Liberty News

 2013: Jan-March



 Offsite Article: Welcome to an Internet without privacy, and we've ended up here with hardly a fight...


Link Here 27th March 2013
Big Brother Welcome to a world where Google knows exactly what sort of porn you all like, and more about your interests than your spouse does. By Bruce Schneier

See article from schneier.com

 

 Offsite Article: Gathering clouds over digital freedom?...


Link Here 12th March 2013
index logo The debate over the direction of the web has just started, and contradictory messages that need careful scrutiny are emerging from governments and corporations alike, says Kirsty Hughes

See article from indexoncensorship.org

 

 Offsite Article: How Facebook could get you arrested...


Link Here 11th March 2013
Save Everything Click Here Solutionism Smart technology and the sort of big data available to social networking sites are helping police target crime before it happens. But is this ethical? Book extract from To Save Everything by Evgeny Morozov

See article from guardian.co.uk

 

 Update: A Fare Cop...

Southampton Council found to be abusing Taxi passengers' right to privacy


Link Here 21st February 2013  full story: Listening CCTV...CCTVs with microphones

ICO logo Southampton Council's attempt to justify it's policy of requiring taxis to record audio and video of every journey took another blow when the First Tier Tribunal ruled against it.

The case stems from a complaint made by Big Brother Watch and others to the Information Commissioner's Office (ICO), and led to Oxford council abandoning it's policy and Southampton being given an enforcement notice -- essentially a prosecution for breaching the Data Protection Act.

As reported by the barrister's chambers 11KBW, who acted for the ICO in the case:

What the Council disputed was (1) the conclusion that the policy involved the processing of sensitive personal data as well as personal data; and (2) the ICO's finding that the recording and retention of audio data was a disproportionate interference with passengers' privacy rights under Article 8 of the European Convention.

On both points, the tribunal ruled against the council, saying the policy was disproportionate and accepting the risk of function creep .

 

 Offsite Article: Out Of Town Affairs...


Link Here 14th February 2013
out of town affairs logo MPs should be a bit more careful what they wish for when voting for the snooper's charter

See article from bigbrotherwatch.org.uk

 

  Keeping a Close Watch on Politicians...

Canada abandons internet surveillance bill


Link Here 13th February 2013

Canada flag The Conservative Canadian government is abandoning its much-criticized internet surveillance bill, which would have allowed the government to keep tabs on its citizens and was disguised with bollox claims of fighting child pornographers. (The authorities can already get all the warrants they need to investigate serious crimes)

Justice Minister Rob Nicholson announced that Bill C-30, which caused public ire over privacy, is dead. Nicholson told reporters:

We've listened to the concerns of Canadians, We will not be proceeding with Bill C-30 ... including the warrantless mandatory disclosure of basic subscriber information, or the requirement for telecommunications service providers to build intercept capabilities within their systems.

Bill C-30 misleadingly known as the Protecting Children from Internet Predators Act was introduced in Parliament less than a year ago, and it was presented as a choice that Canadians must make: to either support the bill or be on the side of child pornographers. He can either stand with us or stand with the child pornographers, argued Public Safety Minister Vic Toews in Parliament while attacking the opposition last February.

This comment led to public outrage, raising privacy concerns across the nation.

What made the legislation dangerous was that it forced Internet service providers to have systems that allowed police to intercept and track online communications. Also, it would have permitted authorities to have warrantless access to Internet subscriber information, including name, address, telephone number, email address and IP address.

This is a great day, critic of the bill, Ontario Privacy Commissioner Ann Couvukian told The Globe and Mail, This is a victory for privacy and for freedom.

 

 Comment: Snoops Run Riot...

Detailed information posted on social networks is a bountiful feast for government snoops


Link Here 12th February 2013

raytheon logo New technology has been developed enabling governments to snoop on people using social networking websites and apps.

The sophisticated technology relies on websites such as Facebook and Twitter to build a detailed picture of people's lives in a move that raises concerns over breach of privacy and civil liberties.

The system has been created by Raytheon, the US giant defence contractor. It is name Riot or Rapid Information Overlay Technology

It was claimed that the technology could be transformed into a Google for spies and used by governments as a means of monitoring and controlling people online.

A video obtained by the Guardian newspaper reveals how the software system can gather personal information about people, including their friends, interests and the places they visit, from social networking websites including Foursquare, Facebook and Twitter

In the video, the software analyses the behaviour of a Raytheon employee Nick to show the places he has used his smartphone, the day or time of most internet activity and the location of photos posted online. We know where Nick's going, we know what Nick looks like, now we want to try to predict where he may be in the future, says the video.

Ginger McCall, from the US-based Electronic Privacy Information Centre said:.

Social networking sites are often not transparent about what information is shared and how it is shared.

Users may be posting information that they believe will be viewed only by their friends, but instead, it is being viewed by government officials or pulled in by data collection services like the Riot search.

Offsite Comment: Why we should all worry about being tracked online

12th February 2013. See  article from  guardian.co.uk

The Guardian Surveillance is getting cheaper and easier by the day, which in turn proves almost irresistible -- for those with good and bad intentions -- to make more use of it.

...read the full article

 

 Offsite Article: This High Court ruling on criminal records is only a minor win for human rights...


Link Here 1st February 2013  full story: Vetting Workers...UK vets all adults to work with kids
This ruling may limit the disclosure of historic information, but what about its retention?

See article from independent.co.uk

 

 Offsite Article: Private Files R US...


Link Here 31st January 2013
British internet users' personal information on major cloud storage services can be spied upon routinely by US authorities

See article from independent.co.uk

 

 Offsite Article: Judges rule criminal record checks to be incompatible with Human Rights Act...


Link Here 26th January 2013  full story: Vetting Workers...UK vets all adults to work with kids
The overzealous criminal record vetting system has allowed old, minor and unreliable information to wreck the lives of too many hardworking people in the UK.

See article from bbc.co.uk

 

  Tell us about the Spying Capabilities of Skype?...

Open Letter to Skype from Concerned Privacy Advocates, Internet Activists, Journalists and Other Organizations


Link Here 25th January 2013

skype logo Skype is a voice, video and chat communications platform with over 600 million users worldwide, effectively making it one of the world's largest telecommunications companies. Many of its users rely on Skype for secure communications--whether they are activists operating in countries governed by authoritarian regimes, journalists communicating with sensitive sources, or users who wish to talk privately in confidence with business associates, family, or friends.

It is unfortunate that these users, and those who advise them on best security practices, work in the face of persistently unclear and confusing statements about the confidentiality of Skype conversations, and in particular the access that governments and other third parties have to Skype user data and communications.

We understand that the transition of ownership to Microsoft, and the corresponding shifts in jurisdiction and management, may have made some questions of lawful access, user data collection, and the degree of security of Skype communications temporarily difficult to authoritatively answer. However, we believe that from the time of the original announcement of a merger in October 2011, and on the eve of Microsoft's integration of Skype into many of its key software and services, the time has come for Microsoft to publicly document Skype's security and privacy practices.

We call on Skype to release a regularly updated Transparency Report that includes:

  1. Quantitative data regarding the release of Skype user information to third parties, disaggregated by the country of origin of the request, including the number of requests made by governments, the type of data requested, the proportion of requests with which it complied -- and the basis for rejecting those requests it does not comply with.

  2. Specific details of all user data Microsoft and Skype currently collects, and retention policies.

  3. Skype's best understanding of what user data third-parties, including network providers or potential malicious attackers, may be able to intercept or retain.

  4. Documentation regarding the current operational relationship between Skype with TOM Online in China and other third-party licensed users of Skype technology, including Skype's understanding of the surveillance and censorship capabilities that users may be subject to as a result of using these alternatives.

  5. Skype's interpretation of its responsibilities under the Communications Assistance for Law Enforcement Act (CALEA), its policies related to the disclosure of call metadata in response to subpoenas and National Security Letters (NSLs), and more generally, the policies and guidelines for employees followed when Skype receives and responds to requests for user data from law enforcement and intelligence agencies in the United States and elsewhere.

Other companies, such as Google, Twitter and Sonic.net already release transparency reports detailing requests for user data by third parties twice a year. We believe that this data is vital to help us help Skype's most vulnerable users, who rely on your software for the privacy of their communications and, in some cases, their lives.

Sincerely,
The Undersigned

Organizations

Abine, Access, AIDS Policy Project, ASL19, Asociacion de Internautas, Aspiration, Bolo, Bhi, Calyx Institute, ChokePoint Project, Crossbear Project, Cryptocat ,Crypto.is, Cyber Arabs/IWPR, DFRI, Digital Rights Foundation, Digitale, Gesellschaft, DotConnectAfrica, DISC Development, Egyptian Initiative for Personal Right,s Electronic Frontier Foundation, The Engine Room, Expression Online Coalition, Front Line Defenders, Free Network Foundation, Global Voices Advocacy, GreatFire.org ,The Guardian Project, Hermes Center for Digital Human Rights, Internet Protection Lab, The Julia Group, May First/People Link, Nachtpult, OpenITP, Open Media, Open Technology Institute, Progressive Global Commons, Public Sphere Project, Radical Designs, Reporters Without Borders, TagMeNot, Tech for Freedom, Telecomix, Thai Netizen Network, Tibet Action Institute, Zwiebelfreunde.

 

  Spy in Your Lap Top...

Australian government considers allowing spies to hijack innocent people's PCs so that they can be used to help in hacking computers of suspected criminals


Link Here 13th January 2013

asio logo The Australian Attorney-General's Department is pushing for new powers for the Australian Security Intelligence Organisation (AISO) to hijack the computers of suspected terrorists.

A spokesman said it was proposing that ASIO be authorised to use a third party computer for the specific purpose of gaining access to a target computer :

The purpose of this power is to allow ASIO to access the computer of suspected terrorists and other security interests.

(It would be used) in extremely limited circumstances and only when explicitly approved by the Attorney-General through a warrant.

Importantly, the warrant would not authorise ASIO to obtain intelligence material from the third party computer.

The Attorney-General's Department refused to explain yesterday how third-party computers would be used, as this may divulge operationally sensitive information and methods used by ASIO in sensitive national security investigations. But it said technological advances had made it increasingly difficult for ASIO to execute search warrants directly on target computers, particularly where a person of interest is security conscious.

But cyber specialist Andrew Pam, a board member of the Electronic Frontiers lobby group, predicted ASIO could copy the tactics of criminal hackers to seize control of target computers. Australians' PCs might be used to send a malicious email with a virus attached, or to load malware onto a website frequently visited by the target.

Victoria's acting Privacy Commissioner, Dr Anthony Bendall, said that ASIO's proposed new powers are characteristic of a police state. To access a third party's computer, which has no connection with the target, is extraordinarily broad and intrusive.

 

 Offsite Article: The Prum Treaty...


Link Here 10th January 2013
A report shows that the European Commission plans to force the UK to allow other member states access to personal details of every motorist in Britain as well as access to the national DNA database and fingerprint records.

See article from bigbrotherwatch.org.uk