background preloader

EFF Surveillance Self-Defense Project

EFF Surveillance Self-Defense Project

Sofrecom : l’entreprise française qui modernise la surveillance des syriens C’est en grandes pompes que Sofrecom fêtait son contrat avec Syrian Telecom en décembre 2009. Christine Lagarde, alors ministre, a même fait le déplacement. Côté syrien, le premier ministre Mr Abdallah Dardari, participait lui aussi à la cérémonie de signature du contrat. S’il n’est pas en soi surprenant de voir une entreprise française spécialiste des communications assister un opérateur étranger, on s’étonnera tout de même de voir nos entreprises viser des marchés très émergents… niveaux droits de l’homme. Les champs d’activités de la Sofrecom peuvent laisser suggérer qu’elle est intervenue sur le « management » du réseau de la STE. Source Wikipedia Les pages business du site de la Sofrecom nous renseignent largement sur les derniers marchés de cette filiale du groupe France Telecom, et les destinations font rêver : le Congo, le Vietnam, la Thaïlande, la Syrie, l’Éthiopie, la Mauritanie, la Côte d’Ivoire, le Tchad, la Libye de Kadhafi, le Maroc, ou la Tunisie de Ben Ali.

Some Facts About Carrier IQ There has been a rolling scandal about the Carrier IQ software installed by cell phone companies on 150 million phones, mostly within the United States. Subjects of outright disagreement have included the nature of the program, what information it actually collects, and under what circumstances. This post will attempt to explain Carrier IQ's architecture, and why apparently conflicting statements about it are in some instances simultaneously correct. The information in this post has been synthesised from sources including Trevor Eckhart, Ashkan Soltani, Dan Rosenberg, and Carrier IQ itself. First, when people talk about "Carrier IQ," they can be referring to several different things. There is consensus agreement that layers 2–4 collect information that can include location, browsing history (including HTTPS URLs), application use, battery use, and data about the phone's radio activity.

To Nobody's Surprise, Australian “Terrorism” Law May Be Used for Copyright Enforcement As we foreshadowed, a new law requiring mandatory data retention by ISPs was introduced into the Australian federal parliament last week. In the few days since then, there have been claims and counter-claims about whether data obtained under the new law would be limited to use in fighting major crimes (such as terrorism, as the government originally claimed), or if it could be used to target citizens who download and share files online. The current party line, from flip-flopping Attorney-General George Brandis (whom some may remember from this train-wreck interview in which he attempted to define “metadata”) is that the new laws “can't be and they won't be” used to prosecute file sharers, because copyright infringement is only a civil offense. Except, of course, when it isn't. The only solution is the obvious one—not to require the collection and retention of the data in the first place.

Vos SMS furtifs Les services de sécurité envoient des milliers de SMS furtifs pour localiser des personnes et réactiver leur téléphone à distance. Une technologie jusque-là méconnue, et pas vraiment encadrée par le droit. L'affaire fait grand bruit chez les experts allemands, avec lesquels nous nous sommes entretenus. En France, plusieurs acteurs nous ont concédé, du bout des lèvres, que ce procédé était également utilisé. C’est une question au gouvernement qui nous a mis la puce à l’oreille. En juin 2011, Colette Giudicelli, sénatrice des Alpes Maritimes, écrit à Claude Guéant, ministre de l’intérieur : Plusieurs services de police judiciaire et de renseignement étrangers utilisent des SMS furtifs pour localiser des suspects ou des personnes disparues : cette méthode consiste à envoyer vers le téléphone portable de ce suspect un SMS qui passe inaperçu et renvoie un signal à l’émetteur du message. Sept mois plus tard, toujours pas de réponse du gouvernement. Souriez, vous êtes pistés Réactiver à distance

Are You Being Tracked? 8 Ways Your Privacy Is Being Eroded Online and Off | Media December 28, 2011 | Like this article? Join our email list: Stay up to date with the latest headlines via email. In a recent hearing before the Senate Judiciary Committee, Sen. Al Franken reminded his fellow Americans, “People have a fundamental right to control their private information.” Few people have ever heard about CIQ. Carrier IQ, located in Mountain View, CA, was founded in 2005 and is backed by a group of venture capitalists. At the hearing, Sen. Following Muller’s Senate testimony, Andrew Coward, Carrier IQ’s VP of marketing, told the Associated Press that the FBI is the only law enforcement agency to contact them for data. CIQ is emblematic of a growing number of ongoing battles that delineate the boundary of what, in the digital age, is personal, private life and information. 1. Sen. According to the company, its software is designed to improve mobile communications. Carrier IQ is not the only company being challenged over alleged tracking.

Australia’s metadata grab will create modern-day Stasi files Until the fall of the Berlin wall in 1989, the East German state security service – the Stasi – conducted surveillance and kept files on a third of the country’s population. One of those people was activist and dissident Ulrike Poppe, whose communications and activities were spied on by Stasi operatives constantly for 15 years. Much of the data that is contained in Poppe’s Stasi files, compiled during the Cold War, would today be considered “telecommunications metadata”. From locations, movements and meetings to relationships, affiliations and associates. Phone calls made and letters sent, as well as newspapers read and movies watched. During the Stasi’s reign, this type of intelligence was the product of covert bugs and undercover spies, a hugely intensive task that kept theirs 91,000 staff busy. Just like the spying perpetrated by the Stasi, metadata retention is a form of surveillance that is unacceptable in a democratic country.

Rendez-moi mes données ! Principales tendances motrices La crise de la relation de confiance entre individus et organisations et l’inquiétude montante en matière de données personnelles. L’évolution des attentes des consommateurs et des citoyens vers une plus grande maîtrise de leur vie. La prise de conscience de la valeur partagée des données : "open data", "big data"… Signes avant-coureurs Le mouvement Quantified Self : "Connais-toi toi-même par les chiffres." Augmenter le pouvoir d’achat des consommateurs en convaincant les entreprises de partager avec leurs clients toutes les informations personnelles dont elles disposent sur eux : tel est l’objectif du programme MiData que lance le gouvernement de David Cameron en 2011. Pourtant, les premiers résultats n’ont rien de spectaculaire. Les entreprises, ainsi que certaines administrations, apprennent à vivre en partageant leurs données avec leurs clients et usagers. Parallèlement, des effets pervers se dessinent. Qui est concerné ? Raisons de douter

Web Browsers Web browsers are software on your machine that communicate with servers or hosts on the Internet. Using a web browser causes data to be stored on your computer and logs to be stored on the web servers you visit, and frequently transmits unencrypted information. Until you have understood the mechanisms by which this occurs — and taken steps to prevent them — it is best to assume that anything you do with a web browser could be recorded by your own machine, by the web servers you're communicating with, or by any adversary that is able to monitor your network connection. Controlling and Limiting the Logs Kept by Your Browser Web browsers often retain a large amount of information about the way they are used. For example, here are the stored data privacy settings pages for Firefox, the free web browser: Apple’s Safari browser also has an easy one-click option to clear everything. Controlling and Limiting the Logs Kept By Web Servers Web Privacy is Hard Cookies Managing Adobe Flash Privacy.

Warning: Enrolling in Obamacare allows government to link your IP address with your name, social security number, bank accounts and web surfing habits - NaturalNews.com (NaturalNews) We have already established that Healthcare.gov is not a functioning database application that allows people to shop for competing health plans. It is actually a government-run Trojan Horse that suckers people into creating accounts where they hand over: • Name and address• Email address and password• Social security number• Private bank account details• Employer details and other information During the enrollment process, your computer also hands over your IP address which is then tied to your social security number. This IP address is then handed over to the NSA thanks to its new mega-black-hole data center in Utah, where your IP is cross-referenced with all website visits, including: • "Anti-government" websites• Porn sites• Gambling sites• File sharing sites• "Terrorism" support sites• Encryption service sites like Hushmail• Chat rooms, message boards and more Ponder the implications of this for a moment... As far as I'm concerned, the IRS can fine me all they want.

Oui, INDECT a bien été p0wn3d INDECT est un projet européen de surveillance globale des réseaux, cherchant à mettre en oeuvre des techniques de prévention des crimes et des comportements anormaux sur le réseau. Le projet INDECT vise à fliquer purement et simplement toute la population européenne sur Internet, un peu comme l’anticipait le film de science-fiction Minority Report. Le consortium regroupe 17 institutions européennes, pour la France c’est l’Ensimag de Grenoble. INDECT laisse évidement craindre le pire, à savoir la constitution d’un méga fichier européen issu de multiples croisements. Comme d’habitude INDECT cherche sa justification dans la lutte antiterroriste pour devenir prétexte à surveiller l’ensemble de la population de ses moindres faits et gestes. Et bien nous aussi on vous surveille… Le site web d’INDECT, Reflets le surveille depuis un moment, ce pour plusieurs raisons : Recueillir des informations sur le projetAdmirer les admins du site faire de la m#@$%! Faire de la m#@$%!

Hundreds of websites share usernames sans permission High performance access to file storage Home Depot, The Wall Street Journal, Photobucket, and hundreds of other websites share visitor's names, usernames, or other personal information with advertisers or other third parties, often without disclosing the practice in privacy policies, academic researchers said. Sixty-one percent of websites tested by researchers from Stanford Law School's Center for Internet and Society leaked the personal information, sometimes to dozens of third-party partners. The report comes as US officials have proposed a mandatory Do Not Track option for all websites. In the report, Jonathan Mayer, a Stanford graduate student who led the study, argued against the claim that the online tracking is anonymous. “We believe there is now overwhelming evidence that third-party web tracking is not anonymous,” he wrote. The report cited privacy policies of many of the websites that appeared to make no mention of the practice.

Eric Schmidt: "We Know Where You Are. We Know Where You've Been. We Can More Or Less Know What You're Thinking About." (GOOG) Google CEO Eric Schmidt really has a knack for expressing relatively benign ideas in a way that makes him and his company look incredibly creepy. The Atlantic has posted video of the full interview in which Eric talked about 'the creepy line', and it is chock full of unsettling sound bytes. In particular, he had the following to say on privacy: With your permission, you give us more information about you, about your friends, and we can improve the quality of our searches. We don't need you to type at all. We know where you are. That sounds absolutely terrifying. Check it out: Join the conversation about this story » See Also:

Related: