Another list of recent news items about computer security, privacy, and surveillance.
Among the approved targets of the NSA surveillance site – code-named TITANPOINTE – were the International Monetary Fund, the World Bank, the Bank of Japan, the European Union, the United Nations, and at least 38 different countries, including U.S. allies such as Italy, Japan, Brazil, France, Germany, Greece, Mexico, and Cyprus.
An attacked computer can remotely be configured to swap the headphone jack for the microphone jack, allowing any headphones that might potentially be plugged in to serve as a microphone — making it possible to use them as an eavesdropping device.
These Are The 48 Organizations That Now Have Access To Every Brit’s Browsing History.
Law enforcement agencies are dramatically increasing their use of Opal card public transport data to track the movements of people in New South Wales, with approvals for data more than doubling this year. Police can be handed the information of “collateral cardholders”, or people who are not suspects, when their person of interest’s identity is unknown.
“If you have nothing to hide, what do you really have, aside from the panoptic attention of a state, which itself keeps secrets?” – William Gibson
To spy on a telephone, all that was required was that the aircraft be cruising at an altitude above 10,000 feet. Secret aerial stations on the ground could intercept the signal as it transited through a satellite. The simple fact that the telephone was switched on was enough to give away its position.
Federal Government departments — that are not currently permitted to access the metadata of Australians — have attempted to work around the restrictions established in last year’s Data Retention Bill by requesting the Australian Federal Police do the searches for them.
Amazon won’t say if Echo has been wiretapped. Echo is an always-on device, which, when activated, can return search queries, as well as read audiobooks and report sports, traffic, and weather. It can even control smart home devices. The company is said to have sold three million Amazon Echo speakers. The FBI neither confirmed nor denied whether it tapped the Echo.
If you are referred for a secondary inspection at the U.S border, your right to privacy is essentially moot. Either a CBP officer or an Immigration and Customs Enforcement (ICE) special agent will likely question you and may inspect your possessions. This can mean anything from a quick look through your bags to copying and detaining your electronic devices—it’s up to the agent and his or her supervisor, not due process.
When it comes to breaking into phones, it’s tougher to access devices that aren’t as popular as iPhones or Samsungs, according to investigators. Most forensics technology developers don’t waste their time trying to find design flaws in off-brand phones.
“Bulk collection kills people,” says Bill Binney, a former NSA analyst. “You collect everything, dump it on the analyst, and they can’t see the threat coming, can’t stop it”.
A US-born NASA scientist was detained at the border until he unlocked his phone. Bikkannavar did not want to hand over the device, because it was given to him by JPL and is technically NASA property. “I told him I’m not really allowed to give the passcode; I have to protect access. But he insisted they had the authority to search it.”
Once border agents have your password, we have to wonder, what do they do with it? Where they keep it, how secure it is, and how long they can hang on to it? The answer to the last question is, probably indefinitely.
Australia’s attorney general, George Brandis, appears to have granted the country’s domestic spy agency access to journalists’ metadata in a small number of cases, the agency’s head has revealed.
The GCHQ, the UK signals intelligence agency, conducts bulk interception by tapping undersea fiber optic cables landing in the UK. The US and UK governments have a long-standing arrangement to share intelligence, particularly signals intelligence, with each other, as well as with Australia, Canada and New Zealand (“Five Eyes alliance”).
While it’s not true that all Internet traffic flows through the US, the addition of a few listening posts at key Internet exchanges in Europe (London, Paris) and some in Asia (Hong Kong, Tokyo) ensure that the NSA and its Five Eyes partners can analyse and ingest the majority of international Internet traffic.
Australia is collecting more metadata per capita and issuing more warrants to intercept communications than the U.S, UK and Canada.
Certain generations are more amenable to government snooping than others. Among millennials (ages 18-34), 20 percent would rather the government see the contents of their phone than their significant other compared to only 8 percent of adults ages 35 and older.
The NSA harvests data from major Internet companies like Facebook, Google and Apple without a warrant, because it is ostensibly “targeting” only foreigners. But the surveillance program sweeps up a large number of Americans’ communications as well.
An investigator with the Australian Federal Police sought and acquired the call records of a journalist without a warrant. No disciplinary action has been taken against the investigator behind the breach, with Commissioner Colvin saying he did not believe there was any “ill will or bad intent”.
UK law enforcement agencies may soon be able to remotely disable or restrict a mobile phone if it is suspected of being used for drug dealing or related to it, and in some cases regardless of whether a crime has actually been committed.
Since we cannot trust the government to behave responsibly, nor can we trust them with our information, the only thing we can do is change our behaviour. This is the antithesis of freedom. Nobody should feel that they cannot do something completely legal because the wrong person could gain access to their data.
“The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia” – Australian Prime Minister Malcolm Turnbull announces war on encryption.
Theresa May says there should be no “means of communication” which “we cannot read” — and no doubt many in her party will agree with her, politically. But if they understood the technology, they would be shocked to their boots. It’s impossible to overstate how bonkers the idea of sabotaging cryptography is to people who understand information security.
The lovely catch 22 of living in the age of mass surveillance is that the NSA isn’t even sure when it’s illegally spying on you. To determine whether its activities are illegal, the NSA would have to conduct additional, also illegal surveillance. And so Americans are being illegally spied on, but no one knows how often this happens, why it happens, or how it happens.
The Australian State of Queensland wants the power to force citizens to unlock their devices during a declared terrorist emergency. The bill also seeks to silence citizens who’ve had their phone searched. Part of the justification is that people might have taken photos or videos of a terrorist incident, which they then post to social media, and these might help identify an attacker. Refusal to unlock and hand over phones and/or laptops would be punishable by up to a year in prison.
When made aware of online surveillance by the government, noteworthy percentages of respondents were less likely to speak or write about certain things online, less likely to share personally created content, less likely to engage with social media, and more cautious in their internet speech or search. In other words, there was a clear chilling effect.
The NSA uses the term “traffic shaping” to describe any technical means that deliberately reroutes Internet traffic to a location that is better suited, operationally, to surveillance. Since it is hard to intercept Yemen’s international communications from inside Yemen itself, the agency might try to “shape” the traffic so that it passes through communications cables located on friendlier territory.
It’s a huge strain on the resources of telecommunications companies to keep your metadata safe from hackers. Can we trust them to be competent? Let’s hope so. Given how many inferences about someone’s personal life can be drawn from their communications metadata, you’d hope it was being kept safe away from prying eyes. Recent IT security breaches on a national scale ask pertinent questions about whether or not this is the case.
Women should carefully consider the privacy and security tradeoffs before deciding to use any of these applications for Android and iOS which claim to help people keep track of their monthly cycle, know when they may be fertile, or track the status of their pregnancy.
The Queensland Police have asked the Australian Parliament to give them the right to covertly install malicious software on your home devices in order to conduct mass surveillance during times of “national emergency”.
The WannaCrypt exploits used in the recent cyberattack were drawn from the exploits stolen from the National Security Agency in the United States. This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen.