Showing posts with label privacy. Show all posts
Showing posts with label privacy. Show all posts

Thursday, October 10, 2013

Facebook Is About To Remove A Setting That Helps Control Who Sees Your Profile


Business Insider - Changes are coming to your Facebook page.

The social media giant is taking the last steps to remove an old search setting called “Who can look up your Timeline by name?" which controlled who could find you and see your status updates and photos.

The search setting was automatically removed last year for people who weren't using it.
If you are using it, you will get a notification in the coming days, letting you know it will be removed:


Facebook Search

As a reminder of the importance of privacy on Facebook, the best way to control what people can see is to choose the audience that can view each of the individual things you share.

Saturday, August 10, 2013

Obama Promises Reform of NSA Spying, But the Devil Will Be in the Details


EFF - ...President Obama held a press conference to address the growing public concern over the National Security Agency’s surveillance practices. We are glad to see that the Administration has been forced to address the matter publicly as a result of the sustained public pressure from concerned voters as well as the ongoing press coverage of this issue. Obama acknowledged that Americans were uncomfortable with the surveillance that has been leaked to the media (and noted that he would be as well, if he weren’t in the government).  He made four commitments to transparency and reform during the press conference, and also published a whitepaper describing the legal interpretation of the PATRIOT Act that is used to attempt to justify bulk surveillance.

While we’re glad Obama is responding to the public’s concerns, we take Obama’s promises today with a healthy dose of skepticism. He may be paying lip service to accountability and transparency, but the devil will be in the details when it comes to whether his proposals will be effective.

Other promises aside, President Obama did not commit to reducing the surveillance of Americans’ communications or the communications of individuals abroad who are not suspected of any crime.

Obama’s 4 Commitments – And What’s Missing

Obama made 4 specific commitments around NSA surveillance. Here’s an overview of what he did – and did not – promise to do.

1. Obama will work with Congress to "pursue appropriate reforms to Section 215 of the Patriot Act." This is the subsection of law used to justify the bulk collection of telephone records. Several bills have been introduced this Congress that attempt to tighten up this law, and we’re glad to see Obama will be supportive of such efforts. However, Obama pointedly did not address Sec. 702, the other statute that the government has cited as supporting its broader surveillance, including the content of communications.  And as we’ve explained, to return Americans to the rule of law and privacy and free speech rights that they deserve, we’ll need changes well beyond Section 215 of the PATRIOT Act. And even as to 215, Obama failed to explain what "appropriate reforms" might look like. Read what EFF thinks should be in NSA reform legislation.   More

Saturday, April 6, 2013

Facebook Home isn't where your privacy is

Facebook CEO Mark Zuckerberg announces Facebook Home 
at a press event in Menlo Park, Calif., on April 4, 2012.
(Credit: CNET/James Martin) 
 
 
CNET - Facebook's latest attempt to get you to spend more time with its services bodes ill for the privacy-minded, but not all hope is lost.
 
When Mark Zuckerberg and friends debuted Facebook Home yesterday, they downplayed the ever-growing importance your data has for the company. While the Facebook-obsessed may love Home, chances are your privacy won't feel welcome at all.

Facebook has earned a reputation for developing new products and features that are respectful of user privacy, and then slowly, sometimes with great subtlety and sometimes with mastodon-like lumbering, walking those policies back to a decidedly less-respectful state.

There's little indication that Facebook Home will be any different. At the Facebook Home question-and-answer session that followed Thursday's announcement, Zuckerberg said, "Analytics are made anonymous and used for half a percent of the user base." He added that that's the same as Google and Apple, which sounds reasonable, right?

The catch is that the more you share on Facebook, the more Facebook learns about you, and Facebook Home is designed to make you want to share even more.

Privacy and security researcher Ashkan Soltani agrees, and he explained that Facebook Home bridges the gap between passive data collection and active data-creating activities -- such as when you "Like" something in Facebook. "It's in the middle of every interaction on your device," 

More
 

Sunday, September 9, 2012

Obama Administration Will Spend $1 Billion on Iris & Facial Recognition Technology


Candice Lanier - For over a year and a half, the Mexican government has been collecting an unprecedented amount of biometric data from minors ages 4 to 17 as part of a youth ID card program. The Electronic Frontier Foundation reports that the data is being gathered for Personal Identity Cards for minors. This I.D. card, according to Mexican authorities, will help streamline registration in schools and health facilities and comes embedded with digital records of iris images, fingerprints, a photograph and a signature for each minor.

EFF reports:
The ID card project is part of the integration of Mexico’s National Population Register (RENAPO), which is intended to provide a unique identity system to conclusively prove identities of all Mexican citizens. Under the program, the Ministry of the Interior will issue Citizen Identity Cards and Personal Identity Cards containing biometric information, first to youth, and later extending to Mexico’s entire adult population.

Since July of 2009, when President Felipe Calderón officially announced the creation of RENAPO, numerous observers have sounded the alarm that the endeavor violates individuals’ privacy rights. Despite serious concerns raised by a governmental accountability agency and a special commission tasked with studying the program, in January of 2011 Mexico nevertheless became the first country in the world to use iris scans as a component of ID cards.”
Meanwhile, the Department of Homeland Security (DHS) has been expanding its biometrics source from fingerprint to iris and facial recognition for identity verification. In addition to collecting iris and facial images on suspected illegal immigrants or immigrants arrested at border patrol stations,the DHS is also developing a program called Future Attribute Screening Technology.  The purpose of the program is to “detect cues indicative of mal-intent” based on factors including ethnicity, gender, breathing, and heart rate.

More

Wednesday, August 29, 2012

We Don’t Need No Stinking Warrant: The Disturbing, Unchecked Rise of the Administrative Subpoena





Wired - When Golden Valley Electric Association of rural Alaska got an administrative subpoena from the Drug Enforcement Administration in December 2010 seeking electricity bill information on three customers, the company did what it usually does with subpoenas — it ignored them.

That’s the association’s customer privacy policy, because administrative subpoenas aren’t approved by a judge.

But by law, utilities must hand over customer records — which include any billing and payment information, phone numbers and power consumption data — to the DEA without court warrants if drug agents believe the data is “relevant” to an investigation. So the utility eventually complied, after losing a legal fight earlier this month.

Meet the administrative subpoena (.pdf): With a federal official’s signature, banks, hospitals, bookstores, telecommunications companies and even utilities and internet service providers — virtually all businesses — are required to hand over sensitive data on individuals or corporations, as long as a government agent declares the information is relevant to an investigation. Via a wide range of laws, Congress has authorized the government to bypass the Fourth Amendment — the constitutional guard against unreasonable searches and seizures that requires a probable-cause warrant signed by a judge.

In fact, there are roughly 335 federal statutes on the books (.pdf) passed by Congress giving dozens upon dozens of federal agencies the power of the administrative subpoena, according to interviews and government reports. (.pdf)

“I think this is out of control. What has happened is, unfortunately, these statutes have been on the books for many, many years and the courts have acquiesced,” said Joe Evans, the utility’s attorney.

Anecdotal evidence suggests that federal officials from a broad spectrum of government agencies issue them hundreds of thousands of times annually. But none of the agencies are required to disclose fully how often they utilize them — meaning there is little, if any, oversight of this tactic that’s increasingly used in the war on drugs, the war on terror and, seemingly, the war on Americans’ constitutional rights to be free from unreasonable government trespass into their lives.

That’s despite proof that FBI agents given such powers under the Patriot Act quickly began to abuse them and illegally collected Americans’ communications records, including those of reporters. Two scathing reports from the Justice Department’s Inspector General uncovered routine and pervasive illegal use of administrative subpoenas by FBI anti-terrorism agents given nearly carte blanche authority to demand records about Americans’ communications with no supervision.

When the 9th U.S. Circuit Court of Appeals, perhaps the nation’s most liberal appeals court based in San Francisco, ordered Golden Valley to fork over the data earlier this month, the court said the case was “easily” decided because the records were “relevant” to a government drug investigation.

With the data the Alaska utility handed over, the DEA may then use further administrative subpoenas to acquire the suspected indoor-dope growers’ phone records, stored e-mails, and perhaps credit-card purchasing histories — all to build a case to acquire a probable-cause warrant to physically search their homes and businesses.

But the administrative subpoena doesn’t just apply to utility records and drug cases. Congress has spread the authority across a huge swath of the U.S. government, for investigating everything from hazardous waste disposal, the environment, atomic energy, child exploitation, food stamp fraud, medical insurance fraud, terrorism, securities violations, satellites, seals, student loans, and for breaches of dozens of laws pertaining to fruits, vegetables, livestock and crops.

