can be used on a
    mobile device to encrypt communications  text messages, plus voice and video calls.
    Currently, apps for the iPhone and iPad are available, with versions for Windows, Galaxy,
    Nexus and Android in the works. An email service is also soon scheduled to launch. The
    encryption is peer to peer, which means that Silent Circle doesn't centrally hold a key
    that can be used to decrypt people's messages or phone calls. Each phone generates a
    unique key every time a call is made, then deletes it straight after the call finishes. When sending text messages or images, there is even a 'burn' function,
    which allows you to set a time limit on anything you send to another Silent Circle user
     a bit like how 'this tape will self destruct' goes down in 'Mission: Impossible,'
    but without the smoke or fire. Silent Circle began as an idea Janke had after spending 12
    years working for the U.S. military and later as a security contractor. When traveling
    overseas, he realized that there was no easy-to-use, trustworthy encrypted communications
    provider available to keep in touch with family back home. Cellphone calls, text messages
    and emails sent over the likes of Hotmail and Gmail can just be 'pulled right out of the
    air,' according to Janke, and he didn't think the few commercial services offering
    encryption  like Skype and Hushmail  were secure enough. He was also made
    uneasy by reports about increased government snooping on communications. 'It offended what
    I thought were my God-given rights  to be able to have a free conversation,' Janke
    says. 'And so I began on this quest to find something to solve it.'.... Janke says he's
    already sold the technology worldwide to nine news outlets, presumably keen to help
    protect their journalists' and sources' safety through encryption. (ProPublica, for one,
    confirmed it's had 'preliminary discussions' with Silent Circle.) A major multinational
    company has already ordered 18,000 subscriptions for its staff, and a couple of A-list
    actors, including one Oscar winner, have been testing the beta version. The basic secure
    phone service plan will cost $20 a month per person, though Janke says a number of human
    rights groups and NGOs will be provided with the service for free. The company has also
    attracted attention from 23 special operations units, intelligence agencies, and law
    enforcement departments in nine countries that are interested in using Silent Circle to
    protect the communications of their own employees  particularly on the personal
    devices that they use at home or bring to work. Some of these same agencies, perhaps
    unsurprisingly, have contacted Janke and his team with concerns about how the technology
    might be used by bad guys. Because Silent Circle is available to just about anyone, Janke
    accepts there is a real risk that a minority of users could abuse it for criminal
    purposes. But he argues you could say the same thing about baseball bats and says if the
    company is ever made aware someone is using the application for 'bad illegal things'
     he cites an example of a terrorist plotting a bomb attack  it reserves the
    right to shut off that person's service and will do so 'in seven seconds.' The very features that make Silent Circle so valuable from a civil
    liberties and privacy standpoint make law enforcement nervous. Telecom firms in the United
    States, for instance, have been handing over huge troves of data to authorities under a
    blanket of secrecy and with very little oversight. Silent Circle is attempting to counter
    this culture by limiting the data it retains in the first place. It will store only the
    email address, 10-digit Silent Circle phone number, username, and password of each
    customer. It won't retain metadata (such as times and dates calls are made using Silent
    Circle). Its IP server logs showing who is visiting the Silent Circle website are
    currently held for seven days, which Janke says the company plans to reduce to just 24
    hours once the system is running smoothly. Almost every base seems to have been covered.
    Biannually, the company will publish requests it gets from law enforcement in transparency
    reports, detailing the country of origin and the number of people the request encompassed.
    And any payment a person makes to Silent Circle will be processed through third-party
    provider, Stripe, so even if authorities could get access to payment records, Janke says,
    'that in no way gives them access to the data, voice and video the customer is
    sending-receiving . . . nor does it tie the two together.' If authorities wanted to intercept the communications of a person using
    Silent Circle, it is likely they'd have to resort to deploying Trojan-style tools 
    infecting targeted devices with spyware to covertly record communications before they
    become encrypted. Among security geeks and privacy advocates, however, there's still far
    from consensus how secure Silent Circle actually is. Nadim Kobeissi, a Montreal-based
    security researcher and developer, took to his blog last week to pre-emptively accuse the
    company of 'damaging the state of the cryptography community.' Kobeissi's criticism was
    rooted in an assumption that Silent Circle would not be open source, a cornerstone of
    encrypted communication tools because it allows people to independently audit coding and
    make their own assessments of its safety (and to check for secret government backdoors).
    Christopher Soghoian, principal technologist at the ACLU's Speech Privacy and Technology
    Project, said he was excited to see a company like Silent Circle visibly competing on
    privacy and security but that he was waiting for it to go open source and be audited by
    independent security experts before he would feel comfortable using it for sensitive
    communications." | 
| "A new cyber espionage program linked to the notorious Flame and
    Gauss malware has been detected by Russia's Kaspersky Lab. The anti-virus giants
    chief warns that global cyber warfare is in 'full swing' and will probably escalate in
    2013. The virus, dubbed miniFlame, and also known as SPE, has already infected computers
    in Iran, Lebanon, France, the United States and Lithuania. It was discovered in July 2012
    and is described as 'a small and highly flexible malicious program designed to steal data
    and control infected systems during targeted cyber
    espionage operations,' Kaspersky Lab said in a
    statement posted on its website. The malware was originally identified as an appendage of Flame  the program used for targeted cyber espionage in the Middle East and acknowledged to be part of joint US-Israeli
    efforts to undermine Irans nuclear program. But later, Kaspersky Lab analysts
    discovered that miniFlame is an 'interoperable tool that could be used as an independent
    malicious program, or concurrently as a plug-in for both the Flame and Gauss malware.' The
    analysis also showed new evidence of cooperation between the creators of Flame and Gauss,
    as both viruses can use miniFlame for their operations." | 
| "Almost
    a third of all fraudulent banking transactions now originate from the customer's own
    computer, as cyber criminals use increasingly sophisticated malware to hijack accounts,
    online security specialists warned yesterday. To combat the ever-present threat of online
    crime, financial institutions across Europe have developed multiple security mechanisms
    such as encrypted card readers and complex security questions when customers log on to
    their accounts. But experts are warning that the latest software used by criminals to
    steal money from people's accounts is becoming so clever that it fools the bank into
    thinking that they are making a legitimate online transaction. Cyber-security experts have described the latest remote administration
    tools used to hijack people's computers  often referred to by hackers as 'rats'
     as 'blood chilling' in their complexity and efficiency. Analysts yesterday
    illustrated how the latest malware could infect an unwitting person's computer and quickly
    persuade the user to send over vital security data such as log-on details and passwords.
    The example they used came from a Russian hacker who was recently arrested with more than
    £140,000 in his house. Using the latest trojan viruses, hackers infect a computer and
    communicate with their victims by pretending to be their bank, asking them for personal
    data which then enables them to log into their accounts and move money around. Until
    recently, less sophisticated malware meant that those hackers who had gained en-ough
    log-in data would still have to try to access a stolen account from a computer that was
    not the customer's, which often alerts a bank's al-arm systems and prompts further
    security questions. Now the latest software allows the hacker to remotely access an
    infected computer's bank account from the customer's own machine without them
    knowing." Be warned: your computer may be stealing your money Independent, 10 October 2012 | 
| "... in a radio interview, Wall Street Journal reporter Julia Angwin (who's been
    one of the best at covering the surveillance state in the US) made a simple observation
    that puts much of this into context: the US surveillance regime has more
    data on the average American than the Stasi ever did on East Germans. And, of course, as we've already seen, much of that data seems to be
    collected illegally
    with little oversight... and with absolutely no security benefit..... Even if there are
    legitimate technical reasons for why the government has so much more data on us, it
    doesn't change the simple fact (true both then and now) that such data is wide open to
    abuse, which inevitably happens. The ability of
    government officials to abuse access to information about you for questionable purposes is
    something that we should all be worried about. Even
    those who sometimes have the best of intentions seem to fall prey to the temptation to use
    such access in ways that strip away civil liberties and basic expectations of privacy.
    Unfortunately, the courts seem to have very little recognition of the scope of the issue,
    and there's almost no incentive for Congress (and certainly the executive branch) to do
    anything at all to fix this." | 
| "A nice coincidence last
    Tuesday. As the joint select committee of peers and MPs met to hear evidence on the draft
    Communications Data Bill, which will give police and intelligence services the power to
    access all your email data and internet connections, the hacking
    group AntiSec published a sample of 12 million unique Apple device identifiers. These
    device identifiers may have included details of President Obama's iPad and almost
    certainly came from an FBI agent's laptop, which goes to prove that wherever you have a
    big database, someone will find a way into it, even when the information is trusted to one
    of the most sophisticated intelligence agencies on Earth.... Just about everyone from the
    London Internet Exchange (Linx) to the Law Society is opposed to the 'snooper's charter'
    on the grounds of privacy. But let's forget that core issue for a moment and focus on the
    bill's origin, which happens to be the seething breast of a man named Charles Farr, formerly of MI6, now the head
    of the office for security and counterterrorism at the Home Office.... One of the interesting points of the proposal is that data passing
    through this country would be liable to be monitored by the government. Foreigners being
    unwittingly subjected to British surveillance is one thing but if
    Facebook, say, agrees to collect data on British users, Professor Ross Anderson, the digital security
    expert from Cambridge, says: 'That data will be made available to the FBI, like it or
    not.' Thus our government will be exposing citizens
    to unwarranted intrusion from foreign agencies....Mass
    surveillance of everyone, using special filters installed at more than 200 internet
    service providers, is bound to miss the bad guys. Professor
    Peter Sommer, an academic and expert witness on digital issues, suggested to the
    committee that surveillance could easily be avoided by buying a data SIM card, using an
    internet cafe or by means of draft emails on a web-based email service, where all the
    members of a conspiracy share one identity and so can access the same email account.
    Because the emails are saved as drafts only, they escape surveillance and so the email
    account acts as a discreet communications channel. The
    bill would obviously stimulate more and more ingenuity among those who want to break the
    law..... Glyn
    Wintle, who is paid to break into systems to test their security, told the committee that
    he once kept a log of data losses reported in the British media. It worked out a loss
    every two days of up to 200 million personal records, which underscores Anderson's rule
    that no large database can be secure and functional at the same time." | 
| "The Government will announce
    details this month of a controversial national identity scheme which will allow people to
    use their mobile phones and social media profiles as official identification documents for
    accessing public services. People wishing to apply for services ranging from tax credits
    to fishing licences and passports will be asked to choose from a list of familiar online
    log-ins, including those they already use on social media sites, banks, and large
    retailers such as supermarkets, to prove their identity. Once they have logged in
    correctly by computer or mobile phone, the site will send a message to the government
    agency authenticating that users identity. The
    Cabinet Office is understood to have held discussions with the Post Office, high street
    banks, mobile phone companies and technology giants ranging from Facebook and Microsoft to
    Google, PayPal and BT. Ministers are anxious that the
    identity programme is not denounced as a 'Big Brother' national ID card by the back door,
    which is why data will not be kept centrally by any government department. Indeed, it is
    hoped the Identity Assurance Programme, which is being led by the Cabinet Office, will
    mean the end to any prospect of a physical national ID card being introduced in the UK....
    Privacy campaigners are not wholly convinced by the programme. 'Although this is a fine
    scheme in principle and is backed by ministers the danger is that it could be side-lined
    and used as a fig leaf by the data-hungry government departments,' said Guy Herbert,
    general secretary of No2ID, which has been consulted by the Cabinet Office. Details of the
    'identity assurance' scheme are being finalised amid growing concerns over identity theft
    and other forms of cybercrime. Foreign Secretary William Hague and Cabinet Office minister
    Francis Maude, who is at the head of the Identity Assurance Programme, will today (Thurs)
    meet international experts at the Budapest Conference on Cyberspace. Mr Maude will give a
    keynote speech. The Cabinet Office believes its new identity model will 'prevent
    login fatigue [from] having too many usernames and passwords' and save public
    money by increasing trust in online services. The system is likely to be adopted by local
    authorities nationwide. The Government hopes the identity system will form the basis of a
    universally-recognised online authentication process for commercial transactions on the
    Internet, boosting the economy and strengthening Britains position as a leader in
    e-commerce.... The first law passed by the Coalition
    Government was to scrap the national ID scheme, a move said to have saved taxpayers £1
    billion over ten years. But ministers want to use the Internet to cut the cost of public
    services. In order to limit concerns over Government snooping, the Cabinet Office has been
    working closely with a range of privacy campaign groups and consumer organisations
    including No2ID, Big Brother Watch and Which? The programmes Privacy and Consumer
    Group drew up a list of nine Privacy Principles which underpin the framework of the
    scheme. As part of the attempt to reassure privacy campaigners, a private identity partner
    (IDP) which authorises a user of a public service will not know which Government
    department is seeking authentication.... Some commercial organisations have been concerned
    that their consumers will react negatively to their involvement with government. But
    commercial partners will benefit from marketing opportunities and the trust that comes
    with IDP status. Without the identity assurance scheme there are fears that high levels of
    online fraud will cause the public to lose confidence in digital channels, undermining the
    amount of business done online. Civil servants acknowledge that some people will still
    wish to access public services in person. They argue that the online scheme will release
    additional resources to assist people who lack confidence in making digital
    transactions." National 'virtual ID card' scheme set for launch (Is there anything that could possibly go wrong?) Independent, 4 October 2012 | 
| "A new app can 'virtually steal'
    from your home - by turning on your phone's camera and beaming images back to thieves.The
    software can even build up a 3D model of your home, from which the hackers can inspect
    your rooms, potentially gleaning information about valuables in your home, calendar
    entries as well as spying on you. The app was created by US military experts at Naval
    Surface Warfare Center in Crane, Indiana,to show how cybercriminals could operate in the
    future. The PlaiceRaider creators even demonstrated
    how they could read the numbers of a cheque book when they tested the Android software on
    20 volunteers. As long as the app could be installed on the users phone, it can instantly
    begin beaming back images from the phone when it senses the right conditions, and software
    on the other end can then re-construct maps of the visited room. The team gave their
    infected phone to 20 individuals, who did not know about the malicious app, and asked them
    to continue operating in their normal office environment. The team said they could glean
    vital information from all 20 users, and that the 3D reconstruction made it much easier to
    steal information than by just using the images alone. Researcher Robert Templeman said
    their app can run in the background of any smartphone using the Android 2.3 operating
    system. The research team said: 'Through completely opportunistic use of the phone's
    camera and other sensors, PlaceRaider constructs rich, three dimensional models of indoor
    environments. 'Remote burglars can thus 'download' the physical space, study the
    environment carefully, and steal virtual objects from the environment (such as financial
    documents, information on computer monitors, and personally identifiable
    information).'.... PlaiceRaider will silently take photographs, recording the time,
    location and orientation due to the sensors within most modern smartphones. It will then
    delete any blurred or dark shots, before sending the rest back to a central server, which
    can reconstruct the user's room, based on information such as phone orientation. Then the
    hacker can explore the user's property at will - for instance, scanning the room for
    calendars, private details on computer screens, and cheque-books or card details.
    Templeman said: 'We implemented on Android for practical reasons, but we expect such
    malware to generalize to other platforms such as iOS and Windows Phone.' The team offered
    various ways in which phone manufacturers could secure their systems, for instance making
    it impossible to disable the shutter sound on phones, so that a user will know if a
    picture is being taken. Some manufacturers have done this previously, after many cases of
    mobiles being used surreptitiously for illegal or immoral purposes, but the sound can be
    disabled on many models." | 
| "U.S. law enforcement
    surveillance of email and other Internet communication has skyrocketed in the last two
    years, according to data obtained by the American Civil Liberties Union. The number of
    so-called pen register and trap-and-trace orders obtained by federal law enforcement
    agencies has increased 361 percent between 2009 and 2011, the ACLU said. The U.S.
    Department of Justice released the data to the ACLU after the civil rights group sued the
    agency under the Freedom of Information Act. Pen registers capture outgoing data from a
    surveillance subject, while trap-and-trace orders capture incoming data, including the
    addresses of email messages who the subject is talking with on instant messages. The two
    types of surveillance are not supposed to record the contents of conversations. Including
    the targets of telephone surveillance, 'more people were subjected to pen register and
    trap-and-trace surveillance in the past two years than in the entire previous decade,'
    Naomi Gilens, a legal assistant with the ACLU's Speech, Privacy, and Technology Project, wrote
    in a blog post. U.S. law enforcement agencies
    obtained about 250 pen register orders for email and Internet communications in 2009 and
    about 200 trap-and-trace orders, the ACLU said. In 2011, U.S. agencies received more than
    800 of each order." | 
| "Australia's security and law enforcement agencies are world leaders
    in telecommunications interception and data access and like most successful industries,
    they want more. Federal Attorney-General Nicola Roxon is canvassing a further expansion of
    surveillance powers, most controversially a requirement that telecommunications and
    internet service providers retain at least two years of data for access by government
    agencies.Security and privacy are in the balance as the Federal Parliament's secretive
    joint committee on intelligence and security considers Australia's future digital
    surveillance regime.... Telephone tapping and bugging have become routine investigative
    tools. Indeed, published statistics show that Australian law enforcement
    telecommunications interception activity is greater both in absolute and relative terms
    than that undertaken in the United States. American
    federal and state judges issued only 1491 wiretap authorisations for law enforcement
    purposes in 2001. By 2011 the US figure had risen to 2732 warrants. Taking into account
    the difference in population between Australia and the US, the per capita rate of law
    enforcement telephone interception in Australia is 18 times greater than that in the US.
    Australian law enforcement and government agencies are also accessing vast troves of phone
    and internet data without warrant. Indeed, they did so more than 250,000 times during
    criminal and revenue investigations in 2010-11. Comparative statistics suggest this is a
    far greater level of telecommunications data access than that undertaken in the US,
    Britain or Canada. Data accessed includes phone and internet account information, outwards
    and inwards call details, internet access, and details of websites visited, though not the
    actual content of communications." | 
| "Police must get warrants to
    access Americans' e-mail and track their cell phones, according to new privacy legislation
    that promises to spark a political spat between high-tech firms and law enforcement. The bill, introduced today by
    Rep. Zoe Lofgren -- a Democrat who represents the heart of Silicon Valley, including the
    home turf of Apple, Google, and Intel -- would generally require law enforcement officials
    to obtain a search warrant signed by a judge before they can access cloud data or location
    information. It's backed
    by a phalanx of companies, including Amazon.com, Apple, AT&T, eBay, Google, Intel,
    Microsoft, and Twitter. Liberal, conservative, and libertarian advocacy groups are also
    members of the so-called Digital Due Process
    coalition. But it's easier to block legislation than advance it. The U.S. Department of
    Justice will likely try just that: it's previously warned that requiring warrants
    for e-mail could have an 'adverse impact' on investigations. And tougher legal
    standards for location data, the department claims, would hinder 'the government's ability
    to obtain important information in investigations of serious crimes.' Police opposition
    has been successful in derailing similar privacy legislation." | 
| "Government restrictions on the
    Internet have risen over the past year around the world as regimes use violence against
    bloggers and turn to censorship and arrest to squelch calls for reform, a new report from a U.S. advocacy group has found. Pakistan, Bahrain and
    Ethiopia saw the biggest rollbacks in Internet freedom since January 2011 and were among
    the 20 countries out of 47 assessed by Freedom House that declined in their
    rankings." | 
| "Facebook is working with a
    controversial data company called Datalogix that can track whether people who see ads on
    the social networking site end up buying those products in stores. Amid growing pressure
    for the social networking site to prove the value of its advertising, Facebook is
    gradually wading into new techniques for tracking and using data about users that raise
    concerns among privacy advocates.... Datalogix has
    purchasing data from about 70m American households largely drawn from loyalty cards and
    programmes at more than 1,000 retailers, including grocers and drug stores. By matching
    email addresses or other identifying information associated with those cards against
    emails or information used to establish Facebook accounts, Datalogix can track whether
    people bought a product in a store after seeing an ad on Facebook. The emails and other
    identifying information are made anonymous and collected into groups of people who saw an
    ad and people who did not. Datalogix compiles a report for Facebook and its advertisers to
    measure which creative approaches and demographic targeting persuade people to buy
    specific products offline." | 
| "A five-year research programme,
    called Project Indect, aims to develop computer programmes which act as 'agents' to
    monitor and process information from web sites, discussion forums, file servers,
    peer-to-peer networks and even individual computers. Its main objectives include the
    'automatic detection of threats and abnormal behaviour or violence'. Project Indect, which
    received nearly £10 million in funding from the European Union, involves the Police
    Service of Northern Ireland (PSNI) and computer scientists at York University, in addition
    to colleagues in nine other European countries. Shami Chakrabarti, the director of human
    rights group Liberty, described the introduction of such mass surveillance techniques as a
    'sinister step' for any country, adding that it was 'positively chilling' on a European
    scale..... Stephen Booth, an Open Europe analyst who
    has helped compile a dossier on the European justice agenda, said these developments and
    projects such as Indect sounded 'Orwellian' and raised serious questions about individual
    liberty. 'This is all pretty scary stuff in my book. These projects would involve a huge
    invasion of privacy and citizens need to ask themselves whether the EU should be spending
    their taxes on them,' he said.... Miss Chakrabarti
    said: 'Profiling whole populations instead of monitoring individual suspects is a sinister
    step in any society. 'It's dangerous enough at national level, but on a Europe-wide scale
    the idea becomes positively chilling'." | 
| "Researchers have found evidence
    suggesting that the United States may have developed three previously unknown computer
    viruses for use in espionage operations or cyber warfare. The findings are likely to
    bolster a growing view that the U.S. government is using cyber technology more widely than
    previously believed to further its interests in the Middle East. The United States has
    already been linked to the Stuxnet Trojan that attacked Iran's nuclear program in 2010 and
    the sophisticated Flame cyber surveillance tool that was uncovered in May. Anti-virus
    software makers Symantec Corp of the United States and Kaspersky Lab of Russia disclosed
    on Monday that they have found evidence that Flame's operators may have also worked with
    three other viruses that have yet to be discovered. The two security firms, which
    conducted their analyses separately, declined to comment on who was behind Flame. But
    current and former Western national security officials have told Reuters that the United
    States played a role in creating Flame. The Washington Post has reported that Israel was
    also involved. Current and former U.S. government sources also told Reuters that the
    United States was behind Stuxnet. Kaspersky and
    Symantec linked Stuxnet to Flame in June, saying that part of the Flame program is nearly
    identical to code found in a 2009 version of Stuxnet. For now, the two firms know very
    little about the newly identified viruses, except that one of them is currently deployed
    in the Middle East. They are not sure what the malicious software was designed to do. 'It
    could be anything,' said Costin Raiu, director of Kaspersky Lab's Global Research and
    Analysis Team." | 
| "Hackers have uploaded viruses
    which can help them steal people's personal data on to millions of PCs and laptops before
    they are even taken out of the box, Microsoft has admitted. The company said it found malware which allows would-be criminals to
    remotely switch on and control cameras and microphones, among other devices, on machines
    which were still factory sealed. The software is loaded with counterfeit copies of
    Microsoft Windows, the company said. 'Cybercriminals have made it clear that anyone with a
    computer could become an unwitting mule for malware,' wrote Microsoft's assistant general
    counsel for its Digital Crimes Unit, Richard Domingues Boscovich....According to PC
    Advisor, Boscovich revealed that Microsoft bought computers from 'PC malls' in various
    Chinese cities, all of which had counterfeit copies of Windows XP or Windows 7 installed.
    Of the twenty purchased, three had inactive malware and one had live malware, called
    'Nitol.A,' that awoke when the computer connected to the Internet. The problem is not
    thought to affect Western physical supply chains but the malware could be transmitted if
    users download infected software." | 
| "President Barack Obama has closely followed the policy of his
    predecessor, President George W. Bush, when it comes to tactics used in the 'war on
    terror'  from rendition, targeted killings, state secrets, Guantanamo Bay to
    domestic spying, according to Michael Hayden, Bushs former director of the Central
    Intelligence Agency and the National Security Agency. 'But let me repeat my hypothesis:
    Despite the frequent drama at the political level, America and Americans have found a
    comfortable center line in what it is they want their government to do and what it is they
    accept their government doing. It is that practical consensus that has fostered such
    powerful continuity between two vastly different presidents, George W. Bush and Barack
    Obama, when it comes, when it comes to this conflict,' Hayden said Friday while speaking at the University of
    Michigan.... Hayden, who oversaw the CIAs use of torture techniques against
    detainees and the expansion of the NSA to illegally spy on American citizens, admitted to
    an initial skepticism of Obama. He also publicly criticized the administration in 2009 for
    making public the Bush-era legal memos that attempted to re-define torture as 'enhanced
    interrogation techniques.' But Hayden, in a nearly 80-minute lecture posted on
    C-Span, said Obama came to embrace Bushs positions. Both Bush and Obama said the
    country was at war. The enemy was al-Qaida. The war was global in nature. And the United
    States would have to take the fight to the enemy, wherever it may be, he said. 'And yet,
    youve had two presidents, the American Congress, and the American court system, in
    essence, sign up to all four of those sentences,' Hayden said. Moments later, Hayden
    added: 'And so, weve seen all of these continuities between two very different human
    beings, President Bush and President Obama. We are at war, targeted killings
    have continued, in fact, if you look at the statistics, targeted killings have increased
    under Obama.' He said that was the case because, in one differing path between the two
    presidents, Obama in 2009 closed CIA 'black
    sites' and ratcheted down on torturing detainees. But instead of capturing so-called
    'enemy combatants,' President Obama kills them instead, Hayden said. 'We have made it so
    politically dangerous and so legally difficult that we dont capture anyone anymore,'
    Hayden said. 'We take another option, we kill them. Now. I dont morally oppose
    that.' Obamas kill list has even included American citizens. Hayden noted Obama
    campaigned on promises to
    close the detention center in Guantanamo Bay, and to
    bring more transparency to government. Obama failed to close Guantanamo and continued
    the use of the often-cited 'state secrets'
    defense in court cases challenging the governments policies on the war on terror.
    'Despite a campaign that was based on a very powerful promise of transparency, President
    Obama, and again in my view quite correctly, has used the state secrets argument in a
    variety of courts, as much as President Bush,' Hayden said. He noted that he appreciated
    Obamas invocation of the state secrets privilege, as Hayden himself was named as a
    defendant in some of the cases. Hayden also noted that Obama, as an Illinois senator in
    2008, eventually voted to legalize President Bushs once-secret warrantless spying
    program adopted in the wake of the September 11, 2001 terror attacks. The measure also granted Americas telecoms immunity from
    lawsuits for their
    complicity in the spy program. The law authorizes the government to electronically
    eavesdrop on Americans phone calls and e-mail without a probable-cause warrant so
    long as one of the parties to the communication is believed outside the United States. The
    communications may be intercepted 'to acquire foreign intelligence information.' 'The FISA
    Act not only legitimated almost every thing president Bush had told me to do under his
    Article II authorities as commander in chief, but in fact gave the National Security
    Agency a great deal more authority to do these kind of things,' Hayden said. The law, now
    known as the FISA Amendments Act, expires at years end. The Obama administration
    said congressional reauthorization was the administrations 'top
    intelligence priority,' despite 2008 campaign promises to make the act more
    privacy-friendly. As for the election, Hayden
    indicated it may not matter, at least when it comes to anti-terrorism policy. He seemingly
    confirmed that the rock band the Who was correct when it blurted 'meet
    the new boss, same as the old boss.' Hayden, who
    said he was an adviser the Romney presidential campaign, said Romney would largely follow
    Obamas same path, too, if Romney was elected." | 
| "Plans to record every
    Britons online activity and mobile phone use could put national security at risk and
    may not even be technically workable, internet companies have warned MPs. The London
    Internet Exchange (Linx), which represents service providers, said the Governments
    controversial surveillance proposals represent a 'dramatic shift' in the balance between
    individuals privacy and the power of the state. It said forcing them to keep details
    of all website visits and mobile phone calls would in effect create a communications data
    profile for every user, which also would affect the relationship of trust they have with
    customers. Authorities would be able to search the database to look for all people who
    were in Trafalgar Square at a particular time and date and who had visited certain
    websites in the previous year, it is claimed. 
    If this 'profiling engine' were ever hacked into, 'it would constitute a significant
    threat to national security'. But Linx said its members had 'significant doubts' about the
    feasibility of building the system. In addition, the draft Bill is so written so loosely
    that it would allow ministers an 'effectively unfettered and wholly inappropriate'
    discretion to decide on how much intrusion should be allowed into citizens private
    lives." | 
| "Wikipedia founder Jimmy Wales
    has said that his website will encrypt connections with Britain if plans to track
    internet, text and email use become law. The
    measures would require internet service providers such as Vodafone and Virgin Media to
    keep tabs on every single page accessed by UK citizens. But Mr Wales told MPs and peers
    yesterday that it would be relatively easy for Wikipedia to thwart any snooping on how
    people had been using the site by encrypting data. This would ensure that while
    information held by ISPs would show that users were accessing the online encyclopaedia, it
    would not show what subject pages they were looking at." | 
| "Spyware developed and sold by a
    UK-based company has been used to snoop on dissidents in autocratic regimes, according to
    two security researchers. The software, legitimately
    produced and sold by British firm Gamma International, has somehow managed to find its way
    into the hands of some of the most repressive governments in the world. According to
    Google security researcher Morgan Marquis-Boire and Berkeley student Bill Marczak, the
    spyware was found in email attachments sent to several activists in Bahrain.  Their
    investigation found the spyware infected not just PCs but a range of devices running
    popular mobile operating systems, such as iOS, Android, RIM, Symbian, and Windows Phone 7.
    The spyware boasts capabilities such as live surveillance via 'silent calls' and location
    tracking. It also has the ability to track all forms of communication, including emails
    and voice calls as well as cameras and microphones. A study carried out by University of
    Toronto Munk School of Global Affairs' Citizen Lab found an application that purports to
    be FinSpy, a piece of commercial spyware sold to countries for criminal investigations.
    Gamma Group, the German parent of UK-based Gamma International, developed FinSpy.
    Gammas managing director Martin Muench told Bloomberg that the company had no
    involvement whatsoever in selling the software to despotic regimes." | 
| "Two security researchers have
    found new evidence that legitimate spyware sold by British firm Gamma International
    appears to be being used by some of the most repressive regimes in the world. Google
    security engineer Morgan Marquis-Boire and Berkeley student Bill Marczak were
    investigating spyware found in email attachments to several Bahraini activists. In their analysis they identified the spyware infecting not only PCs
    but a broad range of smartphones, including iOS, Android, RIM, Symbian, and Windows Phone
    7 handsets. The spying software has the capability to monitor and report back on calls and
    GPS positions from mobile phones, as well as recording Skype sessions on a PC, logging
    keystrokes, and controlling any cameras and microphones that are installed. They report the code appears to be FinSpy, a commercial spyware sold to
    countries for police criminal investigations. FinSpy was developed by the German
    conglomerate Gamma Group and sold via the UK subsidiary Gamma International. In a statement to Bloomberg, managing director Martin Muench denied the
    company had any involvement." | 
| "FinFisher spyware made by
    U.K.-based Gamma Group can take control of a range of mobile devices, including Apple
    Inc. (AAPL)s iPhone and Research in Motion Ltd.
    (RIM)s BlackBerry, an analysis of presumed samples of the software shows. The
    program can secretly turn on a devices microphone, track its location and monitor
    e-mails, text messages and voice calls, according to the findings, being published today
    by the University of Toronto Munk School of Global Affairs Citizen Lab. Researchers
    used newly discovered malicious software samples to further pull back the curtain on the
    elusive cyber weapon. The hunt for clues to the softwares deployment has gained
    speed since July, when research based on e-mails obtained by Bloomberg News
    identified what looked like a FinFisher product that infects personal computers. In that
    case, the malware targeted activists from the Persian Gulf kingdom of Bahrain. The latest analysis, led by security researcher Morgan Marquis-Boire, may
    demonstrate how such spyware can reach a broader range of devices to follow their
    owners every move. 'People are walking around with tools for surveillance in their
    pockets,' says John Scott-Railton, a doctoral student at the University
    of California Los Angeles Luskin School of
    Public Affairs who assisted with the research. 'These are the tools that can be used
    to turn on your microphone and turn your phone into a tracking device.' The findings --
    which are consistent with Gammas own promotional materials for a FinFisher product
    called FinSpy Mobile -- illustrate how the largely unregulated trade
    in offensive hacking tools is transforming surveillance, making it more intrusive as it
    reaches across borders and peers into peoples digital devices. FinFisher products
    can secretly monitor computers, intercepting Skype calls, turning on Web cameras and
    recording keystrokes. They are marketed by Gamma for law enforcement
    and government use. ... In December, anti-secrecy website WikiLeaks published a promotional brochure and video for FinSpy
    Mobile. The video shows a BlackBerry user receiving a message to click on a link for a
    fake update -- and then making the mistake of doing so. 'When FinSpy Mobile is installed
    on a mobile phone it can be remotely controlled and monitored no matter where in the world
    the Target is located,' a FinSpy brochure published by WikiLeaks says. Systems that can be
    targeted include Microsoft Corp. (MSFT)s
    Windows Mobile, the Apple iPhones iOS and BlackBerry and Google Inc. (GOOG)s
    Android, according to the companys literature. Todays report says the malware
    can also infect phones running Symbian, an operating system made by Nokia Oyj (NOK1V),
    and that it appears the program targeting iOS will run on iPad tablets. A mobile devices user can become infected by being tricked
    into going to a Web link and downloading the malware, which can be disguised as something
    other than FinSpy. As Gammas promotional video illustrates, the process can be as
    simple as sending someone a text message with a link that looks as if it comes from the
    phone maker, and asking the user to 'please install this system update,' Marquis-Boire
    says. Otherwise, without the use of a previously undiscovered vulnerability, the person
    sneaking the program onto a phone must gain physical access to the device or know its
    passwords, the study says. The spyware doesnt appear to take advantage of any
    vulnerability in the phones or their operating systems, the study says. ... The new study also sheds light on FinFishers global reach,
    bolstering separate findings by researchers who said on Aug. 8 that computers in at least
    10 countries on five continents show signs of being command servers to which computers
    infected by FinFisher send their pilfered data. That study was led by Guarnieri of Rapid7.
    .... The mobile-infecting samples obtained for the report, which transmit data via the
    Internet and text message, also provided clues to FinFishers deployment. In one
    case, a sample was found transmitting to the same Internet address in the Czech Republic that
    Guarnieri had identified in his study as a likely FinFisher command computer. Its
    unclear whether any government agencies in the countries identified in the studies are
    Gamma clients or whether the users may be based in other countries. A spokesman at the
    Czech Republics interior ministry said he has no information of Gamma being used
    there, nor any knowledge of its use at other state institutions. A spokeswoman for the Defense Ministry
    said it has never used Gamma products. The Czech secret service didnt respond to an
    e-mailed request for comment.' | 
| "The U.S. government is making
    steady progress on a game-changing technology that would give it the most powerful weapon
    ever devised in the realm of cyber warfare and information dominance. The weapon is called
    a 'prime-factoring quantum computer,' and a small-scale version of the game-changing
    technology has already been demonstrated by researchers at UC Santa Barbara, where qubits
    -- quantum bits of computational potential -- factored the number 15 into its prime
    factors three and five.... Right now, in 2012, the
    government can't brute-force decrypt your files because that would take longer than the
    age of the known universe. But the government can save your files and hold onto them until
    prime-factoring quantum computers become a reality -- something that looks to be only
    years away. At that point, the government can then retroactively decrypt all the files it
    has been storing in its NSA data centers. In other
    words, all the encrypted files you're sending around right now -- thinking they're
    bulletproof in terms of security -- will eventually be decrypted by the U.S. government
    with the help of a soon-to-exist quantum computer. Right now, then, the government is
    capturing all email attachments and building a future 'decryption queue' of files to be
    processed once the quantum computers are up and running. The scientists who are working on
    this project may think they're advancing the cause of science, but what they're actually
    doing is handing one of the world's most dangerous governments the 'ultimate information
    weapon' that can -- and will -- be used to crush freedom and dissent." | 
| "From telling us when our train is coming, helping us when we're lost
    and letting us watch our favourite TV shows, there seems no limit to how involved our
    smartphone is with our day-to-day life. Now the gadget promises something so advanced it
    verges on the supernatural: it will know exactly what we're doing tomorrow. Scientists have found a way of predicting an individual's future
    movements by analysing information their mobile phone. A team of computer scientists at the University of Birmingham
    successfully predicted future locations with an error margin of just 60ft, which has
    fuelled fears of privacy invasions. While mobile phone networks can already track where a
    handset is in 'real time', the scientists have developed an algorithm - or formula - to
    forecast our future movements. They compared data from one individual and their closest
    social network to predict a persons future location based on places and areas
    visited in the past and the frequency of contact between those studied, The Sunday Times
    reported." | 
| "After announcing the discovery of a new malicious software that
    targets financial data, researchers have created new, Web-based tools that let anyone
    check if theyve been infected. The new malware, Gauss, shows ties to previous
    state-sponsored viruses Flame and Stuxnet, but targets financial data. Those viruses were aimed at
    computers tied to Irans nuclear program; Gauss is primarily found in Lebanon....Thus
    far, Gauss appears to have only been used for surveillance, but there are parts of the viruss code that may hide further
    capabilities." | 
| "Everyone in the high-tech industry, along with the usual ardent
    early-adopters, is betting heavily on the emerging Internet 'cloud.' What often gets overlooked are the drawbacks, as tech writer Mat
    Honan learned when hackers
    destroyed his digital life. Not inconvenienced;
    not interrupted. Destroyed. He lost all the photos he had of his daughter, as well as many
    documents and emails that were presumably important to him. Honan had trusted heavily in
    the convenience and seeming ubiquitous nature of cloud computing. That approach calls for
    storing all your content on the cloud, tying all your devices together with grand and
    expansive systems, and using uber-sophisticated software to control and protect
    everything. The payback: You always have access to everything you want when you need it.
    However, systems and machines ultimately rely on human beings, and getting people to
    always do what is prescribed is a losing battle." | 
| "Questions about what social
    networks mean for personal privacy and security have been brought to a head by research at
    Carnegie Mellon University that shows that Facebook has essentially become a worldwide
    photo identification database. Paired with related
    research, we're looking at the prospect where good, bad and ugly actors will be able
    identify a face in a crowd and know sensitive personal information about that person. These developments mean that we no longer have to worry just about
    what Facebook, Google+, LinkedIn and other social sites do with our data; we have to worry
    about what they enable others to do, too. And it now
    seems that others will be able to do a lot. As reported in various privacy and security
    outlets like Kashmir
    Hills Forbes blog and Paul
    Roberts at ThreatPost, and demonstrated at last weeks Black
    Hat conference, the CMU researchers relied on just Facebooks public profile
    information and off-the-shelf facial recognition software. Yet the CMU researchers were
    able to match Facebook users with their pictures on otherwise anonymous Match.com
    accounts. The researchers also had significant success taking pictures of experimental
    subjects and matching them to their Facebook profiles." | 
| "Recently-released documents show that the FBI has been working since
    late 2011 with four statesMichigan, Hawaii, Maryland, and possibly Oregonto
    ramp up the Next Generation Identification (NGI) Facial Recognition Program. When the program is fully deployed in 2014, the FBI expects its facial
    recognition database will contain at least 12 million 'searchable frontal photos.'' | 
| "Millions of customers
    banking details are at risk after it emerged that card readers used in shops and
    restaurants can be hacked. Experts have found a
    security flaw in chip and PIN terminals that allows thieves to download customers
    card details. There are more than one million such readers in the UK according to the UK
    Cards Association, which processes about 800million purchases each month. Thousands of
    terminals must now be reprogrammed... researchers discovered that criminals can use
    second-hand devices purchased on eBay to load fake cards with malicious software. Once
    used in shops, the fakes  made to look like a normal credit or debit card 
    infect readers, which begin storing the details of all subsequent transactions. The
    criminal then returns later and uses a second card to download this data, which includes
    card details and PINs." | 
| "Britain has quietly agreed to
    measures that could increase the ability of the security services to intercept online
    communications, experts say. Although the Home Office is at pains to stress that the draft
    communications and data bill, which is going through parliament, will not involve checking
    the content of emails and social media, experts say British
    officials have been simultaneously involved in international moves that could allow
    increased interception of online data  moves that will not be subject to the
    scrutiny of MPs. The European Telecommunications Standards Institute (Etsi), the body that
    sets industry standards, has agreed measures that analysts say could force internet
    service providers to ensure that their systems meet government standards for intercepting
    communications.... A joint scrutiny committee of MPs
    and peers, set up following widespread concerns about increased intrusion following the
    unveiling of the draft bill last month, is understood not to have been informed of the
    Etsi standards, which critics say could precipitate an escalation in state surveillance.
