recentpopularlog in

juliusbeezer : surveillance   149

« earlier  
Jeff Bezos Protests Invasion of His Privacy, as Amazon Builds Surveillance State
On Thursday, Bezos published emails in which the Enquirer’s parent company explicitly threatened to publish intimate photographs of Bezos and his mistress, which were apparently exchanged between the two through their iPhones, unless Bezos agreed to a series of demands involving silence about the company’s conduct.

In a perfect world, none of the sexually salacious material the Enquirer was threatening to release would be incriminating or embarrassing to Bezos: it involves consensual sex between adults...
If Bezos were the political victim of surveillance state abuses, it would be scandalous and dangerous. It would also be deeply ironic.

That’s because Amazon, the company that has made Bezos the planet’s richest human being, is a critical partner for the U.S. Government in building an ever-more invasive, militarized and sprawling surveillance state. Indeed, one of the largest components of Amazon’s business, and thus one of the most important sources of Bezos’ vast wealth and power, is working with the Pentagon and the NSA to empower the U.S. Government with more potent and more sophisticated weapons, including surveillance weapons.
privacy  surveillance  amazon  irony  politics  us 
february 2019 by juliusbeezer
A Modest Privacy Protection Proposal – Member Feature Stories – Medium
A bitcoin freak lists effective measures to defend his privacy in the contemporary era. The bill: $15k/year and mucho mucho mucho hassle.
privacy  surveillance  bitcoin 
october 2018 by juliusbeezer
Information Processing: PanOpticon in my Pocket: 0.35GB/month of surveillance, no charge!
Both Android and Chrome send data to Google even in the absence of any user interaction. Our experiments show that a dormant, stationary Android phone (with Chrome active in the background) communicated location information to Google 340 times during a 24-hour period, or at an average of 14 data communications per hour. In fact, location information constituted 35% of all the data samples sent to Google. In contrast, a similar experiment showed that on an iOS Apple device with Safari (where neither Android nor Chrome were used), Google could not collect any appreciable data (location or otherwise) in the absence of a user interaction with the device.

e. After a user starts interacting with an Android phone (e.g. moves around, visits webpages, uses apps), passive communications to Google server domains increase significantly, even in cases where the user did not use any prominent Google applications (i.e. no Google Search, no YouTube, no Gmail, and no Google Maps). This increase is driven largely by data activity from Google’s publisher and advertiser products (e.g. Google Analytics, DoubleClick, AdWords)11. Such data constituted 46% of all requests to Google servers from the Android phone. Google collected location at a 1.4x higher rate compared to the stationary phone experiment with no user interaction. Magnitude wise, Google’s servers communicated 11.6 MB of data per day (or 0.35 GB/month) with the Android device. This experiment suggests that even if a user does not interact with any key Google applications, Google is still able to collect considerable information through its advertiser and publisher products.
google  android  surveillance  telephony 
september 2018 by juliusbeezer
Facebook patents system that can use your phone's mic to monitor TV habits | Technology | The Guardian
Facebook has patented a system that can remotely activate the microphone on someone’s phone using inaudible signals broadcast via a television.

The patent application describes a system where an audio fingerprint embedded in TV shows or ads, inaudible to human ears, would trigger the phone, tablet or long-rumoured smart speaker to turn on the microphone and start recording “ambient audio of the content item”. The recording could then be matched to a database of content to allow Facebook to identify what the individual was watching – like Shazam for TV, but without the individual choosing to activate the system.
facebook  surveillance  privacy 
june 2018 by juliusbeezer
Social Media Needs A Travel Mode (Idle Words)
Both Facebook and Google make lofty claims about user safety, but they’ve done little to show they take the darkening political climate around the world seriously. A ‘trip mode’ would be a chance for them to demonstrate their commitment to user safety beyond press releases and anodyne letters of support.

What’s required is a small amount of engineering, a good marketing effort, and the conviction that any company that makes its fortune hoarding user data has a moral responsibility to protect its users.
facebook  google  privacy  politics  us  surveillance 
may 2017 by juliusbeezer
Italy Proposes Astonishingly Sensible Rules To Regulate Government Hacking Using Trojans | Techdirt
A Telephone Wiretapping Warrant is required to listen a Whatsapp call.

A Remote Search and Seizure Warrant is required to acquire files on remote devices.

An Internet Wiretapping Warrant is required to record web browsing sessions.

The same kind of warrant that would be required for planting a physical audio surveillance bug is required to listen to the surrounding environment with the device’s microphone.

Those kinds of legal safeguards are welcome,
security  surveillance  law  italy 
april 2017 by juliusbeezer
In Response to Guardian’s Irresponsible Reporting on WhatsApp: A Plea for Responsible and Contextualized Reporting on User Security | technosociology
Activists and journalists communicate a lot with ordinary people, and need to be certain that their messages are communicated as reliably as possible, using the same system as their recipient will use–hence the advantage of WhatsApp with its huge user base.

WhatsApp’s behavior around key exchange when phone or SIM cards are changed is an acceptable trade-off if the priority is message reliability. People do not have a free choice in what apps to use; they gravitate towards ones with the largest user base (the ones the people they want to connect to are using) and to ones that are seamless to use. Causing unnecessary and unwarranted concern about WhatsApp is likely to make many users give up on the idea of using secure apps altogether. Again, think of causing alarmist doubts over vaccines in general because of a very rare threat of side effects to a few
security  guardian  journalism  informationmastery  surveillance 
january 2017 by juliusbeezer
PRESS RELEASE: Landmark ruling by European Court could render the UK Government’s new ‘Snoopers… – Medium
The Court of Justice of the European Union (“CJEU”) has today delivered a landmark judgment that will have major significance for the UK Government’s new ‘Snoopers’ Charter’. Just weeks after the Investigatory Powers Act became law, ministers might be forced to rewrite large parts of it.

The CJEU has today ruled that “general and indiscriminate retention” of data is prohibited.

Instead, if a nation like the UK wishes to ask service providers to retain data, it can only do so if that retention and any access to the data is strictly necessary for the purpose of fighting serious crime.
surveillance  uk  politics 
december 2016 by juliusbeezer
NSA Watchdog Removed for Whistleblower Retaliation
given the official finding that Ellard retaliated against an NSA whistleblower, the credibility of Ellard’s argument that Snowden could have come to him is gravely undermined. More generally, there are few if any incentives for intelligence whistleblowers to report problems through designated authorities when the IG of NSA is found to have retaliated against such an individual.
surveillance  privacy  politics  us 
december 2016 by juliusbeezer
UK's new Snoopers' Charter just passed an encryption backdoor law by the backdoor • The Register
In short, what the law's passage through Parliament has done to the UK government's ability to force tech companies and telcos to introduce backdoors into their technologies is make it slower and a little tougher.

Does it prevent the UK government from breaking encryption? It absolutely does not. In fact, it foresees it.

Does it mean that customers will be made aware that their communications and traffic are compromised by a backdoor? No, it does not. All of the checks and balances are safely contained within the upper levels of government and the judiciary.
uk  politics  law  surveillance  security 
december 2016 by juliusbeezer
The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant | Motherboard
However, even though they had administrative control of the site, investigators were unable to see the real IP address of Playpen's visitors, because users typically connected to it through the Tor network.

In order to circumvent that anonymity, the FBI deployed what it calls a network investigative technique (NIT), or a piece of malware. That malware, which included a Tor Browser exploit, broke into the computer of anyone who visited certain child pornography threads on Playpen. It then sent the suspect's real IP address back to the FBI.
security  surveillance  law  tor 
november 2016 by juliusbeezer
How Much Surveillance Can Democracy Withstand? - GNU Project - Free Software Foundation
For the state to find criminals, it needs to be able to investigate specific crimes, or specific suspected planned crimes, under a court order. With the Internet, the power to tap phone conversations would naturally extend to the power to tap Internet connections. This power is easy to abuse for political reasons, but it is also necessary. Fortunately, this won't make it possible to find whistleblowers after the fact, if (as I recommend) we prevent digital systems from accumulating massive dossiers before the fact.

Individuals with special state-granted power, such as police, forfeit their right to privacy and must be monitored. (In fact, police have their own jargon term for perjury, “testilying,” since they do it so frequently, particularly about protesters and photographers.) One city in California that required police to wear video cameras all the time found their use of force fell by 60%. The ACLU is in favor of this.

Corporations are not people, and not entitled to human rights. It is legitimate to require businesses to publish the details of processes that might cause chemical, biological, nuclear, fiscal, computational (e.g., DRM) or political (e.g., lobbying) hazards to society, to whatever level is needed for public well-being. The danger of these operations (consider the BP oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism.

However, journalism must be protected from surveillance even when it is carried out as part of a business.
privacy  police  surveillance  humanrights  law 
november 2016 by juliusbeezer
Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking - ProPublica
for nearly a decade, Google did in fact keep DoubleClick’s massive database of web-browsing records separate by default from the names and other personally identifiable information Google has collected from Gmail and its other login accounts.

But this summer, Google quietly erased that last privacy line in the sand – literally crossing out the lines in its privacy policy that promised to keep the two pots of data separate by default. In its place, Google substituted new language that says browsing habits “may be” combined with what the company learns from the use Gmail and other tools.
google  privacy  surveillance  advertising 
october 2016 by juliusbeezer
Traffic to Wikipedia terrorism entries plunged after Snowden revelations, study finds | Reuters
Internet traffic to Wikipedia pages summarizing knowledge about terror groups and their tools plunged nearly 30 percent after revelations of widespread Web monitoring by the U.S. National Security Agency, suggesting that concerns about government snooping are hurting the ordinary pursuit of information.

A forthcoming paper in the Berkeley Technology Law Journal analyzes the fall in traffic, arguing that it provides the most direct evidence to date of a so-called “chilling effect,” or negative impact on legal conduct, from the intelligence practices disclosed by fugitive former NSA contractor Edward Snowden.

Author Jonathon Penney, a fellow at the University of Toronto’s interdisciplinary Citizen Lab, examined monthly views of Wikipedia articles on 48 topics identified by the U.S. Department of Homeland Security as subjects that they track on social media, including Al Qaeda, dirty bombs and jihad.
surveillance  politics  wikipedia 
april 2016 by juliusbeezer
(1) Les écoutes coûtent cher, très cher : démonstration en quatre chiffres - Libération
Près d’un milliard d’euros a été dépensé pour les écoutes judiciaires ces dix dernières années. Le chiffre, astronomique, figure dans un rapport publié ce lundi par la Cour des comptes, au terme d’un contrôle approfondi de plusieurs mois. La Cour a adressé à Matignon un référé se concluant par sept recommandations, auxquelles le Premier ministre a répondu.
surveillance  france  economics 
april 2016 by juliusbeezer
How Clinton’s email scandal took root - The Washington Post
But Clinton kept using her private BlackBerry — and the basement server.

The server was nothing remarkable, the kind of system often used by small businesses, according to people familiar with its configuration at the end of her tenure. It consisted of two off-the-shelf server computers. Both were equipped with antivirus software. They were linked by cable to a local Internet service provider. A firewall was used as protection against hackers.
Four computer-security specialists interviewed by The Post said that such a system could be made reasonably secure but that it would need constant monitoring by people trained to look for irregularities in the server’s logs.

“For data of this sensitivity . . . we would need at a minimum a small team to do monitoring and hardening,” said Jason Fossen, a computer-security specialist at the SANS Institute, which provides cybersecurity training around the world.
email  security  surveillance  tools 
march 2016 by juliusbeezer
‘Chilling Effect’ of Mass Surveillance Is Silencing Dissent Online, Study Says | Motherboard
Participants were asked to answer questions relating to media use, political attitudes, and personality traits. Different subsets of the sample were exposed to different messaging on US government surveillance to test their responses to the same fictional Facebook post about the US decision to continue airstrikes against the Islamic State of Iraq and Syria (ISIS).

They were then asked about their willingness to express their opinions about this publicly—including how they would respond on Facebook to the post; how strongly they personally supported or opposed continued airstrikes; their perceptions of the views of other Americans; and whether they supported or opposed online surveillance.

The study used a regression model—a statistical method to estimate the relationships between different variables—to test how well a person’s decisions to express their opinion could be predicted based on the nature of their opinion, their perceptions of prevailing viewpoints, and their attitude to surveillance.

This sort of model doesn’t produce simple percentages, but provides a statistical basis to explain variances in the factors being tested. In this case, the study found that “35% of the variance in an individuals’ willingness to self-censor” could be explained by their perceptions of whether surveillance is justified.

For the majority of respondents, the study concluded, being aware of government surveillance “significantly reduced the likelihood of speaking out in hostile opinion climates.”
surveillance  privacy  freedom  humanrights  politics  us 
march 2016 by juliusbeezer
Orbot: Proxy with Tor – Android Apps on Google Play
Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.
surveillance  security  tor  android 
march 2016 by juliusbeezer
How Tim Cook Became a Bulwark for Digital Privacy - The New York Times
Mr. Cook’s ideas about civic duty were partly formed during his childhood in rural Alabama. In a speech at the United Nations in 2013, he recounted how Ku Klux Klansmen had once burned a cross on the lawn of a black family’s home and how he yelled for them to stop. “This image was permanently imprinted in my brain, and it would change my life forever,” he said.

At Apple, which he joined as a senior executive in 1998, Mr. Cook was a quiet figure for much of the period when he worked for Mr. Jobs, a showman who prized secrecy at the company. After Mr. Jobs stepped down because of ailing health, Mr. Cook began making Apple more open, publishing an annual report on suppliers and working conditions for more than a million factory workers.
apple  business  openness  security  surveillance 
february 2016 by juliusbeezer
Why Mass Surveillance Can't, Won't, And Never Has Stopped A Terrorist - Digg
even highly accurate terrorism prediction systems will be so flooded with false alarms that they will be useless.

The reason lies in the mathematics of detection. All detection systems have errors, and system designers can tune them to minimize either false positives or false negatives. In a terrorist-detection system, a false positive occurs when the system mistakenly identifies something harmless as a threat. A false negative occurs when the system misses an actual attack. Depending on how you “tune” your detection system, you can increase the number of false positives to assure you are less likely to miss an attack, or you can reduce the number of false positives at the expense of missing attacks.

Because terrorist attacks are so rare, false positives completely overwhelm the system, no matter how well you tune. And I mean completely: millions of people will be falsely accused for every real terrorist plot the system finds, if it ever finds any.
privacy  surveillance  politics  statistics 
november 2015 by juliusbeezer
How Debian Is Trying to Shut Down the CIA and Make Software Trustworthy Again | Motherboard
Reproducible builds rely in part on David A. Wheeler's solution to this problem, Diverse Double-Compiling.

"You need two compilers," Lunar explained, "with one that you somehow trust. Then you build the compiler under test twice, once with each compiler, and then you use the compilers that you just built to build the compiler under test again.

"If the output is the same, then no backdoors," he added. "But for this scheme to work, you need to be able to compare that both build outputs are the same. And that’s exactly what we are enabling when having reproducible builds."

According to Lunar, 83 percent of Debian packages are now built reproducibly, and more join the party every day.
linux  security  software  surveillance 
november 2015 by juliusbeezer
The Snooper’s Charter would devastate computer security research in the UK | Ars Technica UK
What would I do if I found that backdoor today? The ethical thing is to check my results with trusted colleagues, tell my client, determine what the best remedial action is, tell whoever is in charge of that aspect of the router software, allow time for a patch to propagate out, then tell the world what happened. It’s interesting, but not immediately important, to work out who did the attack. Fix first, ask questions later.

Let’s look at that in a world where the Snooper's Charter has become law. I find the backdoor and tell a colleague. She doesn’t answer my e-mail, but I get a knock at the door—turns out that GCHQ was behind the attack. I am now banned forever from mentioning to anyone what I found—or that I found anything. The backdoor is later exploited by the bad guys and my client is hit. Why didn’t you find it, they ask? I can only shrug. Soon, my consultancy is in disarray. If I’m sued for incompetence, I cannot defend myself. I can write no papers, warn no people.
surveillance  privacy  security  uk  politics 
november 2015 by juliusbeezer
China's Troubling New Social Credit System—And Ours | The New Republic
Companies have already begun introducing incentives for consumers to publicly share how they rate. (A government website allows people to look up the scores of others.) High scorers can get better rental cars or book hotel reservations without leaving a deposit. Sesame Credit, a scoring program run by Alibaba, the e-commerce giant, has integrated its scores into Baihe, a major dating site. Baihe users can choose to display their scores in return for more prominent placement in search results. Speaking to the BBC, a Baihe executive justified the move by explaining that a person should have a sense of the financial status of a potential partner. Of course, the score itself—which ranges from 350 to 950—is the product of an opaque system whose details are only known to Sesame Credit and its government overseers.

While it drapes itself in economic language, the Chinese scoring system is less about market relations than about control and risk mitigation. A Sesame executive has already said that certain behaviors, like playing video games all day, will bring penalties. Political and criminal activity (in China they can be one and the same) will also be folded into the SCS, “painting a complete picture of its citizens in data,” according to New Scientist. This nationwide system could then be used to steer citizens toward desired behaviors and to ensure, in the parlance of the communist party leadership, a more “harmonious society.” That this “mega-system” ensures the financialization of everyday life, tying every choice and behavior to one's economic and social standing, is just another irony of China's brand of state-led corporatism.
china  finance  economics  politics  surveillance 
november 2015 by juliusbeezer
How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations
far beyond hacktivists, these surveillance agencies have vested themselves with the power to deliberately ruin people’s reputations and disrupt their online political activity even though they’ve been charged with no crimes, and even though their actions have no conceivable connection to terrorism or even national security threats.
surveillance  politics  internet  socialmedia 
october 2015 by juliusbeezer
Digital surveillance 'worse than Orwell', says new UN privacy chief | Technology | The Guardian
Joseph Cannataci singled out British surveillance oversight as being “a joke”, and said the situation is worse than anything George Orwell could have foreseen.

He added that he doesn’t use Facebook or Twitter, and said it was regrettable that vast numbers of people sign away their digital rights without thinking about it.

“Some people were complaining because they couldn’t find me on Facebook. They couldn’t find me on Twitter. But since I believe in privacy, I’ve never felt the need for it,” Cannataci, a professor of law at the University of Malta, said.
privacy  surveillance  law  google  twitter  facebook 
august 2015 by juliusbeezer
Pressé par les Etats, Twitter fait la police - Libération
Les requêtes des autorités transmises à Twitter sont de plus en plus nombreuses. C'est ce que montre le dernier rapport de transparence publié aujourd’hui par le réseau social. Les demandes d’informations concernant des comptes ainsi que les demandes de suppression sont en augmentation par rapport aux périodes précédentes.

Les demandes de suppression de contenus sont en hausse : 1003 au premier semestre 2015, contre 796 entre juillet et décembre 2014.
twitter  france  humanrights  privacy  surveillance 
august 2015 by juliusbeezer
My Life Unmasking British Eavesdroppers
In my 40 years of reporting on mass surveillance, I have been raided three times; jailed once; had television programs I made or assisted making banned from airing under government pressure five times; seen tapes seized; faced being shoved out of a helicopter; had my phone tapped for at least a decade; and — with this arrest — been lined up to face up to 30 years imprisonment for alleged violations of secrecy laws. And why do I keep going? Because from the beginning, my investigations revealed a once-unimaginable scope of governmental surveillance, collusion, and concealment by the British and U.S. governments — practices that were always as much about domestic spying during times of peace as they were about keeping citizens safe from supposed foreign enemies, thus giving the British government the potential power to become, as our source that night had put it, a virtual “police state.”...
At the last minute, government attorneys rushed to obtain court orders. The afternoon before publication, they suddenly arrived at our magazine offices, armed with an order to gag me. They were shown to the elevator while I raced down the stairs, jumped on my bicycle and disappeared. The magazine’s production manager left for a secret location, carrying emergency funds to pay new printers in case our normal printers were blocked.

The next morning, as the New Statesman hit newsstands, I went early to Parliament to meet a friend and supporter, an MP named Robin Cook. He led me to a sanctuary in Parliament, where I could stay long enough to avoid being served by the authorities and get our story out safely.
police  uk  politics  surveillance  journalism 
august 2015 by juliusbeezer
The NSA and American Spies Targeted SPIEGEL - SPIEGEL ONLINE
Germany's highest court ruled in 2007 that press freedom is a "constituent part of a free and democratic order." The court held that reporting can no longer be considered free if it entails a risk that journalists will be spied on during their reporting and that the federal government will be informed of the people they speak to.

