Refusing to unlock your phone? Jail. UK judge sentences activist under TERRORISM law

Refusing to unlock your phone? Jail. UK judge sentences activist under TERRORISM law

The leader of the anti-immigrant group Britain First was fined and given a suspended sentence for refusing to unlock his phone and computer to police after returning from a trip to Russia last year, under UK anti-terrorism laws.

Israel to use ‘anti-terrorism’ tech to monitor infected citizens, as Netanyahu declares ‘war’ on coronavirus

Israel to use ‘anti-terrorism’ tech to monitor infected citizens, as Netanyahu declares ‘war’ on coronavirus

While touting measures to protect Israelis from the coronavirus, Netanyahu did not touch on what the Jewish state is planning to do to stop the spread of the disease in the Palestinian territories it occupies and effectively controls.“Not a single word about Israel’s actions to protect millions of Palestinians living under Israeli military occupation,” ACLU Human Rights Program Director Jamil Dakwar tweeted.

Britain First leader Paul Golding charged under the Terrorism Act

Britain First leader Paul Golding charged under the Terrorism Act

The leader of far-right political group Britain First has been charged with an offence under the Terrorism Act after refusing to give police access to his phone.Golding was later charged with refusing to comply with a duty under Schedule 7 of the act.

US military's 'Jetson' laser can ID your unique heartbeat hundreds of feet away

US military's 'Jetson' laser can ID your unique heartbeat hundreds of feet away

And unlike some types of identification techniques that rely on biometrics (unique anatomical or behavioral traits), the subjects of Jetson's heartbeat-detecting infrared laser can be far away from the scanner.

Modi's Thought Control Firewall in Kashmir May Be the Internet's Future in India

Modi's Thought Control Firewall in Kashmir May Be the Internet's Future in India

On January 18, the government issued a new order relaxing the ban a teeny-weeny bit by allowing people in two districts of the Valley to access a limited number of “whitelisted” sites on post-paid mobile connections at 2G speed.

China Is Forcing Tourists to Install Text-Stealing Malware at its Border

China Is Forcing Tourists to Install Text-Stealing Malware at its Border

Foreigners crossing certain Chinese borders into the Xinjiang region, where authorities are conducting a massive campaign of surveillance and oppression against the local Muslim population, are being forced to install a piece of malware on their phones that gives all of their text messages as well as other pieces of data to the authorities, a collaboration by Motherboard, Süddeutsche Zeitung, the Guardian , the New York Times , and the German public broadcaster NDR has found.

Police should have cyber 'key' to unlock encrypted messages, senior officer says

Police should have cyber 'key' to unlock encrypted messages, senior officer says

Chief Constable Simon Bailey told the Independent Inquiry into Child Sexual Abuse (IISCA) yesterday he wanted tech giants to build a back door into apps, which he said were making it “so much harder” to catch paedophiles.

Detroit Police Used Cellphone Location Tracking Dozens Of Times In 2018

Detroit Police Used Cellphone Location Tracking Dozens Of Times In 2018

In October 2017, the Detroit Police Department (DPD) obtained a cell-site simulator, which is a type of surveillance technology that locates and tracks phones by mimicking cell phone towers.

Dow Jones’ watchlist of 2.4 million high-risk individuals has leaked

Dow Jones’ watchlist of 2.4 million high-risk individuals has leaked

The database record on Haqqani, who was categorized under “sanctions list” and terror,” included (and condensed for clarity): DOW JONES NOTES: Killed in Pakistan's North Waziristan tribal area on 21-Aug-2012.

EXCLUSIVE: EU in talks with Egypt and other MENA states over police data-sharing

EXCLUSIVE: EU in talks with Egypt and other MENA states over police data-sharing

European Union officials have begun talks with counterparts in several Middle Eastern countries, including Egypt and Turkey, about proposed data-sharing deals that would allow Europol to exchange personal information about suspects with local law enforcement authorities.

One click and you're out: UK makes it an offence to view terrorist propaganda even once

One click and you're out: UK makes it an offence to view terrorist propaganda even once

But a controversial inclusion was to update the offence of obtaining information "likely to be useful to a person committing or preparing an act of terrorism" so that it now covers viewing or streaming content online.

Facebook Says It Needs to Collect All Your Data to Protect Against Terrorism and Child Abuse

Facebook Says It Needs to Collect All Your Data to Protect Against Terrorism and Child Abuse

Photo: Getty Images Facebook was slapped with a ruling in Germany today that limits how the social media giant can collect data across its multiple platforms, like WhatsApp and Instagram.

Brazil in 2019: Free Speech and Privacy in the Crosshairs. What Are the Threats?

Brazil in 2019: Free Speech and Privacy in the Crosshairs. What Are the Threats?

The current text of a Bolsonaro’s bill , which he wrote as a congressman, replaces the previous requirement of court orders with a pre-authorization for specific law enforcement agents, connected to the Brazilian Army and police, to obtain communications metadata (defined by Law n.

Documents Reveal Reddit Co-Founder Aaron Swartz Was Caught Up in Warrantless FBI Data Collection That Would Later Be Used Against Him

Documents Reveal Reddit Co-Founder Aaron Swartz Was Caught Up in Warrantless FBI Data Collection That Would Later Be Used Against Him

Shocking new documents obtained by Property of the People reveal that Reddit co-founder and famed digital activist Aaron Swartz was caught up in warrantless FBI email data collection which would later be used against him in an unrelated case.

FBI Documents Reveal New Details on Aaron Swartz Inquiry

FBI Documents Reveal New Details on Aaron Swartz Inquiry

But after reviewing the document and other related files, several legal experts told Gizmodo the most likely explanation was that the FBI had used a National Security Letter (NSL), a ubiquitous tool for obtaining email header data at the time.

Split Key Cryptography is Back… Again – Why Government Back Doors Don’t Work

Split Key Cryptography is Back… Again – Why Government Back Doors Don’t Work

3. Security Impact – The creation of EXPORT grade ciphers led to software that would support both regular cryptography and weakened cryptography in order to support legacy systems, which persisted long after governments decided that regulating crypto was a bad idea and dialed back their rules.

If you value privacy, resist any form of national ID cards

If you value privacy, resist any form of national ID cards

Nonetheless, we must remain vigilant for calls for increased data gathering and national ID systems that put our privacy at risk, especially those calls that are couched in the name of immigration enforcement and anti-terrorism efforts.

A threat to the ecosystem and our users’ rights

A threat to the ecosystem and our users’ rights

Rather than creating a safer internet for European citizens and combating the serious threat of terrorism in all its guises, this proposal would undermine due process online; compel the use of ineffective content filters; strengthen the position of a few dominant platforms while hampering European competitors; and, ultimately, violate the EU’s commitment to protecting fundamental rights.

Unregulated intelligence sharing poses substantive risks to human rights and to the democratic rule of law

Unregulated intelligence sharing poses substantive risks to human rights and to the democratic rule of law

Privacy International also recognises the importance and benefit of intelligence sharing, for example in the context of fighting terrorism, organised crime or to identify other genuine threats to national security.

Tech sector says Peter Dutton's encrypted message 'back door' will jeopardise digital security

Tech sector says Peter Dutton's encrypted message 'back door' will jeopardise digital security

That is why the Home Affairs Minister, Peter Dutton, has been so keen to pass laws forcing messaging companies to put "back doors" into their technology, allowing authorities to access these otherwise secret communications.

Privacy vs. security: Why the widespread use of encryption is essential to national security

Privacy vs. security: Why the widespread use of encryption is essential to national security

Most recently, the Australian government has waged a campaign to promote encryption backdoors, which would weaken the right to privacy and make us all less safe. Proponents of these kinds of laws say encrypted services, like WhatsApp or ProtonMail, allow criminals to plan and carry out attacks beyond the reach of police.

IBM Used NYPD Surveillance Footage to Develop Technology That Lets Police Search by Skin Color

IBM Used NYPD Surveillance Footage to Develop Technology That Lets Police Search by Skin Color

Kjeldsen also added that the NYPD’s decision to allow IBM access to their cameras was crucial for the development of the skin tone search features, noting that during that period, New York City served as the company’s “primary testing area,” providing the company with considerable environmental diversity for software refinement.

US and intelligence allies take aim at tech companies over encryption

US and intelligence allies take aim at tech companies over encryption

While governments and intelligence agencies say they need access to encrypted communications in order to police crimes like child exploitation and terrorism, tech companies and digital rights advocates say opening so-called "back-doors" into encrypted communications has the potential to decrease security and privacy for everyone.

Tomgram: Judith Coburn, Can We Be Forgotten Anymore?

Tomgram: Judith Coburn, Can We Be Forgotten Anymore?

The Violent American Century: War and Terror Since World War II World War II marked the apogee of industrialized “total war.” Great powers savaged one another. Air war, including the terror bombing of civilians, emerged as a central strategy of the victorious Anglo-American powers.