Category Archives: Privacy

U.S. Charges China With Cyber-Spying on American Firms

Pete Williams
NBC News: May 19, 2014

The Justice Department filed criminal charges against five hackers in the Chinese military Monday, accusing them of stealing American trade secrets through cyber-espionage.

The efforts were directed at six American victim companies in the nuclear power, metals and solar products industries: Westinghouse Electric, U.S. subsidiaries of SolarWorld AG, U.S. Steel, Allegheny Technologies and Alcoa. The United Steel Workers union was also targeted.

“This is a case alleging economic espionage by members of the Chinese military and represents the first-ever charges against a state actor for this type of hacking,” Attorney General Eric Holder said.
[…]
The FBI tracked the computer attacks to Unit 61398 of the Third Department of the People’s Liberation Army, headquartered in a building in Shanghai, officials said.

Authorities said what amounted to “21st century burglary” benefited the Chinese competitors of the U.S. victims, including state-run enterprises, and led to the loss of American jobs.

As one example, the hackers stole cost, pricing and strategy information from SolarWorld at the very time the company was losing market share to Chinese rivals, officials said.

“These victims are tired of being raided,” said Assistant Attorney General John Carlin.

He said that in the past, when the U.S. has complained about the hacking to China, “they repsonded by publicly challenging us to provide hard evidence of their hacking that could cstand up in court.

“Well, today we are,” Carlin said.

It’s unclear how the hackers would be brought to justice in the United States. The feds also have charged the makers of the malicious software the Chinese allegedly used to steal information from the American firms.

(read the full article at NBC News)

Alternative Free Press -fair use-

Israeli Spying on USA; Snowden Document Confirms

The Latest Document From the Snowden Trove Highlights Israeli Spying

By Jeff Stein
May 16, 2014

Israel had a few triumphs, this week, in its campaign to rebut charges that it spies in the U.S. It got a hearing with the chairman of the Senate Intelligence Committee, it saw the removal of a roadblock to long-delayed legislation that would strengthen strategic cooperation between Israel and the U.S., and at a press conference in Tel Aviv, U.S. Secretary of Defense Chuck Hagel said he was “not aware of any facts that would substantiate” Newsweek’s reports on Israeli spying against the United States.

But as always the case in the complex relationship between the two, closely allied nations, Israel did not get everything it wanted. Senator Dianne Feinstein, who chairs the Intelligence Committee, stopped short of dismissing allegations of Israeli espionage, a charge buttressed by the publication Wednesday of yet another highly classified National Security Agency document from the vast archive stolen by fugitive whistle-blower Edward Snowden that says Israel has been spying on the United States. And while a Senate bill to lower Israeli visa restrictions was toughened to satisfy critics, some U.S. national security officials still oppose loosening restrictions on Israeli citizens who want to visit the U.S. Some of the concerns not yet addressed: regular reporting by Israel of stolen or lost passports, a faster conversion to biometric passports, and less Israeli hassling of Arab- and Muslim-Americans landing at Tel Aviv’s Ben-Gurion airport.

The latest NSA document, revealed by journalist Glenn Greenwald in concert with the publication of his memoir, No Place to Hide: Edward Snowden, the NSA and the U.S. Surveillance State, sums up the complicated security relationship between Israel and Washington in a single paragraph.

“The Israelis are extraordinarily good [Signals Intelligence] partners for us,” the NSA observed, referencing joint electronic spying programs against foreign targets, “but on the other [hand], they target us to learn our positions on Middle East problems.” It added that a CIA-led National Intelligence Estimate on cyberthreats in 2013 “ranked Israel the third most aggressive intelligence service against the U.S.,” behind only China and Russia.

(read the full article at Newsweek)

Alternative Free Press -fair use-

It’s time for real cell phone privacy in Canada

Your cellphone is not your castle. But it should be

The Globe and Mail: May 15, 2014

Is a Canadian’s cellphone account his or her castle? It isn’t now. But it should be.

Under long-standing laws, if police enter a dwelling without a search warrant, or wiretap a landline telephone conversation without judicial authorization, there are serious legal consequences. Most Canadians would expect similar penalties to be imposed if their privacy is invaded through their wireless phones.

But a bill that a House of Commons committee began studying this week actually includes a clause that grants protection and immunity to those who take and hold on to information that has been illegally obtained from people’s cellphones and cellphone accounts.

Bill C-13 is called the Protecting Canadians from Online Crime Act. The name is intended to refer to cyberbullying, though Carol Todd, the mother of a well-known teenage victim of cyberbullying, Amanda Todd, said on Wednesday that she did not want a bill dealing with that social ill to also contain elements touching on the unrelated matter of electronic surveillance by government agencies. She’s right.

Much of Bill C-13 is the federal government’s latest stab at what is known as “lawful access” legislation – in other words, creating new terms for government access to people’s electronic communications or documents that otherwise would be unlawful.

One overreaching change in the bill is the terms on which police can ask someone – a wireless carrier, for example – to hand documents over voluntarily. Among other things, the bill says that “a person who preserves data or provides a document … does not incur any criminal or civil liability for doing so.”

Canada’s wireless carriers, as this newspaper was shocked to discover last year, have quietly had built into their CRTC licences a document called the Solicitor-General’s Enforcement Standards. It essentially obliges the carriers to hand over information about their customers to the authorities, on request – no judicial warrant required.

9read the full article at Globe & Mail)


Alternative Free Press -fair use-

Glenn Greenwald says NSA bugs tech hardware en route to global customers

Routers and servers implanted with beacons by NSA, says journalist who broke Edward Snowden story

CBC: May 13, 2014

American journalist Glenn Greenwald is accusing the U.S. National Security Agency of breaking into tech hardware to install surveillance bugs before the products are shipped to unsuspecting global customers, in a new book about the NSA’s mass surveillance practices.

Greenwald, who broke the story of intelligence whistleblower Edward Snowden, sat down with CBC’s chief correspondent Peter Mansbridge to discuss previously unseen documents in an interview airing Tuesday night on The National.

Greenwald’s new book, No Place to Hide: Edward Snowden, the NSA and the U.S. Surveillance State, comes out on Tuesday.

The NSA practice is called supply-chain interdiction, in which the agency intercepts U.S.-made products such as routers and servers manufactured by companies such as Cisco. The hardware is physically implanted with beacons before being factory repackaged and shipped to unaware consumers around the world.

The U.S. has warned companies about the dangers of buying Chinese products for this very reason, Greenwald says in No Place to Hide.

“While American companies were being warned away from supposedly untrustworthy Chinese routers, foreign organizations would have been well advised to beware of American-made ones,” Greenwald says. “A June 2010 report from the head of the NSA’s Access and Target Development department is shockingly explicit. The document gleefully observes that some ‘SIGINT [signals intelligence] tradecraft … is very hands-on (literally!).”

Other revelations include a collect-it-all doctrine and extending surveillance to include airplane communications.

“If the quantity of collection revealed was already stupefying, the NSA’s mission to collect all the signals all the time has driven the agency to expand and conquer more and more ground,” Greenwald writes. “The amount of data it captures is so vast, in fact, that the principal challenge the agency complains about is storing the heaps of information accumulated from around the globe.”

(read the full article at CBC)

—-
Alternative Free Press -fair use-

‘We Kill People Based on Metadata’

Michael Hayden, former director of the NSA and the CIA admits, “We kill people based on metadata.”

By David Cole
New York Review Of Books: May 10, 2014

Supporters of the National Security Agency inevitably defend its sweeping collection of phone and Internet records on the ground that it is only collecting so-called “metadata”—who you call, when you call, how long you talk. Since this does not include the actual content of the communications, the threat to privacy is said to be negligible. That argument is profoundly misleading.

Of course knowing the content of a call can be crucial to establishing a particular threat. But metadata alone can provide an extremely detailed picture of a person’s most intimate associations and interests, and it’s actually much easier as a technological matter to search huge amounts of metadata than to listen to millions of phone calls. As NSA General Counsel Stewart Baker has said, “metadata absolutely tells you everything about somebody’s life. If you have enough metadata, you don’t really need content.” When I quoted Baker at a recent debate at Johns Hopkins University, my opponent, General Michael Hayden, former director of the NSA and the CIA, called Baker’s comment “absolutely correct,” and raised him one, asserting, “We kill people based on metadata.”

It is precisely this power to collect our metadata that has prompted one of Congress’s most bipartisan initiatives in recent years. On May 7, the House Judiciary Committee voted 32-0 to adopt an amended form of the USA Freedom Act, a bill to rein in NSA spying on Americans, initially proposed by Democratic Senator Patrick Leahy and Republican Congressman James Sensenbrenner. On May 8, the House Intelligence Committee, which has until now opposed any real reform of the NSA, also unanimously approved the same bill. And the Obama administration has welcomed the development.

For some, no doubt, the very fact that this bill has attracted such broad bipartisan approval will be grounds for suspicion. After all, this is the same Congress that repeatedly reauthorized the 2001 USA Patriot Act, a law that was also proposed by Sensenbrenner and on which the bulk collection of metadata was said to rest—even if many members of Congress were not aware of how the NSA was using (or abusing) it. And this is the same administration that retained the NSA’s data collection program, inherited from its predecessor, as long as it was a secret, and only called for reform when the American people learned from the disclosures of NSA contractor Edward Snowden that the government was routinely collecting phone and Internet records on all of us. So, one might well ask, if Congress and the White House, Republicans and Democrats, liberals and conservatives, all now agree on reform, how meaningful can the reform be?

This is a reasonable question. This compromise bill addresses only one part of the NSA’s surveillance activities, and does not do nearly enough to address the many other privacy-invasive practices that we now know the NSA has undertaken. But it’s nonetheless an important first step, and would introduce several crucial reforms affecting all Americans.

First, and most importantly, it would significantly limit the collection of phone metadata and other “business records.” Until now, the NSA and the Foreign Intelligence Surveillance Court have aggressively interpreted a USA Patriot Act provision that authorized collection of business records “relevant” to a counterterrorism investigation. The NSA convinced the court that because it might be useful in the future to search through anyone’s calling history to see if that person had been in contact with a suspected terrorist, the agency should be able to collect everyone’s records and store them for five years.

The NSA has said it only searched its vast database of our calling records when it had reasonable suspicion that a phone number was connected to terrorism. But it did not have to demonstrate the basis for this suspicion to a judge. Moreover, it was authorized to collect data on all callers one, two, or three steps removed from the suspect number—an authority that can quickly generate more than one million phone numbers of innocent Americans from a single suspect source number. The fact that you may have called someone (say, your aunt) who in turn called someone (say, the Pizza Hut delivery guy) who was in turn once called by a suspected terrorist says nothing about whether you’ve engaged in wrongdoing. But it will land you in the NSA’s database of suspected terrorist contacts.

Under the USA Freedom Act, the NSA would be prohibited from collecting phone and Internet data en masse. Instead, such records would remain with the telephone and Internet companies, and the NSA would only be authorized to approach those companies on an individual, case-by-case basis, and only when it could first satisfy the Foreign Intelligence Surveillance Court that there is reasonable suspicion that a particular person, entity, or account is linked to an international terrorist or a representative of a foreign government or political organization. This is much closer to the specific kind of suspicion that the Fourth Amendment generally requires for intrusions on privacy. At that point, the court could order phone companies to produce phone calling records of all numbers that communicated with the suspect number (the first “hop”), as well as all numbers with which those numbers in turn communicated (the second “hop”).

Further restrictions are necessary. Through these authorized searches the NSA would still be able to collect large amounts of metadata on persons whose only “sin” was that they called or were called by someone who called or was called by a suspected terrorist or foreign agent. At a minimum, “back-end” limits on how the NSA searches its storehouse of phone numbers are still needed. But the bill would at least end the practice of collecting everyone’s calling records.

Second, the new House bill imposes similar limits on other USA Patriot Act provisions that were susceptible to being used, or had been used, to authorize collection of data in bulk. These include a provision empowering the government to obtain information by “national security letters,” a kind of administrative subpoena issued without judicial oversight, and “pen registers,” which intercept Internet and phone trafficking data. All of these powers would now be limited by the same requirement that the government seek case-by-case warrants based on suspicion about a particular person or group. The point is to end bulk collection of data across the board, and return the agency to the more targeted searches and inquiries that US laws have historically deemed reasonable.

Third, the bill would establish a panel of legal experts, appointed by the presiding judges of the Foreign Intelligence Surveillance Court, who would participate in proceedings before the court when it addresses “a novel or significant interpretation of law,” and in any other proceedings at the court’s discretion. They would appear as amicus curiae, or “friends of the court,” but their purpose would be to add an independent assessment of the legal issues involved, ensuring that the court is not hearing only from the government. Such a panel would increase the likelihood that difficult legal issues get a full and fair consideration, and would likely shore up the public legitimacy of the secret court, which as of now is dismissed by many, rightly or wrongly, as a “rubber stamp.”

Finally, the bill contains a number of measures designed to increase transparency and oversight. It would require the attorney general to request the declassification of opinions of the FISA court, permit private Internet and telephone companies to report semiannually on the volume of records they were required to produce, and require the Inspectors General of the Justice Department and the Intelligence Community to report on the numbers of records requested and the effectiveness of the program. Had Verizon been permitted to report, for example, that it was being compelled to turn over hundreds of millions of phone records on its customers to the NSA, and had the Inspector General informed us that the program had stopped not a single terrorist act, it is likely that bulk collection would have been cut short long ago.

Even with all these reforms, however, the USA Freedom Act only skims the surface. It does not address, for example, the NSA’s guerilla-like tactics of inserting vulnerabilities into computer software and drivers, to be exploited later to surreptitiously intercept private communications. It also focuses exclusively on reining in the NSA’s direct spying on Americans. As Snowden’s disclosures have shown, the NSA collects far more private information on foreigners—including the content as well as the metadata of e-mails, online chats, social media, and phone calls—than on US citizens.

The FISA Amendments Act of 2008 permits the NSA to intercept the content of communications when it can demonstrate nothing more than reason to believe that its targets are foreign nationals living abroad, and that the information might relate to “foreign intelligence.” “Foreign intelligence” is in turn defined to include any information that might inform our foreign affairs, which is no restriction at all. Under this authority, the NSA established the PRISM program, which collects both content and metadata from e-mail, Internet, and phone communications by millions of users worldwide. It is probably under this authority that, according to The Washington Post, the NSA is recording “every single” phone call from a particular, unnamed country. Documents leaked by Snowden demonstrate that the NSA also collects, again by the millions and billions, foreign nationals’ e-mail contact lists, cell phone location data, and texts. This is the very definition of dragnet surveillance.

Congress is far less motivated to do anything about the NSA’s abuse of the rights of foreign nationals. They are “them,” not “us.” They don’t vote. But they have human rights, too; the right to privacy, recognized in the International Covenant on Civil and Political Rights, which the US has signed and ratified, does not limit protections to Americans. Snowden’s revelations have justifiably led to protests from many of our closest allies; they don’t want their privacy invaded by the NSA any more than we do, and they have more to complain about than we do, as they have suffered far greater intrusions.

In the Internet era, it is increasingly common that everyone’s communications cross national boundaries. That makes all of us vulnerable, for when the government collects data in bulk from people it believes are foreign nationals, it is almost certain to sweep up lots of communications in which Americans are involved. The initial version of the USA Freedom Act accordingly sought to limit the NSA’s ability to conduct so-called “back door” searches of content collected from foreigners for communications with Americans citizens. But that provision was stripped in committee, leaving the back door wide open.

(Read the full article at New York Review Of Books)

—-
Alternative Free Press -fair use-

Canada actively spies for NSA

American spy agency gave Ottawa at least $325,000, says journalist linked to whistleblower Edward Snowden.

Canada actively spies for NSA, Glenn Greenwald claims in new book

By Peter Edwards
The Star : May 13, 2014

Canada spies for the U.S. National Security Agency (NSA) and covers up its surveillance with widespread lies and obfuscation, according to a newly released book by American journalist Glenn Greenwald.

Greenwald received leaked highly classified NSA documents from Edward Snowden, a former NSA worker now in exile in Russia.

“Canada is also a very active partner with the NSA and an energetic surveillance force in its own right,” Greenwald writes in No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State.

Greenwald, who has received thousands of leaked NSA documents from Snowden, writes that electronic surveillance began under the presidency of George W. Bush and has accelerated in the Obama regime.

Greenwald writes that Communications Security Establishment Canada boasted of targeting the Brazilian Ministry of Mines and Energy, and accuses the NSA of massive surveillance of its own citizens.

“The hacking practice is quite widespread in its own right: one NSA document indicates that the agency had succeeded in infecting at least fifty thousand individual computers with a type of malware called Quantum insertion,” writes Greenwald, a member of the team from The Guardian which, along with The Washington Post, were awarded the 2014 Pulitzer Prize in public service.

Quoting from a top secret April 2013 NSA information paper, Greenwald writes: “There is evidence of widespread CSEC/NSA co-operation, including Canada’s efforts to set up spying posts for communications surveillance around the world at the behest and for the benefit of the NSA, and spying on trading partners targeted by the U.S. agency.”

Drawing from his access to Snowden and his leaked documents, Greenwald describes Canada on the top tier of co-operation with the NSA, along with Australia, New Zealand and the United Kingdom.

He writes that “the NSA often maintains these partnerships by paying its partner to develop certain technologies and engage in surveillance, and can thus direct how the spying is carried out. The Fiscal Year 2012 ‘Foreign Partner Review’ reveals numerous countries that have received such payment, including Canada, Israel, Japan, Jordan, Pakistan, Taiwan and Thailand.”

In 2012, Canada took at least $325,000 in research money, placing it fourth among co-operating countries, behind Pakistan, Jordan and Ethiopia, Greenwald writes.

(read the full article at The Star)

—-
Alternative Free Press -fair use-

Police could see tax info without warrant under proposed law

Paul Mcleod
The Chronicle Herald: May 12, 2014

Police would be able to see Canadians’ private tax information without the use of a warrant under a proposed government law.

If it’s passed, the Canada Revenue Agency could voluntarily hand over a taxpayer’s data to police and the citizen would never be notified.

The change is proposed in the Conservatives’ 375-page omnibus budget bill through a clause that amends the Income Tax Act.

Under Bill C-31, police could see such information if there were reasonable grounds to believe a serious crime had been committed. But neither the police nor the revenue agency would have to make a case to a judge.

Instead, revenue agency staff would decide whether they should hand over the information.

It’s a major reversal of the current principle that the agency cannot share tax data with third parties except in very rare exceptions.

“Without telling anybody, any person who works at CRA could on their own decide to share information,” Stephane Eljarrat, partner at Montreal law firm Davies Ward Phillips & Vineberg, said in an interview Monday.

Eljarrat warned the House of Commons finance committee last week that there needs to be judicial oversight of disclosure. Determining reasonable grounds of a crime is not the specialty or the job of a tax agency, he said.

“The CRA’s mandate is to collect taxes, it’s not to investigate crimes,” he said.

“To protect everybody, it should be done through a judge.”

If Canadians suspect their tax returns will be used against them, they may start hiding income, he told the committee.

(read the full article at The Chronicle Herald)

—-
Alternative Free Press -fair use-

Snapchat ‘deceived users’ about disappearing messages

Snapchat ‘deceived users’ about disappearing messages, will be monitored by gov’t

RT: May 9, 2014

If Snapchat users thought their photos and videos disappeared – like they’re supposed to – they may be in for a surprise. The company settled with the Federal Trade Commission Thursday for deceiving users.

Snapchat is a messaging application that allows users to share pictures, short videos, messages and video chats with a friend or group. These messages, called Snaps, can be viewed for up to 10 seconds before they disappear.

“In most cases, once the recipient has viewed a message, it is automatically deleted from Snapchat’s servers and cannot be retrieved,” the company writes about its product. The app says it will notify a user if their Snap has been screen-captured by the recipient. But a study carried out by a US firm last April said Snapchat was not in fact designed to erase the files.

The FTC filed a six-count complaint against the popular app, saying it wasn’t living up to its promises of privacy and security. The commission accused Snapchat of misrepresenting how the application actually works.

“Despite Snapchat’s claims, the complaint describes several simple ways that recipients could save snaps indefinitely,” the FTC said in a press release.

In a blog post, the FTC went into detail on how even those people who aren’t particularly tech-savvy could save Snaps. “When a recipient got a video message, Snapchat stored the file in a location outside of the app’s ‘sandbox,’ the private storage area on the device that other apps can’t access. Because the file was in an unrestricted place, the recipient could connect their device to a computer and use simple browsing tools to locate and save the video,” the blog post says. “That method was widely publicized as early as December 2012, but the FTC says Snapchat didn’t fix the flaw until almost a year later when it began encrypting video files sent through the app.”

The complaint also detailed how Snapchat deceived its users regarding the amount of personal data it collected and the security measures taken to protect that data. It accused Snapchat of “failure to secure its Find Friends feature resulted in a security breach that enabled attackers to compile a database of 4.6 million Snapchat usernames and phone numbers,” the statement said.

(read the full article at RT)

—-
Alternative Free Press -fair use-

Is the government checking you out on Facebook?

Andrea Janus
CTV News: May 8, 2014

It may not just be your ex who is creeping your Facebook page. Canada’s privacy commissioner says government agencies are collecting “personal information from social networking sites” that does not directly relate to government business.

Interim Privacy Commissioner Chantal Bernier outlined her concerns to Treasury Board Secretary Tony Clement in a letter obtained by CTV News that is dated Feb. 13. According to Bernier, not only collecting the information, but they are not taking steps to ensure its accuracy.

“We are seeing evidence that personal information is being collected by government institutions from social media sites without regard for accuracy, currency or accountability,” Bernier writes, noting that social media users have “a certain expectation of privacy.”

“Should information culled from these sites be used to make administrative decisions about individuals, it is incumbent upon government institutions to ensure the accuracy of this information; it is not at all clear that this obligation is being, or could be, met.”

In a statement emailed Thursday evening to CTV News, Bernier said it “is increasingly important to develop guidelines to clarify privacy protections with respect to the collection of publicly available personal information from social media sites.”

Bernier has also asked that some government departments that have proposed collecting personal information from social media sites “to justify the need for such information.”

About two weeks before she sent her letter to Clement, Bernier released a report to Parliament warning that Canada’s spy agencies need more oversight and better guidelines as new surveillance tools give them access to more information than ever before.

(Read the full article at CTV News)

—-
Alternative Free Press -fair use-

Feds lack accountability in dealing with Canadians’ private info: privacy czar

Global News: May 4, 2014

Canada’s privacy watchdog says there’s an accountability gap when it comes to how and why government agencies access private information.

In an interview on the West Block with Tom Clark, Interim Privacy Commissioner Chantal Bernier said a lack of transparency in the system means she has no way of knowing whether government agencies and telecommunications companies are following the rules.

“We don’t know. I mean that is really the issue here is the fact that we don’t know. We were seeking some kind of specificity around this exchange (of information),” said Bernier.

Currently government departments and agencies can ask internet and cell phone companies for their customers’ private information without having a warrant and without notifying Canadians that their information is being accessed.

The law is designed this way so that in cases where there’s an immediate threat to life or national security, telecommunications companies are empowered to cooperate with law enforcement agencies, without those agencies needing to produce a warrant for information.

While this isn’t a new rule, the issue came to the forefront Wednesday after media reports found in 2011 government departments and agencies requested information nearly 1.2 million times. As privacy expert Michael Geist points out, that’s once every 27 seconds.

Despite the staggering number Bernier doesn’t dispute the need for those rules. “I agree with Canadians that in privacy law, probably there the balance is right between privacy and public safety. The point is that we need a record of that. We need accountability.”

The privacy watchdog says there’s a simple fix to what she calls an accountability gap. Her office has asked for a legislative amendment that would require all telecommunications companies to provide statistics on how often they disclose information and under what circumstances. For example, with or without a warrant.

“Then at least, we would have an idea of the scope of this practice,” said Bernier.

However, requests for more transparency in the process have so far fallen on deaf ears. Last May and again in January Canada’s Privacy Commissioner released reports calling for mandatory reporting. But the Digital Privacy Act introduced in the Senate on April 8 does not contain the legislative amendment proposed by privacy commissioner’s office.

(read the full article at Global News)


Alternative Free Press -fair use-