"Freedom of the press also offers protection from the intrusion of the state in the confidentiality of the editorial process as well as the relationship of confidentiality between the media and its informants," the court wrote in its ruling. Freedom of the press also provides special protection to the "the secrecy of sources of information and the relationship of confidentiality between the press, including broadcasters, and the source."
journalism  freedom  surveillance  privacy  assange  wikileaks  us  germany 
july 2015 by juliusbeezer
IPT Flip-Flops on Unlawful GCHQ Surveillance of Amnesty International
The revelation that the UK government has been spying on Amnesty International highlights the gross inadequacies in the UK’s surveillance legislation,” Salil Shetty, Amnesty’s secretary general, said in a statement. “If they hadn’t stored our communications for longer than they were allowed to by internal guidelines, we would never even have known. What’s worse, this would have been considered perfectly lawful.”
surveillance  torture  dccomment  politics 
july 2015 by juliusbeezer
British spies betrayed to Russians and Chinese -
A senior Downing Street source said: “It is the case that Russians and Chinese have information. It has meant agents have had to be moved and that knowledge of how we operate has stopped us getting vital information. There is no evidence of anyone being harmed.”
surveillance  privacy  journalism  archiving 
june 2015 by juliusbeezer
Courts docs show how Google slices users into “millions of buckets” — Medium
This wild west of unrestrained online profiling can’t go on indefinitely. It is particularly ironic that the National Security Agency — despite all the recent controversy — is subject to far tighter legal oversight than online advertisers like Google or Facebook.
google  facebook  privacy  surveillance  irony 
may 2015 by juliusbeezer
Britt McHenry and the Upsides of a Surveillance Society — Atlantic Mobile
The McHenry video, though, is a reminder of the more atomized aspects of the surveillance state: the surveillance society. It is a reminder of what happens when surveillance is distributed and small-sized and iterative. It is a logical extension of the hot-mic moment, of the caught-on-tape trope, of the blooper reel—and also, in its way, of the role cameras have recently played in exposing crime and police brutality.

It is, overall, a reminder that technology is making it harder to differentiate between the people we perform and the people we are.

Yes, there are panoptical elements to all that. Yes, we should seriously consider—and debate, and perhaps even fear—what those elements will do to us, as a messy human collective. But one of the positive aspects of the presence of all those cameras—all these devices, there to capture not just our beautiful children and our sumptuous meals, but also our worst and pettiest and most immoral moments—is a basic one: Terrible behavior, whether cruel or violent or something in between, has a greater possibility than it ever has before of being exposed.
surveillance  internet  culture 
april 2015 by juliusbeezer
Questions over Labour peer's letters to care home boy | Politics | The Guardian
The Observer has also learned that information held by Conservative whips – including details of any sexual misdemeanours – has been shredded since 1996, meaning the Butler-Sloss inquiry is highly unlikely to be able to access much of the secret information logged about the private lives of Tory MPs.
agnotology  censorship  privacy  surveillance 
april 2015 by juliusbeezer
Un groupement d'hébergeurs français demande l'abandon du projet "boîtes noires" au Premier ministre, Manuel Valls.
De plus, les hébergeurs français n’hébergent pas que des clients français : ils accueillent des clients étrangers qui viennent se faire héberger en France : l'Allemagne, la Grande-Bretagne, l’Espagne, la Pologne, les États-Unis, le Brésil, etc. En tout 30 à 40 % du chiffre d’affaire de nos hébergeurs est réalisé par ce biais. Ces clients viennent parce qu’il n’y a pas de Patriot Act en France, que la protection des données des entreprises et des personnes est considérée comme importante. Si cela n’est plus le cas demain en raison de ces fameuses « boîtes noires », il leur faudra entre 10 minutes et quelques jours pour quitter leur hébergeur français. Pour nous le résultat est sans appel : nous devrons déménager nos infrastructures, nos investissements et nos salariés là où nos clients voudront travailler avec nous.

Reims, Rennes, Roubaix, Paris, Brest, Toulouse, Rodez, Figeac, Grenoble, Montceau les Mines, Strasbourg et Gravelines sont autant de villes où nous supprimerons des emplois au lieu d’en créer des centaines dans les années qui viennent. Ce sont des milliers d’emplois induits par le Cloud Computing, le Big Data, les objets connectés ou la ville intelligente que les startups et les grandes entreprises iront aussi créer ailleurs.
security  surveillance  france 
april 2015 by juliusbeezer
Les hébergeurs français : « On sort un bazooka pour tuer une mouche » - Rue89 - L'Obs
Les principaux hébergeurs français (OVH, Gandi, etc.) ont publié une lettre ouverte assassine, dans laquelle, tout en jurant ne pas être contre la loi, ils s’inquiètent des conséquences des fameuses « boîtes noires » sur leurs activités.
internet  france  security  surveillance 
april 2015 by juliusbeezer
Porte ouverte à la surveillance et à la suspicion généralisées - Pénal | Dalloz Actualité
Derrière ces belles formules, se cache un argument plus précis qui est développé face aux critiques du projet : le projet ne ferait que légaliser des pratiques déjà existantes en installant un meilleur contrôle sur celles-ci. Or cet argument est à la fois faux et pernicieux. Faux, parce que, nous le verrons, le projet ouvre la porte à des pratiques nouvelles et immensément dangereuses. Pernicieux, parce que, s’il est parfois nécessaire de légaliser des pratiques qui, autrefois, étaient punies de sanctions (que l’on pense à la contraception, l’homosexualité ou l’avortement) quand cela permet l’exercice de nouvelles libertés ou remédie aux graves conséquences de leur interdiction, cela ne saurait en aucun cas servir à installer des atteintes illégitimes aux droits fondamentaux.
surveillance  français  france  law 
march 2015 by juliusbeezer
Edward Snowden tells you what encrypted messaging apps you should use
As for Android options, Snowden suggested two programs, Redphone and TextSecure. Both are designed by Open Whisper Systems and both allow users to make encrypted phone calls and send secure text messages. The NSA, Der Spiegel revealed in December, classifies services like Redphone as a “threat” to surveillance.
security  surveillance 
march 2015 by juliusbeezer
Dear NSA, I Don't Think You Meant Yottabytes
Several media reports claim that the NSA’s Utah data center may ultimately be able to store data on the scale of yottabytes because, you know, they think they’re totally going to need yottabytes. To put this into perspective, a yottabyte would require about a trillion 1tb hard drives and data centers the size of both Rhode Island and Delaware combined. Plus, a trillion hard drives is more than a thousand times the number of hard drives produced each year. In other words, at current manufacturing rates it would take more than a thousand years to produce that many drives.
security  surveillance  hardware  energy  funny 
february 2015 by juliusbeezer
L’inaudible lutte contre les abus policiers - Libération
Ce jeudi matin, un peu plus d’un mois après les attentats, «Urgence notre police assassine» était aux côtés du collectif Stop le contrôle au faciès, La voix des Roms, La quadrature du net et le Collectif contre l’islamophobie en France (CCIF) pour parler de cet «après» compliqué pour ceux qu’ils nomment les «victimes collatérales» des attentats. Pêle-mêle : les victimes d’abus de violences policières, les musulmans, les défenseurs de la liberté sur Internet
humanrights  surveillance  police  france 
february 2015 by juliusbeezer
UK-US surveillance regime was unlawful ‘for seven years’ | UK news | The Guardian
An “order” posted on the IPT’s website early on Friday declared: “The regime governing the soliciting, receiving, storing and transmitting by UK authorities of private communications of individuals located in the UK, which have been obtained by US authorities … contravened Articles 8 or 10” of the European convention on human rights.