More

Friday, August 10, 2012

Cybersecurity: Yet Another Executive Order From Obama Looms



Candice Lanier - The President is considering executive-branch action on U.S. cybersecurity, in response to  Congress failing to pass cybersecurity legislation. “If the Congress is not going to act on something like this, then the president wants to make sure that we’re doing everything possible,” John Brennan, Obama’s counterterrorism adviser, said at a Council on Foreign Relations event.

According to Stewart Baker, a former assistant secretary for policy at the Department of Homeland Security, Obama could accomplish many objectives of the Lieberman-Collins bill with an executive order or other directive.  Matthew Eggers,senior director of national security at the Chamber of Commerce, however, disagrees and said that “an executive order would be counterproductive and would cut short the proper legislative process, which needs to continue.”

“An executive order makes clear the administration’s intent to put a mandatory program into place to regulate businesses,” Eggers added.

Additionally, Rep. Edward Markey (D-MA) has called on Obama to issue an executive order to try to protect the nation’s electrical grid from cyberattacks.  “I’m calling on President Obama to do by Executive Order what Congressional Republicans refuse to do through legislation: protect our nation from the 21st century cyber-armies preparing to wage war on our banking, health care, and defense systems by knocking out America’s electricity grid,”  Markey said.

More

Tuesday, July 10, 2012

Your Cell Phone Is Under More Surveillance Than Ever


Gizmodo - United States law enforcement agencies are requesting user information such as "text messages, caller locations and other information" at an alarming rate—at least 1.3 million requests last year alone—according to cellular carriers.

This is our new age of digital law enforcement: The cops are coming for your cell phones, and the law is too dumb to stop them.

Over the past five years, Verizon has seen the number of requests increase by 15 percent a year, coming to 260,000 in 2011. AT&T alone has seen the number of requests triple, ballooning to over 700 per day.

Under normal circumstances, a subpoena can net your basic account info like your name, address, and credit card number, which is bad enough. Beyond that, law enforcement needs a court order or a warrant to frack your texts, calls, and locations. But 230 of those 700 daily requests that AT&T is fielding are designated emergencies, which circumvent the typical court order process. Emergencies, as noted in Verizon's letter to Representative Edward J. Markey, are supposed to involve "danger of death or serious physical injury."

More


Thursday, May 3, 2012

Time to Make Warrantless Home Video Surveillance Extinct





EFF - It seems that the government's thirst for high tech surveillance can't be quenched. First, came the NSA's warrantless wiretap program. Then it was CISPA. Now, its warrantless video surveillance in the home. And just like we stood up against the NSA and CISPA, yesterday we told the Ninth Circuit Court of Appeals that invasive warrantless home video surveillance violates the Fourth Amendment.

Ricky Wahchumwah, a tribal member of the Yakima Nation, was suspected of selling bald and gold eagle feathers, as well as the feathers and pelts of other migratory birds, in violation of federal law. As part of its investigation, a undercover agent from the U.S. Fish and Wildlife Service went to Wahchumwah's house, pretending to be interested in buying feathers and pelts. Wahchumwah let him in his house, not knowing that the agent was secretly recording everything with a tiny video camera hidden in his clothes. The agent proceeded to capture two hours of video of Wachumwah's home, including interactions between Wachumwah and his partner and children, and was even left alone by Wachumwah for periods of time, who did not suspect he was being recorded.

Charged with violating the Bald and Golden Eagle Protection Act and the Lacey Act, Wahchumwah moved to suppress the video evidence as an unreasonable search under the Fourth Amendment. The trial judge denied his motion, ruling that since Wahchumwah let the agent into his house, and the agent could testify to everything he saw in the house, Wahchumwah had no expectation of privacy. Wahchumwah appealed this decision to the Ninth Circuit, and we filed an amicus brief supporting him.            More

Monday, March 26, 2012

Amid Privacy Concerns, Apple Has Started Rejecting Apps That Access UDIDs




TechCrunch - Amid extra scrutiny from Congress around privacy issues, Apple this week has started rejecting apps that access UDIDs, or identification numbers that are unique to every iPhone and iPad.

Apple had already given developers a heads-up about the change more than six months ago when it said in some iOS documentation that it was going to deprecate UDIDs. But it looks like Apple is moving ahead of schedule with pressure from lawmakers and the media. It can take more than a year to deprecate features because developers need time to adjust and change their apps. A few weeks ago, some of the bigger mobile-social developers told me that Apple had reached out and warned them to move away from UDIDs.

But this is the first time Apple has issued outright rejections for using UDIDs.

