SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Foreign Affairs Discussion Group

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
From: Sun Tzu11/17/2016 1:29:06 PM
  Read Replies (1) of 281500
 
Welcome to 1984

Britain Has Passed the 'Most Extreme Surveillance Law Ever Passed in a Democracy' (zdnet.com) 171
Posted by msmash on Thursday November 17, 2016 @11:05AM from the stranger-things dept.
Zack Whittaker, reporting for ZDNet: The UK has just passed a massive expansion in surveillance powers, which critics have called "terrifying" and "dangerous." The new law, dubbed the "snoopers' charter," was introduced by then-home secretary Theresa May in 2012, and took two attempts to get passed into law following breakdowns in the previous coalition government. Four years and a general election later -- May is now prime minister -- the bill was finalized and passed on Wednesday by both parliamentary houses. Civil liberties groups have long criticized the bill, with some arguing that the law will let the UK government "document everything we do online." It's no wonder, because it basically does. The law will force internet providers to record every internet customer's top-level web history in real-time for up to a year, which can be accessed by numerous government departments; force companies to decrypt data on demand -- though the government has never been that clear on exactly how it forces foreign firms to do that that; and even disclose any new security features in products before they launch. Not only that, the law also gives the intelligence agencies the power to hack into computers and devices of citizens (known as equipment interference), although some protected professions -- such as journalists and medical staff -- are layered with marginally better protections. In other words, it's the "most extreme surveillance law ever passed in a democracy," according to Jim Killock, director of the Open Rights Group.

======================================


iPhones Secretly Send Call History To Apple, Security Firm Says (theintercept.com) 84
Posted by msmash on Thursday November 17, 2016 @10:20AM from the revelations dept.
Russian digital forensics Elcomsoft says iPhones send near real-time logs to Apple servers even when iCloud backup is switched off. The firm adds that these logs are stored for up to four months. From a report on the Intercept:"You only need to have iCloud itself enabled" for the data to be sent, said Vladimir Katalov, CEO of Elcomsoft. The logs surreptitiously uploaded to Apple contain a list of all calls made and received on an iOS device, complete with phone numbers, dates and times, and duration. They also include missed and bypassed calls. Elcomsoft said Apple retains the data in a user's iCloud account for up to four months, providing a boon to law enforcement who may not be able to obtain the data either from the user's carrier, who may retain the data for only a short period, or from the user's device, if it's encrypted with an unbreakable passcode. "Absolutely this is an advantage [for law enforcement]," Robert Osgood, a former FBI supervisory agent who now directs a graduate program in computer forensics at George Mason University, said of Apple's call-history uploads. "Four months is a long time [to retain call logs]. It's generally 30 or 60 days for telecom providers, because they don't want to keep more [records] than they absolutely have to. So if Apple is holding data for four months, that could be a very interesting data repository and they may have data that the telecom provider might not."

===============================


The FBI Got Its Hands on Data That Twitter Wouldn't Give the CIA (theverge.com) 76
Posted by msmash on Tuesday November 15, 2016 @01:40PM from the stranger-things dept.
The FBI is using a tool called Dataminr to track criminals and terrorist groups on Twitter, according to documents spotted by The Verge. In a contract document, the agency says Dataminr's Advanced Alerting Tool allows it " to search the complete Twitter firehose, in near real-time, using customizable filters." However, the practice seems to violate Twitter's developer agreement, which prohibits the use of its data feed for surveillance or spying purposes. From the report:"Twitter is used extensively by terrorist organizations and other criminals to communicate, recruit, and raise funds for illegal activity," the FBI wrote in a contracting document. "With increased use of Twitter by subjects of FBI investigations, it is critical to obtain a service which will allow the FBI to identify relevant information from Twitter in a timely fashion." [...] Earlier this year, Twitter revoked API access to a tool called Geofeedia, citing the same clause in the Developer agreement, after a reports showed the tool had been used by police to target protestors in Baltimore. Facebook was also a Geofeedia customer, and used it to catch an intruder in Mark Zuckerberg's office. This isn't the first time Dataminr has run up against Twitter's anti-surveillance clause. In May, Twitter revoked CIA access to Dataminr, a move that was taken as part of a larger ban on US intelligence agencies using the product.

========================================


Secret Backdoor in Some US Phones Sent Data To China (nytimes.com) 111
Posted by msmash on Tuesday November 15, 2016 @11:00AM from the china-and-backdoors dept.
Security contractors have warned that many Android smartphones ship with preinstalled software that has a backdoor that sends all your text messages to China every 72 hours. (Editor's note: the link could be paywalled; here's the press release.) The New York Times reported Tuesday that "the American authorities say it is not clear whether this represents secretive data mining for advertising purposes or a Chinese government effort to collect intelligence." From the report: International customers and users of disposable or prepaid phones are the people most affected by the software. But the scope is unclear. The Chinese company that wrote the software, Shanghai Adups Technology Company, says its code runs on more than 700 million phones, cars and other smart devices. One American phone manufacturer, BLU Products, said that 120,000 of its phones had been affected and that it had updated the software to eliminate the feature. Kryptowire, the security firm that discovered the vulnerability, said the Adups software transmitted the full contents of text messages, contact lists, call logs, location information and other data to a Chinese server. The code comes preinstalled on phones and the surveillance is not disclosed to users, said Tom Karygiannis, a vice president of Kryptowire, which is based in Fairfax, Va. "Even if you wanted to, you wouldn't have known about it," he said.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext