Tech firms and privacy groups are fighting back against an amendment proposed by the Obama administration that would give the FBI a top-level view of your “electronic communicational records” (ECTRs) without the need for a warrant.
ECTRs include everything from the web sites you’ve visited to the duration of your browsing on a particular page. It’s all up for grabs as part of a proposal being considered this week by the Senate Judiciary Committee, and legislation is already moving forward to allow national security agents to apply for an administrative subpoena called a “national security letter,” or NSL, that would let agents bypass a judge’s approval to view such information in terrorism and spy cases.
According to FBI Director James Comey, the amendment is a correction to a typo in the Electronic Communications Privacy Act that has hindered the bureau’s ability to work in “a very, very big and practical way.” As such, amending the existing surveillance laws has become the FBI’s “top priority” in 2016.
SAN FRANCISCO – In the latest clash over privacy rights in the digital age, Microsoft (MSFT) is suing the U.S. government over a federal law that allows authorities to examine customer emails or online files without the individual’s knowledge.
The lawsuit comes as the technology industry butts heads with U.S. officials over the privacy rights of customers.
Microsoft says the U.S. is abusing a decades-old law that allows a court to order the company to turn over email or other customer files that are stored on its servers, while prohibiting Microsoft from notifying the customer. The company says that violates constitutional rights of free speech and protection against unreasonable searches.
“Microsoft brings this case because its customers have a right to know when the government obtains a warrant to read their emails, and because Microsoft has a right to tell them,” states the company’s lawsuit, which was filed Thursday in federal court in Seattle. “Yet the Electronic Communications Privacy Act… allows courts to order Microsoft to keep its customers in the dark when the government seeks their email content or other private information, based solely on a ‘reason to believe’ that disclosure might hinder an investigation.”
Edward Snowden Says NSA Can Hack Smartphones with 1 Text and can listen in on room activities, even with phone off!
Edward Snowden, the famous whistle blower of WikiLeaks, has made another revelation in an interview with the Panorama program that is featured on the BBC. Snowden, who has been living in Russia since 2013 on a temporary asylum, has claimed that the Government Communications Headquarters agency of Britain has been using a method to gain complete access of the phones of unassuming phone users.
The tool uses a simple text message which can be sent on the phones of the users. Although the message will not be displayed on their phones, it allows the agency to control those phones. The agency is then able to switch on the phone’s microphone and camera, allowing it to spy on the people using the phones. It also allows GCHQ access to the data on the phone.
The application used by the agency is called “Smurf Suite”, which is named after the famous cartoon characters. The applications were named “Nosey Smurf”, “Tracker Smurf” and “Dreamy Smurf”. Through WikiLeaks, Snowden has revealed several past secrets that involve government agencies spying on people. This revelation about the British agency, is just one of many such measures used by the government to control the lives of its own citizens.
The text messages sent by the British agency is an unauthorised method to infringe upon the lives of British citizens. The exploit allows GCHQ to remotely switch the phones on and off without the permission of the owners. Such instances are concerning. Governments across the world have cited that such measures are for the safety of the people. However, the reality is such exploits do not enhance the security of the citizens. To put it simply, governments primarily indulge in such activities in order to gain more power.
The next time you’re thinking of throwing away a used boarding pass with a barcode on it, consider tossing the boarding pass into a document shredder instead. Two-dimensional barcodes and QR codes can hold a great deal of information, and the codes printed on airline boarding passes may allow someone to discover more about you, your future travel plans, and your frequent flyer account.
Earlier this year, I heard from a longtime KrebsOnSecurity reader named Cory who said he began to get curious about the data stored inside a boarding pass barcode after a friend put a picture of his boarding pass up on Facebook. Cory took a screen shot of the boarding pass, enlarged it, and quickly found a site online that could read the data.
“I found a website that could decode the data and instantly had lots of info about his trip,” Cory said, showing this author step-by-step exactly how he was able to find this information. ‘
“Besides his name, frequent flyer number and other [personally identifiable information], I was able to get his record locator (a.k.a. “record key” for the Lufthansa flight he was taking that day,” Cory said. “I then proceeded to Lufthansa’s website and using his last name (which was encoded in the barcode) and the record locator was able to get access to his entire account. Not only could I see this one flight, but I could see ANY future flights that were booked to his frequent flyer number from the Star Alliance.”
Microsoft just can’t seem to shake the image that Windows 10 is spying on you. And Microsoft’s lack of transparency about Windows 10’s privacy isn’t doing much to dispel the notion.
In the nearly three weeks following Windows 10’s release, there have been numerous reports about how much personal information Microsoft collects, and the hurdles to stopping it.
1) Shares your personal information with Microsoft by default
Congress rushing to vote on the CISA Surveillance Bill, letting Facebook & Google provide User Data to NSA
We’re all familiar with the all seeing eye of our governments watching over our shoulder. Now the news gets better – not. If you haven’t heard about CISA already, you’re about to discover a frightening new world constructing our private online lives into a new systematic order that consists of heavier monitoring.
The FBI just came out and admitted that they haven’t solved a single terrorism case using the spying powers granted by the Patriot Act.
The Justice Department’s inspector general acknowledged this in athat was released last Thursday. Inspector General E. Horowitz explained that in spanning from 2004 to 2009, the FBI increased their spying under Section 215 of the Patriot Act by three times.
This included forcing businesses to turn overand , and spying on with no clear ties to any official terrorist organizations or terrorism investigations.
But in spite of all that added spying, they couldn’t point to one single case that was solved, or one single terrorist act that was thwarted through the use of these Patriot Act provisions. Anything that they solved or prevented was done using traditionaland tactics for solving crime, without relying on Patriot Act dirty tricks.
“The agents we interviewed did not identify any major case developments that resulted from use of the records obtained in response to Section 215 orders,” the inspector general said.
He nevertheless said that he wants Section 215 to remain, and that he views thethey gather through it as “valuable” even though it wasn’t actually solving any crimes. He added that the powers under Section 215 should be expanded, to provide even more information like that which they have been gathering – which admittedly has not solved any crimes, or prevented any terrorist attacks.
“While the expanded scope of these requests can beuses of Section 215 authority, we believe these expanded uses require continued significant oversight,” Horowitz concluded.
Russian researchers expose breakthrough U.S. spying program, embedding Spyware in factory Hard Drives
(Reuters) – The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives.
That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.
Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan,Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said. (reut.rs/1L5knm0)
Anonymous releases Chicago police radio transmissions revealing warrantless wiretapping by NSA Operation AURORAGOLD