Melon Farmers

 Liberty News

   2011: July-Sept

Adult DVD+VoD
Online Shops
Shop Reviews
New & Offers
 
  Home  US Film Cuts
  Index  World  Nutters
  Forum  Media Liberty
   Info      
   UK      
Sex News
Sex+Shopping 
MelonnFarmers.com


25th September   

Update: Gangs of Spies...

Westminster Council initiate programme to monitor social networking sites for local gang activity
Link Here  full story: A Riotous Blame Game...So what is to blame for the 2011 hoodie riots

Westminster logoWestminster City Council plans to spend £ 180,000 over three years monitoring social media networks through a dedicated gangs information desk, according to reports in The Times.

According to a private council document, youth workers will collect intelligence gathered from sites such as Facebook and Twitter as a precautionary measure and consider letting instigators know they are being watched.

The document states Westminster is interested in exploring ways to spot confrontations and provide street-level intelligence and would consider working with social enterprises to monitor Blackberry Messenger, YouTube and Facebook postings to intervene and offer protection and a way out to those involved with gangs.

Cllr Nickie Aiken, cabinet member for children, young people and community protection, said:

We have known the importance of social networking sites such as facebook and twitter for some time but during the disturbances in August we saw young people rapidly organising criminal behaviour through technologies like Blackberry Messenger.

Some of our youth workers were successful in discouraging young people from getting involved in the looting in Oxford Circus. However, as part of our new Gangs Strategy we want to make this work more systematic over the next few months and will be asking young people, as the real experts, how we can best do this without spying on people.

 

14th August   

Offsite: Can RIM Decrypt Blackberry Messages?...

The Daily Mail tries to find out
Link Here

rim blackberry logo They are accused of playing a vital role in helping rioters to plot the violence that blighted Britain.

But when The Mail on Sunday tried to question Twitter and the makers of BlackBerry phones about the sinister use of their technology, Twitter's chief executive mocked us and a journalist was forcefully told to leave BlackBerry's HQ.

...Read the full article

Comment: Err...Yes

Well several other repressive countries, UAE, Saudi, Indonesia and India, have all seemed to have gotten satisfaction over RIM decrypting Blackberry messages when requested.

Only a guess, but the general theme of these tussles seems to be that the decryption keys can be used by the server administrators to decrypt messages on government request. Ordinary Blackberry subscribers use servers run by RIM so these can be decrypted by RIM. Large businesses have the option to run their own server, and it seems that governments may have to approach the business operator to get these messages decrypted rather than RIM.

 

14th August   

Offsite: Bunions and All...

Daily Mail hunts down the complete record of one woman's day
Link Here

Daily Mail logo Big Brother knows all about my bunion op - and the fish pie I ate after it: How one woman found out about the intimate information held about her

...Read the full article

 

10th August   

Technology Watching...

US police have camera able to recognise people against a database of biometric data
Link Here

moris Police officers in the USA now have technology which can register a person in seconds. BI2, a Massachusetts based company, has just released MORIS (Mobile Offender Recognition and Information System), enabling a police officer to take an iris scan in seconds and, when attached to an iPhone, take a biometric facial scan with it.

MORIS can then run the image through US criminal records.

Alongside the obvious problems in allowing a private company to manage government records, there is a worry that US police forces may be using the devices to randomly scan the population with the objective of identifying illegal immigrants and sex offenders.

Sean Mullin, BI2's CEO, says that it is difficult to capture an image of someone without their consent because the MORIS should be used at close-distance: It requires a level of cooperation that makes it very overt -- a person knows that you're taking a picture for this purpose .

It won't be long before it reaches the UK.

 

9th August   

Scoring on Credit...

So is buying porn with a credit card a risky proposition?
Link Here

credit card So how has your credit score been looking? Think you've been doing all the right things but you're not seeing your credit score shape up the way you want it to? Believe it or not, even some of your most innocent decisions and actions can hurt your credit score.

...

4. Making Risky and Risque Purchases

Some lenders look closely at what you spend money on in order to determine if you are a financial risk or not. This means that if you are using a credit card for adult entertainment (i.e., strip clubs, adult website memberships) on a consistent basis, you will be considered riskier than others.

Risky purchases don't stop at porn. If you are using your credit card to buy lottery tickets every week or for sporadic shopping sprees, credit card issuers and lenders see this as a sign of desperation and financial irresponsibility.

If you regularly rack up impressive bar tabs or liquor store receipts, credit card issuers are likely to think you are drowning financial sorrows away with alcohol. While it's perfectly acceptable (and encouraged) to have a regular happy hour session, if you make it a habit of frequenting bars and charging a bunch of drinks, you can raise a red flag.

 

7th August   

Dangerous Technology...

US researchers link facial recognition technology with Facebook profiles to identify people in the offline world
Link Here

facial recognition US technology researchers have demonstrated that they can link up facial recognition camera technology with a database of people with their pictures tagged by Facebook.

Researchers at Carnegie Mellon University combined off-the-shelf image scanning, cloud computing and public profiles from social network sites to identify individuals in the offline world.

In another experiment, researchers were able to extract the social security number of a student starting only with their photo.

When we share tagged photos of ourselves online, it becomes possible for others to link our face to our names in situations where we would normally expect anonymity, said team leader Professor Alessandro Acquisti.

The researchers have also developed an augmented reality mobile app that can display personal data over a person's image captured on a smartphone screen.

The results of the research will be presented at the Black Hat security conference in Las Vegas this week.

 

1st August   

Internet Snooping...

US communication logs to be retained for all Americans
Link Here

US Senate The U.S. House Judiciary Committee has approved a measure that would force ISPs to save users' IP address information for one year.

The bill, HR 1981 The Protecting Children from Internet Pornographers Act of 2011 ,was approved on a 19-10 vote and considered a victory for conservative Republicans despite opposition from digital rights groups and civil liberties advocates.

An 11th hour rewrite of the controversial data retention mandate reportedly expands the information that commercial ISPs are required to store to include customers' names, addresses, phone numbers, credit card numbers, bank account numbers, and temporarily-assigned IP addresses.

The panel rejected an amendment that would have clarified that only IP addresses must be stored.

Representative John Conyers of Michigan, the senior Democrat on the panel said the bill is mislabeled: This is not protecting children from Internet pornography. It's creating a database for everybody in this country for a lot of other purposes.

The Association of Sites Advocating Child Protection (ASACP) penned a letter to the U.S. Congress protesting its erroneous use of the phrase Internet Pornographers in the new legislation. ASACP executive director Tim Henning told XBIZ that lumping in adult businesses in the bill's labeling is flat out wrong. 'Protecting Children From Internet Pedophiles' or 'Protecting Children From Internet Sex Crimes' would both be more appropriate and accurate titles for this Act, the ASACP letter stated.

 

15th July   

Internet Bill of Rights...

MPs call for better privacy protection for personal data accessed via the internet
Link Here

House of Commons logo Early day motion 2004
Primary sponsor: Robert Halfon

That this House is deeply concerned that privacy is gradually being eroded by private companies using the internet to obtain personal data and selling it for commercial gain; notes that the latest problem is with WPP Group plc, the advertising firm, which claims to have built up individual profiles for half a billion internet users across the world, including allegedly almost 100 per cent. of British people; further notes that secret monitoring of internet users is already a huge issue, with data scraping and cookies monitoring people without their consent; believes an internet bill of rights is needed to guard against the growing infringement of civil liberties that are not covered by existing legislation; and further believes that the Information Commissioner lacks the powers necessary to protect personal data and has done precious little to protect our privacy in recent tests such as the Google Street View project.

Signed by

  • Campbell, Gregory Democratic Unionist
  • Campbell, Ronnie Labour
  • Corbyn, Jeremy Labour
  • Davidson, Ian Labour
  • Dodds, Nigel Democratic Unionist
  • Edwards, Jonathan Plaid Cymru
  • Halfon, Robert Conservative
  • Hancock, Mike Liberal Democrats
  • Leech, John Liberal Democrats
  • Lewis, Julian Conservative
  • Llwyd, Elfyn Plaid Cymru
  • McCrea, Dr William Democratic Unionist
  • McDonnell, John Labour
  • Meale, Alan Labour
  • Simpson, David Democratic Unionist
  • Stringer, Graham Labour
  • Williams, Roger Liberal Democrats

 

15th July   

Offsite: FAST Track to Big Brother...

Lie detector technology being adapted for US airport security
Link Here

fast The video [discussed in the article] is a promotional presentation by the Department of Homeland Security for a project known as Future Attribute Screening Technology , or FAST. The project is not new --- the video came out several years ago --- and the technology is not new, either. The system incorporates several existing forms of non-invasive psychological evaluation methods, including thermal imaging, the monitoring of heart rate, etc. It doesn't even include the measurement of galvanic skin response (as commonly used in lie detectors), but produces similar results through other means. Just as with the full-body scanner, a subject has only to stand in one place briefly to be examined by several forms of instrumentation, whose results are then analyzed and recorded in a networked computer system.

The purpose of this new form of electronic scrutiny is nothing less than to detect in advance the intention or propensity to do violence. It is truly Orwellian in its proposed scope.

...Read the full article

 

13th July   

Reading The Way We Live Now...

New York to consider privacy protection for eBook readers
Link Here

Kindle Wireless Reader 3G Wifi Graphite How would you like it if bookstores recorded how often you read the book, how long you view each page and even any notes you might write in the book's margins?

Well, all those things are happening now with digital books. Many bookstores already collect information about readers and their purchases. But digital book services can collect even more detailed information that often is bundled in a database and sold to marketers or acquired by governments.

Maybe you should avoid using eBooks that reveal anything you would rather be private, eg reading about health conditions, porn or dodgy religions.

A bill in the New York state Assembly is set to offer some privacy protection at least. The Reader Privacy Act, similar to legislation in California, would prevent digital book service providers from disclosing to any government entity personal information of a person who buys digital books. Providers would not be compelled to disclose such information to anyone except under court order.

A digital book provider that knowingly violates these restrictions would face a $500 fine for each instance.

 

12th July   

Cloud Warning...

Microsoft reveals that cloud data will be available to law enforcement agencies [and assorted hackers]
Link Here

Microsoft logo Microsoft has revealed that EU users of its upcoming cloud services may have their personal information intercepted by US law enforcers.

In a statement, Microsoft explained: Microsoft may need to disclose data without your prior consent, including as needed to satisfy legal requirements, or to protect the rights or property of Microsoft or others (including the enforcement of agreements or policies governing the use of the service).

Cloud services give consumers access to their files anywhere they can access the internet. This can be hugely useful, but the risk of data loss and hacking is always a possibility and it seems inevitable that security will be breached by hackers as well as US law enforcement

 

3rd July   

Offsite: Beware of Unintended Consequences...

Technical consideration of the usefulness of encrypted wi-fi data as collected by Google Street View cars
Link Here  full story: Mapping Routers...Google correlates routers with street address

beware unintended consequences In the early days following Google's Street View WiFi snooping escapades, I became increasingly frustrated that public and official attention centered on Google's apparently accidental collection of unencrypted network traffic when there was a much worse problem staring us in the face.

Unfortunately the deeper problem was also immensely harder to grasp since it required both a technical knowledge of networked devices and a willingness to consider totally unpredicted ways of using (or misusing) information.

As became clear from a number of the conversations with other bloggers, even many highly technical people didn't understand some pretty basic things - like the fact that personal device identifiers travel in the clear on encrypted WiFi networks... Nor was it natural for many in our community to think things through from the perspective of privacy threat analysis.

A few months ago I ran into Dr. Ann Cavoukian, the Privacy Commissioner of Ontario, who was working on the same issues. We decided to collaborate on a very in-depth look at both the technology and policy implications.

Please read WiFi Positioning Systems: Beware of Unintended Consequences [pdf]