-
Advanced police surveillance technologies pose significant privacy concerns
Much of the attention on surveillance in the media focuses on the National Security Agency (NSA), but there is not a lot of scrutiny on local domestic surveillance. In 1997, about 20 percent of police departments in the United States used some type of technological surveillance. By 2007, that number had risen to more than 70 percent of departments. Experts in criminal law and information privacy warn that the widespread use of advanced surveillance technologies such as automatic license plate readers, surveillance cameras, red light cameras, and facial recognition software by state and local police departments, combined with a lack of oversight and regulation, have the potential to develop into a form of widespread community surveillance, which ought to pose significant privacy concerns to law-abiding citizens.
-
-
U.S. tech companies could go “dark” to regain trust
With each new revelation of the scope of the American National Security Agency’s spying, perceptions of the importance of privacy are hardening around the world. There is thus a motivation for major technology companies to provide a verifiably secure means of allowing users to communicate securely without an ability for the companies to provide access to security agencies, even if requested to. Two companies, Silent Circle and Lavabit, have come together to form the Dark Mail alliance in an attempt to do exactly this.
-
-
U.S. tech companies increase lobbying efforts related to surveillance, NSA
Technology firms Apple, Google, Facebook, and Microsoft, among other tech powerhouses, are quietly increasing lobbying efforts directed at government surveillance laws as they seek to have a say in what Congress does regarding surveillance reforms and National Security Agency (NSA) programs. Traditionally, tech firms have not pushed for restrictions on the ability of the U.S. intelligence community to collect data, and it is not clear what position these industry leaders will take, whether they plan to take a position at all, or whether they will present lawmakers with a united industry front.
-
-
Backlash: growing interest in counter-surveillance tools
The revelations about the NSA surveillance programs has prompted what some see as high-tech civil disobedience: a growing number of products and applications aiming to limit the NSA’s ability to access encrypted e-mails, obtain phone records, and listen to phone conversations.
-
-
Director of U.K. intelligence spiritedly defends surveillance programs
The chief of MI5, Britain’s domestic intelligence agency, said last week that recent leaks of government surveillance capabilities had given “the advantage to the terrorists.” Andrew Parker said that “What we know about the terrorists, and the detail of the capabilities we use against them, together represent our margin of advantage. That margin gives us the prospect of being able to detect their plots and stop them. But that margin is under attack.”
-
-
Web sites secretly track users without relying on cookies
Device fingerprinting, also known as browser fingerprinting, is the practice of collecting properties of PCs, smartphones, and tablets to identify and track users. For the vast majority of browsers, the combination of these properties is unique, and thus functions as a “fingerprint” that can be used to track users without relying on cookies. Researchers have discovered that 145 of the Internet’s 10,000 top Web sites use device fingerprinting to track users without their knowledge or consent.
-
-
Virginia police built massive data base of political rallies participants
From 2010 until last spring, the Virginia State Police (VSP) used automatic license plate readers (ALPRs) to collect information about – and build a massive data base of — political activities of law-abiding people. The VSP, for example, recorded the license plates of vehicles attending President Obama’s 2009 inauguration, as well as campaign rallies for Obama and vice presidential candidate Sarah Palin. Following a strong opinion by Virginia Attorney General Ken Cuccinelli, the VSP discontinued the practice, and the agency says it has purged its license plate database, and now disposes of ALPR-obtained information within twenty-four hours of collection, unless it is relevant to a clearly defined criminal investigation.
-
-
U.S. keeping too much data on too many people for too long: report
A new study surveys five methods of data collection by U.S. intelligence and law enforcement agencies, and finds that these agencies not only collect massive amounts of innocent Americans’ data, but can share and store this data for up to seventy-five years or more, creating opportunities for abuse and clogging government databases.
-
-
NSA tried to crack Tor anonymity tool
In its efforts to gather more intelligence, and overcome obstacles to this effort, the National Security Agency (NSA) has repeatedly tried to develop attacks against people using Tor, a software tool designed to protect online anonymity – and which is primarily funded and promoted by the U.S. government itself to help political activists, whistleblowers, militaries, and law enforcement. The NSA’s determined effort to crack Tor raises questions about whether the agency, deliberately or inadvertently, acted against Internet users in the United States when attacking Tor. One of the main functions of Tor is to hide the country of all of its users, meaning any attack could be hitting members of Tor’s large U.S. user base.
-
-
Restricting license plate readers undermines law enforcement: study
White paper argues that Massachusetts legislation restricting the use of license plate readers (LPRs) is rooted in exaggerated fears and misconceptions, and will reduce effectiveness of LPR technology and weaken law-enforcement’s efforts to pursue criminals.
-
-
More Americans see their electronic equipment seized by DHS at the border
The American Civil Liberties Union (ACLU) has released details of an investigation showing how U.S. law enforcement and other agencies exceed their powers in the name of homeland security. The ACLU points to the practice of the U.S. border agents searching and seizing the electronic devices of Americans at the border. Public data shows that more Americans are having their electronic devices searched.
-
-
Police’s facial recognition program becomes a political issue in Ohio
Attorney General Mike DeWine of Ohio confirmed last week that local and state law enforcement have used facial recognition software since June of this year to match images of potential suspects and victims to pictures on the state’s drivers’ licenses and mug shots. The Democratic challenger for the Attorney General post faulted DeWine’s office for launching the program on 6 June without any public notice.
-
-
Security vs. privacy
Those who ask you to choose security or privacy and those who vote on security or privacy are making false choices. That’s like asking air or water? You need both to live. Maslow placed safety (of which security is a subset) as second only to food, water, sex, and sleep. As humans we crave safety. As individuals and societies, before we answer the question “security or privacy,” we first have to ask “security from whom or what?” and “privacy from whom and for whom?”
-
-
Privacy board wants Feds to update security agencies’ operating rules
The independent Privacy and Civil Liberties Board says U.S. national security agencies are operating under outdated rules which should be revised to reflect advances in technology.The oversight board says that rules governing collection and retention of data about Americans need be revised to “appropriately capture both the evolution of technology and the roles and capabilities of the intelligence community since 9/11.”
-
-
U.K. detains, questions NSA revelations journalist’s partner
David Miranda, the partner of Guardian’s Glenn Greenwald who interviewer Edward Snowden and who wrote several stories based on documents provided by Snowden, was detained for nine hours by U.K. authorities at Heathrow Airport and questioned under schedule 7 of the Terrorism Act 2000. Miranda was released – schedule 7 allows a suspect to be held for a maximum of nine hours, and then the police must release or formally arrest the individual. – but the electronic equipment he was carrying with him, including his mobile phone, laptop, camera, memory sticks, DVDs, and games consoles were confiscated by the authorities.
-