B12 Solipsism

Spreading confusion over the internet since 1994

Archive for the ‘surveillance’ tag

Facebook conducting mass surveillance through its apps

without comments

Surveillance Society  Halsted and Division Edition
Surveillance Society – Halsted and Division Edition

The Guardian reports:

Facebook used its apps to gather information about users and their friends, including some who had not signed up to the social network, reading their text messages, tracking their locations and accessing photos on their phones, a court case in California alleges.

The claims of what would amount to mass surveillance are part of a lawsuit brought against the company by the former startup Six4Three, listed in legal documents filed at the superior court in San Mateo as part of a court case that has been ongoing for more than two years.

A Facebook spokesperson said that Six4Three’s “claims have no merit, and we will continue to defend ourselves vigorously”.

The allegations about surveillance appear in a January filing, the fifth amended complaint made by Six4Three. It alleges that Facebook used a range of methods, some adapted to the different phones that users carried, to collect information it could use for commercial purposes.

“Facebook continued to explore and implement ways to track users’ location, to track and read their texts, to access and record their microphones on their phones, to track and monitor their usage of competitive apps on their phones, and to track and monitor their calls,” one court document says.

(click here to continue reading Facebook accused of conducting mass surveillance through its apps | Technology | The Guardian.)

This is Facebook’s business model though, so what exactly are they going to argue? No, we don’t collect data on our users and then use this information to sell advertising to corporations? 

The one detail that is the most disturbing1 is that Facebook did this for people who weren’t Facebook users. How did these people consent? How do they request their data? How do they update their privacy settings?

Footnotes:
  1. and we’ve noted it previously []

Written by Seth Anderson

May 30th, 2018 at 9:06 am

Service Meant to Monitor Inmates’ Calls Could Track You, Too, and Probably Does

without comments

Cell Phone Evolution
Cell Phone Evolution

Cell phones are useful for a lot of things, but owning one does have consequences, like the ability for 3rd party organizations or government entities to track your location down to 25-50 feet at any time your phone is connected to a cell tower.

The NYT reports:

Senator Ron Wyden, Democrat of Oregon, wrote in a letter this week to the Federal Communications Commission that Securus confirmed that it did not “conduct any review of surveillance requests.” The senator said relying on customers to provide documentation was inadequate. “Wireless carriers have an obligation to take affirmative steps to verify law enforcement requests,” he wrote, adding that Securus did not follow those procedures.

The service provided by Securus reveals a potential weakness in a system that is supposed to protect the private information of millions of cellphone users. With customers’ consent, carriers sell the ability to acquire location data for marketing purposes like providing coupons when someone is near a business, or services like roadside assistance or bank fraud protection. Companies that use the data generally sign contracts pledging to get people’s approval — through a response to a text message, for example, or the push of a button on a menu — or to otherwise use the data legally.

But the contracts between the companies, including Securus, are “the legal equivalent of a pinky promise,” Mr. Wyden wrote. The F.C.C. said it was reviewing the letter.

Courts are split on whether investigators need a warrant based on probable cause to acquire location data. In some states, a warrant is required for any sort of cellphone tracking. In other states, it is needed only if an investigator wants the data in real time. And in others no warrant is needed at all.

Other experts said the law should apply for any communications on a network, not just phone calls. “If the phone companies are giving someone a direct portal into the real-time location data on all of their customers, they should be policing it,” said Laura Moy, the deputy director of the Georgetown Law Center on Privacy & Technology.

Mr. Wyden, in his letter to the F.C.C., also said that carriers had an obligation to verify whether law enforcement requests were legal. But Securus cuts the carriers out of the review process, because the carriers do not receive the legal documents.

The letter called for an F.C.C. investigation into Securus, as well as the phone companies and their protections of user data. Mr. Wyden also sent letters to the major carriers, seeking audits of their relationships with companies that buy consumer data. Representatives for AT&T, Sprint, T-Mobile and Verizon said the companies had received the letters and were investigating.

(click here to continue reading Service Meant to Monitor Inmates’ Calls Could Track You, Too – The New York Times.)

In this particular instance, the 3rd parties selling your location data is called 3Cinteractive and LocationSmart, but there are hundreds more such companies who have built their businesses on turning your location into sellable data, most of which are relatively obscure.

Securus received the data from a mobile marketing company called 3Cinteractive, according to 2013 documents from the Florida Department of Corrections. Securus said that for confidentiality reasons it could not confirm whether that deal was still in place, but a spokesman for Mr. Wyden said the company told the senator’s office it was. In turn, 3Cinteractive got its data from LocationSmart, a firm known as a location aggregator, according to documents from those companies. LocationSmart buys access to the data from all the major American carriers, it says.

How does it work?

CBS News:

 “Envision a cell site,” says Allen (a typical tower appears in the photo above). “They’re triangular, and each side has about 120 degrees of sweep.” Every time a signal is transmitted to a nearby phone, says Allen, there is a round-trip delay to the mobile device and back. By using all three sides of the triangle to “talk” to the mobile device, the tower can triangulate which edge of the base station is closest to the device. “Typically the accuracy return varies,” says Allen. “In urban settings, it can be accurate down to several blocks; in suburban settings, several hundred meters.”

“We can locate any subscriber,” says Allen, “and companies want all those subscribers to be addressable,” or discoverable. Normally, this requires passing through some privacy gateways, says Allen. “The end user must opt in through a Web portal or SMS, or an app like Foursquare,” he says, per “universal” CTIA and MMA guidelines, and carriers’ own privacy protocol.

But with enterprise services, there’s a catch. “In a workplace scenario, the corporate entity has the right to opt-in those devices,” says Allen. “The [employee] is typically notified, but the opt-in is up to the employer.”

In other words: if your employer owns your phone, tablet or 3G-enabled computer, they’re entitled to own your location, too.

(click here to continue reading iPhones as Homing Beacons: How AT&T and Verizon Help Companies Track Employees – CBS News.)

Apple Rising
Apple Rising

Even Apple, a corporation that prides itself on not selling users data as much as their competitors, has acknowledged that users data has sometimes been sold.

9To5 Mac reports:

Over the last few days, Apple has seemingly started cracking down on applications that share location data with third-parties. In such cases, Apple has been removing the application in question and informing developers that their app violates two parts of the App Store Review Guidelines…

Sylvania HomeKit Light Strip Thus far, we’ve seen several cases of Apple cracking down on these types of applications. The company informs developers via email that “upon re-evaluation,” their application is in violation of sections 5.1.1 and 5.1.2 of the App Store Review Guidelines, which pertain to transmitting user location data and user awareness of data collection.

Legal – 5.1.1 and Legal 5.1.2

The app transmits user location data to third parties without explicit consent from the user and for unapproved purposes.

Apple explains that developers must remove any code, frameworks, or SDKs that relate to the violation before their app can be resubmitted to the App Store

(click here to continue reading Apple cracking down on applications that send location data to third-parties | 9to5Mac.)

Written by Seth Anderson

May 11th, 2018 at 8:26 am

Trump worries that federal investigators may have seized recordings made by Cohen

without comments

You Are Being Film
You Are Being Film

Lordy, I hope there are tapes1

Ashley Parker, Carol D. Leonnig, Josh Dawsey and Tom Hamburger of the Washington Post report:

President Trump’s personal attorney Michael D. Cohen sometimes taped conversations with associates, according to three people familiar with his practice, and allies of the president are worried that the recordings were seized by federal investigators in a raid of Cohen’s office and residences this week.

Cohen, who served for a decade as a lawyer at the Trump Organization and is a close confidant of Trump, was known to store the conversations using digital files and then replay them for colleagues, according to people who have interacted with him.

“We heard he had some proclivity to make tapes,” said one Trump adviser, who spoke on the condition of anonymity because of the ongoing investigation. “Now we are wondering, who did he tape? Did he store those someplace where they were actually seized? . . . Did they find his recordings?”

(click here to continue reading Trump’s allies worry that federal investigators may have seized recordings made by his attorney – The Washington Post.)

Especially funny is that Michael Cohen2 made tapes because “Spanky” Trump so often bragged about how he taped conversations, despite the fact that Trump never actually took the time to create a system to record conversations.

You Wanted To Disappear
You Wanted To Disappear

WaPo:

 

Tim O’Brien, a Trump biographer and executive editor of Bloomberg View, wrote a column in the wake of Trump’s taping claim saying that Comey likely had little reason to worry. In the piece, O’Brien recounted that Trump frequently made a similar boast to him.

 

“Back in the early 2000s, Trump used to tell me all the time that he was recording me when I covered him as reporter for the New York Times,” O’Brien wrote. “He also said the same thing when I was writing a biography of him, ‘Trump Nation.’ I never thought he was, but who could be sure?”

 

But after Trump sued him for libel shortly after his biography came out, O’Brien’s lawyers deposed Trump in December 2007 — during which Trump admitted he had not, in fact, clandestinely taped O’Brien.

 

“I’m not equipped to tape-record,” Trump said in the deposition. “I may have said it once or twice to him just to — on the telephone, because everything I said to him he’d write incorrectly; so just to try and keep it honest.”

 

 

(click here to continue reading Trump’s allies worry that federal investigators may have seized recordings made by his attorney – The Washington Post.)

I’d say the odds are greater than 50/50 that Trump was recorded by Cohen saying something of interest to federal prosecutors, and that the Feds have a copy of this recording or recordings, and that Trump is stress-peeing on a rug in the Oval Office right now.

Footnotes:
  1. said everyone at the same time, except for Trump and his thugs []
  2. allegedly []

Written by Seth Anderson

April 12th, 2018 at 9:36 pm

Posted in crime,politics

Tagged with , , ,

Facebook’s Role in Data Misuse Sets Off a Storm on Two Continents

without comments

Helicopter with Camera
Helicopter with Camera

The big news over the weekend was how Facebook, Trump and Cambridge Analytica worked together to weaponize people’s personal information against them to help Trump win the 2016 election, perhaps with the assistance of Russia. The truth is this harvesting and manipulation of data is Facebook’s model, and anyone who uses Facebook is participating. Facebook is “free”, how exactly do you think they make their billions?

American and British lawmakers demanded on Sunday that Facebook explain how a political data firm with links to President Trump’s 2016 campaign was able to harvest private information from more than 50 million Facebook profiles without the social network’s alerting users. The backlash forced Facebook to once again defend the way it protects user data.

Senator Amy Klobuchar of Minnesota, a Democratic member of the Senate Judiciary Committee, went so far as to press for Mark Zuckerberg, Facebook’s chief executive, to appear before the panel to explain what the social network knew about the misuse of its data “to target political advertising and manipulate voters.”

The calls for greater scrutiny followed reports on Saturday in The New York Times and The Observer of London that Cambridge Analytica, a political data firm founded by Stephen K. Bannon and Robert Mercer, the wealthy Republican donor, had used the Facebook data to develop methods that it claimed could identify the personalities of individual American voters and influence their behavior. The firm’s so-called psychographic modeling underpinned its work for the Trump campaign in 2016, though many have questioned the effectiveness of its techniques.

But Facebook did not inform users whose data had been harvested. The lack of disclosure could violate laws in Britain and in many American states.

(click here to continue reading Facebook’s Role in Data Misuse Sets Off a Storm on Two Continents – The New York Times.)

Even the Faux Walls have eyes
Even the Faux Walls have eyes

If you have time, you should read the tale of the ex-Cambridge Analytica whisteblower, Christopher Wylie in The Guardian/Observer.

which includes this revelation:

Dr Kogan – who later changed his name to Dr Spectre, but has subsequently changed it back to Dr Kogan – is still a faculty member at Cambridge University, a senior research associate. But what his fellow academics didn’t know until Kogan revealed it in emails to the Observer (although Cambridge University says that Kogan told the head of the psychology department), is that he is also an associate professor at St Petersburg University. Further research revealed that he’s received grants from the Russian government to research “Stress, health and psychological wellbeing in social networks”. The opportunity came about on a trip to the city to visit friends and family, he said.

There are other dramatic documents in Wylie’s stash, including a pitch made by Cambridge Analytica to Lukoil, Russia’s second biggest oil producer. In an email dated 17 July 2014, about the US presidential primaries, Nix wrote to Wylie: “We have been asked to write a memo to Lukoil (the Russian oil and gas company) to explain to them how our services are going to apply to the petroleum business. Nix said that “they understand behavioural microtargeting in the context of elections” but that they were “failing to make the connection between voters and their consumers”. The work, he said, would be “shared with the CEO of the business”, a former Soviet oil minister and associate of Putin, Vagit Alekperov.

“It didn’t make any sense to me,” says Wylie. “I didn’t understand either the email or the pitch presentation we did. Why would a Russian oil company want to target information on American voters?”

Lukoil is a private company, but its CEO, Alekperov, answers to Putin, and it’s been used as a vehicle of Russian influence in Europe and elsewhere – including in the Czech Republic, where in 2016 it was revealed that an adviser to the strongly pro-Russian Czech president was being paid by the company.

When I asked Bill Browder – an Anglo-American businessman who is leading a global campaign for a Magnitsky Act to enforce sanctions against Russian individuals – what he made of it, he said: “Everyone in Russia is subordinate to Putin. One should be highly suspicious of any Russian company pitching anything outside its normal business activities.”

Odd.

(click here to continue reading ‘I made Steve Bannon’s psychological warfare tool’: meet the data war whistleblower | News | The Guardian.)

The attention led to Facebook suspending Mr. Wylie’s Facebook and Instagram accounts…

Techcrunch reports

In the latest turn of the developing scandal around how Facebook’s user data wound up in the hands of Cambridge Analytica — for use in the in development in psychographic profiles that may or may not have played a part in the election victory of Donald Trump — the company has taken the unusual step of suspending the account of the whistleblower who helped expose the issues.

(click here to continue reading Facebook has suspended the account of the whistleblower who exposed Cambridge Analytica | TechCrunch.)

Alexis Madrigal of The Atlantic writes:

Academic researchers began publishing warnings that third-party Facebook apps represented a major possible source of privacy leakage in the early 2010s. Some noted that the privacy risks inherent in sharing data with apps were not at all clear to users. One group termed our new reality “interdependent privacy,” because your Facebook friends, in part, determine your own level of privacy.

For as long as apps have existed, they have asked for a lot of data and people have been prone to give it to them. Back in 2010, Penn State researchers systematically recorded what data the top 1,800 apps on Facebook were asking for. They presented their results in 2011 with the paper “Third-Party Apps on Facebook: Privacy and the Illusion of Control.” The table below shows that 148 apps were asking for permission to access friends’ information.

But The Guardian’s reporting suggests that the company’s efforts to restuff Pandora’s box have been lax. Wylie, the whistleblower, received a letter from Facebook asking him to delete any Facebook data nearly two years after the existence of the data was first reported. “That to me was the most astonishing thing,” Wylie told The Guardian. “They waited two years and did absolutely nothing to check that the data was deleted. All they asked me to do was tick a box on a form and post it back.”

But even if Facebook were maximally aggressive about policing this kind of situation, what’s done is done. It’s not just that the data escaped, but that Cambridge Analytica almost certainly learned everything they could from it. As stated in The Guardian, the contract between GSR and Strategic Communications Laboratories states, specifically, “The ultimate product of the training set is creating a ‘gold standard’ of understanding personality from Facebook profile information.”

It’s important to dwell on this. It’s not that this research was supposed to identify every U.S. voter just from this data, but rather to develop a method for sorting people based on Facebook’s profiles. Wylie believes that the data was crucial in building Cambridge Analytica’s models. It certainly seems possible that once the “training set” had been used to learn how to psychologically profile people, this specific data itself was no longer necessary. But the truth is that no one knows if the Kogan data had much use out in the real world of political campaigning. Psychological profiling sounds nefarious, but the way that Kogan and Cambridge Analytica first attempted to do it may well have proven, as the company maintains, “fruitless.”

(click here to continue reading Cambridge Analytica and the Dangers of Facebook Data-Harvesting – The Atlantic.)

The way I personally deal with Facebook is by seeding it with incorrect information whenever I can, and by being diligent about deleting Facebook cookies from my browsers. Of course, I’m sure they know way too much about me, but at least some of their information is wrong.

Facebook Cookies
Facebook Cookies.PNG

Written by Seth Anderson

March 19th, 2018 at 9:27 am

Posted in Business,politics

Tagged with , ,

Firm Says Voter Data Set Left Unprotected Online

without comments

Democratic Primary Ballot
Democratic Primary Ballot

Kinda seems like a big deal, though this sort of information is in all sorts of databases, public and private…

A computer-security company said that a proprietary data set containing personal information on nearly 200 million American voters and their predicted voting behavior was left unprotected online, in a large cache of spreadsheets and other electronic files.

According to security company UpGuard, the information, which was available on a public server accessible by anyone via the internet, was compiled by consulting firm Deep Root Analytics, which helps Republican campaigns choose which voters to target with TV advertising.

The voter records, which are public information, were augmented with proprietary analysis about voter behavior by Deep Root, which tries to predict voters’ policy preferences and how likely they are to choose a particular candidate.

The voter information, portions of which were reviewed by The Wall Street Journal, includes the names and other personally identifying information about 198 million registered voters, which would appear to be nearly all of the estimated registered voters in the U.S., the company found. The information includes dates of birth, mailing addresses and party affiliation, as well as self-reported racial demographics, according to Mr. Vickery, but didn’t include social security numbers or financial information.

Registration information about individual voters is available from state and county election boards to anyone who requests it, though compiling it all in one place would take a significant amount of time and labor, and it wouldn’t contain any predictions about voter behavior.

 

(click here to continue reading Computer-Security Firm Says Voter Data Set Left Unprotected Online – WSJ.)

Written by Seth Anderson

June 19th, 2017 at 3:24 pm

Posted in politics

Tagged with ,

Illinois Senate approves Right to Know online privacy bill

without comments

Eye see u Willis
Eye see u 

Hmm, good news, though I expect Governor Rauner to veto it, for reasons…

The state Senate on Thursday approved the groundbreaking Right to Know Act, a measure that would require online companies such as Google, Facebook and Amazon to disclose to consumers what data about them has been collected and shared with third parties.

The bill, sponsored by Sen. Michael Hastings, D-Tinley Park, now heads to the Illinois House after passing on a 31-21 vote.

“I think this is a step forward for Illinois in terms of data privacy,” Hastings said Friday. “It gives people the right to know what information (internet companies are) selling to a third party.”

Illinois is taking center stage in the national debate over internet privacy legislation, which is shifting from the federal to state level. Congress voted in March to undo the Federal Communications Commission’s broadband privacy rules, which were adopted last fall under the Obama administration and set to go into effect this year.

President Donald Trump on April 3 signed the measure that repealed the broadband privacy rules.

The FCC protections would have required internet service providers, such as Comcast, Verizon and AT&T, to disclose what personal information they collect and share and would have required consent from consumers before sharing more sensitive information.

Privacy advocates believe Illinois and other states must step up to fill the void left by the shift in federal policy.

The Right to Know Act would require the operator of a commercial website or online service to make available “certain specified information” that has been disclosed to a third party and to provide an email address or toll-free telephone number for customers to request that information.

Major internet companies have been pushing back against the Illinois initiative, ramping up lobbying efforts as the privacy legislation advanced through the Senate, Hastings said. Online trade associations, including CompTIA, the Internet Association and NetChoice, also met with Hastings to voice opposition to the measure.

The Senate bill will head to committee in the House before it can be brought to a vote. A House committee approved a similar measure last month.

(click here to continue reading Illinois Senate approves Right to Know online privacy bill – Chicago Tribune.)

No Repercussions For You Yet
No Repercussions For You Yet

Of course the technology companies who have been profiting handsomely by selling our information are opposed to this bill, but that doesn’t mean it isn’t a good idea for consumers. I want, at minimum, to be able to share in the profits, and even better, a way to opt out entirely. Ha. Just for grins, read the text of the IL Senate bill to see what kinds of information being sold.

For instance:

(a) real name, alias, nickname, and user name.

(b) Address information, including, but not limited to, postal or e-mail.

(c) Telephone number.

(d) Account name.

(e) Social security number or other government-issued identification number, including, but not limited to, social security number, driver’s license number, identification card number, and passport number.

(f) Birthdate or age.

(g) Physical characteristic information, including, but not limited to, height and weight.

(h) Sexual information, including, but not limited to, sexual orientation, sex, gender status, gender identity, and gender expression.

(i) Race or ethnicity.

(j) Religious affiliation or activity.

(k) Political affiliation or activity.

(l) Professional or employment-related information.

(m) Educational information.

(n) Medical information, including, but not limited to, medical conditions or drugs, therapies, mental health, or medical products or equipment used.

(o) Financial information, including, but not limited to, credit, debit, or account numbers, account balances, payment history, or information related to assets, liabilities, or general creditworthiness.

(p) Commercial information, including, but not limited to, records of property, products or services provided, obtained, or considered, or other purchasing or consumer histories or tendencies.

(q) Location information.

(r) Internet or mobile activity information, including, but not limited to, Internet protocol addresses or information concerning the access or use of any Internet or mobile-based site or service.

(s) Content, including text, photographs, audio or video recordings, or other material generated by or provided by the customer.

Are you ok with Acxiom, Experian and other similar corporations collecting, collating, selling and re-selling this information about you? I’m not.

Written by Seth Anderson

May 6th, 2017 at 9:01 am

Posted in Business,government

Tagged with ,

Smart TVs Just as George Orwell Envisioned

without comments

You Are Being Film
You Are Being Film. 

As I mentioned recently, I’ve been immersed in dystopian novels. George Orwell would mutter I told you so about these latest Smart TV revelations if he was still around.

Careful what you say around your TV. It may be listening. And blabbing. A single sentence buried in a dense “privacy policy” for Samsung’s Internet-connected SmartTV advises users that its nifty voice command feature might capture more than just your request to play the latest episode of Downton Abbey. “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party,” the policy reads.

Samsung’s privacy policy notes that in addition to voice commands being transmitted, information about your device, “including device identifiers,” may also be beamed over the Internet to the third-party service, “or to the extent necessary to provide Voice Recognition features to you.”
McSherry called that bit of qualifying language “worrisome.”

“Samsung may just be giving itself some wiggle room as the service evolves, but that language could be interpreted pretty broadly,” she said.

(click here to continue reading Your Samsung SmartTV Is Spying on You, Basically – The Daily Beast.)

Samsung eventually admitted the 3rd party:

Samsung has confirmed that its “smart TV” sets are listening to customers’ every word, and the company is warning customers not to speak about personal information while near the TV sets.

The company revealed that the voice activation feature on its smart TVs will capture all nearby conversations. The TV sets can share the information, including sensitive data, with Samsung as well as third-party services.

Samsung has updated its policy and named the third party in question, Nuance Communications, Inc.

(click here to continue reading Samsung warns customers not to discuss personal information in front of smart TVs.)

Lonely Zenith
Lonely Zenith

Hmm, sounds familiar. Remember this from a few weeks ago:

Consumers have bought more than 11 million internet-connected Vizio televisions since 2010. But according to a complaint filed by the FTC and the New Jersey Attorney General, consumers didn’t know that while they were watching their TVs, Vizio was watching them. The lawsuit challenges the company’s tracking practices and offers insights into how established consumer protection principles apply to smart technology.

Starting in 2014, Vizio made TVs that automatically tracked what consumers were watching and transmitted that data back to its servers. Vizio even retrofitted older models by installing its tracking software remotely. All of this, the FTC and AG allege, was done without clearly telling consumers or getting their consent.

What did Vizio know about what was going on in the privacy of consumers’ homes? On a second-by-second basis, Vizio collected a selection of pixels on the screen that it matched to a database of TV, movie, and commercial content. What’s more, Vizio identified viewing data from cable or broadband service providers, set-top boxes, streaming devices, DVD players, and over-the-air broadcasts. Add it all up and Vizio captured as many as 100 billion data points each day from millions of TVs.

Vizio then turned that mountain of data into cash by selling consumers’ viewing histories to advertisers and others. And let’s be clear: We’re not talking about summary information about national viewing trends. According to the complaint, Vizio got personal. The company provided consumers’ IP addresses to data aggregators, who then matched the address with an individual consumer or household. Vizio’s contracts with third parties prohibited the re-identification of consumers and households by name, but allowed a host of other personal details – for example, sex, age, income, marital status, household size, education, and home ownership.  And Vizio permitted these companies to track and target its consumers across devices.

(click here to continue reading What Vizio was doing behind the TV screen | Federal Trade Commission.)

Continuous Video Recording in Progress
Continuous Video Recording in Progress

You didn’t realize that your habits were worth so much money to the corporate surveillance world did you? Too bad the data mining industry doesn’t share in any of the profits they’ve harvested from your habits and propensities.

Plus the whole listening to you every second might not always be in your own best interests:

Upon further investigation, however, police began suspecting foul play: Broken knobs and bottles, as well as blood spots around the tub, suggested there had been a struggle. A few days later, the Arkansas chief medical examiner ruled Collins’s death a homicide — and police obtained a search warrant for Bates’s home.

Inside, detectives discovered a bevy of “smart home” devices, including a Nest thermostat, a Honeywell alarm system, a wireless weather monitoring system and an Amazon Echo. Police seized the Echo and served a warrant to Amazon, noting in the affidavit there was “reason to believe that Amazon.com is in possession of records related to a homicide investigation being conducted by the Bentonville Police Department.”

That warrant threw a wrinkle into what might have been a traditional murder investigation, as first reported by the Information, a news site that covers the technology industry.

While police have long seized computers, cellphones and other electronics to investigate crimes, this case has raised fresh questions about privacy issues regarding devices like the Amazon Echo or the Google Home, voice-activated personal command centers that are constantly “listening.” Namely, is there a difference in the reasonable expectation of privacy one should have when dealing with a device that is “always on” in one’s own home?

The Echo is equipped with seven microphones and responds to a “wake word,” most commonly “Alexa.” When it detects the wake word, it begins streaming audio to the cloud, including a fraction of a second of audio before the wake word, according to the Amazon website.

A recording and transcription of the audio is logged and stored in the Amazon Alexa app and must be manually deleted later. For instance, if you asked your Echo, “Alexa, what is the weather right now?” you could later go back to the app to find out exactly what time that question was asked.

(click here to continue reading Can Alexa help solve a murder? Police think so — but Amazon won’t give up her data. – The Washington Post.)

Luckily, my “dumb” tv still chugs along…

 

Update: the Samsung story is from 2015, the Amazon and the Vizio stories are more recent. Main point still stands however…

Written by Seth Anderson

February 16th, 2017 at 9:54 am

Biometrics For Feds, Not For Thee

without comments

Do You Recognize Me Now?
Do You Recognize Me Now?

Speaking of biometrics, and facial recognition, both key components of the REAL ID Act of 2005, Illinois doesn’t allow private businesses to do scans of your face, at least as of today.

The Biometric Information Privacy Act of Illinois is not a law many are familiar with. But if you have ever shared a photo on social media, the little-known statute turns out to be one of the nation’s toughest regulations for how companies like Facebook and Google can use facial recognition technologies to identify you online.

For now.

On Thursday, an Illinois state senator, Terry Link, introduced an amendment that would have weakened the law by exempting photo-tagging technologies that are now commonly used on social media. The proposal also had the potential to extinguish several class-action lawsuits against technology companies like Facebook by retroactively removing the right of Illinois citizens to sue companies that might have broken the law in the past.

The amendment was lobbied for by Facebook, according to a person involved in the effort who spoke on the condition of anonymity. And it helps to illustrate how from drone aircraft to genetic information and statutes that govern how companies sell consumer information to data miners, tech companies are in a capital to capital fight to keep new laws from being passed or to soften those already on the books.

“The Illinois biometric privacy act is one of the best new privacy laws in the country,” said Marc Rotenberg, president of the Electronic Privacy Information Center. “It’s bad news for consumers when Internet companies start lobbying against good privacy laws.”

(click here to continue reading Tech Companies Take Their Legislative Concerns to the States – The New York Times.)

If the federal government wants to create a database with everyone’s face, no problem. But Facebook, Google or LinkedIn? Not so fast.

For what it is worth, I’d vote that neither Facebook nor the Feds have this kind of information. 

Written by Seth Anderson

May 28th, 2016 at 12:00 pm

Posted in Business,government

Tagged with ,

Illinois Takes Step Toward Real ID Compliance

without comments

Revolution of The Innocent
Revolution of The Innocent…

Slightly more information on how Illinois is moving along to become in compliance with the REAL ID Act of 2005, despite grumblings from civil libertarians and others wary of a national ID system.

Applicants will have their photograph taken at a local office and a digital copy will be submitted immediately to Springfield for comparison in a pool of several million digital photos, according to Jim Burns, inspector general for the secretary of state’s office.

“We have in Illinois one of the better facial recognition systems in the country,” he said.

 …

Illinois is among 27 states either not in compliance or taking steps to comply with the Real ID Act. Under this act, stricter identification is required to pass through airport security and enter federal buildings. Homeland Security earlier this year postponed the deadline for states to comply to 2018.

Homeland Security also will accept the temporary paper document in conjunction with an old driver’s license or ID card to board an aircraft until the permanent card arrives in the mail.

Congress passed the law in 2005 after a 9/11 Commission recommendation to take steps that would make it tougher to counterfeit government-issued IDs.

Critics of Real ID, such as the American Civil Liberties Union, have complained that it is a blatant invasion of privacy and would make people vulnerable to identity theft.

Ed Yohnka, director of communications at American Civil Liberties Union of Illinois, said he believes Illinois and other states have been doing a good job protecting peoples’ identities, and switching to a national identification card would do more harm than good.

“Congress ought to pull the plug on this,” he said. “It creates a national identification system that puts people at a greater risk of having their identity stolen.

“They talk about this in terms of it being for safety and security, but there is no evidence that it adds any of those things,” Yohnka said. “But what we do know is that it creates this powerful dynamic that can be used for surveillance.

“Once you have this national database, the only natural thing to do next is to take it and begin to use it to track people,” Yohnka said. “Then you are just creating a huge surveillance system, and that’s the real danger.”

Yohnka said if Real ID is developed, the government would have the potential to track what people buy and where they go.

 

(click here to continue reading Illinois Takes Step Toward Real ID Compliance.)

Even with the new procedures, IL is still only 84% in compliance, whatever that really means. And by the way, for a state already in budgetary trouble, here’s an extra expense:

The system will cost the state an additional $8.3 million in vendor and postage costs a year, said Nathan Maddox, [ Illinois Secretary of State Jesse] White’s senior legal adviser. The state plans to use a fund dedicated to driver’s license upgrades to pay for the new system.

“We have been making steady progress in implementing Real ID,” Maddox said. “We’ve met approximately 84 percent of the requirements.”

Written by Seth Anderson

May 28th, 2016 at 11:20 am

REAL ID in Illinois

without comments

Shake It Off
Shake It Off, You Can Do Nothing…

The 42nd Ward’s weekly email notes that Illinois will soon be in compliance with the1 REAL ID Act that we’ve scoffed at a few times before…

Illinois Secretary of State Jesse White announced that his office is upgrading security features to the Driver’s License/ID card design and expanding the central issuance process for driver’s licenses and ID cards to all applicants. With implementation of these changes, Illinois has moved closer to achieving full REAL ID compliance, which is a federal mandate of the U.S. Department of Homeland Security (DHS).   By the end of July, applicants visiting Driver Services facilities will no longer be issued a new permanent DL/ID card at the end of the application process. Instead, they will leave the facility with a temporary, secure paper driver’s license, which is valid for 45 days and will serve as their DL/ID for driving purposes and proof of identification. The temporary, secure paper driver’s license or ID card will contain a photo and the basic information that appears on the permanent driver’s license or ID card. In addition, the facility employee will return the old DL/ID card back to the applicant after punching a hole in it.

Meanwhile, the applicant’s information will be sent to a centralized, secure facility in Illinois. After fraud checks have been conducted to ensure the applicant’s identity, a higher quality, more secure DL/ID will be printed and sent via U.S. mail within 15 business days to the applicant’s address.

For purposes of air travel, DHS states that it will accept the temporary document in conjunction with the old DL/ID to board an aircraft until the permanent card arrives in the mail. Illinois joins 39 other states that have moved to centralized production of DL/ID cards.

Illinois DL/IDs will continue to be accepted as primary forms of identification to board commercial airplanes for domestic travel until January 22, 2018.

(click here to continue reading 42nd Ward Update: Respect. Honor. Remember. Chicago’s Memorial Day Parade and Wreath Laying Ceremony.)

The full press release, if you are curious (PDF file)…

The Check Is In The Mail
The Check Is In The Mail

Fine, whatever, as long as the damn thing doesn’t get lost in the maw of the unreliable Chicago mail – seriously, what percentage of these DL/ID cards will be left to burn under a dumpster?

10%?

30%?

5%?

What percent will be delivered to the wrong address? I’d estimate that our building gets several erroneously delivered pieces of mail a week. Often inconsequential direct mail, but often checks, invoices, utility bills, magazines, and so on.  Let’s hope the Chicago branch of the USPS takes special care to deliver these new driver licenses…

Footnotes:
  1. ridiculous []

Written by Seth Anderson

May 28th, 2016 at 10:27 am

Thursday Leftovers – Plate 3

without comments

A few scraps of news discovered on my browser recently. Or is it in my browser?

Federal Bureau of Investigation Chicago Division
Federal Bureau of Investigation Chicago Division…

Jimmy Comey, FBI director, seems to be of the mind that the only way that police can do their jobs is if they are allowed to be a military invading force, civil liberties be damned. If a cop is worried about his actions being controversial, perhaps the actions are the problem, not the videotape? Comey must want to be fired, the last time this topic came up, the White House vehemently disagreed via multiple channels. What will happen this time? Also am heartened to read the comments to this article, for once, 90% of the comments are thoughtful, and most agree that Comey is way out of line.

The director of the F.B.I. reignited the factious debate over a so-called “Ferguson effect” on Wednesday, saying that he believed less aggressive policing was driving an alarming spike in murders in many cities.

James Comey, the director, said that while he could offer no statistical proof, he believed after speaking with a number of police officials that a “viral video effect” — with officers wary of confronting suspects for fear of ending up on a video — “could well be at the heart” of a spike in violent crime in some cities.

“There’s a perception that police are less likely to do the marginal additional policing that suppresses crime — the getting out of your car at 2 in the morning and saying to a group of guys, ‘Hey, what are you doing here?’” he told reporters.

(click here to continue reading F.B.I. Director Says ‘Viral Video Effect’ Blunts Police Work – The New York Times.)

FBI Anti-Piracy Warning
FBI Anti-Piracy Warning…

The FBI wants free reign to watch you, however, by installing malware on your devices at their whim, without even a warrant…

n an interview with Gizmodo, Senator Ron Wyden revealed that he’ll introduce legislation next week that, if passed, would stop the recent Supreme Court change to what’s known as “Rule 41,” which gave the government broader hacking power.

The Department of Justice has been pushing for the rule change for years, and it was finally granted by the Supreme Court in April. The new rule allows federal judges to grant warrants to agencies like the FBI to deploy “Network Investigative Techniques” (malware) to search any number of computers, be it 10 or 100,000, even if they don’t know what jurisdiction the computers are in. The rule change also allows judges to grant warrants to search the computers of victims of cybercrime, even if that person hasn’t been suspected of a crime. Congress has six months to oppose the rule change or else it will automatically go into effect.

Then there’s the question of infecting computers with malware in order to search them. In an interview with Gizmodo, Senator Wyden aired his concerns.

“By compromising computer systems, it could leave it open to other attackers. What if the government has to turn off the computer’s protections to search it?,” he said. “So if the government is out there turning of millions of security features in order to search computers, my view is that there could be some serious security threats.”

The legislation Wyden plans to introduce next week will be just one sentence, simply stating that the changes to rule 41 will not go into effect.

“What I hope is that the House and Senate Judiciary committees will start looking into the rule,” Wyden said. “They’ll start looking at our bill and and Senators would realize that this is the question for the Congress. An agency like the Department of Justice shouldn’t just be able to wave its arms around and grant itself vast new powers. The changes to rule 41 dramatically expand the government’s hacking authority.”

(click here to continue reading Senators Are Trying to Stop the Supreme Court’s Bullshit New Hacking Rule.)

You Are Being Film
You Are Being Film

or your Amazon Echo, if you are foolish enough to own one…

Back in March, I filed a Freedom of Information request with the FBI asking if the agency had ever wiretapped an Amazon Echo. This week I got a response: “We can neither confirm nor deny…”

We live in a world awash in microphones. They’re in our smartphones, they’re in our computers, and they’re in our TVs. We used to expect that they were only listening when we asked them to listen. But increasingly we’ve invited our internet-connected gadgets to be “always listening.” There’s no better example of this than the Amazon Echo.

In many ways the Echo is a law enforcement dream.

(click here to continue reading The FBI Can Neither Confirm Nor Deny Wiretapping Your Amazon Echo.)

A Good Dinner Party
A Good Dinner Party

Philosophy, and most Liberal Arts programs, in my experience, are weighted heavily towards Europe, mostly Northern Europe really.

The vast majority of philosophy departments in the United States offer courses only on philosophy derived from Europe and the English-speaking world. For example, of the 118 doctoral programs in philosophy in the United States and Canada, only 10 percent have a specialist in Chinese philosophy as part of their regular faculty. Most philosophy departments also offer no courses on Africana, Indian, Islamic, Jewish, Latin American, Native American or other non-European traditions. Indeed, of the top 50 philosophy doctoral programs in the English-speaking world, only 15 percent have any regular faculty members who teach any non-Western philosophy.

Given the importance of non-European traditions in both the history of world philosophy and in the contemporary world, and given the increasing numbers of students in our colleges and universities from non-European backgrounds, this is astonishing. No other humanities discipline demonstrates this systematic neglect of most of the civilizations in its domain. The present situation is hard to justify morally, politically, epistemically or as good educational and research training practice.

This is not to disparage the value of the works in the contemporary philosophical canon: Clearly, there is nothing intrinsically wrong with philosophy written by males of European descent; but philosophy has always become richer as it becomes increasingly diverse and pluralistic. Thomas Aquinas (1225-1274) recognized this when he followed his Muslim colleagues in reading the work of the pagan philosopher Aristotle, thereby broadening the philosophical curriculum of universities in his own era. We hope that American philosophy departments will someday teach Confucius as routinely as they now teach Kant, that philosophy students will eventually have as many opportunities to study the “Bhagavad Gita” as they do the “Republic,” that the Flying Man thought experiment of the Persian philosopher Avicenna (980-1037) will be as well-known as the Brain-in-a-Vat thought experiment of the American philosopher Hilary Putnam (1926-2016), that the ancient Indian scholar Candrakirti’s critical examination of the concept of the self will be as well-studied as David Hume’s, that Frantz Fanon (1925-1961), Kwazi Wiredu (1931- ), Lame Deer (1903-1976) and Maria Lugones will be as familiar to our students as their equally profound colleagues in the contemporary philosophical canon. But, until then, let’s be honest, face reality and call departments of European-American Philosophy what they really are.

 

(click here to continue reading If Philosophy Won’t Diversify, Let’s Call It What It Really Is – The New York Times.)

Haze of Purple
Haze of Purple

An interesting and brief history of the purple bag that Crown Royal Whiskey is sold with:

If you’ve ever bought a bottle of Crown Royal Canadian whisky, you know the iconic bag, that ubiquitous purple “velvet” satchel with gold stitching and tasseled drawstring. Nearly everyone has one, even if they’re unsure where it is, or even how they got it. They’re impossible to throw away, and are just the right size, perfect for, say, a camera lens, weed stash, or as a relative used it for, an old set of dentures. Heck, I had one moons before I even knew about the whisky, and was probably using it to store Tiddlywinks, or my Indian Head pennies.

The bag does go back generations. In fact, the Canadian distillery’s first batch of hooch was blended in 1939 for the premier visit to the Americas by none other than England’s King George VI and his wife, Queen Elizabeth. No reigning British monarch had ever set foot on the continent. Upon hearing of the impending visit, Seagrams Chairman Samuel Bronfman sought to create a whisky, well, suitable for a king. He was said to have sampled six hundred blends before approving the recipe, the etched-glass crown-shape bottle and cap and now-venerable purple bag, the color chosen to imbue royalty.

For many subsequent years, the purple bag and its contents remained under wraps in Canada. That ended in the 1960s, when some enterprising Canadians, having packed some purple pouches, headed for oil-rich Texas. After that the blended whisky and their bags were also sold in the United States.

(click here to continue reading For Keeps – The Awl.)

Instagram 8 logo
Instagram 8 logo

Instagram 8 introduced a new logo. I’m meh about it, I don’t like it, but I’m not having a tantrum. I do use Instagram a few times a week, by the way, here’s my page. Anyway, a discussion of the logo change itself is more interesting:

The skeuomorphic camera icon that has accompanied Instagram until today is a modern-day classic. Not because it’s good — it’s not, really — but because of its omnipresence in users’ phone screens. I bet it’s on the home screen of 99% of people who have the app and who tap it very regularly. When the iPhone first came out — if you’ll remember — skeuomorphism was the default aesthetic and now, for better or worse, it’s all about flat design with a dash of optional gradients so it’s no surprise that’s where Instagram has headed. If there was any surprise it’s that Instagram held on to the skeuomorphism for a relatively long five years.

I doubt anyone will be making cakes and cookies in the shape of the new Instagram logo and that’s the biggest problem the new logo faces: it’s not the old logo. The ensuing shitstorm on the internet today will be epic. About 75% of the negative reaction will be simply to the fact that it has changed and the other 25% will be to the not-quite-fact that there is a generic aesthetic to the new icon where it could be a “camera” icon for the upcoming smart microwave from Apple or whatever other user interface you would imagine. This is not to say it’s a bad-looking icon, no… as far as camera icons go, this is quite lovely and has the minimal amount of elements necessary to be recognized as a camera BUT not the minimal amount of elements necessary to be recognized as Instagram.

(click here to continue reading Brand New: New Icon for Instagram done In-house.)

Make Sidewalks Great Again
Make Sidewalks Great Again

Trump is so thin skinned, I can’t even make a joke about it:

Donald Trump’s campaign requires volunteers to sign a contract that forbids them from criticizing the Republican presidential front-runner, his family members, any Trump businesses or products, or his campaign. The six-page contract, reviewed in full by the Daily Dot, theoretically lasts for the entirety of a volunteer’s life.

Legal experts say, however, that the contract’s non-disparagement clause would likely never hold up in court.

The tight control of volunteers stands in stark contrast to not only American political-campaign norms but also Trump’s reputation for speaking his mind.

In addition to forbidding volunteers from disparaging Trump, the contract also includes a sentence that demands volunteers prevent their employees from criticizing Trump, thus making volunteers responsible for the free speech of others for an indeterminate amount of time.

 …

Volunteers also sign a non-disclosure agreement, forbidding them from sharing any sensitive information from the campaign. What kind of information is sensitive or confidential is completely at Trump’s discretion, according to the contract.
“He’s apparently so afraid that people would say something bad about him after spending some time on his campaign that they have to sign some sort of agreement,” Perry explained. “I don’t see how this stands up. I don’t see how a court enforces this.”

Volunteers must also sign a non-compete agreement that extends until Trump ceases his campaign for president, identified in the contract as the “Non-Compete Cutoff Date.” The agreement also forbids volunteers from working for another presidential candidate, should they change their minds.

In the event of a Trump victory in November’s general election, the non-compete clause could extend until his 2020 reelection campaign or even 2024, at the end of a second Trump term, the document explains. If Trump loses but wants to run again in the next election or in any presidential election in the future, the contract states the volunteer cannot work for another candidate.

(click here to continue reading Donald Trump’s volunteer contract forbids all criticism of Trump.)

Written by Seth Anderson

May 12th, 2016 at 8:35 am

Posted in Links

Tagged with , ,

You Wanted To Disappear was uploaded to Flickr

without comments

Foggy afternoon, Chicago

(The sculpture is called Progress Lighting the Way for Commerce)

embiggen by clicking
http://flic.kr/p/E79yTw

I took You Wanted To Disappear on September 12, 2009 at 05:14AM

and processed it in my digital darkroom on February 19, 2016 at 09:27AM

Written by eggplant

February 19th, 2016 at 1:53 pm

AT&T Helped N.S.A. Spy on an Array of Internet Traffic – The New York Times

without comments

Ex-Lax

Earlier today…

The National Security Agency’s ability to spy on vast quantities of Internet traffic passing through the United States has relied on its extraordinary, decades-long partnership with a single company: the telecom giant AT&T. While it has been long known that American telecommunications companies worked closely with the spy agency, newly disclosed N.S.A. documents show that the relationship with AT&T has been considered unique and especially productive. One document described it as “highly collaborative,” while another lauded the company’s “extreme willingness to help.” AT&T’s cooperation has involved a broad range of classified activities, according to the documents, which date from 2003 to 2013.

Via:
AT&T Helped N.S.A. Spy on an Array of Internet Traffic – The New York Times
[automated]

Written by eggplant

August 15th, 2015 at 12:41 pm

Posted in Links

Tagged with , , ,

FBI behind mysterious surveillance flights over U.S. cities

without comments

 

Eye see u Willis
Eye see U. All of you!

A police state? Whoever could imagine such a thing in the United States of America? Civil liberties? Ha! The Bill of Rights is no longer required because the War on Terra has usurped them.

This is the real legacy of disgraced former Congressman Dennis Hastert: willingly gutting the Constitution to please the Neo Cons and Dick Cheney, and his little puppy GWB.

Scores of low-flying planes circling American cities are part of a civilian air force operated by the FBI and obscured behind fictitious companies.

The Associated Press traced at least 50 aircraft back to the FBI, and identified more than 100 flights in 11 states over a 30-day period since late April, orbiting both major cities and rural areas. At least 115 planes, including 90 Cessna aircraft, were mentioned in a federal budget document from 2009.

For decades, the planes have provided support to FBI surveillance operations on the ground. But now the aircraft are equipped with high-tech cameras, and in rare circumstances, technology capable of tracking thousands of cellphones, raising questions about how these surveillance flights affect Americans’ privacy.

The Drug Enforcement Administration has its own planes, also registered to fake companies, according to a 2011 Justice Department inspector general report. At the time, the DEA had 92 aircraft in its fleet. And since 2007, the U.S. Marshals Service has operated an aerial surveillance program with its own fleet equipped with technology that can capture data from thousands of cellphones, the Wall Street Journal reported last year.

 …

Some of the aircraft can also be equipped with technology that can identify thousands of people below through the cellphones they carry, even if they’re not making a call or in public.

(click here to continue reading FBI behind mysterious surveillance flights over Chicago, other U.S. cities – Chicago Tribune.)

You Are Being Film
You Are Being Film

In other words, we are all assumed to be guilty of something, and thus can be monitored and spied upon without need for quaint antiques like warrants or probable cause.

Evolving technology can record higher-quality video from long distances, even at night, and can capture certain identifying information from cellphones using a device known as a “cell-site simulator” — or Stingray, to use one of the product’s brand names. These can trick pinpointed cellphones into revealing identification numbers of subscribers, including those not suspected of a crime.

The FBI has recently begun obtaining court orders to use this technology. Previously, the Obama administration had been directing local authorities through secret agreements not to reveal their own use of the devices, even encouraging prosecutors to drop cases rather than disclose the technology’s use in open court.

Do All Photographers Need a Warrant?
Do All Photographers Need a Warrant?

Up in the sky! Look! It’s a bird! A plane! It’s the FBI!

Another Crappy Photo of a Prop Plane
Another Crappy Photo of a Prop Plane

From Wall Street Journal reporter Devlin Barrett last year:

The Justice Department is scooping up data from thousands of mobile phones through devices deployed on airplanes that mimic cellphone towers, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations.

The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.

Planes are equipped with devices—some known as “dirtboxes” to law-enforcement officials because of the initials of the Boeing Co. unit that produces them—which mimic cell towers of large telecommunications firms and trick cellphones into reporting their unique registration information.

Even having encryption on a phone, such as the kind included on Apple Inc.’s iPhone 6, doesn’t prevent this process.

 …

Also unknown are the steps taken to ensure data collected on innocent people isn’t kept for future examination by investigators. A federal appeals court ruled earlier this year that over-collection of data by investigators, and stockpiling of such data, was a violation of the Constitution.

The dirtbox and Stingray are both types of what tech experts call “IMSI catchers,’’ named for the identification system used by networks to identify individual cellphones.

The name “dirtbox’’ came from the acronym of the company making the device, DRT, for Digital Receiver Technology Inc., people said. DRT is now a subsidiary of Boeing. A Boeing spokeswoman declined to comment.

“DRT has developed a device that emulates a cellular base station to attract cellphones for a registration process even when they are not in use,’’ according to a 2010 regulatory filing Boeing made with the U.S. Commerce Department, which touted the device’s success in finding contraband cellphones smuggled in to prison inmates.

 

(click here to continue reading Americans’ Cellphones Targeted in Secret U.S. Spy Program – WSJ.)

Continuous Video Recording in Progress
Continuous Video Recording in Progress

and a follow up by the same reporter:

The Central Intelligence Agency played a crucial role in helping the Justice Department develop technology that scans data from thousands of U.S. cellphones at a time, part of a secret high-tech alliance between the spy agency and domestic law enforcement, according to people familiar with the work.

The CIA and the U.S. Marshals Service, an agency of the Justice Department, developed technology to locate specific cellphones in the U.S. through an airborne device that mimics a cellphone tower, these people said.

Today, the Justice Department program, whose existence was reported by The Wall Street Journal last year, is used to hunt criminal suspects. The same technology is used to track terror suspects and intelligence targets overseas, the people said.

The surveillance system briefly identifies large numbers of cellphones belonging to citizens unrelated to the search. The practice can also briefly interfere with the ability to make calls, these people said.

Some law-enforcement officials are concerned the aerial surveillance of cellphone signals inappropriately mixes traditional police work with the tactics and technology of overseas spy work that is constrained by fewer rules. Civil-liberties groups say the technique amounts to a digital dragnet of innocent Americans’ phones.

(click here to continue reading CIA Aided Justice Department Secret Program to Spy on U.S. Cellphones – WSJ.)

City of Chicago Emergency Management Surveillance Vehicle
City of Chicago Emergency Management Surveillance Vehicle

Remember when the CIA was banned on spying on Americans, and from conducting operations on American soil? Ah, those were the days…

To civil libertarians, the close involvement of America’s premier international spy agency with a domestic law-enforcement arm shows how military and espionage techniques are now being used on U.S. citizens.

“There’s a lot of privacy concerns in something this widespread, and those concerns only increase if we have an intelligence agency coordinating with them,” said Andrew Crocker of the Electronic Frontier Foundation, which has filed a lawsuit seeking more details about the program and its origins.

The Truth Is Not So Comfortable
The Truth Is Not So Comfortable

Written by Seth Anderson

June 3rd, 2015 at 11:33 am

REAL ID Boondoggle Continues

without comments

Complex Citizen
The continuing saga of the Complex Citizen.

Sigh. The REAL ID boondoggle isn’t dead yet. Doesn’t it sound like everything the Big Govment’ haters rail against? And yet, it was passed “in the wake of 9/11”…

Currently, Illinois licenses and identification cards do not meet minimum standards mandated by the Real ID Act, which passed in 2005 in the wake of 9/11. If the Department of Homeland Security does not grant Illinois an extension, residents would need additional identification like a passport or face additional security checks to get on planes.

The act aims to thwart efforts by terrorists, con artists and immigrants in the country illegally to obtain government-issued identification. Arguments about costs, privacy and whether the additional information would actually reduce threats have delayed implementation of the law for more than a decade.

A major feature of Real ID is the verification of birth certificates, which Illinois currently does not require. The information is electronically scanned and stored in a federal database, and data can be shared easily among states and the federal government.

“It’s a large database that allows us to verify birth certificates and death certificates, things of that nature,” said Henry Haupt, spokesman for Secretary of State Jesse White. “It’s quite costly. We estimate, in order to utilize it and have all the birth certificates verified for Illinois drivers, it would cost about $3.75 million each year.”

White’s office estimated it would cost $100 to $150 million just for staffing, equipment and data storage. A Real ID driver’s licenses could cost an estimated $75 in Illinois. A license currently costs $30 for ages 21-68, according to CyberDrive Illinois.

That cost would largely be shouldered by Illinois drivers and taxpayers. The Homeland Security estimates it could cost $4 billion nationwide to implement the act.

States and territories were initially required to implement the program by May 2008, but the federal government delayed its start four times. Twenty-one states and four territories have been granted extensions to meet the law’s standards; 22 states and Washington, D.C., have implemented the act, according to a Jan. 30 Homeland Security statement.

Seven states — Arizona, Idaho, Louisiana, Maine, Minnesota, New Hampshire, New York — have no plans to implement Real ID. Residents of five of those states will not be able to board airplanes without additional identification like a passport starting in 2016; New York and Minnesota have driver’s licenses with enhanced security measures that will allow their residents to board airplanes, according to Homeland Security.

(click here to continue reading State eyes more secure driver’s license to avoid flying restrictions – Chicago Tribune.)

Back Seat Drivers
Back Seat Drivers

Sen. Iris Martinez (D-Chicago), a long-time opponent of the bill, says:

“I viewed Real ID as yet another unfunded federal mandate on state governments already facing tough budgets for important priorities,” Martinez said. “The proposition of a creation of a ‘one size fits all’ ID card necessary to travel was of great concern.”

 and the price of implementation to the states is steep:

Brian Zimmer, president of the Coalition for a Secure Driver’s License who helped draft the law’s provisions on driver’s licenses as a congressional committee staffer, said Illinois would have to construct or renovate buildings that issue licenses in order to meet security criteria, which could prove challenging.

The law prompted some states, like Wisconsin and Texas, to consolidate facilities. In Tennessee, licenses are issued from a single, secure location, he said. That means applicants get their license via mail instead of in person.

“Real ID required states to move from a business model where licensing was a revenue source to a business model where money needs to be invested in it to ensure it was done more securely,” Zimmer said. “The new model is security first, and security comes with a price.”

May Day rally 2007
Line at the REAL ID DMV station

price, confusion, long lines, and of course, privacy theft concerns:

Critics of Real ID have complained that it is a blatant invasion of privacy and would make people vulnerable to identity theft.

Ed Yohnka, a spokesman for the American Civil Liberties Union of Illinois, said a government database of citizens and some of their personal information smacks of Big Brotherism and would be a gold mine for identity thieves.

“One of the troubling things is that the system to protect our data will no longer be dependent about what happens here in Illinois,” Yohnka said. “What happens in Mississippi or Maine or Montana will be a conduit to get to our data. If hackers can get into those systems, they can get to the national system.”

He noted that the state’s database of driver’s licenses has fought off tens of thousands of improper access attempts.

“From a pragmatic point of view, all this furor over something that doesn’t provide safety and security is ridiculous,” Yohnka said.

https://i2.wp.com/farm9.staticflickr.com/8591/16639540626_809dfb3b7c_z.jpg?resize=460%2C561&ssl=1
It’s the Future…

Sounds great! Can’t wait! Especially since I had such a bitch of a time getting my passport due to bureaucratic SNAFU ingrained in that system. 

Written by Seth Anderson

March 1st, 2015 at 4:16 pm