“Everyone’s scrambling to get something into place,” said Victor Rubba, chief executive of Fluik, a Canadian developer that makes games like Office Jerk and Plumber Crack. “We’re trying to be proactive and we’ve already moved to an alternative scheme.” Rubba said he isn’t sending any updates until he sees how the situation shakes out in the next few days.

For those unaware, the UDID is an alphanumeric string that is unique to each Apple device. It’s currently used by mobile ad networks, game networks, analytics providers, developers and app testing systems, like TestFlight, for example.

Playhaven, which helps developers monetize more than 1,200 games across iOS and Android, said several of its customers had been rejected in the last week. The company’s chief executive Andy Yang says that developers should try and stay as flexible as possible by supporting multiple ID systems until there’s a clear replacement.              More

Thursday, March 22, 2012

NSA Chief Denies, Denies, Denies Wired’s Domestic Spying Story





Wired - NSA chief General Keith Alexander faced tough —  and funny — questions from Congress Tuesday stemming from Wired’s story on the NSA’s capabalities and warrantless wiretapping program.

Congressman Hank Johnson, a Georgia Democrat, asked Alexander whether the NSA could, at the direction of Dick Cheney, identify people who sent e-mails making fun of his inability to hunt in order to waterboard them.

Alexander said “No,” adding that the “NSA does not have the ability to do that in the United States.” Elaborating, Alexander added: “We don’t have the technical insights in the United States. In other words, you have to have [...] some way of doing that either by going to a service provider with a warrant or you have to be collecting in that area. We’re not authorized to do that, nor do we have the equipment in the United States to collect that kind of information.”

That statement seemingly contradicts James Bamford’s story, The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say), as well as stories from The New York Times, the Los Angeles Times, USA Today and Wired, which collectively drew a picture of the NSA’s post-9/11 foray into wiretapping the nation’s telecommunication’s infrastructure to spy on Americans without getting warrants.           More

Tuesday, March 6, 2012

Senator Calls for FTC Probe Into iPhone, Android Data Privacy



PCMag.Com - Sen. Charles Schumer is once again turning the spotlight on privacy, and this time the subject is Apple and Android phones.

The senator’s office on Sunday called on the Federal Trade Commission to investigate reports that some apps on iPhones and Android handsets allow your entire photo library to be uploaded without your knowledge.

In the statement, Schumer said, “When someone takes a private photo, on a private cell phone, it should remain just that: private… Smartphone developers have an obligation to protect the private content of their users and not allow them to be veritable treasure troves of private, personal information that can then be uploaded and distributed without the consumer’s consent.”

“It is my understanding that many of these uses violate the terms of service of the Apple and Android platforms through which the apps are marketed and sold,” Schumer continued. “However, it is not clear whether or how those terms of service are being enforced and monitored… I hope you will consider launching a comprehensive investigation to explicitly determine whether copying or distributing personal information from smart phones, without a user’s consent, constitutes an unfair or deceptive trade practice.”

In recent weeks, the issue of smartphones secretly uploading your address book or photos has been a hot topic in tech circles, prompting Apple to promise a fix in an upcoming version of iOS.

“While they are telling you what movies are playing nearby they are also going through your files and using it for other purpose,” Schumer alleged. “It sends shivers up the spine to think that one’s personal photos, address books and who knows what else can be obtained and even posted online with the consumer’s consent.”              More

Friday, March 2, 2012

HTTPS and Tor: Working Together to Protect Your Privacy and Security Online – For Firefox & Chrome




EFF - This week EFF released a new version its HTTPS Everywhere extension for the Firefox browser and debuted a beta version of the extension for Chrome. EFF frequently recommends that Internet users who are concerned about protecting their anonymity and security online use HTTPS Everywhere, which encrypts your communications with many websites, in conjunction with Tor, which helps to protect your anonymity online. But the best security comes from being an informed user who understands how these tools work together to protect your privacy against potential eavesdroppers.

Whenever you read your email, or update your Facebook page, or check your bank statement, there are dozens of points at which potential adversaries can intercept your Internet traffic. By using Tor to anonymize your traffic and HTTPS to encrypt it, you gain considerable protection, most notably against eavesdroppers on your wifi network and eavesdroppers on the network between you and the site you are accessing. But these tools have important limitations: your ISP and the website you are visiting still see some identifying information about you, which could be made available to a lawyer with a subpoena or a policeman with a warrant.

Protecting your security and anonymity against real-time government wiretapping is considerably more difficult. In a country where ISPs are controlled by the government or vulnerable to government bullying, Internet users should be especially aware of what kinds of information is still visible to ISPs and may be subject to government surveillance. To a lesser degree, websites may be subject to the same kinds of government bullying and may be compelled to give up information about their customers.               More

Friday, February 17, 2012

Target’s Data Miners Know What You Did Last Summer




Forbes - Every time you go shopping, you share intimate details about your consumption patterns with retailers. And many of those retailers are studying those details to figure out what you like, what you need, and which coupons are most likely to make you happy. Target, for example, has figured out how to data-mine its way into your womb, to figure out whether you have a baby on the way long before you need to start buying diapers.

Charles Duhigg outlines in the New York Times how Target tries to hook parents-to-be at that crucial moment before they turn into rampant — and loyal — buyers of all things pastel, plastic, and miniature. He talked to Target statistician Andrew Pole — before Target freaked out and cut off all communications — about the clues to a customer’s impending bundle of joy. Target assigns every customer a Guest ID number, tied to their credit card, name, or email address that becomes a bucket that stores a history of everything they’ve bought and any demographic information Target has collected from them or bought from other sources. Using that, Pole looked at historical buying data for all the ladies who had signed up for Target baby registries in the past:
[Pole] ran test after test, analyzing the data, and before long some useful patterns emerged. Lotions, for example. Lots of people buy lotion, but one of Pole’s colleagues noticed that women on the baby registry were buying larger quantities of unscented lotion around the beginning of their second trimester. Another analyst noted that sometime in the first 20 weeks, pregnant women loaded up on supplements like calcium, magnesium and zinc. Many shoppers purchase soap and cotton balls, but when someone suddenly starts buying lots of scent-free soap and extra-big bags of cotton balls, in addition to hand sanitizers and washcloths, it signals they could be getting close to their delivery date.               More

Wednesday, February 1, 2012

New Mobile-Phone Privacy Law Proposed



Wired - Rep. Edward Markey (D-Massachusetts) unveiled draft legislation Monday requiring mobile-phone carriers to reveal if they are employing tracking software such as Carrier IQ.
“Consumers have the right to know and to say ‘no’ to the presence of software on their mobile devices that can collect and transmit their personal and sensitive information,” Markey said in The Hill.

Under the Mobile Device Privacy Act (.pdf), consumers would have to consent that data from their phones would be sent to third parties, like Carrier IQ in Mountain View, California.
Carrier IQ has said that its software was secretly installed on some 150 million phones. It conceded that it has the capacity to log web usage, and to chronicle where and when and to what numbers calls and text messages were sent and received.

Carrier IQ said that the data it vacuums to its servers from handsets is vast — as the software also monitors app deployment, battery life, phone CPU output and data and cell-site connectivity, among other things. But, Carrier IQ said, it is not logging every keystroke, as a prominent critic suggested.          More

Monday, December 26, 2011

2011 in Review: The Fight for Free Speech and Privacy on the Internet



2011 in Review: The Year Secrecy Jumped the Shark

 

As the year draws to a close, EFF is looking back at the major trends influencing digital rights in 2011 and discussing where we are in the fight for a free expression, innovation, fair use, and privacy.


The government has been using its secrecy system in absurd ways for decades, but 2011 was particularly egregious. Here are a few examples:


  • Government report concludes the government classified 77 million documents in 2010, a 40% increase on the year before. The number of people with security clearances exceeded 4.2. million, more people than the city of Los Angeles.
  • Government tells Air Force families, including their kids, it’s illegal to read WikiLeaks. The month before, the Air Force barred its service members fighting abroad from reading the New York Times—the country’s Paper of Record.
  • Lawyers for Guantanamo detainees were barred from reading the WikiLeaks Guantanamo files, despite their contents being plastered on the front page of the New York Times.
  • President Obama refuses to say the words “drone” or “C.I.A” despite the C.I.A. drone program being on the front pages of the nation’s newspapers every day.
  • CIA refuses to release even a single passage from its center studying global warming, claiming it would damage national security. As Secrecy News’ Steven Aftergood said, “That’s a familiar song, and it became tiresome long ago.”
  • The CIA demands former FBI agent Ali Soufan censor his book criticizing the CIA’s post 9/11 interrogation tactics of terrorism suspects. Much of the material, according to the New York Times, “has previously been disclosed in open Congressional hearings, the report of the national commission on 9/11 and even the 2007 memoir of George J. Tenet, the former C.I.A. director.”
  • Department of Homeland Security has become so bloated with secrecy that even the “office’s budget, including how many employees and contractors it has, is classified,” according to the Center for Investigative reporting. Yet their intelligence reports “produce almost nothing you can’t find on Google,” said a former undersecretary.
  • Headline from the Wall Street Journal in September: “Anonymous US officials push open government.”
  • NSA declassified a 200 year old report which they said demonstrated its “commitment to meeting the requirements” of President Obama’s transparency agenda. Unfortunately, the document “had not met the government’s own standards for classification in the first place,” according to J. William Leonard, former classification czar.           More

Monday, December 19, 2011

Prep for Facebook’s Timeline Layout: 6 Must-Do Privacy Tweaks




PCWorld.Com - Get ready for your Facebook past to come back with a vengeance; the social network is now rolling out its new profile layout, Timeline, to all users worldwide. Timeline is basically an online scrapbook that displays your Facebook activity in reverse chronological order going back to when you first joined the social network.

This means you and your Facebook friends will be able to peruse your social networking history with just a few clicks. Previously, there was no practical way to view your older activity on Facebook.

If Timeline’s debut has you wondering whether you can hide the embarrassing bits of your Facebook life before your new profile goes live, the good news is you can. But you’ll only have seven days to make any changes to your Timeline before it becomes your default profile.
[Related: Facebook's New Timeline Layout: A Getting Started Guide]

Get Timeline

There are three ways Timeline could arrive on your profile. You can activate it now by visiting Facebook’s Timeline page. You could also wait for Facebook to notify you that Timeline is available and then choose to activate it. Finally, for those who want to resist Timeline as long as possible, you can do nothing and Facebook will eventually move you over to the new look. In each case, you get a full seven days to edit your profile just the way you want it before it goes live. You can also choose to publish your Timeline at any time during the seven-day editing period.

I’ve been using Timeline since September and found it to be an interesting way to revisit all my past Facebook activity. Here’s a quick checklist of five things you’ll want to think about checking on your Timeline before your seven days are up.

Hide Old Posts

 



If you want to get rid of an old status update, photo, article link or like, go to the post on Timeline and hover over its top right corner. Click the pencil icon and select “Hide from Timeline.” If you’re hiding Facebook app activity, such as the Washington Post Reader app, the menu options to hide activity may be different.                             More

Friday, December 2, 2011

House Proposal Would Gut Privacy Laws, Allow Unprecedented Data-Grab by Government




House Committee Rushing to Approve Dangerous “Information Sharing” Bill

Proposal Would Gut Privacy Laws, Allow Unprecedented Data-Grab by Government


EFF - We’re for better network, computer, and device security.  Unfortunately, “cybersecurity” bills often go off track—case in point:  the “ Internet kill switch. “  The latest example comes courtesy of the leaders of the House Intelligence Committee.  Committee Chairman Mike Rogers (R-Mich.) and ranking member Dutch Ruppersberger (D-Md.) are introducing “The Cyber Intelligence Sharing and Protection Act of 2011“(PDF).

The bill would allow a broad swath of ISPs and other private entities to “use cybersecurity systems” to collect and share masses of user data with the government, other businesses, or “any other entity” so long as it’s for a vaguely-defined “cybersecurity purpose.” It would trump existing privacy statutes that strictly limit the interception and disclosure of your private communications data, as well as any other state or federal law that might get in the way.

Indeed, the language may be broad enough to bless the covert use of spyware if done in “good faith” for a “cybersecurity purpose.”

This broad data-sharing between companies wouldn’t be subject to any oversight or transparency measures (users can’t restrict companies’ sharing), while the only oversight for sharing with the federal government, ironically, would be through the Privacy and Civil Liberties Oversight Board—which hasn’t existed since January 2008.                    More

Saturday, November 26, 2011

The Facts Speak For Themselves – Big Brother is watching



The FBI's Digital Collection System connects FBI offices 
and telecom providers around the country to coordinate 
collection of phone taps for investigations of all sorts.



Wired has put together a list of reasons why U. S. citizens 
need to fight for their rights from government surveillance:

Warrantless Wiretapping

 

The government refuses to acknowledge whether the National Security Agency is secretly siphoning the nation’s electronic communications to the National Security Agency without warrants, as the Electronic Frontier Foundation alleges. The lawsuit was based on evidence provided by a former AT&T technician Mark Klein that showed that AT&T had installed a secret spying room in an internet hub in San Francisco. The spying got so bad that Attorney General Ashcroft threatened to resign over it.

When a federal judge said a lawsuit on that issue could go forward, Congress passed legislation stopping the case in its tracks. Two American lawyers for an Islamic charity did, however, prevail in their suit that they were wiretapped without warrants, but the Administration is appealing. Much of the program was legalized in 2008 by the FISA Amendments Act.
The FBI has also built a nationwide computer system called the Digital Collection System, connected by fiber optic cables, to collect and analyze wiretaps of all types, including ones used in ultra-secret terrorism investigations.

Warrantless GPS Tracking

 

The Obama administration claims Americans have no right to privacy in their public movements. The issue surfaced this month in a landmark case before the U.S. Supreme Court to determine if law enforcement agents should be required to obtain a probable-cause warrant in order to place a GPS tracking device on a citizen’s car. The government admitted to the Supreme Court that it thinks it would have the power to track the justices’ cars without a warrant.

The invasive technology allows police, the FBI, the Drug Enforcement Administration and other agencies to engage in covert round-the-clock surveillance over an extended period of time, collecting vast amounts of information about anyone who drives the vehicle that is being tracked. The Justice Department has said that law enforcement agents employ GPS as a crime-fighting tool with “great frequency,” and GPS retailers have told Wired that they’ve sold thousands of the devices to the feds.

Tracking Devices in Your Pocket

 

That mobile phone in your pocket chronicles almost everything. Once-secret software developed by a private company pretty much chronicles all you do on your smartphone and sends it to the carriers. The carriers themselves keep a wealth of information, such as text messages, call-location data, and PINs — though none of them disclose to their customers what data they store or how long they keep the data.

Law enforcement can get at much of that historical data — and often get real-time tracking information without proving probable cause to a judge.

Fake Cell Phone Towers

 

You make a call on your cellphone thinking the only thing standing between you and the recipient of your call is your carrier’s cellphone tower. In fact, that tower your phone is connecting to just might be a boobytrap set up by law enforcement to ensnare your phone signals and maybe even the content of your calls.

So-called stingrays are one of the new high-tech tools that authorities are using to track and identify you. The devices, about the size of a suitcase, spoof a legitimate cellphone tower in order to trick nearby cellphones and other wireless communication devices into connecting to the tower, as they would to a real cellphone tower.

The government maintains that the stingrays don’t violate Fourth Amendment rights, since Americans don’t have a legitimate expectation of privacy for data sent from their mobile phones and other wireless devices to a cell tower. While the technology sounds ultra-new, the feds have had this in their arsenal for at least 15 years, and used a stingray to bust the notorious hacker Kevin Mitnick in 1995.                     More

Tuesday, November 15, 2011

Internet Belatedly Notices How Much Spying Government Can Do Without a Warrant




Cato Institute - I’m seeing a lot of technology news sites reporting,  in tones of shock and horror, on a recent court ruling holding that people generally waive their Fourth Amendment “expectation of privacy” in data collected on them by Internet sites, at least when the sites give some kind of notice (however buried in legalese) that they do collect that data.  That means, in this instance, that the government can obtain detailed connection records from Twitter about users associated with Wikileaks without a full-blown Fourth Amendment warrant based on probable cause: A subpoena or a court order based on a far weaker claim of “relevance” to an investigation will suffice.

But this isn’t some shocking new precedent. It’s been the status quo since 1986, when our increasingly outdated electronic privacy laws were written, and arguably for longer than that.

There are plenty of problems with this most recent decision, to be sure. For one, as security researcher Chris Soghoian notes, the court based its opinion on the current Twitter privacy policy, even though the policy in effect at the time the targets of the investigation signed up for the site was significantly more protective. In a way, though, this seems unnecessary: Under the misguided Supreme Court decisions that established our modern “third party doctrine,” contractual promises of privacy don’t matter.

In other words, users are held to “assume the risk” that any third party might turn their information over to the government, effectively waiving their Fourth Amendment rights over that data, even if the third party explicitly promises not to do this. The one reason the privacy policy might be relevant here is that the “third party doctrine” covers information knowingly conveyed to third parties, and while it’s obvious that you “convey” a dialed phone number to the phone company when you make a call (for instance), it might not be as obvious that Web sites you visit are logging your Internet Protocol address.    More