Category Archives: privacy

Tom Engelhardt: The Big Brotherness of it all

Surveilling the Class of 2014
By Tom Engelhardt

Internet Class of 2014, I’m in awe of you! To this giant, darkened auditorium filled with sparkling screens of every sort, welcome! 

It would, of course, be inaccurate to say, as speakers like me once did, that after four years of effort and experience you are now about to leave the hallowed halls of this campus and graduate into a new and adult world.  The odds are that you aren’t.  You were graduated into that world long ago.  I’m not sure that it qualifies as adult at all, but a new world it surely is, and one I grasp so little that I feel I should be in the audience and you up here doing what graduation speakers normally do: offering an upbeat, even inspirational, explanation of our world and your place in it.

Honestly, I’m like one of those old codgers I used to watch in the military parades of my 1950s childhood.  You know, white-haired guys in open vehicles, probably veterans of the Spanish-American War (a conflict you’ve undoubtedly never heard of amid the ongoing wars of your own lifetime).  To me, they always looked like they had been disinterred from some museum of ancient history, some unimaginable American Pompeii.

And yet those men and I probably had more in common than you and I do now.  After all, I don’t have a smartphone or an iPad.  I’m a book editor, but lack a Kindle or a Nook.  I don’t tweet or Skype.  I can’t photograph anyone or shoot video of anything.  I don’t know how to text or read my email while walking in the street or sitting in a restaurant.  And when something goes wrong on my computer or with the Internet, I collapse in a heap, believe myself a doomed man on an alien planet, mourn the passing of the typewriter, and call my daughter and throw myself on her mercy.

You were “graduated” long ago into the world that, though I live in it after a fashion as the guy who runs TomDispatch.com, I still find as alien as a Martian landscape.  Your very fingers, agile as they are with little buttons of every sort, speak a new and different language, and a lot of the time it seems to me that I have no translator on hand.  Your world, the sea you swim in, has been hailed for its many wonders and miracles — and wonders and miracles they surely are. Dazzling they truly can be.  The tying together of the planet in instantaneous communion as if space and geography, distances of every sort, were a thing of the past still stuns me.

Sometimes, as in my first experience with Skype, I feel like a Trobriand Islander suddenly plunged into the wonders of modernity.  If you had told me back in the 1950s that someday I would actually see whomever I was talking to onscreen, I doubt I would have believed you.  (On the other hand, I was partial to the fantasy that we would all be experiencing traffic jams in the skies over our cities as we zipped around with our own personal jetpacks strapped to our backs — a promised future no one ever delivered.)

There’s a book to be written on just how disorienting it is to live into the world of the future, as at almost 70 years old I now find myself doing.  There is, however, one part of our futuristic world that I feel strangely at home with.  Its accomplishments are no less technologically awe-inspiring, no less staggeringly sci-fi-ish than the ones I’ve been talking about and yet, perhaps in part thanks to a youth heavily influenced by George Orwell’s 1984 and other dystopian writings, it seems oddly familiar to me, as if I had parachuted from a circling spacecraft onto an only slightly updated version of my own planet.

Continue reading

Facebooktwittermail

Snowden would not get a fair trial — and Kerry is wrong

Daniel Ellsberg writes: John Kerry was in my mind Wednesday morning, and not because he had called me a patriot on NBC News. I was reading the lead story in the New York Times – “US Troops to Leave Afghanistan by End of 2016” – with a photo of American soldiers looking for caves. I recalled not the Secretary of State but a 27-year-old Kerry, asking, as he testified to the Senate about the US troops who were still in Vietnam and were to remain for another two years: How do you ask a man to be the last man to die for a mistake?

I wondered how a 70-year-old Kerry would relate to that question as he looked at that picture and that headline. And then there he was on MSNBC an hour later, thinking about me, too, during a round of interviews about Afghanistan that inevitably turned to Edward Snowden ahead of my fellow whistleblower’s own primetime interview that night:

There are many a patriot – you can go back to the Pentagon Papers with Dan Ellsberg and others who stood and went to the court system of America and made their case. Edward Snowden is a coward, he is a traitor, and he has betrayed his country. And if he wants to come home tomorrow to face the music, he can do so.

On the Today show and CBS, Kerry complimented me again – and said Snowden “should man up and come back to the United States” to face charges. But John Kerry is wrong, because that’s not the measure of patriotism when it comes to whistleblowing, for me or Snowden, who is facing the same criminal charges I did for exposing the Pentagon Papers. [Continue reading…]

Facebooktwittermail

The NSA is recording every cell phone call in the Bahamas

In March, the Washington Post reported: The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.

A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. [Continue reading…]

The Intercept now reports: The National Security Agency is secretly intercepting, recording, and archiving the audio of virtually every cell phone conversation on the island nation of the Bahamas.

According to documents provided by NSA whistleblower Edward Snowden, the surveillance is part of a top-secret system – code-named SOMALGET – that was implemented without the knowledge or consent of the Bahamian government. Instead, the agency appears to have used access legally obtained in cooperation with the U.S. Drug Enforcement Administration to open a backdoor to the country’s cellular telephone network, enabling it to covertly record and store the “full-take audio” of every mobile call made to, from and within the Bahamas – and to replay those calls for up to a month.

SOMALGET is part of a broader NSA program called MYSTIC, which The Intercept has learned is being used to secretly monitor the telecommunications systems of the Bahamas and several other countries, including Mexico, the Philippines, and Kenya. But while MYSTIC scrapes mobile networks for so-called “metadata” – information that reveals the time, source, and destination of calls – SOMALGET is a cutting-edge tool that enables the NSA to vacuum up and store the actual content of every conversation in an entire country.

All told, the NSA is using MYSTIC to gather personal data on mobile calls placed in countries with a combined population of more than 250 million people. And according to classified documents, the agency is seeking funding to export the sweeping surveillance capability elsewhere. [Continue reading…]

Facebooktwittermail

Secrets, lies and Snowden’s email: why I was forced to shut down Lavabit

Ladar Levison writes: My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation of surveillance equipment on my company’s network.

My company, Lavabit, provided email services to 410,000 people – including Edward Snowden, according to news reports – and thrived by offering features specifically designed to protect the privacy and security of its customers. I had no choice but to consent to the installation of their device, which would hand the US government access to all of the messages – to and from all of my customers – as they travelled between their email accounts other providers on the Internet.

But that wasn’t enough. The federal agents then claimed that their court order required me to surrender my company’s private encryption keys, and I balked. What they said they needed were customer passwords – which were sent securely – so that they could access the plain-text versions of messages from customers using my company’s encrypted storage feature. (The government would later claim they only made this demand because of my “noncompliance”.)

Bothered by what the agents were saying, I informed them that I would first need to read the order they had just delivered – and then consult with an attorney. The feds seemed surprised by my hesitation.

What ensued was a flurry of legal proceedings that would last 38 days, ending not only my startup but also destroying, bit by bit, the very principle upon which I founded it – that we all have a right to personal privacy. [Continue reading…]

Facebooktwittermail

NSA spying has a disproportionate effect on U.S. immigrants

Conor Friedersdorf writes: The U.S. government concedes that it needs a warrant to eavesdrop on phone calls between Americans, or to read the body of their emails to one another. Everyone agrees that these communications are protected by the Fourth Amendment. But the government also argues that Fourth Amendment protections don’t apply when an American calls or writes to a foreigner in another country.

Let’s say, for example, that the head of the NAACP writes an email to a veteran of the South African civil-rights struggle asking for advice about an anti-racism campaign; or that Hillary Clinton fields a call from a friend in Australia whose daughter was raped; or that Jeb Bush uses Skype to discuss with David Cameron whether he should seek the 2016 presidential nomination for the Republican Party. Under the Obama administration’s logic, these Americans have no reasonable expectation of privacy with regard to these conversations, and it is lawful and legitimate for the NSA to eavesdrop on, record, and store everything that is said.

The arguments Team Obama uses to justify these conclusions are sweeping and worrisome, as the ACLU’s Jameel Jaffer captures in his analysis of the relevant legal briefs: [Continue reading…]

Facebooktwittermail

Bill to curb NSA spying looks like change, but isn’t really

McClatchy reports: The bipartisan bill that aims to put serious curbs on the National Security Agency’s mass collection of Americans’ communications is being hailed by Republicans and Democrats as a big breakthrough.

It’s not.

“The bottom line: This is largely faux reform and a surveillance salve,” said Thomas Drake, a former NSA senior official turned whistle-blower who’s critical of the agency’s collection programs. “To date, neither the House nor Senate attempts go far enough.”

That’s not easy to discern, thanks to an outpouring of raves for the legislation. Democrats, Republicans and traditionally skeptical watchdog groups have put their muscle behind the USA Freedom Act.

The House of Representatives is expected to vote on its version of the bill next week, the first time since news about the surveillance broke last year that major legislation supported by top congressional leaders like this has come to the floor. The Senate might take up its own version as early as this summer.

The top Republican and Democrat on the House Intelligence Committee even issued a joint statement praising the bipartisan cooperation, a rarely seen trait around Congress these days.

But peek just past all the good will and there’s serious concern that Congress has much more to do. Not only are loopholes easy to find but also the government has other ways of collecting the data. [Continue reading…]

Facebooktwittermail

Who watches the watchers? Big Data goes unchecked

Politico reports: The National Security Agency might be tracking your phone calls. But private industry is prying far more deeply into your life.

Commercial data brokers know if you have diabetes. Your electric company can see what time you come home at night. And tracking companies can tell where you go on weekends by snapping photos of your car’s license plate and cataloging your movements.

Private companies already collect, mine and sell as many as 75,000 individual data points on each consumer, according to a Senate report. And they’re poised to scoop up volumes more, as technology unleashes a huge wave of connected devices — from sneaker insoles to baby onesies to cars and refrigerators — that quietly track, log and analyze our every move.

Congress and the administration have moved to rein in the National Security Agency in the year since Edward Snowden disclosed widespread government spying. But Washington has largely given private-sector data collection a free pass. The result: a widening gap in oversight as private data mining races ahead. Companies are able to scoop up ever more information — and exploit it with ever greater sophistication — yet a POLITICO review has found deep reluctance in D.C. to exercise legislative, regulatory or executive power to curb the big business of corporate cybersnooping.

The inertia — and lack of a serious legislative push — on private-sector data mining has several causes. Many Republicans are averse to any new regulation of business. Many Democrats are skittish about alienating campaign donors in Silicon Valley. [Continue reading…]

Facebooktwittermail

EU court backs ‘right to be forgotten’: Google must amend results on request

The Guardian reports: The top European court has backed the “right to be forgotten” and said Google must delete “inadequate, irrelevant or no longer relevant” data from its results when a member of the public requests it.

The test case privacy ruling by the European Union’s court of justice against Google Spain was brought by a Spanish man, Mario Costeja González, after he failed to secure the deletion of an auction notice of his repossessed home dating from 1998 on the website of a mass circulation newspaper in Catalonia.

Costeja González argued that the matter, in which his house had been auctioned to recover his social security debts, had been resolved and should no longer be linked to him whenever his name was searched on Google.

He told the Guardian: “Like anyone would be when you tell them they’re right, I’m happy. I was fighting for the elimination of data that adversely affects people’s honour, dignity and exposes their private lives. Everything that undermines human beings, that’s not freedom of expression.” [Continue reading…]

Facebooktwittermail

The U.S. supreme court needs to keep up with our cellphones – and the NSA

Yochai Benkler writes: Tuesday’s US supreme court arguments involved a seemingly basic legal question about the future of the Fourth Amendment: do police officers need a warrant to search the cellphone of a person they arrest? But the two privacy cases pit against each other two very different conceptions of what it means to be a supreme court in the first place – and what it means to do constitutional law in the 21st century.

“With computers, it’s a new world,” several justices reportedly said in the chamber. Are they ready to be the kinds of justices who make sense of it?

Cellphones expose so much of our most personal data that the decision should be a 9-0 no-brainer. The basic problem that makes it a harder call is that lawyers and judges are by training and habit incrementalists, while information and communications technology moves too fast for incrementalism to keep up. [Continue reading…]

Facebooktwittermail

As we sweat government surveillance, companies like Google collect our data

Dan Gillmor writes: As security expert Bruce Schneier (a friend) has archly observed, “Surveillance is the business model of the internet.” I don’t expect this to change unless and until external realities force a change – and I’m not holding my breath.

Instead, the depressing news just seems to be getting worse. Google confirmed this week what many people had assumed: even if you’re not a Gmail user, your email to someone who does use their services will be scanned by the all-seeing search and the advertising company’s increasingly smart machines. The company updated their terms of service to read:

Our automated systems analyze your content (including e-mails) to provide you personally relevant product features, such as customized search results, tailored advertising, and spam and malware detection. This analysis occurs as the content is sent, received, and when it is stored.

My system doesn’t do this to your email when you send me a message. I pay a web-hosting company that keeps my email on a server that isn’t optimized for data collection and analysis. I would use Gmail for my email, if Google would let me pay for service that didn’t “analyze (my) content” apart from filtering out spam and malware. Google doesn’t offer that option, as far as I can tell, and that’s a shame – if not, given its clout, a small scandal. [Continue reading…]

Facebooktwittermail

Facebook’s DeepFace will soon be analyzing your face

n13-iconPolicyMic: Facebook is officially one step closer to becoming Big Brother. Last week, the company announced a new, startlingly accurate photo recognition program, ominously called DeepFace.

The program can compare two photos and determine whether they are of the same person with 97.25% accuracy — just a hair below the 97.53% facial recognition rate of actual human beings.

DeepFace goes way beyond Facebook’s current facial recognition that suggests tags for images. [Continue reading…]

Facebooktwittermail

Watch: Edward Snowden at SXSW (via planet Mars)

n13-iconThe Guardian reports: Encryptions tools must be simplified and made accessible for the mainstream, Pulitzer-winning journalist Barton Gellman said on Monday, calling on the tech industry to have the courage and ingenuity to help address the disparity of power between the people and their government.

Addressing the SXSW festival shortly before Edward Snowden’s live speech by video, Gellman said we are a long way off simple, transparent encryption tools. He cited Pew research which found that 88% of Americans say they have taken steps to protect their privacy in some form.

“With all the user interface brains out there we could get easier tools,” he said. “But it’s not just the ability to encrypt, it’s a frame of mind, a workflow and a discipline that is alien to most people, and that is the opposite to the open nature of the consumer internet. You could use Tor to access a site a hundred times, but the 101st time you forget, you may as well not have used Tor.”

“There are people at this conference who have taken very considerable risk to protect the privacy of their customers and have put themselves at the edge of the door to jail and it will take courage as well as ingenuity to change the way things work.” [Continue reading…]

Note: The audio quality of Snowden’s feed renders him virtually unintelligible, but Christopher Soghoian, the American Civil Liberties Union’s principal technologist, comes through loud and clear.

Facebooktwittermail

The culture of hacking in China

a13-iconThe New York Times reported last May: Name a target anywhere in China, an official at a state-owned company boasted recently, and his crack staff will break into that person’s computer, download the contents of the hard drive, record the keystrokes and monitor cellphone communications, too.

Pitches like that, from a salesman for Nanjing Xhunter Software, were not uncommon at a crowded trade show this month that brought together Chinese law enforcement officials and entrepreneurs eager to win government contracts for police equipment and services.

“We can physically locate anyone who spreads a rumor on the Internet,” said the salesman, whose company’s services include monitoring online postings and pinpointing who has been saying what about whom.

The culture of hacking in China is not confined to top-secret military compounds where hackers carry out orders to pilfer data from foreign governments and corporations. Hacking thrives across official, corporate and criminal worlds. Whether it is used to break into private networks, track online dissent back to its source or steal trade secrets, hacking is openly discussed and even promoted at trade shows, inside university classrooms and on Internet forums. [Continue reading…]

Facebooktwittermail

Chomsky: In times of government surveillance, whose ‘security’ is at stake?

f13-iconNoam Chomsky: A leading principle of international relations theory is that the state’s highest priority is to ensure security. As Cold War strategist George F. Kennan formulated the standard view, government is created “to assure order and justice internally and to provide for the common defense.”

The proposition seems plausible, almost self-evident, until we look more closely and ask: Security for whom? For the general population? For state power itself? For dominant domestic constituencies?

Depending on what we mean, the credibility of the proposition ranges from negligible to very high.

Security for state power is at the high extreme, as illustrated by the efforts that states exert to protect themselves from the scrutiny of their own populations.

In an interview on German TV, Edward J. Snowden said that his “breaking point” was “seeing Director of National Intelligence, James Clapper, directly lie under oath to Congress” by denying the existence of a domestic spying program conducted by the National Security Agency.

Snowden elaborated that “The public had a right to know about these programs. The public had a right to know that which the government is doing in its name, and that which the government is doing against the public.”

The same could be justly said by Daniel Ellsberg, Chelsea Manning and other courageous figures who acted on the same democratic principle.

The government stance is quite different: The public doesn’t have the right to know because security thus is undermined—severely so, as officials assert. [Continue reading…]

Facebooktwittermail

Big data has outpaced our legal system’€™s ability to control it

f13-iconNeil Richards writes: These days, everyone seems to be talking about “big data.” Engineers, researchers, lawyers, executives and self-trackers all tout the surprising insights they can get from applying math to large data sets. The rhetoric of big data is often overblown, exaggerated and contradictory, but there’s an element of truth to the claim that data science is helping us to know more about our world, our society and ourselves.

Data scientists use big data to deliver personalized ads to Internet users, to make better spell checkers and search engines, to predict weather patterns, perform medical research, learn about customers, set prices and plan traffic flow patterns. Big data can also fight crime, whether through the use of automated license-plate readers or, at least theoretically, through the collection of vast amounts of “metadata” about our communications and associations by the National Security Agency.

Big data allows us to know more, to predict and to influence others. This is its power, but it’s also its danger. The entities that can harness the power of math applied to large sets of personal information can do things that used to be impossible. Many of these new uses are good, but some of them aren’t. For example, if our “personalized prices” can be based on our race or sex, or if our college admissions are based on things like ZIP code or car ownership, we might want to think more deeply about the kinds of big decisions our big data can be used for. We’re creating a society based on data, and we need to make sure that we create a society that we want to live in. [Continue reading…]

Facebooktwittermail