Loss of Privacy

Keeping you informed on recent losses to privacy and civil rights worldwide.

Browsing Posts tagged Privacy

Child-tracking wristbands, drug-delivering implants and wearable computing devices are popping up and promising to make our lives better. The question of the effects these new technologies will have on children’s development and society at large remains largely unanswered though.

If a parent tracks their child with a GPS, how will they react when they are a teenager and no longer constantly monitored? RT’s Lindsay France seeks to answer this and other questions by speaking with Shiv Gaglani, editor of Medgadget.

Source.

flattr this!

CoSN announced that it has issued resources to complement it K-12 Education Privacy Toolkit.

CoSN (Consortium for School Networking) today unveiled two freestanding resources to accompany its in-depth, step-by-step privacy toolkit. Designed to help school system leaders navigate the complex federal laws and related issues, the complementary resources include:

•    “10 Steps Every District Should Take Today”; and
•    “Security Questions to Ask of an Online Service Provider

Launched in March through CoSN’s Protecting Privacy in Connected Learning initiative, the existing toolkit addresses compliance with laws such as the Family Education Rights and Privacy Act (FERPA) and the Children’s Online Privacy Protection Act (COPPA) and offers smart practices to better protect student privacy and their data. The security questions for online service providers were included in the v.1 toolkit.

In the fall, CoSN will expand the toolkit with additional sections covering the Protection of Pupil Rights Amendment (PPRA) and the Health Insurance Portability & Accountability Act (HIPAA) – filling out the privacy guide with all four federal privacy laws applied to K-12 education.

flattr this!

Heaps of baby photos, fitness selfies, medical records and resumes are among thousands of private communications scooped up and stored by NSA spy programs.

That’s according to new disclosures based on documents Edward Snowden, the former National Security Agency contractor, gave to The Washington Post — disclosures that show just how easy it is for Americans’ private conversations to be swept into the spy agency’s traps.

More.

flattr this!

Tor-Anonymity-Tor-path

In a shocking story on the German site Tagesschau (Google translate), Lena Kampf, Jacob Appelbaum and John Goetz report on the rules used by the NSA to decide who is a “target” for surveillance.

You can read more at Boing Boing.

From Panorama:

The investigation discloses the following:

Two servers in Germany – in Berlin and Nuremberg – are under surveillance by the NSA.
Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA.
Among the NSA’s targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states.
The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called “the Linux Journal – the Original Magazine of the Linux Community”, and calls it an “extremist forum”.

The authors of the Tagesschau story have seen the “deep packet inspection” rules used to determine who is considered to be a legitimate target for deep surveillance, and the results are bizarre.

According to the story, the NSA targets anyone who searches for online articles about Tails — like this one that we published in April, or this article for teens that I wrote in May — or Tor (The Onion Router, which we’ve been posted about since 2004). Anyone who is determined to be using Tor is also targeted for long-term surveillance and retention.

Bruce Schneier thinks there may be a second leaker.

I do not believe that this came from the Snowden documents. I also don’t believe the TAO catalog came from the Snowden documents. I think there’s a second leaker out there.

EDITED TO ADD (7/3): More news stories. Thread on Reddit. I don’t expect this to get much coverage in the US mainstream media.

Hacker News and Slashdot threads. ArsTechnica and Wired articles.

There is also the live blog [in German] of William Binney in front of the German Parliament.

There is also another post on reddit. After reading all of these links the last few days, I’m probably on the NSA’s list now too.

The facts also bear out that all this surveillance to protect us is useless. You are eight times more likely to be killed by a police officer and 6 times more likely to die from hot weather than a terrorist attack.

Feel free to download Tor.

Read/download the XKeyscore rules.

flattr this!

Digital-Demise-Infographic

Source.

flattr this!