« | Home | Recent Comments | Categories | »

Feds Threaten To Arrest Lavabit Founder For Shutting Down His Service

Posted on August 17th, 2013 at 20:04 by John Sinteur in category: batshitinsane, Privacy, Security

[Quote]:

The saga of Lavabit founder Ladar Levison is getting even more ridiculous, as he explains that the government has threatened him with criminal charges for his decision to shut down the business, rather than agree to some mysterious court order. The feds are apparently arguing that the act of shutting down the business, itself, was a violation of the order:


… a source familiar with the matter told NBC News that James Trump, a senior litigation counsel in the U.S. attorney’s office in Alexandria, Va., sent an email to Levison’s lawyer last Thursday – the day Lavabit was shuttered — stating that Levison may have “violated the court order,” a statement that was interpreted as a possible threat to charge Levison with contempt of court.

That same article suggests that the decision to shut down Lavabit was over something much bigger than just looking at one individual’s information — since it appears that Lavabit has cooperated in the past on such cases. Instead, the suggestion now is that the government was seeking a tap on all accounts:


Levison stressed that he has complied with “upwards of two dozen court orders” for information in the past that were targeted at “specific users” and that “I never had a problem with that.” But without disclosing details, he suggested that the order he received more recently was markedly different, requiring him to cooperate in broadly based surveillance that would scoop up information about all the users of his service. He likened the demands to a requirement to install a tap on his telephone.

It sounds like the feds were asking for a full on backdoor on the system, not unlike some previous reports of ISPs who have received surprise visits from the NSA.


Write a comment

The NSA Is Commandeering the Internet

Posted on August 12th, 2013 at 23:24 by Jan in category: Do you feel safer yet?

[Quote]:

It turns out that the NSA’s domestic and world-wide surveillance apparatus is even more extensive than we thought. Bluntly: The government has commandeered the Internet. Most of the largest Internet companies provide information to the NSA, betraying their users. Some, as we’ve learned, fight, and lose. Others cooperate, either out of patriotism or because they believe it’s easier that way.

I have one message to the executives of those companies: fight.

Do you remember those old spy movies, when the higher ups in government decide that the mission is more important than the spy’s life? It’s going to be the same way with you.


Write a comment

Every Time The NSA Is Asked About Its Ability To Spy On Everyone… It Answers About Its Authority

Posted on August 7th, 2013 at 21:54 by John Sinteur in category: Do you feel safer yet?

[Quote]:

Before getting to the X-KEYSCORE questions, Burnett runs a clip of Gen. Alexander being lobbed softballs by Sen. Mike Rogers back on June 18th. Note Alexander’s verbal head fake that makes it appear he has actually answered what was asked.

Rogers: Does the NSA have the ability to listen to American’s phone calls and read their emails?

Alexander: No. We do not have that authority.

That wasn’t what was asked. Without a doubt, the agency does not have the authority to perform these acts. But what was asked was if the agency had the ability, whether or not it was being utilized.

When Burnett presses Hayden on this point, he provides the same dodge. She asks if the NSA has the ability to collect this kind of data and Hayden responds by saying the NSA can utilize this data, but only after it’s been lawfully collected.

When she pushes further, asking what’s stopping the NSA from “collecting whatever the heck you want on whoever the heck you want,” Hayden goes right back to claiming NSA analysts are only authorized to query the data that’s been already lawfully collected. The question about ability continues to be danced around.

Hayden even reiterates Alexander’s pseudo-answer:

“General Alexander made it clear: we don’t have the authorization to do that.”

Then he goes further, claiming that an order to view real-time data would be rejected by the analyst, simply because the request is unlawful. Hayden cannot possibly believe this statement is true. Sure, some analysts might reject legally-dubious requests from superiors but there is no way this is true across the board.

Hayden’s continual reference to “lawfully collected” and “authorization” (along with the usual mentions of “oversight” and “checks and balances”) is nothing short of ridiculous. It’s as if he wants everyone to believe that because analysts aren’t “authorized” to perform certain actions, they simply won’t perform them. In Hayden’s bizarrely credulous narrative, laws prevent lawbreaking.

Over and over again, he stresses the point that the data has been “lawfully collected” and that the NSA is only “authorized” to perform certain actions with the collected data. His ultra-simplistic responses are almost laughable. Of course an analyst wouldn’t perform real-time data monitoring! It’s not permitted!


Write a comment

Comments:

  1. What the hell is wrong with this country. Answer the question or your fired! Lie and you go to jail! It’s is just that simple. Restore accountability or the country is lost!

  2. @chas: I’m sorry for your loss. Perhaps we are all naive.

  3. @Sue: I don’t think anyone was naive. They all knew exactly what was happening.

  4. R.I.P.

U.S. directs agents to cover up program used to investigate Americans

Posted on August 5th, 2013 at 16:58 by John Sinteur in category: Do you feel safer yet?

[Quote]:

A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans.

Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin – not only from defense lawyers but also sometimes from prosecutors and judges.

The undated documents show that federal agents are trained to “recreate” the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant’s Constitutional right to a fair trial. If defendants don’t know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence – information that could reveal entrapment, mistakes or biased witnesses.

“I have never heard of anything like this at all,” said Nancy Gertner, a Harvard Law School professor who served as a federal judge from 1994 to 2011. Gertner and other legal experts said the program sounds more troubling than recent disclosures that the National Security Agency has been collecting domestic phone records. The NSA effort is geared toward stopping terrorists; the DEA program targets common criminals, primarily drug dealers.

“It is one thing to create special rules for national security,” Gertner said. “Ordinary crime is entirely different. It sounds like they are phonying up investigations.”


Write a comment

Qaeda Messages Prompt U.S. Terror Warning

Posted on August 3rd, 2013 at 9:34 by John Sinteur in category: Do you feel safer yet?

[Quote]:

The United States intercepted electronic communications this week among senior operatives of Al Qaeda, in which the terrorists discussed attacks against American interests in the Middle East and North Africa, American officials said Friday.

The intercepts and a subsequent analysis of them by American intelligence agencies prompted the United States to issue an unusual global travel alert to American citizens on Friday, warning of the potential for terrorist attacks by operatives of Al Qaeda and their associates beginning Sunday through the end of August.

The bulletin to travelers and expatriates, issued by the State Department, came less than a day after the department announced that it was closing nearly two dozen American diplomatic missions in the Middle East and North Africa, including facilities in Egypt, Iraq, Yemen, Kuwait and Saudi Arabia. Britain said Friday that it would close its embassy in Yemen on Monday and Tuesday because of “increased security concerns.”

Prove it.

No, really. If there really was such a communication, the guys, ehm, “communicating” now know they were intercepted, so there’s really no reason not to release the recording. There’s no ‘means and methods’ that need further protection, the cat is out of the bag.

Unless of course this entire conversion doesn’t exist, and this whole “let’s alert the embassy” crap is just a promo exercise to say “see, we’re keeping you safe!”

With NSA directors demonstrably lying to congress, there’s zero reason to believe anything they say.

Or, and that’s another alternative, arrest the official that made the statement about an intercept, and prosecute him just as much as Manning and Snowden.


Write a comment

Comments:

  1. ..you took the words right out of my mouth John. What a load of B.S. this warning is. U.S. Citizens Alert: shake in your boots! Give up more freedom! And while you are at, transfer more money to the military industrial complex! (F_ing morons)

Government report: TSA employee misconduct up 26% in 3 years

Posted on July 31st, 2013 at 19:40 by John Sinteur in category: Do you feel safer yet?

[Quote]:

And the stories of its failures spread faster than a speeding jetliner: TSA officers stealing money from luggage, taking bribes from drug dealers, sleeping on the job.

So it shouldn’t come as any surprise that a new Government Accountability Office report, citing a 26% increase in misconduct among TSA employees between 2010 and 2012, is striking a nerve with some travelers who’ve had to endure the shoeless, beltless shuffle on the trip through security.


Write a comment

Revealed: NSA program collects ‘nearly everything a user does on the internet’

Posted on July 31st, 2013 at 16:17 by John Sinteur in category: Do you feel safer yet?

[Quote]:

The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian’s earlier stories on bulk collection of phone records and Fisa surveillance court oversight.

The files shed light on one of Snowden’s most controversial statements, made in his first video interview published by the Guardian on June 10.

“I, sitting at my desk,” said Snowden, could “wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email”.

US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden’s assertion: “He’s lying. It’s impossible for him to do what he was saying he could do.”

But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.

XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

Analysts can also use XKeyscore and other NSA systems to obtain ongoing “real-time” interception of an individual’s internet activity.

Here’s a quote from the article that is really worrying:

The NSA documents assert that by 2008, 300 terrorists had been captured using intelligence from XKeyscore.

Since nobody heard about a single prosecution, and nobody has heard about an increase in population in Gitmo, there’s two options: 1) the NSA is lying about this number, or 2) the US has another place besides Gitmo where people disappear to.


Write a comment

Comments:

  1. When do they start training our children to act as informers, or has this already started?

  2. @chas: Oh that’s another good reason not to have children.

Feel-free fee: TSA will grope you less for $85

Posted on July 26th, 2013 at 9:49 by John Sinteur in category: Do you feel safer yet?

[Quote]:

The Transportation Security Administration has launched an expansion to their program that allows members to bypass regular airport pre-flight security checkpoints. Those enrolled in the ‘trusted traveler’ program, called TSA PreCheck, don’t have to remove their shoes, jackets and belts during screening. Members can also keep their laptop computers and approved liquids in their bags.

Currently, only members of several frequent-flier programs are given the opportunity to apply without paying a fee, the TSA says. But TSA Administrator John Pistole on Friday announced that all travelers will soon be able to join PreCheck – as long as they pay $85 for a five-year membership, provide identifying information, pass a background check, and undergo fingerprinting.

So now the terrorists have a cheap way to find out if the Feds are on to them. Also, the TSA now has a financial motive to make life for normal travelers even more annoying. “You should have paid the extra fee, peon!” I’m going to go out on a limb here and say that the fingerprinting and background screening are done by private companies? And that the contracts to do so just… might… go to some old friends? Maybe?


Write a comment

Rise of the Warrior Cop

Posted on July 21st, 2013 at 18:29 by John Sinteur in category: Do you feel safer yet?

[Quote]:

Assault-style raids have even been used in recent years to enforce regulatory law. Armed federal agents from the Fish & Wildlife Service raided the floor of the Gibson Guitar factory in Nashville in 2009, on suspicion of using hardwoods that had been illegally harvested in Madagascar. Gibson settled in 2012, paying a $300,000 fine and admitting to violating the Lacey Act. In 2010, the police department in New Haven, Conn., sent its SWAT team to raid a bar where police believed there was underage drinking. For sheer absurdity, it is hard to beat the 2006 story about the Tibetan monks who had overstayed their visas while visiting America on a peace mission. In Iowa, the hapless holy men were apprehended by a SWAT team in full gear.

Unfortunately, the activities of aggressive, heavily armed SWAT units often result in needless bloodshed: Innocent bystanders have lost their lives and so, too, have police officers who were thought to be assailants and were fired on, as (allegedly) in the case of Matthew David Stewart.

In my own research, I have collected over 50 examples in which innocent people were killed in raids to enforce warrants for crimes that are either nonviolent or consensual (that is, crimes such as drug use or gambling, in which all parties participate voluntarily). These victims were bystanders, or the police later found no evidence of the crime for which the victim was being investigated. They include Katherine Johnston, a 92-year-old woman killed by an Atlanta narcotics team acting on a bad tip from an informant in 2006; Alberto Sepulveda, an 11-year-old accidentally shot by a California SWAT officer during a 2000 drug raid; and Eurie Stamps, killed in a 2011 raid on his home in Framingham, Mass., when an officer says his gun mistakenly discharged. Mr. Stamps wasn’t a suspect in the investigation.

What would it take to dial back such excessive police measures? The obvious place to start would be ending the federal grants that encourage police forces to acquire gear that is more appropriate for the battlefield. Beyond that, it is crucial to change the culture of militarization in American law enforcement.

Consider today’s police recruitment videos (widely available on YouTube), which often feature cops rappelling from helicopters, shooting big guns, kicking down doors and tackling suspects. Such campaigns embody an American policing culture that has become too isolated, confrontational and militaristic, and they tend to attract recruits for the wrong reasons.


Write a comment

Lyons: Police raid felt like home invasion

Posted on July 21st, 2013 at 11:05 by John Sinteur in category: Do you feel safer yet?

[Quote]:

He was claiming to be a police officer, but the man she had seen looked to her more like an armed thug. Her boyfriend, Dorris, was calmer, and yelled back that he wanted to see some ID.

But the man just demanded they open the door. The actual words, the couple say, were, “We’re the f—— police; open the f—— door.”

Dorris said he moved away from the door, afraid bullets were about to rip through.

Goldsberry was terrified but thinking it just might really be the police. Except, she says she wondered, would police talk that way? She had never been arrested or even come close. She couldn’t imagine why police would be there or want to come in. But even if they did, why would they act like that at her apartment? It didn’t seem right.


Write a comment

Comments:

  1. The ACLU should take this up. The more people that react against the F_ing police state of the U.S., the better.

Blackberry 10 macht E-Mail-Passworte für NSA und GCHQ zugreifbar

Posted on July 18th, 2013 at 15:37 by John Sinteur in category: Privacy, Security

[Quote]:

When you enter your POP / IMAP e-mail credentials into a Blackberry 10 phone they will be sent to Blackberry without your consent or knowledge. A server with the IP 68.171.232.33 which is in the Research In Motion (RIM) netblock in Canada will instantly connect to your mailserver and log in with your credentials. If you do not have forced SSL/TLS configured on your mail server, your credentials will be sent in the clear by Blackberrys server for the connection. Blackberry thus has not only your e-mail credentials stored in its database, it makes them available to anyone sniffing inbetween – namely the NSA and GCHQ as documented by the recent Edward Snowden leaks. Canada is a member of the “Five Eyes”, the tigh-knitted cooperation between the interception agencies of USA, UK, Canada, Australia and New Zealand, so you need to assume that they have access to RIMs databases. You should delete your e-mail accounts from any Blackberry 10 device immediately, change the e-mail password and resort to use an alternative mail program like K9Mail.


Write a comment

The NSA Admits It Analyzes More People’s Data Than Previously Revealed

Posted on July 18th, 2013 at 14:32 by John Sinteur in category: Do you feel safer yet?

[Quote]:

As an aside during testimony on Capitol Hill today, a National Security Agency representative rather casually indicated that the government looks at data from a universe of far, far more people than previously indicated.

Chris Inglis, the agency’s deputy director, was one of several government representatives—including from the FBI and the office of the Director of National Intelligence—testifying before the House Judiciary Committee this morning. Most of the testimony largely echoed previous testimony by the agencies on the topic of the government’s surveillance, including a retread of the same offered examples for how the Patriot Act and Foreign Intelligence Surveillance Act had stopped terror events.

But Inglis’ statement was new. Analysts look “two or three hops” from terror suspects when evaluating terror activity, Inglis revealed. Previously, the limit of how surveillance was extended had been described as two hops. This meant that if the NSA were following a phone metadata or web trail from a terror suspect, it could also look at the calls from the people that suspect has spoken with—one hop. And then, the calls that second person had also spoken with—two hops. Terror suspect to person two to person three. Two hops. And now: A third hop.

[..]

For a sense of scale, researchers at the University of Milan found in 2011 that everyone on the Internet was, on average, 4.74 steps away from anyone else.

This site:

http://www.pewinternet.org/Reports/2011/Technology-and-social-networks/Part-3/SNS-users.aspx

Gives the average number of people you’re connected to as 634, or 669 for internet users. At 634 and three hops that leads to 254,840,104 individuals records, and at 669 it’s 299,418,309 people per suspected terrorist. Basically the entire population of the US for each suspected terrorist.

There’s an easy solution to overwork the NSA: Everyone friend Kevin Bacon on facebook.


Write a comment

Comments:

  1. One theory is there are 6 degrees of separation between everyone in the world. So if you spy on everyone, you’re only 6 degrees of separation from a real terrorist at the most.

Bush-Cheney began illegal NSA spying before 9/11, says telcom CEO

Posted on July 15th, 2013 at 17:02 by John Sinteur in category: Privacy, Security

[Quote]:

Contradicting a statement by ex-vice president Dick Cheney on Sunday that warrantless domestic surveillance might have prevented 9/11, 2007 court records indicate that the Bush-Cheney administration began such surveillance at least 7 months prior to 9/11.


Write a comment

Travellers’ mobile phone data seized by police at border

Posted on July 14th, 2013 at 19:41 by John Sinteur in category: Do you feel safer yet?

[Quote]:

Officers use counter-terrorism laws to remove a mobile phone from any passenger they wish coming through UK air, sea and international rail ports and then scour their data.

The blanket power is so broad they do not even have to show reasonable suspicion for seizing the device and can retain the information for “as long as is necessary”.

Data can include call history, contact books, photos and who the person is texting or emailing, although not the contents of messages.

David Anderson QC, the independent reviewer of terrorism laws, is expected to raise concerns over the power in his annual report this week.


Write a comment

Creating a military-industrial-immigration complex

Posted on July 13th, 2013 at 10:27 by John Sinteur in category: Do you feel safer yet?

[Quote]:

Until you visit the yearly Expo, it’s easy enough to forget that the U.S. borderlands are today ground zero for the rise, growth, and spread of a domestic surveillance state. On June 27th, the Senate passed the Border Security, Economic Opportunity, and Immigration Modernization Act. Along with the claim that it offers a path to citizenship to millions of the undocumented living in the United States (with many stringent requirements), in its more than 1,000 pages it promises to build the largest border-policing and surveillance apparatus ever seen in the United States. The result, Senator John McCain proudly said, will be the “most militarized border since the fall of the Berlin Wall.”

Yes, that same wall that his hero, Reagan, wanted torn down.

In a world where basic services are being cut, an emerging policing apparatus in the borderlands is flourishing. As Mattea Kramer and Chris Hellman reported at TomDispatch in February, since September 11, 2001, the United States has spent $791 billion on “homeland security” alone, an inflation-adjusted $300 billion more than the cost of the entire New Deal.

But at least this time around, that money is spent on the ‘right’ people.


Write a comment

Comments:

  1. It’s more employment! Government stimulus! The Great Depression was ended by a War, you know!

Teen Justin Carter Jailed In Texas After Making Sarcastic Threat In Facebook Comment

Posted on June 29th, 2013 at 19:04 by John Sinteur in category: Do you feel safer yet?

[Quote]:

Maybe it’s time the Internet adopted a “sarcasm” tag to alert readers to the use of irony in online conversation, and, hopefully, avoid situations like that of Justin Carter, a Texas teenager who has been in jail since February over a Facebook comment that failed to make a woman in Canada LOL.

Earlier this year, Carter and a friend got into an Facebook argument with someone regarding “League of Legends,” an online video game with notoriously die-hard fans. Justin’s father, Jack, explained to ABC local affiliate KVUE that at the end of the conversation “[s]omeone had said something to the effect of ‘Oh you’re insane, you’re crazy, you’re messed up in the head,’ to which [Justin] replied ‘Oh yeah, I’m real messed up in the head, I’m going to go shoot up a school full of kids and eat their still, beating hearts,’ and the next two lines were lol and jk [all sic].”

In case you’ve never been online before today: Internet shorthand LOL stands for “laughing out loud”; JK means “just kidding.”


Write a comment

Comments:

  1. Kinda reminds me of that guy who was pretty unhappy with Robin Hood Airport in Nottingham, UK. He made an online comment about ‘blowing the place up’ if they ‘didn’t get their cr*p together’. He was dragged in front of a judge and eventually released. In the meantime, his tweet was retweeted by thousands with the hashtag ‘I am Spartacus’ added.

    I wonder, if this happens in the US, would all the other retweeters be jailed too?

GCHQ taps fibre-optic cables for secret access to world’s communications

Posted on June 21st, 2013 at 20:40 by John Sinteur in category: Security

[Quote]:

Britain’s spy agency GCHQ has secretly gained access to the network of cables which carry the world’s phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).

The sheer scale of the agency’s ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.

One key innovation has been GCHQ’s ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months.

GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects.


Write a comment

NSA: If Your Data Is Encrypted, You Might Be Evil, So We’ll Keep It Until We’re Sure

Posted on June 21st, 2013 at 19:04 by John Sinteur in category: Privacy, Security

[Quote]:

There’s been plenty of commentary concerning the latest NSA leak concerning its FISA court-approved “rules” for when it can keep data, and when it needs to delete it. As many of you pointed out in the comments to that piece — and many others are now exploring — the rules seem to clearly say that if your data is encrypted, the NSA can keep it. Specifically, the minimization procedures say that the NSA has to destroy the communication it receives once it’s determined as domestic unless they can demonstrate a few facts about it. As part of this, the rules note:


In the context of a cryptanalytic effort, maintenance of technical data bases requires retention of all communications that are enciphered or reasonably believed to contain secret meaning, and sufficient duration may consist of any period of time during which encrypted material is subject to, or of use in, cryptanalysis.

If you licked your envelope shut, you might be evil, so we’ll keep the letter until we can find the right letter opener.

In other words, if your messages are encrypted, the NSA is keeping them until they can decrypt them. And, furthermore, as we noted earlier, the basic default is that if the NSA isn’t sure about anything, it can keep your data. And, if it discovers anything at all remotely potentially criminal about your data, it can keep it, even if it didn’t collect it for that purpose.


Write a comment

Toddlers Killed More Americans Than Terrorists Did This Year

Posted on June 14th, 2013 at 12:08 by John Sinteur in category: Do you feel safer yet?

[Quote]:

Americans hate terrorists and love our kids, right? So you might be shocked to know that preschoolers with guns have taken more lives so far this year than the single U.S. terrorist attack, which claimed four lives in Boston.


Write a comment

Comments:

  1. Point being? I don’t see it.

  2. I see it.

  3. Yeah, that bathtubs and staircases post was problematic too. I thought I had commented on it, but I guess in the end I didn’t manage to make a concise point and threw away my draft. The casual dismissal that all efforts to curb terrorism are ineffective is an overshoot where they jump from “correlation is not causation” to “correlation disproves causation”. I mean, the fact that we don’t know how much terrorism was prevented does not mean none was prevented. And these little statistical clevernesses don’t go far either. Yes, we should be having debates about the impact of the anti-terrorism effort. But we also need to acknowledge that people are more compelled to prevent crimes than accidents and more motivated to prevent a few big disasters than many small incidents. It’s the same with plane crashes vs car accidents.

    FWIW,RE the stat on people falling down stairs: e law does already mandate handrails on stairs. What’s the dollar cost of that and what would the cost in accidents be if they weren’t there? It’s not like we don’t already try to regulate the biggest accident risks.

    So in short, I find these “foo kills more people than terrorism” posts easily become senseless. This one in particular seemed to have little logic to it.

  4. http://www.esquire.com/blogs/politics/A_Simple_Question

    Yes I was surprised at first by where this appears (Esquire?) but Pierce is as good an American political writer as there is. What he says is germane to the above argument.

  5. Indeed. I don’t think the bathtub, staircase, and toddler people are calling for a simple abandonment of the things we are doing against terrorism. But all we know know is a dollar amount. A HUGE dollar amount, and no way to check if that’s money well spent or not. Given the amount spent on terrorism, and the amount spent on other things, it’s no surprise that only the expenses and visible results – the amount of casualties – are compared. There is no information on the negative results, the attacks prevented. For seat belt laws you could simply compare accident numbers before and after, and you could reasonably conclude the law works. If you do the same for terrorism, the amount of money spent doesn’t seem to do much, apart from inconvenience a lot of people and take away lots of liberties. As long as the available information is insufficient, you will continue to get these comparisons, deriding all efforts against terrorism.

    Because, for all we know, it might be true we should spend some of that money going to terrorism on fighting bath tubs instead.

  6. Fully agree with that Charles Pierce piece porpentine posted.

    Also agreed that there needs to be more debate in the US on what is reasonable and what’s being sacrificed (money & liberty). Problem is of course exactly the lack of transparency in what’s being done and what’s being prevented. “Trust us!”

    Thinking out loud a bit… I think the big difference is that we’re not *terrorized* by bathtubs, staircases, or toddlers, no matter how many people they kill. We do allow ourselves to be terrorized by big attacks and by the potential for further attacks. That’s an essential difference.

Indefinite Detention Of Americans Survives House Vote

Posted on June 14th, 2013 at 10:12 by John Sinteur in category: Do you feel safer yet?, Foyer of Ennui (just short of the Hall of Shame)

[Quote]:

The U.S. House of Representatives voted again Thursday to allow the indefinite military detention of Americans, blocking an amendment that would have barred the possibility.

Congress wrote that authority into law in the National Defense Authorization Act two years ago, prompting outrage from civil libertarians on the left and right. President Barack Obama signed the measure, but insisted his administration would never use it.

Supporters of detention argue that the nation needs to be able to arrest and jail suspected terrorists without trial, including Americans on U.S. soil, for as long as there is a war on terror. Their argument won, and the measure was defeated by a vote of 200 to 226.


Write a comment

Comments:

  1. “President Barack Obama signed the measure, but insisted his administration would never use it.” Right! If it is allowed, it will be used! I am bracing up for my long “vacation” in Guantanamo…

U.S. Agencies Said to Swap Data With Thousands of Firms

Posted on June 14th, 2013 at 10:07 by John Sinteur in category: Microsoft, Security

[Quote]:

Microsoft Corp. (MSFT), the world’s largest software company, provides intelligence agencies with information about bugs in its popular software before it publicly releases a fix, according to two people familiar with the process. That information can be used to protect government computers and to access the computers of terrorists or military foes.

Redmond, Washington-based Microsoft (MSFT) and other software or Internet security companies have been aware that this type of early alert allowed the U.S. to exploit vulnerabilities in software sold to foreign governments, according to two U.S. officials. Microsoft doesn’t ask and can’t be told how the government uses such tip-offs, said the officials, who asked not to be identified because the matter is confidential.

[..]

Michael Hayden, who formerly directed the National Security Agency and the CIA, described the attention paid to important company partners: “If I were the director and had a relationship with a company who was doing things that were not just directed by law but were also valuable to the defense of the Republic, I would go out of my way to thank them and give them a sense as to why this is necessary and useful.”

“You would keep it closely held within the company and there would be very few cleared individuals,” Hayden said.

[..]

If necessary, a company executive, known as a “committing officer,” is given documents that guarantee immunity from civil actions resulting from the transfer of data. The companies are provided with regular updates, which may include the broad parameters of how that information is used.

Intel Corp. (INTC)’s McAfee unit, which makes Internet security software, regularly cooperates with the NSA, FBI and the CIA, for example, and is a valuable partner because of its broad view of malicious Internet traffic, including espionage operations by foreign powers, according to one of the four people, who is familiar with the arrangement.

Such a relationship would start with an approach to McAfee’s chief executive, who would then clear specific individuals to work with investigators or provide the requested data, the person said. The public would be surprised at how much help the government seeks, the person said.


Write a comment

Cartoons

Posted on June 13th, 2013 at 21:13 by Paul Jay in category: Cartoon, Privacy, Security

1013713_489458747792543_168652310_n

tumblr_moau28hzvO1qb5gh9o1_500

Screen Shot 2013-06-13 at 9.11.52 PM

Obama-NSA-yes-we-scan


Write a comment

The network is the message

Posted on June 9th, 2013 at 15:07 by John Sinteur in category: Privacy, Security

[Quote]:

  • They know you rang a phone sex service at 2:24 am and spoke for 18 minutes. But they don’t know what you talked about.
  • They know you called the suicide prevention hotline from the Golden Gate Bridge. But the topic of the call remains a secret.
  • They know you spoke with an HIV testing service, then your doctor, then your health insurance company in the same hour. But they don’t know what was discussed.
  • They know you received a call from the local NRA office while it was having a campaign against gun legislation, and then called your senators and congressional representatives immediately after. But the content of those calls remains safe from government intrusion.
  • They know you called a gynecologist, spoke for a half hour, and then called the local Planned Parenthood’s number later that day. But nobody knows what you spoke about.

Write a comment

Comments:

  1. Jay Leno: “We wanted a president that listens to all Americans – now we have one”

  2. See Bayesian Inference and/or Probability Theory: http://en.wikipedia.org/wiki/Thomas_Bayes
    IE, with the information provided by the metadata alone, one can, with a high degree of accuracy, determine a LOT of the missing pieces that are not specific in that data.

    BTW, gotta love Jay Leno’s quip… :-)

  3. They know what you’re buying at Target, and Target knows you’re pregnant…

  4. This government seems intent on making us the enemy. Forget paranoia as a mental illness, it’s the new normal.

Analyzing Yahoo’s PRISM non-denial

Posted on June 9th, 2013 at 14:58 by John Sinteur in category: Google, Privacy, Security

[Quote]:

Today, Yahoo’s General Counsel posted a carefully worded denial regarding the company’s alleged participation in the NSA PRISM program. To the casual observer, it might seem like a categorical denial. I do not believe that Yahoo’s denial is as straightforward as it seems.

[Quote]:

Yonatan Zunger:

If it had, even if I couldn’t talk about it, in all likelihood I would no longer be working at Google: the fact that we do stand up for individual users’ privacy and protection, for their right to have a personal life which is not ever shared with other people without their consent, even when governments come knocking at our door with guns, is one of the two most important reasons that I am at this company: the other being a chance to build systems which fundamentally change and improve the lives of billions of people by turning the abstract power of computing into something which amplifies and expands their individual, mental life.

Strong statement. And here’s Google’s chief legal officer, David Drummond:

We cannot say this more clearly — the government does not have access to Google servers—not directly, or via a back door, or a so-called drop box. Nor have we received blanket orders of the kind being discussed in the media.


Write a comment

Comments:

  1. What, Zunger is working at Google because he values people’s privacy and thinks their private lives should not be scrutinized without their consent? WHAT. THE. FUCK. Google is the world’s biggest threat to privacy.

    The upshot of all the denials seems to be that (1) it’s legal for the FISA court to demand whatever info they want, so no reason to break the law, and (2) the NSA isn’t integrated into anyone’s data centers. Mkay. Not sure I feel better.

US government invokes special privilege to stop scrutiny of data mining

Posted on June 8th, 2013 at 17:41 by John Sinteur in category: Privacy, Security

[Quote]:

The government has cited the privilege in two active lawsuits being heard by a federal court in the northern district of California – Virginia v Barack Obama et al, and Carolyn Jewel v the National Security Agency. In both cases, the Obama administration has called for the cases to be dismissed on the grounds that the government’s secret activities must remain secret.The claim comes amid a billowing furore over US surveillance on the mass communications of Americans following disclosures by the Guardian of a massive NSA monitoring programme of Verizon phone records and internet communications.The director of national intelligence, James Clapper, has written in court filings that “after careful and actual personal consideration of the matter, based upon my own knowledge and information obtained in the course of my official duties, I have determined that the disclosure of certain information would cause exceptionally grave damage to the national security of the United States. Thus, as to this information, I formally assert the state secrets privilege.”The use of the privilege has been personally approved by President Obama and several of the administration’s most senior officials: in addition to Clapper, they include the director of the NSA Keith Alexander and Eric Holder, the attorney general. “The attorney general has personally reviewed and approved the government’s privilege assertion in these cases,” legal documents state.

[Quote]:

A British Defense Ministry press advisory committee, reacting to a flurry of revelations in the American press about massive warrantless US government electronic surveillance programs, quietly warned UK organizations Friday not to publish British national security information.

Defiance of the advisory could make British journalists vulnerable to prosecution under the Official Secrets Act.


Write a comment

Comments:

  1. George Orwell must be spinning in his grave, while Senator McCarthy is smiling while roasting in his personal pit in hell – he’ll soon have some new companions to sweat with!

U.S. intelligence mining data from nine U.S. Internet companies in broad secret program

Posted on June 7th, 2013 at 5:46 by John Sinteur in category: Privacy, Security

[Quote]:

Jameel Jaffer, deputy legal director of the American Civil Liberties Union, said: “I would just push back on the idea that the court has signed off on it, so why worry? This is a court that meets in secret, allows only the government to appear before it, and publishes almost none of its opinions. It has never been an effective check on government.”

Several companies contacted by The Post said they had no knowledge of the program, did not allow direct government access to their servers and asserted that they responded only to targeted requests for information.

“We do not provide any government organization with direct access to Facebook servers,” said Joe Sullivan, chief security officer for Facebook. “When Facebook is asked for data or information about specific individuals, we carefully scrutinize any such request for compliance with all applicable laws, and provide information only to the extent required by law.”

“We have never heard of PRISM,” said Steve Dowling, a spokesman for Apple. “We do not provide any government agency with direct access to our servers, and any government agency requesting customer data must get a court order.”

It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing “collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,” rather than directly to company servers.

Government officials and the document itself made clear that the NSA regarded the identities of its private partners as PRISM’s most sensitive secret, fearing that the companies would withdraw from the program if exposed. “98 percent of PRISM production is based on Yahoo, Google and Microsoft; we need to make sure we don’t harm these sources,” the briefing’s author wrote in his speaker’s notes.


Write a comment

Comments:

  1. Prism? Is that like Echelon? https://en.wikipedia.org/wiki/ECHELON
    And, as people have noted before, how tedious is is going to be to listen to all those calls? And if you have got software to do that, how accurate is that going to be?
    Pete

  2. Voice recognition software has a long way to go before it’s any kind of reliable. Right now, it depends on clear, distinct diction from the user. There are iPhone and Onstar users who can’t get their stuff to work because of their distinct diction.

    The notion that the US is casting a net over the entire world fishing for a handful of terrorists is ludicrous. Not saying there aren’t a few dodos in the government who think it’s possible. The rational reaction to any attempt to do so would be to laugh and say, “Knock yourselves out”. The real sad part here isn’t the loss of privacy, it’s the loss of taxpayer dollars.

Skype with care – Microsoft is reading everything you write

Posted on May 19th, 2013 at 22:33 by John Sinteur in category: Microsoft, Privacy, Security

[Quote]:

Anyone who uses Skype has consented to the company reading everything they write. The H’s associates in Germany at heise Security have now discovered that the Microsoft subsidiary does in fact make use of this privilege in practice. Shortly after sending HTTPS URLs over the instant messaging service, those URLs receive an unannounced visit from Microsoft HQ in Redmond.


Write a comment

Are all telephone calls recorded and accessible to the US government?

Posted on May 6th, 2013 at 12:31 by Desiato in category: Do you feel safer yet?, Privacy

[Quote]:

On Wednesday night, Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could:

BURNETT: Tim, is there any way, obviously, there is a voice mail they can try to get the phone companies to give that up at this point. It’s not a voice mail. It’s just a conversation. There’s no way they actually can find out what happened, right, unless she tells them?

CLEMENTE: "No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. It’s not necessarily something that the FBI is going to want to present in court, but it may help lead the investigation and/or lead to questioning of her. We certainly can find that out.

BURNETT: "So they can actually get that? People are saying, look, that is incredible.

CLEMENTE: "No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not."

"All of that stuff" – meaning every telephone conversation Americans have with one another on US soil, with or without a search warrant – "is being captured as we speak".


Write a comment

Comments:

  1. A simple way to implement CALEA was to record everything, and then give lawn enforcement access when they asked for it. Even simpler and cheaper to let them record it all themselves.

    Sorry officer, I admit I am guilty of extreme cynicism.

  2. Last I heard it wasn’t necessary for the US government to record communications as they farmed the job out to the people working in this doughnut shaped monstrosity:
    http://www.gchq.gov.uk/Pages/homepage.aspx
    As I understand it a treaty between the US/UK to monitor each others communications bypasses any rights a citizen of either country has to prevent it.
    It’s for our own good, we have nothing to worry about, we are all safe.

  3. I’m a cynic but, unlike Sue, I’m a boring cynic. Recording my private conversations would induce sleep.

  4. This is one reason we won’t eliminate terrorism. The net we use to catch terrorists is too large and inefficient. It’s like guns and bombs passing through airport security because the scanners are almost hypnotized by the sheer volume that they’re scanning.

  5. @Rob- Freedom is not a right nor should be taken for granted. It needs to be defended. I respectfully submit that those who accept these warrant-less searches only serve to whittle way at what little freedom Americans have left. (Not sure if this fits what you were saying or not…)

  6. @Mykolas – Not really. I simply refuse to concern myself about this. Americans have oodles of freedom. The average American hardly does anything in the course of his or her daily life in deference to government. Not a big fan of absolutes or slippery slope arguments.

    Information gathering is the inevitable by-product of this digital age. The information is out there. The government has it, Cisco has it, Apple Computer has it, Private Manning has it, AT&T has it, spammers have it, Amazon.com has it, etc … As Aaron Swartz might say, “Information yearns to be free”. I have already adapted to it. I’m sure most of the tech-savvy readers here have, too.

  7. @Rob – Manning is in jail, when are the others going to jail?

  8. Manning and Swartz both committed crimes, chas.

  9. Manning and Schwartz are both alleged to have committed crimes. Neither has been convicted. The distinction may seem academic, but neither one was treated with an assumption of innocence.

  10. @Rob – Crimes defined by the 1% are not crimes in my humble opinion. The laws are supposed to protect the 99% and that has been their function for almost a 1000 years. This country took a turn when the 1% became excessively greedy.

  11. I accept that distinction, Desiato. They were both accused of crimes. They were and are being treated with a presumption of innocence, though. Swartz killed himself in his apartment, not a jail cell. Manning is in a cell on suicide watch. I think that’s prudent. I’ll let you decide if Swartz presumed himself innocent. We stray from the subject, though, which I thought was privacy and the gathering of information.

  12. Crimes are not defined by the 1%. That’s silly conspiracy enthusiast nonsense. Laws are written by the people we elect.

  13. Not for nothing but Aaron Swartz, himself, was in the 1%.

  14. @Rob – Correction – laws are written by the lobbyists who funded the people “we” elect.

  15. @Mykolas – Lobbyists have been around since democracy has been around. They don’t always get what they want. They wield some influence but so does the average citizen. You’d be surprised what a phone call or letter from a citizen can do. I’ve never communicated with the President but I have communicated with our local reps. They hear us, too.

  16. @Rob…dream on.

Canada can’t account for $3.1B in anti-terror funding

Posted on May 3rd, 2013 at 1:08 by Sueyourdeveloper in category: Do you feel safer yet?, News, Security

Quote

The federal government needs to do better at tracking and evaluating some of its program spending to ensure taxpayer dollars are being well-spent, Auditor General Michael Ferguson found in his spring report released today, and one of the most striking examples is that it can’t account for $3.1 billion in anti-terrorism funding.

Out of $12 billion, $3.1 billion can’t be accounted for. Not exactly missing, we just can’t say what we did with it.


Write a comment

Comments:

  1. We need to get rid of Harper…and he’s also trying to turn the CBC into the FOX news of the north *puke*

  2. Not that I’m a Harper fan, but… the alternatives are???
    Justin will save us?
    Guess folks don’t remember how the Liberals operate.
    A quote from the Globe and Mail about his dad, and yes, I remember those times and that history:

    Aug. 21, 1982: If nothing else, Prime Minister Pierre Trudeau has returned from his holiday out west with the knowledge that people are angry enough to throw things. They tossed tomatoes at his railway coach as it emerged from the Connaught Tunnel in Rogers Pass. They pelted his car with eggs in Exshaw and Canmore and on the outskirts of Calgary. Five hundred of them threw rocks, eggs and tomatoes at the coach in Sudbury, breaking two windows in the process.

    Not even helpless anger in the face of the recession can excuse the tactics of these demonstrators, particularly the dangerous behaviour of the mob in Sudbury. But Mr. Trudeau’s own behaviour — giving the finger to three placard-carrying people along the rail lines at Salmon Arm — is an example of the arrogance which has driven people to believe nothing short of tomatoes and eggs will catch his attention.

    Those without jobs, and those whose paycheques can’t keep up with rising costs, are frustrated, angry, even desperate. If Mr. Trudeau has returned to Ottawa with a heightened sense of that desperation, his trip has proved more than a vacation; it has given him a timely glimpse into the communities whose welfare is determined by his government’s policies.

  3. At this point I’d just settle for competent administration.

Confrontation With TSA Agent Leaves Grandpa’s Ashes On Floor

Posted on April 7th, 2013 at 16:48 by Paul Jay in category: Do you feel safer yet?, Security

[Quote]:

A man’s attempt to bring the ashes of his grandfather home to Indianapolis ended with an angry scene in a Florida airport, with the ashes spilled on the terminal floor.

John Gross, a resident of Indianapolis’ south side, was leaving Florida with the remains of his grandfather — Mario Mark Marcaletti, a Sicilian immigrant who worked for the Penn Central Railroad in central Indiana — in a tightly sealed jar marked “Human Remains.”

Gross said he didn’t think he’d have a problem, until he ran into a TSA agent at the Orlando airport.

“They opened up my bag, and I told them, ‘Please, be careful. These are my grandpa’s ashes,’” Gross told RTV6′s Norman Cox. “She picked up the jar. She opened it up.

“I was told later on that she had no right to even open it, that they could have used other devices, like an X-ray machine. So she opened it up. She used her finger and was sifting through it. And then she accidentally spilled it.”

Gross says about a quarter to a third of the contents spilled on the floor, leaving him frantically trying to gather up as much as he could while anxious passengers waited behind him.

“She didn’t apologize. She started laughing. I was on my hands and knees picking up bone fragments. I couldn’t pick up all, everything that was lost. I mean, there was a long line behind me.”

TSA rules say a crematory container in carry-on baggage must pass through the X-ray machine at the security checkpoint.

But the agency’s own website says human remains are to be opened under, “no circumstances.”

“I want an apology,” said Gross. “I want an apology from TSA. I want an apology from the lady who opened the jar and laughed at me. I want them to help me understand where they get off treating people like this.”

 


Write a comment


« Older Entries Newer Entries »