Sunday, February 28, 2010
Sunday, February 14, 2010
Obama doesn't want you to have privacy using a cellphone
Tuesday, January 19, 2010
FBI violates your privacy... again
An anonymous reader writes to tell us of a report from the Washington Post which alleges that the FBI "illegally collected more than 2,000 US telephone call records between 2002 and 2006 by invoking terrorism emergencies that did not exist or simply persuading phone companies to provide records."
Tuesday, December 01, 2009
Sprint served 8 million customer GPS coordinate requests to law enforcement in one year
Sprint Nextel provided law enforcement agencies with its customers' (GPS) location information over 8 million times between September 2008 and October 2009. This massive disclosure of sensitive customer information was made possible due to the roll-out by Sprint of a new, special web portal for law enforcement officers.If you build it, they will come... and infringe on your privacy.
Thursday, May 28, 2009
Homeland Security to Start Collecting Fingerprints at Airports
Monday, April 21, 2008
Michael Chertoff wants your fingerprints
Via thinkprogress, Schneier
Monday, December 03, 2007
Crossing the border? You're a terrorist!
Yet another opportunity for bigoted assumptions about the nature of terrorists and bad data to act as an excuse for the government to expand its power. A little imagination reveals what the scoring system might look like:In a round-the-clock operation, targeters match names against terrorist watch lists and a host of other data to determine whether a person's background or behavior indicates a terrorist threat, a risk to border security or the potential for illegal activity. They also assess cargo.
Each traveler assessed by the center is assigned a numeric score: The higher the score, the higher the risk. A certain number of points send the traveler back for a full interview.
+5 points if an Arab
+5 points if you are under 30
+5 points if you are dark-skinned
+5 points if you are wearing a turban
+5 points if you have no intention of returning to your home country
... and so on ...
+5 points if you look at the border officer the wrong way
+5 points if you assert your rights as a U.S. citizen
+5 points if you have recently attended a peace rally
+5 points if you have ever spoken against any policy of the political party in power
But, of course, DHS et al feel no accountability to any individual citizen, just like their no-fly (and other) lists. Once you've been marked as a terrorist (however apocryphal that label might be), just try getting off of it:
According to yesterday's notice, the program is exempt from certain requirements of the Privacy Act of 1974 that allow, for instance, people to access records to determine "if the system contains a record pertaining to a particular individual" and "for the purpose of contesting the content of the record."Scary.
Wednesday, August 29, 2007
Point and Click Surveillance
Columbia's Bellovin says the flaws are appalling and show that the FBI fails to appreciate the risk from insiders.
"The underlying problem isn't so much the weaknesses here, as the FBI attitude towards security," he says. The FBI assumes "the threat is from the outside, not the inside," he adds, and it believes that "to the extent that inside threats exist, they can be controlled by process rather than technology."
Bellovin says any wiretap system faces a slew of risks, such as surveillance targets discovering a tap, or an outsider or corrupt insider setting up unauthorized taps. Moreover, the architectural changes to accommodate easy surveillance on phone switches and the internet can introduce new security and privacy holes.
"Any time something is tappable there is a risk," Bellovin says. "I'm not saying, 'Don't do wiretaps,' but when you start designing a system to be wiretappable, you start to create a new vulnerability. A wiretap is, by definition, a vulnerability from the point of the third party. The question is, can you control it?"
Well it's a good thing that we can completely trust the FBI to understand the scope of its responsibilities and the limits of its power because it has never abused the privileges entrusted to it in the past. Oh, wait.
Friday, March 09, 2007
TIA is back with a new name (suprise!)

Be afraid. Be very afraid. TIA never went away, of course, when congress banned it in 2003. It simply got its name changed. Now it is known as ADVISE -- Analysis, Dissemination, Visualization, Insight and Semantic Enhancement. Nice doublespeak name. Infowars says it best:
"Shortly after the announcement of TIA, the Pentagon backtracked and told us that TIA was shutting down, but the tools are there waiting to be used, They'll just rename it and start it up again at any given time. The Tools of TIA include "LifeLog" which is described as "a multimedia, digital record of everywhere you go and everything you see, hear, read, say and touch". Another tool is the MATRIX database, A federally funded crime database run by multiple states at once.
<snip>
Wednesday, January 17, 2007
The military is now your personal accountant
Friday, December 29, 2006
Reading your email might not be a privacy invasion
Funny, I don't view my email, through which I send 90% of my correspondence to distant (and near) friends/family/associates/etc., as something that can be treated as a billboard...