-
Expert calls for “surveillance minimization” to restore public trust
Surveillance minimization — where surveillance is the exception, not the rule — could help rebuild public trust following revelations about the collection of personal data, according to an expert on privacy and surveillance. “Surveillance minimization requires surveillance to be targeted rather than universal, controlled and warranted at the point of data gathering rather than of data access, and performed for the minimum necessary time on the minimum necessary people,” he says.
-
-
Obama announces reforms of U.S. intelligence data collection practices
President Barack Obama on Friday called for a “new approach” by the U.S. intelligence community to the collection of Americans’ phone metadata. The major changes in current practices involve storage of and access to bulk metadata; the presence of a public advocate during FISA court deliberations; new privacy protections for non-Americans; and new restrictions on spying on leaders of allied countries. Obama offered a robust defense of the U.S. intelligence services, saying that there was no evidence they had abused their power, and that many of their methods were necessary to protect Americans. “We will not apologize simply because our services may be more effective,” he said. The president pointedly noted that some countries that “have loudly criticized the NSA privately acknowledge that America has special responsibilities as the world’s only superpower . . . and that they themselves have relied on the information we obtain to protect their own people.”
-
-
NSA’s bulk collection programs’ contribution to thwarting terrorism minimal: study
There are two questions about the NSA’s bulk information collection programs: are these programs legal? Are they effective? On the second questions, supporters of the programs say these surveillance measures are essential, and as proof they claim these programs helped thwart more than fifty potential terrorist attacks in more than twenty countries around the world. A new in-depth analysis shows, however, that these claims are overblown and even misleading. The study of 225 individuals recruited by al-Qaeda, or a like-minded group, or inspired by al-Qaeda’s ideology, and charged in the United States with an act of terrorism since 9/11, demonstrates that traditional investigative methods provided the initial impetus for investigations in the majority of cases, while the contribution of NSA’s bulk surveillance programs to these cases was minimal.
-
-
Review panel calls for prohibiting NSA bulk collection of phone metadata
A 300-page report prepared for President Barack Obama made forty-six recommendations for better management of, and different guiding rules for, U.S. surveillance programs. Among the report’s recommendations: The NSA should be banned from attempting to undermine the security of the Internet and prohibited from collecting telephone records in bulk; spying on foreign leaders should require an authorization from a higher level then is currently the case; the government should be banned from undermining encryption. The president will announce by 28 January which of the forty-six recommendations he would accept.
-
-
NSA planted sleeper malware in 50,000 computer networks
The NSA has planted 50,000 sleeper malware packages – in effect, digital sleeper agents – in more than 50,000 computer networks around the world. The agents, controlled by the NSA’s Tailored Access Operations (TAO) unit, can be activated on command to harvest information of cause disruption. To plant the digital agents, the NSA employed methods typically used by Internet scammers and fraudsters.
-
-
DoD sound protection standards for secret spaces are insufficient
What is the best place to conduct a conversation about a confidential or even classified matter? Surprisingly, probably not a conference room designed in accordance with acoustical criteria approved by the Department of Defense (DOD). While such “secret” rooms — intended to keep sensitive information out of the earshot of unauthorized listeners — might meet DOD standards, they offer less protection against snooping than is found in a luxury condo.
-
-
Digital privacy services enjoying a surge in demand
Digital privacy services such as encrypted e-mail, secure instant messaging, and services that provide hard-to-track IP addresses are enjoying a surge in demand as individuals and businesses seek to protect information from spies and hackers in the wake of the National Security Agency’s (NSA) surveillance program revelations. These services promise security, but may also slow down computer performance. Moreover, they are not likely to deter those who are determined to hack into a particular computer network.
-
-
Exploring “culture of surveillance” in the United States
Recent revelations that the National Security Agency (NSA) has been analyzing the communication records of all U.S. citizens have many talking about the topic of “mass surveillance” by the government. A University of Kansas sociologist who has been documenting what he calls our “culture of surveillance” for nearly twenty years argues, however, that these developments are part of deeper social and cultural changes going on for quite some time. Professor William Staples focuses his attention on the relatively mundane techniques of keeping a close watch of people — what he has dubbed the “Tiny Brothers” — which are increasingly present in the workplace, school, home, and community.
-
-
NSA surveillance leads to San Diego conviction of al-Shabaab supporters
Three Somali men residing in San Diego were sentenced to prison on Monday for aiding al-Shabaab, a Somali terrorist organization. The sentencing hearing in a San Diego federal court came four days after the men lost their bid for a new trial, requested after discovering that the charges were supported by evidence from theNational Security Agency’s (NSA) surveillance program.U.S. District Judge Jeffrey Miller denied the defense’s request to dismiss the NSA surveillance-generated evidence, saying the collection of the evidence did not amount to a warrantless search, and that while the agency’s surveillance programs were controversial, the protocol that was followed aligns with the law.
-
-
Weakening cybersecurity to facilitate NSA surveillance is dangerous: experts
In the wake of revelations about the NSA surveillance programs, an expert on surveillance and cybersecurity recommended a re-evaluation of those surveillance practices that weaken commercial products and services. These practices include weakening standards and placing “back doors” into products that are accessible to U.S. government agencies. The expert – Jon Peha, former chief technology officer of the FCC and assistant director of the White House’s Office of Science and Technology — said deliberately weakening commercial products and services may make it easier for U.S. intelligence agencies to conduct surveillance, but “this strategy also inevitably makes it easier for criminals, terrorists and foreign powers to infiltrate these systems for their own purposes.”
-
-
U.S. tech companies could go “dark” to regain trust
With each new revelation of the scope of the American National Security Agency’s spying, perceptions of the importance of privacy are hardening around the world. There is thus a motivation for major technology companies to provide a verifiably secure means of allowing users to communicate securely without an ability for the companies to provide access to security agencies, even if requested to. Two companies, Silent Circle and Lavabit, have come together to form the Dark Mail alliance in an attempt to do exactly this.
-
-
Senate panel’s NSA curbs not enough: critics
Yesterday, the Senate’s intelligence committee approved by an 11-4, and released the text of, a bill which would scale back the NSA’s bulk collection of Americans’ telephone records, increase congressional and judicial oversight of intelligence activities, and create 10-year prison sentences for people who access the classified material without authorization. Critics of U.S. surveillance programs and privacy rights advocates said the bill does little, if anything, to end the daily collection of millions of records that has spurred widespread demands for reform.
-
-
U.S. tech companies increase lobbying efforts related to surveillance, NSA
Technology firms Apple, Google, Facebook, and Microsoft, among other tech powerhouses, are quietly increasing lobbying efforts directed at government surveillance laws as they seek to have a say in what Congress does regarding surveillance reforms and National Security Agency (NSA) programs. Traditionally, tech firms have not pushed for restrictions on the ability of the U.S. intelligence community to collect data, and it is not clear what position these industry leaders will take, whether they plan to take a position at all, or whether they will present lawmakers with a united industry front.
-
-
White House to curb NSA monitoring of some allies' leaders
It appears that President Obama will soon instruct the NSA to stop eavesdropping on leaders of close U.S. allies. It now emerges that both the president and Congress’s intelligence committees were kept in the dark about this aspect of the NSA surveillance program. Yesterday’s indication by the White House that it moving toward banning the NSA from eavesdropping on some foreign leaders is a historic change in the practices of an agency which has enjoyed unlimited and unfettered – and, it now appears, unsupervised – freedom of action outside the borders of the United States. The move is similar to, if more complicated than, the limits imposed on the CIA in the mid-1970s. Security experts note, though, that prohibiting the NSA from eavesdropping on some foreign leaders would be more complicated and potentially more damaging to U.S. interests than the prohibitions imposed on the CIA more than three decades ago.
-
-
Security vs. privacy
Those who ask you to choose security or privacy and those who vote on security or privacy are making false choices. That’s like asking air or water? You need both to live. Maslow placed safety (of which security is a subset) as second only to food, water, sex, and sleep. As humans we crave safety. As individuals and societies, before we answer the question “security or privacy,” we first have to ask “security from whom or what?” and “privacy from whom and for whom?”
-