EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

03.01.14

Another Day of High-Level Abuses: Microsoft Kinect a Target of Spooks, Apple-PRISM Allegations, Ukraine Interventions…

Posted in News Roundup at 5:39 am by Dr. Roy Schestowitz

Summary: News from the past 24 hours about British and US surveillance, assassination, and outside intervention in East Europe

NSA/GCHQ

  • Nothing To Hide: An anti-stealth game in which you are your own watchdog

    Nothing To Hide is an “anti-stealth game,” in which you must carry cameras and spy gear to live in a world of self-surveillance and self-censorship. A world where you’re made to be your own watchdog. Released for The Day We Fight Back, the game is now seeking crowdfunding to complete the open source game—10% of what’s raised will first go to the Electronic Frontier Foundation (EFF), Demand Progress, and the Freedom of the Press Foundation.

  • Let’s point a satellite at GCHQ and the NSA, and see how they feel

    Psssst! Wanna come in on a private satellite with me? They’re available, and they cost about $2m a year to run, so it would need an awful lot of us to club together via Kickstarter or some such.George Clooney’s got one. He trains it between Sudan and South Sudan, keeping a particular eye on the Hague-wanted president Omar al-Bashir, and uses the footage to draw attention to human rights violations. But in the wake of news that the Optic Nerve programme targeted and retained the webcam images of 1.8m UK internet users not suspected of wrongdoing, I’d like you to consider pointing ours somewhere pointed, such as the NSA or GCHQ. Just their car parks would do.

  • How to foil the NSA and GCHQ with strong encryption

    THE MOST INTERESTING DEVICE shown at Mobile World Congress (MWC) in Barcelona this week was the secure Blackphone developed by Silent Circle and Geeksphone.

  • This lecture is the one primer you need on NSA surveillance technology
  • Wiliest Ways to Keep the NSA at Bay

    “Whatever the level of cryptography you’re using, the NSA can probably break into your home network, install keyloggers and grab whatever they want — passwords, private PGP keys, screenshots, etc.,” said Cyril Soler, a developer on the RetroShare project. “This is always easier than breaking the encryption.” Their ability to do that is probably facilitated by backdoors.

  • Lavabit’s Ladar Levison on Snowden, Why He Shut Down, and How to Beat the NSA

    Levison was prohibited from discussing any details of the case until last October, when the court unsealed a portion of the documents. The unsealed records reveal that the FBI was demanding access to Lavabit’s Secure Sockets Layer (SSL) keys, which would essentially allow the agency access to all messages on Lavabit’s server. While the FBI was ostensibly targeting only a single user, Levison was unwilling to sacrifice the privacy of his other 400,000+ users.

  • Coviello ducks big questions and sticks to his script

    This year’s RSA Conference began with controversy. Even before Chairman Art Coviello took the stage to deliver his opening keynote, protesters unfurled banners on the Moscone Center reminding the world of RSA’s alleged complicity in enabling the NSA to access data that was believed to be secure.

    However, after an interview with Coviello, we are no closer to any meaningful information as he does a skilful job of obfuscating and avoiding questions regarding the NSA.

Webcams

Microsoft

  • Are the N.S.A. and G.C.H.Q. Trading Webcam Pictures?

    G.C.H.Q. was apparently also interested in tapping into Microsoft’s Kinect.

  • Xbox 360′s Kinect Evaluated as Surveillance Tool by British Intelligence Agency

    The Kinect for Xbox 360 was once considered for its potential use as a mass surveillance tool by the British Government Communications Headquarters (GCHQ), according to documents published by The Guardian.

    The GCHQ is the British equivalent to the United States’ NSA.

    The information comes from documents leaked by NSA whistleblower Edward Snowden. They document a program entitled “Optic Nerve” that collected images of users through their webcams, including users of Yahoo chats between 2008 and 2010.

Messaging

  • Tor developing anonymous instant messenger

    The instant messenger is still in the early planning stages, but Tor’s developers seem to be preparing to turn it around quickly. The messenger will be built on Instantbird, an existing open-source messenger, and development will largely involve adding in Off-the-Record Messaging encryption, making it send its messages over Tor, and stripping it of some automated logging and reporting features. Tor hopes to have its first step of work on the messaging app completed by the end of March, but it doesn’t draw a timeline for the project out from there.

  • Tor is building an anonymous instant messenger

    Tor, the team behind the world’s leading online anonymity service, is developing a new anonymous instant messenger client, according to documents produced at the Tor 2014 Winter Developers Meeting in Reykjavík, Iceland.

    The Tor Instant Messaging Bundle (TIMB) is set to work with the open-source InstantBird messenger client in experimental builds released to the public by March 31, 2014. The developers aim to build in encrypted off-the-record chatting and then bundle the client with the general Tor Launcher in the following months.

  • Goosestep Foot Forward

    Sutton displays precisely the mind-set of the security state, that led GCHQ to intercept the webcam chats of 1.4 million completely random British people, in the hope of finding Islamic terrorists. (They didn’t find any terrorists, but they did look at over 100,000 people masturbating). Sutton states that Begg must be a terrorist because ”a convicted Groupe Islamique Armé (GIA) supporter identified as ‘D’ ” had used Begg’s bookshop. And he calls me “conspiratorial”! The poor man must see terrorists everywhere. The fact that Moazzam Begg is now detained again, had been detained for years, has had everything belonging to him searched microscopically, and nothing has ever been found to justify a criminal charge of any kind, means nothing to witchfinder Sutton. That anti-Muslim bigot is plainly convinced of Moazzam Begg’s guilt, though as he has not been charged, of what is unsure.

Simon Phipps on Spying

  • Hope in Federations

    Facebook’s acquisition of WhatsApp gains them almost half a billion users worth of telephone data

  • Facebook’s Global Telco Dream

    Maybe there’s more to the Facebook acquisition of WhatsApp than just the centralised consolidation of users and user information that Simon denounced in his previous InfoWorld article . Perhaps this particular addition to their portfolio is Facebook’s move towards becoming the first truly global telco!

  • Surveillance Impact Not Just Personal

    Knowing we could be watched, as Jeremy Bentham observed, changes our behaviour; specifically, it chills our creativity. This in turn affects innovation and hence the economy. More directly, businesses (like RSA) are harmed by the disclosure of their for-profit collusion.

ORG

  • ICO Survey on the Code of Practice on Anonymisation

    Asking for comments and feedback on the code is a positive move, but the survey is not balanced to capture a variety of opinions. For example it asks whether the code explains the benefits of anonymisation, but not whether it explains the risks. And it doesn’t.

Apple

[First, watch AOL promoting the fiction that iMessage is secure. It’s not alone.]

Alexander

  • Limit surveillance to ‘terrorist communication,’ says outgoing NSA boss

    General Keith Alexander, the soon-to-be departed chief of the NSA, admitted Thursday in front of a congressional committee that the massive intelligence agency may be open to extracting less, or more targeted metadata from communication companies.

    Classified documents leaked last summer by NSA whistleblower Edward Snowden revealed that the intelligence agency currently compels at least three major telephone providers – Verizon, Sprint, and AT&T – to turn over call information on millions of Americans. Among that information, known as metadata, is the duration of the call, the time the call was made, who the phone call was to, and where it originated.

Ukraine and Intervention

  • Vicky Nuland Gets Her New Government in Ukraine

    “Yats is the guy,” said Obama’s potty-mouthed Assistant Secretary of State for European and Eurasian Affairs, Victoria Nuland, in a recorded and widely disseminated discussion with the U.S. Ambassador to Ukraine earlier this year. She was referring to Arseni Yatsenyuk, the former foreign and economics minister who was confirmed as the interim Prime Minister of Ukraine today.

  • Ukraine was a Playbook CIA Coup d’état

    The very first act of the western-backed insurrectionists which represent a small percentage of the population and have managed to overthrow the government was to attempt rob Russian speakers in Ukraine of their language.

  • Armed Men Seize Control of Airports in Crimea, Ukraine

    Yanukovych is now in Russia and is expected to hold a news conference today. Meanwhile, the United States is rejecting claims that the change in power in Ukraine constitutes a coup. On Thursday, White House spokesperson Jay Carney said Yanukovych had “abdicated his responsibilities” and “undermined his legitimacy” by fleeing Kiev. Carney outlined U.S. plans to work with the new government.

  • Former pilot for Air America talks about work in Laos during Vietnam War

    But the secretive agency is no newcomer to American combat zones. In Vietnam, a war without battle lines, it played a behind-the-scenes role in advancing American interests.

  • What Does a Soviet Submarine Have to Do With U.S. Government Secrecy?

    Soon, intrepid journalists get wind of the operation and file Freedom of Information Act requests for more information. A CIA lawyer — operating under the cover name Walt Logan — thinks up a novel way to keep the mission secret without telling an all-out lie: refuse to confirm or deny whether records about the Glomar Explorer’s mission exist. One journalist sues over this confusing non-response, and a battle over government secrecy follows in court.

    [...]

    There are limited circumstances in which a Glomar response may be necessary to protect veritable government secrets, but as I’ve written before in The New York Times (with Jameel Jaffer) and in the NYU Law Review, it has been deployed far beyond acceptable bounds. Perhaps most disturbing is the way the government uses Glomar to facilitate selective and misleading disclosures. Government officials often “leak” information to the press that paints controversial programs in a positive light on the condition that the press withholds their names. But when asked to officially release records under FOIA, those officials clam up and hide behind the Glomar response. The result is an absurd double standard, and our democracy suffers for it.

Civil Rights

Drones

  • The Clear and Convincing Standard and Citizen Drone Strikes
  • I Was Beaten, Tortured: Pakistani Anti-Drone Activist Karim Khan on Being Abducted by Masked Men

    Pakistani anti-drone activist Karim Khan was abducted February 5, just before he was due to travel to Europe to speak out about U.S. drone strikes. He joins us to describe how he was held for nine days. During that time he says he was repeatedly tortured and beaten. In 2009, a U.S. drone killed Khan’s brother and son. He joins us from London, where he traveled to to meet with British lawmakers to raise concerns about the U.S. drone program. “They attacked our mosques, they attacked our schools, they attacked our schoolchildren, they attacked our teachers,” Khan says. “So everything is completely destroyed by these drone strikes.” We also speak with Khan’s lawyer, Shahzad Akbar. “This is what the human face of the victim is, and it is important that the American people are told about who these people are,” Akbar says. “They are being targeted in the name of national security, [but] what we see on the ground is that it is not really serving the national security interests of anyone.”

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Microsoft is Attacking Android Like Never Before, Qisda the Latest to Sign Patent Extortion Deal

    More blackmail and propaganda against Android, courtesy of the gentler, kinder, 'new' Microsoft



  2. Caution Needed When Microsoft Copywriters Flood the Media With Microsoft Propaganda

    Media actively subverted by Microsoft-sponsored agents of deception, whose goal is to change what people think of Microsoft and its software, even if by lying (they call it 'marketing')



  3. Gartner Staff That Worked for Microsoft and the Latest Nonsense from Gartner or 'Former' Staff

    Gartner waited until 2015 to declare FOSS fit for databases; another example spotted where Gartner staff comes from Microsoft or vice versa



  4. Links 27/4/2015: Debian 9 Named, Linux 4.1 Reaches RC

    Links for the day



  5. Microsoft is Interjecting Itself Into GNU/Linux and Free Software News, Even Events and Foundations

    Microsoft's entryism strategy is proving effective as Microsoft successfully embeds itself inside the idealogical competition, subverting the competition's overall message and diluting the competition's focus on Free software



  6. The Unethical Business of Selling Fear of Free/Libre Software Bugs (Black Duck, Sonatype, and Symantec)

    The spreading of fear of Free/Open Source software (FOSS) is now a growth industry, so proprietary opportunists are eager to capitalise on it, even if by distorting the truth



  7. Patients' Data at Risk as NHS Reinforces Its Microsoft/Accenture Stockholm Syndrome

    The worst privacy violator in the world and the firm behind LSE failures are pocketing as much as £0.35 billion of British taxpayers' money to acquire access to very sensitive data of British people



  8. Links 26/4/2015: Debian 8, OpenMandriva Lx 3 Alpha, Mageia 5 RC

    Links for the day



  9. Links 25/4/2015: Debian LTS Plans, Turing Phone Runs Linux

    Links for the day



  10. Who Kills Yahoo? It's Microsoft, Not Yahoo!

    The media should blame Microsoft, not Marissa Mayer, for what's going on (and has been going on for 7 years) at Yahoo!



  11. EPO Management is Trying Hard to Appease Its Critics While Pushing Forth Unitary Patent Agenda

    The European Patent Office and European Commission promote the agenda of large multinational corporations (at the expense or European citizens) and critics are being kept at bay



  12. Real Patent Reform Will Not Come From Biggest Backers of GNU/Linux, Not Even Google

    A look at the 'new' Google, the company which is hoarding patents (2,566 last year alone) instead of fighting for reform



  13. Microsoft's Troll Intellectual Ventures Loses Software Patents

    Intellectual Ventures is bluffing with software patents, but this time around it doesn't get its way



  14. Links 24/4/2015: Ubuntu and Variants in the News, Red Hat Developer Toolset 3.1

    Links for the day



  15. Links 23/4/2015: Ubuntu 15.04 is Out, Debian 8.0 Out Very Soon

    Links for the day



  16. Links 22/4/2015: Fedora 22 Beta, Atlassian Acquires BlueJimp

    Links for the day



  17. The Dying Debate Over Patent Scope (Including Software Patents) Replaced by 'Trolls' (But Not the Biggest Ones)

    The corporate media and Web sites or people who are funded by large corporations have essentially suppressed any debate about issues in the patent granting process, thereby guarding software patents and preventing criticism of large corporations' power grab



  18. The Patents Gold Rush Continues

    The morbid obsession with monopolising mere ideas still dominates the media, even increasingly in China



  19. 9 Millionth US Patent Tells a Story of Failure and USPTO Misconduct

    The USPTO, much like FISA (notorious court for surveillance/espionage authorisation), has become a rubber-stamping operation rather than a patents examination centre, as new evidence and old evidence serve to show



  20. HBO Helps Shift Debate Over Patents to 'Trolls' (Scale), Not Scope

    More of that awkward shifting of the patent debate towards small actors who are misusing patents, not large conglomerates like Apple and Microsoft which use patents to destroy competitors, crush startups, drive up prices, and so on



  21. Software Patents Are Still Menacing to Free Software: OIN Expands Scope, HEVC Adds to MPEG-LA Burden/Tax, Google and Facebook Give in on Patents

    A look at recent news about software patents and especially Free/libre software, which is inherently incompatible with them



  22. The Latest Developments Around Microsoft's Clever Attack on Android/Linux

    Microsoft's campaign of destruction, extortion, etc. against the most widely used Linux-powered operating system is revisited in light of new reports



  23. The Microsoft 'Community' is Maligning the Free Software Community

    Dishonest generalisations and baseless deductions portray the Free/Open Source software communities as a nasty place that leads to poverty and despair



  24. Googlebombing 'Microsoft Open Source' Even When Microsoft Shuts Down Its 'Open Source' Proxy

    A massive failure by the press to cover the most basic news, which is Microsoft putting an end to a supposedly 'Open Source' effort



  25. Links 22/4/2015: Calculate Linux 14.16, SparkyLinux 4.0 RC KDE

    Links for the day



  26. Links 21/4/2015: Project Photon, Ubuntu Touch Buzz

    Links for the day



  27. Embrace, Extend, Extinguish: How Microsoft Plans to Get Rid of Linux/Android

    Microsoft's sheer abuse against Android is laying bare for everyone to see now that Microsoft has paralysed Google's legal department with potential antitrust action in Europe



  28. Yahoo's Current CEO (Mayer, Formerly of Google) is Trying to End Yahoo! Status as Microsoft Proxy

    There are signs of relinquishing Microsoft's control over Yahoo! after Marissa Mayer worked to end the company's suicidal/abusive relationship with Steve Ballmer's Microsoft



  29. Repeating Microsoft's Lies Without Any Journalistic Assessment

    Poor fact-checking by relatively large media/news sites results in Microsoft's patently false claims being repeated uncritically



  30. Links 19/4/2015: New KaOS (2015.04), Manjaro Linux 0.8.13 Pre1

    Links for the day


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts