|26th March |
Google fined in France for eavesdropping on people's home wifi networks
See article from
Google has been hit with a EUR100,000 fine from the independent French data privacy regulator, the National Commission for Information Freedom (CNIL)
The CNIL, the French version of UK's Ofcom, has confirmed that it fined Google for unfair
collection (of data) under the law . The fine follows spot checks carried out by the CNIL on vehicles deployed by Google to capture and record data for its Street View service, which found that they had collected data other than photographs.
Privacy issues arose relating to the cars capturing data from unencrypted WiFi networks as they drove around, recording sensitive personal data such as user IDs, passwords, login details and more.
Back in May of 2010, the CNIL issued a warning to Google to cease collecting the data and told it to provide it with a copy of all the data collected. Google did hand the data over the CNIL, unlike its recent refusal to do so in the US. The CNIL
was the first organisation in the world to analyse the data mistakenly collected by Google's mobile data snufflers and revealed that data as sensitive as peoples sexual orientation or health was recorded, as well as email addresses and passwords.
In the decision on 17 March, the CNIL noted that Google had vowed to stop the data collection but it found that Google had not refrained from using the data identifying access points Wi-Fi [of] individuals without their knowledge.
|19th March |
France wants to record extensive internet usage information including passwords
Andrew Swift points us to a new data retention law in France that goes way beyond your typical keep the log files data retention rule. Instead, it appears to require that ISPs and hosting companies retain all sorts of private information. Swift
summarizes for us the information that needs to be retained (Google translation):
Information furnished when agreeing to a contract or opening an account, including first name, last name, business name, associated
mailing addresses, and pseudonyms utilized, associated e-mail addresses and accounts, telephone numbers, and passwords as well as data permitting the verification or modification of the password.
These companies must
also keep all user id's and passwords for any internet connection, the IP address of the terminal used to connect, the time and date of every connection, and...
Here's the kicker: for EVERY action of a user on the
internet, these companies are now required to record the nature of the operation, whether it is writing an e-mail or downloading an image or video.
Not surprisingly, it appears that pretty much every online service provider is
planning to challenge this decree in court.
|18th March |
Home Secretary removes much abused police power to stop and search people with little if any justification
See press release from
The British Home Secretary lays parliamentary order as part of commitment to making counter-terrorism powers fairer and more effective.
Police will only be able to stop and search people without reasonable suspicion where it's considered necessary
to prevent terrorism.
Previously, section 44 of the Terrorism Act 2000 allowed officers to search individuals even if they didn't have reasonable suspicion that the person was involved in terrorist activity.
But the coalition government
looked again at this power as part of a wide ranging review of counter-terror laws.
That review concluded that some form of stop and search without reasonable suspicion was needed, but that it should only take place in exceptional circumstances.
The stop and search powers contained within the order are included in the Protection of Freedoms Bill and will be scrutinised as that progresses through parliament.
|18th March |
Long time protestor Brian Haw set to be evicted form Parliament Square
See article from
Long time protestor Brian Haw looks set to be removed by force from the pavement opposite Parliament. The High Court ruled in favour of the Mayor of London, Boris Johnson, who wants to have him evicted.
But he will not be forced out until Monday
28 March. He has until then to lodge an appeal against the ruling.
Haw has been camped on the roadside opposite Parliament almost continuously since 2001, in protest against the wars in Afghanistan and Iraq.
A High Court judge, Wyn
Williams, has now ordered the removal of both Haw and his fellow activist, Barbara Tucker. Williams granted an injunction against them, which he described as proportionate .
The pavement around the Parliament Square belongs to Westminster
Council. Westminster Council insist that camps outside Parliament are an eyesore . But civil liberties campaigners argue that allowing protests outside Parliament sends out a positive message to tourists about the right to free expression in
|9th March |
Australian Sex Party criticises state internet snooping legislation
See article from sexparty.org.au
The Australian Sex Party, has strongly criticised the passing of the Telecommunications (Interception and Access) Amendment Act 2010 through the Senate, which gives sweeping new powers to ASIO of the kind that will be deployed against anti censorship
groups like WikiLeaks.
The Act also enables the sharing of private information between all government departments with no independent monitoring and continues the increasingly unaccountable nature of ASIO, begun by John Howard a decade ago.
Spokesperson for Security, Law Enforcement and Privacy and Sex Party candidate in the upcoming NSW election, Andrew Patterson said that the legislation handed ASIO and other law enforcement agencies further unchecked powers to invade an individual's
privacy and engage in activities which undermine basic rights:
The Labor government, with support from the Coalition, has passed this Act supposedly as a way to facilitate inter-governmental communication and
enable networks to be protected; whereas, in classic Orwellian Newspeak, the Act allows all Federal and State government departments to access any information ASIO gathers, whether it pertains to actual crimes or not.
of networks, from telecommunication networks to the public Internet are covered in the new Act. It allows call records, access history, phone numbers, IP address, email address, and any other form of identifiable number that an individual uses to be
collected. Further, voice calls, text messages and data transmissions can be intercepted, meaning records of any phone call that an individual makes, or any website they visit can now be stored by ASIO and shared with all government departments. In fact,
storage of such information is often not covered by the Privacy Act.
Patterson said that what made this development even more worrying was that ASIO could also share this information with the broader national security community . This
ambiguous terminology means that the information can be shared worldwide and unchecked . Once ASIO shares this data with any foreign nation, all control over it will be lost .
|27th February |
FBI pushes for backdoors in internet communication services
See article from wired.com
|17th February |
UK ID database is reborn
Now the Home Office has destroyed its prototype ID database in a publicity stunt, the government is putting the finishing touches to plans that would put the real Identity Scheme databases at the heart of a powerful government data sharing system.
The Government Cloud (G-Cloud), an ambitious Cabinet Office scheme to share IT resources and data across the whole of government, is seeking to remove all technical and organisational barriers to public sector data sharing.
Reports published last
week by the Cabinet Office describe how G-Cloud will exhume the data sharing systems that underpinned ID Cards, along with the fatal data security risks that went with them. The principles will be applied to all government data. The plans have been
overseen by the same executives who oversaw the ID Scheme's data-sharing system, the ill-fated CISx.
The principle was established a year ago in the G-Cloud Vision, which was drafted by Martin Bellamy, the same civil servant who advised ministers
to proceed with the CISx as one of two core components of the ID scheme.
Bellamy's Vision cited the CISx as an example of the sort of data sharing that would be possible within the G-Cloud. The CISx plan had involved turning the Department for
Work and Pensions Customer Information System database (CIS), which contains personal details of everyone in the country, into a system that could be accessed across the whole government.
The Home Office said last week its minister Damian Green
had destroyed Labour's ID database. But he only destroyed the temporary system the Home Office erected in a hurry so it could get ID cards on the streets before the 2010 election. It had still not proceeded with integrating the real ID databases because
it was still trying to work out how to resolve their excruciating data security problems.
|12th February |
The repeal bill: what's left in, what's left out
See article from theregister.co.uk
|11th February |
British ID card database crushed
See press release from
A database built to hold the fingerprints and personal details of millions of ID card holders has today been publicly destroyed.
Around 500 hard disk drives and 100 back up tapes containing the details of 15,000 early adopters have been
magnetically wiped and shredded.
They will soon be incinerated in an environmentally friendly waste-for-energy process.
This signals an end to the National Identity Register which was built to hold the details of people who applied for an
The scheme was scrapped by the coalition government and the cards ceased to be valid legal documents on 22 January.
Home Office minister Damian Green helped shred the last of the hard disk drives at an Essex industrial site today.
Laying ID cards to rest demonstrates the government's commitment to scale back the power of the state and restore civil liberties, he said: This is about people having trust in the government to know when it is necessary and appropriate
for the state to hold and use personal data, and it is about the government placing their trust in the common-sense and responsible attitude of people. This is just the first step in the process of restoring and maintaining our freedoms.'
|6th February |
Government to scale down the vetting scheme for people who work with children
See article from
See also article from
A scheme for vetting people who work with children is to be scaled down.
The Daily Telegraph reports that following a review of the Vetting and Barring scheme, criminal record checks will only be carried out on those who have intensive contact
with the young.
As a result, ministers agreed to vet adults only if they saw the same group of children or vulnerable people once a week or more, rather than once a month as originally proposed.
It is estimated that this will halve the
number of people who will be vetted from the 9 to 11 million people previously caught up by the scheme.
At the same time, the government will announce that criminal record checks are to be sent to individuals first - before they go to potential
employers - to allow them to challenge any mistakes.
Also minor offences will be removed from the checking process.
A Home Office spokesperson said an official announcement would be made shortly.
|31st January |
Swedish ISP to default to encrypted VPN for all customers
In order to neutralize Sweden's incoming implementation of the European Data Retention Directive, Bahnhof, the Swedish ISP and host of Wikileaks, will run all customer traffic through an encrypted VPN service.
Since not even Bahnhof will be able
to see what its customers are doing, logging their encrypted traffic will be unrevealing.
In 2009, Sweden introduced the Intellectual Property Rights Enforcement Directive (IPRED). The legislation gave rights holders the authority to request the
personal details of alleged copyright infringers. This prompted Jon Karlung, CEO of ISP Bahnhof, to announce that he would take measures to protect the privacy of his customers. Shortly after Bahnhof ceased logging customer activities and with no logging
there was no data to store or hand over.
Now, in the face of Sweden's looming implementation of the European Data Retention Directive which will force them to store data, Bahnhof will go a step further to protect the anonymity and privacy of their
customers. Soon, every Bahnhof customer will be given a free anonymizing service by default. In our case, we plan to let our traffic go through a VPN service, Bahnhof's Jon Karlung told SR.
|22nd January |
British ID cards no longer valid
See press release from
As of 22nd January 2011 identity cards can no longer be used to prove identity or to travel in Europe.
The cards have been scrapped by the government under the Identity Documents Act.
Within days the National Identity Register - which was
designed to hold the details of card holders - will be destroyed.
Immigration minister Damian Green said:
Laying ID cards to rest demonstrates the government's commitment to scale back the power of the
state and restore civil liberties.
It is about the people having trust in the government to know when it is necessary and appropriate for the state to hold and use personal data, and it is about the government placing
their trust in the common-sense and responsible attitude of the people.
The Identity and Passport Service (IPS) (new window) has written to all existing cardholders and informed international border agencies, travel operators
and customers of the change in law.
|8th January |
Now even clowns are spied on by the British state
See article from spiked-online.com
|5th January |
Nick Clegg's sinister nannies are nudging us towards an Orwellian nightmare
article from blogs.telegraph.co.uk