A BBC journalist suspects that Police Scotland snooped on him without judicial approval to try and find his sources while he was investigating the force.
Eamon O’Connor has claimed that a “very dependable source” believes he was targeted by the force’s Counter Corruption Unit.
The revelation comes after the Sunday Herald quoted an inside source as saying that Police Scotland was one of two forces to have accessed phone records, under the Regulation of Investigatory Powers Act (RIPA), to find journalistic sources without judicial approval since the law was changed in March to prevent this.
Category: Spying
Global spy system ECHELON confirmed at last – by leaked Snowden files • The Register
US spied on Japanese PM Abe, Mitsubishi, and so much more • The Register
Israeli Special Forces Assassinated Senior Syrian Official
According to an internal National Security Agency document provided by Edward Snowden, the 2008 assassination of Muhammad Suleiman, a top General and aide to the Syrian president, was an Israeli military operation.
Source: Israeli Special Forces Assassinated Senior Syrian Official
Use snooped data in court? Nah, says UK.gov – folk might be cleared
British government snoops claimed it was too much hassle for them to use intercepted communications data in court proceedings because the accused could use the info to prove their innocence, it has emerged.
Police officers, spies and local council bin inspectors were all asked for their views of Blighty’s surveillance laws as part of the Independent Terrorism Legislation Reviewer’s, er, review of Blighty’s snooping laws, which was published on Thursday.
One of the questions asked was why, uniquely in the West, Britain’s state-sponsored snoopers do not use the evidence they gather against alleged criminals in legal proceedings. The response, at paragraph 9.16 was revealing:Part of the reason for this is the extensive disclosure requirement in criminal proceedings: were it sought to rely on the product of intercept conducted over a period of several months, the defence could legitimately request a transcript of the entire intercept product with a view to searching it for exculpatory material.
In plain English, this meant the authorities were worried that using communications data hoovered up under the Regulation of Investigatory Powers Act would mean alleged crims could demand access to the same data – and use it to show they were innocent of the crimes they were charged with.
Verizon FiOS reps know what TV channels you watch
If you call Verizon FiOS and try to cancel or downgrade your TV package, you might find that the FiOS rep knows almost as much about your TV viewing habits as you do.
Verizon’s Rep Guidance software tells Verizon representatives what channels you watch to help them make a more effective sales pitch. The system, which also shows them how much Internet data you use and which pieces of TV equipment you use most, was detailed by a Verizon executive in a public presentation hosted by Data Driven NYC. A Quartz reporter wrote about the presentation yesterday.
Verizon “is now closely tracking exactly what you watch, what devices you use, and how much data you consume,” Quartz wrote. “It knows whether your household spars over DVR conflicts and how many hours your kids spend binge-watching shows on HBO. What’s more, the company is listening in on phone calls to customer service in real time, with supervisors poised to jump at the moment they sense a fight brewing or hear trigger words from an unhappy customer, such as ‘switching to Time Warner Cable.'”
U.N. Report Asserts Encryption as a Human Right in the Digital Age
Encryption is not the refuge of scoundrels, as Obama administration law-enforcement officials loudly proclaim – it is an essential tool needed to protect the right of freedom of opinion and expression in the digital age, a new United Nations report concludes.
Encryption that makes a communication unintelligible to anyone but the intended recipient creates “a zone of privacy to protect opinion and belief,” says the report from David Kaye, who as Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression is essentially the U.N.’s free speech watchdog.
The significance of encryption extends well beyond political speech, Kaye writes. “The ability to search the web, develop ideas and communicate securely may be the only way in which many can explore basic aspects of identity, such as one’s gender, religion, ethnicity, national origin or sexuality.”
Encryption, like anonymity, is essential to artists, journalists, whistleblowers, and many other classes of people, the report says.
And far from banning or weakening encryption, governments should embrace and strengthen it, Kaye writes. He specifically urges the U.S. Congress to “prohibit the Government from requiring companies to weaken product security or insert back-door access measures.”
Obama administration officials have been advocating for encryption with some sort of built-in measure that law enforcement could circumvent, either an intentional weakness that creates a “back door,” or some sort of split “master key”.
Newly-installed Attorney General Loretta Lynch on Wednesday became the latest to engage in fear-mongering, saying she had “grave concerns” about encryption’s use by “people whose sworn duty is to harm Americans here and abroad.”
National Security Agency director Mike Rogers took a slightly more nuanced view on Wednesday, ZDNet reported. “You’re not going to hear me say that encryption is a bad thing. I don’t think it is a bad thing. Encryption is not bad. Encryption is a fundamental part of the future; I think it would be ridiculous to pretend otherwise,” Rogers told a cyberwarfare conference in Estonia.
But he expressed his desire for a legal framework that would give law enforcement access, asking: “Can we create some mechanism where within this legal framework there’s a means to access information that directly relates to the security of our respective nations, even as at the same time we are mindful we have got to protect the rights of our individual citizens?”
Kaye’s answer is: No. He concludes from his research that “compromised encryption cannot be kept secret from those with the skill to find and exploit the weak points, whether State or non-State, legitimate or criminal.” Thus: “In the contemporary technological environment, intentionally compromising encryption, even for arguably legitimate purposes, weakens everyone’s security online.”
And Kaye points out that law enforcement officials “have not demonstrated that criminal or terrorist use of encryption serves as an insuperable barrier to law enforcement objectives.”
Indeed, FBI Director James Comey gave a much-quoted speech last fall about how increasingly common cell-phone encryption could lead law enforcement to a “very dark place” where it “misses out” on crucial evidence to nail criminals. But the examples he then gave failed the laugh test.
The United Nation’s Office of the High Commissioner for Human Rights appoints expert “special rapporteurs” to be their eyes and ears when it comes to key human rights issues. Kaye, a law professor at the University of California, Irvine, began his three-year term as the rapporteur for freedom of opinion and expression in August 2014.
His report also warns that state prohibitions of anonymity online – such as required real-name registration for online activity, SIM card registration, or banning of anonymity tools such as Tor — interfere with the right to freedom of expression.
Encryption advocates hailed the report. “This landmark report shows how fundamental — and necessary — encryption is for exercising freedom of expression,” said Access Senior Policy Counsel Peter Micek. “It’s a sober rebuke of baseless fear-mongering from those who say encryption only helps criminals and terrorists.”
UK Government Goes Full Orwell: Snooper’s Charter, Encryption Backdoors, Free Speech Suppression
The old joke goes “George Orwell’s 1984 was a warning, not a ‘how to’ manual.” But that joke is increasingly less funny as the UK really seems to be doing everything it can to put in place Orwell’s fictitious vision — just a few decades later. Right after the election a few weeks ago, we noted the government’s plan to push forward with its “extremist disruption orders” (as had been promised). The basic idea is that if the government doesn’t like what you’re saying, it can define your statements as “extremist” and make them criminal. Prime Minister David Cameron did his best Orwell in flat out stating that the idea was to use these to go after people who were obeying the lawand then arguing that the UK needed to suppress free speech… in the name of protecting free speech. Really.
For too long, we have been a passively tolerant society, saying to our citizens: as long as you obey the law, we will leave you alone. It’s often meant we have stood neutral between different values. And that’s helped foster a narrative of extremism and grievance.
This government will conclusively turn the page on this failed approach. As the party of one nation, we will govern as one nation and bring our country together. That means actively promoting certain values.
Freedom of speech. Freedom of worship. Democracy. The rule of law. Equal rights regardless of race, gender or sexuality.
We must say to our citizens: this is what defines us as a society.
NSA Planned to Hijack Google App Store to Hack Smartphones
The National Security Agency and its closest allies planned to hijack data links to Google and Samsung app stores to infect smartphones with spyware, a top-secret document reveals.
The surveillance project was launched by a joint electronic eavesdropping unit called the Network Tradecraft Advancement Team, which includes spies from each of the countries in the “Five Eyes” alliance — the United States, Canada, the United Kingdom, New Zealand and Australia.
The top-secret document, obtained from NSA whistleblower Edward Snowden, was published Wednesday by CBC News in collaboration with The Intercept. The document outlines a series of tactics that the NSA and its counterparts in the Five Eyes were working on during workshops held in Australia and Canada between November 2011 and February 2012.
The main purpose of the workshops was to find new ways to exploit smartphone technology for surveillance. The agencies used the Internet spying system XKEYSCORE to identify smartphone traffic flowing across Internet cables and then to track down smartphone connections to app marketplace servers operated by Samsung and Google. (Google declined to comment for this story. Samsung said it would not be commenting “at this time.”)
As part of a pilot project codenamed IRRITANT HORN, the agencies were developing a method to hack and hijack phone users’ connections to app stores so that they would be able to send malicious “implants” to targeted devices. The implants could then be used to collect data from the phones without their users noticing.
Previous disclosures from the Snowden files have shown agencies in the Five Eyes alliance designed spyware for iPhones and Android smartphones, enabling them to infect targeted phones and grab emails, texts, web history, call records, videos, photos and other files stored on them. But methods used by the agencies to get the spyware onto phones in the first place have remained unclear.
The newly published document shows how the agencies wanted to “exploit” app store servers — using them to launch so-called “man-in-the-middle” attacks to infect phones with the implants. A man-in-the-middle attack is a technique in which hackers place themselves between computers as they are communicating with each other; it is a tactic sometimes used by criminal hackers to defraud people. In this instance, the method would have allowed the surveillance agencies to modify the content of data packets passing between targeted smartphones and the app servers while an app was being downloaded or updated, inserting spyware that would be covertly sent to the phones.
South Korea mandates spyware installation on teenagers’ smartphones
A law requiring the mass installation of spyware on teenagers’ smartphones suggests that the frightening level of population control exercised by its neighbours in “Best Korea” has rubbed off on the Republic’s administrators in Seoul.
The Republic of South Korea’s Communications Commission, a media regulator modeled after the United States’ FCC, now requires telecom companies and parents to ensure a monitoring app is installed whenever anyone under the age of 19 receives a new smartphone.
The measure will only slowly come into force over the next few years as it doesn’t require old smartphones be updated, although AP reports that most schools in South Korea sent out letters to parents encouraging them to install the software anyway.
One particular monitoring app called Smart Sheriff was funded and developed by the South Korean government with the declared intent of blocking children’s access to pornography.
The app, however, effectively allows parents “to monitor how long their kids use their smartphones, how many times they use apps and which websites they visit.
Some send a child’s location data to parents and issue an alert when a child searches keywords such as ‘suicide’, ‘pregnancy’ and ‘bully’ or receives messages with those words”, reports AP.