This Rule About Drone Surveillance Is Just Plain Absurd -- And Scary From the Wiki article on Air rights "At the same time, the law, and the Supreme Court, recognized that a landowner had property rights in the lower reaches of the airspace above their property. So technically they are invading a persons private property unless this has been overruled. I'm not sure how the FBI is circumventing this rule. That's about the only way around it, and not too tricky of one at that.
Wi-Fi Spy Grid 'Deactivated' SPD admit mesh network was never turned off after DHS testing phase Paul Joseph Watson Infowars.com November 13, 2013 Following a privacy outcry concerning a wi-fi “mesh network” being installed in Seattle with DHS funding that has the capability of recording the last 1,000 locations of anyone in its vicinity, the Seattle Police Department announced last night that it is temporarily deactivating the network. Image: City of Seattle. As we highlighted yesterday, the $2.7 million dollar system, a series of white wi-fi boxes affixed to utility poles with which authorities had planned to blanket the entire city, can track cellphones even if they are not connected to the network. The system can also collect a mobile user’s IP address, mobile device type, apps used, current location and even historical locations. “The wireless mesh network will be deactivated until city council approves a draft policy and until there’s an opportunity for vigorous public debate,” SPD spokesperson Sgt. Gov.
Obama can’t point to a single time the NSA call records program prevented a terrorist attack President Obama speaks during an end-of-the year news conference in the Brady Press Briefing Room at the White House in Washington, Friday, Dec. 20, 2013. (Susan Walsh/AP) National Security Agency defenders, including President Obama, continue to cite the terrorist attack on Sept. 11, 2001 when defending the program that scoops up domestic call records in bulk. At the end of the year news conference, Reuters's Mark Felsenthal asked: As you review how to rein in the National Security Agency, a federal judge says that, for example, the government has failed to cite a single instance in which analysis of the NSA's bulk metadata actually stopped an imminent attack. But President Obama never answered the question about a specific examples. The president's reliance on a 9/11 narrative is expected. But the reason the president can't cite a specific time the phone meta-data program stopped a similar tragedy is because it hasn't.
wireless network tracks civilians | Seattle police In February, the Seattle Police Department announced it bought what's called a "mesh network," that will be used as a dedicated wireless network for emergency responders. What SPD did not say is that the network is capable of tracking anyone with a device that has a Wi-Fi connection. "They now own a piece of equipment that has tracking capabilities so we think that they should be going to City Council and presenting a protocol for the whole network that says they won't be using it for surveillance purposes," said Jamela Debelak of the American Civil Liberties Union. A spokesperson for Seattle Police said the network is not being used right now. The network includes 160 wireless access points that are mounted on poles across Seattle. This information can be stored and connected for the last 1,000 times a person is connected with a specific device. Council member Bruce Harrell pointed out the need for SPD to be able to collect some of this information.
Is the Computer Fraud and Abuse Act the 'worst law in technology'? | Dan Gillmor Is the Computer Fraud and Abuse Act the "worst law in technology", as Columbia Law School's Tim Wu calls the statute? I think there are worse laws for the technology industry and its customers, but the CFAA is more than bad enough – a vague, outdated and Draconian law, abused by the government in several high-profile cases – to have spurred calls for repeal. As Wu and many others (including me) have pointed out over the years, the vagueness of the CFAA has given prosecutors a tool that should worry everyone. This is because the government contends that the statute's ban on "unauthorized access" to someone else's computer is a felony, period, with potential penalties you'd associate with serious violent crime. But he wasn't the first. The Bush administration relied on the CFAA to prosecute the easy-to-dislike Lori Drew, who was among several people who created a bogus MySpace account of a fictitious teenaged boy who wooed and rejected the daughter of Drew's neighbor in suburban St Louis.
Fake Cell Towers Allow the NSA and Police to Keep Track of You The Internet is abuzz with reports of mysterious devices sprinkled across America—many of them on military bases—that connect to your phone by mimicking cell phone towers and sucking up your data. There is little public information about these devices, but they are the new favorite toy of government agencies of all stripes; everyone from the National Security Agency to local police forces are using them. These fake towers, known as “interceptors,” were discovered in July by users of the CryptoPhone500, one of the ultra-secure cell phones released after Edward Snowden’s leaks about NSA snooping. The phone is essentially a Samsung Galaxy S3 customized with high-level encryption that costs around $3,500. Newsweek Magazine is Back In Print Map showing the location of rogue cell towers identified by the firewall on CryptoPhones in August via ESD America, a defense and law enforcement technology provider based in Las Vegas. This NSA-style surveillance is spreading to local cops.
Aaron Swartz Aaron Hillel Swartz (November 8, 1986 – January 11, 2013) was an American computer programmer, entrepreneur, writer, political organizer and Internet hacktivist who was involved in the development of the web feed format RSS and the Markdown publishing format, the organization Creative Commons, the website framework web.py and the social news site, Reddit, in which he became a partner after its merger with his company, Infogami.[i] He committed suicide while under federal indictment for data-theft, a prosecution that was characterized by his family as being "the product of a criminal-justice system rife with intimidation and prosecutorial overreach". Swartz's work also focused on sociology, civic awareness and activism. He helped launch the Progressive Change Campaign Committee in 2009 to learn more about effective online activism. Swartz declined a plea bargain under which he would have served six months in federal prison. Life and works W3C Markdown
Obama's Computer Security Solution is a Mishmash of Old, Outdated Policy Solutions The Obama Administration is on a roll with proposing legislation that endangers our privacy and security. Over the course of two days, President Obama proposed a cybersecurity bill that looks awfully similar to the now infamous CISPA (with respect to information sharing), a computer crime bill that is the opposite of our own proposed computer crime reform, and a data breach law weaker than the current status quo. All three of the bills are recycled ideas that have failed in Congress since their introduction in 2011. Zombie Bill Dead in 2013, Stumbles from the Grave in 2015 Every year for the past four years we've seen at least one cybersecurity "information sharing" bill introduced in Congress. This time, it's not the House Intelligence Committee proposing the bill, but President Obama. The president's press release is noticeably silent on why the current information sharing regimes aren't adequate. The proposal is in direct contradiction to EFF's own proposal to reform the CFAA.
Secret US cybersecurity report: encryption vital to protect private data | US news A secret US cybersecurity report warned that government and private computers were being left vulnerable to online attacks from Russia, China and criminal gangs because encryption technologies were not being implemented fast enough. The advice, in a newly uncovered five-year forecast written in 2009, contrasts with the pledge made by David Cameron this week to crack down on encryption use by technology companies. In the wake of the Paris terror attacks, the prime minister said there should be no “safe spaces for terrorists to communicate” or that British authorites could not access. Cameron, who landed in the US on Thursday night, is expected to urge Barack Obama to apply more pressure to tech giants, such as Apple, Google and Facebook, which have been expanding encrypted messaging for their millions of users since the revelations of mass NSA surveillance by the whistleblower Edward Snowden. Cameron said the companies “need to work with us.
Kyllo v. United States Kyllo v. United States, 533 U.S. 27 (2001), held that the use of a thermal imaging, or FLIR, device from a public vantage point to monitor the radiation of heat from a person's home was a "search" within the meaning of the Fourth Amendment, and thus required a warrant. Facts Department of the Interior used a thermal imaging device outside of Danny Lee Kyllo's home in Florence, Oregon. Opinion of the Supreme Court The Supreme Court ruled 5-4 that the thermal imaging of Kyllo's home constituted a search. In the dissent Justice John Paul Stevens argued that the use of thermal imaging does not constitute a search, which requires a warrant, because any person could detect the heat emissions. The decision broke apart the traditional "conservative" and "liberal" wings of the court: the majority opinion was written by Scalia, joined by Souter, Thomas, Ginsburg and Breyer, while Rehnquist, O'Connor, Kennedy and Stevens dissented. See also References External links
New police radars can 'see' inside homes Radar devices allowing officers to detect movement through walls have been secretly used by at least 50 U.S. law enforcement agencies over the last two years. VPC WASHINGTON — At least 50 U.S. law enforcement agencies have secretly equipped their officers with radar devices that allow them to effectively peer through the walls of houses to see whether anyone is inside, a practice raising new concerns about the extent of government surveillance. Those agencies, including the FBI and the U.S. The radars work like finely tuned motion detectors, using radio waves to zero in on movements as slight as human breathing from a distance of more than 50 feet. The RANGE-R handheld radar is used by dozens of U.S. law enforcement agencies to help detect movement inside buildings. Current and former federal officials say the information is critical for keeping officers safe if they need to storm buildings or rescue hostages. By then, however, the technology was hardly new. Imgur
Iris-scanning technology streamlines refugee registration process — UNHCR AMMAN — Scores of Syrians waiting to register at the newly opened UN Refugee Agency registration centre in Khalda last Thursday experienced their first iris-scanning. The Iris Recognition Technology was recently implemented to streamline the refugee registration process and to tackle the backlog of 60,000 Syrians awaiting registrations at the Anmar Hmoud Centre for Refugee Registration and the Irbid centre. “The iris scan was introduced because we are dealing with over half-a-million people in various locations so we needed to prevent multiple registration,” said Nihad Hota, a UNHCR registration officer at the Khalda centre. Developed by the Jordan-based IrisGuard company, the technology uses the iris instead of fingerprints to identify a person. Iris-scanning completes the traditional registration where biometric data such as names and addresses are recorded along with testimonies and lists of relatives. “This way, we have a complete and proper data registration of each refugee.
WikiLeaks International non-profit organisation publishing secret information, news leaks and classified media During the 2016 US presidential election campaign, WikiLeaks released emails and other documents from the Democratic National Committee and from Hillary Clinton's campaign manager, John Podesta showing that the party's national committee favoured Hillary Clinton over her rival Bernie Sanders in the primaries. These releases caused significant harm to the Clinton campaign, and have been attributed as a potential contributing factor to her loss. The U.S. intelligence community expressed "high confidence" that the leaked emails had been hacked by Russia and supplied to WikiLeaks. Wikileaks said that the source of the documents was not Russia or any other state. During the campaign, WikiLeaks promoted conspiracy theories about Hillary Clinton and the Democratic Party. History Staff, name and founding Purpose Administration Legal status Potential criminal prosecution Leaks
Protests follow Google 'endorsed advert' change 14 October 2013Last updated at 06:35 ET The change might mean comments made on Google turn up on adverts Google is facing a backlash over plans to put people's faces and comments about products and places into adverts. The "shared endorsements" policy change starts on 11 November and covers the comments, "follows" and other actions people do on Google+. One protest involves people swapping their profile pictures for that of Google boss Eric Schmidt so his image rather than their own appears on ads. Google said it had made it easy for people to opt out of the system. The search giant started alerting people about the upcoming policy change via banners on its main webpage and in a page explaining the change to its "policies and principles". Google also gave examples of how the "shared endorsement" system might work. Many people protested about the change to Google, and some altered their image profiles on the Google+ social network in response.