Privacy Watch: Latest on NSA et al.
- Dr. Roy Schestowitz
- 2014-01-02 15:43:43 UTC
- Modified: 2014-01-02 15:44:59 UTC
Micorsoft
-
Scary. Insane. Ridiculous. Invasive. Wrong. The Washington Post reports that the FBI has had the ability to secretly activate a computer's camera "without triggering the light that lets users know it is recording" for years now. What in the hell is going on? What kind of world do we live in?
Marcus Thomas, the former assistant director of the FBI's Operational Technology Division, told the Post that that sort of creepy spy laptop recording is "mainly" used in terrorism cases or the "most serious" of criminal investigations. That doesn't really make it less crazy (or any better) since the very idea of the FBI being able to watch you through your computer is absolutely disturbing.
-
The FBI team works much like other hackers, using security weaknesses in computer programs to gain control of users’ machines. The most common delivery mechanism, say people familiar with the technology, is a simple phishing attack — a link slipped into an e-mail, typically labeled in a misleading way.
Snowden
-
Along with journalist colleagues Glenn Greenwald and Laura Poitras, I spent six days with Edward Snowden in Hong Kong. He had spent almost all of his short adult life working in America's spy agencies, but at the end of those six days, the unknown 29-year-old became one of the most famous faces on the planet. He went public in a Guardian video, revealing himself as the source of one of the biggest leaks in western intelligence history.
-
Only three months after the Snowden leaks on NSA snooping began, we learn from Ars Technica that the developers at FreeBSD have decided to rethink the way they access random numbers to generate cryptographic keys. Starting with version 10.0, users of the operating system will no longer be relying solely on random numbers generated by Intel and Via Technologies processors. This comes as a response to reports that government spooks can successfully open some encryption schemes.
-
Agency Implementing 2-Person Rule, Increasing Encryption Use
Greenwald
Machon
-
While British politics and media display a strong reluctance to confront the harsh realities of UK spying, we should be worried about further revelations of a dystopian, Orwellian surveillance system gone global, former MI5 agent Annie Machon told RT.
-
Here’s an RT inter€view I did about the media response to Edward Snowden, the media response, pri€vacy and what we can do.
Obama
-
The facts that we know so far – from Fisa court documents to LOVEINT – show that the NSA has overstepped its powers
-
Before he left for Hawaii, the president was sending signals that government surveillance programs need an overhaul to restore the public’s faith on issues of national security.
Judgement
-
The September 11th terrorist attacks revealed, in the starkest terms, just how dangerous and interconnected the world is. While Americans depended on technology for the conveniences of modernity, al-Qaeda plotted in a seventh-century milieu to use that technology against us. It was a bold jujitsu. And it succeeded because conventional intelligence gathering could not detect diffuse filaments connecting al-Qaeda.
Prior to the September 11th attacks, the National Security Agency (“NSA”) intercepted seven calls made by hijacker Khalid al-Mihdhar, who was living in San Diego, California, to an al-Qaeda safe house in Yemen. The NSA intercepted those calls using overseas signals intelligence capabilities that could not capture al-Mihdhar’s telephone number identifier. Without that identifier, NSA analysts concluded mistakenly that al-Mihdhar was overseas and not in the United States. Telephony metadata would have furnished the missing information and might have permitted the NSA to notify the Federal Bureau of Investigation (“FBI”) of the fact that al-Mihdhar was calling the Yemeni safe house from inside the United States.
1984
-
A Scottish sci-fi writer has cancelled the last instalment in a trilogy about high-tech government spying after discovering that the NSA has been doing exactly what he described in his books.
-
Snowden in 2013 revealed what George Orwell in 1949 had already revealed in 1984: that Big Brothers who spy on their citizens will go on to do very bad things. He then asked for asylum in a country with a long history of its own citizens seeking asylum from his country.
Sci-FI Made Real
Many Americans might never notice or care. I remember when telephone calls were considered to be private. In the 1940s and 1950s the telephone company could not always provide private lines. There were “party lines” in which two or more customers shared the same telephone line. It was considered extremely rude and inappropriate to listen in on someone’s calls and to monopolize the line with long duration conversations.
-
A leaked NSA cyber-arms catalog has shed light on the technologies US and UK spies use to infiltrate and remotely control PCs, routers, firewalls, phones and software from some of the biggest names in IT.
The exploits, often delivered via the web, provide clandestine backdoor access across networks, allowing the intelligence services to carry out man-in-the-middle attacks that conventional security software has no chance of stopping.
Corporate and Other
-
Kelly hired David Cohen, the former head of the C.I.A.’s spy division, to run the force’s intelligence outfit. Cohen, a trained economist known to be intensely loyal to his superiors (and profane with everyone else), created the Demographics Unit, which imbedded special recruits in eighteen Muslim neighborhoods to monitor every aspect of daily life. At the same time, Kelly created the International Liaison Program, which posted detectives in eleven hot spots overseas, including London, Paris, Madrid, Abu Dhabi, and Tel Aviv. “We’ve reorganized the department to accommodate this world view,” Kelly said. “You might say that the N.Y.P.D. has aspired to become a Council on Foreign Relations with guns.”
-
We have all heard by now of the massive surveillance being conducted by the NSA and other governments across the world. China is a well-known anti-privacy country and others have decided to also spy on their citizens’ social network activities amongst other things. The Internet censorship trends are getting pretty bad.
-
Older teenagers have turned their backs on Facebook, an EU-funded study has found. Young people are opting for alternative social networks like Twitter and WhatsApp, while the "worst people of all, their parents, continue to use the service."
Recent Techrights' Posts
- Libya's Share on the Web: 5.2% GNU/Linux
- GNU/Linux has hit an all-time high there
- Codecs and Software Patents - Part VI - The European Patent Office, Nokia, Microsoft, Sisvel, and More
- Whatever Nokia used to be, it's certainly not an ally and a lot of the turmoil at the EPO is the fault of companies like Nokia
-
- Links 11/05/2026: The Solicitors Regulation Authority (SRA) Admits It Only Reacts When It's Too Late (Damage Already Done), Ombudsman’s Animal Cruelty HK Report
- Links for the day
- If It Takes You a Second to Serve (or Receive) a Page, That's Definitely Too Slow
- For speeds at milliseconds (e.g. for pages to fully load in a tenth of a second) the pages must be ready to be sent as soon as they're requested
- It's Not About Speed, It is About Patience and Adherence to Truth, Principles, Scientific Integrity
- attacks on us only ever made us stronger - a lesson that our adversaries have learned the hard way
- Cyber Show Does it Like Techrights: Static and Gemini Protocol as 'First-Class Citizen'
- HTML and GemText (over Gemini Protocol) would be rendered in tandem
- SLAPP Censorship - Part 73 Out of 200: Microsoft's Graveley and Garrett Remain Closely Connected in May 2026 ("Tag-Teaming" Against Bloggers in Another Continent)
- The phrase "judge a person by their friends" seems applicable here
- Discussions About When the Axe Falls at IBM/Kyndryl (11,000 Layoffs Estimated)
- "Kyndryl restructuring should reduce overhead functions and reduce the number of managers that lack technical knowledge"
- A World After Microsoft (and GAFAM) and After GitHub Shuts Down
- the only growth area is debt
- Fake News, Propaganda, and Misinformation: Microsoft Investing Money It Does Not Have in "Hey Hi" (for "Entertainment Purposes" Only)
- This will not end well
- Today the Whole European Patent Office (EPO) is on Strike and Next Monday an Even Bigger Strike
- the media refuses to cover these and is thus complicit
- The Corrupt Lecture the Non-Corrupt - Part IXX - EPO Management Speaks of Reputation and Integrity While Putting Cocaine Addicts in Management
- If the EPO values its "reputation", then it needs to start by ousting the management
- Over at Tux Machines...
- GNU/Linux news for the past day
- IRC Proceedings: Sunday, May 10, 2026
- IRC logs for Sunday, May 10, 2026
- Links 11/05/2026: Security Breaches, Politics, and Energy Crunch
- Links for the day
- Gemini Links 10/05/2026: "Accidental Cameras" and "Addictive" Interfaces in Social Control Media
- Links for the day
- Codecs and Software Patents - Part V - A Reminder That GAFAM and the European Patent Office (Which Serves American Monopolists) Do Considerable Harm to the Commons and Culture
- some 'breaking' developments
- Gemini Links 10/05/2026: Inkscape, Guix, and Alhena 5.5.8
- Links for the day
- The "Alicante Mafia" at the European Patent Office (EPO) Experiments With New Methods for Crushing Industrial Actions
- Open letter to VP1 and the COO [...] What does this tell us about the status quo at the European Patent Office, Europe's second-largest institution?
- The Corrupt Lecture the Non-Corrupt - Part XVIII - "The European Patent Office (EPO) has a zero-tolerance policy for fraud" (except when managers do it)
- The guidebook of the EPO says fraud is not to be tolerated, but who enforces or revisits such "Red Lines"?
- Links 10/05/2026: Hantavirus Brings Back 'Contact Tracing' Surveillance, "Staple Food Prices Soar in Iran"
- Links for the day
- Microsoft XBox Staff Know They're in Trouble, They Try to Unionise Ahead of Mass Layoffs
- As the slang goes, it's going to be a "bloodbath"
- Links 10/05/2026: Fake Suicide Notes and New EU Restrictions on Slop
- Links for the day
- SLAPP Censorship - Part 72 Out of 200: Microsoft's Graveley and Garrett Signed Documents That Hold Them Accountable to Truth and Liable for Lies
- Such collaborations are unsavoury and apparently unprofessional, too
- Over at Tux Machines...
- GNU/Linux news for the past day
- IRC Proceedings: Saturday, May 09, 2026
- IRC logs for Saturday, May 09, 2026
- Gemini Links 10/05/2026: Travelling to Van and "Dark Mode" as Passing Fad
- Links for the day
- IBM's Kyndryl Holdings Inc Sank 70-75% in 'Value' in 10 Months, Will IBM Follow?
- Kyndryl Holdings Inc now has a debt considerably higher than this company is said to be 'worth'!
- Belated Sovereignty: GNU/Linux in Iran Skyrockets to 6% Amid Armed Conflict
- unless they're truly in control of their networks, hardware and software, somebody else can control them
- Gemini Links 09/05/2026: Liberation, The Nocturnals, Rediscovering Internet Radio, and More
- Links for the day
- Links 09/05/2026: Kremlin’s Biggest Day of the Year and FBI's Attack on the Media (to Save Face)
- Links for the day
- Google is "Bullshit"
- Fix your slop, Google. It's broken.
- SLAPP Censorship - Part 71 Out of 200: 5RB Barristers Made Tens of Thousands of Pounds by Changing From Plural to Singular for Microsoft's Graveley and Garrett
- Could not even get the client's name right
- Links 09/05/2026: "Grand Theft Oil Futures" and Mass Layoffs at Verizon
- Links for the day
- Gemini Links 09/05/2026: Inkscape "Copy Text Style" and NomadNet
- Links for the day
- The Corrupt Lecture the Non-Corrupt - Part XVII - European Patent Office (EPO) Management Not Sharing Responsibility for Financial Resources
- For those who wonder, EPO strikes are still going on
- Over at Tux Machines...
- GNU/Linux news for the past day
- IRC Proceedings: Friday, May 08, 2026
- IRC logs for Friday, May 08, 2026