    While the bill does not authorise interception, experts warn that there is nothing in the
    proposals that prevents the authorities from then installing their own hardware capable of
    intercepting the communications network. A draft report from the Etsi technical committee
    on lawful interception, dated April 2012, indicates that standards have been agreed that
    could lead to increased data interception. It reveals
    that measures have been agreed to monitor 'nomadic access', which means surveillance of an
    individual whether they go online from their home computer, mobile or an internet café. To facilitate this, service providers 'must implement a Cloud Lawful
    Interception Function (Clif)' that could mean the installation of a new monitoring
    interface 'or more likely ensuring presentation of information in a format recognisable to
    interception mechanisms'. Etsi has faced criticism in the past for the pre-emptive
    inclusion of wiretapping capabilities, a decision that critics say encouraged European
    governments to pass their wiretapping laws accordingly. According to Ross Anderson, professor in security engineering at the
    University of Cambridge Computer Laboratory, the institute has strong links with the
    intelligence agencies and has a significant British contingent, along with a number of US
    government advisers. The development has led to fears among civil liberties campaigners
    that the bill could become a stepping stone towards plans to monitor and control access to
    content. Anderson said: 'It's an absolutely massive extension
    of state surveillance. At present the government can watch
    anybody. What they want in the future is to get into a position where the government can
    watch everybody. They are saying this is only about communications data, but in fact it is
    not. If you build the infrastructure that Etsi have agreed, it can be used for
    interception. The documents show that there is a clear and continuing intention to use it
    for interception.'" | 
| "The New York Police Department will soon launch an all-seeing
    'Domain Awareness System' that combines several streams of information to
    track both criminals and potential terrorists. New York Police Commissioner Raymond
    Kelly says the city developed the software with Microsoft. Kelly
    says the program combines city-wide video surveillance with law enforcement databases. He says it will be officially unveiled by New Yorks mayor as soon
    as next week. Kelly spoke Saturday before an audience at the Aspen Security Forum. The
    NYPD has been under fire for surveillance of Muslim communities and partnering with the
    CIA to track potential terror suspects. Muslim groups have sued to shut down the NYPD
    programs." | 
| "A skilled hacker has shown how
    to hijack a smartphone via a short-range radio technology known as Near Field
    Communication (NFC). Charlie Miller created tools that forced phones to visit websites
    seeded with attack software. The software on the booby-trapped websites helped Mr Miller
    look at and steal data held on a handset. NFC is
    becoming increasingly common in smartphones as the gadgets are used as electronic tickets
    and digital wallets. Mr Miller, a research consultant at security firm Accuvant,
    demonstrated the work at the Black Hat hacker conference in Las Vegas. During his
    presentation, Mr Miller showed how to attack three separate phones: the Samsung Nexus S,
    the Google Galaxy Nexus - which both run Android - and the Nokia N9, which runs on the
    MeeGo system." | 
| "Skype, the online phone service
    long favored by political dissidents, criminals and others eager to communicate beyond the
    reach of governments, has expanded its cooperation with law enforcement authorities to
    make online chats and other user information available to police, said industry and
    government officials familiar with the changes. Surveillance of the audio and video feeds
    remains impractical  even when courts issue warrants, say industry officials with
    direct knowledge of the matter. But that barrier could eventually vanish as Skype becomes
    one of the worlds most popular forms of telecommunication. The changes to online chats, which are written messages conveyed almost
    instantaneously between users, result in part from technical upgrades to Skype that were
    instituted to address outages and other stability issues since Microsoft bought the
    company last year. Officials of the United States and other countries have long pushed to
    expand their access to newer forms of communications to resolve an issue that the FBI
    calls the 'going dark' problem. Microsoft has approached the issue with 'tremendous
    sensitivity and a canny awareness of what the issues would be,' said an industry official
    familiar with Microsofts plans, who like several people interviewed for this story
    spoke on the condition of anonymity because they werent authorized to discuss the
    issue publicly. The company has 'a long track record of working successfully with law
    enforcement here and internationally,' he added. The
    changes, which give the authorities access to addresses and credit card numbers, have drawn quiet applause in law enforcement circles but hostility from many activists and
    analysts. Hacker groups and privacy experts have been speculating for months that Skype
    had changed its architecture to make it easier for governments to monitor, and many blamed
    Microsoft, which has an elaborate operation for complying with legal government requests
    in countries around the world. 'The issue is, to what
    extent are our communications being purpose-built to make surveillance easy?' said Lauren Weinstein, co-founder of People for Internet
    Responsibility, a digital privacy group." | 
| "A city council must stop
    recording passengers' and drivers' conversations in its taxis, the information watchdog
    said today. Information Commissioner Christopher
    Graham said Southampton City Council had 'gone too far' in its desire to ensure people's
    safety. Most people would reasonably expect more privacy in the back of a cab, he
    suggested. While CCTV can still be used in taxis, making it compulsory to record all
    conversations in taxis must stop, Mr Graham said.... The watchdog also revealed that a
    similar scheme in Oxford, which would have also recorded conversations, would breach the
    Data Protection Act and added that the council has now suspended the implementation of the
    policy... Images should only be recorded where it is 'clearly justifiable' while audio
    recordings should only be made 'on very rare occasions, for example where there are a high
    number of serious incidents and where recording is triggered due to a specific threat in a
    taxi cab', the watchdog said." | 
| "Will government surveillance
    finally become a political issue for middle-class Americans? Until recently, average
    Americans could convince themselves they were safe from government snooping. Yes, the
    government engaged in warrantless wiretaps, but those were directed at terrorists. Yes,
    movies and TV shows featured impressive technology, with someones location
    highlighted in real time on a computer screen, but such capabilities were used only to
    track drug dealers and kidnappers. Figures
    released earlier this month should dispel that complacency. Its now clear that
    government surveillance is so widespread that the chances of the average, innocent person
    being swept up in an electronic dragnet are much higher than previously appreciated. The revelation should lead to long overdue legal reforms. The new figures,
    resulting from a Congressional inquiry, indicate that cell phone companies responded last
    year to at least 1.3 million government requests for customer dataranging from
    subscriber identifying information to call detail records (who is calling whom),
    geolocation tracking, text messages, and full-blown wiretaps. Almost certainly, the 1.3
    million figure understates the scope of government surveillance. One carrier provided no
    data. And the inquiry only concerned cell phone companies. Not included were ISPs and
    e-mail service providers such as Google, which we know have also seen a growing tide of government requests for
    user data. The data released this month was also limited to law enforcement
    investigationsit does not encompass the government demands made in the name of
    national security, which are probably as numerous, if not more. And what was counted as a
    single request could have covered multiple customers. For example, an increasingly
    favorite technique of government agents is to request information identifying all persons
    whose cell phones were near a particular cell tower during a specific time
    periodthis sweeps in data on hundreds of people, most or all of them entirely
    innocent. How did we get to a point where
    communications service providers are processing millions of government demands for
    customer data every year? The answer is two-fold. The digital technologies we all rely on
    generate and store huge amounts of data about our communications, our whereabouts and our
    relationships. And since its digital, that information is easier than ever to copy,
    disclose, and analyze. Meanwhile, the privacy laws that are supposed to prevent government
    overreach have failed to keep pace. The combination of powerful technology and weak
    standards has produced a perfect storm of privacy erosion." | 
| "German engineering giant
    Siemens has issued a fix for the software loopholes used by the notorious Stuxnet worm.
    Stuxnet was discovered in 2010 after investigations into malfunctions at many industrial
    plants and factories. Iran's nuclear enrichment efforts were hit hard by Stuxnet which
    targeted the devices that control delicate industrial processes. The fix comes as reports circulate of a fresh cyber attack on Iranian
    nuclear enrichment project. Stuxnet exploited loopholes in the software Siemens wrote to
    oversee the running of its programmable logic controllers - devices used in many
    industrial facilities to automate a production process. When a controller was infected
    with Stuxnet it made the motors it was typically connected to run out of control and burn
    out. This is believed to have been behind Iran's need to replace many of the centrifuges
    it was using in its Natanz uranium enrichment plant.... The Siemens update comes as
    security firm F-Secure
    received an email believed to have been sent by a scientist working at Iran's Atomic
    Energy Organization. In the message, the scientist said its plants at Natanz and Qom have
    been hit again by a worm. Reza Taqipur, Iran's minister of communication and information
    technology, said it was sometimes hit by as many as two million cyber attacks a day, but
    its ability to deal with them was growing daily." | 
| "Normally if you find a rogue outlet strip, or a user happens to
    bring his or her own surge protector to use you might not think much of it. Thanks to a
    new device called the Power Pwn,
    though, it might soon be cause for concern. A company called Pwnie Express is taking
    pre-orders for the device. According to the companys website, 'Pwnie Express
    specializes in innovative, rapid-deployment cyber security products for the IT security
    professional.' The idea of a power source that doubles as hacking or penetration-testing
    toolkit isnt new to Pwnie Express. It also offers a smaller unit that simply plugs
    into an outlet. However, the Pwn Plug Mini may draw more attention than the Power Pwn,
    which by all outward appearances is simply a run-of-the-mill surge protector outlet strip.
    A Power Pwn unit connected in your office would be a
    serious threat to your network and data security. The Power Pwn boasts integrated Wi-Fi,
    high-gain Bluetooth with a range of 1,000 feet, a 3G cellular connection, and dual
    Ethernet ports to provide an attacker with a variety of means of communicating with the
    device from inside the network or around the world. With the device safely planted in a
    cubicle in your office, its owner has access to a wide variety of built-in tools. The Power Pwn is pre-loaded with Debian 6, Metasploit,
    Kismet, nmap, Aircrack, and more. Best of all, it actually does function as a
    fully-capable 120/240v AC outlet strip." | 
| "A new set-top box which offers
    all Britain's major TV channels could be 'reporting back' to its makers on what you watch.
    The end result could be Google-style 'user profiles' about what each person watches. It's
    not clear how this information could be used. The YouView set-top box is £300, and will
    offer access to the catch-up services of the BBC, ITV, Channel 4 and Channel 5. But the
    box may have Big Brother features which will be less palatable to UK consumers - gathering
    information about what and when they watch, and storing that information elsewhere. According to a report in The Independent, the box will gather information
    about exactly what shows user's watched. A spokesperson said, 'YouView doesn't sell
    advertising, so it doesn't use data for behaviourally targeted advertising.' A YouView
    spokesperson was unavailable for comment. The box is the first time that the BBC, ITV,
    Channel 4 and Channel 5 have been accessible in one box with catch-up features. The
    service may be two years late (from the original launch window) and cost £300 for the
    box, but for some people, the service may offer the convenience of all the services, as
    well as other Freeview channels, without the ongoing cost of a monthly bill. The box,
    released later this month, comes with a 500GB hard drive and can record one channel while
    watching another. It features an electronic programme guide (EPG) that allows users to
    scroll back seven days to catch-up on programmes theyve missed. Programmes can be
    watched in HD, and users can record, pause and rewind live TV. A search lets you find
    on-demand content by programme or actors name. Sir Alan Sugar said it was 'a great
    moment in British television'. The service comes with an interface to allow you to watch
    broadcast televeision, as well as browse the content from BBC iPlayer, ITV Player, 4OD and
    Demand 5. When it launches, it will offer access to more than 100 digital TV and radio
    channels, with a further 300 content providers - such as LoveFilm - expressing interest in
    joining.... YouView will be available in two ways; from retailers, with no further TV
    subscription, or from an ISP as part of a phone and broadband package. Retail partners
    already signed up include John Lewis, Currys, Comet, Argos, Amazon, Richer Sounds and the
    Euronics group." | 
| "The Obama administration has
    given the Department
    of Homeland Security powers to prioritize government communications over privately
    owned telephone and Internet systems in emergencies.
    An executive order signed June 6 'gives DHS the
    authority to seize control of telecommunications facilities, including telephone, cellular
    and wireless networks, in order to prioritize government communications over private ones
    in an emergency,' said Amie
    Stephanovich, a lawyer with the Electronic
    Privacy Information Center (EPIC).
    The White House says
    Executive Order 13618, published Wednesday in the Federal Register, is designed to ensure
    that the government can communicate during major disasters and other emergencies and
    contains no new authority." | 
| "In response to New
    York Times stories that relied on leaks of
    sensitive national-security information, a House
    of Representatives panel on Wednesday discussed legislation that could allow
    journalists to be prosecuted for disclosing such information. Army Col. Ken Allard
    testified to a House Judiciary subcommittee that the extent of national security leaks is
    'unprecedented' in American history. Recent examples include the Times
    investigations of President Barack Obamas terrorist 'kill list' and American
    cyberattacks on Iran." | 
| "In the first public accounting
    of its kind, cellphone carriers reported that they responded to a startling 1.3 million
    demands for subscriber information last year from law enforcement agencies seeking text
    messages, caller locations and other information in the course of investigations. The cellphone
    carriers reports, which come in response to a Congressional inquiry, document an
    explosion in cellphone surveillance in the last five years, with the companies turning
    over records thousands of times a day in response to police emergencies, court orders, law
    enforcement subpoenas and other requests. The reports also reveal a sometimes uneasy
    partnership with law enforcement agencies, with the carriers frequently rejecting demands
    that they considered legally questionable or unjustified. At least one carrier even
    referred some inappropriate requests to the F.B.I. The information represents the first
    time data have been collected nationally on the frequency of cell surveillance by law
    enforcement. The volume of the requests reported by the carriers  which most likely
    involve several million subscribers  surprised even some officials who have closely
    followed the growth of cell surveillance.... As cell surveillance increased, warrants for
    wiretapping by federal and local officials  eavesdropping on conversations 
    declined 14 percent last year to 2,732, according to a recent report from the Administrative
    Office of the United States Courts. The diverging numbers suggest that law enforcement
    officials are shifting away from wiretaps in favor of other forms of cell tracking that
    are generally less legally burdensome, less time consuming and less costly. ... The
    reports provided to the A.C.L.U. showed that many local and state police agencies claimed
    broad discretion to obtain cell records without court orders, and that some departments
    specifically warned officers about the past misuse of cellphone surveillance in
    nonemergency situations. Chris Calabrese, a lawyer for the A.C.L.U., said he was concerned
    not only about officials gathering phone data on people with no real connection to crimes
    but also about the agencies then keeping those records indefinitely in internal databases." | 
| "The Android ecosystem is
    becoming a true heaven for malware software and malicious apps, Trend Micro warned. The
    Tokyo-based security company said that during the second quarter of the year, the number
    of malware samples found on Android-based devices was more than four times larger than the
    first quarter. According to data
    from Trend Micro, 25,000 malware samples for Android were detected during the second
    quarter compared to the 'only' 6,000 malicious specimen found in the first quarter of
    2012. The number was far higher than the company initially estimated (11,000 malware
    samples). Trend Micro numbers suggest that Bouncer,
    the security feature that Google advertised as a reliable protection for the Android
    ecosystem and marketplace (Play), has been pretty ineffective: during the second quarter
    17 malicious apps were delivered via Google Play, and users downloaded them 700,000 times
    before their removal. Trend Micro foresees that in the third quarter of the year there
    will be 38,000 malware samples infecting as much Android devices, and about 129,000
    samples during the fourth quarter." | 
| "Hi-tech monitors that track
    households' energy consumption threaten to
    become a major privacy issue, according to the
    European watchdog in charge of protecting personal data. The European Data Protection
    Supervisor (EDPS) has warned that smart meters, which must be introduced into every home
    in the UK within the next seven years, will be used to track much more than energy
    consumption unless proper safeguards are introduced. The EDPS warns that 'while the
    Europe-wide rollout of smart metering systems may bring significant benefits, it will also
    enable massive collection of personal data'. It said the technology could be used to track what 'households do
    within the privacy of their own homes, whether they are away on holiday or at work, if
    someone uses a specific medical device or a baby monitor, or how they spend their free
    time'. It claims the vast amount of information
    collected by the new generation of devices could have serious consequences for consumers
    and what they pay for their energy. 'These patterns can be useful for analysing our energy
    use for energy conservation but, together with data from other sources, the potential for
    extensive data mining is very significant,' said Giovanni Buttarelli, assistant director
    of the EDPS. 'Profiles can be used for many other purposes, including marketing,
    advertising and price discrimination by third parties.' The European commission is now
    under pressure to consider whether legislation should be introduced to ensure that smart
    meters do not breach data protection rules. All homes are expected to have their old
    meters replaced with the new technology by the end of 2019. The installation of smart
    meters will cost an estimated £11bn in the UK. However, few consumers are aware of the
    new technology." | 
| "The Chinese government has
    'pervasive access' to some 80 percent of the worlds communications, giving it the
    ability to undertake remote industrial espionage and even sabotage electronically of
    critical infrastructures in the United States and in other industrialized countries. The
    Chinese government and its Peoples Liberation Army are acquiring the access through
    two Chinese companies, Huawei Technologies Co. Ltd and ZTE Corporation, telecommunications
    experts have told WND. With this access, the sources say, the Chinese are working on the
    other 20 percent. The two companies give the Chinese remote electronic 'backdoor' access
    through the equipment they have installed in telecommunications networks in 140 countries.
    The Chinese companies service 45 of the worlds 50 largest telecom operators.... In 2000, Huawei was virtually unknown outside China, but by 2009 it
    had grown to be one of the largest, second only to Ericsson. As a consequence, sources say
    that any information traversing 'any' Huawei equipped network isnt safe unless it
    has military encryption. One source warned, 'even then, there is no doubt that the Chinese
    are working very hard to decipher anything encrypted that they intercept.' Sources add
    that most corporate telecommunications networks use 'pretty light encryption' on their
    virtual private networks, or VPNs. One of the main suppliers of VPN technology is the
    U.S.-based company RSA, which recently had its own protocols breached by hackers.... And
    it doesnt have to be a Third World country. British Telecom apparently is a major
    user of Huawei equipment in its core networks and one of the biggest allied countries to
    the U.S. with numerous electronic business exchanges occurring on a daily basis among
    companies. The electronic intrusions by the Chinese are done remotely through the use of
    the commercial networks set up by Huawei and ZTE that they have established in numerous
    countries. Sources point out that the Chinese make
    use of telecommunications equipment from Huawei and ZTE very attractive by offering
    subsidized deals through Chinese banks at non-commercial terms with which Western
    companies cannot compete.... As WND previously
    reported, the potential for industrial espionage and sabotage through electronic backdoors
    has grabbed the attention of the U.S. House Intelligence Committee which has decided to
    investigate Huawei and ZTE. The concern not only is in protecting proprietary information
    but the potential threat to critical U.S. infrastructure and national security.... With this capability, China would be in a position to sabotage
    critical U.S. weapons systems and sensitive cyber sites, all of which could include
    intelligence or systems used by defense contractors doing work on behalf of the Department
    of Defense or the U.S. intelligence community." | 
| "The shopping habits of
    Britain's 25 million supermarket loyalty card holders could be grabbed by the Government
    in an attempt to halt the UK's dangerous obesity crisis, it was claimed today. People who
    buy too much alcohol, fatty foods or sugary drinks would be targeted with 'tailored'
    health advice under plans being considered by the Coalition. With more children than ever dangerously overweight, parents could also be
    contacted if their bills show they are not giving their offspring a balanced diet from
    their weekly shop. Cutting obesity-related illness would help the NHS save billions. A
    Whitehall unit set up to covertly change the habits of Britons has already been in talks
    with the major supermarkets to gain access to their huge shopping databases. Their loyalty
    card systems allows them to collate detailed lists of what all their shoppers buy. Around
    25 million people have these cards, with Tesco alone having 15 million members. The head
    of the Government's Behavioural Insights Team said supermarkets had more information on
    the diets of Britons than their own doctors. David Halpern, the head of the Whitehall team
    known as the 'nudge unit', told The Daily Telegraph: 'If you go and buy your stuff
    regularly, they [the supermarkets] know exactly what you are buying.' Prime Minister David
    Cameron is said to back these 'nudge' tactics, which are designed to slowly influence the
    choices of people rather than using Government legislation to force change. But Health
    Secretary Andrew Lansley and other Tories are said to be opposed to the idea in case they
    are accused of snooping on the public by employing 'Big Brother' techniques. American
    academic Richard Thaler, who is an expert on nudge techniques met the cabinet, including
    the Prime Minister and Chancellor George Osborne this month, to discuss the issue with
    them. He told them that the information held by Britain's big businesses is key to helping
    them change." | 
| "The U.S. House Intelligence
    Committee will investigate two major Chinese telecommunications equipment companies 
    Huawei Technologies Co. Ltd and ZTE Corp.  to determine their links to the communist
    government and whether their products, embedded in critical U.S. infrastructure, threaten
    U.S. national security. The committee fears that the equipment the companies sell on the
    U.S. market could enable the Chinese government to conduct espionage and even sabotage of
    the nations infrastructure through an 'electronic backdoor,' a prospect WND recently
    exposed in a series of articles. 'The fact that our
    critical infrastructure could be used against us is of serious concern,' said Rep. Mike
    Rogers, chairman of the House Intelligence Committee." | 
| "The United States and Israel
    jointly developed a sophisticated computer virus nicknamed Flame that collected
    intelligence in preparation for cyber-sabotage aimed at slowing Irans ability to
    develop a nuclear weapon, according to Western officials with knowledge of the effort. The
    massive piece of malware secretly
    mapped and monitored Irans computer networks, sending back a steady stream of
    intelligence to prepare for a cyberwarfare campaign, according to the officials. The effort, involving the National Security Agency, the CIA and
    Israels military, has included the use of destructive software such as the Stuxnet virus to cause malfunctions in
    Irans nuclear-enrichment equipment. The emerging details about Flame provide new
    clues to what is thought to be the first sustained campaign of cyber-sabotage against an
    adversary of the United States. 'This is about preparing the battlefield for another type
    of covert action,' said one former high-ranking U.S. intelligence official, who added that
    Flame and Stuxnet were elements of a broader assault that continues today.
    'Cyber-collection against the Iranian program is way further down the road than this.' Flame came to light last month after
    Iran detected a series of cyberattacks on its oil industry. The disruption was directed by
    Israel in a unilateral operation that apparently caught its American partners off guard,
    according to several U.S. and Western officials who spoke on the condition of anonymity.
    There has been speculation that Washington had a role in developing Flame, but the
    collaboration on the virus between the United States and Israel has not been previously
    confirmed. Commercial security researchers reported last week that Flame contained some of the same code as
    Stuxnet. Experts described the overlap as DNA-like evidence that the two sets of malware
    were parallel projects run by the same entity. Spokesmen for the CIA, the NSA and the
    Office of the Director of National Intelligence, as well as the Israeli Embassy in
    Washington, declined to comment. The virus is among the most sophisticated and subversive
    pieces of malware to be exposed to date. Experts said the program was designed to
    replicate across even highly secure networks, then control everyday computer functions to
    send secrets back to its creators. The code could activate computer microphones and
    cameras, log keyboard strokes, take screen shots, extract geolocation data from images,
    and send and receive commands and data through Bluetooth wireless technology. Flame was
    designed to do all this while masquerading as a routine Microsoft software update; it
    evaded detection for several years by using a sophisticated program to crack an encryption
    algorithm. 'This is not something that most security researchers have the skills or
    resources to do,' said Tom Parker, chief technology officer for FusionX, a security firm
    that specializes in simulating state-sponsored cyberattacks. He said he does not know who
    was behind the virus. 'Youd expect that of only the most advanced
    cryptomathematicians, such as those working at NSA.' Flame was developed at least five
    years ago as part of a classified effort code-named Olympic Games, according to officials
    familiar with U.S. cyber-operations and experts who have scrutinized its code. The
    U.S.-Israeli collaboration was intended to slow Irans nuclear program, reduce the
    pressure for a conventional military attack and extend the timetable for diplomacy and
    sanctions. The cyberattacks augmented conventional sabotage efforts by both countries,
    including inserting flawed centrifuge parts and other components into Irans nuclear
    supply chain. The best-known cyberweapon let loose on Iran was Stuxnet, a name coined by
    researchers in the antivirus industry who discovered it two years ago. It infected a
    specific type of industrial controller at Irans uranium-enrichment plant in Natanz,
    causing almost 1,000 centrifuges to spin out of control. The damage occurred gradually, over months, and
    Iranian officials initially thought it was the result of incompetence. The scale of the
    espionage and sabotage effort 'is proportionate to the problem thats trying to be
    resolved,' the former intelligence official said, referring to the Iranian nuclear
    program. Although Stuxnet and Flame infections can be countered, 'it doesnt mean
    that other tools arent in play or performing effectively,' he said. To develop these
    tools, the United States relies on two of its elite spy agencies. The NSA, known mainly
    for its electronic eavesdropping and code-breaking capabilities, has extensive expertise
    in developing malicious code that can be aimed at U.S. adversaries, including Iran. The
    CIA lacks the NSAs sophistication in building malware but is deeply involved in the
    cyber-campaign. The CIAs Information Operations Center is second only to the
    agencys Counterterrorism Center in size. The IOC, as it is known, performs an array
    of espionage functions, including extracting data from laptops seized in
    counterterrorism raids. But the center specializes in computer penetrations that require
    closer contact with the target, such as using spies or unwitting contractors to spread a
    contagion via a thumb drive. Both agencies analyze the intelligence obtained through
    malware such as Flame and have continued to develop new weapons even as recent attacks
    have been exposed. Flames discovery shows the importance of mapping networks and
    collecting intelligence on targets as the prelude to an attack, especially in closed
    computer networks. Officials say gaining and keeping access to a network is 99 percent of
    the challenge." U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say Washington Post, 19 June 2012 | 
| "The surveillance experts at the
    National Security Agency wont tell two powerful United States Senators how many
    Americans have had their communications picked up by the agency as part of its sweeping
    new counterterrorism powers. The reason: it would violate your privacy to say so. That claim comes in a short letter sent Monday to civil libertarian
    Senators Ron Wyden and Mark Udall. The two members of the Senates intelligence
    oversight committee asked the NSA a
    simple question last month: under the broad powers
    granted in 2008's expansion of the Foreign Intelligence Surveillance Act, how many persons
    inside the United States have been spied upon by the NSA? The query bounced around the
    intelligence bureaucracy until it reached I. Charles McCullough, the Inspector General of
    the Office of the Director of National Intelligence, the nominal head of the 16 U.S. spy
    agencies. In a letter
    acquired by Danger Room, McCullough told the senators that the NSA inspector general
    'and NSA leadership agreed that an IG review of the sort suggested would further violate
    the privacy of U.S. persons,' McCullough wrote." | 
| "British authorities on Thursday
    unveiled an ambitious plan to log details about every Web visit, email, phone call or text
    message in the U.K.... The bill would force
    providers  companies such as the BT Group PLC or Virgin Media Inc.  to log
    where emails, tweets, Skype calls and other messages were sent from, who was sending them,
    who they were sent to, and how large they were. Details of file transfers, phone calls,
    text messages and instant conversations, such as those carried over BlackBerry Messenger,
    would also be recorded. The bill demands that providers collect IP addresses, details of
    customers' electronic hardware, and subscriber information, including names, addresses,
    and payment information. What May didn't mention in her editorial  and the Home
    Office left off its press release  was that the government also is seeking to keep
    logs of citizens' Internet history, giving officials access to the browsing habits of
    roughly 60 million people .... Prefer to send mail the old-fashioned way? That would be
    monitored, too. Address details and other markers printed onto envelopes would be copied;
    parcel tracking information would be logged as well....The measure remains a draft bill,
    which means it's subject to change before it is presented to Parliament." | 
| "The European Data Protection
    Supervisor has warned that smart meters are a significant privacy threat and wants limits
    on the retention and use of customer data before it's too late. The EDPS is an independent authority figure tasked with identifying where
    EU policies might represent a risk to privacy. He reckons next-generation meters, which
    precisely monitor electricity use within homes, are a very likely candidate unless his
    concerns are addressed ahead of time." | 
| "Apple has recruited a private
    fleet of aeroplanes equipped with military standard cameras to produce 3D maps so accurate
    they could film people in their homes through skylights, according to reports. The US software giant is expected to announce this week a new 'Maps'
    programme for iPhones and iPads allowing users to view images previously out of reach to
    anyone but the intelligence services. Producing images of streets, homes and gardens so
    clear they will show objects just 4in across and display the sides of buildings as well as
    their roofs, the product is aimed as a direct challenge to Google Maps. The technology is
    understood to have already been tested in 20 cities across the world including London
    following Apple's acquisition
    of C3 Technologies, a Swedish 3D mapping business, last year." | 
| "It looked like a Government U-turn last Monday when Justice
    Secretary Ken Clarke briefed reporters that his plans to allow courts to sit in secret had
    gone too far and promised, as one front-page headline put it, they would be
    rowed back. That was the spin. But the following morning, when Mr
    Clarkes Ministry published the text of his Justice and Security Bill, the truth
    became clear. In reality, the Government had made
    just one important concession: dropping its original intention that the new secret
    hearings would extend to inquests. But, in every other respect, the Bill is draconian and
    will, if passed, introduce levels of secrecy quite without precedent. Despite Mr
    Clarkes soothing reassurances, this is the truth about the supposed
    climbdown: * Ministers will be able to demand secret hearings in any civil
    court case where they claim airing evidence openly might damage the interests of
    national security.   * Theoretically, judges could reject such demands. But the
    Bill makes clear that in practice their role will be that of rubber stamps. * In some
    types of case, Ministers will be able to shut down an action altogether if it has anything
    to do with an intelligence service, or if the Government claims it might damage
    international relations. Senior Tory
    backbencher David Davis, a fierce opponent of the plans, said yesterday: The way
    this was managed is typical of the Blair years. They chose a week when Parliament
    wasnt sitting and successfully pre-spun the Bill with the media before it was even
    published. Only when it was issued did it become apparent that it is still a
    corrosive attack on centuries of legal tradition and the rules of natural justice, with
    their basic principle that people must have the right to know what is alleged against
    them." | 
| "The United Nations is set to issue an urgent warning to guard
    against the most powerful computer virus ever unleashed amid fears it could be used to
    bring countries to a standstill. In what was being seen last night as the dawn of a new
    era in cyber warfare, UN computer security chief Marco Obiso said: 'This is the most
    serious warning we have ever put out.' He was speaking after it was revealed that a
    massive superbug had been used to hack into computers in Iran. Israel did little to
    dispute claims yesterday that it was behind the clandestine online assault. The
    sophisticated spyware  said to be about 100 times the size of most malicious
    software  also hacked other machines in the Middle East, including Sudan, Saudi
    Arabia, Lebanon and Egypt, but Iran appeared to be the primary target, according to a
    Russian Internet security firm. Mr. Obiso, cyber
    security coordinator for the UN's International Telecommunications Union, said the warning
    will underline the danger the virus represents to the critical infrastructure of member
    nations. Dubbed 'Flame', the Trojan bug worms its way into computer systems and reportedly
    turns infected machines into listening devices. It can activate a computer's audio system
    to eavesdrop on Skype calls or office chatter, take screenshots or log keystrokes and even
    suck information from Bluetooth-enabled phones left nearby. 'The complexity and
    functionality of the newly discovered malicious programme exceed those of all other cyber
    menaces known to date. 'It pretty much redefines the notion of cyber war and cyber
    espionage,' said Moscow-based Kaspersky Lab ZAO. The
    company's conclusion that the superbug was crafted at the behest of a national government
    fuelled claims that Flame was part of an Israeli-backed campaign of electronic sabotage
    aimed at archrival Iran.... Udi Mokady, the head of Cyber-Ark, an Israeli developer of
    information security, claimed only four countries  the US, Israel, Russia and China
    - had the technological know-how to develop so sophisticated an electronic offensive....
    The Russians discovered the virus after being asked by the United Nations to find a piece
    of mystery malware that was wiping out sensitive information across the Middle East. It is
    believed to have been coded by the same programmers who hacked into Iran's nuclear
    programme six years ago." | 
| "Google knew software for its
    Street View fleet could secretly collect personal data including emails, pictures and text
    messages from unprotected wi-fi networks, it has been claimed. Documents seen by Americas Federal Communications Commission (FCC)
    apparently show an engineer created the snooping technology called gstumbler which could
    capture data from inside residents homes as teams toured the country. One particular
    document shows that the engineer flagged up privacy implications and said a privacy lawyer
    should be consulted before the software was installed. The bank of personal data collected
    could have been used by Google to develop new products." | 
| "Northside Independent School
    District plans to track students next year on two of its campuses using technology
    implanted in their student identification cards in a trial that could eventually include
    all 112 of its schools and all of its nearly 100,000 students. District officials said the Radio
    Frequency Identification System (RFID) tags would improve safety by allowing them to
    locate students  and count them more accurately at the beginning of the school day
    to help offset cuts in state funding, which is partly based on attendance. Northside, the
    largest school district in Bexar County, plans to modify the ID cards next year for all
    students attending John
    Jay High School, Anson
    Jones Middle School and all special education students who ride district buses. That
    will add up to about 6,290 students. The school board unanimously approved the program
    late Tuesday but, in a rarity for Northside trustees, they hotly debated it first, with
    some questioning it on privacy grounds." | 
| "Nations that carry out
    cybercrimes and wreak online havoc pose the greatest threat to the future of the internet,
    the chairman of Google has warned. In a speech
    delivered at London's Science
    Museum on Wednesday, Eric Schmidt said the
    internet would be vulnerable for at least 10 years, and that every node of the public web
    needed upgrading to protect against crime. Fixing the problem was a 'huge task' as the
    internet was built 'without criminals in mind' he said. 'While threats come from
    individuals and even groups of people, the biggest
    problem will be activities stemming from nations that seek to do harm. It is very difficult to identify the source of cyber-criminality and stop
    it,' he said.... Speaking at the museum, Schmidt said he worried about the permanence of
    information on the internet and its impact on individuals in future. 'The fact that there
    is no delete button on the internet forces public policy choices we had never imagined,'
    he said. 'A false accusation in your youth used to fade away; now it can remain forever.'
    Schmidt also used his speech to warn about the rise in governments that censor online
    material, up from four a decade ago to at least 40 today. Through filtering, governments
    could build their own 'Balkanised web', where people saw different information online
    depending on who and where they were, without anyone knowing what had been censored." | 
| "The FBI has recently formed a
    secretive surveillance unit with an ambitious goal: to invent technology that will let
    police more readily eavesdrop on Internet and wireless communications. The establishment of the Quantico, Va.-based unit, which is also staffed
    by agents from the U.S. Marshals Service and the Drug Enforcement Agency, is a response to
    technological developments that FBI officials believe outpace law enforcement's ability to
    listen in on private
    communications. While the FBI has been tight-lipped about the creation of its Domestic
    Communications Assistance Center, or DCAC -- it declined to respond to requests made two
    days ago about who's running it, for instance -- CNET has pieced together information
    about its operations through interviews and a review of internal government
    documents." | 
| "Defense giant Northrop Grumman
    is hiring software engineers to help it carry out 'offensive cyberspace operations,'
    according to a recent job posting. The job posting,
    for a 'Cyber Software Engineer 2' appeared
    on the Website Clearancejobs.com and described a position on a Northrop R&D
    project to 'plan, execute and assess an Offensive Cyberspace Operation (OCO) mission' that
    would include familiarity with tools like Metasploit and Google Earth and 'integration of
    capabilities such as command linkages, data flows, situation awareness (SA) and command
    and control (C2) tools.' Firms like Northrop have repeatedly been the target of sustained
    and sophisticated attacks from outside agents. Many of those attackers - euphemistically
    described as 'Advanced Persistent Threats' - or APTs - are believed to have links to
    China and groups working for the People's Liberation Army (PLA). A spokeswoman for
    Northrop Grumman confirmed the validity of the job posting, but declined to elaborate on
    what Northrop was referring to with the term 'Offensive
    Cyberspace Operations.'" | 
| "Iranians are already used to censors blocking Facebook, Gmail and
    foreign news sites, and being spied on with surveillance software purchased from Western
    companies. But the ambitious plans would go much
    further, blocking access to foreign-based social media sites and email. Instead, there
    will be an Iranian version of Facebook and a new email service, to be called Iran Mail.
    Users will have to register their home address and social security number with police. The plans have received the backing of the Supreme Leader Ayatollah Ali
    Khamenei, the most powerful man in Iran, who has denounced the internet as sinful and a
    means for the West to wage 'soft war' by invading Iranian culture. But his real target is
    anti-regime activists who have relied on the internet since the failure of the 'Green
    Revolution' which followed the disputed 2009 election. Since then security has been so
    tight on Iran's streets that protests are broken up almost as soon as they start." | 
| "Dont worry about hackers
    illegally accessing government systems. It turns out government workers and civil servants
    who are trusted with private citizen data are more likely to access your data illegally.
    The U.K. government is haemorrhaging data  private and confidential citizen data
     from medical records to social security details, and even criminal records,
    according to figures obtained through Freedom of Information requests. Just shy of 1,000
    civil servants working at the Department for Work and Pensions (DWP), were disciplined for
    accessing personal social security records. The
    Department for Health (DoH), which operates the U.K.s National Health Service and
    more importantly all U.K. medical records, saw more than 150 breaches occur over a
    13-month period. And all this comes to light no more
    than a fortnight after the Queen formally announced the
    U.K. government will monitor all Web and email traffic, and log all landline, mobile
    phone, and Skype calls. And its the privacy
    campaigners who are in the wrong to say that the data wont be illegally accessed or
    abused? There is one, simple fact: from health records to criminal records, employment
    details and other personal data, government databases are not only open to abuse, but are
    actively being exploited by the very people we supposedly trust with our data." | 
| "Police are storing millions of
    pieces of private data from the mobile phones of innocent people who have never been
    convicted of any crime. The information, which can be held indefinitely, includes the
    content of text messages, call histories and contact books from traditional mobile
    handsets. Officers can also access and copy website histories and email content from smart
    phones, including records of activity on Facebook and other social networking sites. In
    recent weeks, special download units have been placed in police stations across London.
    Each one allows the content of a suspects phones memory to be copied in
    minutes. Previously, phones had to be sent to a
    forensic laboratory for information to be extracted. Senior officers say the new move will
    speed up investigations. But details of the Metropolitan Police action caused a major
    privacy row yesterday. It was branded a back-door surveillance scheme by
    critics who fear it will mean a huge expansion in the amount of data collected and stored
    by officers. Of particular concern is the revelation
    that the data will be stored indefinitely, even if the suspect is either released without
    charge or, when prosecuted, cleared by the courts." | 
| "Police - or anyone with a piece
    of spying software - can track everything you do on your iPhone without needing physical
    access to your phone.The software, called Phone Password Breaker, can download all of the
    data from Apple's iCloud service - which backs up all of your pictures, text messages,
    emails, calendar appointments, call logs, website you have visited, and contacts. As
    iPhones sync nearly instantaneously with iCloud, anyone who is listening will have
    near-instantaneous access to your phone - without the owner noticing a thing. ElcomSoft chief executive Vladimir Katalov said: 'While other methods
    require the presence of the actual iPhone device being analysed or at least an access to
    device backups, this is not the case with iCloud. 'In a sense, Phone Password Breaker
    becomes an alternative way to get access to iOS devices content." | 
| "It doesn't take long. Several
    minutes into their first meeting, the director of Crown Intelligence offers an undercover
    reporter a broad range of highly sensitive and potentially illegal personal data. A hidden
    camera monitors Stephen Anderson leaning across his desk in a plush office near Hyde Park,
    central London, saying: 'I could go through his criminal history, his financial history,
    bank accounts, loans, medical history.' It is 5 May
    2011, two months before David Cameron announced the Leveson inquiry into press ethics and
    the media's use of private investigators to access personal data. At a time when broader
    debate over privacy, data protection and press
    intrusion is raging, Anderson confirms that the most sensitive of personal information is
    easily available so long as you are prepared to pay. Over the months that followed, even
    after the start of Lord Justice Leveson's inquiry, Anderson would provide undercover
    reporters with a gamut of highly personal information. On
    Monday Channel 4's Dispatches will screen its
    year-long investigation revealing the ease and extent to which the unregulated private
    investigation industry is willing to acquire personal data for a price. An undercover
    reporter, posing as a risk analysis company representing multinationals, approached
    private investigators requesting background information on political activists they
    claimed were targeting clients. The programme's intention was to reveal the risk to
    ordinary people, rather than celebrities targeted by sections of the press." | 
| "The ease with which private
    investigators can access highly personal and sensitive information stored in secure
    government databases has been exposed by a report that will intensify calls to regulate
    the industry. An investigation by Channel 4's Dispatches programme
    reveals how a London firm of private detectives sold personal data on individuals,
    including details of bank accounts, benefit claims and even a national insurance number.
    Undercover reporters also recorded Stephen Anderson, director of private investigators
    Crown Intelligence, disclosing medical details including the name of one of the
    volunteers' doctors, recent appointments with a GP and, in one instance, confirmation of a
    medical condition. On several occasions, the
    investigator provided information for payment that appears to be covered by the Data Protection Act, which
    makes it an offence to 'obtain or disclose data without permission or procure the
    disclosure to another person'. The investigation, conducted against the backdrop of the
    Leveson inquiry, which has intensified scrutiny on private investigators, highlights the
    apparent simplicity with which data that is not possible to obtain legally can be found.
    Anderson insists that all the data he unearthed was obtained legally." | 
| "The Draft Communications Bill
    does not sound very exciting but this measure, outlined in the Queens Speech this
    week, contains some very worrying proposals indeed. Basically, if passed, the Bill will
    allow the police and other authorities access to our Internet browsing history in the
    interests of fighting crime and combatting terrorism. As usual, supporters of snoopery
    will trot out the old adage that if you have nothing to hide you have nothing to fear.
    This is, in its most fundamental way, true. But the trouble is that as with all these
    moves what we are seeing is only the thin end of a very long and dangerous wedge. Most
    law-abiding people have no reason to worry about other people knowing what websites they
    have visited. But once you give the authorities the ability to do this history tells us
    that this ability will, inevitably, end up being abused. ...... How long before details of what websites I have been looking at
    are passed on to interested parties? Of course the Internet itself is quite
    capable of doing this already, to great effect (the ability of Google to read the contents
    of emails and suggest linked ads based on this content is as impressive as it is
    disturbing) but the imprimatur of national security agencies and the police will add a
    certain sting to this loss of privacy. You can see how commercial and even family lawyers
    would love to get access to peoples Internet history for financial or other reasons.
    If a shaven-headed wheel-clamping knuckledragger can get hold of your address from the
    DVLA, how much easier it will be for a divorce lawyer to gain access to a complete list of
    websites and emails sent and accessed by the opposing party? How easy it will be for
    commercial disputes to be ramped up by the full disclosure of all Internet transactions?
    How long before local councils (which have already been caught out using
    anti-terrorism legislation to justify actions that have nothing to do with
    terrorism) are given the same powers as the police to see what we are up to online? The point is that when the basic laws are there it becomes very
    easy to amend and expand their power and scope to suit any interested party that can make
    a good case for itself. In an era when anyone opposing security is labelled a
    friend of terrorism, it is so easy to see how this sort of expansion can take place. This
    is a very slippery slope. Yes the law abiding usually have little to fear from the erosion
    of privacy but the trouble is this is only the case when we can wholeheartedly trust those
    to whom we have entrusted our details for safekeeping. The shabby behaviour of the DVLA shows this is not always the case. The
    Internet is no longer a hobbyist tool. It hasnt been so for more than 15 years. It
    is now as vital a part of our lives, private and commercial, as the post and telegraph
    were in previous eras. It is not an option. That is why attempts to break open what degree
    of online privacy exists must be scrutinised very carefully indeed." | 
| "The rapidly changing nature of internet-based communications has
    left the security agencies and the police unable to legally track the online
    activities of terrorists and serious criminals in 25% of cases, the Home Office says.
    Security chiefs say that the current law requiring European-based communications service
    providers, such as BT and Virgin Media, to collect and store monitoring data on everyone's
    email and internet use fails to cover major overseas-based players, including Gmail and
    Hotmail. 'In some cases it is no longer possible to
    obtain data about the sender and recipient of an email,' said Charles Farr, the head of
    the Office for Security and Counter-Terrorism.
    'Communications data from internet-based services is not always available; for some
    internet-based services it is not generated, collected and stored by the internet service
    provider. Many service providers are based overseas,' he said." | 
| "The coalition has pushed ahead
    with its plans
    to introduce monitoring of who is talking to whom over the internet, known as the
    'header' information of emails, web pages and text messages  although Nick Clegg is insistent that it will not be rammed through
    parliament and that it will get plenty of scrutiny. That's a good thing. Internet service
    providers (ISPs) and mobile phone operators, which will have to implement this, have been
    hoping that it wouldn't come. More to the point, nobody has yet answered why the
    government wants to be able to see our digital breadcrumb trail  telling it, in
    effect, only where we've been, but not necessarily what was said. The problem is that such
    monitoring can be easily evaded by even slightly tech-savvy criminals or terrorists. (Who
    you talk to using an internet phone  or VoIP  service such as Skype, for
    example, will not show up on ISPs or phone network records, since it isn't an email or a
    web page, and is encrypted by default, though paranoid rumours abound of it being hacked
    by governments to eavesdrop.) That leaves open the question of who the government 
    more precisely, the police and security services, since they are the ones who have been
    pushing for this measure  think they are going to catch with this scheme. Clearly,
    they must have an idea. Here's what a Home Office spokesman said by way of explanation:
    'It is vital that police and security services are able to obtain communications data in
    certain circumstances to investigate serious crime and terrorism and to protect the
    public. ' We need to take action to maintain the continued availability of communications
    data as technology changes. Communications data has played a role in every major Security
    Service counter-terrorism operation over the past decade and in 95% of all serious
    organised crime investigations..... Let's be more
    precise. It's going to be useful against the less well-organised groups, gangs and rings,
    where some or all of the members aren't well-schooled in the computing field. That
    effectively means 'the older ones' or those who are operating at the bottom of the ladder,
    because anyone further up the rungs of criminality or terrorism will already be familar
    with swapping sims, disposable phones, encryption services, and so on. That leads us back
    to the key questions: how often is this data going to be used? And will it be examined as
    a prelude to an investigation, or only alongside one? The worry is that the police and
    security services will begin using the fact that this data is collected to go on fishing
    expeditions against people that they don't like, in order to build a case. That might work in some cases, but it could also amount to a huge
    intrusion, many times over. The draft communications data bill itself suggests that yes,
    fishing expeditions are just what this will be about. 'The main benefits would be: the
    ability of the police and intelligence agencies to continue to access communications data
    which is vital in supporting their work in protecting the public' plus 'an updated
    framework for the collection, retention and acquisition of communications data which
    enables a flexible response to technological change', reads the draft. In other words,
    fishing expeditions  ostensibly overseen by the Interception of Communications
    Commissioner (ICC), who already exists  it's a job within the Investigatory Powers
    Tribunal (IPT), presently
    held by the Rt Hon Sir Paul Kennedy (amusingly pictured on the site only through the
    window of a passing car  no interception there). Now, the job sounds like a powerful
    one, where Sir Paul would be the gatekeeper to the police or security services getting
    hold of data. However, events from the phone hacking scandal (when some reporters were
    able to get mobile phone numbers and even immediate locations  something only
    possible by use of data that the IPT must approve) suggest that the IPT and the ICC aren't
    as good at holding back incursions on private data as they should be. Tim Berners-Lee, the
    inventor of the web, calls
    the plan 'a destruction of human rights'. Only the police and security services (who,
    let's remember, were in favour of 90-day detention without charge  despite never
    being able to describe a case where it would have made a difference) like it." | 
| "The FBI is asking Internet
    companies not to oppose a controversial proposal that would require firms, including
    Microsoft, Facebook, Yahoo, and Google, to build in backdoors for government
    surveillance. In meetings with industry
    representatives, the White House, and U.S. senators, senior FBI officials argue the
    dramatic shift in communication from the telephone system to the Internet has made it far
    more difficult for agents to wiretap Americans suspected of illegal activities, CNET has
    learned. The FBI general counsel's office has drafted a proposed law that the bureau
    claims is the best solution: requiring that social-networking Web sites and providers of
    VoIP, instant messaging, and Web e-mail alter their code to ensure their products are
    wiretap-friendly." | 
| "Millions of credit and debit
    card users could be robbed by radiowave because of new contactless technology
    being brought in by banks. Almost 20million shoppers are now able to buy goods by simply
    waving their card in front of a reader at the tills, even if it is still in a wallet or a
    purse. But industry experts have warned that the information emitted by the cards can be
    stolen by fraudsters using handheld receptors that cost as little as £7 on the internet. It means cardholders  most of whom are given a contactless card
    automatically when their old one expires  can unknowingly surrender their personal
    bank details to a thief by simply walking past them in the street. The technology in the
    card, known as radio frequency identification (RFID), transmits bank details via its own
    radio signal, and is accepted in many High Street chains, including Co-op, Boots and
    Pret-a-Manger. It does away with the need for a customer inputting their PIN when buying
    goods, and was designed to reduce queues at the checkout.However, a fraudster with a
    contactless card reader can easily collect the 16-digit credit card number, expiry date
    and name  known as RFID skimming  from anyone who walks past carrying one of
    the new cards. They then have enough information to rack up huge bills at any internet
    shopping site  such as Amazon  that does not demand the three-digit security
    code on the back of the card." | 
| "Civil liberty campaigners have
    expressed privacy fears over government plans to share data on individuals across the
    public sector. According to the Guardian, ministers are expected to propose 'fast-track'
    procedures so that data can be more easily shared between different government bodies. But
    Guy Herbert of the No2ID campaign told the newspaper he had concerns about the revival of
    'database state' plans that were scrapped by Labour in 2009. ..... Herbert said data sharing was 'inimical to privacy' and 'inimical
    to the rule of law', arguing confidentiality would be scrapped as the government
    established a database through the process of collecting and connecting data.  A
    Cabinet Office spokesman refuted claims that they were building a central database,
    insisting the citizen would remain in charge of their data, and not the state." | 
| "Social media should be monitored by police and security services, a
    former intelligence chief has said, to prevent paedophiles and terrorists from
    communicating unhindered. Sir David Omand, former Permanent Secretary and Security and
    Intelligence Co-ordinator in the Cabinet Office, says criminals are increasingly making
    use of online social networks such as Twitter and Facebook to communicate. He added that
    those responsible for protecting society need to use the technology to keep suspects under
    surveillance. He said that without the monitoring and collection of social media
    intelligence, known as Socmint, websites could become secret spaces where
    those carrying out illegal activities could communicate freely..... The soon to be
    published Communications Capabilities Development Programme is expected to force internet
    service providers to store details of when and where emails are sent and by whom. Mr Omand wants a Green Paper to be published on monitoring social
    media sites and for private industry to link up with the Government to develop analytical
    tools to monitor developments." | 
| "New regulations on internet
    cookies which come into force tomorrow will cost UK businesses £10billion, researchers
    have claimed. The EU Privacy and Communications Directive will force businesses to obtain
    explicit consent for all forms of website tracking from users. The study claims that UK businesses could lose £10 billion due to a
    combination of lost sales, damage to existing technology and advertising businesses and
    the migration of online businesses overseas as they seek to avoid the costs of compliance.
    The
    latest guidelines suggest that website owners will need to ask for varying degrees of
    consent to differentiate between cookies that they need simply to make a website work,
    those that provide enhanced functionality, and those that exist simply to gather
    information about you for the sites own purposes. When the draft code was launched
    at the beginning of the month, Robert Bond of law firm Speechly Bircham said 'The impact
    of the new law is far-reaching and incredibly onerous for website owners. This will affect
    all UK companies.' QuBit, which carried out the study, said 'This law will have a massive
    impact on a broad swathe of digital marketing and optimisation techniques and is one of
    the most important changes in web development in the last five years.'' | 
| "In our report Are We Safer? ....  
    reporter Dana Priest investigated how, in the post-9/11 era, the government has turned to
    expanded and shared intelligence databases to connect the dots and detect terrorist
    threats before they emerge. The problem, Priest found, is that many states have yet to use
    their vast and growing anti-terror apparatus to capture any terrorists; instead the
    government has built a massive database that collects, stores and analyzes information on
    thousands of U.S. citizens and residents, many of whom have not been accused of any
    wrongdoing. For example, Are We Safer profiled a
    Maryland case in which 53 activists primarily affiliated with anti-death penalty,
    environmental, racial justice and anti-war groups  including several Catholic nuns
     were the subjects of an elaborate 14-month covert surveillance program by the
    Maryland State Police. Because of the new shared databases, their files were available to
    state and federal officials. The incident became an example of what Maryland Governor
    Martin OMalley (D) described as 'the cowboy excesses' of surveillance programs.
    Today, the Associated Press published a report revealing surveillance by the
    New York Police Departments intelligence unit that it says echoes the Maryland case.
    According to the AP, NYPD officers kept intelligence files on activists in liberal
    political organizations opposed to U.S. immigration policy, labor laws and racial
    profiling." | 
| "The News of the World ordered
    it reporters to dig up dirt on the private lives of MPs on a committee investigating the
    phone hacking scandal as part of a campaign by Rupert Murdochs News International to
    thwart their inquiries, a new book on the saga claims. Neville Thurlbeck, the former chief reporter on the defunct Sunday
    tabloid, said that in 2009 an 'edict' was delivered from a senior member of editorial
    staff to find out 'every single thing' about the members of the House of Commons
    media select committee and that a team of six journalists was established to carry out the
    operation. Mr Thurlbeck, who has been arrested in
    connection with phone hacking, said: 'An edict came down... and it was [to] find out every
    single thing you can about every single member: who was gay, who had affairs, anything we
    can use.' The incendiary claim that the paper at the
    heart of the voicemail interception revelations that have tainted the Murdoch empire set
    out to undermine MPs investigating it is contained in Dial M for Murdoch, a book about the
    scandal by Labour MP Tom Watson, a member of the media committee and key campaigner on
    phone hacking, and Martin Hickman, an award-winning journalist on The Independent. At a
    Westminster launch of the title, Mr Watson said News Corporation was a 'toxic institution'
    and that the allegedcampaign intimidation had been successful and was part of a wider
    attempt to cover up the hacking scandal by the Murdoch empire. He said: 'I am sorry to say
    that this tactic was successful, the committees legitimate investigation was
    undermined and Parliament was, in effect, intimidated. 'News International thought they
    could do this, that they could get away with it, that no-one could touch them; and they
    actually did it, and it worked.' He added: 'We conclude that the web of influence which
    News Corporation spun in Britain, which effectively bent politicians, police and many
    others in public life to its will, amounted to a shadow state.'' | 
| "The European Parliament has
    voted in favour of controversial new legislation which gives US authorities access to
    information about airline passengers. MEPs meeting in Strasbourg decided to allow the US
    Department of Homeland Security to see data routinely collected by airlines including
    passenger names, addresses, credit card details and seat numbers. Sensitive data such as a
    person's religious beliefs, sexual orientation and racial origin could also be used in
    'exceptional' circumstances. The EU-US Passenger
    Name Record (PNR) agreement was adopted with 409 votes in favour, 226 against and 33
    abstentions. A proposal to refer the agreement to the European Court of Justice was
    rejected by MEPs. The deal covers all flights to or from the US and under the agreement US
    authorities can retain the data for up to 15 years. While proponents of the legislation
    believe it is essential in order to counter terrorism and serious transnational crimes,
    opponents claim the data retention period is too long and that data protection safeguards
    in the agreement are not up to EU standards. The European commission's own lawyers said
    last year that the agreement is unlawful and expressed 'grave doubts' that the deal would
    comply with the fundamental right to data protection. The agreement, which has been held
    up for two years due to privacy concerns, replaces another deal applied provisionally
    since 2007." EU approves data sharing deal Irish Times, 19 April 2012 | 
| "The principles of openness and
    universal access that underpinned the creation of the internet three decades ago are
    under greater threat than ever, according to Google co-founder Sergey Brin. In an interview with
    the Guardian, Brin warned there were 'very powerful forces that have lined up against the
    open internet on all sides and around the world'. 'I am more worried than I have been in
    the past,' he said. 'It's scary.' The threat to the freedom of the internet comes, he
    claims, from a combination of governments increasingly trying to control access and
    communication by their citizens, the entertainment
    industry's attempts to crack down on piracy, and the rise of 'restrictive' walled gardens
    such as Facebook and Apple, which tightly control what software can be released on their
    platforms..... Brin's comments come on the first day of a week-long Guardian investigation
    of the intensifying battle for control of the
    internet being fought across the globe between governments, companies, military
    strategists, activists and hackers.'.... Brin acknowledged that some people were anxious
    about the amount of their data that was now in the reach of US authorities because it sits
    on Google's servers. He said the company was periodically forced to hand over data and
    sometimes prevented by legal restrictions from even notifying users that it had done
    so." | 
| "When Tom Cruise had to break into police headquarters in Minority Report, the futuristic
    crime thriller, he got past the iris scanners with ease: He just swapped out his eyeballs.
    CIA agents may find that just a little beyond the call of duty. But meanwhile, theyve got to come up with something else:
    The increasing deployment of iris scanners and biometric passports at worldwide airports,
    hotels and business headquarters, designed to catch terrorists and criminals, are playing
    havoc with operations that require CIA spies to travel under false identities. Busy spy
    crossroads such as Dubai, Jordan, India and many E.U. points of entry are employing iris
    scanners to link eyeballs irrevocably to a particular name. Likewise, the increasing use of biometric passports, which are embedded
    with microchips containing a persons face, sex, fingerprints, date and place of
    birth, and other personal data, are increasingly replacing the old paper ones. For a
    clandestine field operative, flying under a false name could be a one-way ticket to a
    headquarters desk, since theyre irrevocably chained to whatever name and passport
    they used. 'If you go to one of those countries under an alias, you cant go again
    under another name,' explains a career spook, who spoke on condition of anonymity because
    he remains an agency consultant. 'So its a
    one-time thing  one and done. The biometric data on your passport, and maybe your
    iris, too, has been linked forever to whatever name was on your passport the first time.
    You cant show up again under a different name with the same data.' The issue is exceedingly sensitive to agency operatives and intelligence
    officials, past and present. 'I think you have finally found a topic I cant talk
    about,' said Charles Faddis, a CIA operations officer who retired in 2008." | 
| "Soon, Congress will begin
    drafting legislation reauthorizing the Foreign Intelligence Surveillance Act, which serves
    as the legal framework for domestic espionage against external threats. And while FISA
    doesn't affect spy activities overseas, the attention it generates will shift scrutiny to
    the National Security Agency and its growing and astonishing capabilities. The NSA, the intelligence arm of the United States responsible for
    eavesdropping and code breaking, weathered criticism and high-profile legal challenges in
    2005 for its warrantless wiretapping program, and now we have a decent idea of the
    sophisticated and controversial methods the NSA employs to penetrate global
    telecommunications networks. Still in the shadows,
    however, is a secretive joint program with the Central Intelligence Agency codenamed F6,
    but better known as the Special Collection Service. The men and women of the Special
    Collection Service are responsible for placing super-high-tech bugs in unbelievably
    hard-to-reach places. Data collected is then transmitted to the National Security Agency
    for decryption and analysis. John Pike of the Federation of American Scientists put it best: 'When you
    think of NSA, you think satellites. When you think CIA, you think James Bond and
    microfilm. But you don't really think of an agency whose sole purpose is to get up real
    close and use the best technology there is to listen and transmit. That's SCS.'  
    Officially, the Special Collection Service doesn't exist, and isn't headquartered in a
    guarded complex on a densely
    forested 300-acre lot outside of Beltsville, Md. But according to journalist James
    Bamford, the organization was founded in 1978
    to bridge the NSA's ability to infiltrate foreign networks and the CIA's ability to
    penetrate foreign countries. (Its leadership
    alternates between the director of the NSA and the director of the CIA.) At the Beltsville
    facility, special tactics for tradecraft are devised, and a kind of mad scientist's
    laboratory develops new technologies for use in the field. The Special Collection Service
    is everywhere. In 1999, teams known as Special Collection Elements infiltrated
    Afghanistan to monitor al Qaeda training camps near Khost. That same year, they tapped
    Pakistan's communications grid to listen for traffic on its nuclear arsenal. After the
    U.S. invasion of Iraq in 2003, General Keith Alexander, director of the National Security
    Agency, sent Special Collection Elements to supplement the U.S.
    Joint Special Operations Command in Balad. .... But
    long before al Qaeda pinged U.S. radars, the Special Collection Service was invading communications networks of friend
    and foe
    alike, performing what journalist Bob Woodward described as
    'espionage miracles, delivering verbatim transcripts from high-level foreign-government
    meetings in Europe, the Middle East, and Asia.' As
    far back as the 1980s, Special Collections Elements were using a technique whereby
    invisible lasers are pointed at windows from safe houses hundreds of feet away.
    Conversations are then deciphered and recorded by measuring only the vibrations in the
    glass of the target windowpane. How exactly do these missions go down? Based on what we
    know, they look something like this: Special Collection Elements made up of two to five
    people rotate into U.S. embassies around the world, working undercover as Foreign Service
    officers or members of the Diplomatic Telecommunications Service. When State Department
    cover is impossible, the agents enter countries under the guise of businesspeople. Some
    U.S. embassies are known to house dedicated facilities for Special Collection Elements to
    use as bases of operations. In other situations, and when circumstances dictate, they work
    surreptitiously, assembling elaborate listening devices from discrete, seemingly everyday
    components.... Once deployed, Special Collection Elements put technology developed in
    Beltsville into practice. One such known system is ORATORY, first used extensively during
    the Gulf War, and likely still operational in some variation. After locating mission
    objectives, Special Collection Elements place antennas in nondescript locations and ORATORY goes
    'up' on the target. The device is given key words to listen for, and when those topics
    come up by phone or in person, the system captures the conversations for analysis. The Special Collection Service also completes so-called 'black bag
    jobs.' Intercepts are often encrypted, and it takes time to decipher, translate, and
    identify useful information. So sometimes, it's easier to simply break into a building and
    install a hidden microphone, whereupon intelligence can be gathered and voices recorded
    before encryption ever takes place. Sensitive
    listening devices can be dropped into computer keyboards, recording the unique clicks of
    each key for use in reconstructing everything typed. When a lock pick is too risky,
    however, locals are sometimes bribed to do the dirty work. Agents might be tasked with
    something as small as planting a bug, or as large as compromising a nation's entire
    information infrastructure." | 
| "Broadcom has just rolled out a
    chip for smart phones that promises to indicate location ultra-precisely, possibly within
    a few centimeters, vertically and horizontally, indoors and out. The unprecedented accuracy of the Broadcom 4752 chip results from the
    sheer breadth of sensors from which it can process information. It can receive signals
    from global navigation satellites, cell-phone towers, and Wi-Fi hot spots, and also input
    from gyroscopes, accelerometers, step counters, and altimeters. The variety of location
    data available to mobile-device makers means that in our increasingly
    radio-frequency-dense world, location services will continue to become more refined. In
    theory, the new chip can even determine what floor of a building you're on, thanks to its
    ability to integrate information from the atmospheric pressure sensor on many models of
    Android phones. The company calls abilities like this 'ubiquitous navigation,' and the
    idea is that it will enable a new kind of e-commerce predicated on the fact that
    shopkeepers will know the moment you walk by their front door, or when you are looking at
    a particular product, and can offer you coupons at that instant. The integration of new kinds of location data opens up the
    possibility of navigating indoors, where GPS signals are weak or nonexistent." | 
| "Britain is exporting
    surveillance technology to countries run by repressive regimes, sparking fears it is being
    used to track political dissidents and activists. The UKs enthusiastic role in the
    burgeoning but unregulated surveillance market is becoming an urgent concern for human
    rights groups, who want the government to ensure that exports are regulated in a similar
    way to arms. Much of the technology, which allows
    regimes to monitor internet traffic, mobile phone calls and text messages, is similar to
    that which the government has controversially signalled
    it wants to use in the UK.The campaign group, Privacy International, which monitors
    the use of surveillance technology, claims equipment being exported includes devices known
    as 'IMSI catchers' that masquerade as normal mobile phone masts and identify phone users
    and malware  software that can allow its operator to control a targets
    computer, while allowing the interception to remain undetected. Trojan horse software that
    allows hackers to remotely activate the microphone and camera on another persons
    phone, and 'optical cyber solutions' that can tap submarine cable landing stations,
    allowing for the mass surveillance of entire populations, are also being exported,
    according to the group. Privacy International said it had visited international arms and
    security fairs and identified at least 30 UK companies that it believes have exported
    surveillance technology to countries including Syria, Iran, Yemen and Bahrain. A further
    50 companies exporting similar technology from the US were also identified. Germany and
    Israel were also identified as big exporters of surveillance technology, in what is
    reportedly a £3bn a year industry. Last month Privacy International asked 160 companies
    about sales of equipment to repressive regimes. So far fewer than 10 have written back to
    deny selling to nations with poor human rights records. The campaign group warns: 'The
    emerging information and communications infrastructures of developing countries are being
    hijacked for surveillance purposes, and the information thereby collected is facilitating
    unlawful interrogation practices, torture and extrajudicial executions.' Many of the
    brochures, presentations and marketing videos used by surveillance companies to promote
    their technology have now been posted on the WikiLeaks website, while a list of firms
    identified by Privacy International as a cause for concern has been provided to the
    Department for Business, Innovation and Skills. The trade minister, Mark Prisk, has been
    briefed on the situation." | 
| "Mr Williams, one of GCHQs
    codebreakers, is reported to have been sent to the NSA to work on encryption programmes
    that filter millions of communications every day. In
    2010, the FBI was called in to investigate Mr Williamss death as a possible NSA
    security compromise..... William Hague has ruled that key evidence in the
    body-in-the-bag inquest into the death of an MI6 officer be heard in secret.
    The Foreign Secretary signed an order prohibiting disclosure about details of the
    agents work with the British and US secret services." | 
| "A new computer trojan has
    infected 550,000 machines running Apple's Mac OS X - and many could still be vulnerable.  The infected machines are now part of a 'botnet' of zombie machines
    which can be controlled by cyber criminals and 'told' to download new malicious software.
    The attack has been described as a 'rude awakening' for Mac users." | 
| "A quantum computer created
    inside a diamond is the first of its kind to include protection against 'decoherence'
     noise that prevents it from functioning properly. The team used the diamond's impurities to create the computer's two
    qubits. The spin in a rogue nitrogen nucleus became the first qubit, with an electron in a
    second flaw forming the second." | 
| "There was an intriguing detail that emerged in the season of
    programmes on Radio 3 last week that was devoted entirely to Schubert. Apparently the
    reason that so few of his important letters survive is that the secret police in Vienna in
    those days went around opening everyone's mail  so no one wrote any important
    letters. We are now approaching something like the same conditions of state surveillance,
    and will definitely be there if proposed legislation comes into force. The Government
    would like to be able to monitor, thanks to the services of GCHQ, the records of every
    email and every website visit of every person in the country. Ministers 'stress' that
    email contents will not be looked at  just who we're sending them to. Warrants will
    still be needed to open them. And if you believe that, I have a bridge to sell you..... It is, in a way, unsurprising news. Britons are already living in
    the most snooped-on society that the earth has ever known.... It is very interesting
    indeed that objections to this policy are raised only by opposition parties  Labour
    tried this when in power. The machinery for a very
    vicious administration is being cobbled together under our very noses." | 
| "Police and intelligence
    officers are to be handed the power to monitor people's messages online in what has been
    described as an 'attack on the privacy' of vast numbers of Britons. The Home Secretary,
    Theresa May, intends to introduce legislation in next month's Queen's Speech which would
    allow law-enforcement agencies to check on citizens using Facebook, Twitter, online gaming
    forums and the video-chat service Skype. Regional police forces, MI5 and GCHQ, the
    Government's eavesdropping centre, would be given the right to know who speaks to whom 'on
    demand' and in 'real time'. Home Office officials
    said the new law would keep crime-fighting abreast of developments in instant
    communications  and that a warrant would still be required to view the content of
    messages. But civil liberties groups expressed grave concern at the move. Nick Pickles,
    director of the Big Brother Watch campaign group, described it as 'an unprecedented step
    that will see Britain adopt the same kind of surveillance as in China and Iran.' 'This is
    an absolute attack on privacy online and it is far from clear this will actually improve
    public safety, while adding significant costs to internet businesses,' he said. David Davis, the former Conservative shadow Home Secretary, said
    the state was unnecessarily extending its power to 'snoop' on its citizens. 'It is not
    focusing on terrorists or on criminals,' the MP said. 'It is absolutely everybody.
    Historically, governments have been kept out of our private lives. They don't need this
    law to protect us. This is an unnecessary extension of the ability of the state to snoop
    on ordinary innocent people in vast numbers.'....
    According to The Sunday Times, which broke the story, the Internet Service Provider's
    Association, which represents communications firms, was unhappy with the proposal when it
    was briefed by the Government last month. A senior industry official told the paper: 'The
    network operators are going to be asked to put probes in the network and they are upset
    about the idea... it's expensive, it's intrusive to your customers, it's difficult to see
    it's going to work and it's going to be a nightmare to run legally.' Google and BT
    declined to comment." | 
| "Cell phone tracking, previously
    associated with federal agents, now seems to have become routine for many police
    departments. A recent report by the American Civil Liberties Union (ACLU) shows that
    police have not only grown into the practice, but also drop the court warrant stage from
    the procedure. Over 200 police departments nationwide responded to the ACLUs pubic
    requests virtually acknowledging that they track cell phones. But only very few of the
    interviewed departments says they obtain a court warrant to tune in on a phone.   Dozens of cell traces can be logged every month for both emergencies and
    routine investigations. This mainly includes following a phone registered with the network
    as it gets a wireless signal, a function which runs several times a minute and just cannot
    be turned off. Even this may expose a lot.  'A person who knows all of another's
    travels can deduce whether he is a weekly churchgoer, a heavy drinker, a regular at the
    gym, an unfaithful husband, an outpatient receiving medical treatment, an associate of
    particular individuals or political groups  and not just one such fact about a
    person, but all such facts,' the Federal Appeals Court in Washington, D.C., explained in
    2010. In other instances of phone tracking, Californian local police were recommended by
    state prosecutors to download text messages from a turned-off phone by creating its
    'clone.' Still, the ACLUs documents reveal no evidence of actual wiretapping. This
    comes as no surprise, especially with the same report remarking that many departments try
    to keep cell tracking secret. 'Do not mention to the public or the media the use of cell
    phone technology or equipment used to locate the targeted subject,' the Iowa City Police
    Department warned staff in a training manual quoted by The New York Times. It should also
    be kept out of police reports, advises the manual." | 
| "Law enforcement tracking of
    cellphones, once the province mainly of federal agents, has grown into a powerful and
    widely used surveillance tool for local police officials as well, with hundreds of
    departments, large and small, often using it aggressively with little or no court
    oversight, new documents show. The practice has become big business for cellphone
    companies, too, with a handful of carriers marketing a catalog of 'surveillance fees' to
    police departments to determine a suspects location, trace phone calls and texts or
    provide other services. Some departments log dozens
    of traces a month for both emergencies and routine investigations. With cellphones now
    ubiquitous, the police describe phone tracing as an increasingly valuable weapon in a
    range of cases, including emergencies like child abductions and suicide calls, and
    investigations into drug cases, sex crimes and murders. One California police training
    manual describes cellphones as 'the virtual biographer of our daily activities,' providing
    a rich hunting ground for learning someones contacts and travels. But civil
    liberties advocates say the widening use of cell tracking raises legal and constitutional
    questions, particularly when the police act without judicial orders. While many
    departments require court warrants to use phone tracking in nonemergencies, others claim
    broad discretion to get the records on their own, according to 5,500 pages of internal
    records obtained by the American Civil Liberties Union from 205 police departments
    nationwide. The internal documents, which were provided to The New York Times by the ACLU,
    open a window into a cloak-and-dagger practice that police officials are wary about
    discussing publicly. While cell tracking by local police departments has received some
    limited public attention in the past few years, the ACLU documents show that the practice
    is in much wider use  with far looser safeguards  than officials have
    previously acknowledged." | 
| "The blandly named Utah Data
    Center is being built for the US National Security Agency (NSA). A project of immense
    secrecy, it is the final piece in a complex puzzle assembled over the past decade. Its
    purpose: to intercept, decipher, analyse and store vast amounts of the world's
    communications from satellites and underground and undersea cables of international,
    foreign and domestic networks. The heavily fortified $2 billion (£1.25 billion) centre
    should be operational in September 2013. Stored in near-bottomless databases will be all
    forms of communication, including private emails, mobile phone calls and Google
    searches, as well as personal data trails -- travel itineraries, purchases and other
    digital 'pocket litter'. It is the realisation of the 'total information awareness'
    programme created by the Bush administration -- which was killed by Congress in 2003 after
    an outcry over its potential for invading privacy. But 'this is more than just a data
    centre', says one senior intelligence official who until recently was involved with the
    programme. The mammoth Bluffdale centre will have another important and far more secret
    role. It is also critical, he says, for breaking codes, which is crucial because much of
    the data that the centre will handle -- financial information, business deals, foreign
    military and diplomatic secrets, legal documents, confidential personal communications --
    will be heavily encrypted. According to another top official also involved, the NSA made a
    breakthrough several years ago in cryptanalysis, or breaking complex encryption systems
    used not only by governments around the world but also average computer users. The upshot, says this official, is that 'everybody's a target; everybody
    with communication is a target.... The data stored in Bluffdale will go far beyond the world's
    billions of public web pages. The NSA is more interested in the invisible web, also known
    as the deep web or deepnet -- data beyond the reach of the public. This includes password-protected
    data, US and foreign government communications, and non-commercial file-sharing between
    trusted peers. 'The deep web contains government reports, databases and other sources of
    information of high value to DoD and the intelligence community,' according to a 2010
    Defense Science Board report. 'Tools are needed to find and index data in the deep
    web
Stealing the classified secrets of a potential adversary is where the
    [intelligence] community is most comfortable.'.... For the first time, a former NSA official has gone on the record to
    describe the programme, codenamed Stellar Wind, in detail. William
    Binney was a senior crypto-mathematician responsible for
    automating the agency's worldwide listening network.
    A tall man with dark, determined eyes behind thick-rimmed glasses, the 68-year-old spent
    nearly four decades breaking codes and finding new ways to channel billions of private
    phone calls and email messages from around the world into the NSA's bulging databases. As
    chief and one of the two cofounders of the agency's Signals Intelligence Automation
    Research Center, Binney and his team designed much of the infrastructure that's still
    probably in use. He explains that the agency could have installed its gear at the nation's
    cable landing stations -- the two dozen or so sites where fibre-optic cables come ashore.
    If it had, the NSA could have limited its
    eavesdropping to international communications, which at that time was all that was allowed
    under US law. Instead it put wiretapping rooms at key junctions throughout the country,
    thus gaining access to most of the domestic traffic. The network of intercept stations, or
    'switches', goes far beyond the room in an AT&T building in San Francisco exposed by a
    whistleblower in 2006. 'I think there's ten to 20 of
    them,' Binney says. 'Not just San Francisco; they have them in the middle of the country
    and on the East Coast.' Listening in doesn't stop at the telecom switches. To capture
    satellite communications, the agency also monitors AT&T's powerful earth stations,
    satellite receivers in locations that include Roaring Creek and Salt Creek. .... Binney left the NSA in late 2001, shortly after the agency
    launched its warrantless-wiretapping programme. 'They violated the [US] Constitution
    setting it up,' he says. 'But they didn't care. They were going to do it, and they were
    going to crucify anyone who stood in the way. When they started violating the
    Constitution, I couldn't stay.' Binney says Stellar
    Wind was larger than has been disclosed and included listening to domestic phone calls as
    well as inspecting domestic email. At the
    outset the programme recorded 320 million calls a day, he says -- about 73 to 80 per cent
    of the total volume of the agency's worldwide intercepts..... The software, created by a
    company called Narus that's now part of Boeing,
    is controlled from NSA headquarters at Fort Meade in Maryland and searches US sources for
    addresses, locations, countries and phone numbers, as well as watch-listed names, keywords
    and phrases in emails. Any communication that arouses suspicion, especially those to or
    from the million or so people on agency watch lists, is recorded and transmitted to the
    NSA. The scope expands from there, Binney says. Once
    a name is entered into the Narus database, all communications to and from that person are
    routed to the NSA's recorders. 'If your number's in there? Routed and gets recorded.' And
    when Bluffdale is completed, whatever is collected will be routed there...... According to Binney, one of the
    deepest secrets of the Stellar Wind programme -- again, never confirmed until now -- was
    that the NSA gained warrantless access to AT&T's domestic and international billing
    records. As of 2007, AT&T had more than 2.8
    trillion records in a database at its Florham Park, New Jersey, complex. Verizon was also
    part of the programme. 'That multiplies the call rate by at least a factor of five,'
    Binney says. 'So you're over a billion and a half calls a day.'....Once communications are
    stored, the datamining begins. 'You can watch
    everybody all the time with datamining,' Binney says. Everything a person does is charted
    on a graph, 'financial
    transactions or travel or anything', he says. Thus the NSA is able to paint a detailed
    picture of someone's life. The NSA can also eavesdrop
    on phone calls directly and in real time. According to Adrienne Kinne, who worked before
    and after 9/11 as a voice interceptor at the NSA facility in Georgia, in the wake of the
    World Trade Center attacks 'basically all rules were thrown out the window, and they would
    use any excuse to justify a waiver to spy on Americans'. Even journalists calling home from overseas were included. 'A lot of time
    you could tell they were calling their families,' she says. 'Intimate, personal
    conversations.' Kinne found eavesdropping on innocent citizens distressing. 'It's like
    finding somebody's diary,' she says. But there is reason for everyone to be distressed
    about the practice. Once the door is open for the
    government to spy on US citizens, there are temptations to abuse that power for political
    purposes, as when Richard Nixon eavesdropped on his political enemies during Watergate and
    ordered the NSA to spy on anti-war protesters. Those and other abuses prompted Congress to
    enact prohibitions in the mid-1970s against domestic
    spying. Before he left the NSA, Binney tried to persuade officials to create a more
    targeted system that could be authorised by a court. At the time, the agency had 72 hours
    to obtain a legal warrant; Binney devised a method to computerise the system. But such a
    system would have required close co-ordination with the courts, and NSA officials weren't
    interested, Binney says. Asked how many communications -- 'transactions', in NSA's lingo
    -- the agency has intercepted since 9/11, Binney estimates 'between 15 and 20 trillion
    over 11 years'. Binney hoped that Barack Obama's new
    administration might be open to addressing constitutional concerns. He and another former senior NSA analyst, J Kirk Wiebe, tried to
    explain an automated warrant-approval system to the Department of Justice's inspector
    general. They were given the brush-off. 'They said, oh, OK, we can't comment,' Binney
    says. Sitting in a restaurant not far from NSA headquarters, the place where he spent
    nearly 40 years of his life, Binney held his thumb and forefinger close together. 'We are,
    like, that far from a turnkey totalitarian state,' he says..... In his 1941 story The Library of Babel, Jorge Luis Borges imagined a
    collection of information where the entire world's knowledge is stored but barely a single
    word is understood. In Bluffdale the NSA is constructing a library on a scale that even
    Borges might not have contemplated. And to hear the masters of the agency tell it, it's
    only a matter of time until every word is illuminated." | 
| "Millions more British bank
    customers have been exposed to fraud through the latest credit and debit card technology,
    writes Channel 4 News technology producer Geoff White. Millions more British bank
    customers have been exposed to fraud through the latest credit and debit card technology.
    On Friday Channel 4 News reported that Barclays Visa contactless cards (ones which bear
    the symbol pictured) can be read using an off-the-shelf
    mobile phone running a special app. ViaForensics, the company which carried out the research for Channel 4
    News, has now shown the same technique works on a Visa debit card issued by Lloyds. And
    banking industry insiders have told us that all Visa contactless cards can potentially be
    read in this way. The app reads the full name, number and expiry date from the card.
    Channel 4 News was able to use just these three details to order goods through Amazon;
    setting up an account under a dummy email address and having the goods shipped to an
    address which does not match that of the cardholder. There are around 19 million
    contactless cards in circulation in the UK - Barclays accounts for around 13 million of
    those. Visa, which provides credit facilities for Barclays, Lloyds and other banks, said
    it takes cardholder security very seriously. It acknowledges that the details are
    transmitted by the cards without encryption, but said these details can be gained 'by a
    number of methods' and should not be usable without the three-digit CVV number on the back
    of the card.... Channel 4 News has been shown a list
    of hundreds of websites which do not require the three-digit CVV number to make a
    transaction. These lists are passed around among credit card fraudsters who use them to
    process stolen cards." | 
| "There have been several cases
    reported in the US of people being asked for their Facebook passwords while being
    interviewed for a role. Justin Bassett, a New York-based statistician, had just finished
    answering some standard character questions in a job interview, when he was asked to hand
    over his Facebook login information after his interviewer could not find his profile on
    the site, according
    to the Boston Globe. Bassett refused and withdrew his job application, as he did not
    want to be employed by a business which would invade his privacy to such an extent. While Lee Williams, an online retail worker from the Midlands, told The
    Telegraph that he was asked by his managing director for his Facebook login details, after
    his boss had looked him up on the social network and could not see any details about him
    as his privacy settings were locked down. The boss thought that Williams was hiding
    something by not having his profile publicly available. Williams refused to hand his
    password over. His boss persisted with his request, but then let it go without taking any
    further action. Williams still works for the company, but did not wish to name it. Sarah
    Veale, head of equality and employment rights for the TUC, has warned that the practice is
    likely to start happening more and more in the UK.  'Once something like this starts
    happening in the US, it is likely to come over here  especially in American
    businesses which have outposts in UK. If interviewers in the US are adopting this practice
    of asking prospective staff for access to their Facebook accounts, they will start doing
    it over here.' She described the request as both 'dangerous and unnecessary'." | 
| "Step one of achieving a
    dystopia is having the physical infrastructure to monitor large amounts of people at all
    times. Step two is having the software (or manpower, I guess) to parse it all. A Japanese
    surveillance company has just made huge strides on that second step. The company, Hitachi
    Kokusai Electric, is just finishing development of a facial recognition system that, given
    enough footage, can scan and index around 36 million faces in just around 1 second. Youd need a pretty insane amount of video before that calculation
    time became non-trivial. The scanning technology is pretty versatile. While it cant
    identify people who are facing away from a camera  who could, really  when it
    comes to people who arent looking dead on, the software can handle 30 degrees of
    give, both horizontally and vertically, in either direction. It also requires the faces to
    be at least 40 by 40 pixels, but other than that, youre good to go, and there is
    plenty you can do with the indexed information. Once you have a face identified with the
    system, you can click the thumbnail and receive a wealth of search results, including
    every other clip the identified individual is in. This allows you to pick out someone
    sketchy in one scene and immediately see where they were before and after, plus it also
    allows you to upload a suitable photo and then use the system to see if the person is, or
    isnt, in the area. That is, so long as theyve glanced towards a camera..... the fact remains that anyone who has ever thought 'man, Id
    love to install 1,000 more cameras, but I cant sift through all that video' will
    have a potential solution very soon." | 
| "Everything we do on the
    Internet leaves a trail back to us. Search engine entries, shopping lists, e-mail
    addresses and so much more which is ripe for the taking. Now governments and their
    intelligence agencies want a piece of that action and they have new tools to ascertain our
    intentions and possible future actions.... There
    have been a series of related and interesting developments in the field of global
    intelligence gathering. The NSA is building a brand new data center in Utah in order to
    connect with some new intelligence sharing systems such as the Defense Intelligence
    Enterprise and the Global Information Grid.... most
    people would not appreciate their private conversations end up on foreign military or
    intelligence networks.... It goes on all the time,
    you could look at Project Echelon, Project Groundbreaker, Project Trailblazer and many
    others. Why do you think that the head of the CIA is gloating about being about to glean
    intelligence through your devices and net-centric applications. It is a gold mine for them
    and they have reaped a bonanza from it. CIA director
    David Petraeus put his cards on the table because he hinted about the next target, it will be all of data from the smart meters that have been put in place in the past few years. It
    wouldnt be hard to tell how many people are living in a certain home from
    electricity records or which appliances are used the most. Will we be deemed terrorists
    from some poorly programmed profiling software based on our paper and data trail? Mistakes
    happen all the time, from faulty no-fly lists to swat team wrong door raids." | 
| "Is the CIA in your kitchen? If this question had been asked by a
    fictional character in a spy thriller, it might intrigue you, but you wouldn't imagine
    that it could be true in reality. If the Constitution means what it says, you wouldn't
    even consider the plausibility of an affirmative answer. After all, the Fourth Amendment
    to the Constitution was written to prevent the government from violating on a whim or a
    hunch or a vendetta that uniquely American right: the right to be left alone....Last year,
    the court invalidated the police use of warrantless heat-seeking devices aimed at the
    home, and it will probably soon invalidate the warrantless use of GPS devices secretly
    planted by cops in cars. Regrettably, unless the
    government attempts to use the data it has illegally gathered about a person, the person
    probably will not be aware of the government's spying on him, and thus will not be in a
    position to challenge the spying in a court. Relying on the Patriot Act, federal agents
    have written their own search warrants just like the British soldiers did. They have done
    this more than 250,000 times since 2001. But the government has rarely used any evidence
    from these warrants in a criminal prosecution for fear that the targeted person would
    learn of the government's unconstitutional and nefarious behavior, and for fear that the
    act would be invalidated by federal courts. Now,
    back to the CIA in your kitchen. When Congress
    created the CIA in 1947, it expressly prohibited the agency from spying on Americans in
    America. Nevertheless, it turns out that if your microwave, burglar alarm or dishwasher is
    of very recent vintage, and if it is connected to your personal computer, a CIA spy can
    tell when you are in the kitchen and when you are using that device. The person who
    revealed this last weekend also revealed that CIA software can learn your habits from all
    of this and then anticipate them. Acting 'diabolically' and hoping to 'change fingerprints
    and eyeballs' in its 'worldwide mission' to steal and keep secrets, the CIA can then gut
    the Fourth Amendment digitally, without ever physically entering anyone's home. We already
    know that your BlackBerry or iPhone
    can tell a spy where you are and, when the battery is connected, what you are saying. But
    spies in the kitchen? Can this be true? Who revealed all this last weekend? None other
    than Gen. David Petraeus
    himself, President Obama's new director of the CIA." | 
| "Adverts could soon be tailored
    according to the background noise around you when using your smartphone, if a patent
    application by Google becomes reality. The search engine giant has filed for a patent
    called Advertising based on environmental conditions. As that title implies, its not just background sounds that could be
    used to determine what adverts you seen on your mobile phone. The patent also describes
    using temperature, humidity, light and air composition to produced targeted
    adverts....Google has come under fire recently with users becoming increasingly concerned
    about its attitude to privacy and perceived obsession with making money. Google's
    controversial new 'privacy policy' allows the search giant to 'pool' information from 60
    separate services including Gmail, Google Search and Android phones, to create
    'personalised' advertising. Google ignored an international outcry to launch its new
    privacy policy on March 1 this year, despite concerns it may be illegal in the EU, as well
    as countries such as Japan and South Korea." | 
| "The Pentagon is accelerating
    efforts to develop a new generation of cyberweapons capable of disrupting enemy military
    networks even when those networks are not connected to the Internet, according to current
    and former U.S. officials. The possibility of a
    confrontation with Iran or Syria has highlighted for American military planners the value
    of cyberweapons that can be used against an enemy whose most important targets, such as
    air defense systems, do not rely on Internet-based networks. But adapting such
    cyberweapons can take months or even years of arduous technical work.... Officials are researching cyberweapons that can target 'offline'
    military systems in part by harnessing emerging technology that uses radio signals to
    insert computer coding into networks remotely.....
    In some cases, as with command-and-control systems, military assets rely on Internet
    connections, making them theoretically easier to target. Without that connectivity, an
    attacker would have to rely on other means  for instance, physically inserting into
    those systems portable devices such as thumb drives or computer components that have been
    altered." | 
| "Samsungs 2012
    top-of-the-line plasmas and LED HDTVs offer new features never before available within a
    television including a built-in, internally wired HD camera, twin microphones, face
    tracking and speech recognition. While these features give you unprecedented control over an HDTV,
    the devices themselves, more similar than ever to a personal computer, may allow hackers
    or even Samsung to see and hear you and your family, and collect extremely personal data.
    While Web cameras and Internet connectivity are not new to HDTVs, their complete
    integration is, and its the always connected camera and microphones, combined with
    the option of third-party apps (not to mention Samsungs own software) gives us cause
    for concern regarding the privacy of TV buyers and their friends and families. Samsung has not released a privacy policy clarifying what data it is
    collecting and sharing with regard to the new TV sets. And while there is no current
    evidence of any particular security hole or untoward behavior by Samsungs app
    partners, Samsung has only stated that it 'assumes no responsibility, and shall not be
    liable' in the event that a product or service is not 'appropriate.' Samsung demoed these
    features to the press earlier this month. The camera and microphones are built into the
    top if the screen bezel in the 2012 8000-series plasmas and are permanently attached to
    the top of the 7500- and 8000ES-series LED TVs. A Samsung representative showed how, once
    set up and connected to the Internet, these models will automatically talk to the Samsung
    cloud and enable viewers to use new and exciting apps. These
    Samsung TVs locate and make note of registered viewers via sophisticated face recognition software.
    This means if you tell the TV whose faces belong to which users in your family, it
    personalizes the experience to each recognized family member. If you have friends over, it could log these faces as well. In addition,
    the TV listens and responds to specific voice commands. To use the feature, the microphone
    is active. What concerns us is the integration of
    both an active camera and microphone. A Samsung representative tells us you can deactivate
    the voice feature; however this is done via software, not a hard switch like the one you
    use to turn a room light on or off. And unlike other TVs, which have cameras and
    microphones as add-on accessories connected by a single, easily removable USB cable, you
    cant just unplug these sensors. During our demo, unless the face recognition
    learning feature was activated, there was no indication as to whether the camera (such as
    a red light) and audio mics are on. And as far as the microphone is concerned the is no
    way to physically disconnect it or be assured it is not picking up your voice when you
    dont intend it to do so...... Dont
    assume a TV is an un-hackable island! Samsung does not disclose what operating system is
    within its TVs, therefore we cannot confirm if it is Android and/or any other that might
    have a prior history of hacking. It has been widely reported Android phones have been hacked allowing outside control of phones, via third party apps. Countless companies have had their networks hacked, causing thousands of customers personal data to be released to the
    world. If this were to happen to Samsung it is theoretically possible hackers could gain
    access to names, addresses  and images of the faces of entire families....With so
    many questions raised and no answers provided, HD
    Guru recommends you weigh the possibilities and decide whether or not you care about its
    unknown personal privacy risks before purchasing one of these HDTVs." Is Your New HDTV Watching You? Guru, 19 March 2012 | 
| "Confidential personal data on
    hundreds of thousands of Britons is being touted by corrupt Indian call centre workers, an
    undercover investigation has discovered. Credit card information, medical and financial
    records are being offered for sale to criminals and marketing firms for as little as 2p.Two consultants, claiming to be IT workers at several call
    centres, met undercover reporters from The Sunday Times and boasted of having 45 different
    sets of personal information on nearly 500,000 Britons. Data included names, addresses,
    and phone numbers of credit card holders, start and expiry dates as well as the
    three-digit security verification codes. The information  much of which related to
    customers at major financial companies, including HSBC and NatWest - would be a goldmine
    for criminals, allowing fraudsters to syphon thousands of pounds from bank accounts within
    minutes. IT consultant Naresh Singh met the undercover reporters in a hotel room in
    Gurgaon, a town near Delhi, carrying a laptop full of data. He told them: These
    [pieces of data] are ones that have been sold to somebody already. This is Barclays, this
    is Halifax, this is Lloyds TSB. Weve been dealing so long we can tell the bank by
    just the card number." | 
| "The National Security Center is building a highly fortified $2
    Billion highly top secret complex simply named the 'Utah Data Center' which will soon be
    home to the Hydrogen bomb of cybersecurity  A
    512 Qubit Quantum Computer  which will
    revitalize the the 'total information awareness' program originally envisioned by George
    Bush in 2003. The news of the data center comes after Department
    of Defense contractor Lockheed Martin secured a contract with D-Wave for $10 million
    for a 512 qubit Quantum Computer code-named Vesuvius. Vesuvius is capable of executing a
    massive number of computations at once, more than
    100,000,000,000,000,000,000,000,000,000,000,000,000, which is would take millions of years
    on a standard desktop. The computer will be able to crack even the most secure encryption
    and will give the US government a quantum leap into technologies once only dreamed of
    including the rise of the worlds very first all-knowing omniscient self-teaching
    artificial intelligence." | 
| "James Bamford has a way of
    digging up the facts that lend credence to Americas worst privacy fears about its
    own government. Now the author and investigative
    reporter who wrote the definitive portraits of the National Security Agency in his books The
    Puzzle Palace, Body
    of Secrets and The
    Shadow Factory has drawn a picture of ubiquitous surveillance that seems mind-boggling
    even by NSA standards. In his just-published cover story for
    Wired, Bamford lays out the NSAs plans for
    a vast new facility in Bluffdale, Utah that aims to become a storage and analysis hub for
    the record-breakingly massive collections of Internet traffic data that the NSA hopes to
    gather in coming years not from just foreign networks, but domestic ones as well. The
    story adds confirmation to what the New York Times revealed in 2005: that the NSA has
    engaged in widespread wiretapping of Americans with the consent of firms like AT&T and
    Verizon. But more interestinglyand more troubling in the eyes of many who value
    their privacyit details the Agencys plans to crack AES encryption, the
    cryptographic standard certified by the NSA itself in 2009 for military and government use
    and until now considered uncrackable in any amount of time relevant to mortals. Using what will likely be the worlds fastest supercomputer and the
    worlds largest data storage and analysis facility, the NSA plans to comb
    unimaginably voluminous troves of messages for patterns they could use to crack AES and
    weaker encryption schemes, according to Bamfords story. A few of the facts hes
    uncovered: *
    The $2 billion data center being built in Utah would have four 25,000 square-foot halls
    filled with servers, as well as another 900,000 square feet for administration. * It will use 65 megawatts of
    electricity a year, with an annual bill of $40 million, and incorporates a $10 million
    security system. * Since 2001, the NSA has intercepted and stored between 15 and 20 trillion
    messages, according to the estimate of ex-NSA scientist Bill Binney. It now aims to store
    yottabytes of data. A yottabyte is a million billions of gigabytes. According to one storage
    firms estimate in 2009, a yottabyte would cover the entire states of Rhode
    Island and Delaware with data centers. * When the Department of Energy began a supercomputing project in 2004 that
    took the title of the worlds fastest known computer from IBM in 2009 with its
    'Jaguar' system, it simultaneously created a secret track for the same program focused on
    cracking codes. The project took place in a $41 million, 214,000 square foot building at
    Oak Ridge National Lab with 318 scientists and other staff. The supercomputer produced
    there was faster than the so-called 'worlds fastest' Jaguar. * The NSA project now aims to break
    the 'exaflop barrier' by building a supercomputer a hundred times faster than the fastest
    existing today, the Japanese 'K Computer.' That code-breaking system is projected to use
    200 megawatts of power, about as much as would power 200,000 homes." | 
| "When The Wall Street Journal
    reporter Margaret Coker visited the Libyan governments surveillance centre in
    Tripoli after the citys fall, she saw that the authorities had been monitoring
    everything: the internet, mobile phones, satellite phone and internet connections. Some
    files included emails and online conversations between Gaddafis opponents. Notices
    on the walls revealed that the company which had installed the equipment was Amesys, a
    subsidiary of French firm Bull (1). The French satirical weekly Le Canard Enchainé later
    reported that Frances military intelligence directorate had been solicited to help
    train Libyas internal spies (2). In Syria, US equipment helps Bashar al-Assads
    regime censor the internet, and retrieve logins and passwords to access peoples
    emails or Facebook and Twitter pages. This tool is particularly useful for tracking the
    communications of opponents with internal or foreign connections. The technology is
    innocuously named 'deep packet inspection' (DPI). When
    someone sends an email, a series of servers relays it to its destination. Each server
    sends the message on to the next, looking only at the recipients address, and not at
    the contents. An expert on internet law, Jonathan Zittrain, explained: 'Its a bit
    like being at a party with polite friends. If youre too far from the bar, or there
    are too many people in the way, you ask the person next to you to get you a beer. They ask
    the person next to them, who is a bit closer to the bar, and so on. Eventually your order
    reaches the bar and your beer arrives via the same route back. Since everyone is polite,
    no one will have drunk your beer along the way.' But DPI is less polite. How would you
    feel if the person next to you analysed your order, and started lecturing you about it? Or
    if they tampered with your drink, adding water or something stronger? This is exactly what
    DPI technology can do: it allows people to read the content of internet traffic, modify
    it, and even send it to someone else. Amesys is not alone in this market. US press agency
    Bloomberg recently reported that another French company, Qosmos, had provided DPI
    technology to a consortium equipping Syria to the same standard as Gaddafis Libya
    (3). DPI is also at the heart of Chinas firewall, which allows the government to
    censor internet traffic and spy on its citizens. The
    recent Wikileaks publication of numerous internal documents from these companies shows
    that monitoring communication networks is 'a secret new
    industry spanning 25 countries ... In traditional spy
    stories, intelligence agencies like MI5 bug the phone of one or two people of interest. In the last 10 years systems of indiscriminate, mass surveillance have
    become the norm' (4). A
    little earlier The Wall Street Journal had published more than 200 marketing documents
    from 36 companies offering the US anti-terrorist agency various surveillance and computer
    hacking tools (5). DPI entered the spotlight in May
    2006 when Mark Klein, a former technician with US internet provider AT&T, leaked the
    fact that the company had installed DPI technology at the heart of the countys
    internet network, in cooperation with the US National Security Agency (which invented the
    Echelon system in the 1980s and 1990s). The
    technology was provided by internet surveillance company Narus (slogan 'See Clearly, Act
    Swiftly'). Narus was set up in 1997, has 150 employees, earned $30m in 2006, and was
    bought up by Boeing in 2010. The Mubarak regime was
    reported to have installed Narus equipment in Egypt (6). The flow of information over the
    internet includes the web, emails, synchronous exchanges (instant messaging) and
    asynchronous exchanges (blogs, discussion forums), phone conversations, video, raw data,
    etc. Most of this communication is not encrypted, so
    it is easy for both the casual hacker and state security services to monitor it." | 
| "Google is to face new
    investigations in both America and the EU over using hidden computer code to violate
    iPhone users' privacy settings. The search giant is alleged to have 'tricked' the web
    browser in iPhone, iPad and PC into sending information to Google.  The information was used to build up advertising profiles on Google
    account users, and caused outrage among privacy groups. Google has faced increasing public
    hostility over its use of private data this year after its new 'privacy policy' allowed
    wholesale sharing of people's information. The search giant is to be investigated by
    America's Federal Trade Commission over whether the 'trick', uncovered earlier this year,
    violates agreements about openness and privacy. The current European Union probe into
    Google's new privacy policy will also investigate the practice, according to a report in
    the Wall Street Journal." | 
| "When people download a film from Netflix to a flatscreen, or turn on
    web radio, they could be alerting unwanted watchers to exactly what they are doing and
    where they are. Spies will no longer have to plant
    bugs in your home - the rise of 'connected' gadgets
    controlled by apps will mean that people 'bug' their own homes,
    says CIA director David Petraeus.
    The CIA claims it will be able to 'read' these
    devices via the internet - and perhaps even via radio waves from outside the home.
    Everything from remote controls to clock radios can now be controlled via apps - and chip
    company ARM recently unveiled low-powered, cheaper chips which will be used in everything
    from fridges and ovens to doorbells. The resultant
    chorus of 'connected' gadgets will be able to be read like a book - and even
    remote-controlled, according to CIA Director David Petraeus, according to a recent report by Wired's 'Danger Room' blog. Petraeus says that web-connected gadgets will 'transform' the art of
    spying - allowing spies to monitor people automatically
    without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a
    dinner party.  ' 'Transformational is an overused word, but I do believe it
    properly applies to these technologies,' said Petraeus. 'Particularly to their effect on clandestine tradecraft. Items of interest
    will be located, identified, monitored, and remotely controlled through technologies such
    as radio-frequency identification, sensor networks, tiny embedded servers, and energy
    harvesters - all connected to the next-generation internet using abundant, low-cost, and
    high-power computing.' Petraeus was speaking to a
    venture capital firm about new technologies which aim to add processors and web
    connections to previously 'dumb' home appliances such as fridges, ovens and lighting
    systems. This week, one of the world's biggest chip
    companies, ARM, has unveiled a new processor built to work inside 'connected' white
    goods." | 
| "More and more personal and household devices are connecting to the
    internet, from your television to your car navigation systems to your light switches. CIA Director David Petraeus
    cannot wait to spy on you through them." | 
| "Now that one
    in 25 motorists in Britain is driving uninsured  and these drivers are involved in
    collisions which kill about three people a week  the Government is considering
    cutting off their access to petrol or diesel by using spies at the
    pumps.Accountants Ernst & Young are
    working with the Prime Ministers Office on plans to identify uninsured drivers on
    garage forecourts and at fuel pumps via automatic number plate recognition (ANPR). The cameras, already installed to prevent motorists driving off without
    paying for fuel, could be used to cross-reference number plates against the Driver and Vehicle Licensing Agency (DVLA)
    database. A positive match, showing that a vehicle is without insurance or tax, would mean
    it is prevented from filling up. Graeme Swan, a partner at Ernst & Young, said:
    'Following a presentation with officials at Number 10, where we suggested the approach,
    Government is now looking to move this policy forward. The key to this is simplicity.
    Connecting the existing technology and is relatively inexpensive and wouldnt be a
    big information technology programme. There shouldnt be concerns about big
    brother because there is no new database, no vehicles are tracked and no record is
    kept. Its simply a new rule of no insurance equals no fuel." | 
| "Cameras at petrol stations will
    automatically stop uninsured or untaxed vehicles from being filled with fuel, under new
    government plans. Downing Street officials hope the hi-tech system will crack down on the
    1.4million motorists who drive without insurance. Automatic number plate recognition
    (ANPR) cameras are already fitted in thousands of petrol station forecourts. Drivers can only fill their cars with fuel once the camera has captured
    and logged the vehicles number plate. Currently the system is designed to deter
    motorists from driving off without paying for petrol. But under the new plans, the cameras
    will automatically cross-refererence with the DVLAs huge database. When a car is
    flagged as being uninsured or untaxed, the system will prevent the fuel pump being used on
    that vehicle." | 
| "Hackers have defeated Google
    Chrome first in an annual competition to test the security of the most popular web
    browsers. At the Pwn2own competition in Canada, a group of French hackers were able to
    bypass Googles vaunted security features to take control of a Windows PC in less
    than five minutes. The result is a reversal of last
    years Pwn2own, when Chrome stood undefeated at the end of the competition. This year
    it was beaten by Vupen, a French firm controversial in security circles for selling the
    software vulnerabilities it discovers to government spy agencies. 'We wanted to show that
    Chrome was not unbreakable,' the firms head of research Chaouki
    Bekrar told ZDNet.  'Last year, we saw a lot of headlines that no one could hack
    Chrome. We wanted to make sure it was the first to fall this year.'' | 
| "Sir John Sawers spoke to more than 20 ministers about the latest
    top-secret intelligence on the Iranian threat and the growing expectation that Israel is
    poised to launch a pre-emptive strike against the regime. The highly unusual briefing is
    thought to have raised questions about Israels military capacity to destroy Iranian
    nuclear sites, which are buried deep underground. The MI6 chief is also understood to have
    warned about the potential threat to Britain from a nuclear arms race in the Middle East.
    The secrecy around the briefing, which contained so-called 'strap' intelligence shared
    only with top officials, was so high that ministers were ordered to leave their mobile
    phones outside the Cabinet room. There are claims
    that basic mobile phones, without specialist anti-eavesdropping security, can be converted
    into 'listening devices' by foreign intelligence agencies." | 
| "Researchers at the University
    of Michigan have reported that it took them only a short time to break through the
    security functions of a pilot project for online voting in Washington, D.C. 'Within 48
    hours of the system going live, we had gained near complete control of the election
    server', the researchers wrote in a paper that has
    now been released. 'We successfully changed every vote and revealed almost every secret
    ballot.' The hack was only discovered after about
    two business days  and most likely only because the intruders left a visible trail
    on purpose....The researchers conclude that it is generally difficult to build secure
    online voting systems. One small configuration or implementation error would undermine the
    entire voting process. Even if central servers were not used, which would be prime targets
    for hacking attempts, there would still be a number of other points of attack. Fundamental
    advances still need to be made in security, they say, before e-voting will truly be
    safe." | 
| "New information about
    Facebooks outsourced moderation process shows that the social network shares more
    personal information with moderators than it has so far acknowledged. The social network was criticized
    last week after gossip site Gawker exposed it as employing third-party content
    moderators in the developing world for one dollar an hour. Facebook responded saying: 'No
    user information beyond the content in question and the source of the report is shared.'
    However, new evidence seen by The Telegraph, shows that these moderators, who have to deal
    with the distressing images and messages which are reported every day, and are clearly
    able to see the names of the person who uploaded the offensive content, the
    subject of the image or person tagged in a photo - in addition to the person who has
    reported the content. Moreover, there are currently no security measures in place stopping
    these moderators taking screen shots of people's personal photos, videos and posts." | 
| "Turning the tables on Big
    Brother: Now internet users can watch who is spying on them in blow against Google's new
    snooping policy. Mozilla, the maker of Firefox, has unveiled a new add-on for the popular
    web browser that gives web users an instant view of which companies are 'watching' them as
    they browse. The move comes the same week that Google pushed ahead with its controversial
    new privacy policy, built to provide even more data for Google's $28 billion advertising
    business - despite concerns that the massive harvesting of private data might be illegal
    in many countries. The Collusion add-on will allow
    users to 'pull back the curtain' on web advertising firms and other third parties that
    track people's online movements, says Mozilla CEO Gary Kovacs.... Google's new privacy
    policy allows it to 'streamline' data from Android phones, YouTube, Gmail and web browsing
    to target its adverts even more precisely towards individual web users.... Google ignored
    an international outcry to launch its new privacy policy this week - despite concerns the
    policy may actually be illegal in many territories.... Data from 60 of Google's services
    will be shared between them - meaning Google account users, owners of Android phones and
    YouTube viewers will be subjected to even more intrusive 'personalised' adverts from now
    on. Worried users are trading guides about how to protect sensitive private data such as
    search histories and the content of emails from Google's new all-encompassing advertising
    profiles.... A British privacy campaigner, Alex Hanff is suing the search giant for a
    refund on his Android phone, claiming that the changes to how Android data could be used
    amount to a change in the terms of his contract. Some Android users claim that they are
    hardest hit by the policy changes, as they have no way to 'opt out' of mobile phone
    contracts.... The Japanese government said yesterday it will investigate whether the new
    policy breaches Japanese privacy laws, according to a report in the Tokyo Times.... The
    new policy makes it easier for Google to combine the data of one person using different
    services such as the search engine, YouTube or Gmail if he is logged into his Google
    account.  That allows Google to create a broader profile of that user and target
    advertising based on that persons interests and search history more accurately.
    Advertising is the main way Google makes its money..... The
    policy change has horrified privacy advocates and bloggers - tech site ZDNet said that
    Google would 'know more about you than your wife does' and said the policy was 'Big
    Brother-ish'." | 
| "Broadband providers and phone
    networks are to reveal to authorities your every phone call, text message, email and
    private social network message. New anti-terror laws could force phone networks and
    broadband providers to store our digital communications in databases open to security
    services to check up on us -- and if that doesn't worry you, just wait until the hackers
    get their hands on it. The Communications Capabilities Development Plan sets out the new
    scheme, as suggested by MI5, MI6, and GCHQ. The
    government won't store the data itself, instead requiring Internet service providers and
    phone networks such as BT, Sky, and O2 to store the information for a year. Anti-terror
    police and spies could then see the information to see who you've been talking to. Actual
    phone calls and texts won't be recorded but details of who called or texted who -- and
    when and where -- will be saved. Your emails and private messages sent through Facebook
    and Twitter will be saved, as well as your internet browsing history or exchanges between
    online video gamers. Privacy groups including the Open Rights Group have lambasted the new
    plans. The Telegraph
    reports that the government has been holding talks with ISPs for the last two months,
    ahead of legislation this summer. New laws could be officially unveiled as soon as May.
    With bitter irony, the plan was criticised by the Tories and Liberal Democrats when it was
    first proposed by the then ruling Labour government. It was dropped then, only to be
    resurrected recently by the Coalition under a new name. Labour's Intercept Modernisation
    Programme was ditched in 2009 amid controversy about the sheer number of people who could
    access the data, including local councils and unelected quangos. The Conservatives
    published a report at the time called Reversing the Rise of the Surveillance State --
    changed their tune, haven't they?" | 
| "The government has expanded its
    plans to store and monitor Twitter, Facebook and other personal web communication data,
    but these are being created without official ISP involvement, according to an ISP
    representative body. Under the plans, police and intelligence operatives will
    gain access to records of who has talked to whom on social networks, on instant
    messaging services, and in online multi-player games. The monitoring and storage are
    expected to be handled by ISPs, but the government's plans have not been officially shared
    with these companies, according to the Internet Service Providers Association (ISPA).... Plans to expand existing government interception capabilities are
    being produced by a Home Office group called the Communications
    Capabilities Directorate under the Communications Capabilities Development Programme
    (CCDP), which cost
    at least £14m to set up. The government will publish its web intercept plans by the
    end of April 2012 and wants legislation by the end of June 2015, according toHome Office documents published in January. After lobbying by the
    security services, ministers have decided to set aside legislative time for the CCDP via
    the Queen's Speech in May, The Daily Telegraph said in a report on Saturday." ISPs kept in dark about UK's plans to intercept Twitter ZDNet, 20 February 2012 | 
| "San Francisco Google announced
    a new 'feature' of its Google Desktop software that greatly increases the risk to consumer
    privacy. If a consumer chooses to use it, the new 'Search Across Computers' feature will
    store copies of the user's Word documents, PDFs, spreadsheets and other text- based
    documents on Google's own servers, to enable searching from any one of the user's
    computers. EFF urges consumers not to use this feature, because it will make their
    personal data more vulnerable to subpoenas from the government and possibly private
    litigants, while providing a convenient one-stop-shop for hackers who've obtained a user's
    Google password. 'Coming on the heels of serious
    consumer concern about government snooping into Google's search logs, it's shocking that
    Google expects its users to now trust it with the contents of their personal computers,'
    said EFF Staff Attorney Kevin Bankston. 'Unless you configure Google Desktop very
    carefully, and few people will, Google will have copies of your tax returns, love letters,
    business records, financial and medical files, and whatever other text-based documents the
    Desktop software can index. The government could then demand these personal files with
    only a subpoena rather than the search warrant it would need to seize the same things from
    your home or business, and in many cases you wouldn't even be notified in time to
    challenge it. Other litigants--your spouse, your business partners or rivals,
    whomever--could also try to cut out the middleman (you) and subpoena Google for your
    files.' The privacy problem arises because the Electronic Communication Privacy Act of
    1986, or ECPA, gives only limited privacy protection to emails and other files that are
    stored with online service providers..." | 
| "Minister for the Environment
    Phil Hogan this afternoon announced plans to try to sell off the States unused 7,500
    electronic voting machines. Earlier, Minister for Finance Michael Noonan said the
    machines, which have cost the State nearly 55 million since 2002, are now
    'valueless'....The government agreed to buy the
    machines for 50 million after they were piloted in a number of constituencies in the
    2002 general election and in the Nice referendum. Since then, the bill to taxpayers for
    the machines has risen to 54.7 million in purchase and storage costs. Dutch firm
    Nedap made the machines and public concerns in the Netherlands and Germany prompted the
    decommissioning of thousands of the machines in those countries. Plans to use them
    nationally in the 2004 European and local elections were abandoned amid controversy over
    the systems transparency and whether it was open to manipulation. In April 2009, the
    then Green Party minister for the environment John Gormley announced that e-voting would
    be scrapped and the machines disposed of." | 
| "Google
    is tracking users of the Internet Explorer Web browser without their knowledge, Microsoft has asserted. After news emerged last week
    that Google had bypassed the privacy settings of Apple's
    (Nasdaq: AAPL) Safari browser, Microsoft researchers began looking into whether the search
    giant was also playing fast and loose with IE's settings. However, IE 9 has an additional privacy feature called 'Tracking
    Protection' that blocks the method Google is using, Microsoft said. Users without IE 9 or
    who have the feature turned off may be susceptible. Google 'basically hacked IE
    differently than they hacked Safari, but the result is pretty much the same -- they
    overrode the browsers' capability to block cookies and prevent reporting,' Rob Enderle,
    principal analyst at the Enderle Group, told TechNewsWorld. Google 'appears
    to be intentionally violating the privacy rights of users of third party products.'
    Google's actions are 'concerning at any level, being misleading to consumers who expect
    these [privacy] controls to be honored and working,' Chris Babel, CEO of TrustE, told TechNewsWorld. However,
    Google spokesperson Rachel Whetstone contended that Microsoft's policy 'is widely
    non-operational.'" | 
| "Britain's police and MI5 and MI6 spy agencies are understandably
    living in dread of a world-shaking terror attack on the summer Olympics. Indeed they are
    so afraid of a new 9/11 that they plan an unprecedented invasion of our individual
    privacy. All phone calls, texts, tweets and computer
    keystrokes are to be monitored, kept on file and used as and when seen fit. This massive escalation in intelligence gathering has been condemned even
    by senior Tory MPs as nothing less than snooping.... But Britain is already one of the
    most spied-on societies in the free world. Most of us accept CCTV, police drones,
    satellite trackers and automatic number plate recognition because we have nothing to hide.
    But we have also learned that blanket surveillance - in the wrong hands - can be a
    dangerous step too far. Labour was condemned for "recklessly" invading privacy
    by using anti-terror surveillance as a catch-all for spying. Sneaky council officials
    abused the power and snooped on families trying to get children into popular schools or
    breaking garbage collection rules. Last week I raised questions about the risk to a free
    Press from over-zealous officialdom. Who knows what sort of governments will be elected in
    the future?" | 
| "Details about text messages,
    phone calls, emails and every website visited by members of the public will be kept on
    record in a bid to combat terrorism. The Government
    will order broadband providers, landline and mobile phone companies to save the
    information for up to a year under a new security scheme. What is said in the texts,
    emails or phone calls will not be kept but information on the senders, recipients and
    their geographical whereabouts will be saved. Direct messages to users of social
    networking sites like Facebook and Twitter will also be saved and so will information
    exchanged between players in online video games. The information will be stored by
    individual companies rather than the government. The news has sparked huge concerns about
    the risk of hacking and fears that the sensitive information could be used to send spam
    emails and texts." | 
| "Janne Kytömäki, a Finnish
    software developer, was cruising Googles Android Market for smartphone apps last
    year when he noticed something strange. Dozens of best-selling applications suddenly
    listed the same wrong publisher. It was as if Stephen Kings name had vanished from
    the covers of his books, replaced by an unknown author. Kytömäki realized the culprit
    was a piece of malware that was spreading quickly, and he posted his findings online.
    Google responded swiftly. It flipped a little-known kill switch, reaching into more than
    250,000 infected Android smartphones and forcibly removing the malicious code. 'It was sort of unreal, watching something like that unfold,' says
    Kytömäki, who makes dice simulator apps. Kill switches are a standard part of most
    smartphones, tablets, and e-readers. Google, Apple, and Amazon all have the ability to
    reach into devices to delete illicit content or edit code without users permission.
    Its a powerful way to stop threats that spread quickly, but its also a privacy
    and security land mine. With the rollout of the Windows 8 operating system expected later
    this year, millions of desktop and laptop PCs will get kill switches for the first time.
    Microsoft hasnt spoken publicly about its reasons for including this capability in
    Windows 8 beyond a cryptic warning that it might be compelled to use it for legal or
    security reasons. The feature was publicized in a widely cited Computerworld article in
    December when Microsoft posted the terms of use for its new application store, a feature
    in Windows 8 that will allow users to download software from a Microsoft-controlled
    portal. Windows smartphones, like those of its competitors, have included kill switches
    for several years, though software deletion 'is a last resort, and its uncommon,'
    says Todd Biggs, director of product management for Windows Phone Marketplace." | 
| "Anyone with about $10, physical access to a Diebold voting machine
    and rudimentary knowledge of electronics can remotely hack into the device, according to
    experts at the Vulnerability Assessment Team at Argonne National Laboratory in
    Illinois. A hacker could potentially change a
    persons votes without them ever knowing about it. 'We believe these man-in-the-middle attacks are potentially possible on a
    wide variety of electronic voting machines,' said Roger Johnston, leader of the assessment
    team. 'We think we can do similar things on pretty much every electronic voting machine.'' | 
| "... a bill Congress passed this week to
    make it easier for the government to fly unmanned spy planes in U.S. airspace. The FAA
    Reauthorization Act, which President Obama is expected to sign,
    also orders the Federal
    Aviation Administration to develop regulations for the testing and licensing of
    commercial drones by 2015. Privacy advocates say the measure will lead to widespread use
    of drones for electronic surveillance by police agencies across the country and eventually
    by private companies as well. 'There are serious
    policy questions on the horizon about privacy and surveillance, by both government
    agencies and commercial entities,' said Steven Aftergood, who
    heads the Project on Government Secrecy at the Federation
    of American Scientists. The Electronic
    Frontier Foundation also is 'concerned about the implications for surveillance by
    government agencies,' said attorney Jennifer Lynch. The
    provision in the legislation is the fruit of 'a huge push by lawmakers and the defense
    sector to expand the use of drones' in American airspace, she added. According to some
    estimates, the commercial drone market in the United States could be worth hundreds of
    millions of dollars once the FAA
    clears their use. The agency projects that 30,000 drones could be in the nations
    skies by 2020. The highest-profile use of drones by the United States has been in the CIAs
    armed Predator-drone program, which targets al Qaeda terrorist leaders. But
    the vast majority of U.S. drone missions, even in war zones, are flown for surveillance.
    Some drones are as small as model aircraft, while others have the wingspan of a full-size
    jet. In Afghanistan, the
    U.S. use of drone surveillance has grown so rapidly that it has created a glut of video
    material to be analyzed." | 
| "The US government has developed
    massive surveillance capabilities to monitor communications, travel and financial
    transactions in this country and abroad. But, even
    the government cannot monitor everything Americans donot directly, anyway. Thus, it
    created the Communities Against Terrorism (CAT) program to enlist your friendly local
    businesses as spies for the Federal Bureau of Investigation (FBI). The CAT program, funded
    by the State and Local Anti-Terrorism Training
    program (SLATT) is described as a 'tool to engage members of the local community in the
    fight against terrorism.' The program interprets 'local community' to mean businesses, and
    only registered businesses may access the programs flyers listing 'potential
    indicators' of terrorist activity. Each flyer is designed for a particular kind of
    business. For example, this
    list was prepared for owners of internet cafes. Unquestionably, someone planning a
    terrorist attack has engaged in one or more of the 'suspicious' activities on that list.
    But so, too, have most of the estimated 289 million computer
    users in this country. The governments flyer designates people as suspicious if
    they 'always pay cash' at an internet café. Thats a jaw-dropping assumption
    considering that were talking about businesses that sell $2 cups of joe, not $600
    airline tickets. Good luck paying with a credit card for a purchase under
    $10. Evidence that one has a 'residential based internet provider' (such as Comcast or
    AOL) is another pretext for government snooping. If your home internet connection is
    unreliable, if you are on travel, or if you simply relish a good cup of coffee with your
    internet browsing, you run the risk of acquiring an FBI file. Trying to shield personal
    information on your computer screen from the prying eyes of others will mark you as a
    potential terrorist, also." | 
| "Google+ has made Google unfriendly. In
    its new privacy policy, which all Google users must accept on Mar. 1, Google says in plain language:
    When you upload or otherwise submit content to our Services, you give Google (and those we
    work with) a worldwide license to use, host, store, reproduce, modify, create derivative
    works (such as those resulting from translations, adaptations or other changes we make so
    that your content works better with our Services), communicate, publish, publicly perform,
    publicly display and distribute such content. The
    rights you grant in this license are for the limited purpose of operating, promoting, and
    improving our Services, and to develop new ones. So this is not at all a 'privacy' policy.
    It is a 'publicity' policy. It is the exact opposite of a privacy policy. What is really
    says is quite simple: 'Our policy is that there isn't any privacy; everything is
    public.'" | 
| "Hawaii's legislature is
    weighing an unprecedented proposal to curb the privacy of Aloha State residents: requiring
    Internet providers to keep track of every Web site their customers visit. John Mizuno, a Democratic state legislator in Hawaii, wants to require
    virtual dossiers to be compiled on state residents: two years' worth of their Internet
    browsing. Its House of Representatives has scheduled a hearing this morning on a new bill
    (PDF) requiring
    the creation of virtual dossiers on state residents. The measure, H.B. 2288, says
    'Internet destination history information' and 'subscriber's information' such as name and
    address must be saved for two years. H.B. 2288, which was introduced Friday, says the
    dossiers must include a list of Internet Protocol addresses and domain names visited.
    Democratic Rep. John
    Mizuno of Oahu is the lead sponsor; Mizuno also introduced H.B.
    2287, a computer crime bill, at the same time last week." | 
| "Embarrassing, inaccurate or
    simply personal data will have to be deleted from the internet and company databases if
    consumers ask, under a new set of European laws. The
    move will mean that social networks such as Facebook or Twitter will have to comply with
    users' requests to delete everything they have ever published about themselves online. It
    will also mean that consumers will be able to force companies that hold data about them,
    such as for Tesco's Clubcard, to remove it. The changes, which could take more than two
    years to implement, also include a new EU power to fine companies up to 2 per cent of
    their global turnover if they breach the rules.  Businesses will also have a new duty
    to inform regulators and anyone affected by data breaches 'as soon as possible'.
    Commentators and lawyers have warned that in the case of large scale hacks, informing
    millions of users that their data is at risk could impose an unreasonable burden on firms,
    and risks dissuading the development of innovative services." | 
| "The Food and Drug Administration
    secretly monitored the personal e-mail of a group of its own scientists and doctors after
    they warned Congress that the agency was approving medical devices that they believed
    posed unacceptable risks to patients, government documents show. The surveillance  detailed
    in e-mails and memos unearthed by six of the scientists and doctors, who filed a
    lawsuit against the FDA in U.S. District Court in Washington last week  took place
    over two years as the plaintiffs accessed their personal
    Gmail accounts from government computers. Information garnered this way eventually
    contributed to the harassment or dismissal of all six of the FDA employees, the suit
    alleges. All had worked in an office responsible for reviewing devices for cancer
    screening and other purposes. Copies
    of the e-mails show that, starting in January 2009, the FDA intercepted communications
    with congressional staffers and draft versions of whistleblower
    complaints complete with editing notes in the margins. The agency also took electronic
    snapshots of the computer desktops of the FDA employees and reviewed documents they saved
    on the hard drives of their government computers. FDA computers post a warning, visible
    when users log on, that they should have 'no reasonable expectation of privacy' in any
    data passing through or stored on the system, and that the government may intercept any
    such data at any time for any lawful government purpose. But in the suit, the doctors and
    scientists say the government violated their
    constitutional privacy rights by gazing into personal e-mail accounts for the purpose
    of monitoring activity that they say was lawful. 'Who would have thought that they would
    have the nerve to be monitoring my communications to Congress?' said Robert C. Smith, one
    of the plaintiffs in the suit, a former radiology professor at Yale and Cornell
    universities who worked as a device reviewer at the FDA until his contract was not renewed
    in July 2010. 'How dare they?'' | 
| "The U.S. Supreme Court ruled
    unanimously Monday that police must get a search warrant before using GPS technology to
    track criminal suspects. The decision was a defeat
    for the government and police agencies, and it raises the possibility of serious
    complications for law enforcement nationwide, which increasingly relies on high tech
    surveillance of suspects including the use of various types of GPS technology. A GPS
    device installed by police on Washington, D.C., nightclub owner Antoine Jones' Jeep helped
    them link him to a suburban house used to stash money and drugs. He was sentenced to life
    in prison before the appeals court overturned the conviction. Associate Justice Antonin
    Scalia said the government's installation of a GPS device and its use to monitor the
    vehicle's movements constitutes a search, meaning that a warrant is required....All nine
    justices agreed that the GPS monitoring on the Jeep violated the Fourth Amendment's
    protection against unreasonable search and seizure, a decision the American Civil
    Liberties Union said was an 'important victory for privacy.'" | 
| "Thousands of British email
    addresses and encrypted passwords, including those of defence, intelligence and police
    officials as well as politicians and Nato advisers, have been revealed on the
    internet following a security breach by hackers. Among the huge database of private
    information exposed by self-styled 'hacktivists' are the details of 221 British military
    officials and 242 Nato staff. Civil servants working
    at the heart of the UK government  including several in the Cabinet Office as well
    as advisers to the Joint Intelligence Organisation, which acts as the prime minister's
    eyes and ears on sensitive information  have also been exposed. The hackers, who are
    believed to be part of the Anonymous group, gained
    unauthorised access over Christmas to the account information of Stratfor, a consultancy
    based in Texas that specialises in foreign affairs and security issues. The database had
    recorded in spreadsheets the user IDs  usually email addresses  and encrypted
    passwords of about 850,000 individuals who had subscribed to Stratfor's website.... John
    Bumgarner, an expert in cyber-security at the US
    Cyber Consequences Unit, a research body in Washington, has analysed the Stratfor
    breach for the Guardian. He has identified within the data posted by the hackers the
    details of hundreds of UK government officials, some of whom work in sensitive areas.....
    Among the leaked email addresses are those of 221 Ministry of Defence officials identified
    by Bumgarner, including army and air force personnel. Details of a much larger group of US military personnel were leaked.
    The database has some 19,000 email addresses ending in the .mil domain of the US
    military...... In the US case, Bumgarner has found, 173 individuals deployed in
    Afghanistan and 170 in Iraq can be identified. Personal data from former vice-president Dan
    Quayle and former secretary of state Henry Kissinger were also released. Other UK
    government departments have been affected: seven officials in the Cabinet Office have had
    their details exposed, 45 Foreign Office officials, 14 from the Home Office, 67 Scotland
    Yard and other police officials, and two employees with the royal household. There are
    also 23 people listed who work in the houses of parliament, including Jeremy Corbyn,
    Labour MP for Islington North, Lady Nicholson and Lord Roper....The hacking has had a big impact
    because Stratfor offers expert analysis of international affairs, including security
    issues, and attracts subscribers from sensitive government departments. The British
    victims include officials with the Joint Intelligence Organisation (JIO) responsible for
    assessing intelligence from all sources, including MI6 secret agents.... Stratfor has
    taken down its website while it investigates the security breach. The company says it is
    'working diligently to prevent it from ever happening again'." | 
| "The most senior figure in the US military has warned that the
    number of threats facing his country and its allies have increased over the last decade
    and that the armed forces must be kept strong to fight back. In his first speech since
    taking over as chairman of the joint chiefs of staff, General Martin Dempsey told an
    audience in London on Monday that meeting the new challenges in a time of austerity would
    require a transformation in military thinking. He
    highlighted the cyber threat as one of the most pressing, and said more needed to be done
    to counter the dangers online." | 
| "Smartphones are so addictive
    many users now hear 'phantom vibrations' because they are desperate to receive new
    messages, a study has found. Blackberries and iPhones are meant to help workers manage
    their workload by giving them access to messages and alerts while away from the office.
    But people become so obsessive about checking their email accounts and social networking
    sites that they actually become more stressed as a result, researchers said. Some are so
    hooked to their devices that they even begin to experience 'phantom' vibrations where they
    mistakenly believe their phone is buzzing in their pocket, it was claimed. The findings will be presented to the British Psychological Societys
    Division of Occupational Psychology Conference in Chester today. Researchers issued
    questionnaires and carried out psychometric stress tests on more than 100 volunteers
    including students and employees from a variety of professions including retail and the
    public sector.... Their results showed that people's use of smart phones was linked to
    their levels of stress, but their line of work was not. Stress was directly linked to the
    number of times people checked their phones on average, and people with the most extreme
    levels of stress were troubled by 'phantom' vibrations when no message had been received,
    the survey showed. Researchers said that in most cases people had acquired smart phones to
    help them keep on top of their work. But after they began using the devices, the benefits
    they brought to the user's workload were outweighed by a greater pressure for them to stay
    up to date with messages, emails and social networking sites. This became a vicious cycle
    in which the more stressed people became, the more they compulsively felt the need to
    check their phone, the study showed. Richard Balding of the University of Worcester, who
    led the research, said employers should seriously consider the burden that smart phones
    put on their workers. He said: 'Smart phone use is increasing at a rapid rate and we are
    likely to see an associated increase in stress from social networking. Organisations will
    not flourish if their employees are stressed, irrespective of the source of stress, so it
    is in their interest to encourage their employees to switch their phones off; cut the
    number of work emails sent out of hours, and reduce peoples temptation to check
    their devices.' " | 
| "Smart electricity meters provide power companies with an accurate
    and streamlined method of monitoring, reading and controlling a home's power usage. That
    convenience, however, comes at a steep price and could put homeowners' safety in
    jeopardy.  Researchers examining the privacy
    implications of smart-meter technology found that one German provider's devices
    contained vulnerabilities that allowed them to snoop on unencrypted data to determine
    whether or not the homeowners were home. After
    signing up with the German smart-meter firm Discovergy, the researchers detected that the
    company's devices transmitted
    unencrypted data from the home devices back to the company's servers over an insecure
    link. The researchers, Dario Carluccio and Stephan Brinkhaus, intercepted the supposedly
    confidential and sensitive information, and, based on the fingerprint of power usage, were
    able to tell not only whether or not the homeowners were home, away or even sleeping, but
    also what movie they were watching on TV. The problem, the researchers explained, stems
    from Discovergy's monitoring frequency; the devices log homeowners' electricity usage in
    2-second intervals, a timeframe they deemed unnecessary and intrusive. The two-second
    reporting interval provides so much data that they were able to accurately chart power
    usage spikes and lulls indicative of times a homeowner would be home, asleep or away.
      Carluccio and Brinkhaus presented their research in a presentation titled 'Smart Hacking for
    Privacy' at the Chaos Computing Congress in Berlin on Dec. 30." | 
| "A new version of the SpyEye
    'trojan horse' software not only steals your money, it then offers false reassurance that
    it's still there. When you visit your online bank,
    there will be no trace of the transactions that cyber-criminals are using to empty your
    bank account. Worse, your balance will also be adjusted on screen so it looks as if
    nothing is happening. The attack - on Windows PCs - has already been detected in the U.S.
    and the UK. The software - which steals your bank passwords to give access to your account
    - waits for you to enter the same banking details before 'adjusting' what you see. The
    idea is that it gives thieves more time to use your debit card details on fraudulent
    transactions without you realising it's happening. The first you'll learn of the attack is
    your bank refusing you money, or a paper statement showing you that cyber criminals have
    been draining money out of your account.The new version of SpyEye has targeted banks in
    the U.S. and the UK." New PC virus doesn't just steal your money - it creates fake online bank statements so you even don't know it's gone Mail, 6 January 2012 | 
| "Britain's largest shopping
    centre owners are all understood to have installed technology that tracks the movement of
    customers using their mobile phones. The equipment
    is being used in more than 30 major shopping centres including Lakeside in Essex,
    Manchester's Trafford Centre, and Cabot Circus in Bristol. Its use has led to privacy
    fears from groups such as Big Brother Watch that shoppers are being spied on while they
    walk around shopping centres. The FTSE 100 companies Land Securities, British Land,
    Hammerson and Capital Shopping Centres are all thought to be using variants of the
    technology. The British Council of Shopping Centres said establishing how people shop is
    vital in the battle with online retail and a "key priority" for landlords and
    retailers. Michael Green, chief executive of the council, said: 'New advances in
    technology provide new tools  including mobile phone tracking  which town
    centres need to compete and collaborate with online operations in a digital age.'
    Landlords insist the data is anonymous and merely maps mobile phone movement." | 
| "Japanese computer scientists
    say they've developed a computer virus that can be launched online to track down and
    disable the source of a cyber attack. While many
    computer experts say they remain skeptical, such a development would solve one of the
    major problems encountered by the online security community -- the so-called source
    attribution problem. Attackers can launch malicious viruses or denial of service attacks
    by using layers of proxy servers or a botnet to disguise their source Internet address,
    masking the true origination of the attack. The Japanese company Fujitsu, working on a
    three-year project for the Japanese Ministry of Defense, said it's not only worked out how
    to solve this attribution problem but also how to destroy any attacking code it meets en
    route, NewScientist.com reported Wednesday." | 
| "Hackers who stole thousands of
    credit card numbers from U.S. security firm Stratfor have now published the email
    addresses of more than 860,000 of its clients.The loose-knit Anonymous movement released
    the data - which included information on former U.S. Vice President Dan Quayle and former
    Secretary of State Henry Kissinger - online....People working for big corporations, the
    U.S. military and major defence contractors were all contained on lists stolen from the
    intelligence company often dubbed the Shadow CIA....In
    a posting on the data-sharing website pastebin.com, the hackers said the list included
    information from about 75,000 customers of Stratfor and about 860,000 people who had
    registered to use its site. It said that included some 50,000 email addresses belonging to
    the U.S. government's .gov and .mil domains. The list also included addresses at
    contractors including BAE Systems Plc, Boeing Co, Lockheed Martin Corp and several U.S.
    government-funded labs that conduct classified research in Oak Ridge, Tennessee; Idaho
    Falls, Idaho; and Sandia and Los Alamos, New Mexico. Corporations on the list included
    Bank of America, Exxon Mobil Corp, Goldman Sachs & Co and Thomson Reuters." Anonymous strikes again: Hackers publish email addresses and passwords of 860,000 clients of shadowy U.S. security firm Mail, 2 January 2012 | 
|    MORE SURVEILLANCE
    INFORMATION | 
| 
 | 
| 
 
 | ||
| NLPWESSEX,
    natural law publishing |