Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] Spying Becomes Trivial Using Digital Proprietary World

  • Subject: [News] Spying Becomes Trivial Using Digital Proprietary World
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Fri, 09 Oct 2009 11:51:52 +0100
  • Followup-to: comp.os.linux.advocacy
  • Newsgroups: comp.os.linux.advocacy
  • User-agent: KNode/4.3.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

EU, spying on you. The Full Monty

,----[ Quote ]
| Earlier today, âTo the tune of Â10 million (about 
| $C16,973,183), the European Union is backing 
| Project Indect, a five-year spy plan whose 
| principal function would be to secretly monitor 
| almost every aspect of the lives of EU citizens,â 
| said p2pnet.
`----

http://www.p2pnet.net/story/29573

ACLU Says Extracting DNA From Suspects Unconstitutional

,----[ Quote ]
| Californiaâs law requiring the authorities to 
| take a DNA sample from every person arrested on 
| felony accusations was challenged in federal 
| court Wednesday as an unconstitutional privacy 
| breach.
`----

http://www.wired.com/threatlevel/2009/10/dna-sampling-challenge

DNA database set to start in a year

,----[ Quote ]
| The UAE aims to start collecting genetic samples 
| from residents within 12 months as part of its 
| controversial DNA database project, the 
| programmeâs director said yesterday, making it 
| the first country in the world to do so.
`----

http://www.thenational.ae/apps/pbcs.dll/article?AID=/20091007/NATIONAL/710069853/1133

ID card officials back away from scandal-hit database

,----[ Quote ]
| Government plans to store ID card biometrics data 
| on a controversial system used by thousands of 
| public workers might be scrapped.
`----

http://www.computerweekly.com/Articles/2009/10/06/238017/id-card-officials-back-away-from-scandal-hit-database.htm


Recent:

Kiddie Monitoring Software Spying On IM Chats, Selling Info To Marketers

,----[ Quote ]
| But it appears that just selling the tools isn't enough for some
| companies.
`----

http://techdirt.com/articles/20090908/1916036134.shtml


Who watches the baby-sitter?

,----[ Quote ]
| And, you thought Big Brother was just a character in George Orwell's
| 1984. Welcome to 2009, when, according to an AP news report by Deborah
| Yow. "Software sold under the Sentry and FamilySafe brands can read
| private chats conducted through Yahoo, MSN, AOL and other services, and
| send back data on what kids are saying about such things as movies,
| music or video games. The information is then offered to businesses
| seeking ways to tailor their marketing messages to kids."
`----

http://www.itworld.com/endpoint-security/76999/who-watches-baby-sitter


Amazon makes amends for Kindle blunder -- to a point

,----[ Quote ]
| Yesterday, however, Amazon quietly made amends. According to a report
| published in the Wall Street Journal's Digits blog, Amazon is giving
| Kindle owners the option of having the books restored free of charge,
| getting a $30 gift certificate, or receiving a check for $30. (Kind of
| along the lines of what I suggested they do -- do you think they read
| Cringe, too?)
|
| First reaction: Great news. This is exactly what Amazon should have
| done in the first place.
`----

http://www.infoworld.com/d/adventures-in-it/amazon-makes-amends-kindle-blunder-point-578?source=IFWNLE_nlt_daily_2009-09-07


Surveillance fears for the UK

,----[ Quote ]
| Computer security veteran Phil Zimmerman warns about the seductive nature of
| technology.
|
| The UK is risking sliding unwittingly into a police state because of the
| growing use of surveillance technology, says security guru Phil Zimmerman.
`----

http://news.bbc.co.uk/1/hi/technology/8029349.stm


Surveillance fears for the UK

,----[ Quote ]
| Computer security veteran Phil Zimmerman warns about the seductive nature of
| technology.
|
| The UK is risking sliding unwittingly into a police state because of the
| growing use of surveillance technology, says security guru Phil Zimmerman.
`----

http://news.bbc.co.uk/1/hi/technology/8029349.stm

Agency denies internet spy plans

,----[ Quote ]
| The UK's electronic intelligence agency has taken the unusual step of issuing
| a statement to deny it will track all UK internet and online phone use.
`----

http://news.bbc.co.uk/1/hi/uk_politics/8032367.stm

Transparency means nothing without justice

,----[ Quote ]
| We cyber-liberties types are very big on government transparency â on the
| right to carry our cameras into every altercation with authority and to put
| it all online. We make the problems visible, hoping that this will solve
| them. Little brother watches back!
`----

http://www.guardian.co.uk/technology/2009/apr/29/cory-doctorow-police-transparency


Campaigners monitored by civil servants

,----[ Quote ]
| Government officials have been monitoring environmental campaign groups and
| then passing intelligence on to the police, according to documents seen by
| the Guardian.
|
| An internal risk report from the Department for Transport reveals that a unit
| referred to as the comms directorate Â"continuously monitor[ed]" peaceful
| protest groups opposed to the expansion of Heathrow airport and then briefed
| detectives about their findings.
`----

http://www.guardian.co.uk/uk/2009/may/01/liberty-climate-protesters-campaigners


Police want new remote hard drive search powers

,----[ Quote ]
| At present, the proposed legislative changes don't appear to be related to EU
| moves to step up hacking of PCs in homes and offices by police.
`----

http://www.theregister.co.uk/2009/04/29/remote_hard_drive_forensics/


FBI used spyware to catch cable-cutting extortionist

,----[ Quote ]
| CIPAV spyware helped nab unemployed engineer angry over outsourcing
`----

http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9131778&source=NLT_AM


Congress Ponders Cybersecurity Power Grab

,----[ Quote ]
| There was a lot of attention paid last week to a new "cybersecurity" bill
| that would drastically expand the government's power over the Internet. The
| two provisions that have probably attracted the most attention are the parts
| that would allow the president to "declare a cybersecurity emergency" and
| then seize control of "any compromised Federal government or United States
| critical infrastructure information system or network." Perhaps even more
| troubling, the EFF notes a section that states that the government "shall
| have access to all relevant data concerning (critical infrastructure)
| networks without regard to any provision of law, regulation, rule, or policy
| restricting such access."
`----

http://techdirt.com/articles/20090403/1346154383.shtml


Related:

Cryptome: NSA has access to Windows Mobile smartphones

,----[ Quote ]
| First time in history Cryptome.org has released information about the
| characteristics of NSAâs network surveillance.
`----

http://blogs.securiteam.com/index.php/archives/1028


Dual_EC_DRBG Added to Windows Vista

,----[ Quote ]
| Microsoft has added the random-number generator Dual_EC-DRBG to Windows
| Vista, as part of SP1. Yes, this is the same RNG that could have an NSA
| backdoor.
|
| It's not enabled by default, and my advice is to never enable it. Ever.
`----

http://www.schneier.com/blog/archives/2007/12/dual_ec_drbg_ad.html


Microsoft Cofee brews 'back door' fears

,----[ Quote ]
| The assurances came after reports claiming that Cofee could provide a 'back
| door' into Microsoft operating systems and applications.
`----

http://www.itnews.com.au/News/75780,microsoft-cofee-brews-back-door-fears.aspx


Bots rule in cyberspace

,----[ Quote ]
| USA TODAY REPORTS that on an average day, 40 per cent of the 800 million
| computers connected to the Internet are bots used to send out spam, viruses
| and to mine for sensitive personal data.
`----

http://www.theinquirer.net/gb/inquirer/news/2008/03/17/bots-rule-cyberspace
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkrPFcgACgkQU4xAY3RXLo5YUACfQCYnnms+jAA2ASDttvPteTGu
77oAoIlZ1c6dt9A1oAhvQH/Y+/LtutSh
=DRp/
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index