Showing posts with label surveillance. Show all posts
Showing posts with label surveillance. Show all posts

26 Feb 2015

Citizenfour

CITIZENFOUR is a Oscar winning real life thriller, unfolding by the minute, giving audiences unprecedented access to filmmaker Laura Poitras and journalist Glenn Greenwald’s encounters with Edward Snowden in Hong Kong, as he hands over classified documents providing evidence of mass indiscriminate and illegal invasions of privacy by the National Security Agency (NSA).

Poitras had already been working on a film about surveillance for two years when Snowden contacted her, using the name CITIZENFOUR,in January 2013. He reached out to her because he knew she had long been a target of government surveillance, stopped at airports numerous times, and had refused to be intimidated. When Snowden revealed he was a high-level analyst driven to expose the massive surveillance of Americans by the NSA, Poitras persuaded him to let her film.

CITIZENFOUR places you in the room with Poitras, Greenwald, and Snowden as they attempt to manage the media storm raging outside, forced to make quick decisions that will impact their lives and all of those around them

AnonSweden

8 Jun 2014

There is something squalid and rancid about being spied on

Writer and comedian Stephen Fry discusses the dangers of mass surveillance, calling for a campaign to urge governments around the world to curtail their monitoring of private data.

18 Jan 2014

Glenn Greenwald: Obama NSA Speech A 'PR Gesture'

Glenn Greenwald dismissed President Obama's Friday speech outlining his reforms of the NSA as a "PR gesture," and mocked Obama's comments about the effect caused by Edward Snowden's leaks.

Obama announced a series of proposed changes to the way the NSA collects some data, though he emphasized that the data collection would continue. Speaking to Al Jazeera America before the speech, Greenwald did not appear to place much faith in Obama's intentions:

“It’s really just basically a PR gesture, a way to calm the public and to make them think there’s reform when in reality there really won’t be. And I think that if the public, at this point, has heard enough about what the NSA does and how invasive it is, that they’re going to need more than just a pretty speech from President Obama to feel as though their concerns have been addressed.”

greenwald-obama

Greenwald was just as critical during the speech itself. He noted that Obama was framing the debate around where citizens' data would be stored, rather than whether it needed to be collected in the first place:

"Store all citizens' communications records" is a radical policy. But it's been transformed to normal- only allowed debate is: who holds it?

Glenn Greenwald: Obama NSA Speech A 'PR Gesture'

3 Jan 2014

The Shift towards an Authoritarian Future: Why the West Slowly Abandons its Civil Liberties

Politicians on both sides of the Atlantic who construct an image of toughness – tough on crime, on terrorism, on humanistic-inspired idealism etc. – are tapping into a sensitive spot that blocks critical thought among the public. Obama’s brute and harsh reaction on Edward Snowden’s revelations is just another example. Somehow it seems like  “We, the people…”  lost track of ourselves. Four main reasons why we abandon our once hard fought civil rights.

Many countries in the West, like Britain, France, Spain the US and the Netherlands have experienced in recent years an exponential increase in technological surveillance and a resolute decline in parliamentary and judicial control over state police and secret service.

Person-of-Interest-Surveillance

Issues like the ban on torture, the possibility of detention without charge, privacy and freedom of speech were in the public debate reframed in favour of state control. And everybody accepted it. To be fair, there was some opposition – but it lacked intensity. Why is this happening?

To give an example, under former British Prime Minister Tony Blair 45 criminal laws were approved creating 3000 new criminal offences. British writer John Kampfer argues that in the past ten years more criminal offences were made in his country than in a hundred years before. All this was legitimized by the idea that a ‘terroristic’ virus attacked Western civilization. Of course, there is some truth in it – but these risks were grossly exaggerated. Still, we fearfully went along with the proposed measures.

This cultural shift towards perhaps a more authoritarian future for the West is no coincidence of nature. It is manmade. If the opportunity is there, top down induced shifts happen only if politicians, corporations, media pundits and other cultural icons are able to find the right symbols and techniques to get a new message across.

Full article on Global Research

25 Dec 2013

Edward Snowden's Christmas Message

Channel 4 UK/Praxis Films

11 Dec 2013

Google Wants Microphones In Your Ceiling & Microchips In Your Head

Google engineering director Scott Huffman says that within five years people will have microphones attached to their ceilings and microchips embedded in their brains in order to perform quicker internet searches. In an interview with the London Independent, Huffman said that Google was working towards a concept based around microphones hanging from the ceiling that would respond to verbal queries.

googleimplant

“Like a great personal assistant, it will interrupt you and say ‘ you’ve got to leave now’. It will bring you the information you want,” said Huffman, adding that “five years from now….Google will answer you the same way a person would answer.” When challenged on the likelihood of such a system being vulnerable to NSA wiretapping, Huffman glibly responded that people should just trust Google (a company that allowed the NSA to mine data from its cloud network “at will”) to safeguard their information.

“I could ask my Google ‘assistant’ where we should have lunch, that serves French food and isn’t too expensive? Google will go ‘Ok, we’ll go to that place’ and when I get in my car it should already be navigating to that restaurant. We’re really excited by the idea of multiple devices being able to talk to each other,” said Huffman. “Google believes it can ultimately fulfil people’s data needs by sending results directly to microchips implanted into its user’s brains,” states the report, a concept which Huffman welcomes.

Infowars

2 Dec 2013

The Surveillance State "It's cool to wear the Mark of the Beast"

Hey kids, wear electronic tattoos. Take ingestible "authentication" tokens. Isn't it cool?

Brasscheck TV

30 Nov 2013

The Goal Of The U.S. Government Is To Eliminate ALL Privacy Globally!

Extensive interview with Glenn Greenwald who leaked the Edward Snowden NSA documents.

14 Aug 2013

Google Says You Have No "Reasonable Expectation" of Privacy

Gmail users have no “reasonable expectation” that their emails are confidential,  Google has said in a court filing. Consumer Watchdog, the advocacy group that uncovered the filing, called the revelation a “stunning admission.” It comes as Google and its peers are under pressure to explain their role in the National Security Agency’s (NSA) mass surveillance of US citizens and foreign nationals.

gmail

“Google has finally admitted they don’t respect privacy,” said John Simpson, Consumer Watchdog’s privacy project director. “People should take them at their word; if you care about your email correspondents’ privacy, don’t use Gmail.” Google set out its case last month in an attempt to dismiss a class action lawsuit that accuses the tech giant of breaking wire tap laws when it scans emails in order to target ads to Gmail users.

More on Alternet

22 Jun 2013

GCHQ taps fibre-optic cables for secret access to world's communications

Britain's spy agency GCHQ has secretly gained access to the network of cables which carry the world's phone calls and internet traffic and has started to process vast streams of sensitive personal information which it is sharing with its American partner, the National Security Agency (NSA).

telegeography_uk_cables

The sheer scale of the agency's ambition is reflected in the titles of its two principal components: Mastering the Internet and Global Telecoms Exploitation, aimed at scooping up as much online and telephone traffic as possible. This is all being carried out without any form of public acknowledgement or debate.

One key innovation has been GCHQ's ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analysed. That operation, codenamed Tempora, has been running for some 18 months. GCHQ and the NSA are consequently able to access and process vast quantities of communications between entirely innocent people, as well as targeted suspects. This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites – all of which is deemed legal, even though the warrant system was supposed to limit interception to a specified range of targets.

Full article on The Guardian

21 Jun 2013

Project Chess: Skype’s secret program aimed at making calls readily available to intelligence agencies

In yet another instance of a report indicating that tech giants worked directly with intelligence agencies to enable government surveillance, it is now being reported that Skype began a secret program called Project Chess to enable intelligence agencies and law enforcement to easily get a hold of calls.

microsoft-skype

This comes after it was revealed that Skype was part of the massive National Security Agency (NSA) surveillance program known as PRISM.
The latest revelation about Skype’s secret program is quite interesting given the controversy surrounding the privacy and security of Skype. Indeed, the NSA leaks hinted that Microsoft may have lied about the security of Skype, though many suspicions were raised last year after they filed for a patent for “legal intercept” technology.

More on Activist Post and The Guardian

17 Jun 2013

British intelligence agencies intercepted foreign politicians' communications at G20 summits

Foreign politicians and officials who took part in two G20 summit meetings in London in 2009 had their computers monitored and their phone calls intercepted on the instructions of their British government hosts, according to documents seen by the Guardian. Some delegates were tricked into using internet cafes which had been set up by British intelligence agencies to read their email traffic.

G20 2009

The revelation comes as Britain prepares to host another summit on Monday – for the G8 nations, all of whom attended the 2009 meetings which were the object of the systematic spying. It is likely to lead to some tension among visiting delegates who will want the prime minister to explain whether they were targets in 2009 and whether the exercise is to be repeated this week.

The disclosure raises new questions about the boundaries of surveillance by GCHQ and its American sister organisation, the National Security Agency, whose access to phone records and internet data has been defended as necessary in the fight against terrorism and serious crime. The G20 spying appears to have been organised for the more mundane purpose of securing an advantage in meetings. Named targets include long-standing allies such as South Africa and Turkey.

More on The Guardian

7 Jun 2013

Obama’s Unparalleled Spy State

Now we know for sure: The Obama administration has presided over the most thorough expansion of the domestic surveillance state of any U.S. presidency. Even as the nation was still absorbing the news,  broken by Glenn Greenwald at the Guardian on Wednesday night, that the National Security Agency has been routinely collecting phone call records for millions of Americans, the Washington Post and the Guardian published articles revealing even broader  government snooping powers: Since 2007, the NSA and the FBI have had the power to watch nearly every aspect of our online life as well.

OBAMA-NSA-facebook

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio, video, photographs, e-mails, documents and connection logs that enable analysts to track a person’s movements and contacts over time. The nine companies are Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple. (PalTalk, according to the Post, “hosted significant traffic during the Arab Spring and in the ongoing Syrian civil war.”)

The program is code-named PRISM, and while it was created during the administration of George W. Bush, the Post reports that it has experienced “exponential growth” under Obama.

More on AlternetThe GuardianThe Washington PostFox NewsWikipedia

1 Apr 2013

The anti-drone hoodie that helps you beat Big Brother's spy in the sky

I am wearing a silver hoodie that stops just below the nipples. Or, if you prefer, a baggy crop-top with a hood. The piece – this is fashion, so it has to be a "piece" – is one of a kind, a prototype. It has wide square shoulders and an overzealous zip that does up right to the tip of my nose.

Anti-drone-hoodie

It does not, it's fair to say, make its wearer look especially cool. But that's not really what this hoodie is about. It has been designed to hide me from the thermal imaging systems of unmanned aerial surveillance vehicles – drones. And, as far as I can tell, it's working well.

"It's what I call anti-drone," explains designer Adam Harvey. "That's the sentiment. The material in the anti-drone clothing is made of silver, which is reflective to heat and makes the wearer invisible to thermal imaging."

The "anti-drone hoodie" was the central attraction of Harvey's Stealth Wear exhibition, which opened in central London in January, billed as a showcase for "counter-surveillance fashions". It is a field Harvey has been pioneering for three years now, making headlines in the tech community along the way.

The Guardian (what day is it?)

24 Feb 2013

US Air Force Flapping Wing Micro Air Vehicle

The U.S. Air Force is developing tiny unmanned drones that will fly in swarms, hover like bees, crawl like spiders and even sneak up on unsuspecting targets and execute them with lethal precision.

The Air Vehicles Directorate, a research arm of the Air Force, has released a computer-animated video outlining the the future capabilities of Micro Air Vehicles (MAVs). The project promises to revolutionize war by down-sizing the combatants.

Read more on Daily Mail

2 Jan 2013

From grainy CCTV to a positive ID: Recognising the benefits of surveillance

Professor Mark Nixon has “had a few fights” with civil liberties groups in his time. As a world-leading expert in developing biometric techniques to identify people using CCTV – every anti-surveillance campaigner’s Big Bother bête noir – he knows all too well what they think of his work. “They say we’re ruining their privacy,” he says. “I don’t think their personal liberty is in danger.” The techniques he has pioneered “have been used to put murderers away – and I agree with that”.

UK CCTV

Through the work of Prof Nixon and Dr John Carter at Southampton University, it is becoming increasingly easy for authorities to monitor us all. Research at the School of Electronics and Computer Science – funded by the Pentagon and the Ministry of Defence among others – means technology can spot and identify criminals in surveillance footage with increasing accuracy.

Now Prof Nixon’s department has received extra funding from GCHQ to form part of the national Cyber Security Centre of Excellence, with Southampton specialising in biometrics: ID-ing people using personal traits or physical characteristics. It’s a controversial area of science which Prof Nixon can claim to have helped father. One of the key aspects is gait analysis: allowing people to be identified by their body shape and the way they walk.

See The Independent for more

28 Dec 2012

China tightens internet controls and targets bloggers

China unveiled tighter internet controls on Friday, legalising the deletion of posts or pages which are deemed to contain “illegal” information and requiring service providers to hand over such information to the authorities for punishment.

The rules signal that the new leadership headed by Communist Party chief Xi Jinping will continue muzzling the often scathing, raucous online chatter in a country where the internet offers a rare opportunity for debate.

chinas internet controlers

The new regulations, announced by the official Xinhua news agency, also require internet users to register with their real names when signing up with network providers, though, in reality, this already happens.

Chinese authorities and internet companies such as Sina Corp have long since closely monitored and censored what people say online, but the government has now put measures such as deleting posts into law.

“Service providers are required to instantly stop the transmission of illegal information once it is spotted and take relevant measures, including removing the information and saving records, before reporting to supervisory authorities,” the rules state.

South China Morning Post

Big Brother's Creepiest Toys

21 Nov 2012

Why Privacy Matters

Privacy International asked lawyers, activists, researchers and hackers at Defcon 2012 about some of the debates that thrive at the intersection between law, technology and privacy. We also wanted to know why privacy matters to them, and what they thought the future of privacy looked like. This video is a result of those conversations.