EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

02.10.14

Privacy Links 10/2/2013: State Surveillance, Private Surveillance, and ‘Dirty Tricks’

Posted in News Roundup at 4:59 am by Dr. Roy Schestowitz

Summary: News which shows the importance of privacy (collected during the weekend and early Monday)

  • Snowden Docs: British Spies Used Sex and ‘Dirty Tricks’

    British spies have developed “dirty tricks” for use against nations, hackers, terror groups, suspected criminals and arms dealers that include releasing computer viruses, spying on journalists and diplomats, jamming phones and computers, and using sex to lure targets into “honey traps.”

    Documents taken from the National Security Agency by Edward Snowden and exclusively obtained by NBC News describe techniques developed by a secret British spy unit called the Joint Threat Research and Intelligence Group (JTRIG) as part of a growing mission to go on offense and attack adversaries ranging from Iran to the hacktivists of Anonymous. According to the documents, which come from presentations prepped in 2010 and 2012 for NSA cyber spy conferences, the agency’s goal was to “destroy, deny, degrade [and] disrupt” enemies by “discrediting” them, planting misinformation and shutting down their communications.

  • New bill demands that smartphones have “kill switch” in case of theft

    A California state legislator has introduced SB 962, a bill that would require smartphones sold in the state to include a “kill switch” that would “render inoperable” the phone if it’s not in the possession of the rightful owner.

  • PGP Web of Trust: Core Concepts Behind Trusted Communication

    If you’ve ever used Linux, you’ve most likely used OpenPGP without even realizing it. The open-source implementation of OpenPGP is called GnuPG (stands for “GNU Privacy Guard”), and nearly all distributions rely on GnuPG for package integrity verification. Next time you run “yum install” or “yum update”, each package will be verified against its cryptographic signature before it is allowed to be installed on your system. This assures that the software has not been altered between the time it was cryptographically signed by distribution developers on the master server, and the time it was downloaded to your system.

  • NBC News’ Richard Engel: My Computers, Cellphone Were Hacked ‘Almost Immediately’ In Sochi

    NBC News’ Richard Engel said that upon arriving in Russia to cover the upcoming event, he was hacked “almost immediately” — and privacy is not something visitors should expect to have.

  • Police will have ‘backdoor’ access to health records despite opt-out, says MP

    David Davis says police would be able to approach central NHS database without a warrant as critics warn of catastrophic breach of trust

  • Don’t Spy On Us – Help get the word out!

    On Tuesday, internet users all over the world are standing up to say no to GCHQ and the NSA’s mass surveillance. Over the last eight months we’ve heard plenty about how intelligence agencies monitor us on the Internet.

  • The People Vs the NSA
  • Tuesday declared ‘The Day we Fight Back’ against NSA et al

    A broad coalition of technology companies and activist groups has declared Tuesday, February 11th 2014 has been “The Day We Fight Back Against Mass Surveillance”.

  • Media sometimes try, fail to keep NSA’s secrets

    News organizations publishing leaked National Security Agency documents have inadvertently disclosed the names of at least six intelligence workers and other government secrets they never intended to give away, an Associated Press review has found.

  • Media has disclosed intelligence workers names in NSA coverage
  • An Open Letter to Advertisers in the NSA Era

    Along these lines, a recent Pew Internet Center survey found that the clear majority of respondents are making great efforts to mask their identities online. Looking at this data, we need to be frank: We have long had a contentious relationship with the public, and this fundamentally doesn’t help any brand’s bottom line. In the interest of rebuilding consumer trust, which is so essential to the bottom line, we need to be proactive about addressing privacy concerns in personalization, targeting and measurement.

  • Here’s Everything You Need To Know About The NSA

    Even before the Snowden leaks of last year, the EFF had their suspicions in regards to what the NSA was up to. The group even tried to get the government to spill the beans a few times through lawsuits that never went anyway. As you can imagine, the Snowden leaks helped their cause greatly, and now they’re trying to educate the public on just how far the NSA goes.

  • Google, Facebook, Microsoft hire first anti-NSA lobbyist in Washington

    Technology powers like Apple and Google have coalesced to register a lobbyist in Washington to focus on government surveillance reform in an effort to maintain credibility following NSA spying disclosures that often implicated them as accomplices.

  • More NSA outrage: spying violates attorney-client privilege

    Reporter Nick Nicharios asks a very simple but extremely important question in his latest article for The Nation: “Has the NSA wiretapping violated attorney-client privilege?” Evidence leaked by Edward Snowden seems to prove just that when it comes to some terrorism cases. Nick Nicharios talks to host Rob Sachs about how in many cases there was no clear protocol as to when to turn off the monitoring of phone calls, which has led to monitoring of phone calls between lawyers and their clients.

  • Turning table on NSA, US diplomats’ phone call is bugged, leaked to YouTube

    US Assistant Secretary of State for European Affairs Victoria Nuland and Geoffrey Pyatt, the US ambassador to Ukraine, clearly thought they were speaking on a secure line when discussing the political unrest in Ukraine and how the US government should help resolve the crisis. At one point during the January 25 call, Nuland colorfully rejected recent overtures from European Union leaders by telling her colleague: “Fuck the EU.”

  • Protesters Take to the Web to Address NSA Surveillance Concerns

    Thousands are scheduled to gather on Tuesday to protest the surveillance state, but don’t expect any news of riots at the White House gates or marches on the National Mall.

  • How Hackers and Software Companies are Beefing Up NSA Surveillance

    Imagine that you could wander unseen through a city, sneaking into houses and offices of your choosing at any time, day or night. Imagine that, once inside, you could observe everything happening, unnoticed by others—from the combinations used to secure bank safes to the clandestine rendezvous of lovers. Imagine also that you have the ability to silently record everybody’s actions, whether they are at work or play without leaving a trace. Such omniscience could, of course, make you rich, but perhaps more important, it could make you very powerful.

  • Torvald’s Thumbs Up, Gates’ Computer Skills & More…

    In more Snowden news, we learned on Wednesday from PCWorld that the Brit spy agency GCHQ has been engaging in a game of tit-for-tat with the hacker groups Anonymous and LulzSec. Evidently they’ve used DDOS attacks and other techniques to an attempt to disrupt the organizations activities. They’ve also managed to do a bit of infiltrating.

  • NSA Whistleblower Thomas DrakeTranscript: Obama’s NSA Policy, Benghazi, 911, Problems with NSA…

    In 2010 the government alleged that Drake mishandled documents, one of the few such espionage cases in the US history, where he was tried under the Espionage Act. The fact is that 60 Minutes did a story on him and shortly after, almost every single charge was dropped except for “misuse of a computer”, for which Drake paid incredibly dearly. So, we’re going to talk about a whole lot of topics about NSA, about the President’s new speech today and a whole lot more.

  • Former NSA official Thomas Drake to speak at Tacoma event

    Drake since has traveled the nation talking about government surveillance efforts and his contention that they violate the U.S. Constitution and the fundamental rights of all Americans.

  • Websites look to ‘harness the outrage’

    Thousands of websites on Tuesday will take a stand against government surveillance by plastering protests across their home pages.

    Tech companies and civil liberties organizations are hoping the demonstration, called The Day We Fight Back, will replicate their success in defeating the Stop Online Piracy Act (SOPA) and Protect IP Act (PIPA) in 2012.

  • Facebook leaks Private Messages by because of Typo

    Facebook is not secure after all, as users of this social network, we have private settings where by we can change our private setting and regulate the people who can see our personal information and those who are not allowed to see the information. But is this truly what happens.

  • What Facebook knows about you

    Facebook has spent the past 10 years building a business upon your personal information.

  • Yet Another Surveillance Tool in FBI Hands. But How Are They Using It?

    Yesterday, we filed a Freedom of Information Act request with the FBI asking for details about a surveillance tool we know too little about, called a port reader. According to news reports, port readers copy entire emails and instant messages as they move through networks, in real time. They then delete the contents of the messages, leaving only the “metadata” — the sender, recipient, and time of a message, and maybe even the location from which it was sent — behind for the government. According to the same reports, the FBI is taking steps to install port readers on the networks of major U.S. phone and Internet companies, going so far as to make threats of contempt of court to providers that don’t cooperate.

  • Overhead: New Photos of the NSA and Other Top Intelligence Agencies Revealed for First Time
  • Rep. Peter King: Security Reforms At The NSA Will Prevent Future Snowdens

    Following a stinging report in the New York Times explaining how Edward Snowden was able to collect his trove of top-secret government documents, Rep. Peter King (R-N.Y) this morning took to the Sunday show Face The Nation to make the following claim (full transcript): “A lot that have has been changed; there is monitoring now of what goes on. Snowden would not be able to do it again in the future.”

  • States Step Up Efforts to Stymie NSA Surveillance

    Ironically, as many conservatives have given up hope on nullification as a way to fight back against federal overreach, several national news stories are highlighting those very state efforts.

    For example, in a big story for February 5, the Associated Press reports, “State lawmakers around the nation are proposing bills to curtail the powers of law enforcement to monitor and track citizens.”

    The message from these states to Capitol Hill, the story says, is “if you don’t take action to strengthen privacy, we will.”

  • Shunned as NSA Advisers, Academics Question Their Ties to the Agency
  • NSA Maintains Secret ‘Five Eyes’ Satellite Facility In Israel – OpEd

    If this is the message, it’s not being broadcast in a way that will find a receptive ear in Washington. American spooks don’t like their cover blown, no matter the reason or motivation. If Bibi thought this would make a positive impression on the Obama administration, he’s naïve. But my guess is that this isn’t intended for Obama’s ears. It’s intended as ammunition for the Lobby in making its case both about Iran sanctions and the Kerry peace talks. Members on Capitol Hill can use this new development as grist for the pro-Israel mill in their future Israel-related legislative deliberations.

    This is yet another example of how out of synch Israel is with the U.S. administration. Bibi speaks over Obama’s head instead of directly to him. There is no direct communication. No point of common contact.

  • Wave of NSA Reports Strain Ties With Europe

    A furor in Europe over new reports of National Security Agency surveillance is undermining U.S. efforts to move beyond the affair and has thrown plans for a trans-Atlantic trade agreement into question just weeks before talks are scheduled to resume.

    U.S. officials, including President Barack Obama, have engaged in a diplomatic offensive in recent weeks aimed at putting European fears over the data collection to rest. But a wave of European media reports based on information provided by former intelligence contractor Edward Snowden have provided further details of the U.S. surveillance programs, confounding Washington’s efforts.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Alice Case Beats Microsoft Patent Troll, USPTO Director Michelle Lee Wants Reform

    Latest developments surrounding software patents and patent trolls in the United States



  2. Links 7/7/2015: Lenovo ThinkPad With GNU/Linux, More Containers Hype

    Links for the day



  3. There is No 'New Microsoft': Under Nadella, Patent Extortion Against Linux/Android Carries on

    Kyocera is again being targeted by Microsoft, using patent aggression, with a secret settlement being reached whose negative impact on Android remains to be seen



  4. Patent Propaganda, Glamourisation, and Erosion of Citizens' Rights in the Process

    An overview of recent coverage about patents, demonstrative of inherent bias in the world of patent practitioners and the journalists whom they misinform



  5. Corporate Media Should Stop Grooming Black Duck by Calling it 'Open Source' and Repeating Its Lies

    Black Duck uses gullible (or easy to manipulate) journalists to spread its marketing talking points, which grossly overstate risks of using Free software



  6. Links 6/7/2015: Linux 4.2-rc1, YotaPhone Picks Sailfish OS

    Links for the day



  7. Microsoft Windows Unsafe at Any Speed, by Design

    More timely reminders that Windows is simply not designed to be secure, irrespective of version, status of patching, etc.



  8. After Moonlight Dies and Even Microsoft Abandons Silverlight, the Abusive Monopolist Keeps Pushing for Other Microsoft Lock-in, Injecting OOXML Traps Into Free Software (Moodle)

    Despite a long history of Microsoft formats being proven guarantee of digital obsolescence, Moodle allows itself to become Microsoft prey and a Trojan horse for OOXML in classrooms (for children)



  9. Links 4/7/2015: Mostly (Geo)Political Catchup

    Links for the day



  10. Links 3/7/2015: KDE Applications 15.04.3, Ubuntu-Flavored Compute Stick

    Links for the day



  11. Patent Lawyers and Their Firms, Still Desperate to Protect the Status Quo, Manipulate the Media

    Patent lawyers are besieged by gradual tightening of patent scope and recklessly fight back (e.g. by saturating the media) to secure their revenue sources, derived from (and at the expense of) actual scientists and true market producers



  12. Amid Controversy, Political Scrutiny and Increased Media Pressure Željko Topić and Benoît Battistelli Allegedly Cancel Today's Trip to Zagreb (Croatia) Where Topić Faces Many Criminal Charges

    The Croatian press comments on the recent declaration from the Council of Europe and Topić's not-so-sterling status in his home country, where he is wanted for alleged crimes



  13. Microsoft Gradually Embraces, Extends, Extinguishes Linux Foundation as a Foundation of GNU/Linux

    By liaising with (or hijacking) existing members of the Linux Foundation, as well as by paying the Linux Foundation, Microsoft turns the Linux Foundation into somewhat of a Windows advocacy group



  14. Microsoft India Still Lobbies and Lies About Free Software in Order to Knock Down Policy That Favours Free Software

    Microsoft continues to bully Indian politicians who merely 'dare' to prefer software that India can modify, maintain, extend, audit, etc.



  15. Patent Lawyers and Corporate Media Nervous About New Patents Barrier/Reality (Less Patents on Software and Business Methods)

    The rich and the powerful, as well as their lawyers (whose job is to protect their money and power by means of government-enforced monopoly), carry on whining after the Alice case, in which many abstract patents were essentially ruled -- by extension -- invalid



  16. Translation of Pierre-Yves Le Borgn' Speech Against EPO Management and New Parliamentarian Interventions

    More political fire targeting the EPO's management, adding up to over 100 parliamentarians by now



  17. Links 2/7/2015: KDE Plasma 5.3.2, antiX 15

    Links for the day



  18. Links 1/7/2015: OpenDaylight Lithium, OpenMandriva Lx 2014.2

    Links for the day



  19. Munich Press, Münchner Merkur, Slams the Munich-based EPO

    Pressure on Benoît Battistelli to leave (or be fired) grows as the cronies whom he filled his office with have become a huge public embarrassment to the decades-old European Patent Office



  20. The Shameless Campaign to Paint/Portray Free Software as Inherently Insecure, Using Brands, Logos, and Excessive, Selective Press Coverage

    Some more FUD from firms such as Sonatype, which hope to make money by making people scared of Free/libre software



  21. National Insecurity and Blackmail, Courtesy of Microsoft

    British members of parliament (MPs) outsourced their communication to the number one PRISM company and they are paying the price for it; The US Navy's systems continue to be unbelievably insecure (Windows XP), despite access to the world's biggest nuclear arsenal



  22. Microsoft Keeps Shrinking

    As the era of shrink-wrapped software comes to an end so does Microsoft, whose effort to become a 'cloud' company with online operations has been miserable at best



  23. They 'R' Coming: More Microsoft Money for the Linux Foundation

    The problem with having Microsoft in a Linux Foundation initiative, the R Consortium



  24. Speculations About the EPO's Possible Role in DDOS Attacks

    Readers' views on who might be behind the attacks on this site amid confirmation that it's on the 'targets' list of the EPO



  25. Links 30/6/2015: Linux Mint 17.2, OpenMandriva

    Links for the day



  26. Techrights Confirmed as a Target of EPO Surveillance, With Help From Control Risks Group (CRG)

    Unveiling the cloak of secrecy from long-term surveillance by the European Patent Office (EPO) and a London-based mercenary it hired, bypassing the law



  27. Google's Fight to Keep APIs Free is Lost, Let's Hope Google Continues Fighting

    SCOTUS refuses to rule that APIs cannot be considered copyright-'protected', despite common sense and despite Java (which the case is about) being Free/libre software



  28. Patent Trolls in the Post-Alice World

    A round-up of news about patent trolls in the United States, some of whom are are doing well and some of them not as well



  29. DDOS Attacks Against Techrights

    Information about some of the most recent DDOS attacks against this Web site and the steps to be taken next



  30. The Patent System Not What it Used to be, Large Corporations and Patent Lawyers the Principal Beneficiaries

    A look at some recent patent stories and what can be deduced from them, based on statistics and trends


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts