Tuesday, March 6, 2012

 
U.S. court approves warrantless searches of cell phones

(Reuters) - U.S. police can search a cell phone for its number without having a warrant, according to a federal appeals court ruling.

Officers in Indiana found a number of cell phones at the scene of a drug bust, and searched each phone for its telephone number. Having the numbers allowed the government to subpoena the owners' call histories, linking them to the drug-selling scheme.

One of the suspects, Abel Flores-Lopez, who was convicted and sentenced to 10 years in prison, argued on appeal that the police had no right to search the phone's contents without a warrant.

The U.S. Court of Appeal for the 7th Circuit rejected that argument on Wednesday, finding that the invasion of privacy was so slight that the police's actions did not violate the Fourth Amendment's ban on unreasonable searches...[Full Article]

Labels: , , , ,


Wednesday, February 15, 2012

 
What If Someone Could See Everything You've Ever Googled?

Inalienably Yours

What if there was a little box that could be placed in your home that could.....

.... track every Google search that you ran?

.... see who you email?

.... see from whom you receive emails?

.... watch your keystrokes to learn all your passwords?

.... turn on a camera and watch you at any given time?

.... gather information about your likes, dislikes, political affiliations and religious beliefs?

.... dispense all of the above personal data to fusion centers, whose only purpose is to put together profiles of you and your family?

As it turns out, there is such a box, and if you are reading this, you're on it right now. You not only voluntarily brought this device into your home, you paid good money for it. Your computer is spying on you...[Full Article]

Labels: ,


Saturday, January 28, 2012

 
TSA rail, subway spot-checks raise privacy issues

(CNN) -- Rick Vetter and his teen son got a pretty good look at the legal line between privacy and security last month, as they wrapped up a day trip to Charlotte, North Carolina.

After watching the NFL's Atlanta Falcons beat the Carolina Panthers, they were looking forward to a three-hour train ride back home to Raleigh when they arrived at the train station.

Walking up a ramp toward the platform, they noticed what appeared to be a uniformed Transportation Security Administration officer holding a leashed police dog.

"He just loosened the leash on the dog, and the dog came over to check me out," Vetter said. Standing on the platform above Vetter were three other officers who appeared to be wearing bullet-proof vests...[Full Article]

Labels: , ,


Friday, January 27, 2012

 
Hawaii may keep track of all Web sites visited

C/Net

Hawaii's legislature is weighing an unprecedented proposal to curb the privacy of Aloha State residents: requiring Internet providers to keep track of every Web site their customers visit.

Its House of Representatives has scheduled a hearing this morning on a new bill (PDF) requiring the creation of virtual dossiers on state residents. The measure, H.B. 2288, says "Internet destination history information" and "subscriber's information" such as name and address must be saved for two years.

H.B. 2288, which was introduced Friday, says the dossiers must include a list of Internet Protocol addresses and domain names visited. Democratic Rep. John Mizuno of Oahu is the lead sponsor; Mizuno also introduced H.B. 2287, a computer crime bill, at the same time last week...[Full Article]

Labels: , , , , , ,


Wednesday, January 25, 2012

 
Google announces privacy changes across products; users can’t opt out

Washington Post

Google will soon know far more about who you are and what you do on the Web.

The Web giant announced Tuesday that it plans to follow the activities of users across nearly all of its ubiquitous sites, including YouTube, Gmail and its leading search engine.

Google has already been collecting some of this information. But for the first time, it is combining data across its Web sites to stitch together a fuller portrait of users.

Consumers won’t be able to opt out of the changes, which take effect March 1. And experts say the policy shift will invite greater scrutiny from federal regulators of the company’s privacy and competitive practices...[Full Article]


Labels: , ,


Saturday, January 14, 2012

 
Homeland Security watches Twitter, social media

(Reuters) - The U.S. Department of Homeland Security's command center routinely monitors dozens of popular websites, including Facebook, Twitter, Hulu, WikiLeaks and news and gossip sites including the Huffington Post and Drudge Report, according to a government document.

A "privacy compliance review" issued by DHS last November says that since at least June 2010, its national operations center has been operating a "Social Networking/Media Capability" which involves regular monitoring of "publicly available online forums, blogs, public websites and message boards."

The purpose of the monitoring, says the government document, is to "collect information used in providing situational awareness and establishing a common operating picture."...[Full Article]

Labels: , , , ,


Thursday, January 12, 2012

 
Homeland Security Is Monitoring The Drudge Report, The New York Times

The Atlantic Wire


Adam Clark Estes

Jan 11, 2012

It's unclear exactly why, but the Department of Homeland has been operating a "Social Networking/Media Capability" program to monitor the top blogs, forums and social networks online for at least the past 18 months. Based on a privacy compliance review from last November recently obtained by Reuters, the purpose of the project is to "collect information used in providing situational awareness and establishing a common operating picture." Whatever that means. Either way, the list of sites reported by Reuters reveals in a Wednesday afternoon exclusive is pretty intriguing...[Full Article]

Labels: , , , ,


Monday, January 9, 2012

 
Apparently, the Government Spies On People Who Tweet Certain Key Words



Complex.com

Apparently, the Government Spies On People Who Tweet Certain Key Words

Want the government to notice you? Well, according to privacy advocates at the Electronic Privacy Information Center, it's a pretty simple feat! The Department of Homeland Security monitors social networks, creating fake accounts on sites like Facebook and Twitter to follow people who post statuses that include certain flagged words.

So, the next time someone random friend requests you, just think, it could be the federal government!

The so-called flagged words are the following: "human to animal," "collapse," "infection," "outbreak," and "illegal immigrants." The EPIC says that using any of the following words could attract someone from the DHS to follow you, track your activity, monitor everything you post, and report it all to local, state, federal, and even foreign governments. According to Gawker, it's not too clear how the EPIC compiled its list of words, but they're suing the government to seek access to the data that the DHS has been compiling.

So if you want all those guys in Washington to know what you did last weekend, you know what to tweet.

Labels: , ,


 
Privacy Advocates Sue DHS for Big Bro Fake 'Friends' Monitoring Social Media

Privacy advocates are suing DHS for 'covert' social networking surveillance on Facebook and Twitter. EPIC's FOIA lawsuit is a result of Homeland Security refusing to turn over details about Big Brother setting up fake accounts to 'friend' you and better monitor your social media activities.


By Ms. Smith on Thu, 12/22/11 - 12:28pm.

Yes, Virginia, Big Brother is watching you in social media and storing those "naughty" tweets, posts and comments. After those hot keyword terms put you on the naughty list, unlike Santa's list, it's not a redo in a year . . . that info will be stored for five years. The EFF previously warned Big Brother wants to be your online buddy on social networking sites. Then the Electronic Privacy Information Center (EPIC) filed a Freedom of Information Act (FOIA) request asking Homeland Security for more details about the agency's plans to setup fake profiles and monitor social media users; but when no documents were produced, EPIC is now suing DHS over 'covert surveillance on Facebook and Twitter.'

Hackers belonging to Anonymous kindly shared with the public such "chumming and baiting" tactics as were disclosed in Aaron Barr's leaked emails.Those sock puppet accounts will try to befriend you, monitor for specific NOC terms, and then collect your PII (personally identifiable information) which will be stored for five years. Many users have a nasty habit of over-sharing on social media even though all that personal or sensitive information is potential fodder for social engineers. EPIC's lawsuit [PDF] against DHS states, "Social media users have no reason to believe that the Department of Homeland Security is tracking their every post." The DHS program plans to share this PII by "email and telephone" with "federal, state, local, tribal, territorial, foreign, or international government partners."

EPIC wrote, "DHS has stated that it will routinely monitor the public postings of users on Twitter and Facebook. The agency plans to create fictitious user accounts and scan posts of users for key terms. User data will be stored for five years and shared with other government agencies. The legal authority for the DHS program remains unclear."

A PR spokesperson from the Pentagon politely objected to the suggestion that ethics disappear behind closed doors, dirty deeds done in the dark when dirty weapons like sock puppet propaganda might be deployed against the American people who are supposed to be free to express themselves. Such armies of fake social media "friends" promoting propaganda was allegedly not being used against We the American People. But the devil is in the details of DHS monitoring keywords and social media when Big Bro's sock puppet accounts want to be your buddy on social networking sites...[Full Article]

Labels: , ,


Friday, December 30, 2011

 
How Your Privacy Will Be Invaded in 2012

Gawker

In 2011, we watched as tech villains found creative new ways to violate our privacy. They misappropriated our social networking profiles, stalked us through our phones, and plucked secrets from our wifi networks. To help you better prepare for 2012's inevitable privacy attacks, we enumerate below the most worrisome threats you should monitor in the coming year...[Full Article]

Labels: ,


 
New Report: "Recording Everything" Details How Governments Can Shape the Dynamics of Dissent

Activist Post

A recent Brookings Institution report has now confirmed what many have suspected for some time – that the United States government (and virtually every other government in the world) has the capability to monitor and record nearly every interaction that occurs within its national borders.
For years, those individuals who have tried to warn others of the creeping surveillance state were met with denials and catcalls of “conspiracy theory,” as well as the famous claims that it was not physically possible to monitor everyone.

This new report, however, shatters
the delusional rationalities of the uninformed into a million pieces.
The Brookings Institution report entitled, “Recording Everything: Digital Storage as an Enabler of Authoritarian Governments" (.pdf) discusses the increasing capacities for surveillance due to the improvement in technology and the sinking costs of its procurement, along with the implications for human rights and authoritarianism that come along with it...[Full Article]

Labels: ,


Wednesday, November 30, 2011

 

Carrier IQ: Your Smartphone is Spying on You and Recording Everything You Do

Your Smartphone Is Spying on You

The Atlantic Wire

An Android developer recently discovered a clandestine application called Carrier IQ built into most smartphones that doesn't just track your location; it secretly records your keystrokes, and there's nothing you can do about it. Is it time to put on a tinfoil hat? That depends on how you feel about privacy.

The reason for this invasive Android app seems reasonable enough at face value. Even though it's on most Android, BlackBerry and Nokia devices, most users would never know that Carrier IQ is running in the background, and that's sort of the point. Described on the company's website as software to gain "unprecedented insight into their customers' mobile experience," Carrier IQ is ostensibly supposed to help mobile carriers and device manufacturers gather data in order to improve their products. Tons of applications do this, and you're probably used to those boxes that pops up on your screen and ask if you want to help the company by sending your data back to them. If you're concerned about your privacy, you just tap no and go about your merry computing way. As security-conscious Android developer Trevor Eckhart realized, however, Carrier IQ does not give you this option, and unless you were code-savvy and looking for it, you'd never know it was there. And based on how aggressive the company has been in trying to keep Eckhart quiet about his discovery, it seems like Carrier IQ doesn't want you to know it's there either...[Full Article]

Carrier IQ Part #2



http://www.youtube.com/watch?v=T17XQI_AYNo


Related Articles:

Does Hidden Smartphone Software Threaten Your Privacy? [Security News Daily]

Your smartphone could be secretly recording all your actions [GSM Arena]

Carrier IQ: Researcher Trevor Eckhart Outs Creepy, Hidden App Installed On Smartphones (VIDEO) [Huffington Post]


Labels: , , , ,


Wednesday, November 23, 2011

 
License plate readers: A useful tool for police comes with privacy concerns

Washington Post

An armed robber burst into a Northeast Washington market, scuffled with the cashier, and then shot him and the clerk’s father, who also owned the store. The killer sped off in a silver Pontiac, but a witness was able to write down the license plate number.

Police figured out the name of the suspect very quickly. But locating and arresting him took a little-known investigative tool: a vast system that tracks the comings and goings of anyone driving around the District.

Scores of cameras across the city capture 1,800 images a minute and download the information into a rapidly expanding archive that can pinpoint people’s movements all over town.

Police entered the suspect’s license plate number into that database and learned that the Pontiac was on a street in Southeast. Police soon arrested Christian Taylor, who had been staying at a friend’s home, and charged him with two counts of first-degree murder. His trial is set for January.

More than 250 cameras in the District and its suburbs scan license plates in real time, helping police pinpoint stolen cars and fleeing killers. But the program quietly has expanded beyond what anyone had imagined even a few years ago.

With virtually no public debate, police agencies have begun storing the information from the cameras, building databases that document the travels of millions of vehicles.

Nowhere is that more prevalent than in the District, which has more than one plate-reader per square mile, the highest concentration in the nation. Police in the Washington suburbs have dozens of them as well, and local agencies plan to add many more in coming months, creating a comprehensive dragnet that will include all the approaches into the District.

“It never stops,” said Capt. Kevin Reardon, who runs Arlington County’s plate reader program. “It just gobbles up tag information. One of the big questions is, what do we do with the information?”...[Full Article]

Labels: , , , ,


Friday, October 21, 2011

 
www.foxnews.com
Eight hundred million users are not enough. Facebook, the world's biggest social network, is now building profiles of non-users who haven't even signed up, an international privacy watchdog charges.

Labels: ,


Tuesday, October 4, 2011

 
Internet firms co-opted for surveillance: experts

(Reuters) - Internet companies such as Google, Twitter and Facebook are increasingly co-opted for surveillance work as the information they gather proves irresistible to law enforcement agencies, Web experts said this week.

Although such companies try to keep their users' information private, their business models depend on exploiting it to sell targeted advertising, and when governments demand they hand it over, they have little choice but to comply...[Full Article]

Labels: , ,


Wednesday, September 28, 2011

 
'We didn't mean to track you' says Facebook as social network giant admits to 'bugs' in new privacy row

UK Daily Mail

Facebook has admitted that it has been watching the web pages its members visit – even when they have logged out.

In its latest privacy blunder, the social networking site was forced to confirm that it has been constantly tracking its 750million users, even when they are using other sites.

The social networking giant says the huge privacy breach was simply a mistake - that software automatically downloaded to users' computers when they logged in to Facebook 'inadvertently' sent information to the company, whether or not they were logged in at the time.

Most would assume that Facebook stops monitoring them after they leave its site, but technology bloggers discovered this was not the case...[Full Article]

Labels: , ,


Friday, September 23, 2011

 
'Stingray' Phone Tracker Fuels Constitutional Clash

Wall Street Journal

For more than a year, federal authorities pursued a man they called simply "the Hacker." Only after using a little known cellphone-tracking device—a stingray—were they able to zero in on a California home and make the arrest.


Stingray_A1

Stingrays are designed to locate a mobile phone even when it's not being used to make a call. The Federal Bureau of Investigation considers the devices to be so critical that it has a policy of deleting the data gathered in their use, mainly to keep suspects in the dark about their capabilities, an FBI official told The Wall Street Journal in response to inquiries.

A stingray's role in nabbing the alleged "Hacker"—Daniel David Rigmaiden—is shaping up as a possible test of the legal standards for using these devices in investigations. The FBI says it obtains appropriate court approval to use the device.

Stingrays are one of several new technologies used by law enforcement to track people's locations, often without a search warrant. These techniques are driving a constitutional debate about whether the Fourth Amendment, which prohibits unreasonable searches and seizures, but which was written before the digital age, is keeping pace with the times.

On Nov. 8, the Supreme Court will hear arguments over whether or not police need a warrant before secretly installing a GPS device on a suspect's car and tracking him for an extended period. In both the Senate and House, new bills would require a warrant before tracking a cellphone's location...[Full Article]


Labels: , , , ,


Friday, July 8, 2011

 
The CIA Put A Ton Of Cash Into A Software Firm That Monitors Your Online Activity

Business Insider

by Robert Johnson
July 7, 2011

CIA

Image: Jonathon Narvey via flickr

American intelligence communities are interested in your YouTube video, flickr uploads, tweets -- even your online book purchases -- and for over a year they've been laying down some serious cash to get a better look at all of them.

According to Wired, the tech-focused investment firm In-Q-Tel, that works with the CIA, is investing in Visible Technologies who perform social media monitoring and analytics.

This is the first major shift in the spy community's commitment to monitoring public conversations that fill the Internet in blog posts, web uploads, purchases, TV shows, podcasts, YouTube videos, and articles every day.

Visible pulls from over 500,000 every 24 hours, grabbing more than one million posts, conversations, images, videos, and Amazon purchases. Clients get tailored real-time results of what's happening based upon desired keywords.

Once Visible has a handle on what's being said it "scores" each post and labels it negative or positive, mixed or benign. It also factors the influence of the author, or conversation, weighing each comment separately. The end-user interface then allows clients to tag user comments, and dialogue on them with colleagues.

While the program could benefit global security, the possibility for abuse is epic.

“Anything that is out in the open is fair game for collection,” says Steven Aftergood, who tracks intelligence issues at the Federation of American Scientists. But “even if information is openly gathered by intelligence agencies it would still be problematic if it were used for unauthorized domestic investigations or operations.

Intelligence agencies or employees might be tempted to use the tools at their disposal to compile information on political figures, critics, journalists or others, and to exploit such information for political advantage. That is not permissible even if all of the information in question is technically ‘open source.’”

When the CIA became an end user like Dell, AT&T and Microsoft who all use it to track customers -- what they do with the data they've purchased is entirely up to them.

The size of the CIA's investment in Visible is unknown, but the infusion of cash is supposed to be sufficient to enhance the company's foreign language capabilities.

TruVoice

A screen grab from the interface

Image: Wired

This is the first in a two part series tht examines the CIA's investment in online trending.



Labels: , , , ,


 
No More Privacy: Smart Meters Are Surveillance Devices That Monitor The Behavior In Your Home Every Single Minute Of Every Single Day

End of the American Dream


Have you heard about the new "smart meters" that are being installed in homes all across America? Under the guise of "reducing greenhouse gas emissions" and "reducing energy bills", utility companies all over the United States are forcing tens of millions of American families to accept sophisticated surveillance devices in their homes. Currently, approximately 9 percent of all electric meters in the U.S. have been converted over to smart meters. It is being projected that by 2012, the number of smart meters in use will rise to 52 million, and the federal government is spending a lot of money to help get these installed everywhere. Eventually the goal is to have these smart meters in all of our homes and if that ever happened there would essentially be no more privacy. Once installed, a smart meter monitors your home every single minute of every single day and it transmits very sophisticated data about your personal behavior back to the utility company. (Read More.....)

Labels: , ,


Wednesday, June 15, 2011

 
Forget China, Americans Have Had All Their Communications Bugged For 20 Years

Echelon program has tracked “every international telephone call, fax, e-mail, or radio transmission” since early 90′s

Forget China, Americans Have Had All Their Communications Bugged For 20 Years 140611top2
Image: Wikipedia Commons

Paul Joseph Watson
Prison Planet.com
Tuesday, June 14, 2011

Outrage over the revelation that Chinese authorities have been installing spying devices on all dual-plate Chinese-Hong Kong vehicles is nothing compared to the fact that Americans and European have had all their communications tracked for at least two decades.

“For years now Chinese authorities have been installing spying devices on all dual-plate Chinese-Hong Kong vehicles, enabling a vast network of eavesdropping across the archipelago,” reports the Epoch Times.

However, the modern era of high-tech surveillance really began with the Echelon program in the early 90′s.

In 1999 the Australian government admitted that it was part of an NSA-led global intercept and surveillance grid in alliance with the US and Britain that could listen to “every international telephone call, fax, e-mail, or radio transmission,” using keywords to allow “powerful computers capable of voice recognition” to eavesdrop globally.

Furthermore, a 2001 European Parliament report stated that “within Europe all e-mail, telephone and fax communications are routinely intercepted” by the NSA.

As we reported back in 2006, Google announced that it would be using in-built microphones on personal computers to listen for “background noise,” which would then be used to tailor invasive Minority Report-style advertising.

“The idea is to use the existing PC microphone to listen to whatever is heard in the background, be it music, your phone going off or the TV turned down. The PC then identifies it, using fingerprinting, and then shows you relevant content, whether that’s adverts or search results, or a chat room on the subject,” reported the Register.

The report touched upon the inevitability that the use and abuse of this technology will eventually be taken over by the state.

“Pretty soon the security industry is going to find a way to hijack the Google feed and use it for full on espionage.”

We are now surrounded by high-tech devices that serve a dual use purpose, one of which is spying on and keeping a record of our communications and other information to build psychological profiles. These include cell phones, two-way cable TV boxes, satellite navigation devices, so-called “smart home” products, as well as services like OnStar and Google Street View.

The U.S. government is now moving forward with a program to install mandatory chips in cell phones in the name of alerting Americans to terror threats. The announcement came shortly after the admission that cell phone companies were building location databases of where their users had traveled.

Indeed, over a year ago Apple admitted to the fact that it “intermittently” collects location data, including GPS coordinates, of many iPhone users and nearby Wi-Fi networks and transmits that data to itself every 12 hours, according to a letter the company sent to U.S. Reps. Edward Markey (D-Mass.) and Joe Barton (R-Texas),” reports the WSJ.

Google’s HTC Android phones collect location data every few minutes and transmit that information directly to Google several times an hour, including the unique phone identifier, meaning that Google can keep tabs on the movement of a known individual almost constantly. Since people now ubiquitously carry their cell phones everywhere they go, this is akin to having a tracking microchip implanted in your forehead.

We have gradually been indoctrinated into accepting the fact that corporations and governments spying on our every activity is normal and tolerable. While our lives are now a completely open book to any authority figure that wishes to create a psychological profile of us, governments are increasingly moving into the shadows and becoming immune to accountability and transparency.

*********************

Paul Joseph Watson is the editor and writer for Prison Planet.com. He is the author of Order Out Of Chaos. Watson is also a regular fill-in host for The Alex Jones Show.

Labels: , , ,


This page is powered by Blogger. Isn't yours?

Subscribe to Posts [Atom]