Article 8 relates to the right to private and family life; article 10 refers to freedom of expression.

The decision, in effect, refines an earlier judgment issued by the tribunal in December, when it ruled that Britain’s current legal regime governing data collection through the internet by intelligence agencies – which has been recently updated to ensure compliance – did not violate the human rights of people in the UK.
security  surveillance 
february 2015 by juliusbeezer
How to Leak to The Intercept - The Intercept
ever since The Intercept launched, our staff has tried to put the best technology in place to protect our sources. Our website has been protected with HTTPS encryption from the beginning. All of our journalists publish their PGP keys on their staff profiles so that readers can send them encrypted email. And we’ve been running a SecureDrop server, an open source whistleblower submission system, to make it simpler and more secure for anonymous sources to get in touch with us.
surveillance  privacy  journalism 
january 2015 by juliusbeezer
Sécurité, politique, islam : comment réagissent les Français après les attentats ?
A la suite des attentats, une écrasante majorité des Français est favorable à la mise en œuvre de différentes mesures qui leur sont suggérées « pour lutter contre l’extrémisme religieux ». Y compris celles qui empiéteraient nettement sur les libertés individuelles. « Généraliser les écoutes téléphoniques sans accord préalable d’un magistrat » ? 71 % des personnes interrogées y sont favorables. « Pouvoir perquisitionner des domiciles sans accord préalable d’un magistrat » ? 67 % approuvent. « Pouvoir mener des interrogatoires de suspects sans l’assistance d’un avocat » ? D’accord à 61 %. Sur ces trois mesures, les sympathisants de gauche sont respectivement 60 %, 58 % et 46 % à se dire favorables à leur mise en œuvre.
surveillance  police  france  CharlieHebdo 
january 2015 by juliusbeezer
Why Google made the NSA — Medium
We knew this already didn't we?
("In-Q-Tel" "the highlands forum" "the core" "the gap" "the men who stared at goats" "general idiots" "perverters of social science" and other sadly misguided individuals and initiatives)

"The latest mad-cap Pentagon initiative to dominate the world through control of information and information technologies, is not a sign of the all-powerful nature of the shadow network, but rather a symptom of its deluded desperation as it attempts to ward off the acceleration of its hegemonic decline.

But the decline is well on its way. And this story, like so many before it, is one small sign that the opportunities to mobilize the information revolution for the benefit of all, despite the efforts of power to hide in the shadows, are stronger than ever."
google  surveillance  war  us  facebook  anthropology  sociology  psychology 
january 2015 by juliusbeezer
Government Set Up A Fake Facebook Page In This Woman’s Name - BuzzFeed News
The account was actually set up by U.S. Drug Enforcement Administration Special Agent Timothy Sinnigen.

Not long before, law enforcement officers had arrested Arquiett, alleging she was part of a drug ring. A judge, weighing evidence that the single mom was a bit player who accepted responsibility, ultimately sentenced Arquiett to probation. But while she was awaiting trial, Sinnigen created the fake Facebook page using Arquiett’s real name, posted photos from her seized cell phone, and communicated with at least one wanted fugitive — all without her knowledge.
police  us  surveillance  security  facebook 
january 2015 by juliusbeezer
Why Does the NSA Engage in Mass Surveillance of Americans When It’s Statistically Impossible for Such Spying to Detect Terrorists? » CounterPunch: Tells the Facts, Names the Names
To know if mass surveillance will work, Bayes’ theorem requires three estimations:

1) The base-rate for terrorists, i.e. what proportion of the population are terrorists.

2) The accuracy rate, i.e., the probability that real terrorists will be identified by NSA;

3) The misidentification rate, i.e., the probability that innocent citizens will be misidentified by NSA as terrorists.

No matter how sophisticated and super-duper are NSA’s methods for identifying terrorists, no matter how big and fast are NSA’s computers, NSA’s accuracy rate will never be 100% and their misidentification rate will never be 0%. That fact, plus the extremely low base-rate for terrorists, means it is logically impossible for mass surveillance to be an effective way to find terrorists.
security  surveillance  statistics  politics 
january 2015 by juliusbeezer
Has David Cameron really gone to war on encryption?: | News | TechRadar
Unlike Cameron, GCHQ and the police do understand the technology – but they also, almost certainly, understand the ineffectiveness of this kind of thing in terms of catching the real terrorists, something known by experts for a long time, as this piece from 2006 makes clear. It is also almost certain that they know – as, in this case, does Cameron – that mass surveillance and a restriction on encryption would be effective in monitoring "ordinary" people. It would work against protestors and dissenters – and they've shown a desire to do this in the past from wanting to shut down Twitter at times of unrest to monitoring social networks in order to "head off" badger cull protests. Getting backdoors to encryption would aid in this kind of thing – it is a key tool for an authoritarian.
security  surveillance  CharlieHebdo 
january 2015 by juliusbeezer
About freenode: IRC Servers
Tor users represent much less than 1% of our total userbase. We appreciate your accessing freenode via the Tor hidden service; however, we have a limited amount of staffer time to troubleshoot and resolve issues. If we have to restart the hidden service, that means disconnecting all the currently-connected Tor users, so we prefer to avoid that if possible.
tor  internet  tools  security  surveillance 
january 2015 by juliusbeezer
Secure Messaging Scorecard | Electronic Frontier Foundation
5. Is the code open to independent review?

This criterion requires that sufficient source-code has been published that a compatible implementation can be independently compiled. Although it is preferable, we do not require the code to be released under any specific free/open source license. We only require that all code which could affect the communication and encryption performed by the client is available for review in order to detect bugs, back doors, and structural problems.

Note: when tools are provided by an operating system vendor, we only require code for the tool and not the entire OS. This is a compromise, but the task of securing OSes and updates to OSes is beyond the scope of this project.
security  surveillance  tools  internet 
january 2015 by juliusbeezer
Manuel Valls et la réforme sécuritaire qui s'esquisse - Libération
Manuel Valls a annoncé avoir chargé le ministre de l’Intérieur de lui remettre «dans les huit jours des propositions de renforcement» qui «devront concerner notamment Internet et les réseaux sociaux, plus que jamais utilisés pour l’embrigadement, la mise en contact et l’acquisition de techniques permettant de passer à l’acte ». Annonce applaudie d’un bout à l’autre de l’hémicycle, alors même que les auteurs de l’attentat contre Charlie Hebdo présentent le profil de jeunes radicalisés non en ligne, mais au contact «IRL» de mentors salafistes.

Dès le lendemain de l’attentat, la sortie accélérée d’un des décrets d’application de la loi contre le terrorisme adoptée en octobre dernier était pourtant déjà dans les tuyaux. Il permet le blocage administratif des sites «provoquant à des actes de terrorisme ou en faisant l’apologie», ainsi que des sites pédopornographiques, par l’intermédiaire de l’Office central de lutte contre la criminalité liée aux technologies de l’information et de la communication (OCLCTIC), et devrait être publié sous dix jours. La loi prévoit également de renforcer la responsabilité des éditeurs et des hébergeurs, qui seront tenus de mettre à disposition des internautes un dispositif de signalement des contenus faisant l'apologie du terrorisme, et de signaler les dénonciations justifiées à l'OCLCTIC.
internet  france  security  surveillance  police 
january 2015 by juliusbeezer
Six condamnations à de la prison ferme pour apologie du terrorisme - Libération
Pharos, la Plateforme d’harmonisation, d’analyse, de recoupement et d’orientation des signalements, un site Internet géré par le ministère de l’Intérieur et destiné à recevoir les signalements de quiconque souhaiterait alerter les autorités d’un contenu ou d’un comportement illicite sur Internet. D’après Le Monde, Bernard Cazeneuve, ministre de l’Intérieur, a indiqué aux préfets que 12 600 messages faisant l’apologie des attentats ont été recensés sur les réseaux sociaux depuis l’attaque.
security  surveillance  france  politics  law 
january 2015 by juliusbeezer
TwitLonger — When you talk too much for Twitter
The tragedy in Paris is another example of where competent targeted surveillance, not mass surveillance, was needed.

The attackers were well known jihadis. This is not a case of needing to collect a global interception haystack in order to find a needle. The alleged needle in question, Cherif Kouachi, had already been convicted of terrorism offences and served 18 months in prison for it. Both brothers were already on terrorism lists. Far from hiding messages under rocks or using encryption, the alleged conspirators communicated hundreds of times before and during the attacks — on regular phones. The offices of Charlie Hebdo had received many death threats and had been firebombed in 2011 a week after publishing cartoons of the prophet Muhammad. The French mass surveillance system is already one of the most pervasive; its primary purpose, like all such systems, is geopolitics.

Mass surveillance addiction doesn’t come for free. In France it thieved skilled human and financial resources from targeted monitoring of obvious—the front of the Charlie Hebdo building and people walking out of prison with a terrorism conviction in one hand and numerous jihadi contacts in the other.
security  surveillance  france  wikileaks  CharlieHebdo 
january 2015 by juliusbeezer
Hackers can’t solve Surveillance |
The visions of a free, uncensorable cyberspace envisioned by Barlow, Gilmore and others was incompatible with the needs of Capital, and as thus the libertarian impulses that drives Silicon valley caused a change in tune. Cyberspace was no longer a new world, declared independent with its own unalienable rights, it was now an untamed frontier, a wild-west where spooks and cypherpunks do battle and your worth is measured by your crypto slinging skills and operational security. Rather than united denizens of a new terrain, we are now crypto individualists homesteading in hostile territory...
Users themselves are responsible for their privacy and safety online. No more unalienable rights, not more censorship resistant mass networks, no more expressing beliefs without fear of being silenced. Hack or be hacked.

Since libertarian ideology is often at odds with social solutions, holding private enterprise as an ideal and viewing private provisioning as best, the solutions presented are often pushing more entrepreneurship and voluntarism and ever more responsibilization. We just need a new start-up, or some new code, or some magical new business model! This is what Evgeny Morozov calls Solutionism,
internet  privacy  surveillance  politics  community 
january 2015 by juliusbeezer
on url shorteners -- joshua schachter's blog
But the biggest burden falls on the clicker, the person who follows the links. The extra layer of indirection slows down browsing with additional DNS lookups and server hits. A new and potentially unreliable middleman now sits between the link and its destination. And the long-term archivability of the hyperlink now depends on the health of a third party. The shortener may decide a link is a Terms Of Service violation and delete it. If the shortener accidentally erases a database, forgets to renew its domain, or just disappears, the link will break. If a top-level domain changes its policy on commercial use, the link will break. If the shortener gets hacked, every link becomes a potential phishing attack...
The most likely, of course, is that we don't do anything and that the great linkrot apocalypse causes all of modern culture to dissapear in a puff of smoke. Hopefully.
security  surveillance  linkrot 
december 2014 by juliusbeezer
Inside the NSA's War on Internet Security - SPIEGEL ONLINE
The fact that large amounts of the cryptographic systems that underpin the entire Internet have been intentionally weakened or broken by the NSA and its allies poses a grave threat to the security of everyone who relies on the Internet -- from individuals looking for privacy to institutions and companies relying on cloud computing. Many of these weaknesses can be exploited by anyone who knows about them -- not just the NSA.
security  surveillance 
december 2014 by juliusbeezer
NSA Drops Christmas Eve Surprise - The Intercept
NSA employees repeatedly engaged in unauthorized surveillance of communications by American citizens, failed to follow legal guidelines regarding the retention of private information, and shared data with unauthorized recipients.
december 2014 by juliusbeezer
Almost everyone involved in developing Tor was (or is) funded by the US government | PandoDaily
researchers understood that just designing a system that only technically anonymizes traffic is not enough — not if the system is used exclusively by military and intelligence. In order to cloak spooks better, Tor needed to be used by a diverse group of people: Activists, students, corporate researchers, soccer moms, journalists, drug dealers, hackers, child pornographers, foreign agents, terrorists — the more diverse the group that spooks could hide in the crowd in plain sight.
security  surveillance  tor 
december 2014 by juliusbeezer
Tor Developer Suspects NSA Interception of Amazon Purchase
Andrea Shepard, a Seattle-based core developer for the Tor Project, suspects her recently ordered keyboard may have been intercepted by the NSA.

Following the purchase of a new IBM Thinkpad Keyboard from, Shepard discovered her package to be taking a strange detour to the East Coast, revealed by a screenshot of her shipment tracking information.
surveillance  privacy  spectacle 
december 2014 by juliusbeezer
Slavoj Zizek on Wikileaks | Dazed
in our daily lives, we more and more resemble baboons. That is to say, why do baboons have big, protruding, hairless red butts? The main reason seems to be that the buttocks of a female in heat will swell so the male knows that she is ready to mate. It also functions as a sign of submission, where one animal turns and presents its rump to the other, implicitly saying, ‘I know you’re stronger than me, so let’s not fight anymore!’ The baboons with the redder, more hairless butts attract more mates and have more offspring, and, in their turn, the offspring are favoured because, on average, they have redder, more hairless butts than the rest. Is this not how the struggle for ideological hegemony also looks? Individuals display their hairless protruding butts, offering themselves to be penetrated by ideological messages. There is no need for violent imposition; the victim voluntarily offers itself – as was made clear when we recently found out about the massive digital control of our lives.
zizek  funny  privacy  surveillance 
december 2014 by juliusbeezer
Schneier on Security: Over 700 Million People Taking Steps to Avoid NSA Surveillance
I calculate that 706 million people have changed their behavior on the Internet because of what the NSA and GCHQ are doing...
Name another news story that has caused over ten percent of the world's population to change their behavior in the past year?
privacy  surveillance  spectacle 
december 2014 by juliusbeezer
Forgetting the Lesson of Cypherpunk History: Cryptography Is Underhanded
Universal encryption as a panacea is an appealing canard because it offers the chimera of a quick fix, an escape from more onerous and labor-intensive solutions - not to mention the opportunity for entrepreneurs to sell us things. "Genuine security? Wow, let me break out my check book!"

The surveillance state is motivated by the desire for power, the power to subvert technology and raise up an Eye of Providence behind a shroud of official secrecy. Power is rooted in politics. To put all of your eggs in the encryption basket is to chase after an illusion conjured artfully by propagandists.
surveillance  privacy  funny 
december 2014 by juliusbeezer
Plebgate fallout: police appear to have declared war on journalists | Media | The Guardian
the group [of journalists] complain that, quite apart from being monitored, they have been persistently stopped, searched and assaulted by police officers. Five of them have successfully sued the police in the past, winning damages or apologies from the force. These frontline confrontations have something of a history, but they are also suggestive of the growing antagonism between officers and journalists.
police  uk  surveillance  privacy 
december 2014 by juliusbeezer
Amazon’s frightening CIA partnership: Capitalism, corporations and our massive new surveillance state -
The decision to boot WikiLeaks was, in fact, one that was made internally, no pressure from the deep state required... And it paid off. A little more than a year later, Amazon was awarded a generous $600 million contract from the CIA to build a cloud computing service that will reportedly “provide all 17 [U.S.] intelligence agencies unprecedented access to an untold number of computers for various on-demand computing, analytic, storage, collaboration and other services.
amazon  wikileaks  security  surveillance 
december 2014 by juliusbeezer
Spooks behaving badly | Light Blue Touchpaper
The likely outcome of GCHQ’s posturing and MI5′s blame avoidance will be to drive tech companies to route all the agencies’ requests past their lawyers. This will lead to huge delays. GCHQ already complained in the Telegraph that they still haven’t got all the murderers’ Facebook traffic; this is no doubt due to the fact that the Department of Justice is sitting on a backlog of requests for mutual legal assistance, the channel through which such requests must flow.
security  surveillance  us  uk  google  spam 
november 2014 by juliusbeezer
We recommend that encryption be deployed throughout the protocol stack since there is not a single place within the stack where all kinds of communication can be protected. The IAB urges protocol designers to design for confidential operation by default.
internet  security  surveillance 
november 2014 by juliusbeezer
Why Was the NSA Chief Playing the Market?
At the same time that he was running the United States' biggest intelligence-gathering organization, former National Security Agency Director Keith Alexander owned and sold shares in commodities linked to China and Russia, two countries that the NSA was spying on heavily.

At the time, Alexander was a three-star general whose financial portfolio otherwise consisted almost entirely of run-of-the-mill mutual funds and a handful of technology stocks. Why he was engaged in commodities trades, including trades in one market that experts describe as being run by an opaque "cartel" that can befuddle even experienced professionals, remains unclear. When contacted, Alexander had no comment about his financial transactions, which are documented in recently released financial disclosure forms that he was required to file while in government. The NSA also had no comment.
security  surveillance  privacy  government  politics  conflict_of_interest 
october 2014 by juliusbeezer
Exclusive: NSA reviewing deal between official, ex-spy agency head | Reuters
The U.S. National Security Agency has launched an internal review of a senior official’s part-time work for a private venture started by former NSA director Keith Alexander that raises questions over the blurring of lines between government and business.

Under the arrangement, which was confirmed by Alexander and current intelligence officials, NSA's Chief Technical Officer, Patrick Dowd, is allowed to work up to 20 hours a week at IronNet Cybersecurity Inc, the private firm led by Alexander, a retired Army general and his former boss.
surveillance  privacy  politics  conflict_of_interest 
october 2014 by juliusbeezer
Exclusive: A Second Business At Home Of NSA Official
In September, BuzzFeed News disclosed a potential conflict of interest involving Shea, the director of Signals Intelligence. Called SIGINT in espionage jargon, it refers to all electronic eavesdropping and interception, including the controversial domestic surveillance program that collects information about Americans’ phone use.

As BuzzFeed News reported, there’s a private SIGINT consulting and contracting business based at Shea’s home in that quiet neighborhood. Shea’s husband, a business executive in the small but profitable SIGINT industry, is the resident agent for the firm, Telic Networks.
surveillance  politics  conflict_of_interest 
october 2014 by juliusbeezer
Laura Poitras on the Crypto Tools That Made Her Snowden Film Possible | WIRED
When she realized the depth of Snowden’s leaks, she went so far as to buy a new laptop—with cash—and to use it only with the Tails operating system. That free software is designed to leave no trace of your communications on your computer and to route all network data over the Tor anonymity network. Poitras says she used that Tails computer only to communicate with Snowden, and only in public places with Wifi connections—never her home or office.
privacy  security  surveillance 
october 2014 by juliusbeezer
Bahraini Activists Hacked by Their Government Go After UK Spyware Maker | WIRED
“For too long companies like [Gamma] have been able to shield themselves behind a state like Bahrain and throw their hands up in the air and say ‘It wasn’t us, it was Bahrain that perpetrated these abuses,’” says Adriana Edmeades, legal officer for Privacy International. “But these companies are making blood money off the fact that they are selling pernicious technology that has extraordinary capabilities to states they know are repressive, human-rights-abusing states. They can’t put that kind of technological capacity in the hands of these states and then … act surprised when states like Bahrain then go after individuals like Moosa, Saeed, and Jaafar and perpetrate the kind of extraterritorial repression that they’re doing here in the UK.”

The group is seeking a formal investigation into Gamma International’s role in facilitating the surveillance.
privacy  surveillance 
october 2014 by juliusbeezer
Power, knowledge, and the subjects of privacy: understanding privacy as the ally of surveillance (2014) | Foucault News
The aim of this article is to argue that privacy, rather than serving only as a countermeasure against surveillance, can also be seen as its ‘partner-in-crime’. Normative statements made by governments and companies on privacy can be regarded as a tool of governance in service of informational capitalism. Initially defined as a fundamental freedom, privacy has become a precondition for a blossoming economy in the context of the information society. The notion of privacy, as a critique of information society, has been assimilated and reshaped by and in favour of informational capitalism, notably by being over-individualized through the self-determination principle. To develop this idea, this article builds on the results of a study on the loyalty programmes run by the four biggest retailers of Switzerland and on the Foucauldian concept of biopower.
surveillance  privacy 
september 2014 by juliusbeezer
At Julian Assange's Book Party, A Mix of Energy Drinks, MIA, and Google Bashing | Motherboard
Google's co-founder Larry Page "is constructing this giant machine," said Assange, "but it has no color. It’s like white rice." But Schmidt “is the soy sauce. He comes along with certain political and geopolitical flavor and he’s poured that all over Google.”

“If the future of the internet is to be Google, that should be of serious concern to people all over the world,” Assange writes. “A ‘don't be evil’ empire is still an empire.”

As for how to fight such empires, Assange has much less to say. His avatar did have one piece of advice for the crowd at Babycastles: “Every time you go to a party and take a picture and post that picture to Facebook, you’re being a rat,” he said with stone-cold severity. “You're being a narc.”
assange  facebook  google  surveillance 
september 2014 by juliusbeezer
Why Brands Need to Pay Attention to Unregulated Domains - | Patents & Patent Law
The .bit domain is both praised and vilified for its ability to operate outside of the internet’s established regulatory and governing apparatuses. The system only became publicly known in 2011 after it was endorsed by WikiLeaks, and one of the stated goals of the effort is to protect free speech rights online by making the web more resistant to censorship. The .bit effort was also established in response to a mounting concern (in some quarters) over the potential impact of the Stop Online Piracy Act (SOPA), by a group looking to circumvent the threat of domain name blocking and censorship by creating a new Internet top-level domain outside of ICANN control. The effort currently uses proxies, cryptography, and a small collection of DNS servers to create a section of the Internet’s domain address space where domains can exist and be traded anonymously.
internet  dns  tools  security  surveillance 
september 2014 by juliusbeezer
h+ Magazine | Review: When Google Met WikiLeaks by Jullian Assange
The disagreement evident in this part of the discussion is apparently shown in Schmidt and Cohen’s book: they alleged that “Assange, specifically” (or any other editor) lacks sufficient moral authority to decide what to publish. Instead, we find special pleading from Schmidt and Cohen for the state: while regime control over information in other countries is bad, US regime control over information is good (p. 196).

According to the special pleading of Google’s top executives, only one regime – the US government and its secret military courts – has sufficient moral authority to make decisions about whether a disclosure is harmful or not. Assange points out that Google’s brightest seem eager to avoid explaining why this one regime should have such privilege, and others should not. He writes that Schmidt and Cohen “will tell you that open-mindedness is a virtue, but all perspectives that challenge the exceptionalist drive at the heart of American foreign policy will remain invisible to them” (p. 35).
google  wikileaks  surveillance  us 
september 2014 by juliusbeezer
Devonian Times » We’re opting out of Google Analytics
In the last few years we used Google Analytics on our website. It helps us to learn more about our visitors, which pages they look at, and where they come from. But, being a Google product, Analytics also comes with many privacy concerns. Starting today we’ve removed all Analytics code from our website and replaced it with Piwik.

Contrary to Analytics, which runs on Google’s servers, Piwik is installed locally. We host it, we own the database it uses, and we control the data it collects. It doesn’t share any data with anyone outside of our company. Also, Piwik respects when you don’t want to be tracked (click here to learn how to activate this feature of modern web browsers).

Please feel free to install the excellent and free Ghostery web browser extension, too.
search  google  privacy  surveillance  software  tools 
september 2014 by juliusbeezer
Check Your Privilege | Cato Unbound
That doesn’t mean a privileged perspective is necessarily wrong, but it does mean we ought to be cautious about any inference from “this is not a problem I worry about” to “this is not a problem.”

In a democracy, of course, the effects of surveillance are not restricted to its direct targets. Spying, like censorship, affects all of us to the extent it shapes who holds power and what ideas hold sway.
surveillance  privacy 
july 2014 by juliusbeezer
Important Facts about Unbubble
Unbubble is a search engine that delivers particularly neutral search results. For this purpose, we pull results from many search engines simultaneously, and assess the neutrality of these sources. Search engines that use other sources like Unbubble are called “meta search engines”. The special thing about Unbubble is that we have developed our system from the very beginning to be neutral and store very little data.
search  searchengines  web  privacy  surveillance  europe 
july 2014 by juliusbeezer
In NSA-intercepted data, those not targeted far outnumber the foreigners who are - The Washington Post
If Snowden’s sample is representative, the population under scrutiny in the PRISM and Upstream programs is far larger than the government has suggested. In a June 26 “transparency report,” the Office of the Director of National Intelligence disclosed that 89,138 people were targets of last year’s collection under FISA Section 702. At the 9-to-1 ratio of incidental collection in Snowden’s sample, the office’s figure would correspond to nearly 900,000 accounts, targeted or not, under surveillance.
surveillance  security  privacy 
july 2014 by juliusbeezer
Google Glass's potential for business and law enforcement means it will be successful.
At first the state troopers hated the cameras because they thought it was an invasion of their privacy. Some suspected they hated the cameras because they would record instances of police brutality at road stops. (And no doubt the cameras improved the behavior of some officers.) But months after they were installed, the cops came to love them: It turns out that motorists who are stopped file a large number of unfounded allegations against state troopers, and most of the time the dashcams proved that the motorists were lying, not the police.

You could easily see the same thing happening with Google Glass for police. A constant video record, stored in the cloud, of every law enforcement encounter would deter cops from racial profiling or other bad behavior.
police  surveillance 
june 2014 by juliusbeezer
Schneier on Security: The NSA is Not Made of Magic
I am regularly asked what is the most surprising thing about the Snowden NSA documents. It's this: the NSA is not made of magic. Its tools are no different from what we have in our world, it's just better-funded. X-KEYSCORE is Bro plus memory. FOXACID is Metasploit with a budget. QUANTUM is AirPwn with a seriously privileged position on the backbone.
security  surveillance 
may 2014 by juliusbeezer
Eyes Over Compton: How Police Spied on a Whole City - Conor Friedersdorf - The Atlantic
A sargeant in the L.A. County Sheriff's office compared the technology to Big Brother, which didn't stop him from deploying it over a string of necklace snatchings.

Sgt. Douglas Iketani acknowledges that his agency hid the experiment to avoid public opposition. "This system was kind of kept confidential from everybody in the public,"he said. "A lot of people do have a problem with the eye in the sky, the Big Brother, so to mitigate those kinds of complaints we basically kept it pretty hush hush."
surveillance  police 
may 2014 by juliusbeezer
« earlier      
per page:    204080120160

Copy this bookmark:

to read