-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
ACLU Sues for Records on Border Laptop Searches
,----[ Quote ]
| The American Civil Liberties Union said Wednesday that it had filed a lawsuit
| under the Freedom of Information Act (FOIA), demanding records from the U.S.
| Customs and Border Protectionâs (CBP) policy of searching laptops at border
| crossings without any suspicion of wrongdoing.
`----
http://www.techpolitik.com/2009/08/26/aclu-sues-for-records-on-border-laptop-searches/
ACLU chapter flags Facebook app privacy
,----[ Quote ]
| The Northern California chapter of the American Civil Liberties Union has put
| out a campaign designed to raise awareness of the privacy implications of
| Facebook's developer platform. It's focusing specifically on the
| popular "quiz" applications, like "Which Cocktail Best Suits Your
| Personality?" and "Which Wes Anderson Movie Character Are You?" These are
| largely one-time-use apps that many a Facebook user clicks on and tries out
| with little concern.
`----
http://news.cnet.com/8301-13577_3-10318842-36.html
Related:
Feds to give cops Internet-snooping powers
,----[ Quote ]
| Police and the Canadian Security Intelligence Service already have the power
| to wiretap private communications, provided they have judicial authorization,
| but the law does not require ISPs to grant them access.
|
| Tom Copeland, chairman of the Canadian Association of Internet Providers,
| said it will be a hardship for some of the country's smaller providers to
| upgrade their systems to facilitate interception.
`----
http://www.calgaryherald.com/Technology/Feds+give+cops+Internet+snooping+powers/1706191/story.html
E-Mail Surveillance Renews Concerns in Congress
,----[ Quote ]
| The National Security Agency is facing renewed scrutiny over the extent of
| its domestic surveillance program, with critics in Congress saying its recent
| intercepts of the private telephone calls and e-mail messages of Americans
| are broader than previously acknowledged, current and former officials said.
`----
http://www.nytimes.com/2009/06/17/us/17nsa.html?_r=2
EFF brief accuses DOJ of "backdoor wiretapping"
,----[ Quote ]
| In a new brief, the EFF alleges that in order to get around
| wiretapping's "probable cause" requirements, the DOJ ordered a suspect's ISP
| to start accumulating his emails so that they could later come in and use the
| Stored Communications Act to subpoena the archive.
`----
http://arstechnica.com/tech-policy/news/2009/06/eff-brief-accuses-doj-of-backdoor-wiretapping.ars
Campaigners monitored by civil servants
,----[ Quote ]
| Government officials have been monitoring environmental campaign groups and
| then passing intelligence on to the police, according to documents seen by
| the Guardian.
|
| An internal risk report from the Department for Transport reveals that a unit
| referred to as the comms directorate Â"continuously monitor[ed]" peaceful
| protest groups opposed to the expansion of Heathrow airport and then briefed
| detectives about their findings.
`----
http://www.guardian.co.uk/uk/2009/may/01/liberty-climate-protesters-campaigners
Police want new remote hard drive search powers
,----[ Quote ]
| At present, the proposed legislative changes don't appear to be related to EU
| moves to step up hacking of PCs in homes and offices by police.
`----
http://www.theregister.co.uk/2009/04/29/remote_hard_drive_forensics/
FBI used spyware to catch cable-cutting extortionist
,----[ Quote ]
| CIPAV spyware helped nab unemployed engineer angry over outsourcing
`----
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9131778&source=NLT_AM
Congress Ponders Cybersecurity Power Grab
,----[ Quote ]
| There was a lot of attention paid last week to a new "cybersecurity" bill
| that would drastically expand the government's power over the Internet. The
| two provisions that have probably attracted the most attention are the parts
| that would allow the president to "declare a cybersecurity emergency" and
| then seize control of "any compromised Federal government or United States
| critical infrastructure information system or network." Perhaps even more
| troubling, the EFF notes a section that states that the government "shall
| have access to all relevant data concerning (critical infrastructure)
| networks without regard to any provision of law, regulation, rule, or policy
| restricting such access."
`----
http://techdirt.com/articles/20090403/1346154383.shtml
Cryptome: NSA has access to Windows Mobile smartphones
,----[ Quote ]
| First time in history Cryptome.org has released information about the
| characteristics of NSAâs network surveillance.
`----
http://blogs.securiteam.com/index.php/archives/1028
Dual_EC_DRBG Added to Windows Vista
,----[ Quote ]
| Microsoft has added the random-number generator Dual_EC-DRBG to Windows
| Vista, as part of SP1. Yes, this is the same RNG that could have an NSA
| backdoor.
|
| It's not enabled by default, and my advice is to never enable it. Ever.
`----
http://www.schneier.com/blog/archives/2007/12/dual_ec_drbg_ad.html
Microsoft Cofee brews 'back door' fears
,----[ Quote ]
| The assurances came after reports claiming that Cofee could provide a 'back
| door' into Microsoft operating systems and applications.
`----
http://www.itnews.com.au/News/75780,microsoft-cofee-brews-back-door-fears.aspx
Bots rule in cyberspace
,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.
`----
http://www.theinquirer.net/gb/inquirer/news/2008/03/17/bots-rule-cyberspace
New ID cards are supposed to be 'unforgeable' - but it took our expert 12
minutes to clone one, and programme it with false data
http://www.dailymail.co.uk/news/article-1204641/New-ID-cards-supposed-unforgeable--took-expert-12-minutes-clone-programme-false-data.html
UK ID Card Technology Cloned...
,----[ Quote ]
| No surprises there, of course; but what's significant is that it's the Daily
| Mail that's pushing this jolly news out to its assembled readers. This means
| the message is going out to groups beyond the obvious Guardian greeny-lefties
| and Telegraph Tories.
`----
http://opendotdotdot.blogspot.com/2009/08/uk-id-card-technology-cloned.html
Government rubbishes ID card hack report
http://www.theregister.co.uk/2009/08/07/id_card_hacked/
Labour minister says 14 year olds should get ID cards
,----[ Quote ]
| A government minister has spoken glowingly of the prospect of kids as young
| as six handing over their biometrics as she boasted that the Tories and
| LibDems would find it impossible to unpick the governmentâs ID card scheme.
`----
http://www.theregister.co.uk/2008/09/23/id_cards_offies/
The war on photographers - you're all al Qaeda suspects now
http://www.theregister.co.uk/2008/06/23/police_photographer_stops/
Bavaria sanctions police spyware
,----[ Quote ]
| Bavaria has become the first German state to approve laws that allow police
| to plant spyware on the PCs of terror suspects.
`----
http://www.theregister.co.uk/2008/07/07/bavaria_police_spyware_plan/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkqXAIUACgkQU4xAY3RXLo5xngCaAroBokAQ8nCXjp7vh3r8dRB6
n1sAn0Nf8RHnfRtdqc++sW14biCi1JvA
=itNF
-----END PGP SIGNATURE-----
|
|