https://buy-zithromax.online buy kamagra usa https://antibiotics.top buy stromectol online https://deutschland-doxycycline.com https://ivermectin-apotheke.com kaufen cialis https://2-pharmaceuticals.com buy antibiotics online Online Pharmacy vermectin apotheke buy stromectol europe buy zithromax online https://kaufen-cialis.com levitra usa https://stromectol-apotheke.com buy doxycycline online https://buy-ivermectin.online https://stromectol-europe.com stromectol apotheke https://buyamoxil24x7.online deutschland doxycycline https://buy-stromectol.online https://doxycycline365.online https://levitra-usa.com buy ivermectin online buy amoxil online https://buykamagrausa.net

The Insecurity State

I'm not sure the cases are directly analogous, but there is a least a vague irony that various high officials in the security / surveillance agencies of our nation have had their private online accounts hacked (through social engineering), even as they insist that their agencies need easier legal access to the private data of US citizens.




The CIA director was hacked by a 13-year-old, but he still wants your data | Trevor Timm
The Senate is currently debating a bill that would give the government huge amounts of your private information. But this would make hacks more likely

View on Google+

The only time the government is willing to restrain surveillance

… is when it discovers that it, too, is being surveilled.

After nearly 50 years of (perhaps naively, perhaps with an understanding that it would be naive to be) relying on assurances from the Prime Minister's office that Members of Parliament would not be monitored by internal security (GCHQ) — first with phone taps, later with other electronic surveillance — it's now been admitted that …

… well, no, they are subject to being treated as any other British citizen. Which is not, it seems, reassuring to them.

'No 10 welcomed the court ruling and denied that the Wilson doctrine had misled MPs by giving the impression that their phone and email exchanges were protected from the British security services when in reality they were not. It insisted that the intelligence services understood they could only use their powers to tap phones in a proportionate way, and there were safeguards in place.'

Ah, "proportionate" phone taps. With "safeguards." Can't imagine why that has some MPs' feathers ruffled.

Will this actually cause Parliament to try and rope in the surveillance apparat in the UK? Or simply to try and create a legislated escape clause for themselves? I know which way I'd bet.




UK MPs learn that GCHQ can spy on them, too, so now we may get a debate on surveillance
In 1966, UK Prime Minister Harold Wilson told MPs that the UK spy agencies weren’t allowed to tap their phones and that if that changed, he’d tell them about it first. In 1997, Prime Minister Tony …

View on Google+

California passes some good privacy laws

Well done. Here's hoping the state is once again a trend-setter.

https://www.eff.org/deeplinks/2015/10/success-sacramento-four-new-laws-one-veto-all-victories-privacy-and-transparency

The core principle here is that collection of data about people needs controls over it: who can do it, under what circumstances, for what reasons, who can then access the data, and how long the data is kept. That all makes sense to me.

 

View on Google+

An EU Court shoots a hole in "safe harbor" data sharing

"Thanks, Obama! [And Bush!]" A European Union court has decided that loosey-goosey NSA mass surveillance programs of data within the US, with the cooperation (or coercion) of large tech companies, means personal data of EU citizens on US servers is not adequately safeguarded — which means, under EU law, it cannot be stored there.

That's a huge problem potentially for major US firms like Amazon and Facebook and the like who have used the US/EU "safe harbor" agreement to store personal data wherever they want. But it's also a problem for companies like my former employer who relied upon safe harbor provisions to store company HR data centrally. Will they now (or soon) need to break out EU employee data into a separate instance, controlled under separate rules?

Actions have consequences. By demonstrating that data is not protected from mass scrutiny in the US, the US has demonstrated that countries that care about privacy should not have their data handled by US companies. And this goes beyond just where the data resides. The US government has argued, for example, that Microsoft should be compelled to turn over data that is residing on servers in Ireland because it is a US company. If they succeed in that argument, I can see the EU saying that private individual data cannot be turned over to US companies at all. Which won't do any of us any good.

If the Internet gets broken into separate fiefdoms, it would be ironic if it weren't because of rapacious Big Business but because of overreaching Big Governments.




An EU Court Invalidates an Agreement Allowing Tech Companies to Move European Data to the U.S. – The Atlantic
The Safe Harbor agreement was challenged by an Austrian graduate student, who argued that personal data of EU citizens was misused by the NSA’s Prism program.

View on Google+

"Your papers (and passwords), please"

I've traveled internationally enough that I should probably considered what I would do in these circumstances.

On the one hand, I'm pretty much a "I've got nothing to hide" guy. No, really, while there is probably stuff on my phone I'd just as soon not broadcast publicly (on general principle), there's nothing illegal there that I'm aware of.

On the other hand, that's a mook's excuse. The principle is freedom from unreasonable search and seizure. And it seems the current case law means they cannot compel passwords from people or search electronic gear without probable cause.

Depending on the circumstances, I might be willing to press that issue. Which might, in turn, be very naive of me, but I think it's an important constitutional matter to defend. If there is probable cause to get a warrant, fine. If it's just a matter of "We'd like to poke around your phone and the attached accounts to see what you've been up to" then … no, that's not fine.




California city mayor relinquishes electronics and passwords to agents at SFO
As feds battle over privacy, mayor compares the situation to North Korea.

View on Google+

All your computer are belong to us (FBI Hacking Edition)

While the FBI and their national security brethren insist that they need back doors built into all encryption systems to allow law enforcement to monitor any communications they want (because certainly nobody else would ever be able to exploit such back doors, right?), they've also figured out they can get around the problem by backtracking and infecting with spyware the computers of people whose communications they want to monitor.

And here's word that there are plans to coerce technology companies into abetting this. Downloading a security patch or update to your PC? Perfect opportunity to slip a little bit of monitoring malware, courtesy of cooperative tech companies.

Never mind that this means a lot of people might not now download security patches and the like. Never mind that will in turn perpetuate vulnerabilities to virus and identity theft and all that other good stuff. This is national security at stake!

(You would think the FBI would learn from the example of the CIA, who has tainted vaccination efforts in places like Pakistan and Afghanistan by inserting agents onto medical teams performing such projects, with the result that the doctors are now shunned, or shot at.)

This is why we can't have nice things (4,327 in a Series).

Originally shared by +Les Jenkins:




The FBI has no trouble spying on encrypted communications
Every time the Bureau wants to spy on someone whose communications are encrypted, they just hack them.

View on Google+

What's good for the NSA is good for the Chinese

Is anyone surprised that the Chinese want as much back-door access to systems and data and cryptographic systems as, say, the NSA and US intelligence agencies do?

And aside from "Well, we're the good guys and they're the bad guys," how can you argue with that? Especially given the size of China's economy for those Internet businesses?




China tells US tech companies to sign PRISM-like cyber-loyalty pact | Ars Technica
“Pledge of compliance” may require companies to turn over data, install backdoors.

View on Google+

Electronic Spying: If You Aren't With Us, You May Be Against Us

Dear national intelligence agency chiefs: you aren't helping your cause with statements like this.

'CIA Director John Brennan suggested that negative public opinion and "misunderstanding" about the US intelligence community is in part "because of people who are trying to undermine" the mission of the NSA, CIA, FBI and other agencies. These people "may be fueled by our adversaries," he said.'

Yes, the old "criticize us and you're just doing the work (either intentionally or as a dupe) of Sinister Enemies" approach. I thought that went out with the McCarthy Era, but some people have short memories, I guess.

If it is difficult to have calm, adult discussions and decision-making about electronic surveillance (domestic and foreign), it is not mostly because of ISIL-leaning fellow-travelers or folk in the employ of narco-terrorists. It is largely because, post-9/11 (14 years ago today, fergoshsakes), intelligence "homeland security" agencies took all the power they had been clamoring for over the previous decade, went beyond the wide-ranging scope handed them by Congress and the President, lied to the public and to courts about what they were doing, did everything they could to keep it all a deep, dark, ever-expanding secret — and then got outed by folk like Wikileaks and Edward Snowden.

And now they wonder why they aren't trusted.

They aren't trusted because they have both hidden the truth and lied — and done so not to keep the Bad Guys from knowing what they could do (hint: the Bad Guys, the ones organized enough to actually be a threat, already assume such capabilities), but to keep the US citizenry from knowing how their own privacy was being compromised. They have never demonstrated any significant accomplishments from such programs, even as they sucked up billions of dollars and petabytes of data. And they have waved off or denounced the potential dangers of such programs through statements like Director Brennan's.

They say "trust us," when we know historically the dangers of wide-ranging spy powers. And they say "trust us" while giving us no reason to do so, and every reason to think they will not tell us the truth if they find it inconvenient to do so.

'"I have something on my mind that affects all the work we do as an intelligence community," [FBI Director James] Comey said in his opening remarks. "I think that citizens should be skeptical of government power. But I fear it's bled over to cynicism. It is something that is getting in the way of reasoned discussion, and I'm very concerned about how to change that trend of cynicism." He sees that cynicism directed toward everyone from law enforcement officers on the beat to the intelligence community at large.

In particular, Comey said, he feels that his push for some way to gain backdoor access to encryption was "met with venom and deep cynicism." "How do we get to a healthier place in talking about authority?" he asked.'

By demonstrating that authority — especially authority in a democracy — can be trusted, can act with maximum and not minimum transparency, and that the obvious risks to things like "secret" backdoors to encryption systems outweigh the non-documented advantages.

Don't get me wrong: I understand the need to know about potential actions by acknowledged threats, foreign and domestic, to the nation, and about being able to ferret out as-yet-unrecognized threats as well. Abolishing the NSA, or the CIA, or the FBI, is not the answer.

But neither is letting them do whatever they desire in gathering data about everyone on the globe. Even if every single person on that stage is acting today out of the purest and finest of intentions, we know — from the history of other nations, and the history of our own — how unfettered intelligence gathering can be abused by abusive people, can leak to the wrong places, can be used for purposes very different than what are being proposed when the data is first gathered. Those are the givens of any discussion about cyber-spying programs, and until those are addressed in an open and transparent fashion, we won't be able to approach that "healthier place."




FBI, intel chiefs decry “deep cynicism” over cyber spying programs
Admit tough questions about things like backdoors have no easy answers.

View on Google+

Try to fine-tune the magic search fairy

Apparently it's not enough, under the EU's "Right to Be Forgotten" directive that Google has to remove/block search links to information about an individual that is deemed no longer "accurate" or "relevant" (an overturned conviction meaning that Fred Smith can ask to have "Fred Smith ate live kittens" stories rendered invisible) — now a UK has ruled that Google has to also remove/block search links to material that talks about such redactions by the person's name ("Fred Smith successfully appealed to have Google remove links referring to his eating live kittens in 2001"). Though, graciously, it has granted that the stories themselves may be of "relevant" interest; they just are not to be found by searching for the name ("Fred Smith").

This kind of search censorship and further micromanagement to censor the censorship will not end well, one way or another.




Now Google must censor search results about Right to Be Forgotten removals
The Right to Be Forgotten has proved somewhat controversial. While some see the requirement for Google to remove search results that link to pages that contain information about people that is

View on Google+

Jeb! is all about stopping the evildoers

Jeb! Bush thinks the NSA needs more power to spy on the average American, because _he_ hasn't found any evidence of civil liberty violations, so clearly we should extend powers until we do.

But, more importantly, without giving the NSA more power and eliminating public access to strong cryptography, "It makes it harder for the American government to do its job while protecting civil liberties to make sure evildoers aren't in our midst."

Dear, Jeb!, I hate to tell you, but evildoers are always in our midst. Sometimes they look like evil Muslim assassins or greasy Italian gangsters. Sometimes they look like business suited white guys. Sometimes they even look like whatever it is that NSA agents look like.

Assuming all of those people are "evildoers," and all of we people are good and kind and beneficent seems … shortsighted. Assuming that if we just make police and security forces more and more powerful then they will be able get rid of all "evildoers in our midst" is naive to the point of being disingenuous.




Jeb Bush: the NSA isn’t spying on us enough
Because “evildoers.”

View on Google+

When is a rule not a rule?

When it's presented as a rule to tell people they can't do stuff, but, when pressed in court, the Justice Dept. says it's merely a guideline so the court shouldn't make any rulings about it.

' The Justice Department lawyers asked U.S. District Judge Yvonne Gonzalez Rogers in Oakland to throw out the APA challenge, saying the rules set forth in the DAG letter about what companies can disclose aren’t actually rules. They’re guidelines, said DOJ attorney Steven Bressler. He used an example of a portrait covered by a curtain and said that the DAG letter, far from being rules for Twitter, was merely a description of how the government had drawn the ''curtain back in part'' on otherwise classified information to let companies describe national security-related requests. But, he claimed, the DAG letter didn’t necessarily reflect the full amount of information that the law allowed to be revealed.

Gonzalez Rogers took issue with Bressler’s characterization, saying the DAG letter to tech companies established not mere guidelines, but a "protocol" defining ''specifically what they could do and how they could do it," indicating that to her, they sound quite a lot like rules. Bressler then said the DAG letter set forth a ''safe harbor,'' but that compliance with that letter wasn’t necessarily the only way one could comply with the law. ''Isn’t that exactly what it’s been used for now?" Gonzalez Rogers asked. Twitter sought to disclose information, ''and the response was—you cannot. See the DAG letter,'' Gonzalez Rogers said.'

Not Kafkaesque at all, nosirree.




When Is a Justice Department Rule Not a Rule? Report From Twitter’s Transparency Fight
When is a government rule not a rule? Making that question difficult, when it should be simple, seems to be the government’s leading strategy in a hearing this week in Twitter Inc.’s lawsuit challenging the government’s squelching of its transparency report. Twitter wants to provide a closer look at how often federal agents are demanding private user data for surveillance, and part of its suit fights back against the government’s rules on what it…

View on Google+

All Your Laptop May Not Belong To Us

A federal court has ruled that border agents may not willy-nilly search whatever the hell they want, at least when it comes to electronics.

That's a good thing.




Court rules search of businessman’s laptop at border ‘unreasonable’
A federal court has ruled that the government’s search of a traveling businessman’s laptop at the California border was unreasonable and violated his privacy

View on Google+

So maybe now we can have a debate about NSA data collection

A federal appellate court has ruled that the NSA's interpretation of the PATRIOT Act §215 is incorrect, and it can't vacuum up the metadatda for every phone call in the US willy-nilly.

Now, I have little doubt that if the NSA goes back to Congress and asks them, when PATRIOT is up for renewal next month, to clarify that this is in their mandate, Congress will eventually roll over for them. But let's at least have that public discussion.




Court Rules NSA Bulk Data Collection Was Never Authorized By Congress

View on Google+

On Records, Public and State

The modern presumption that, where individual citizens are sovereign, the workings of government, including its paperwork, are to be transparently available to everyone is just that — quite modern. And it's still not settled, as records debates over the last half-century (the latest being Hilary Clinton's State emails) demonstrates.




When Do Official Documents Belong to the Public?
Hillary Clinton is hardly the first government officer to try to keep her correspondence private. The fight over her emails echoes battles that stretch back to the inception of government archives.

View on Google+

"You should protect your data against everyone … but us."

Law enforcement has always had a love-hate relationship with security and encryption. It's encouraged folk to protect themselves against cyber-threats because of the risks they pose to safety, the economy, intellectual property, and privacy … but they get really hinkey when those measures keep them away from your data.

Proposing a back door to technology that only federal law enforcement can use is a laughable proposition. Knowing the back door is there means that everyone else, from commercial hackers to government-sponsored ones, will be trying to break it. And, inevitably, they will.

Since Rep. Carter (the congresscritter who is in charge of the subcommittee who funds cybersecurity efforts) avows he doesn't "know about this stuff," let me give a simple metaphor. If the FBI said, "You should keep your house securely locked, but we want to have a master key that lets us in if we need to, but don't worry, not only do we promise we'll only ever use it if it's legal and necessary, but we'll hide that key really well somewhere on your property where nobody but us will ever find it and use it to get into your house, we promise" … what would be your reaction to such a proposal?




The FBI used to recommend encryption. Now they want to ban it | Trevor Timm
For years, the agency recommended phone encryption as a defense against criminals. Now, that information has been scrubbed from public view

View on Google+

No drone pix on YouTube?

Reading through the story, it seems like someone in some FAA office has an overly-expansive view of what constitutes "commercial" use of drone videos. Not that these regs have actually been tested in court, even assuming they apply here.

(h/t +J. Steven York)




FAA says no to posting drone videos on YouTube | Impact Lab
If you fly drones and post the video footage on YouTube, the Federal Aviation Administration may send you a letter. Earlier this week, the agency sent a

View on Google+

Knowledge Is Power

At the risk of embarrassing +Kay Hill, I thought her freshman essay (by way of website) on knowledge, freedom, and tyranny, by way of Little Brother and 1984, was pretty darned cool.




knowledge-is-power

View on Google+

The Driver's ID app

Um … no. I don't want to depend on my phone for my ID, nor do I want to hand it to a cop. Just not seeing an upside here.

(No, I don't use my phone for my boarding pass, either — it's one more object to juggle going through security or the gate.)

Originally shared by +WIRED:

The driver’s license is going digital, and Iowa will be the first state to try it out.




Iowa Drivers Will Soon Be Using Their Phones as IDs | WIRED

View on Google+

Mark Udall breaks some additional torture information

As a member of the Senate Intelligence Committee, Udall (D-CO) has been one of the loudest advocates for years on releasing information about intelligence agency abuses, both in this context and regarding surveillance activities, lambasting both the Bush and Obama administrations for their actions. He continued that today, discussing how the Senate report released yesterday is supported by an internal CIA review (still classified), and providing additional details.

Unfortunately, Udall won't be around next session to continue this good work, even in the minority. He was defeated for reelection by (sigh) Cory Gardner, who suggested during the election that discussion of releasing the Senate report was just an attempt to "politicize" it.




Udall blasts Obama for breaking word on CIA torture disclosures
Colorado Sen. Mark Udall blasted President Obama on Wednesday for breaking his promise to shine light on what Udall has dubbed a “dark chapter of our hist

View on Google+

Email requests for the goose are email requests for the gander

Microsoft has it completely right here. If the US feels it can extend its legal jurisdiction over stuff in foreign countries, it better expect to have foreign countries extend their legal jurisdiction over stuff int he United States. Or, of course, admit to a double standard and expect the world to go along with it.

None of those seem like particularly viable or pleasant scenarios.

Originally shared by +Ars Technica:




Microsoft tells US: The world’s servers are not yours for the taking
Redmond says the US would be aghast if a foreign government behaved as it does.

View on Google+