Another Day of High-Level Abuses: Microsoft Kinect a Target of Spooks, Apple-PRISM Allegations, Ukraine Interventions...
- Dr. Roy Schestowitz
- 2014-03-01 10:39:31 UTC
- Modified: 2014-03-01 10:39:31 UTC
Summary: News from the past 24 hours about British and US surveillance, assassination, and outside intervention in East Europe
NSA/GCHQ
-
Nothing To Hide is an "anti-stealth game," in which you must carry cameras and spy gear to live in a world of self-surveillance and self-censorship. A world where you're made to be your own watchdog. Released for The Day We Fight Back, the game is now seeking crowdfunding to complete the open source game—10% of what's raised will first go to the Electronic Frontier Foundation (EFF), Demand Progress, and the Freedom of the Press Foundation.
-
Psssst! Wanna come in on a private satellite with me? They're available, and they cost about $2m a year to run, so it would need an awful lot of us to club together via Kickstarter or some such.George Clooney's got one. He trains it between Sudan and South Sudan, keeping a particular eye on the Hague-wanted president Omar al-Bashir, and uses the footage to draw attention to human rights violations. But in the wake of news that the Optic Nerve programme targeted and retained the webcam images of 1.8m UK internet users not suspected of wrongdoing, I'd like you to consider pointing ours somewhere pointed, such as the NSA or GCHQ. Just their car parks would do.
-
THE MOST INTERESTING DEVICE shown at Mobile World Congress (MWC) in Barcelona this week was the secure Blackphone developed by Silent Circle and Geeksphone.
-
"Whatever the level of cryptography you're using, the NSA can probably break into your home network, install keyloggers and grab whatever they want -- passwords, private PGP keys, screenshots, etc.," said Cyril Soler, a developer on the RetroShare project. "This is always easier than breaking the encryption." Their ability to do that is probably facilitated by backdoors.
-
Levison was prohibited from discussing any details of the case until last October, when the court unsealed a portion of the documents. The unsealed records reveal that the FBI was demanding access to Lavabit's Secure Sockets Layer (SSL) keys, which would essentially allow the agency access to all messages on Lavabit's server. While the FBI was ostensibly targeting only a single user, Levison was unwilling to sacrifice the privacy of his other 400,000+ users.
-
This year's RSA Conference began with controversy. Even before Chairman Art Coviello took the stage to deliver his opening keynote, protesters unfurled banners on the Moscone Center reminding the world of RSA's alleged complicity in enabling the NSA to access data that was believed to be secure.
However, after an interview with Coviello, we are no closer to any meaningful information as he does a skilful job of obfuscating and avoiding questions regarding the NSA.
Webcams
-
Three senators condemn UK spy agency’s ‘breathtaking lack of respect’ over interception of Yahoo users’ webcam images
Microsoft
-
G.C.H.Q. was apparently also interested in tapping into Microsoft’s Kinect.
-
The Kinect for Xbox 360 was once considered for its potential use as a mass surveillance tool by the British Government Communications Headquarters (GCHQ), according to documents published by The Guardian.
The GCHQ is the British equivalent to the United States' NSA.
The information comes from documents leaked by NSA whistleblower Edward Snowden. They document a program entitled "Optic Nerve" that collected images of users through their webcams, including users of Yahoo chats between 2008 and 2010.
Messaging
-
The instant messenger is still in the early planning stages, but Tor's developers seem to be preparing to turn it around quickly. The messenger will be built on Instantbird, an existing open-source messenger, and development will largely involve adding in Off-the-Record Messaging encryption, making it send its messages over Tor, and stripping it of some automated logging and reporting features. Tor hopes to have its first step of work on the messaging app completed by the end of March, but it doesn't draw a timeline for the project out from there.
-
Tor, the team behind the world’s leading online anonymity service, is developing a new anonymous instant messenger client, according to documents produced at the Tor 2014 Winter Developers Meeting in Reykjavík, Iceland.
The Tor Instant Messaging Bundle (TIMB) is set to work with the open-source InstantBird messenger client in experimental builds released to the public by March 31, 2014. The developers aim to build in encrypted off-the-record chatting and then bundle the client with the general Tor Launcher in the following months.
-
Sutton displays precisely the mind-set of the security state, that led GCHQ to intercept the webcam chats of 1.4 million completely random British people, in the hope of finding Islamic terrorists. (They didn’t find any terrorists, but they did look at over 100,000 people masturbating). Sutton states that Begg must be a terrorist because ”a convicted Groupe Islamique Armé (GIA) supporter identified as ‘D’ ” had used Begg’s bookshop. And he calls me “conspiratorial”! The poor man must see terrorists everywhere. The fact that Moazzam Begg is now detained again, had been detained for years, has had everything belonging to him searched microscopically, and nothing has ever been found to justify a criminal charge of any kind, means nothing to witchfinder Sutton. That anti-Muslim bigot is plainly convinced of Moazzam Begg’s guilt, though as he has not been charged, of what is unsure.
Simon Phipps on Spying
-
Facebook’s acquisition of WhatsApp gains them almost half a billion users worth of telephone data
-
Maybe there’s more to the Facebook acquisition of WhatsApp than just the centralised consolidation of users and user information that Simon denounced in his previous InfoWorld article . Perhaps this particular addition to their portfolio is Facebook’s move towards becoming the first truly global telco!
-
Knowing we could be watched, as Jeremy Bentham observed, changes our behaviour; specifically, it chills our creativity. This in turn affects innovation and hence the economy. More directly, businesses (like RSA) are harmed by the disclosure of their for-profit collusion.
ORG
-
Asking for comments and feedback on the code is a positive move, but the survey is not balanced to capture a variety of opinions. For example it asks whether the code explains the benefits of anonymisation, but not whether it explains the risks. And it doesn't.
Apple
[First, watch AOL
promoting the fiction that iMessage is secure. It's
not alone.]
-
If you are an iPhone owner, you may have noticed that a minor security update to the iOS software that runs you device was “pushed” to all users by Apple last Friday. The original explanation from Apple was that an attacker “with a privileged network position” could capture or modify data.
-
According to slide 6 in the leaked PowerPoint deck on NSA’s PRISM program, Apple was “added” in October 2012.
These three facts prove nothing; it’s purely circumstantial. But the shoe fits.
Sure would be interesting to know who added that spurious line of code to the file. Conspiratorially, one could suppose the NSA planted the bug, through an employee mole, perhaps. Innocuously, the Occam’s Razor explanation would be that this was an inadvertent error on the part of an Apple engineer. It looks like the sort of bug that could result from a merge gone bad, duplicating the goto fail; line.
-
Twice now that Apple's bypassed Snow Leopard when it patched newer editions
-
The critical iOS vulnerability that Apple patched last week is an excellent example. Look at the code. What caused the vulnerability is a single line of code: a second "goto fail;" statement. Since that statement isn't a conditional, it causes the whole procedure to terminate.
Alexander
-
General Keith Alexander, the soon-to-be departed chief of the NSA, admitted Thursday in front of a congressional committee that the massive intelligence agency may be open to extracting less, or more targeted metadata from communication companies.
Classified documents leaked last summer by NSA whistleblower Edward Snowden revealed that the intelligence agency currently compels at least three major telephone providers – Verizon, Sprint, and AT&T – to turn over call information on millions of Americans. Among that information, known as metadata, is the duration of the call, the time the call was made, who the phone call was to, and where it originated.
Ukraine and Intervention
-
"Yats is the guy," said Obama's potty-mouthed Assistant Secretary of State for European and Eurasian Affairs, Victoria Nuland, in a recorded and widely disseminated discussion with the U.S. Ambassador to Ukraine earlier this year. She was referring to Arseni Yatsenyuk, the former foreign and economics minister who was confirmed as the interim Prime Minister of Ukraine today.
-
The very first act of the western-backed insurrectionists which represent a small percentage of the population and have managed to overthrow the government was to attempt rob Russian speakers in Ukraine of their language.
-
Yanukovych is now in Russia and is expected to hold a news conference today. Meanwhile, the United States is rejecting claims that the change in power in Ukraine constitutes a coup. On Thursday, White House spokesperson Jay Carney said Yanukovych had "abdicated his responsibilities" and "undermined his legitimacy" by fleeing Kiev. Carney outlined U.S. plans to work with the new government.
-
But the secretive agency is no newcomer to American combat zones. In Vietnam, a war without battle lines, it played a behind-the-scenes role in advancing American interests.
-
Soon, intrepid journalists get wind of the operation and file Freedom of Information Act requests for more information. A CIA lawyer — operating under the cover name Walt Logan — thinks up a novel way to keep the mission secret without telling an all-out lie: refuse to confirm or deny whether records about the Glomar Explorer's mission exist. One journalist sues over this confusing non-response, and a battle over government secrecy follows in court.
[...]
There are limited circumstances in which a Glomar response may be necessary to protect veritable government secrets, but as I've written before in The New York Times (with Jameel Jaffer) and in the NYU Law Review, it has been deployed far beyond acceptable bounds. Perhaps most disturbing is the way the government uses Glomar to facilitate selective and misleading disclosures. Government officials often "leak" information to the press that paints controversial programs in a positive light on the condition that the press withholds their names. But when asked to officially release records under FOIA, those officials clam up and hide behind the Glomar response. The result is an absurd double standard, and our democracy suffers for it.
Civil Rights
-
The interrogators told him he was under interrogation for publishing a picture of Jerusalem City Council Head, Nir Barkat, describing him as the “mayor of occupied Jerusalem”.
-
Months after their conduct was discovered, two police officers were disciplined for making a game of stealing signs from homeless people in Midland, Texas — and many believe the cops’ punishment was not harsh enough to fit the offense.
-
Moazzam Begg, a native-born British citizen of Pakistani descent, spent three years incarcerated in the most notorious detention camps created in the post-9/11 “War on Terror”: all without ever being charged with any crime.
-
Britain’s citizenship deprivation processes may help obscure the Obama Administration’s willingness to kill and kidnap Britons.
-
Five years into his presidency, it’s clear Obama failed to keep promises he claimed were at the heart of his approach to governance. We expected better.
-
Idaho’s governor has signed a bill into law that makes it illegal for undercover investigators and whistleblowers to expose animal cruelty on factory farms and slaughterhouses.
-
The Whist€ler, the new whis€tleblower sup€port net€work in the UK, recently held an inter€na€tional pre-launch in London.
The Whist€ler has been set up by Gavin Mac€Fa€dyen, Dir€ector of the Centre for Invest€ig€at€ive Journ€al€ism and Eileen Chubb of Com€pas€sion in Care.
Both, through their work, real€ise the heavy price that all whis€tleblowers from every sec€tor have to pay, not just pro€fes€sion€ally, but also socially, psy€cho€lo€gic€ally and also poten€tially leg€ally. And they want to help.
Drones
-
Pakistani anti-drone activist Karim Khan was abducted February 5, just before he was due to travel to Europe to speak out about U.S. drone strikes. He joins us to describe how he was held for nine days. During that time he says he was repeatedly tortured and beaten. In 2009, a U.S. drone killed Khan’s brother and son. He joins us from London, where he traveled to to meet with British lawmakers to raise concerns about the U.S. drone program. "They attacked our mosques, they attacked our schools, they attacked our schoolchildren, they attacked our teachers," Khan says. "So everything is completely destroyed by these drone strikes." We also speak with Khan’s lawyer, Shahzad Akbar. "This is what the human face of the victim is, and it is important that the American people are told about who these people are," Akbar says. "They are being targeted in the name of national security, [but] what we see on the ground is that it is not really serving the national security interests of anyone."
Recent Techrights' Posts
- Nonfree Software in My Bank, by Richard Stallman
- Updated 8 hours ago
- Richard Stallman is Usually Right Because He Thinks "Outside the Box"
- he is able to observe society (mores and norms) as somewhat of an outsider
-
- Links 29/07/2025: More Pushbacks Against Slop and More Praises of Tom Lehrer
- Links for the day
- Gemini Links 29/07/2025: Purple Yarrow and Understanding Op Amps
- Links for the day
- This Monday WebProNews Absolutely Flooded the Web With Fake (LLM Slop) 'Articles' About "Linux", Google News Promoted Them as Legitimate
- All of the following are fake articles attributed to pseudonyms or authors that don't exist; the images are also slop. Why does Google promote these?
- Linuxiac is Not a Slopfarm, But at Least Some of Its Articles Are Machine-Generated Fakes
- what we said about it was correct
- Expect More Microsoft Layoffs
- "Are more job cuts coming?"
- Microsoft Behaving Like It's Running Out of Money to Pay Salaries
- Does that seem like the behaviour expected from a company which claims it is "worth" trillions?
- LWN Downtime Due to Linode, Not LLM Bots
- "I’ve received an email letting me know that there is a potential for data loss."
- Over at Tux Machines...
- GNU/Linux news for the past day
- IRC Proceedings: Monday, July 28, 2025
- IRC logs for Monday, July 28, 2025
- Links 28/07/2025: Science, Health, and Conflicts
- Links for the day
- Gemini Links 28/07/2025: Healthy Self-Image With Autism and a "New Life"
- Links for the day
- Links 28/07/2025: COVID-19 Sped up Brain Aging, "Circumvention is More Popular Than Compliance"
- Links for the day
- LWN Has Been Down for a Long Time, Another Casualty of LLM Bots?
- Time will tell. How much time though?
- Slopfarms Versus 'Linux' (and Against People Who Write Real Articles About GNU/Linux)
- LLM slop in slopfarms by Brian Fagioli and Redazione RHC
- Gemini Links 28/07/2025: Bila Yarrudhanggalangdhuray and Running pkgsrc in a FreeBSD Jail
- Links for the day
- Microsoft Turns News Sites Into Spamfarms
- Is the site The Register MS the next IDG?
- The Register MS/The Register US
- On Saturday I contacted them for a comment (before issuing criticism)
- Hacking revelations at Vatican Jubilee of Digital Missionaries
- Reprinted with permission from Daniel Pocock
- Over at Tux Machines...
- GNU/Linux news for the past day
- IRC Proceedings: Sunday, July 27, 2025
- IRC logs for Sunday, July 27, 2025
- The Week to Come
- Planning ahead
- LLM Slop Has Only Been a Boon for Misinformation Online
- The very same companies that were supposed to maintain quality (again, not limited to Google with PageRank) are now actively participating in generating and spreading slop
- When They Tell You It's Free, Does That Mean No Charges (If So, Who's Paying and Why)?
- there's "no free lunch"
- We're Going to Focus Less on the Molotov Cocktail-Throwing Microsofters and More on Patents
- We can get back to focusing on what we wanted to focus on all along
- Just Trying to Keep Web Sites Honest (Journalistic Integrity)
- the latest articles in LinuxIac are real
- Links 27/07/2025: Political Affairs, Data Breaches, Attacks on Freedom of the Press
- Links for the day
- Gemini Links 27/07/2025: Hot in Japan and Terminal Escape Codes
- Links for the day
- Links 27/07/2025: More Microsoft Layoffs Coming, Science and Hardware News
- Links for the day
- Links 27/07/2025: FSF Hackathon and "Hulk Hogan Was a Very Bad Man"
- Links for the day
- Gemini Links 27/07/2025: DAW Mixer Chains and Simple Software
- Links for the day
- The Register MS is Inventing or Giving Air Time to New Conspiracy Theories so as to Distort the Narrative As High-Profile Agencies Fall Prey to Microsoft Holes
- But the problem is holes, i.e. Microsoft making bad products; the problem is Microsoft
- Most Editors at The Register Are American, Including the Editor in Chief, a Decade-Long Microsoft Stenographer (Writing Prose to Sell Microsoft)
- It's not easy to tell where the site is based (we tried) because it's hiding behind ClownFlare and CrimeFlare hasn't been well lately
- Pushers of systemd Rewrite History (Richard Stallman Said UNIX "Was Portable and Seemed Fairly Clean")
- Unlike systemd
- "New Techrights" Soon Turns 2 (A Few Days Before the FSF Turns 40)
- We have a lot more to say about LLM bots
- When Silence Says So Much
- Garrett, a 'secure' boot pusher, will need to defend himself in the UK High Court
- The Register in Trouble
- There is not much that can be done at this point
- Trajectory of The Register: From News Site/s Into "B2B"... and Into Microsoft Salespeople
- Something isn't right at The Register
- Over at Tux Machines...
- GNU/Linux news for the past day
- IRC Proceedings: Saturday, July 26, 2025
- IRC logs for Saturday, July 26, 2025
- Misinformation in Social Control Media
- Social control media passes around all sorts of tropes
- Slopwatch: Fake Linux 'Articles' and Slopfarms With "Linux" in Their Names/Domains
- throwing bots at "Linux" to make some fake articles