• Original inhabitants of Diego Garcia may be allowed to return

    Following close to two decades of controversy and legal battles, the original inhabitants of the Chagos archipelago territories in the India Ocean, many of whom forcibly removed between 1967 and 1973 in order to allow the construction of military bases by Britain and the United States, may soon see their homeland again after the results of a new feasibility study. More than half of the 1,800 Chagossian people who were removed have died, but many of those remaining would like to return to the island chain, which includes a CIA base at Diego Garcia, one of the main islands.

  • School surveillance on the rise

    Invasive school surveillance practices are the norm in the United Kingdom and the United States, and according to an Australian criminologist, such practices are becoming increasingly popular in Australian schools. “An estimated 1.28 million students are fingerprinted in the United Kingdom, largely for daily registration purposes; there is an excess of 106,000 closed-circuit television (CCTV) cameras installed in English, Welsh and Scottish secondary schools; while students in a U.S. high school use pedometers to ensure that they meet their gym class’s physical activity requirement,” he says.

  • Kouachi intelligence failure: The struggle to balance security, privacy, budgetary concerns

    About seven months before the attacks on the Paris office of Charlie Hebdo, French domestic intelligence agency monitored Saïd Kouachi for at least two years, and his younger brother Chérif Kouachi for at least a year. The surveillance of both brothers had led nowhere, and was later considered a non-priority for intelligence officials. The Kouachi brothers did not appear to be an imminent threat, and it would have taken twenty-five agents to monitor the two brothers around the clock. Experts say that the failures and missteps by French law enforcement in the Kouachi case should be a lesson to other Western governments which may have relaxed surveillance practices targeted at would-be terrorists in order to comply with budget cuts or out of genuine concern for civil liberties.

  • NYPD’s radicalization report criticized

    In a Sunday morning interview on 970 AM The Answer, New York Police Department(NYPD) deputy commissioner for Intelligence and Counterterrorism John Miller criticized a 7-year old report on Islamic radicalization in New York City. The report, “Radicalization in the West: The Homegrown Threat,” published by the NYPD Intelligence Division under former police commissioner Ray Kelly, came under fire after a series of articlesdetailed some of the division’s counterterrorism operations, including the monitoring of prominent Muslims and Muslim communities in New York City. Those articles contributed to the closure of the unit, which conducted the NYPD’s surveillance operations on New York’s Muslim communities.

  • The many problems with the DEA's bulk phone records collection program

    By Hanni Fakhoury

    Think mass surveillance is just the wheelhouse of agencies like the NSA? Think again. One of the biggest concerns to come from the revelations about the NSA’s bulk collection of the phone records of millions of innocent Americans was that law enforcement agencies might be doing the same thing. It turns out this concern was valid, as last week the government let slip for the first time that the Drug Enforcement Agency (DEA) had also been collecting the phone records of Americans in bulk since the 1990s.

  • Former head of MI6 calls for new surveillance pact between governments and ISPs

    The former head of British intelligence agency MI6, Sir John Sawers, has called for a new surveillance pact between Internet companies and U.S. and U.K. security services. Both groups could work together as they had in the past to prevent a repeat of terror events such as the recent Paris attacks, he said. American and British law enforcement and intelligence agencies are urging major Internet companies to provide backdoors or access to encrypted e-mails and other forms of Web communications. “I think one benefit of the last eighteen months’ debate [since Snowden’s leaks were made public] is that people now understand that is simply not possible [to keep the public secure without surveillance] and there has to be some form of ability to cover communications that are made through modern technology,” Sawers said.

  • No technological replacement exists for bulk data collection: Report

    No software-based technique can fully replace the bulk collection of signals intelligence, but methods can be developed more effectively to conduct targeted collection and to control the usage of collected data, says a new report from the National Research Council. Automated systems for isolating collected data, restricting queries that can be made against those data, and auditing usage of the data can help to enforce privacy protections and allay some civil liberty concerns, the unclassified report says.

  • Keeping citizens safe while respecting their right to privacy

    Surveillance is an increasingly common – and sometimes controversial – activity, designed fundamentally to protect public and property. The rapid increase in information gathered by surveillance cameras however has led to spiraling costs in terms of storage filtering and data checking, and has also led to concerns that innocent citizens are routinely being tracked. Using innovative new technology, EU-funded researchers have reconciled the need for robust surveillance with the right to privacy.

  • When the camera lies: our surveillance society needs a dose of integrity to be reliable

    By Joshua Gans and Steve Mann

    Being watched is part of life today. Our governments and industry leaders hide their cameras inside domes of wine-dark opacity so we can’t see which way the camera is looking, or even if there is a camera in the dome at all. They’re shrouded in secrecy. But who is watching them and ensuring the data they collect as evidence against us is reliable? Surveillance evidence is increasingly being used in legal proceedings, but the surveillants – law enforcement, shop-keepers with a camera in their shops, people with smartphones, etc. — have control over their recordings, and if these are the only ones, the one-sided curation of the evidence undermines their integrity. There is thus a need to resolve the lack of integrity in our surveillance society. There are many paths to doing this, all of which lead to other options and issues that need to be considered. But unless we start establishing principles on these matters, we will be perpetuating a lack of integrity regarding surveillance technologies and their uses.

  • Public support for torture declines as people learn the explicit details of torture techniques

    Does the American public condone torture when the goal is to prevent terrorist attacks? News headlines reporting the results of a Pew Research Center poll released on 9 December indicate more than half of Americans do. That finding, however, is not necessarily valid, says Tufts University’s Richard Eichenberg, who argues that the poll is flawed because it is based on a faulty premise. A more accurate picture of the nation’s attitude can be found in responses to polls conducted by Pew, Gallup, and other news organizations and analyzed in a 2010 report. These surveys explained in graphic detail what interrogation techniques were being judged. So while response to more general questions on the use of torture may continue to produce mixed reactions, Eichenberg says public support for torture will decline as more people become aware of the explicit details of torture techniques contained in the Senate report.

  • DOJ’s new cyber unit to provide legal guidance on electronic surveillance

    The Justice Department is creating a cybersecurity unit within its Computer Crime & Intellectual Property Section (CCIPS) to provide legal guidance on electronic surveillance investigations.The unit will also work with Congress on cybersecurity legislation and focus on cybercrime prevention.

  • A malware more sophisticated than Stuxnet discovered

    Security experts at Symantechave discovered the world’s most sophisticated computer malware, Regin. Thought to have been created by a Western intelligence agency, and in many respects more advanced than Stuxnet — which was developed by the U.S. and Israeli government in 2010 to hack the Iranian nuclear program — Regin has targeted Russian, Saudi Arabian, Mexican, Irish, and Iranian Internet service providers and telecoms companies. “Nothing else comes close to this … nothing else we look at compares,” said one security expert.

  • GOP senators block NSA surveillance reform bill

    The USA Freedom Act, a bill introduced last year aiming to curtail some of the NSA’s data collection programs, especially those focusing on U.S. phone data, failed last night to reach the 60-vote threshold required to cut off debate and move to a vote. Senator Mitch McConnell (R-Kentucky), the Republican leader, and other leading GOP senators worked hard to defeat the bill. Nearly a year-and-a-half after the Edward Snowden’s revelations, the act was considered the most politically viable effort in four decades to place curbs on NSA activities. Civil libertarians and technology companies supported the bill, as did the White House and the intelligence community – although the latter two did so more out of fear that a failure of the bill would jeopardize the extension of Section 215 of the Patriot Act, which expires next June.

  • FBI: Lawmakers should mandate surveillance “backdoors” in apps, operating systems

    FBI director James Comey said that the agency was pushing lawmakers to mandate surveillance functions in apps, operating systems, and networks, arguing that privacy and encryption prevent or disrupt some of the agency’s investigations. According to Comey, new privacy features implemented by Google and Apple in the wake of the Snowden revelations, automatically encrypt user communication and data, making it difficult for law enforcement to gather evidence and connect links among suspected criminals and terrorists.

  • Judges question claims that NSA metadata collection poses threat to ordinary citizens

    A panel of three judges on the U.S. Court of Appeals for the District of Columbia challenged arguments made earlier this week by Larry Klayman, a conservative lawyer arguing on his own behalf, and Cindy Cohn, an attorney representing the Electronic Frontier Foundation (EFF) and the American Civil Liberties Union (ACLU), that the National Security Agency’s (NSA) mass-surveillance program is a breach of the Fourth Amendment, which protects against unreasonable searches.The case, Klayman v. Obama, is one of three currently at the appeals-court level regarding the NSA surveillance program.In the D.C. Circuit Court of Appeals, Judges Stephen Williams and David Sentelle voiced skepticism about claims that collecting metadata posed a threat to ordinary citizens.