Police: they have a job that demands respect, even if those doing the job occassionally do not. We talk a great deal here at Techdirt about some of the frightening uses of military grade equipment by local law enforcement agencies, about what sometimes seems like a neverending list of civil rightsabuses, and so on. Still, as I said, I respect the job. It’s my respect for that job that leads me to think that the Portland cops who arrested a homeless woman for charging her phone on a public outlet need a greater understanding of what it is exactly that police in this stupid country are supposed to do.
Now, if you’re thinking to yourself, “There’s no way police in Portland arrested a person just for plugging her cell phone charger into a public outfit,” well, you’re correct; they arrested two people for that in one trip.
In this case, the theft was first reported by Portland Patrol Inc., and two Portland police officers followed up to issue the woman and her co-defendant, a homeless man who was also charging his cellphone at the planter box outlet, citations to appear in court for third-degree theft of services — a Class C misdemeanor. According to the Electrical Research Institute, it costs about 25 cents a year to charge the average mobile phone. If the phone in this scenario had gone from zero charge to full charge, the cost would have amounted to mere fractions of a penny.
“Jackie,” (who did not want her real name used), says she was shocked when four uniformed officers all agreed her actions warranted not only their response, but also charges and a court summons.
Category: Spying
FBI Pins ‘Terrorist’ Nametag On ‘Retarded Fool’ Without A ‘Pot To Piss In’
The FBI’s preference for easily-investigated terrorism is well-documented. We’re routinely assured that all sorts of domestic surveillance tech and agency opacity is necessary to protect us from a whole host of threats, but for the most part, the terrorists “apprehended” by the FBI seem to be people who’ve had the misfortune of being “befriended” by undercover agents and/or confidential informants.
When over 90% of the funding, idea generation, transportation and motivation comes from those saving us from terrorism, we have reason to be worried. While the FBI performs its predatory handcrafting of “extremists,” the real terrorists — who don’t need someone else to provide weapons, money and motivation — are still going about the business of terrorism.
This isn’t to say that all, or even a majority, of the FBI’s anti-terrorist resources are devoted to digging a hole and filling it back up. But a portion of it is, and that portion is squandered completely. And these numbers, gathered by The Intercept, put the squandered portion at nearly 50% of the total.
Cisco posts kit to empty houses to dodge NSA chop shops
Cisco will ship boxes to vacant addresses in a bid to foil the NSA, security chief John Stewart says.
The dead drop shipments help to foil a Snowden-revealed operation whereby the NSA would intercept networking kit and install backdoors before boxen reached customers.
The interception campaign was revealed last May.
Speaking at a Cisco Live press panel in Melbourne today, Stewart says the Borg will ship to fake identities for its most sensitive customers, in the hope that the NSA’s interceptions are targeted.
“We ship [boxes] to an address that’s has nothing to do with the customer, and then you have no idea who ultimately it is going to,” Stewart says.
“When customers are truly worried … it causes other issues to make [interception] more difficult in that [agencies] don’t quite know where that router is going so its very hard to target – you’d have to target all of them.
There is always going to be inherent risk.”
Stewart says some customers drive up to a distributor and pick up hardware at the door.
He says nothing could guarantee protection against the NSA, however. “If you had a machine in an airtight area … I stop the controls by which I mitigate risk when I ship it,” he says, adding that hardware technologies can make malicious tampering “incredibly hard”.
Cisco has poked around is routers for possible spy chips, but to date has not found anything because it necessarily does not know what NSA taps may look like, according to Stewart.
After the hacking campaign Borg boss John Chambers wrote a letter to US President Barack Obama saying the spying would undermine the global tech industry.
Judicial Committee Gives FBI The First OK It Needs To Hack Any Computer, Anywhere On The Planet
A judicial advisory panel Monday quietly approved a rule change that will broaden the FBI’s hacking authority despite fears raised by Google that the amended language represents a “monumental” constitutional concern.
The Judicial Conference Advisory Committee on Criminal Rules voted 11-1 to modify an arcane federal rule to allow judges more flexibility in how they approve search warrants for electronic data, according to a Justice Department spokesman.
Hertz Puts Video Cameras Inside Its Rental Cars, Has ‘No Current Plans’ To Use Them
Last week we wrote about the hypothetical situation of CCTV cameras being installed in every home. It turns out that this particular dystopia is closer than we thought: an article by Kashmir Hill on the Fusion site passes on the news that Hertz is putting cameras inside its rental cars as part of its “NeverLost” navigational system:
Hertz has offered the NeverLost navigational device for years, but it only added the built-in camera feature (which includes audio and video) to its latest version of the device — NeverLost 6 — in mid-2014. “Approximately a quarter of our vehicles across the country have a NeverLost unit and slightly more than half of those vehicles have the NeverLost 6 model installed,” Hertz spokesperson Evelin Imperatrice said by email. In other words, one in 8 Hertz cars has a camera inside — but Imperatrice says that, for now, they are inactive. “We do not have adequate bandwidth capabilities to the car to support streaming video at this time,” she said.
So why did it install them?
“Hertz added the camera as a feature of the NeverLost 6 in the event it was decided, in the future, to activate live agent connectivity to customers by video. In that plan the customer would have needed to turn on the camera by pushing a button (while stationary),” Imperatrice explained. “The camera feature has not been launched, cannot be operated and we have no current plans to do so.”
But of course, Hertz would hardly go to the trouble and expense of fitting its cars with this feature unless, at some future point, it did plan to use them. Morever, that future use might go well beyond “live agent connectivity”, as Hill rightly points out:
you could imagine camera mission creep, such as Hertz using it to capture video of what a trouble renter is up to in the vehicle, or to see who is really driving the car, or to snoop on a singing — or snuggling — driver.
According to the Fusion article, Hertz doesn’t seem to be telling anyone about the camera, on the grounds that the company doesn’t plan to use it, and so there’s nothing for customers to know. But if and when it does announce its presence, there will be precisely the problem Techdirt mentioned last week: that people in front of it would naturally be worried they were being spied upon — even if assured to the contrary — and would start constraining their speech and behavior.
CIA Worked With DOJ To Re-Purpose Foreign Surveillance Airborne Cell Tower Spoofers For Domestic Use
The CIA’s recent rebranding as Valhalla for US cyberwarriors notwithstanding, the agency’s general focus has been intelligence gathering on foreign governments, corporations and people. That it has often mistaken “torturing people into saying whatever they can to make it stop” for “intelligence gathering” isn’t necessarily germane to the following discussion, but it’s worth noting that the CIA is almost single-handedly responsible for destroying the term “extraordinary rendition” — a formerly innocuous (and complimentary) term previously used to highlight something like, say, Johnny Cash’s amazing cover of Soundgarden’s’ “Rusty Cage.” (That Cash’s two best covers are “Hurt” and “Rusty Cage” is not germane to the discussion of CIA torture programs, but what a coincidence!)
But the emphasis here is foreign. Which is why the following news makes so little sense.
The Central Intelligence Agency played a crucial role in helping the Justice Department develop technology that scans data from thousands of U.S. cellphones at a time, part of a secret high-tech alliance between the spy agency and domestic law enforcement, according to people familiar with the work.
The CIA and the U.S. Marshals Service, an agency of the Justice Department, developed technology to locate specific cellphones in the U.S. through an airborne device that mimics a cellphone tower, these people said.
After Petraeus Plea Deal, Lawyer Demands Release of Stephen Kim
The lawyer for imprisoned leaker Stephen Kim has asked the Department of Justice to immediately release him from jail, accusing the government of a “profound double standard” in its treatment of leakers following a comparatively lenient plea deal for former Gen. David Petraeus.
Petraeus avoided prison time for disclosing a trove of classified information to his lover and lying to the FBI about it. Kim, meanwhile, was sentenced to 13 months in prison for violating the Espionage Act by talking to a Fox News reporter about a single classified report on North Korea. Kim pleaded guilty after a five-year legal battle that depleted his finances and sent him to the brink of suicide. Petraeus, in the wake of his plea arrangement, is expected to continue his lucrative career working for an investment bank and giving speeches.
Kim’s lawyer, Abbe Lowell, noted in a scathing letter to the DOJ that Petraeus, in his plea deal, admitted leaking a range of highly sensitive material “at least as serious and damaging to national security as anything involved in Mr. Kim’s case” to Paula Broadwell, his lover and authorized biographer. Petraeus also acknowledged that when he was director of the CIA he lied to the FBI about leaking to Broadwell, as well as about keeping classified information at his home.
Yet while Kim, a former State Department official, was prosecuted under a draconian law against leaking — even though he merely discussed a single document that a government official later described in court filings as a “nothing burger” — Petraeus was allowed to plead guilty to a misdemeanor offense of mishandling classified information, and he was not charged at all for the felony of lying to the FBI. Under the deal, he is expected to be placed on probation for two years and pay a fine of $40,000.
“The decision to permit General Petraeus to plead guilty to a misdemeanor demonstrates more clearly than ever the profound double standard that applies when prosecuting so-called ‘leakers’ and those accused of disclosing classified information for their own purposes,” Lowell wrote in his two-page letter, which was dated March 6, just three days after the Petraeus plea deal was announced. “As we said at the time of Mr. Kim’s sentencing, lower-level employees like Mr. Kim are prosecuted under the Espionage Act because they are easy targets and lack the resources and political connections to fight back. High-level officials (such as General Petraeus and, earlier, Leon Panetta), leak classified information to forward their own agendas (or to impress their mistresses) with virtual impunity.”
New Zealand Used NSA System to Target Officials, Anti-Corruption Campaigner
New Zealand’s eavesdropping agency used an Internet mass surveillance system to target government officials and an anti-corruption campaigner on a neighboring Pacific island, according to a top-secret document.
Analysts from Government Communications Security Bureau, or GCSB, programmed the Internet spy system XKEYSCORE to intercept documents authored by the closest aides and confidants of the prime minister on the tiny Solomon Islands. The agency also entered keywords into the system so that it would intercept documents containing references to the Solomons’ leading anti-corruption activist, who is known for publishing government leaks on his website.
XKEYSCORE is run by the National Security Agency, and is used to analyze billions of emails, Internet browsing sessions and online chats that are collected from some 150 different locations worldwide. GCSB has gained access to XKEYSCORE because New Zealand is a member of the Five Eyes surveillance alliance alongside the United States, the United Kingdom, Canada and Australia.
A number of GCSB’s XKEYSCORE targets are disclosed in a top-secret document that was obtained by The Intercept and New Zealand newspaper the Herald on Sunday. The document raises questions about the scope of the surveillance and offers an unprecedented insight into specific people monitored by New Zealand’s most secretive agency.
The targets list, dated from January 2013, was authored by a GCSB analyst. It is contained in a so-called “fingerprint,” a combination of keywords used to extract particular information from the vast quantities of intercepted data swept up by XKEYSCORE. None of the individuals named on the list appear to have any association with terrorism.
Most of the targets, in fact, had a prominent role in the Solomon Islands government. Their roles around the time of January 2013 suggest GCSB was interested in collecting information sent among the prime minister’s inner circle. The targets included: Barnabas Anga, the permanent secretary of the Ministry of Foreign Affairs and External Trade; Robert Iroga, chief of staff to the prime minister; Dr Philip Tagini, special secretary to the prime minister; Fiona Indu, senior foreign affairs official; James Remobatu, cabinet secretary; and Rose Qurusu, a Solomon Islands public servant.
The seventh person caught up in the GCSB’s surveillance sweep is the leading anti-corruption campaigner in the Solomon Islands, Benjamin Afuga. For several years he has run a popular Facebook group that exposes corruption, often publishing leaked information and documents from government whistleblowers. His organization, Forum Solomon Islands International, has an office next door to Transparency International in Honiara, the capital city of the Solomon Islands. GCSB analysts programmed XKEYSCORE so that it would intercept documents sent over the Internet containing the words “Forum Solomon Islands,” “FSII,” and “Benjamin Afuga.”
Officials Upset Tech Companies Reluctant To Play Along With Administration’s ‘Information Sharing’ Charade
The government’s on-again, off-again love affair with everything cyber is back on again. The CIA has just shifted its focus, abandoning its position as the free world’s foremost franchiser ofclandestine torture sites and rebranding as the agency of choice for all things cyberwar-related.
For years, legislators have been attempting to grant themselves permission to strong-arm tech companies into handing over all sorts of information to the government under the guise of cybersecurity. CISPA, CISA, etc. The acronyms come and go, but the focus is the same: information sharing.
Of course, the promise of equitable sharing remains pure bullshit. Tech companies know this and have been understandably resistant to the government’s advances. There are few, if any positives, to these proposed “agreements.” The government gets what it wants — lots and lots of data — and the companies get little more than red tape, additional restrictions and fleeing customers.
The government has recently been playing up the narrative that unreasonable tech companies are standing in the way of the nation’s super-secure future.
U.S. government officials say privately they are frustrated that Silicon Valley technology firms are not obtaining U.S. security clearances for enough of their top executives, according to interviews with officials and executives in Washington and California. Those clearances would allow the government to talk freely with executives in a timely manner about intelligence they receive, hopefully helping to thwart the spread of a hack, or other security issues.
The lack of cooperation from Silicon Valley, Washington officials complain, injects friction into a process that everyone agrees is central to the fight to protect critical U.S. cyberinfrastructure: Real-time threat information sharing between government and the private sector.
Before dealing with the questionable promise of “real-time threat information sharing,” let’s deal with the supposedly minor requirement of security clearances. It’s not as if this won’t impose undue burdens on tech company leaders, especially when they already have a pretty good idea this stipulation will be a major hassle followed by continued opacity from a government that’s 90% lip service and 10% outright lying. Tech execs are being asked to make all the effort and hope against hope there will actually be some benefits.
“I believe that this is more about the overclassification of information and the relatively low value that government cyberintel has for tech firms,” said one Silicon Valley executive. “Clearances are a pain to get, despite what government people think. Filling out the paper work … is a nightmare, and the investigation takes a ridiculous amount of time.”
[…]
“I think tech companies are doing a return-on-investment analysis and don’t think the government intel is worth the cost or effort,” said the Silicon Valley executive. “This is why government threat signature sharing initiatives are such a nothing-burger: The signatures are of limited value and only a few select companies with clearances can actually use them.”
The clearance process can easily take over a year. The application runs 127 pages and asks a mixture of questions ranging from highly-intrusive to facially-ridiculous.
Ron Wyden: ‘Plenty’ Of Domestic Surveillance Programs Still Unexposed
In a few months, we’ll be marking the second anniversary of the first Snowden leak. The outraged responses of citizens and politicians around the world to these revelations has resulted in approximately nothing in those 24 months. There have been bright spots here and there — where governments and their intelligence agencies were painted into corners by multiple leaks and forced to respond — but overall, the supposed debate on the balance between security and privacy has been largely ignored by those on Team National Security.
Here in the US, multiple surveillance reforms were promised. So far, very little has been put into practice. The NSA may be forced to seek court approval for searches of its bulk phone metadata, but otherwise the program rolls on unimpaired and slightly rebranded (from Section 215 to Section 501).
Senator Ron Wyden — one of the few members of our nation’s intelligence oversight committees actively performing any oversight — isn’t happy with the lack of progress. In an interview with Buzzfeed’s John Stanton, Wyden points out that not only has there been little movement forward in terms of surveillance reform, there actually may have been a few steps backward.
Wyden bluntly warned that even after the NSA scandal that started with Edward Snowden’s disclosures, the Obama administration has continued programs to monitor the activities of American citizens in ways that the public is unaware of and that could be giving government officials intimate details of citizens’ lives.
Asked if intelligence agencies have domestic surveillance programs of which the public is still unaware, Wyden said simply, “Yeah, there’s plenty of stuff.