‘Surveillance State’ is alive, well — and operating against us all

‘Surveillance State’ is alive, well — and operating against us all

They reveal the CIA not only intercepted emails of U.S. citizens but they were emails of the most sensitive kind — written to Congress and involving whistleblowers reporting alleged wrongdoing within the Intelligence Community.

Australian bill spells trouble for data privacy around the world

Australian bill spells trouble for data privacy around the world

An unlikely alliance of tech companies, start-ups and digital consumer rights groups has locked horns with the Australian government over its proposed anti-data encryption law, currently under review by the Parliamentary Joint Committee on Intelligence and Security (PJCIS).

GCHQ uses Instagram to 'open up world of espionage' to public

GCHQ uses Instagram to 'open up world of espionage' to public

After years of secretly hoovering up metadata about millions of citizens, Britain’s spy agency has made its public foray into one of the growing sources for such information by opening its own Instagram account.

Report: Microsoft shares banking data of Indian customers with US Intelligence agencies

Report: Microsoft shares banking data of Indian customers with US Intelligence agencies

The report stated that the consumer data with banks who moved to Microsoft Office 365 was shared by the company with the US Intelligence Agencies.

Pentagon Wants to Predict Anti-Trump Protests Using Social Media Surveillance

Pentagon Wants to Predict Anti-Trump Protests Using Social Media Surveillance

While the ACLU has been able to confirm that under Trump, government departments like the Departments of Defense, Justice, and Homeland Security are accelerating domestic social media surveillance in relation to anticipated anti-Trump protest incidents, these FOIA requests have not revealed the technologies being deployed to do so.

To regulate AI we need new laws, not just a code of ethics | Paul Chadwick

To regulate AI we need new laws, not just a code of ethics | Paul Chadwick

“We need a new culture of technology and business development for the age of AI which we call ‘rule of law, democracy and human rights by design’,” Nemitz writes.

Google Lens in Images Recognizes Objects You Might Want to Buy

Google Lens in Images Recognizes Objects You Might Want to Buy

Earlier, Google announced a redesign of Google Images, which aimed to use a new ranking algorithm to help users more easily find what they were looking for. Lens in Images is also aimed at helping users more easily find things they’re interested in buying.

Tim Cook: Personal data collection is being 'weaponized against us with military efficiency'

Tim Cook: Personal data collection is being 'weaponized against us with military efficiency'

And those of us who believe in technology's potential for good must not shrink from this moment," Cook said. They may say to you, "Our companies will never achieve technology's true potential if they are constrained with privacy regulation." But this notion isn't just wrong, it is destructive.

Online Data Security Catapults Organizations into Uncharted Territory

Online Data Security Catapults Organizations into Uncharted Territory

In the rush to prepare for the future, business entrepreneurs may have forgotten that data is the fuel of the artificial intelligence technology. Would this offer new personal data security levels and would people’s behavior online become the only password needed?

Secret Government Report Shows Gaping Holes in Privacy Protections From U.S. Surveillance

Secret Government Report Shows Gaping Holes in Privacy Protections From U.S. Surveillance

The report raises questions about whether the FBI is fully complying with PPD-28 as well as whether it’s seeking to carve out certain surveillance activities from the directive’s modest requirements:

Google CEO quietly met with military leaders at the Pentagon, seeking to smooth tensions over drone AI

Google chief executive Sundar Pichai quietly paid the Pentagon a visit during his trip to Washington last week, seeking to smooth over tensions roughly four months after employee outrage prompted the tech giant to sever a defense contract to analyze drone video, according to two people familiar with the meeting.

Cop charged with selling phone tracking service on dark web

Cop charged with selling phone tracking service on dark web

A French police officer has been charged with using police intelligence data to power a mobile phone tracking service sold via the dark web. Operating under the username Haurus, the officer allegedly sold the service via a dark web site called the Black Hand.

The Five Eyes Statement on Encryption: Things Are Seldom What They Seem

Earlier this September, law enforcement officials from the Five Eyes intelligence alliance—made up of Australia, Canada, New Zealand, the United Kingdom, and the United States—met in Australia and issued a Statement of Principles on Access to Evidence and Encryption .

YouTube hosts 'how to hack Facebook' videos

On YouTube, the tutorials - some of which have been deleted by Google - explain how to hack into Facebook profiles by stealing "access tokens", digital keys which allow users to log in without entering their passwords every time.

Press release: UK intelligence agency admits unlawfully spying on Privacy International

Press release: UK intelligence agency admits unlawfully spying on Privacy International

https://privacyinternational.org/sites/default/files/2018-03/A1.%20Claimant%27s%20re-amended%20statement%20of%20grounds.pdf The challenge to the acquisition, use, retention, disclosure, storage and deletion of ‘Bulk Personal Datasets’ (BPDs) and Bulk Communications Data (BCDs) by the UK Intelligence Agencies was commenced by Privacy International on 8 June 2015.

UK Surveillance Regime Violated Human Rights

UK Surveillance Regime Violated Human Rights

On September 13, after a five-year legal battle, the European Court of Human Rights said that the UK government’s surveillance regime—which includes the country’s mass surveillance programs, methods, laws, and judges—violated the human rights to privacy and to freedom of expression.

For Hackers, Anonymity Was Once Critical. That’s Changing.

For Hackers, Anonymity Was Once Critical. That’s Changing.

I met Grifter, whose real name is Neil Wyler; Dead Addict, who, citing privacy concerns, spoke with me on the condition that I not share his real name; Nico Sell, which, while undeniably the name she uses publicly, may or may not be her legal name; and dozens of other self-described hackers in August at Defcon, an annual hacking convention — one of the world’s largest — held in Las Vegas.

“Terrifying”: New Documents Reveal Secret Gov’t Rules for Spying on US Journalists

“Terrifying”: New Documents Reveal Secret Gov’t Rules for Spying on US Journalists

(CD) — Journalists and free press advocates are responding with alarm to newly released documents revealing the U.S. government’s secret rules for using Foreign Intelligence Surveillance Act (FISA) court orders to spy on reporters, calling the revelations “important” and “terrifying.”

China may be copying Facebook to build an intelligence weapon

China may be copying Facebook to build an intelligence weapon

Some of the more notable reported data breaches in 2015 include the Office of Personnel and Management (OPM), Anthem Inc., Premera Blue Cross, United Airlines, Marriott, Hyatt, Hilton, Starwood Hotels and some lesser known names.

Could Monitoring Students on Social Media Stop the Next School Shooting?

Could Monitoring Students on Social Media Stop the Next School Shooting?

In 2015, as the first anniversary of a shooting at Florida State approached, a post expressing sympathy for the gunman and an intent to visit the campus was intercepted by Social Sentinel, the campus police chief said.

“Bulk interception” by GCHQ (and NSA) violated human rights charter, European court rules

“Bulk interception” by GCHQ (and NSA) violated human rights charter, European court rules

It also found that both the method of bulk interception of communications and the process for obtaining communications metadata from service providers violated Article 10 (freedom of expression) because of "insufficient safeguards in respect of confidential journalistic material." And of particular concern to the court was the lack of any oversight into what Internet traffic was collected or what filters were used to determine which traffic was of interest.

3 Ways Intelligence Agencies Are Using AI

3 Ways Intelligence Agencies Are Using AI

Jones also offered an example from the National Reconnaissance Office, which is using AI to find the kernels of useful information in the troves of data the agency collects daily.

Inside the NSA's War on Internet Security

Inside the NSA's War on Internet Security

The presentation states that the NSA encounters "major" problems in its attempts to decrypt messages sent through heavily encrypted email service providers like Zoho or in monitoring users of the Tor network*, which was developed for surfing the web anonymously.

GCHQ data collection violated human rights, Strasbourg court rules

GCHQ data collection violated human rights, Strasbourg court rules

GCHQ’s methods in carrying out bulk interception of online communications violated privacy and failed to provide sufficient surveillance safeguards, the European court of human rights has ruled in a test case judgment.

Reflections on America’s post-9/11 domestic spying program

Reflections on America’s post-9/11 domestic spying program

Foremost among these generals were Keith Alexander, who became National Security Agency (NSA) chief and James Clapper, who had climbed the ranks of the secret military spying community to become director of national intelligence.

New Surveillance Court Orders Show That Even Judges Have Difficulty Understanding and Limiting Government Spying

New Surveillance Court Orders Show That Even Judges Have Difficulty Understanding and Limiting Government Spying

Although many of the newly released opinions appear to be decisions approving surveillance and searches of particular individuals, several raise questions about how well equipped FISC judges are to protect individuals’ statutory and constitutional rights when the government is less than candid with the court, underscoring EFF’s concerns with the FISC’s ability to safeguard individual privacy and free expression.

Poll Shows GDPR Compliance Lacking

Poll Shows GDPR Compliance Lacking

Only 34.5 % of the approximately 500 professionals responsible for compliance to the European Union (EU) General Data Protection Regulation (GDPR) report maintaining practices that are in keeping with the regulation, a recent Deloitte poll.

Wikileaks Confirms: CIA Are Conducting Operations on U.S. Soil

Wikileaks Confirms: CIA Are Conducting Operations on U.S. Soil

Per Wikileaks: In 2007, #Brennan praised Iran’s “positive engagement” & “important contributions” in Afghanistan pic.twitter.com/QBTsCYf0el — marina portnaya (@portnayanyc) Sour grapes: Brennan’s TAC complains over CIA snub During his time in the private sector, Brennan established an intelligence firm called The Analysis Corporation (TAC) that competed for government contracts, including one related to terrorist watch lists.

‘Five Eyes’ Nations Quietly Demand Government Access to Encrypted Data

‘Five Eyes’ Nations Quietly Demand Government Access to Encrypted Data

WASHINGTON — The Trump administration and its closest intelligence partners have quietly warned technology firms that they will demand “lawful access” to all encrypted emails, text messages and voice communications, threatening to compel compliance if the private companies refuse to voluntarily provide the information to the governments.

Opinion | Australia Wants to Take Government Surveillance to the Next Level

Opinion | Australia Wants to Take Government Surveillance to the Next Level

That’s why the main intelligence agencies of the Anglophone world are now hoping that Australia will lead the charge in developing ways to get decrypt information at will, and to tap into data that was previously kept secret.

More