EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

03.30.14

Links: Civil Rights Abuses, Secrecy, Surveillance and Assassination Without Oversight

Posted in News Roundup at 7:24 am by Dr. Roy Schestowitz

Civil Rights

  • Books for prisoners – A novel approach

    New rules that stop UK prisoners receiving parcels have led to a political row over prisoners’ access to books being restricted. Justice secretary Chris Grayling sees books as a privilege that must be earned through prisoner cooperation rather than as a basic right for everyone. While prisoners will still have access to prison libraries, the new rule clearly greatly reduces prisoners’ access to the wide range of reading opportunities that they might like. Whether prisoners are reading for pleasure or education (or both), easy access to a wide range of books should be non-negotiable in a decent society, even for the most notorious or uncooperative prisoners. People are more than just flesh and blood; we need to feed our minds as well as our bodies.

  • Global Guantánamo

    The state continues to deny people of color the ability to self-govern.

  • Using Flags to Focus on Veteran Suicides
  • After seven years, exactly one person gets off the gov’t no-fly list

    A hearing in federal court Tuesday has apparently marked the conclusion of a drawn-out, costly, and, to use the judge’s own term, “Kafkaesque” legal battle over the government no-fly list. Malaysian college professor Rahinah Ibrahim sued the government back in 2006, after Dr. Ibrahim’s name mistakenly ended up on a federal government no-fly list.

  • If You Don’t Want a SWAT Team at Your Door, You Shouldn’t Be Drinking Tea
  • US Takes a Break From Condemning Tyranny to Celebrate Obama’s Visit to Saudi Arabia

    Selecting the year’s single most brazen example of political self-delusion is never easy, but if forced to choose for 2013, I’d pick British Prime Minister David Cameron’s public condemnation of George Galloway. The Scottish MP had stood to question Cameron about the UK’s military support for Syrian rebels. As is typical for Western discourse, criticizing western government militarism was immediately equated with support for whatever tyrants those governments happened to be opposing at the time: “Some things come and go,” proclaimed the Prime Minister, “but there is one thing that is certain: wherever there is a brutal Arab dictator in the world, he will have the support of [Galloway].”

    What made Cameron’s statement so notable wasn’t the trite tactic of depicting opposition to western intervention as tantamount to support for dictators. That’s far too common to be noteworthy (if you oppose the war in Iraq, you are pro-Saddam; if you oppose intervention in Libya, you love Ghaddafi, if you oppose US involvement in Ukraine, you’re a shill for Putin, etc. etc.). What was so remarkable is that David Cameron – the person accusing Galloway of supporting every “brutal Arab dictator” he can find – is easily one of the world’s most loyal, constant, and generous supporters of the most brutal Arab despots. He has continuously lavished money, diplomatic support, arms and all sorts of obsequious praise on intensely repressive regimes in Bahrain, Saudi Arabia, the UAE, Oman, and Egypt. That this steadfast supporter of the worst Arab dictators could parade around accusing others of supporting bad Arab regimes was about as stunning a display of western self-delusion as I could have imagined . . .

Secrecy

Privacy

  • Lookout’s Open Source Privacy Policy Could Change the Game on Mobile App Transparency

    It’s taken as a truism that “no one understands the privacy policy.” Lookout, a startup that focuses on mobile privacy and security, wants to change that with its new open source privacy policy toolkit. The project seeks to improve the current poor state of mobile app transparency. It grew out of the Department of Commerce National Telecommunications and Information Administration’s recent multistakeholder process, which CDT participated in, aimed at creating a set of best practices to promote mobile app transparency.

  • On The Use of Computer Monitoring Software

    First off I would like to argue that I don’t consider these private monitoring practices to be in any way morally hazardous, and thus I would not put them in the same category as government surveillance or “privacy violations” The simple fact is that if a company employs a person to work on building company value, especially when this is clear from the contract, then the company has a right to hold the employee accountable to this, and monitoring their activities then is one way of doing this.

  • Pentagon plans three-fold cybersecurity staff increase to counter attacks

    The Pentagon plans to triple its cybersecurity personal over the next several years to bolster US national security, said Defense Secretary Chuck Hagel.

  • There Is No Oversight: The NSA Withheld Documents From Intelligence Committee Heads

    There has never been effective oversight of the NSA’s bulk collections programs, or indeed, intelligence agencies in general. There’s been a lot of noise made about this vaunted oversight in defense of programs revealed by leaked documents, but this is nothing more than a talking point.

    The NSA (along with the CIA) has no interest in real oversight or accountability, not even to the final arbiter of its domestic surveillance, the FISA court. Judge Walton threatened to end the Section 215 collection back in 2008 after uncovering widespread abuse of the collections and the NSA’s constant misrepresentation of how it was handling the data it collected.

  • Former Qwest CEO Joe Nacchio Tells Story of Fight Against NSA, SEC

    According to Nacchio, his troubles can be traced back to a meeting at the NSA’s Fort Meade…

  • Big Brother vs. Wall Street

    The industry regulator gathers vast amounts of data about brokerage accounts and charges. But some observers say it’s overdone.

  • Want to see the NSA’s public relations press kit?

    This is a page from the National Security Agency’s press kit mailed earlier this month to news organizations.

‘Reform’

Exodus

NSA’s Lust for Back Doors

  • How Huawei became the NSA’s worst nightmare

    An unfamiliar name to American consumers, Huawei produces products that are swiftly being installed in the internet backbone in many regions of the world, displacing some of the western-built equipment that the NSA knows — and presumably knows how to exploit — so well.

  • NSA stole Huawei’s source code, could have added back doors

    Internally Huawei routed all of its emails through one server in Shenzhen where the NSA managed to siphon off the data and gain access to a large portion of the internal communications including messages from company CEO Ren Zhengfei and Chairwoman Sun Yafang. Since the company employs some 150,000 people, the amount of data coming out of Huawei was more than the NSA could handle. According to Der Spiegel an internal NSA document stated that, “we currently have good access and so much data that we don’t know what to do with it.”

  • Huawei on NSA: If foreign spies attacked a US firm, there’d be “outrage”

    Chinese tech company still trying to track down NSA infiltration.

Espionage

Federal Government’s Lust for Back Doors

People

  • Circumventing the Panopticon, Transmediale Berlin

    Last month I was on a panel dis­cus­sion at the Ber­lin Trans­me­diale con­fer­ence with NSA whis­tleblower Bill Bin­ney, Chelsea Man­ning rap­por­teur Alexa O’Brian, and act­iv­ist Diani Bar­reto.

  • Oxford Union Society Debate

    The cham­ber was full and I am happy to report that we won the debate by 212 votes to 171, and that Oxford stu­dents do indeed see Edward Snowden as a hero.

IOT

FBI

  • Hacker Weev’s attorney: The FBI is intercepting my client’s mail

    The FBI is intercepting the prison correspondence of infamous Internet troll Andrew “weev” Auernheimer, including letters from his defense team, according to his attorney.

    “He’s sent me between 10 and 20 letters in the last month or two. I’ve received one,” Tor Ekeland, who had just returned from visiting Auernheimer at the federal corrections institute in Allenwood, Pa., told the Daily Dot in a video interview.

PRISM Etc.

  • Shares Your Data Far and Wide

    The Android version of Angry Birds available on Google Play, last updated March 4, shares personal information such as age, gender and address along with device information with multiple parties, according to a blog post by FireEye researchers Jimmy Su, Jinjian Zhai, and Tao Wei. Users who play the game without a Rovio account are also sharing information about their devices without realizing it, the post said.

  • Google Chrome Taking on New Music and Voice Features

    Meanwhile, both Chrome and Chrome OS are getting voice search features. To use the feature, you open a new tab or visit Google.com in Chrome, say “Ok Google,” and then start speaking your search. This is being rolled out progressively to users on Windows, Mac and Linux.

  • ​Facebook plans to spread web access with ‘drones, satellites and lasers’

    Facebook has announced an ambitious plan to use drone, satellite and laser technology “to deliver the internet to everyone” via the preeminent social media site’s Connectivity Lab project.

Drones

  • Come Clean on Deadly Drone Activities

    Three years ago last week, a U.S. drone strike hit the small town of Datta Khel in Pakistan. Local business owners and leaders were in the midst of a two-day tribal council meeting, called to address a dispute regarding a chromite mine in the area. Local authorities had been notified about the meeting, which is a traditional forum employed to resolve community conflicts.

  • Medals for drone pilots?
  • Soapbox: Let’s not be known for dirty wars and drone executions

    On a warm October night in 2011, an American teenager was sitting outdoors with several friends and cousins, about to begin his dinner. The boy was mourning the loss of his father, who had been killed just two weeks earlier. His family had been encouraging him to get out of the house, spend time with friends and enjoy the fresh air to begin the healing process. But there was to be no healing for Abdulrahman Awlaki. A missile fired from a U.S. drone ended his life and those of several of his companions that night. They were buried in a common grave, because the missile tore them into unrecognizable fragments — except for the back of Abdulrahman’s head, which was still covered by his long, curly hair.

  • Govt shy to share drone statistics
  • EU should press Obama on drone secrecy

    Trade and the crisis in Ukraine are likely to dominate the agenda during US President Barack Obama’s first official visit to Brussels on March 26.

  • UK telecoms giant likely bolsters in US secret drones war

    Lord Livingston, ex CEO of famous BT telecoms company, is in the epicenter of a row over the company’s involvement in America’s horrendous military drone war, which has killed hundreds of civilians in Yemen.

  • Use of drones should be under global law

    The United Nations called on all states on Friday to ensure that the use of armed drones complies with international law, including international humanitarian and human rights law, backing a proposal from Pakistan.

  • UN rights forum calls for use of drones to comply with law

    The resolution was adopted by a vote of 27 states in favour to six against, with 14 abstentions at the 47-member Geneva forum. The United States, Britain and France voted against

  • Protesters march against drones center in Horsham

    Three Buddhist monks, having walked from Massachusetts, covered their saffron robes with rain parkas, wrapped their drums in plastic bags and joined peace groups on Saturday to trek another 2½ miles to the Horsham Air Guard base to protest the planned ground-control command center for drone operations.

  • Targeting the Humanitarian Side of Drones

    Failure to account and justify lethal drone activity by the United States represents a major violation of international law and international human rights law, a former U.N. rapporteur said Wednesday.

    Since the beginning of drone attacks in 2001, the U.S. has conducted around 450 lethal drone strikes that have raised humanitarian and international legal issues.

  • International consensus emerging against Drones

    Although President Obama promised to make drone programme more transparent in May 2013, the follow up has rather been negligible as no new statement on drone policy or its legal framework has come out as yet. There is a need to ensure transparency of drone programme.

  • Drone strikers say the government is unfairly denying them jury trials

    In a ritual they have followed for nearly four years, they crisscrossed the four-way intersection near the gate, laying out the tools of their trade: anti-war banners, an American flag with a peace symbol instead of 50 white stars, a series of cardboard squares adorned with bright purple, battery-powered LED lights that spelled out the message “No Drones.”

    [...]

    They have been demonstrating since 2010 against unarmed surveillance drones based and operated at Beale that are used to pinpoint targets for armed killer drones in war zones and elsewhere overseas.

CIA

  • Letter: Decommission out-of-control CIA

    Congress recognizes no CIA claims of “privilege.” Congress has complete legal rights to review documents of any government agency. Any claim of “privilege” by any governmental branch is a bold announcement that they will not obey our laws: U.S. Constitution, Speech and Debate clause, and Fourth Amendment, Computer Fraud and Abuse Act, Executive Order 12333.

  • A Debate on Torture: Legal Architect of CIA Secret Prisons, Rendition vs. Human Rights Attorney

    As the Senate Select Committee on Intelligence feuds with the CIA over the declassification of its 6,000-page report on the agency’s secret detention and interrogation programs, we host a debate between former CIA acting general counsel John Rizzo and human rights attorney Scott Horton. This comes as the United Nations Human Rights Committee has criticized the Obama administration for closing its investigations into the CIA’s actions after Sept. 11. A U.N. report issued Thursday stated, “The Committee notes with concern that all reported investigations into enforced disappearances, torture and other cruel, inhuman or degrading treatment that had been committed in the context of the CIA secret rendition, interrogation and detention programmes were closed in 2012 leading only to a meager number of criminal charges brought against low-level operatives.” Rizzo served as acting general counsel during much of the George W. Bush administration and was a key legal architect of the U.S. interrogation and detention program after the Sept. 11 attacks. He recently published a book titled “Company Man: Thirty Years of Controversy and Crisis in the CIA.” Attorney Scott Horton is contributing editor at Harper’s magazine and author of the forthcoming book, “Lords of Secrecy: The National Security Elite and America’s Stealth Foreign Policy.”

  • Opinion: The CIA, running amok for 60 years
  • Guest Column: Government secrets: Too many held too long

    Recent controversies involving the NSA surveillance program and alleged CIA eavesdropping on Congress have dominated the news. This has led to healthy and heated discussions about clandestine activities of intelligence agencies to include the amount of classified information collected and how long it is maintained.

  • U.S. may expand Syrian assistance

    The Obama administration, stung by reversals in Ukraine and Syria, appears to have decided to expand its covert program of training and assistance for the Syrian opposition, deepening U.S. involvement in that brutal and stalemated civil war.

    The White House announced that President Obama discussed “the crisis in Syria” along with other subjects when he met Friday in Riyadh with Saudi King Abdullah, but the statement didn’t mention any details of the stepped-up Syria assistance program.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Links 27/4/2015: Debian 9 Named, Linux 4.1 Reaches RC

    Links for the day



  2. Microsoft is Interjecting Itself Into GNU/Linux and Free Software News, Even Events and Foundations

    Microsoft's entryism strategy is proving effective as Microsoft successfully embeds itself inside the idealogical competition, subverting the competition's overall message and diluting the competition's focus on Free software



  3. The Unethical Business of Selling Fear of Free/Libre Software Bugs (Black Duck, Sonatype, and Symantec)

    The spreading of fear of Free/Open Source software (FOSS) is now a growth industry, so proprietary opportunists are eager to capitalise on it, even if by distorting the truth



  4. Patients' Data at Risk as NHS Reinforces Its Microsoft/Accenture Stockholm Syndrome

    The worst privacy violator in the world and the firm behind LSE failures are pocketing as much as £0.35 billion of British taxpayers' money to acquire access to very sensitive data of British people



  5. Links 26/4/2015: Debian 8, OpenMandriva Lx 3 Alpha, Mageia 5 RC

    Links for the day



  6. Links 25/4/2015: Debian LTS Plans, Turing Phone Runs Linux

    Links for the day



  7. Who Kills Yahoo? It's Microsoft, Not Yahoo!

    The media should blame Microsoft, not Marissa Mayer, for what's going on (and has been going on for 7 years) at Yahoo!



  8. EPO Management is Trying Hard to Appease Its Critics While Pushing Forth Unitary Patent Agenda

    The European Patent Office and European Commission promote the agenda of large multinational corporations (at the expense or European citizens) and critics are being kept at bay



  9. Real Patent Reform Will Not Come From Biggest Backers of GNU/Linux, Not Even Google

    A look at the 'new' Google, the company which is hoarding patents (2,566 last year alone) instead of fighting for reform



  10. Microsoft's Troll Intellectual Ventures Loses Software Patents

    Intellectual Ventures is bluffing with software patents, but this time around it doesn't get its way



  11. Links 24/4/2015: Ubuntu and Variants in the News, Red Hat Developer Toolset 3.1

    Links for the day



  12. Links 23/4/2015: Ubuntu 15.04 is Out, Debian 8.0 Out Very Soon

    Links for the day



  13. Links 22/4/2015: Fedora 22 Beta, Atlassian Acquires BlueJimp

    Links for the day



  14. The Dying Debate Over Patent Scope (Including Software Patents) Replaced by 'Trolls' (But Not the Biggest Ones)

    The corporate media and Web sites or people who are funded by large corporations have essentially suppressed any debate about issues in the patent granting process, thereby guarding software patents and preventing criticism of large corporations' power grab



  15. The Patents Gold Rush Continues

    The morbid obsession with monopolising mere ideas still dominates the media, even increasingly in China



  16. 9 Millionth US Patent Tells a Story of Failure and USPTO Misconduct

    The USPTO, much like FISA (notorious court for surveillance/espionage authorisation), has become a rubber-stamping operation rather than a patents examination centre, as new evidence and old evidence serve to show



  17. HBO Helps Shift Debate Over Patents to 'Trolls' (Scale), Not Scope

    More of that awkward shifting of the patent debate towards small actors who are misusing patents, not large conglomerates like Apple and Microsoft which use patents to destroy competitors, crush startups, drive up prices, and so on



  18. Software Patents Are Still Menacing to Free Software: OIN Expands Scope, HEVC Adds to MPEG-LA Burden/Tax, Google and Facebook Give in on Patents

    A look at recent news about software patents and especially Free/libre software, which is inherently incompatible with them



  19. The Latest Developments Around Microsoft's Clever Attack on Android/Linux

    Microsoft's campaign of destruction, extortion, etc. against the most widely used Linux-powered operating system is revisited in light of new reports



  20. The Microsoft 'Community' is Maligning the Free Software Community

    Dishonest generalisations and baseless deductions portray the Free/Open Source software communities as a nasty place that leads to poverty and despair



  21. Googlebombing 'Microsoft Open Source' Even When Microsoft Shuts Down Its 'Open Source' Proxy

    A massive failure by the press to cover the most basic news, which is Microsoft putting an end to a supposedly 'Open Source' effort



  22. Links 22/4/2015: Calculate Linux 14.16, SparkyLinux 4.0 RC KDE

    Links for the day



  23. Links 21/4/2015: Project Photon, Ubuntu Touch Buzz

    Links for the day



  24. Embrace, Extend, Extinguish: How Microsoft Plans to Get Rid of Linux/Android

    Microsoft's sheer abuse against Android is laying bare for everyone to see now that Microsoft has paralysed Google's legal department with potential antitrust action in Europe



  25. Yahoo's Current CEO (Mayer, Formerly of Google) is Trying to End Yahoo! Status as Microsoft Proxy

    There are signs of relinquishing Microsoft's control over Yahoo! after Marissa Mayer worked to end the company's suicidal/abusive relationship with Steve Ballmer's Microsoft



  26. Repeating Microsoft's Lies Without Any Journalistic Assessment

    Poor fact-checking by relatively large media/news sites results in Microsoft's patently false claims being repeated uncritically



  27. Links 19/4/2015: New KaOS (2015.04), Manjaro Linux 0.8.13 Pre1

    Links for the day



  28. Links 18/4/2015: ExTiX 15.2, RaspArch

    Links for the day



  29. Microsoft Tired of Pretending to be Nice to Free/Open Source Software (FOSS), Microsoft 'Open' Technologies Dumped

    Microsoft dumps its proxy (misleadingly named 'Open Tech') and other attacks on Free software persist from the inside, often through so-called 'experts' whose agenda is to sell proprietary software



  30. More Translations of French Article About the EPO

    German and Dutch translations of the Le Monde article are now available


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts