Noam Chomsky: A leading principle of international relations theory is that the state’s highest priority is to ensure security. As Cold War strategist George F. Kennan formulated the standard view, government is created “to assure order and justice internally and to provide for the common defense.”
The proposition seems plausible, almost self-evident, until we look more closely and ask: Security for whom? For the general population? For state power itself? For dominant domestic constituencies?
Depending on what we mean, the credibility of the proposition ranges from negligible to very high.
Security for state power is at the high extreme, as illustrated by the efforts that states exert to protect themselves from the scrutiny of their own populations.
In an interview on German TV, Edward J. Snowden said that his “breaking point” was “seeing Director of National Intelligence, James Clapper, directly lie under oath to Congress” by denying the existence of a domestic spying program conducted by the National Security Agency.
Snowden elaborated that “The public had a right to know about these programs. The public had a right to know that which the government is doing in its name, and that which the government is doing against the public.”
The same could be justly said by Daniel Ellsberg, Chelsea Manning and other courageous figures who acted on the same democratic principle.
The government stance is quite different: The public doesn’t have the right to know because security thus is undermined—severely so, as officials assert. [Continue reading…]
Category Archives: surveillance
Big data has outpaced our legal system’s ability to control it
Neil Richards writes: These days, everyone seems to be talking about “big data.” Engineers, researchers, lawyers, executives and self-trackers all tout the surprising insights they can get from applying math to large data sets. The rhetoric of big data is often overblown, exaggerated and contradictory, but there’s an element of truth to the claim that data science is helping us to know more about our world, our society and ourselves.
Data scientists use big data to deliver personalized ads to Internet users, to make better spell checkers and search engines, to predict weather patterns, perform medical research, learn about customers, set prices and plan traffic flow patterns. Big data can also fight crime, whether through the use of automated license-plate readers or, at least theoretically, through the collection of vast amounts of “metadata” about our communications and associations by the National Security Agency.
Big data allows us to know more, to predict and to influence others. This is its power, but it’s also its danger. The entities that can harness the power of math applied to large sets of personal information can do things that used to be impossible. Many of these new uses are good, but some of them aren’t. For example, if our “personalized prices” can be based on our race or sex, or if our college admissions are based on things like ZIP code or car ownership, we might want to think more deeply about the kinds of big decisions our big data can be used for. We’re creating a society based on data, and we need to make sure that we create a society that we want to live in. [Continue reading…]
Eavesdropping by algorithm is still eavesdropping
Bruce Schneier writes: Increasingly, we are watched not by people but by algorithms. Amazon and Netflix track the books we buy and the movies we stream, and suggest other books and movies based on our habits. Google and Facebook watch what we do and what we say, and show us advertisements based on our behavior. Google even modifies our web search results based on our previous behavior. Smartphone navigation apps watch us as we drive, and update suggested route information based on traffic congestion. And the National Security Agency, of course, monitors our phone calls, emails and locations, then uses that information to try to identify terrorists.
Documents provided by Edwards Snowden and revealed by the Guardian today show that the UK spy agency GHCQ, with help from the NSA, has been collecting millions of webcam images from innocent Yahoo users. And that speaks to a key distinction in the age of algorithmic surveillance: is it really okay for a computer to monitor you online, and for that data collection and analysis only to count as a potential privacy invasion when a person sees it? I say it’s not, and the latest Snowden leaks only make more clear how important this distinction is.
The robots-vs-spies divide is especially important as we decide what to do about NSA and GCHQ surveillance. The spy community and the Justice Department have reported back early on President Obama’s request for changing how the NSA “collects” your data, but the potential reforms – FBI monitoring, holding on to your phone records and more – still largely depend on what the meaning of “collects” is. [Continue reading…]
Those who claim a special privilege to define words in their own way, defying the dictates of everyday usage, are also claiming a right to employ their own definitions of truthfulness and lying. This might have some legal utility, but the price for going this route is that language, thus constrained, becomes worthless.
As Schneier notes, Google has also fallen back on the dumb-machine defense when claiming that it does not read our email.
Back when Gmail was introduced, this was Google’s defense, too, about its context-sensitive advertising. Googles computers examine each individual email and insert an advertisement nearby, related to the contents of your email. But no person at Google reads any Gmail messages; only a computer does. In the words of one Google executive: “Worrying about a computer reading your email is like worrying about your dog seeing you naked”.
The absence of human eyes does not add a layer of privacy. On the contrary it constitutes a glaring lack of oversight by promoting a fiction: that what people don’t see, must be harmless.
Google is not a dumb companion, eager to please and dependably obedient; its only loyalty is to its own commercial interests and it currently sees those interests best served by pursuing an ambition to dominate the field of machine learning.
The data analysis being performed by computers enables surveillance more sweeping than could ever be carried out by people.
Although most Americans seem more afraid of government than commerce, the powers being exercised by the NSA are dwarfed by those that have been acquired by companies like Google, Amazon, and Facebook. Indeed the intelligence community has been doing little more than opportunistically taking a piggyback ride on the shoulders of Silicon Valley.
GCHQ intercepted webcam images of millions of Yahoo users worldwide
The Guardian reports: Britain’s surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.
GCHQ files dating between 2008 and 2010 explicitly state that a surveillance program codenamed Optic Nerve collected still images of Yahoo webcam chats in bulk and saved them to agency databases, regardless of whether individual users were an intelligence target or not.
In one six-month period in 2008 alone, the agency collected webcam imagery – including substantial quantities of sexually explicit communications – from more than 1.8 million Yahoo user accounts globally.
Yahoo reacted furiously to the webcam interception when approached by the Guardian. The company denied any prior knowledge of the program, accusing the agencies of “a whole new level of violation of our users’ privacy”. [Continue reading…]
Forget the NSA, the LAPD spies on millions of innocent folks
LA Weekly reports: Edward Snowden ripped the blinds off the surveillance state last summer with his leak of top-secret National Security Agency documents, forcing a national conversation about spying in the post-9/11 era. However, there’s still no concrete proof that America’s elite intelligence units are analyzing most Americans’ computer and telephone activity — even though they can.
Los Angeles and Southern California police, by contrast, are expanding their use of surveillance technology such as intelligent video analytics, digital biometric identification and military-pedigree software for analyzing and predicting crime. Information on the identity and movements of millions of Southern California residents is being collected and tracked.
In fact, Los Angeles is emerging as a major laboratory for testing and scaling up new police surveillance technologies. The use of military-grade surveillance tools is migrating from places like Fallujah to neighborhoods including Watts and even low-crime areas of the San Fernando Valley, where surveillance cameras are proliferating like California poppies in spring.
The use of militarized surveillance technology appears to be spreading beyond its initial applications during the mid-2000s in high-crime areas to now target narrow, specific crimes such as auto theft. Now, LAPD and the Los Angeles County Sheriff are monitoring the whereabouts of residents whether they have committed a crime or not. The biggest surveillance net is license plate reading technology that records your car’s plate number as you pass police cruisers equipped with a rooftop camera, or as you drive past street locations where such cameras are mounted. [Continue reading…]
White House considers four options for modifying NSA mass phone surveillance
The Wall Street Journal reports that administration lawyers have presented the White House with four options for reforming the NSA’s mass phone-surveillance program the first of which would require phone companies to store such data and deliver specific search requests.
A second option presented to the White House would have a government agency other than the NSA hold the data, according to a U.S. official. Candidates for this option could include the Federal Bureau of Investigation, which some current and former intelligence officials have recommended.
Another possibility floated in policy circles was turning the program over to the custody of the Foreign Intelligence Surveillance Court, which oversees the phone-data and other NSA surveillance programs, but judges have balked at an expanded role for the court.
A third option would be for an entity outside the phone companies or the government to hold the data, officials said. This approach has been criticized by privacy groups who say such a third party would just become an extension of the NSA and would provide no additional privacy benefit.
A final alternative would be to scrap the phone-data program and instead bolster investigative efforts under current authorities to obtain the information about possible terrorist connections some other way, an official said. Mr. Obama acknowledged this approach in his January speech, but said “more work needs to be done to determine exactly how this system might work.”
It’s time to rethink our nightmares about surveillance
This is an excerpt from Zeynep Tufekci’s article at Matter — but don’t just read this, read her whole piece: I was in Philadelphia when the protests in Istanbul exploded, at a gathering called Data-Crunched Democracy, hosted by the Annenberg School for Communication at the University of Pennsylvania. It was supposed to be exciting, and a little contentious. But I’m also a scholar of social movements and new technologies. I’d visited Tahrir, the heart of the Egyptian uprising, and Zuccotti Square, the birthplace of the Occupy movement. And now new technology was helping to power protests in Istanbul, my hometown. The epicenter, Gezi Park, is just a few blocks from the hospital where I was born.
So there I was, at a conference I had been looking forward to for months, sitting in the back row, tweeting about tear gas in Istanbul.
A number of high-level staff from the data teams of the Obama and Romney campaigns were there, which meant that a lot of people who probably did not like me very much were in the room. A few months earlier, in an op-ed in the New York Times, I’d argued that richer data for the campaigns could mean poorer democracy for the rest of us. Political campaigns now know an awful lot about American voters, and they will use that to tailor the messages we see — to tell us the things we want to hear about their policies and politicians, while obscuring messages we may dislike.
Of course, these tactics are as old as politics. But the digital era has brought new ways of implementing them. Pointing this out had earned me little love from the campaigns. The former data director on the Obama campaign, writing later in the Times, caricatured and then dismissed my concerns. He claimed that people thought he was “sifting through their garbage for discarded pages from their diaries” — a notion he described as a “bunch of malarkey.” He’s right: Political campaigns don’t rummage through trashcans. They don’t have to. The information they want is online, and they most certainly sift through it.
What we do know about their use of “big data” — the common shorthand for the massive amounts of data now available on everyone — is worrisome. In 2012, again in the Times, reporter Charles Duhigg revealed that Target can often predict when a female customer is pregnant, often in the first 20 weeks of pregnancy, and sometimes even before she has told anyone. This is valuable information, because childbirth is a time of big change, including changes in consumption patterns. It’s an opportunity for brands to get a hook into you — a hook that may last decades, as over-worked parents tend to return to the same brands out of habit. Duhigg recounted how one outraged father, upset at the pregnancy- and baby-related coupons Target had mailed to his teenage daughter, visited his local store and demanded to see the manager. He got an apology, but later apologized himself: His daughter, it turned out, was pregnant. By analyzing changes in her shopping — which could be as subtle as changes in her choice in moisturizers, or the purchase of certain supplements — Target had learned that she was expecting before he did.
Personalized marketing is not new. But so much more can be done with the data now available to corporations and governments. In one recent study, published in the Proceedings of the National Academy of Sciences, researchers showed that mere knowledge of the things that a person has “liked” on Facebook can be used to build a highly accurate profile of the subject, including their “sexual orientation, ethnicity, religious and political views, personality traits, intelligence, happiness, use of addictive substances, parental separation, age, and gender.” In a separate study, another group of researchers were able to infer reasonably reliable scores on certain traits — psychopathy, narcissism, and Machiavellianism — from Facebook status updates. A third team showed that social media data, when analyzed the right way, contains evidence of the onset of depression.
Remember, these researchers did not ask the people they profiled a single question. It was all done by modeling. All they had to do was parse the crumbs of data that we drop during our online activities. And the studies that get published are likely the tip of the iceberg: The data is almost always proprietary, and the companies that hold it do not generally tell us what they do with it.
When the time for my panel arrived, I highlighted a recent study in Nature on voting behavior. By altering a message designed to encourage people to vote so that it came with affirmation from a person’s social network, rather than being impersonal, the researchers had shown that they could persuade more people to participate in an election. Combine such nudges with psychological profiles, drawn from our online data, and a political campaign could achieve a level of manipulation that exceeds that possible via blunt television adverts.
How might they do it in practice? Consider that some people are prone to voting conservative when confronted with fearful scenarios. If your psychological profile puts you in that group, a campaign could send you a message that ignites your fears in just the right way. And for your neighbor who gets mad at scaremongering? To her, they’ll present a commitment to a minor policy that the campaign knows she’s interested in — and make it sound like it’s a major commitment. It’s all individualized. It’s all opaque. You don’t see what she sees, and she doesn’t see what you see.
Given the small margins by which elections get decided — a fact well understood by the political operatives who filled the room — I argued that it was possible that minor adjustments to Facebook or Google’s algorithms could tilt an election. [Continue reading…]
Google Plus works for Google
The New York Times reports: Google Plus, the company’s social network, is like a ghost town. Want to see your old roommate’s baby or post your vacation status? Chances are, you’ll use Facebook instead.
But Google isn’t worried. Google Plus may not be much of a competitor to Facebook as a social network, but it is central to Google’s future — a lens that allows the company to peer more broadly into people’s digital life, and to gather an ever-richer trove of the personal information that advertisers covet. Some analysts even say that Google understands more about people’s social activity than Facebook does.
The reason is that once you sign up for Plus, it becomes your account for all Google products, from Gmail to YouTube to maps, so Google sees who you are and what you do across its services, even if you never once return to the social network itself.
Before Google released Plus, the company might not have known that you were the same person when you searched, watched videos and used maps. With a single Plus account, the company can build a database of your affinities.
Google says Plus has 540 million monthly active users, but almost half do not visit the social network. [Continue reading…]
Snowden documents reveal covert surveillance and pressure tactics aimed at WikiLeaks and its supporters
Glenn Greenwald and Ryan Gallagher write: Top-secret documents from the National Security Agency and its British counterpart reveal for the first time how the governments of the United States and the United Kingdom targeted WikiLeaks and other activist groups with tactics ranging from covert surveillance to prosecution.
The efforts – detailed in documents provided previously by NSA whistleblower Edward Snowden – included a broad campaign of international pressure aimed not only at WikiLeaks founder Julian Assange, but at what the U.S. government calls “the human network that supports WikiLeaks.” The documents also contain internal discussions about targeting the file-sharing site Pirate Bay and hacktivist collectives such as Anonymous.
One classified document from Government Communications Headquarters, Britain’s top spy agency, shows that GCHQ used its surveillance system to secretly monitor visitors to a WikiLeaks site. By exploiting its ability to tap into the fiber-optic cables that make up the backbone of the Internet, the agency confided to allies in 2012, it was able to collect the IP addresses of visitors in real time, as well as the search terms that visitors used to reach the site from search engines like Google.
Another classified document from the U.S. intelligence community, dated August 2010, recounts how the Obama administration urged foreign allies to file criminal charges against Assange over the group’s publication of the Afghanistan war logs. [Continue reading…]
Internet governance too U.S.-centric, says European commission
The Guardian reports: The mass surveillance carried out by the US National Security Agency means that governance of the internet has to be made more international and less dominated by America, the European Union’s executive has declared.
Setting out proposals on how the world wide web should function and be regulated, the European commission called for a shift away from the California-based Internet Corporation for Assigned Names and Numbers (Icann), which is subject to US law, is contracted by the US administration and is empowered to supervise how digital traffic operates.
“Recent revelations of large-scale surveillance have called into question the stewardship of the US when it comes to internet governance,” said the commission.
“Given the US-centric model of internet governance currently in place, it is necessary to broker a smooth transition to a more global model while at the same time protecting the underlying values of open multi-stakeholder governance …
“Large-scale surveillance and intelligence activities have led to a loss of confidence in the internet and its present governance arrangements.” [Continue reading…]
Rand Paul sues Obama administration over NSA surveillance
The Associated Press reports: Sen. Rand Paul, a possible Republican presidential candidate, sued the Obama administration Wednesday over the National Security Agency’s mass collection of millions of Americans’ phone records.
The Kentucky senator said he and the conservative activist group FreedomWorks filed the suit for themselves and on behalf of “everyone in America that has a phone.”
The lawsuit argues that the bulk collection program that’s been in existence since 2006 violates the Fourth Amendment right against unreasonable searches. It calls for an end to the program, which was revealed by former National Security Agency analyst Edward Snowden. [Continue reading…]
Americans find swift stonewall on whether NSA vacuumed their data
McClatchy reports: Since last year’s revelations about the National Security Agency’s massive communications data dragnets, the spy agency has been inundated with requests from Americans and others wanting to know if it has files on them. All of them are being turned down .
The denials illustrate the bind in which the disclosures have trapped the Obama administration. While it has pledged to provide greater transparency about the NSA’s communications collections, the NSA says it cannot respond to individuals’ requests without tipping off terrorists and other targets.
As a result, Americans whose email and telephone data may have been improperly vacuumed up have no way of finding that out by filing open records requests with the agency. Six McClatchy reporters who filed requests seeking any information kept by the NSA on them all received the same response. [Continue reading…]
The Day We Fight Back: An internet protest to stop the NSA
The Verge reports: On January 18th, 2012, the world’s free encyclopedia went dark. “Imagine a world without free knowledge,” said a black splash page, warning users of a bill that could “fatally damage the free and open internet” and urging them to contact Congress. The bill was SOPA, a widely reviled piece of anti-piracy legislation, and Wikipedia wasn’t alone: Reddit, Google, and other huge sites either disabled access or hosted banners in protest. What happened next has become a touchstone for internet activists. Bill sponsor Lamar Smith (R-TX), who a few days earlier had implied that SOPA’s opponents must be profiting from piracy, tabled his proposal almost immediately. Chris Dodd, head of the MPAA, compared the public outcry to the Arab Spring.
It’s been over two years since the death of SOPA. But as attention has turned instead to NSA surveillance, the 2012 protests have provided assurance that online action can create real results. This is the idea behind The Day We Fight Back, an anti-surveillance web protest being held Tuesday, February 11th, in memory of hacktivist and anti-SOPA organizer Aaron Swartz. “In January 2012 we defeated the SOPA and PIPA censorship legislation with the largest Internet protest in history,” says the site. “Today we face another critical threat.” If anything, though, the reference doesn’t inspire confidence so much as it underscores just how much more complex — and difficult to confront — that new threat really is.
The goal of the 2012 blackout was simple: spur people to call their representatives and express opposition to a new bill. The Day We Fight Back, though, is an attempt to dismantle a system that’s been in place for years. Inside the US, participants are urged to put a banner on their website and call or email their legislators in support of Representative Jim Sensenbrenner (R-WI) and Senator Patrick Leahy’s (D-VT) USA Freedom Act, which would reform the NSA’s metadata database. But they’re also urged to oppose Dianne Feinstein’s (D-CA) FISA Improvements Act, a bill that sounds just as pleasant but has been sharply criticized for enshrining the database program in law. And even these are just baby steps in the long run. [Continue reading…]
NSA incapable of accomplishing its own mass surveillance goals
As I have long argued, Americans have less reason to be afraid of the NSA intercepting their communications than afraid that vast resources are being wasted on an effort that turns out to be fruitless.
Along with an over-extension of powers comes an over-extension of competence. Finding a needle in a haystack is very difficult. But finding a needle while examining less than a third of the haystack is just a waste of time.
The Washington Post reports: The National Security Agency is collecting less than 30 percent of all Americans’ call records because of an inability to keep pace with the explosion in cellphone use, according to current and former U.S. officials.
The disclosure contradicts popular perceptions that the government is sweeping up virtually all domestic phone data. It is also likely to raise questions about the efficacy of a program that is premised on its breadth and depth, on collecting as close to a complete universe of data as possible in order to make sure that clues aren’t missed in counterterrorism investigations.
In 2006, a senior U.S. official said, the NSA was collecting “closer to 100” percent of Americans’ phone records from a number of U.S. companies under a then-classified program, but as of last summer that share had plummeted to less than 30 percent.
The government is taking steps to restore the collection — which does not include the content of conversations — closer to previous levels. The NSA is preparing to seek court orders to compel wireless companies that currently do not hand over records to the government to do so, said the current and former officials, who spoke on the condition of anonymity to discuss internal deliberations.
That effort comes in the wake of President Obama’s decision last month to find a way to move the data out of the government’s hands to assuage concerns about intrusions on privacy. Obama has given the Justice Department and the intelligence community until March 28 to come up with a plan.
The actual percentage of records gathered is somewhere between 20 and 30 percent and reflects Americans’ increasing turn away from the use of land lines to cellphones. Officials also have faced technical challenges in preparing the NSA database to handle large amounts of new records without taking in data such as cell tower locations that are not authorized for collection. [Continue reading…]
Pratap Chatterjee: The Wild West of surveillance
The question Senator Ron Wyden asked on March 12th of last year was straightforward enough and no surprise for Director of National Intelligence James Clapper. He had been given it a day in advance of his testimony before the Senate Intelligence Committee and after he was done, Senator Wyden and his staff offered him a chance to “amend” his answer if he wished. Did the National Security Agency, Wyden wanted to know, gather “any type of data at all on millions or hundreds of millions of Americans”? Being on that committee and privy to a certain amount of secret intelligence information, Wyden already knew the correct answer to the question. Clapper, with a day to prepare, nonetheless answered, “No, sir. Not wittingly. There are cases where they could inadvertently perhaps collect, but not wittingly.”
That was a bald-faced lie, though Clapper would later term it the “least untruthful” thing he felt he could say. As we now know, the NSA was, among many other things, gathering the phone “data” of every American and storing it for future use. In other words, after some forethought, the director perjured himself.
Mind you, Clapper isn’t exactly shy about charging other people with implicit crimes. In recent testimony before Congress, he demanded that whistleblower and former NSA contractor Edward Snowden “and his accomplices” return all agency documents. It was a stunning use of a term whose only meaning is criminal and clearly referred to the journalists — Glenn Greenwald, filmmaker Laura Poitras, and reporters from the Guardian, the New York Times, and the Washington Post, among other papers — who have been examining and writing about the Snowden documents.
It caught something of the chutzpah of the top officials who run Washington’s national security state — and little wonder that they feel emboldened and demanding. After all, not only is Clapper not going to be charged with perjury, but he has retained his post without a blink. He has kept the “support” of President Obama, who recently told CNN’s Jake Tapper (in what passes these days for a rebuke of our surveiller-in-chief), “Jim Clapper himself would acknowledge, and has acknowledged, that he should have been more careful about how he responded.” More careful indeed!
I’ve long argued that while we, the citizens of the U.S., remain in legal America, the U.S. national security state exists in “post-legal America” because no illegal act from warrantless surveillance to torture committed in its service will ever be prosecuted. So it’s no surprise that Clapper won’t even be forced to resign for lying to Congress. He’s free as a bird and remains powerful indeed. Tell that to some of our whistleblowers.
In his latest post, TomDispatch regular Pratap Chatterjee offers an anatomy of a surveillance world that grows more, not less, powerful and full of itself with every passing moment and technological advance, a national security world whose global ambitions know no bounds. Tom Engelhardt
Selling your secrets
The invisible world of software backdoors and bounty hunters
By Pratap ChatterjeeImagine that you could wander unseen through a city, sneaking into houses and offices of your choosing at any time, day or night. Imagine that, once inside, you could observe everything happening, unnoticed by others — from the combinations used to secure bank safes to the clandestine rendezvous of lovers. Imagine also that you have the ability to silently record everybody’s actions, whether they are at work or play without leaving a trace. Such omniscience could, of course, make you rich, but perhaps more important, it could make you very powerful.
That scenario out of some futuristic sci-fi novel is, in fact, almost reality right now. After all, globalization and the Internet have connected all our lives in a single, seamless virtual city where everything is accessible at the tap of a finger. We store our money in online vaults; we conduct most of our conversations and often get from place to place with the help of our mobile devices. Almost everything that we do in the digital realm is recorded and lives on forever in a computer memory that, with the right software and the correct passwords, can be accessed by others, whether you want them to or not.
Now — one more moment of imagining — what if every one of your transactions in that world was infiltrated? What if the government had paid developers to put trapdoors and secret passages into the structures that are being built in this new digital world to connect all of us all the time? What if they had locksmiths on call to help create master keys for all the rooms? And what if they could pay bounty hunters to stalk us and build profiles of our lives and secrets to use against us?
Well, check your imagination at the door, because this is indeed the brave new dystopian world that the U.S. government is building, according to the latest revelations from the treasure trove of documents released by National Security Agency whistleblower Edward Snowden.
Britain’s police state extends its powers
Henry Porter writes: There are two striking images of modern Britain in this week’s news. The first is the story that crime in Britain is at a 32-year low, which confirms evidence in statistical trends that, like most western countries, we are becoming a more orderly and law-abiding society.
The second is provided by the police, which, while suffering a thoroughly deserved collapse in their own reputation, seeks to draw a picture of chaos and misrule that demands ever harsher and more invasive policing techniques. Five years after the financial crash, the police are making the case for deploying water cannon to deal with expected “austerity riots”, when it is blindingly obvious that Britain has passed through a very difficult period without widespread disorder (the riots that began in Tottenham two years ago were mostly a failure of policing, not a response to economic conditions) and, moreover, the economy and employment have both picked up.
But the far more worrying development is the unscrutinised rollout of the police automated numberplate recognition system (ANPR) for tracking vehicles, which, according to Nick Hopkins’ report, currently stores 17bn images in its archive and is set to increase its capacity by 2018 to read and store 50-75 million separate vehicle sightings a day.
This is a very powerful surveillance system and the important thing to remember is that the decision to cover Britain’s motorways and town centres with cameras that track the movements of innocent citizens is that it was never debated by parliament. [Continue reading…]
In keeping grip on data pipeline, Obama does little to reassure industry
The New York Times reports: Google, which briefly considered moving all of its computer servers out of the United States last year after learning how they had been penetrated by the National Security Agency, was looking for a public assurance from President Obama that the government would no longer secretly suck data from the company’s corner of the Internet cloud.
Microsoft was listening to see if Mr. Obama would adopt a recommendation from his advisers that the government stop routinely stockpiling flaws in its Windows operating system, then using them to penetrate some foreign computer systems and, in rare cases, launch cyberattacks.
Intel and computer security companies were eager to hear Mr. Obama embrace a commitment that the United States would never knowingly move to weaken encryption systems.
They got none of that. [Continue reading…]
Tepid global reaction to Obama’s NSA vow
The Washington Post reports: After months of revelations that strained U.S. relations with allies and cast a harsh light on the National Security Agency’s global surveillance reach, President Obama’s speech Friday was aimed at least in part at reassuring the world of American intentions.
But the initial reaction overseas suggested he still has a significant way to go to heal the rifts, with many wondering why he didn’t offer more specific protections.
In Germany, where revelations that the NSA had been eavesdropping on the calls of Chancellor Angela Merkel stirred deep anger and unusually tough criticism of Washington, Obama’s promises to rein in the excesses of U.S. spying were met with a tepid welcome from the German government — and scorn from some analysts.
Government spokesman Steffen Seibert tweeted that the government would appreciate better safeguards of the rights of non-U.S. citizens but would need more time to review Obama’s words in detail. [Continue reading…]