Wastholm.com

The government's approach to technological surveillance is leading us down a dark path, experts warn, as it prepares to give law enforcement agencies new hacking powers.

Currently before parliament's Intelligence and Security Committee, the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020 is the government's latest attempt to gain a watchful eye over cyber space.

Once the bill passes, it will dish out extra power to the Australian Federal Police (AFP) and the Australian Criminal Intelligence Commission (ACIC), giving the agencies access to new warrants that will let them modify and delete data, collect intelligence from online communities, and even take over the online accounts of supposed criminals.

The disease poses a grave and fast-moving threat to every nation. Governments have, quite reasonably, assumed emergency powers to counter it. But such powers can be abused. Governments have selectively banned protests on the grounds that they might spread the virus, silenced critics and scapegoated minorities. They have used emergency measures to harass dissidents. And they have taken advantage of a general atmosphere of alarm. With everyone’s attention on covid-19, autocrats and would-be autocrats in many countries can do all sorts of bad things, safe in the knowledge that the rest of the world will barely notice, let alone to object.

WhatsApp, which is used by 1.5bn people worldwide, discovered in early May that attackers were able to install surveillance software on to both iPhones and Android phones by ringing up targets using the app’s phone call function.

The malicious code, developed by the secretive Israeli company NSO Group, could be transmitted even if users did not answer their phones, and the calls often disappeared from call logs, said the spyware dealer, who was recently briefed on the WhatsApp hack.

...

NSO’s flagship product is Pegasus, a program that can turn on a phone’s microphone and camera, trawl through emails and messages and collect location data.

NSO advertises its products to Middle Eastern and Western intelligence agencies, and says Pegasus is intended for governments to fight terrorism and crime.

But mostly to spy on people said governments don't particularly like, of course.

Enligt Bahnhofs anonyma källor föreslår utredningen att datalagringen på flera sätt ska utökas. Dessutom ska internetoperatörerna tvingas bygga om sina system i syfte att underlätta övervakningen. En normalstor operatör kommer enligt inofficiella beräkningar att behöva lagra 300 Terabyte mer än idag, till en kostnad av hundratals miljoner kronor.

It’s a wretched yet predictable ritual after each new terrorist attack: Certain politicians and government officials waste no time exploiting the tragedy for their own ends. The remarks on Monday by John Brennan, the director of the Central Intelligence Agency, took that to a new and disgraceful low.

Speaking less than three days after coordinated terrorist attacks in Paris killed 129 and injured hundreds more, Mr. Brennan complained about “a lot of hand-wringing over the government’s role in the effort to try to uncover these terrorists.”

The leaked papers appear to show that drone strikes were often carried out based on insufficient and unreliable intelligence and when executed, often compromise further gathering of intelligence.

The documents reveal that in Afghanistan, drone strikes on 35 targets killed at least 219 other people.

US drone strikes in Yemen and Pakistan have killed as many as 1,147 unknown people in failed attempts to kill 41 named individuals, a report by human rights charity Reprieve has found.

The report looks at deaths resulting from US drone strikes in Yemen and Pakistan between November 2002 and November 2014. It identifies 41 men who appeared to have been killed multiple times – drawing into question the Obama administration’s repeated claims that the covert drone programme is ‘precise.’

While the US drone programme is shrouded in secrecy, security sources regularly brief the media on the names of those suspected militants targeted or killed in the strikes. Frequently, those individuals are reported to have been targeted or killed on multiple occasions.

When Edward Snowden exposed the scale and depth of the National Security Agency's surveillance programs, his findings led to another disheartening revelation: that our Internet has become too centralized. Webmail services like Yahoo and Google and social networks like Facebook and Twitter are convenient and efficient platforms, as well as easy to use, but they collect massive amounts of user data that can facilitate intelligence spying and other types of snooping. Meanwhile, securer methods of communication are often cumbersome and overly technical for the average user who would like to send an email without having to download and set up various software. Yet after Snowden’s leaks, an increasing demand for securer alternatives has led to the development of anti-surveillance products with an eye towards being user friendly.

That is certainly true for Miguel Freitas, a research engineer based in Rio de Janeiro, Brazil, who decided to create a decentralized alternative to Twitter to counter NSA spying and protect against shutdowns of social media sites; but it would also be “something that my grandmother could use,” Freitas tells techPresident.

Freedom of Religion is used to persecute individuals once again, using governmental threat of force to back up such persecution. It is time to abolish it in name and concept, and instead let the Freedoms of Opinion and Speech carry on its original intention.

Since the very first Snowden leak a year ago, one of the more common refrains from defenders of the program is "but it's just metadata, not actual content, so what's the big deal?" Beyond the fact that other programs do collect content, we've pointed out time and time again that the "just metadata, don't worry" argument only makes sense if you don't know what metadata reveals. Anyone with any knowledge of the subject knows that metadata reveals a ton of private info. Furthermore, we've even pointed out that the NSA regularly uses "just metadata" to pick targets for drone assassinations. As one person called it: "death by unreliable metadata."

|< First   < Previous   21–30 (107)   Next >   Last >|