Category Archives: Privacy

NSA Said to Exploit Heartbleed Bug for Intelligence for Years

By Michael Riley
Bloomberg: April 11, 2014

The U.S. National Security Agency knew for at least two years about a flaw in the way that many websites send sensitive information, now dubbed the Heartbleed bug, and regularly used it to gather critical intelligence, two people familiar with the matter said.

The agency’s reported decision to keep the bug secret in pursuit of national security interests threatens to renew the rancorous debate over the role of the government’s top computer experts. The NSA, after declining to comment on the report, subsequently denied that it was aware of Heartbleed until the vulnerability was made public by a private security report earlier this month.

“Reports that NSA or any other part of the government were aware of the so-called Heartbleed vulnerability before 2014 are wrong,” according to an e-mailed statement from the Office of the Director of National Intelligence.

Heartbleed appears to be one of the biggest flaws in the Internet’s history, affecting the basic security of as many as two-thirds of the world’s websites. Its discovery and the creation of a fix by researchers five days ago prompted consumers to change their passwords, the Canadian government to suspend electronic tax filing and computer companies including Cisco Systems Inc. (CSCO) to Juniper Networks Inc. to provide patches for their systems.

Putting the Heartbleed bug in its arsenal, the NSA was able to obtain passwords and other basic data that are the building blocks of the sophisticated hacking operations at the core of its mission, but at a cost. Millions of ordinary users were left vulnerable to attack from other nations’ intelligence arms and criminal hackers

(Read the full article at Bloomberg)

—-
Alternative Free Press – fair use –

NSA gathered “explicit sexual material regarding religious conservatives … for the purpose of exposing”

No legal means exist to challenge mass surveillance – Snowden

No legal means exist to challenge mass surveillance, said NSA whistleblower Edward Snowden, testifying to the Parliamentary Assembly of the Council of Europe.

[…]

“I would like to clarify that I have no intention of harming the US government or straining bilateral ties between any nations. My motivation is to improve the government, not to bring it down,” Snowden said.

The NSA gathered “explicit sexual material regarding religious conservatives whose political views it disfavored and considered radical for the purpose of exposing it to damage their reputations and discredit them within their communities,” Snowden told PACE.

“This is an unprecedented form of political interference that I don’t believe can be seen elsewhere in western governments,” he went on. “But no legal means currently exist to challenge such activities or to see penalties for such abuses,” he said.

Mass surveillance is also used by the NSA, as well as by its partners and adversaries, for the purposes of economic espionage, Snowden said.

“The NSA had unlawfully compromised the world’s major transaction facilities to include SWIFT and Visa. And in their reports they explicitly noted that such information provided “rich personal information” including data that “is not about our targets,” Snowden told the parliamentarians gathered in Strasbourg.

Testifying to the PACE parliamentary hearing, Snowden was asked if the NSA, Britain’s GCHQ or other spy services engage in sophisticated analysis of the data captured by surveillance programs such as PRISM. According to the whistleblower, such analysis does take place. Spy agencies also use algorithms of the kind widely used in commercial data-mining to seek out further people of interest.

He explained, in particular, how NSA analyzes the so-called “digital fingerprints.”The “fingerprint” technology is used to construct a unique signature for any individual or group’s communications, which are often comprised of “selectors, such as e-mail addresses, phone numbers or user names,” Snowden said. This allows state security agencies “to instantly identify the movements and activities of you, your computers or other devices, your personal internet accounts or even key words of other uncommon strings that indicate an individual, or group, out of all the communications they intercept in the world are associated with that particular communication.”

And that is just a small part of the NSA’s fingerprinting capability, the whistleblower said, adding that any kind of internet traffic caught by mass surveillance technologies can be analyzed and searched with little effort.

The technique allows security agencies to identify a person with a certain social or religious group, or by business interactions. In fact, “there are very few practical limitations to the kind of analysis that can be technically formed in this manner.”

Snowden also spoke about the NSA surveillance tool called XKeyscore, which gives spy agency a technical ability to track entire populations of individuals through unencrypted communications.

“It is a trivial task, for example, to generate lists of home addresses for people matching the targeted criteria… or even to analyze the nature and proximity of their social connections,” he said.

Snowden added, however, that there are no “nightmare scenarios” where the US government would, for instance, compile lists of gay people. But that still implicates human rights, Snowden said, underlining that it is necessary to develop international standards to protect people against such abuses.
Rights groups not exempt from NSA snooping

Snowden said that mass surveillance was a “global problem,” not just a problem for the US or for the European Union.

“We need to be clear with our language: these practices are abusive. This is clearly a disproportional use of an extraordinary invasive authority, an extraordinary invasive means of investigation taken against entire populations rather than the traditional investigators standard of using the least intrusive means or investigating specifically named targets or groups,” Snowden told PACE’s Legal Affairs Committee, adding that these violations of human rights must be addressed.

Giving evidence by video link to the committee in Strasbourg, Snowden said that the NSA deliberately snooped on international human rights organizations, such as Amnesty International and Human Rights Watch.

“The NSA has, in fact, specifically targeted the communications of either leaders or staff members in a number of purely civil or purely human rights organizations…including domestically, within the borders of the US,” he said in live testimony, without referring specifically to the organizations by name.

(Read the full article at RT)

—-
Alternative Free Press – fair use –

Police Conduct Warrantless Searches on All Transit Users

Boston Transit Police Conducts Warrantless Searches on All Bus, Subway Riders

Kit Daniels
Infowars: April 7, 2014

In accordance with the Department of Homeland Security, the Massachusetts Bay Transportation Authority is now requiring that all Boston bus and subway riders submit to a warrantless search prior to boarding.

The MBTA transit police announced that everyone will be stopped and searched at “Transit Watch” checkpoints and that anyone declining a search will be ordered to leave the station, even though the area is public property.

“All persons choosing to use the MBTA transit system will be subject to security inspections of their handbags, briefcases and/or other carry-on items,” a Transit Watch pamphlet reads. “Any person refusing to allow a security inspection will be either denied entry or requested to leave MBTA property.”

The pamphlet also warns that anyone refusing to leave the station when requested will be subject to arrest “for trespass pursuant to M.G.L. 266, Section 120.”

“It is unclear how the trespassing law would apply given that the area is public property and it is not a crime to exercise your Fourth Amendment rights,” the Bay State Examiner reported on the subject.

The news outlet also pointed out that travelers could not see the signage warning them about the searches until they arrived at a checkpoint.

Last year, the Transportation Security Administration set up similar checkpoints inside the transit stations, making it clear that these new checkpoints are simply a continuation of the same.

And such warrantless searches on public transportation aren’t just limited to Boston. Back in 2012, TSA agents randomly interrogated bus riders in Houston, Texas while digging through their belongings without a warrant.

“I don’t feel like by purchasing a ticket or riding a bus that I have to forfeit my Constitutional rights and my protections and be subject to search or seizure,” passenger Derrick Broze told METRO board members during a heated meeting.

But DHS has every intention to do just that and even worse, governments around the world are pressuring citizens to take public transportation rather than their own vehicles.

The city of Hamburg, Germany is even working to ban cars within its city limits in the coming decades.

It isn’t too far-fetched to envision a future where individuals who want to travel have no choice but to take public transportation which requires invasive, TSA-style screening prior to boarding.

(Read the full article at Infowars)

—-
Alternative Free Press – fair use –

Al Sharpton’s Secret Work As FBI Informant

By William Bastone with Andrew Goldberg & Joseph Jesselli
The Smoking Gun: April 7, 2014

When friends and family members gathered recently at the White House for a private celebration of Michelle Obama’s 50th birthday, one of the invited partygoers was a former paid FBI Mafia informant.

That same man attended February’s state dinner in honor of French President Francois Hollande. He was seated with his girlfriend at a table adjacent to President Barack Obama, who is likely unaware that, according to federal agents, his guest once interacted with members of four of New York City’s five organized crime families. He even secretly taped some of those wiseguys using a briefcase that FBI technicians outfitted with a recording device.

The high-profile Obama supporter was also on the dais atop the U.S. Capitol steps last year when the president was sworn in for a second term. He was seated in front of the chairman of the Joint Chiefs of Staff, two rows behind Beyonce and Jay Z, and about 20 feet from Eric Holder, the country’s top law enforcement officer. As head of the Department of Justice, Attorney General Holder leads an agency that once reported that Obama’s inauguration guest also had La Cosa Nostra contacts beyond Gotham, and engaged in “conversations with LCN members from other parts of the United States.”

The former mob snitch has become a regular in the White House, where he has met with the 44th president in the East Room, the Roosevelt Room, and the Oval Office. He has also attended Obama Christmas parties, speeches, policy announcements, and even watched a Super Bowl with the First Family (an evening the man has called “one of the highlights of my life”). During these gatherings, he has mingled with cabinet members, top Obama aides, military leaders, business executives, and members of Congress. His former confederates were a decidedly dicier lot: ex-convicts, extortionists, heroin traffickers, and mob henchmen. The man’s surreptitious recordings, FBI records show, aided his government handlers in the successful targeting of powerful Mafia figures with nicknames like Benny Eggs, Chin, Fritzy, Corky, and Baldy Dom.

Later this week, Obama will travel to New York and appear in a Manhattan hotel ballroom at the side of the man whom FBI agents primarily referred to as “CI-7”–short for confidential informant #7–in secret court filings. In those documents, investigators vouched for him as a reliable, productive, and accurate source of information about underworld figures.

The ex-informant has been one of Obama’s most unwavering backers, a cheerleader who has nightly bludgeoned the president’s Republican opponents in televised broadsides. For his part, Obama has sought the man’s counsel, embraced him publicly, and saluted his “commitment to fight injustice and inequality.” The president has even commented favorably on his friend’s svelte figure, the physical manifestation of a rehabilitation effort that coincided with Obama’s ascension to the White House. This radical makeover has brought the man wealth, a daily TV show, bespoke suits, a luxury Upper West Side apartment, and a spot on best seller lists.

Most importantly, he has the ear of the President of the United States, an equally remarkable and perplexing achievement for the former FBI asset known as “CI-7,” the Rev. Al Sharpton.

A lengthy investigation by The Smoking Gun has uncovered remarkable details about Sharpton’s past work as an informant for a joint organized crime task force comprised of FBI agents and NYPD detectives, as well as his dealings with an assortment of wiseguys.

Beginning in the mid-1980s and spanning several years, Sharpton’s cooperation was fraught with danger since the FBI’s principal targets were leaders of the Genovese crime family, the country’s largest and most feared Mafia outfit. In addition to aiding the FBI/NYPD task force, which was known as the “Genovese squad,” Sharpton’s cooperation extended to several other investigative agencies.

TSG’s account of Sharpton’s secret life as “CI-7” is based on hundreds of pages of confidential FBI affidavits, documents released by the bureau in response to Freedom of Information Act requests, court records, and extensive interviews with six members of the Genovese squad, as well as other law enforcement officials to whom the activist provided assistance.

Like almost every other FBI informant, Sharpton was solely an information source. The parameters of his cooperation did not include Sharpton ever surfacing publicly or testifying on a witness stand.

Genovese squad investigators–representing both the FBI and NYPD–recalled how Sharpton, now 59, deftly extracted information from wiseguys. In fact, one Gambino crime family figure became so comfortable with the protest leader that he spoke openly–during ten wired face-to-face meetings–about a wide range of mob business, from shylocking and extortions to death threats and the sanity of Vincent “Chin” Gigante, the Genovese boss who long feigned mental illness in a bid to deflect law enforcement scrutiny. As the mafioso expounded on these topics, Sharpton’s briefcase–a specially customized Hartman model–recorded his every word.

Task force members, who were interviewed separately, spoke on the condition of anonymity when describing Sharpton’s work as an informant and the Genovese squad’s activities. Some of these investigators provided internal FBI documents to a reporter.

Records obtained by TSG show that information gathered by Sharpton was used by federal investigators to help secure court authorization to bug two Genovese family social clubs, including Gigante’s Greenwich Village headquarters, three autos used by crime family leaders, and more than a dozen phone lines. These listening devices and wiretaps were approved during the course of a major racketeering investigation targeting the Genovese family’s hierarchy.

A total of eight separate U.S. District Court judges–presiding in four federal jurisdictions–signed interception orders that were based on sworn FBI affidavits including information gathered by Sharpton. The phones bugged as a result of these court orders included two lines in Gigante’s Manhattan townhouse, the home phone of Genovese captain Dominick “Baldy Dom” Canterino, and the office lines of music industry power Morris Levy, a longtime Genovese family associate. The resulting surreptitious recordings were eventually used to help convict an assortment of Mafia members and associates.

Investigators also used Sharpton’s information in an application for a wiretap on the telephone in the Queens residence of Federico “Fritzy” Giovanelli, a Genovese soldier. Giovanelli was sentenced to 20 years in prison for racketeering following a trial during which those recordings were played for jurors. In a recent interview, the 82-year-old Giovanelli–now three years removed from his latest stint in federal custody–said that he was unaware that Sharpton contributed in any fashion to his phone’s bugging. He then jokingly chided a reporter for inquiring about the civil rights leader’s past. “Poor Sharpton, he cleaned up his life and you want to ruin him,” Giovanelli laughed.

While Sharpton’s acrimonious history with law enforcement–especially the NYPD–rankled some Genovese squad investigators, they nonetheless grudgingly acknowledged in interviews that the activist produced for those he would go on to frequently pillory.

Genovese squad members, however, did not share with Sharpton specific details about how they were using the information he was gathering for them. This is standard practice since FBI affidavits in support of wiretap applications are filed under seal by Department of Justice prosecutors. Still, Sharpton was briefed in advance of his undercover sorties, so he was well aware of the squad’s investigative interest in Gigante and his Mafia cronies.

Sharpton vehemently denies having worked as an FBI informant. He has alleged that claims of government cooperation were attempts by dark forces to stunt his aggressive brand of civil rights advocacy or, perhaps, get him killed. In his most recent book, “The Rejected Stone,” which hit best seller lists following its October 2013 publication, Sharpton claimed to have once been “set up by the government,” whose agents later leaked “false information” that “could have gotten me killed.” He added, “So I have been seriously tested in what I believe over the years.”

In an interview Saturday, Sharpton again denied working as a confidential informant, claiming that his prior cooperation with FBI agents was limited to efforts to prompt investigations of drug dealing in minority communities, as well as the swindling of black artists in the recording industry. He also repeatedly denied being “flipped” by federal agents in the course of an undercover operation. When asked specifically about his recording of the Gambino crime family member, Sharpton was noncommittal: “I’m not saying yes, I’m not saying no.”

If Sharpton’s account is to be believed, he was simply a concerned citizen who voluntarily (and briefly) joined arm-in-arm with federal agents, perhaps risking peril in the process. The other explanation for Sharpton’s cooperation–one that has uniformly been offered by knowledgeable law enforcement agents–presents the reverend in a less noble light. Worried that he could face criminal charges, Sharpton opted for the path of self-preservation and did what the FBI asked. Which is usually how someone is compelled to repeatedly record a gangster discussing murder, extortion, and loan sharking.

(Read the full report and source documents at The Smoking Gun)

—-
Alternative Free Press – fair use –

The NSA Documents Database: All Snowden leaks sorted & searchable

The American Civil Liberties Union (ACLU) has launched a user-friendly online database which contains all of the documents leaked by Edward Snowden which have been made public so far. Of course there is still more to come as well, Mr Snowden has said “Some of the most important reporting is yet to come.”. As the rest of the documents are released, the ACLU will add them to the database.

Emily Weinrebe of the ACLU’s National Security writes: “These documents stand as primary source evidence of our government’s interpretation of its authority to engage in sweeping surveillance activities at home and abroad, and how it carries out that surveillance. The ACLU hopes to facilitate this debate by making these documents more easily accessible and understandable.”

With full search and filtering functions finding the documents most relevant to any specific topic should be easy.

Weinrebe concludes, “The fact is that most of the documents contained in this database should have never been secret in the first place. Now, with newfound access to these records, we can educate ourselves about the true nature and scope of government surveillance in its many forms. This database will serve as a critical tool with which we will hold our government accountable.”

The NSA Documents Database: https://www.aclu.org/nsa-documents-search

Written by Alternative Free Press
Creative Commons License
The NSA Documents Database: All Snowden leaks sorted & searchable by AlternativeFreePress.com is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Conspiracy Fact – How the U.S. Government Covertly Invented a “Cuban Twitter” to Create Revolution

By Michael Krieger
Liberty Blitzkrieg: April 3, 2014

It appears the U.S. government is doing its best to ensure that nobody anywhere in any corner of planet earth will ever trust American technology again (or U.S. aid for that matter). This process of distrust first really got going with the Edward Snowden revelations, which demonstrated that essentially all major U.S. tech firms are mere wards of the state with little to no privacy protections, and absolutely zero backbone.

This story of the U.S. government covertly creating a “Cuban Twitter” called ZunZuneo in order to overthrow the regime there has enormous long-term ramifications on many, many levels, which I will address throughout this post.

From the AP via The Washington Post:

WASHINGTON — In July 2010, Joe McSpedon, a U.S. government official, flew to Barcelona to put the final touches on a secret plan to build a social media project aimed at undermining Cuba’s communist government.

 

McSpedon and his team of high-tech contractors had come in from Costa Rica and Nicaragua, Washington and Denver. Their mission: to launch a messaging network that could reach hundreds of thousands of Cubans. To hide the network from the Cuban government, they would set up a byzantine system of front companies using a Cayman Islands bank account, and recruit unsuspecting executives who would not be told of the company’s ties to the U.S. government.

 

McSpedon didn’t work for the CIA. This was a program paid for and run by the U.S. Agency for International Development, best known for overseeing billions of dollars in U.S. humanitarian aid.

Now we can pretty much guarantee that foreign nations will forever be skeptical of any U.S. “aid”. Great work morons.

Documents show the U.S. government planned to build a subscriber base through “non-controversial content”: news messages on soccer, music, and hurricane updates. Later when the network reached a critical mass of subscribers, perhaps hundreds of thousands, operators would introduce political content aimed at inspiring Cubans to organize “smart mobs” — mass gatherings called at a moment’s notice that might trigger a Cuban Spring, or, as one USAID document put it, “renegotiate the balance of power between the state and society.”

 

At its peak, the project drew in more than 40,000 Cubans to share news and exchange opinions. But its subscribers were never aware it was created by the U.S. government, or that American contractors were gathering their private data in the hope that it might be used for political purposes.

 

“There will be absolutely no mention of United States government involvement,” according to a 2010 memo from Mobile Accord, one of the project’s contractors. “This is absolutely crucial for the long-term success of the service and to ensure the success of the Mission.”

 

The program’s legality is unclear: U.S. law requires that any covert action by a federal agency must have a presidential authorization. Officials at USAID would not say who had approved the program or whether the White House was aware of it. McSpedon, the most senior official named in the documents obtained by the AP, is a mid-level manager who declined to comment.

“The program’s legality is unclear”, as if that matters!

But the ZunZuneo program muddies those claims, a sensitive issue for its mission to promote democracy and deliver aid to the world’s poor and vulnerable — which requires the trust of foreign governments.

 

The Associated Press obtained more than 1,000 pages of documents about the project’s development. The AP independently verified the project’s scope and details in the documents — such as federal contract numbers and names of job candidates — through publicly available databases, government sources and interviews with those directly involved in ZunZuneo.

 

“We should gradually increase the risk,” USAID proposed in a document. It advocated using “smart mobs” only in “critical/opportunistic situations and not at the detriment of our core platform-based network.”

 

USAID’s team of contractors and subcontractors built a companion Web site to its text service so Cubans could subscribe, give feedback and send their own text messages for free. They talked about how to make the Web site look like a real business. “Mock ad banners will give it the appearance of a commercial enterprise,” a proposal suggested.

 

McSpedon worked for USAID’s Office of Transition Initiatives (OTI), a division that was created after the fall of the Soviet Union to promote U.S. interests in quickly changing political environments — without the usual red tape.

We have an “Office of Transition Initiatives“? Who knew…

In 2009, a report by congressional researchers warned that OTI’s work “often lends itself to political entanglements that may have diplomatic implications.” Staffers on oversight committees complained that USAID was running secret programs and would not provide details.

 

“We were told we couldn’t even be told in broad terms what was happening because ‘people will die,’” said Fulton Armstrong, who worked for the Senate Foreign Relations committee. Before that, he was the US intelligence community’s most senior analyst on Latin America, advising the Clinton White House.

How’s that for Congressional oversight. This phony “people will die” rationale seems to be the reason for all shady secret programs these days.

The money that Creative Associates spent on ZunZuneo was publicly earmarked for an unspecified project in Pakistan, government data show. But there is no indication of where the funds were actually spent.

 

Paula Cambronero, a researcher for Mobile Accord, began building a vast database about the Cuban subscribers, including gender, age, “receptiveness” and “political tendencies.” USAID believed the demographics on dissent could help it target its other Cuba programs and “maximize our possibilities to extend our reach.”

Of course, the NSA would never compile such data domestically, right?

Carlos Sanchez Almeida, a lawyer specializing in European data protection law, said it appeared that the U.S. program violated Spanish privacy laws because the ZunZuneo team had illegally gathered personal data from the phone list and sent unsolicited emails using a Spanish platform. “The illegal release of information is a crime, and using information to create a list of people by political affiliation is totally prohibited by Spanish law,” Almeida said. It would violate a U.S-European data protection agreement, he said.

 

“If it is discovered that the platform is, or ever was, backed by the United States government, not only do we risk the channel being shut down by Cubacel, but we risk the credibility of the platform as a source of reliable information, education, and empowerment in the eyes of the Cuban people,” Mobile Accord noted in a memo.

 

To cover their tracks, they decided to have a company based in the United Kingdom set up a corporation in Spain to run ZunZuneo. A separate company called MovilChat was created in the Cayman Islands, a well-known offshore tax haven, with an account at the island’s Bank of N.T. Butterfield & Son Ltd. to pay the bills.

 

A memo of the meeting in Barcelona says that the front companies would distance ZunZuneo from any U.S. ownership so that the “money trail will not trace back to America.”

 

Officials at USAID realized however, that they could not conceal their involvement forever — unless they left the stage. The predicament was summarized bluntly when Eberhard was in Washington for a strategy session in early February 2011, where his company noted the “inherent contradiction” of giving Cubans a platform for communications uninfluenced by their government that was in fact financed by the U.S. government and influenced by its agenda.

 

They turned to Jack Dorsey, a co-founder of Twitter, to seek funding for the project. Documents show Dorsey met with Suzanne Hall, a State Department officer who worked on social media projects, and others. Dorsey declined to comment.

This is not going to be good for Twitter’s reputation internationally, or Facebook for that matter…

By early 2011, Creative Associates grew exasperated with Mobile Accord’s failure to make ZunZuneo self-sustaining and independent of the U.S. government. The operation had run into an unsolvable problem. USAID was paying tens of thousands of dollars in text messaging fees to Cuba’s communist telecommunications monopoly routed through a secret bank account and front companies. It was not a situation that it could either afford or justify — and if exposed it would be embarrassing, or worse.

If you did this it’d probably be called money laundering and you’d be locked up in a cage forever. Such as what happened to Charlie Shrem.

Toward the middle of 2012, Cuban users began to complain that the service worked only sporadically. Then not at all.

 

ZunZuneo vanished as mysteriously as it appeared.

(Read the full article at Liberty Blitzkrieg)

—-
Alternative Free Press

Obama’s End Of NSA Data Collection, Will Actually Increase Collection

Congressman: President’s Push To End Data Collection, Will Actually Increase Collection

Ben Swann: March 28, 2014

Just by reading the name, the average American would believe that a new bill being crafted by the Obama administration to end NSA data collection, or a simultaneous effort being pushed through the House Intelligence Committee by Rep. Mike Rogers would lead to the end of data collection on hundreds of millions of Americans. After all, these bills with names like “End Bulk Collection Act” sound like they will free the American people from NSA spying.

Newspaper, television and internet story headlines read “ White House plan would end NSA’s bulk collection of Americans’ phone data”. Sounds like the NSA spying program is coming to an end.

Not so, says Michigan Congressman Justin Amash who voted against the House version of the “End Bulk Collection” bill. Amash, a Republican two term Congressman, was a guest on the Ben Swann Radio Show Wednesday. He says the bill sounds like it will lead to the end of data collection but when you get into the details, the bill could actually expand collection.

“It actually expands the scope of collection, of unconstitutional collection. It is called the “End Bulk Collection Act.” It is like we are in some dystopian future where government calls a bill something that has the opposite affect of what title is.” says Rep. Amash.

The major point brought up by the Congressman is that despite the name “End Bulk Collection”, the bill does not to end collection of data, rather it shifts the responsibility of collection from the NSA to private phone companies.

“They are going to transfer where the phone data is collected so that it is not stored by the government but it is instead stored by the phone companies. Where it is stored is not really the main problem.”

Congressman Amash goes on to say that by correcting “who” is storing the information does not to resolve the constitutionality of bulk collection of data.

“The problem is the unconstitutional search and seizure of people’s information. Even if it is stored about the phone companies, the phone companies are now acting as agents of the government and provide the government even more information than they have today. That doesn’t put us in a better position, it puts us in a worse position.”

So how is it that the American public has no clue that the “End Bulk Collection Act” or the President’s new proposal would actually increase bulk collection? Rep. Amash says you can blame that, in part, on a complacent media.

(Read the full article at Ben Swann)

—-
Alternative Free Press -fair use-

Why ‘I Have Nothing to Hide’ Is the Wrong Way to Think About Surveillance

If everyone’s every action were being monitored, and everyone technically violates some obscure law at some time, then punishment becomes purely selective.

We Should All Have Something To Hide

By Moxie Marlinspike

Suddenly, it feels like 2000 again. Back then, surveillance programs like Carnivore, Echelon, and Total Information Awareness helped spark a surge in electronic privacy awareness. Now a decade later, the recent discovery of programs like PRISM, Boundless Informant, and FISA orders are catalyzing renewed concern.

The programs of the past can be characterized as “proximate surveillance,” in which the government attempted to use technology to directly monitor communication themselves. The programs of this decade mark the transition to “oblique surveillance,” in which the government more often just goes to the places where information has been accumulating on its own, such as email providers, search engines, social networks, and telecoms.

Both then and now, privacy advocates have typically come into conflict with a persistent tension, in which many individuals don’t understand why they should be concerned about surveillance if they have nothing to hide. It’s even less clear in the world of “oblique” surveillance, given that apologists will always frame our use of information-gathering services like a mobile phone plan or Gmail as a choice.

We Won’t Always Know When We Have Something To Hide

As James Duane, a professor at Regent Law School and former defense attorney, notes in his excellent lecture on why it is never a good idea to talk to the police:

Estimates of the current size of the body of federal criminal law vary. It has been reported that the Congressional Research Service cannot even count the current number of federal crimes. These laws are scattered in over 50 titles of the United States Code, encompassing roughly 27,000 pages. Worse yet, the statutory code sections often incorporate, by reference, the provisions and sanctions of administrative regulations promulgated by various regulatory agencies under congressional authorization. Estimates of how many such regulations exist are even less well settled, but the ABA thinks there are ”nearly 10,000.”

If the federal government can’t even count how many laws there are, what chance does an individual have of being certain that they are not acting in violation of one of them?

As Supreme Court Justice Breyer elaborates:

The complexity of modern federal criminal law, codified in several thousand sections of the United States Code and the virtually infinite variety of factual circumstances that might trigger an investigation into a possible violation of the law, make it difficult for anyone to know, in advance, just when a particular set of statements might later appear (to a prosecutor) to be relevant to some such investigation.

For instance, did you know that it is a federal crime to be in possession of a lobster under a certain size? It doesn’t matter if you bought it at a grocery store, if someone else gave it to you, if it’s dead or alive, if you found it after it died of natural causes, or even if you killed it while acting in self defense. You can go to jail because of a lobster.

If the federal government had access to every email you’ve ever written and every phone call you’ve ever made, it’s almost certain that they could find something you’ve done which violates a provision in the 27,000 pages of federal statues or 10,000 administrative regulations. You probably do have something to hide, you just don’t know it yet.

We Should Have Something To Hide

Over the past year, there have been a number of headline-grabbing legal changes in the U.S., such as the legalization of marijuana in Colorado and Washington, as well as the legalization of same-sex marriage in a growing number of U.S. states.

As a majority of people in these states apparently favor these changes, advocates for the U.S. democratic process cite these legal victories as examples of how the system can provide real freedoms to those who engage with it through lawful means. And it’s true, the bills did pass.

What’s often overlooked, however, is that these legal victories would probably not have been possible without the ability to break the law.

The state of Minnesota, for instance, legalized same-sex marriage this year, but sodomy laws had effectively made homosexuality itself completely illegal in that state until 2001. Likewise, before the recent changes making marijuana legal for personal use in Washington and Colorado, it was obviously not legal for personal use.

Imagine if there were an alternate dystopian reality where law enforcement was 100% effective, such that any potential law offenders knew they would be immediately identified, apprehended, and jailed. If perfect law enforcement had been a reality in Minnesota, Colorado, and Washington since their founding in the 1850s, it seems quite unlikely that these recent changes would have ever come to pass. How could people have decided that marijuana should be legal, if nobody had ever used it? How could states decide that same sex marriage should be permitted, if nobody had ever seen or participated in a same sex relationship?

The cornerstone of liberal democracy is the notion that free speech allows us to create a marketplace of ideas, from which we can use the political process to collectively choose the society we want. Most critiques of this system tend to focus on the ways in which this marketplace of ideas isn’t totally free, such as the ways in which some actors have substantially more influence over what information is distributed than others.

The more fundamental problem, however, is that living in an existing social structure creates a specific set of desires and motivations in a way that merely talking about other social structures never can. The world we live in influences not just what we think, but how we think, in a way that a discourse about other ideas isn’t able to. Any teenager can tell you that life’s most meaningful experiences aren’t the ones you necessarily desired, but the ones that actually transformed your very sense of what you desire.

We can only desire based on what we know. It is our present experience of what we are and are not able to do that largely determines our sense for what is possible. This is why same sex relationships, in violation of sodomy laws, were a necessary precondition for the legalization of same sex marriage. This is also why those maintaining positions of power will always encourage the freedom to talk about ideas, but never to act.

Technology and Law Enforcement

Law enforcement used to be harder. If a law enforcement agency wanted to track someone, it required physically assigning a law enforcement agent to follow that person around. Tracking everybody would be inconceivable, because it would require having as many law enforcement agents as people.

Today things are very different. Almost everyone carries a tracking device (their mobile phone) at all times, which reports their location to a handful of telecoms, which are required by law to provide that information to the government. Tracking everyone is no longer inconceivable, and is in fact happening all the time. We know that Sprint alone responded to eight million pings for real time customer location just in 2008. They got so many requests that they built an automated system to handle them.

Combined with ballooning law enforcement budgets, this trend towards automation, which includes things like license plate scanners and domestically deployed drones, represents a significant shift in the way that law enforcement operates.

Police already abuse the immense power they have, but if everyone’s every action were being monitored, and everyone technically violates some obscure law at some time, then punishment becomes purely selective. Those in power will essentially have what they need to punish anyone they’d like, whenever they choose, as if there were no rules at all.

Even ignoring this obvious potential for new abuse, it’s also substantially closer to that dystopian reality of a world where law enforcement is 100% effective, eliminating the possibility to experience alternative ideas that might better suit us.

(Read the full article at Moxie Marlinspike’s Blog & it is mirrored at Wired as well)

—-
Alternative Free Press -fair use-

Snowden docs reveal NSA spied on 122 world leaders

AlternativeFreePress.com

New leaks by NSA whistleblower Edward Snowden reveal that the NSA has collected information via surveillance of at least 122 world leaders.

Reports from Der Spiegel & The Intercept detail a top secret presentation by NSA’s Center for Content Extraction, which is responsible for automated analysis of all types of text data.

So far, only 12 names have been revealed, with the heads of state arranged alphabetically by first name.

The so-called Target Knowledge Database (TKB) includes “complete profiles” of the individuals under surveillance.

Der Spiegel writes that the automated name recognition system, Nymrod, deals with transcripts of intercepted fax, voice and computer-to-computer communications, and has provided around 300 citations just for German Chancellor Angela Merkel.

A Special Sources Operations (SSO) division report shows that the NSA had received a court order specifically to spy on Germany issued by The Foreign Intelligence Surveillance Court on March 7, 2013. NSA uses these court orders to legitimize the interception of communications related to named countries or groups. Der Spiegel reports the court has provided similar authorization for measures targeting China, Mexico, Japan, Venezuela, Yemen, Brazil, Sudan, Guatemala, Bosnia and Russia.

There is a lot more information available at Der Spiegel & The Intercept.

Written by Alternative Free Press
Creative Commons License
Snowden docs reveal NSA spied on 122 world leaders by AlternativeFreePress.com is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

Canada’s Telecoms Have Built Databases For Warrantless Police Spying

Canada’s Telecoms Have Built Databases For Police Spying: Geist

The Huffington Post Canada
March 26, 2014

Canada’s telecoms appear to be building databases of subscriber information that law enforcement agencies can access without a warrant, according to documents released under access to information laws.

The news comes as Parliament once again gears up to debate the merits of giving police greater access to telecom subscriber data.

The Canada Border Services Agency (CBSA) accessed telecom subscriber data 18,849 times in a one-year period, from April 2012 to March 2013, according to documents provided to NDP MP Charmaine Borg.

And those aren’t all the data requests from the federal government — that’s just one agency, the CBSA.

Of all those requests, CBSA got a warrant in only 52 cases, the documents show, meaning that in 18,797 cases there was no warrant. The telecoms handed over the data for all but 25 requests, and most of the rejections were due to phones not being active or customers leaving the company, the Halifax Chronicle-Herald reports.

Other agencies made requests but CBSA had the largest number.

For warrantless requests, telecoms handed over basic subscriber information. Where there were warrants, the data handed over was more detailed, including the actual content of voice mails and text messages, the Chronicle-Herald reports.

According to digital law professor Michael Geist, the documents indicate the major telecoms have established their own law enforcement databases. In one document, the Competition Bureau declares it had accessed “the Bell Canada Law Enforcement database” 20 times in a one-year period.

“It is not clear what oversight or review is used before a government agency may access the Bell database,” Geist commented.

Privacy expert David Fraser, a Halifax lawyer, says he finds the phenomenon “shocking.”

“If you cannot convince a judge or a justice of the peace or a magistrate that you are entitled to that information, then you should not be getting that information,” Fraser told the Chronicle-Herald.

The law as it stands allows telecoms to hand over voluntarily the personal information of subscribers without a warrant (and without notifying the subscriber) when there is a law enforcement investigation.

But if the Harper government has its way, it will soon be even easier for telecoms to do so.

Bill C-13, the Protecting Canadians from Online Crime Act, is headed for second reading in Parliament. Originally sold by the Tories as a bill to combat cyberbullying, it’s been pilloried by critics for bringing back elements of the failed 2012 online spying bill.

The new bill doesn’t include some of the more contentious elements of the old bill, such as mandatory warrantless disclosure of subscriber data. But critics point out the bill grants immunity to telecoms who share data with law enforcement without a warrant, making it all the easier for telecoms to hand over information.

The bill “will allow authorities access to the private lives of millions of law-abiding Canadians, even if they’re not suspected of wrong-doing,” digital rights group OpenMedia said in a statement earlier this month.

(Read the full article at Huffington Post)

—-
AlternativeFreePress.com – fair use –