EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

03.30.14

Links: Civil Rights Abuses, Secrecy, Surveillance and Assassination Without Oversight

Posted in News Roundup at 7:24 am by Dr. Roy Schestowitz

Civil Rights

  • Books for prisoners – A novel approach

    New rules that stop UK prisoners receiving parcels have led to a political row over prisoners’ access to books being restricted. Justice secretary Chris Grayling sees books as a privilege that must be earned through prisoner cooperation rather than as a basic right for everyone. While prisoners will still have access to prison libraries, the new rule clearly greatly reduces prisoners’ access to the wide range of reading opportunities that they might like. Whether prisoners are reading for pleasure or education (or both), easy access to a wide range of books should be non-negotiable in a decent society, even for the most notorious or uncooperative prisoners. People are more than just flesh and blood; we need to feed our minds as well as our bodies.

  • Global Guantánamo

    The state continues to deny people of color the ability to self-govern.

  • Using Flags to Focus on Veteran Suicides
  • After seven years, exactly one person gets off the gov’t no-fly list

    A hearing in federal court Tuesday has apparently marked the conclusion of a drawn-out, costly, and, to use the judge’s own term, “Kafkaesque” legal battle over the government no-fly list. Malaysian college professor Rahinah Ibrahim sued the government back in 2006, after Dr. Ibrahim’s name mistakenly ended up on a federal government no-fly list.

  • If You Don’t Want a SWAT Team at Your Door, You Shouldn’t Be Drinking Tea
  • US Takes a Break From Condemning Tyranny to Celebrate Obama’s Visit to Saudi Arabia

    Selecting the year’s single most brazen example of political self-delusion is never easy, but if forced to choose for 2013, I’d pick British Prime Minister David Cameron’s public condemnation of George Galloway. The Scottish MP had stood to question Cameron about the UK’s military support for Syrian rebels. As is typical for Western discourse, criticizing western government militarism was immediately equated with support for whatever tyrants those governments happened to be opposing at the time: “Some things come and go,” proclaimed the Prime Minister, “but there is one thing that is certain: wherever there is a brutal Arab dictator in the world, he will have the support of [Galloway].”

    What made Cameron’s statement so notable wasn’t the trite tactic of depicting opposition to western intervention as tantamount to support for dictators. That’s far too common to be noteworthy (if you oppose the war in Iraq, you are pro-Saddam; if you oppose intervention in Libya, you love Ghaddafi, if you oppose US involvement in Ukraine, you’re a shill for Putin, etc. etc.). What was so remarkable is that David Cameron – the person accusing Galloway of supporting every “brutal Arab dictator” he can find – is easily one of the world’s most loyal, constant, and generous supporters of the most brutal Arab despots. He has continuously lavished money, diplomatic support, arms and all sorts of obsequious praise on intensely repressive regimes in Bahrain, Saudi Arabia, the UAE, Oman, and Egypt. That this steadfast supporter of the worst Arab dictators could parade around accusing others of supporting bad Arab regimes was about as stunning a display of western self-delusion as I could have imagined . . .

Secrecy

Privacy

  • Lookout’s Open Source Privacy Policy Could Change the Game on Mobile App Transparency

    It’s taken as a truism that “no one understands the privacy policy.” Lookout, a startup that focuses on mobile privacy and security, wants to change that with its new open source privacy policy toolkit. The project seeks to improve the current poor state of mobile app transparency. It grew out of the Department of Commerce National Telecommunications and Information Administration’s recent multistakeholder process, which CDT participated in, aimed at creating a set of best practices to promote mobile app transparency.

  • On The Use of Computer Monitoring Software

    First off I would like to argue that I don’t consider these private monitoring practices to be in any way morally hazardous, and thus I would not put them in the same category as government surveillance or “privacy violations” The simple fact is that if a company employs a person to work on building company value, especially when this is clear from the contract, then the company has a right to hold the employee accountable to this, and monitoring their activities then is one way of doing this.

  • Pentagon plans three-fold cybersecurity staff increase to counter attacks

    The Pentagon plans to triple its cybersecurity personal over the next several years to bolster US national security, said Defense Secretary Chuck Hagel.

  • There Is No Oversight: The NSA Withheld Documents From Intelligence Committee Heads

    There has never been effective oversight of the NSA’s bulk collections programs, or indeed, intelligence agencies in general. There’s been a lot of noise made about this vaunted oversight in defense of programs revealed by leaked documents, but this is nothing more than a talking point.

    The NSA (along with the CIA) has no interest in real oversight or accountability, not even to the final arbiter of its domestic surveillance, the FISA court. Judge Walton threatened to end the Section 215 collection back in 2008 after uncovering widespread abuse of the collections and the NSA’s constant misrepresentation of how it was handling the data it collected.

  • Former Qwest CEO Joe Nacchio Tells Story of Fight Against NSA, SEC

    According to Nacchio, his troubles can be traced back to a meeting at the NSA’s Fort Meade…

  • Big Brother vs. Wall Street

    The industry regulator gathers vast amounts of data about brokerage accounts and charges. But some observers say it’s overdone.

  • Want to see the NSA’s public relations press kit?

    This is a page from the National Security Agency’s press kit mailed earlier this month to news organizations.

‘Reform’

Exodus

NSA’s Lust for Back Doors

  • How Huawei became the NSA’s worst nightmare

    An unfamiliar name to American consumers, Huawei produces products that are swiftly being installed in the internet backbone in many regions of the world, displacing some of the western-built equipment that the NSA knows — and presumably knows how to exploit — so well.

  • NSA stole Huawei’s source code, could have added back doors

    Internally Huawei routed all of its emails through one server in Shenzhen where the NSA managed to siphon off the data and gain access to a large portion of the internal communications including messages from company CEO Ren Zhengfei and Chairwoman Sun Yafang. Since the company employs some 150,000 people, the amount of data coming out of Huawei was more than the NSA could handle. According to Der Spiegel an internal NSA document stated that, “we currently have good access and so much data that we don’t know what to do with it.”

  • Huawei on NSA: If foreign spies attacked a US firm, there’d be “outrage”

    Chinese tech company still trying to track down NSA infiltration.

Espionage

Federal Government’s Lust for Back Doors

People

  • Circumventing the Panopticon, Transmediale Berlin

    Last month I was on a panel dis­cus­sion at the Ber­lin Trans­me­diale con­fer­ence with NSA whis­tleblower Bill Bin­ney, Chelsea Man­ning rap­por­teur Alexa O’Brian, and act­iv­ist Diani Bar­reto.

  • Oxford Union Society Debate

    The cham­ber was full and I am happy to report that we won the debate by 212 votes to 171, and that Oxford stu­dents do indeed see Edward Snowden as a hero.

IOT

FBI

  • Hacker Weev’s attorney: The FBI is intercepting my client’s mail

    The FBI is intercepting the prison correspondence of infamous Internet troll Andrew “weev” Auernheimer, including letters from his defense team, according to his attorney.

    “He’s sent me between 10 and 20 letters in the last month or two. I’ve received one,” Tor Ekeland, who had just returned from visiting Auernheimer at the federal corrections institute in Allenwood, Pa., told the Daily Dot in a video interview.

PRISM Etc.

  • Shares Your Data Far and Wide

    The Android version of Angry Birds available on Google Play, last updated March 4, shares personal information such as age, gender and address along with device information with multiple parties, according to a blog post by FireEye researchers Jimmy Su, Jinjian Zhai, and Tao Wei. Users who play the game without a Rovio account are also sharing information about their devices without realizing it, the post said.

  • Google Chrome Taking on New Music and Voice Features

    Meanwhile, both Chrome and Chrome OS are getting voice search features. To use the feature, you open a new tab or visit Google.com in Chrome, say “Ok Google,” and then start speaking your search. This is being rolled out progressively to users on Windows, Mac and Linux.

  • ​Facebook plans to spread web access with ‘drones, satellites and lasers’

    Facebook has announced an ambitious plan to use drone, satellite and laser technology “to deliver the internet to everyone” via the preeminent social media site’s Connectivity Lab project.

Drones

  • Come Clean on Deadly Drone Activities

    Three years ago last week, a U.S. drone strike hit the small town of Datta Khel in Pakistan. Local business owners and leaders were in the midst of a two-day tribal council meeting, called to address a dispute regarding a chromite mine in the area. Local authorities had been notified about the meeting, which is a traditional forum employed to resolve community conflicts.

  • Medals for drone pilots?
  • Soapbox: Let’s not be known for dirty wars and drone executions

    On a warm October night in 2011, an American teenager was sitting outdoors with several friends and cousins, about to begin his dinner. The boy was mourning the loss of his father, who had been killed just two weeks earlier. His family had been encouraging him to get out of the house, spend time with friends and enjoy the fresh air to begin the healing process. But there was to be no healing for Abdulrahman Awlaki. A missile fired from a U.S. drone ended his life and those of several of his companions that night. They were buried in a common grave, because the missile tore them into unrecognizable fragments — except for the back of Abdulrahman’s head, which was still covered by his long, curly hair.

  • Govt shy to share drone statistics
  • EU should press Obama on drone secrecy

    Trade and the crisis in Ukraine are likely to dominate the agenda during US President Barack Obama’s first official visit to Brussels on March 26.

  • UK telecoms giant likely bolsters in US secret drones war

    Lord Livingston, ex CEO of famous BT telecoms company, is in the epicenter of a row over the company’s involvement in America’s horrendous military drone war, which has killed hundreds of civilians in Yemen.

  • Use of drones should be under global law

    The United Nations called on all states on Friday to ensure that the use of armed drones complies with international law, including international humanitarian and human rights law, backing a proposal from Pakistan.

  • UN rights forum calls for use of drones to comply with law

    The resolution was adopted by a vote of 27 states in favour to six against, with 14 abstentions at the 47-member Geneva forum. The United States, Britain and France voted against

  • Protesters march against drones center in Horsham

    Three Buddhist monks, having walked from Massachusetts, covered their saffron robes with rain parkas, wrapped their drums in plastic bags and joined peace groups on Saturday to trek another 2½ miles to the Horsham Air Guard base to protest the planned ground-control command center for drone operations.

  • Targeting the Humanitarian Side of Drones

    Failure to account and justify lethal drone activity by the United States represents a major violation of international law and international human rights law, a former U.N. rapporteur said Wednesday.

    Since the beginning of drone attacks in 2001, the U.S. has conducted around 450 lethal drone strikes that have raised humanitarian and international legal issues.

  • International consensus emerging against Drones

    Although President Obama promised to make drone programme more transparent in May 2013, the follow up has rather been negligible as no new statement on drone policy or its legal framework has come out as yet. There is a need to ensure transparency of drone programme.

  • Drone strikers say the government is unfairly denying them jury trials

    In a ritual they have followed for nearly four years, they crisscrossed the four-way intersection near the gate, laying out the tools of their trade: anti-war banners, an American flag with a peace symbol instead of 50 white stars, a series of cardboard squares adorned with bright purple, battery-powered LED lights that spelled out the message “No Drones.”

    [...]

    They have been demonstrating since 2010 against unarmed surveillance drones based and operated at Beale that are used to pinpoint targets for armed killer drones in war zones and elsewhere overseas.

CIA

  • Letter: Decommission out-of-control CIA

    Congress recognizes no CIA claims of “privilege.” Congress has complete legal rights to review documents of any government agency. Any claim of “privilege” by any governmental branch is a bold announcement that they will not obey our laws: U.S. Constitution, Speech and Debate clause, and Fourth Amendment, Computer Fraud and Abuse Act, Executive Order 12333.

  • A Debate on Torture: Legal Architect of CIA Secret Prisons, Rendition vs. Human Rights Attorney

    As the Senate Select Committee on Intelligence feuds with the CIA over the declassification of its 6,000-page report on the agency’s secret detention and interrogation programs, we host a debate between former CIA acting general counsel John Rizzo and human rights attorney Scott Horton. This comes as the United Nations Human Rights Committee has criticized the Obama administration for closing its investigations into the CIA’s actions after Sept. 11. A U.N. report issued Thursday stated, “The Committee notes with concern that all reported investigations into enforced disappearances, torture and other cruel, inhuman or degrading treatment that had been committed in the context of the CIA secret rendition, interrogation and detention programmes were closed in 2012 leading only to a meager number of criminal charges brought against low-level operatives.” Rizzo served as acting general counsel during much of the George W. Bush administration and was a key legal architect of the U.S. interrogation and detention program after the Sept. 11 attacks. He recently published a book titled “Company Man: Thirty Years of Controversy and Crisis in the CIA.” Attorney Scott Horton is contributing editor at Harper’s magazine and author of the forthcoming book, “Lords of Secrecy: The National Security Elite and America’s Stealth Foreign Policy.”

  • Opinion: The CIA, running amok for 60 years
  • Guest Column: Government secrets: Too many held too long

    Recent controversies involving the NSA surveillance program and alleged CIA eavesdropping on Congress have dominated the news. This has led to healthy and heated discussions about clandestine activities of intelligence agencies to include the amount of classified information collected and how long it is maintained.

  • U.S. may expand Syrian assistance

    The Obama administration, stung by reversals in Ukraine and Syria, appears to have decided to expand its covert program of training and assistance for the Syrian opposition, deepening U.S. involvement in that brutal and stalemated civil war.

    The White House announced that President Obama discussed “the crisis in Syria” along with other subjects when he met Friday in Riyadh with Saudi King Abdullah, but the statement didn’t mention any details of the stepped-up Syria assistance program.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Techrights Cited by European Politicians in Support of EPO Staff's Causes

    Benoît Battistelli's right-hand man is charaterised as suspected of corruption in European Parliament questions



  2. When the EPO Came Under Fire From the Netherlands and Before Systemic Corruption Was Revealed

    Questions that targeted the Dutch Minister of Justice amidst EPO abuses against staff and a shameful failure to enforce a court's decision



  3. Links 29/3/2015: Red Hat's Stock Soars, Kodi 14.2 Released

    Links for the day



  4. Speculations That Microsoft is About to Buy Cyanogen (or at Least Officially Partner) to Attack Google's Android/Linux, Replacing Everything With Microsoft

    Articles in the corporate media and some analysis from smaller media sites serve to highlight the role which Microsoft plays in Cyanogen



  5. Links 28/3/2015: FoundationDB FOSS Shut Down by Apple, European Commission Support for Free Software

    Links for the day



  6. Microsoft Keeps Pretending to be 'Open Source', Despite Relentless Assaults on Open Source

    Microsoft's charm offensives against Free/libre software are proving to be rather effective, despite them involving a gross distortion of facts and exploitation of corruptible elements in the corporate media



  7. Željko Topić and Ivan Šimonović, Two Residues of Ivo Sanader's Corrupt Regime, Seen as Indirectly Connected

    Further exploration of the remnants of Sanader's highly notorious record and those whom he had brought to power before he landed in jail



  8. Links 27/3/2015: Ubuntu 15.04 Second Beta, Dart 1.9

    Links for the day



  9. The EPO's Dutch Scandal Leaves Battistelli and His Cronies on the Run

    EPO management is making concessions and issues statements which admit defeat, allowing the staff union to continue its activities



  10. Microsoft Won't Let People Wipe (Off) Windows But Happily Wipes Android, Wipes Android Apps Through Cyanogen and Blackmailed 'Partners'

    Microsoft's obscene double-standards leave Android and Linux between a rock and a hard place



  11. Links 26/3/2015: GNOME 3.16 Officially Released

    Links for the day



  12. Links 25/3/2015: India Moving to Free Software

    Links for the day



  13. Another Reason to Boycott UEFI: Back Doors or Crackers

    UEFI makes computers more prone to infections, according to some security experts



  14. The EPO's Administrative Council is Under Increased Pressure to Rein in and to Finally Stop Benoît Battistelli

    The EPO's Administrative Council (AC) is about to have a meeting, so the Member States' delegations are urged to call for action



  15. IRC Proceedings: February 22nd - March 21st, 2015

    Many IRC logs



  16. The Latest Microsoft Attacks on GNU/Linux and Free/Libre Software

    Microsoft is still hiding behind the façade of 'love' whilst actively attacking GNU/Linux and Free software from many directions



  17. Attempts to Disrupt Android by Pushing Microsoft Software Into It (Using Patent Blackmail and Cyanogen)

    Microsoft's Android coup d'état is succeeding owing to public apathy and poor comprehension of what Microsoft really is up to, partly due to media misdirection



  18. Links 24/3/2015: WebKitGTK+ 2.8.0, Black Lab Linux 6.5

    Links for the day



  19. Concerns Over Željko Topić's Alleged Powerful Links in Croatian Diplomacy

    Rikard Frgačić explains the powerful connections acquired though Ivan Šimonović, who is himself connected to EPO Vice-President Željko Topić



  20. Benoît Battistelli's EPO Comes Under Fire From Prominent Figures Who Are Key EPO Stakeholders, Expect Battistelli to Resign 'in the Longer Term'

    The ‘reign of terror’ which is primarily attributed to Battistelli and his cronies may be about to end; the Luxembourg parliament approves the Unified Patent Court



  21. Benoît Battistelli's EPO is Under Attack From French Politicians Yet Again

    More EPO interventions -- this time from France -- target Benoît Battistelli over his abuses and take it up to Eurocrats for political actions



  22. Bribes and Extortion Help Turn Android (Linux-powered) Into 'Microsoft Android'

    A strategy involving harassment and bribes drives large Android players into Microsoft's arms (PRISM and lock-in), much to Google's (and users') detriment and beyond regulators' range of visibility



  23. Microsoft-connected Black Duck Software Created by Microsoft Marketing Man as an Anti-GPL Operation, Admits the Management

    Black Duck "was founded [on] the idea ... to keep GPL-licensed code out of corporate codebases entirely," according to a new report



  24. Links 23/3/2015: Linux 4.0 RC5, Kubuntu Celebrates Ten Years

    Links for the day



  25. Microsoft Admits Lying (or Deceiving) About the Cost of Vista 10

    After much hype in the press about Windows being 'free' it turns out that Microsoft just lied yet again, leaving that lingering perception that Windows is as inexpensive as GNU/Linux



  26. Politics of Blackmail at the EPO

    Comments serve to highlight the role of bribes (or contrariwise blackmail), as allegedly exercised by the current management of the European Patent Office



  27. Benoît Battistelli's EPO Comes Under Attack From the British

    A British MEP criticises Battistelli and the management of the European Patent Office (EPO) while Baroness Lucy Neville-Rolfe, UK Minister for Intellectual Property, gets closer to Battistelli in a tactless effort to improve relations



  28. The Royal Norwegian Department of Labour on the Right of European Patent Office (EPO) Workers to Strike

    The role of bureaucrats from Norway in defending (or not) the rights of EPO workers -- rights that the EPO's management is actively trying to deny and punish for



  29. Michael Silver Back to Acting as Gartner's Microsoft Agent, Promoting Vista 10 Based on False Promises

    Vista 10 in the headlines as its marketing propaganda zones in on false perceptions around cost, aided in part by longtime foes of GNU/Linux such as Gartner, especially its Microsoft-embedded elements (Michael Silver and co-workers)



  30. Despite Media Propaganda About Security, Microsoft Windows Remains the Least Secure Operating System, by Design

    Amid highly misleading security-centric reports that rely on Microsoft's bogus number of vulnerabilities (Microsoft already admitted hiding many of them) Techrights presents recent news about Windows 'security'


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts