Secrets of FBI Smartphone Surveillance Tool Revealed in Court Fight

Via: Wired

By Kim Zetter
04.09.13

A legal fight over the government’s use of a secret surveillance tool has provided new insight into how the controversial tool works and the extent to which Verizon Wireless aided federal agents in using it to track a suspect.

Court documents in a case involving accused identity thief Daniel David Rigmaiden describe how the wireless provider reached out remotely to reprogram an air card the suspect was using in order to make it communicate with the government’s surveillance tool so that he could be located.

Rigmaiden, who is accused of being the ringleader of a $4 million tax fraud operation, asserts in court documents that in July 2008 Verizon surreptitiously reprogrammed his air card to make it respond to incoming voice calls from the FBI and also reconfigured it so that it would connect to a fake cell site, or stingray, that the FBI was using to track his location.

Read more: here

Advertisements

IRS to Monitor Facebook, Twitter for Tax Cheats

Via: RT

Published time: April 08, 2013 23:00

Is the IRS about to get too close for comfort? New reports brought to light by one privacy and data security expert suggest that this tax filing season the Internal Revenue Service may be monitoring social media for any clues of tax cheats.

According to Kristen Mathews, a partner attorney at law firm Proskauer Rose LLP who specializes in privacy and data security, there are reports that the IRS will be checking into individual Facebook and Twitter accounts for improprieties.

Though the agency says that it will only conduct such monitoring if a tax form raises a red flag, it is somewhat unclear to what extent it will be capable of delving into social media accounts.

Social media tools used by marketing companies, for example, are capable of conducting widespread searches for certain keywords, and though they can often take advantage of small “loopholes” in Facebook privacy settings, they are generally limited to publicly divulged information.

Data mining is now widespread on social media, as companies often use Twitter buzz and comments left on Facebook to measure consumers’ thoughts on particular products, or to get ahead of a potential public relations issue.

In regards to government monitoring of social media, there are already plenty of instances where information collected through both Twitter and Facebook has been used to file criminal charges against individuals. Just last week, New York officials announced the indictment of 63 East Harlem gang members, whose movements were tracked with the help of clues they left behind on their social media accounts.

Read more: here

Anything you do can and will be used against you…
Does this bother anyone?
-Moose

Obama’s New SEC ‘Sheriff.’ No Conflict of Interest When it Comes to Shielding Wall Street’s Pin Striped Mafia

Via: ICH


By Tom Burghardt

March 31, 2013 “Information Clearing House” – One indelible sign of state capture by pirate corporations and the financial jackals holding sway on Wall Street and the City of London is the ease with which former “regulators” slip into plum positions with the firms whom they supposedly “regulated” as “public servants.”

While the drone kill-crazy Obama regime has done yeoman’s work cementing in place extra-constitutional policies first enacted by the Bush gang–only to exceed Bushist depredations by a whole order of magnitude–kool-aid sipping “progressives” and troglodytic “conservatives” have given the president a free pass when it comes to policing the financial criminals who blew up the world economy.

But when it comes to US spy agencies probing and sweeping up your financial information, well, the sky’s the limit!

As Reuters reported last week, the administration “is drawing up plans” to give securocrats “full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document.”

That Treasury plan would give secret state apparatchiks, including those ensconced at CIA, NSA and the Pentagon free reign to rummage through the Financial Crimes Enforcement Network’s (FinCEN) massive database of “suspicious activity reports” routinely filed by “banks, securities dealers, casinos and money and wire transfer agencies.” The FBI and DHS already have full access to that database under the Orwellian USA Patriot Act.

Under the proposal, FinCen data will be linked “with a computer network used by US defense and law enforcement agencies to share classified information called the Joint Worldwide Intelligence Communications System,” according to Reuters.

And since requirements for filing SARs are “so strict,” banks often “over-report,” this “raises the possibility that the financial details of ordinary citizens could wind up in the hands of spy agencies,” where it will live in perpetuity, “criminal evidence, ready for use in a trial,” as Cryptohippie famously warned.

Got that? While Wall Street drug banks are handled with care because of the “collateral consequences” that might result from a criminal referral for laundering billions of narco-dollars, the average citizen’s financial data will be fair game.

Which brings us back to Obama’s anemic regulatory regime and the “sheriffs” eager to do the bankster’s bidding.

Read more: here

Scum sucking pigs….
-Moose

Obama’s Crackdown on Whistleblowers

Via: The Nation

Tim Shorrock
March 26, 2013

In the annals of national security, the Obama administration will long be remembered for its unprecedented crackdown on whistleblowers. Since 2009, it has employed the World War I–era Espionage Act a record six times to prosecute government officials suspected of leaking classified information. The latest example is John Kiriakou, a former CIA officer serving a thirty-month term in federal prison for publicly identifying an intelligence operative involved in torture. It’s a pattern: the whistleblowers are punished, sometimes severely, while the perpetrators of the crimes they expose remain free.

The hypocrisy is best illustrated in the case of four whistleblowers from the National Security Agency: Thomas Drake, William Binney, J. Kirk Wiebe and Edward Loomis. Falsely accused of leaking in 2007, they have endured years of legal harassment for exposing the waste and fraud behind a multibillion-dollar contract for a system called Trailblazer, which was supposed to “revolutionize” the way the NSA produced signals intelligence (SIGINT) in the digital age. Instead, it was canceled in 2006 and remains one of the worst failures in US intelligence history. But the money spent on this privatization scheme, like so much at the NSA, remains a state secret.

The story goes back to 2002, when three of the whistleblowers—Loomis, Wiebe and Binney—asked the Pentagon to investigate the NSA for wasting “millions and millions of dollars” on Trailblazer, which had been chosen as the agency’s flagship system for analyzing intercepted communications over a smaller and cheaper in-house program known as ThinThread. That program was invented by Loomis, one of the NSA’s top software engineers, and Binney, a legendary crypto-scientist, both of whom began working for the NSA during the Vietnam War. But despite ThinThread’s proven capacity to collect actionable intelligence, agency director Gen. Michael Hayden vetoed the idea of deploying the system in August 2001, just three weeks before 9/11.

Read more: here

No comment….biting lip….
-Moose

Cyber Nuclear Hokum

Via: Sandia

Sandia was doing cyber before the term cyberspace existed. Today cybersecurity is a daunting national security problem, and we’re applying decades of expertise to the task. As the most networked nation on earth, the United States is extremely vulnerable. To keep systems safe and foil attacks, we develop protective technologies, conduct threat assessments, and analyze government, military, and civilian computer networks.

Read more: here

Unbelievable…Let’s create the threat, and then create a revenue stream out of it..This is pure evil!
People, I know you need a job, but stop helping this!
-Moose

Mayor Bloomberg: Security Drones Over New York City Are ‘Scary’ But Inevitable

Via: Business Insider

Michael Kelley | Mar. 23, 2013, 12:18 PM

New York City Mayor Michael Bloomberg considers the domestic use of military-style drones “scary” but says that there is no way to stop it.

“Everybody wants their privacy, but I don’t know how you’re going to maintain it,” Bloomberg said on his weekly radio show. “It’s just we’re going into a different world, uncharted, and, like it or not, what people can do, what governments can do, is different … you can’t keep the tides from coming in.”

In September a Congressional Research report stated that domestic drones may be able to bypass constitutional privacy safeguards because of their high level of sophistication.

At least 81 entities, including 17 police departments, have applied for permission to fly drones in U.S. airspace.

But the mayor seems to be referring to something more omnipresent, like having drones with ARGUS technology flying 17,500 feet above the Big Apple while transmitting high resolution images of people.

“There’ll be cameras every place” within five years, Bloomberg estimated. “We’re going to have more visibility and less privacy. I just don’t see how you could stop that.”

Read more: here

Yes, there is a way to stop it…Don’t Allow It!  
How can you tell a politician is lying?
They are speaking…
-Moose

Sources: Amazon and CIA Ink Cloud Deal

Via: FCW

By Frank Konkel
Mar 18, 2013

In a move sure to send ripples through the federal IT community, FCW has learned that the CIA has agreed to a cloud computing contract with electronic commerce giant Amazon, worth up to $600 million over 10 years.

Amazon Web Services will help the intelligence agency build a private cloud infrastructure that helps the agency keep up with emerging technologies like big data in a cost-effective manner not possible under the CIA’s previous cloud efforts, sources told FCW.

Amazon officials would not confirm the existence of the contract, and a CIA spokesperson likewise declined to comment on the matter.

“As a general rule, the CIA does not publicly disclose details of our contracts, the identities of our contractors, the contract values, or the scope of work,” a CIA spokesperson told FCW.

In recent speaking engagements, however, CIA officials have hinted at significant upcoming changes to the way the agency procures software, how it uses big-data analytics and the ways in which it incorporates commercial-sector innovation.

Speaking to the Northern Virginia Technology Council Board of Directors on March 12, Central Intelligence Agency Chief Information Officer Jeanne Tisinger told an audience of several dozen people how the CIA is leveraging the commercial sector’s innovation cycle, looking for cost efficiencies in commodity IT, and using software-as-a-service for common solutions.

Two audience members who asked not to be named told FCW that Tisinger said the CIA was working “with companies like Amazon.”

Read more: here 

Nothing to see here…move along…These are not the criminals you seek…
Maybe they are looking for a whistle blowing publishing deal…
-Moose

Drone Home

Via: Time

By Lev Grossman Monday, Feb. 11, 2013

A few months ago I borrowed a drone from a company called Parrot. Officially the drone is called an AR.Drone 2.0, but for simplicity’s sake, we’re just going to call it the Parrot. The Parrot went on sale last May and retails for about $300.

It’s a quadcopter, meaning it’s a miniature helicopter with four rotors; basically it looks like a giant four-leaf clover designed by Darth Vader. It’s noisy and a bit fussy: it spits error messages at you from a comprehensive menu of them, and it recovers from catastrophes slowly and sulkily. (Pro tip: quadcopters mix poorly with greenery.) But when it’s on its best behavior, the Parrot is a little marvel. You control it with an app on your smart phone, to which it feeds real-time video in return. Mashing the Take Off button causes it to leap up to waist height and hover there, stock still, in the manner of Harry Potter’s broomstick. It’s so firmly autostabilized that on a hot day small children will gather under it to get the cool downwash from its rotors.

It’s a toy, the robotic equivalent of a house pet. But just as cats and dogs are related to tigers and wolves, the Parrot is recognizably genetically related to some very efficient killers.

Flying a drone, even just a Parrot, makes you realize what a radically new and deeply strange technology drones are. A drone isn’t just a tool; when you use it you see and act through it — you inhabit it. It expands the reach of your body and senses in much the same way that the Internet expands your mind. The Net extends our virtual presence; drones extend our physical presence. They are, along with smart phones and 3-D printing, one of a handful of genuinely transformative technologies to emerge in the past 10 years.

They’ve certainly transformed the U.S. military: of late the American government has gotten very good at extending its physical presence for the purpose of killing people. Ten years ago the Pentagon had about 50 drones in its fleet; currently it has some 7,500. More than a third of the aircraft in the Air Force’s fleet are now unmanned. The U.S. military reported carrying out 447 drone attacks in Afghanistan in the first 11 months of 2012, up from 294 in all of 2011. Since President Obama took office, the U.S. has executed more than 300 covert drone attacks in Pakistan, a country with which we’re not at war. Already this year there are credible reports of five covert attacks in Pakistan and as many as eight in Yemen, including one on Jan. 21, the day of Obama’s second Inauguration. The Pentagon is planning to establish a drone base in northwestern Africa.

Read more: here

Oh yeah..Drones are great…
-Moose

I Spot The Sheriff 1.0

Via: Moose

I want to let my readers know about my latest software project.

It is called I Spot The Sheriff TM.

It is an app for your smartphone , (iPhone TM and Android TM only), that lets you see the location of Law Enforcement Personnel. This comes in handy cause you never can find a cop when you need one. And since they have tools that track and identify us, this allows us the citizens, to keep track of them as well. It was a relatively easy task to amass a database of names, addresses, and phone numbers of nearly 1.2 million law enforcement personnel currently employed in the US.. Then, utilizing some phone company services and our database, it allows associating the respective data to the current location of the LEO. Floating the cursor over the star symbol on the map displays the information associated…Photo…Phone number…home address, work history, what kind of donuts they prefer, etc.

Using our own network of drones, we capture, unobtrusively of course, the MAC address of all cell phones within range. Then, we analyze the data, and associate known numbers with their respective information. This is then presented over Google maps to provide real time location display of all Law Enforcement Personnel within the surveyed area.

Cool ..Now if that parking structure seems a little scary, you can see where the nearest cop is…Those black youths look a little suspicious?…I Spot The Sheriff TM. Those white kids are frightening you?…
I Spot The Sheriff TM

Crooked Bankster or Politicians..Never mind….Law Enforcement won’t do anything to them…..

I know…some of you out there,(Law Enforcement Personnel in particular), may feel that criminals might use this software to commit crime in Law Enforcement free zones…..Can’t happen…A Czar will be appointed to select only honest people to use the software…Using the same tools and procedures that guarantee honesty and integrity in law enforcement personnel and politicians and or Goldman Sachs’s employees will ensure no criminals will use I Spot The Sheriff TM nefariously…

Some might say that civilians should not have a tool like this…

Sorry, turnabout is fair play..

It allows us, the citizens, to ensure the same level of attendance, performance, and compliance that any modern large organization currently embraces observing their employees…And since that is what these government officials are…our employees, it is our right to observe their actions.

Features are already being added such as real time video of the “Selected Officer” streamed to the You Tube account of your choice.

Krispy Kreme TM and Dunkin Donuts TM locations will also be shown in real time to allow rapid locating of groups of law enforcement personnel. you know, just in case…

Screen shot of app. All Rights Reserved I Spot The Sheriff TM 2013

This sounds like it is gonna be a winner…Better than AAA if you have a dead battery too…
Plus, if you’re looking for donuts…
-Moose

Obama Administration Believes No Warrant is Needed for Authorities to Use GPS Tracking on Vehicles

Via: Slash Gear

Shane McGlaun, Mar 19th 2013

You might think that police or other federal authorities would need to obtain a court order to be able to place a GPS tracking device on your vehicle. That court order is apparently not needed according to the Obama administration. This is despite the fact that the Supreme Court ruled last year that attaching GPS devices to the vehicles of citizens amounted to search protected by the Constitution.

Wired reports that the Obama administration will take its case before an appeals court this week in a case set to test the parameters of Supreme Court ruling from 2012 concerning GPS tracking. If the federal government wins, authorities will continue to be able to place GPS tracking devices on vehicles with no court order.

The case will be heard in the third US Circuit Court of Appeals in Philadelphia. At the heart of the case is a decision on whether or not police and other law enforcement agencies need probable cause warrants issued by a judge in order to track the GPS location of a suspect’s vehicle. Wired reports that after the Supreme Court’s January 2012 ruling, federal authorities disabled 3000 GPS trackers that were installed on vehicles without warrants.

Read more: here 

All of us should just call the FBI, CIA, and NSA daily..just to let them know, what’s up!
When you have to poo is a good time to call…
It’s quiet in the bathroom…just sayin…
-Moose 

The Internet is A Surveillance State

Via: CNN

By Bruce Schneier, Special to CNN
updated 11:39 AM EDT, Sat March 16, 2013

(CNN) — I’m going to start with three data points.

One: Some of the Chinese military hackers who were implicated in a broad set of attacks against the U.S. government and corporations were identified because they accessed Facebook from the same network infrastructure they used to carry out their attacks.

Two: Hector Monsegur, one of the leaders of the LulzSac hacker movement, was identified and arrested last year by the FBI. Although he practiced good computer security and used an anonymous relay service to protect his identity, he slipped up.

And three: Paula Broadwell,who had an affair with CIA director David Petraeus, similarly took extensive precautions to hide her identity. She never logged in to her anonymous e-mail service from her home network. Instead, she used hotel and other public networks when she e-mailed him. The FBI correlated hotel registration data from several different hotels — and hers was the common name.

The Internet is a surveillance state. Whether we admit it to ourselves or not, and whether we like it or not, we’re being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads. One reporter used a tool called Collusion to track who was tracking him; 105 companies tracked his Internet use during one 36-hour period.

Read more: here

Google Admits Street View Project Violated Privacy

Via: NY Times


By DAVID STREITFELD
Published: March 13, 2013

SAN FRANCISCO – Google on Tuesday acknowledged to state officials that it had violated people’s privacy during its Street View mapping project when it casually scooped up passwords, e-mail and other personal information from unsuspecting computer users.

In agreeing to settle a case brought by 38 states involving the project, the search company for the first time is required to aggressively police its own employees on privacy issues and to explicitly tell the public how to fend off privacy violations like this one.

While the settlement also included a tiny – for Google – fine of $7 million, privacy advocates and Google critics characterized the overall agreement as a breakthrough for a company they say has become a serial violator of privacy.

Complaints have led to multiple enforcement actions in recent years and a spate of worldwide investigations into the way the mapping project also collected the personal data of private computer users.

“Google puts innovation ahead of everything and resists asking permission,” said Scott Cleland, a consultant for Google’s competitors and a consumer watchdog whose blog maintains a close watch on Google’s privacy issues. “But the states are throwing down a marker that they are watching and there is a line the company shouldn’t cross.”

The agreement paves the way for a major privacy battle over Google Glass, the heavily promoted wearable computer in the form of glasses, Mr. Cleland said. “If you use Google Glass to record a couple whispering to each other in Starbucks, have you violated their privacy?” he asked. “Well, 38 states just said they have a problem with the unauthorized collection of people’s data.”

George Jepsen, the Connecticut attorney general who led the states’ investigation, said that he was hopeful the settlement would produce a new Google.

“This is the industry giant,” he said. “It is committing to change its corporate culture to encourage sensitivity to issues of personal data privacy.”

Read more: here

EXCLUSIVE – U.S. To Let Spy Agencies Scour Americans’ Finances

Via: Reuters

NEW YORK/WASHINGTON | Wed Mar 13, 2013 
 

(Reuters) – The Obama administration is drawing up plans to give all U.S. spy agencies full access to a massive database that contains financial data on American citizens and others who bank in the country, according to a Treasury Department document seen by Reuters.

The proposed plan represents a major step by U.S. intelligence agencies to spot and track down terrorist networks and crime syndicates by bringing together financial databanks, criminal records and military intelligence. The plan, which legal experts say is permissible under U.S. law, is nonetheless likely to trigger intense criticism from privacy advocates.

Financial institutions that operate in the United States are required by law to file reports of “suspicious customer activity,” such as large money transfers or unusually structured bank accounts, to Treasury’s Financial Crimes Enforcement Network (FinCEN).

The Federal Bureau of Investigation already has full access to the database. However, intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, currently have to make case-by-case requests for information to FinCEN.

The Treasury plan would give spy agencies the ability to analyze more raw financial data than they have ever had before, helping them look for patterns that could reveal attack plots or criminal schemes.

The planning document, dated March 4, shows that the proposal is still in its early stages of development, and it is not known when implementation might begin.

Read more: here 

Don’t worry…nothing can go wrong with this plan….
But maybe they could just direct deposit some of the money that the FED is making up in my account….
-Moose

Parastoo IAEA Mossad

Via: Cryptome

9 March 2013


*----------*--------------+----------------:
| PARASTOO |  ANNOUNCE    | 10 MARCH,2013  |
|          | PUBLIC REL   |                |
*----------*--------------+----------------:
|   JFK    |   NO-IPAC    |   #OPISRAEL    |
*----------*--------------+----------------:

1.OPENING

PARASTOO IS SPEAKING . WE DOUBT JOE HEARD OUR LAST
MESSAGE . IS HERE IS A LOUDER ONE . GO DETECT WHAT
WAS THAT UNKNOWN THING AT JFK , INSTEAD OF MAKING
LONG ISRAELI ASS-KISSING SPEECHES AT IAPAC AND
REASSURING THE ZIONIST REGIME THEY WILL ALWAYS GET
THE GOOD STUFF COMING IN FREE , EVEN THOUGH MANY
MILLIONS OF AMERICAN CITIZENS DOES NOT HAVE A POT
TO PISS IN . GOOD LUCK WITH YOUR F-22 AND F-35
UNCLE JOE . WE INSIST YOU READ THOROUGHLY WHAT
HAPPENED TO SAYYED ABBAS MOUSAVI .

Read more: here

Why a Drone Can Hover Over Your Home, And You Can’t Stop It..Yet

Via: Yahoo


Lost in the controversy over the federal government’s use of military drones is an issue that hits home: Commercial drones that can videotape you in your backyard.

Under limited circumstances, the FAA has approved the use, starting in 2015, of drones owned and operated by citizens. Some will be used for commercial purposes; others will used for recreational purposes.

The FAA Modernization and Reform Act of 2012 was approved by Congress and the president. It tasks the Federal Aviation Administration with setting policies for the commercial drone business by September 2015.

The act is mostly focused on air safety issues, but the implications of drones, with photo and infrared cameras, flying over personal air spaces is fraught with privacy issues.

Then there are the implications for commercial drones, news gathering and the First Amendment. Television stations spend millions of dollars on helicopters, which can show live video from a distance. Drones are the fraction of a helicopter’s cost, but they can’t fly as high as a helicopter under normal circumstances.

So what happens if a drone is hovering over your house as journalists gather news? Or what if it is drone owned by a police department? Or a news entertainment show like TMZ?

Read more: here

And don’t worry, They won’t be armed….
-Moose

Can U.S. Citizen Shoot Down Domestic Spy Drones? Question Looms

Via: DailyTECH

Jason Mick (Blog) – September 14, 2012 3:50 PM

Every single day / And every word you say / Every game you play, every night you stay / I’ll be watching you
Oh, can’t you see / You belong to me?

…that famous line of Sting and the Police perhaps best summarizes the warning delivered in a report released last week by the Congressional Research Service that suggests the growing army of drones flying over the U.S. airspace could be used to continuously monitor U.S. citizens.

I. Plans for Domestic Drone Spying Escalate 

The U.S. Federal Aviation Administration in a recent report that it expects 30,000 commercial and government drones to be flying over the U.S. airspace within 20 years.  The drones will be cheap, will be able to stay aloft continuously, and can even be as small as an insect (so-called “nano-drones”).  All of that makes the perfect vehicle for something many great writers and philosophers have long feared — ubiquitous, uninterrupted government surveillance.

While it sounds like a paranoid flight of fantasy, that’s precisely the issue that was being discussed in last week’s report.  It comments, “In the near future, law enforcement organizations might seek to outfit drones with facial recognition or soft biometric recognition, which can recognize and track individuals based on attributes such as height, age, gender and skin color.” 

Read more: here

An interesting question…..
-Moose

Where We Are Right Now on Comsec

Via:

 

 
From: Tom Ritter <tom[at]ritter.vg>
Date: Fri, 8 Mar 2013 13:05:30 -0500

Subject: Re: Summary of where we are right now

To: <cypherpunks[at]al-qaeda.net>, <cypherpunks[at]lne.com>

> So they figured it was easier to just get suckers to use some form of
> encryption (including and specifically TOR) to send the red flag that
> someone wanted to hide something, so “look over here!”.

I don’t agree that the NRL [Naval Research Laboratory] funded Tor for this purpose, but I do agree that our tools today (Tor, mixmaster/mixminion, PGP mail, RedPhone, TextSecure, OTR, etc) are easily distinguishable in traffic streams, and that this is a problem. Just as Riseup collects a bunch of people who care a lot about privacy onto one mailserver – people using these tools are likely to be interesting.
Skype, Facebook, Gmail – for all their problems, they are ubiquitous, and don’t draw attention.

> 3. But we are going to win. Yeah, we’re gonna win. Why? Because we want to.
> It’s not enough to encrypt: The type and context of encryption had to be
> hidden as well. Kind of the network version of Rubberhose. But these young
> kids who grew up not watching TV because it didn’t interact with them, it’s
> they who will create a stego virus to propagate fake stego everywhere on
> Facebook or whatever. It’s them who are going to create TOR services that
> operate ubiquitously behind the scenes, so that most users dob’t even know
> they are using it. Hiding the form of encryption will itself be the final
> frontier as crypto becomes ubiquitous.

A friend I talked with recently told me he thought it was easy to set up an anonymity system that worked great for you and your friends, and near impossible to build one that worked well for everyone else. Once it got popular or you became a target of investigation, people would put the effort into detecting it. Otherwise, it would continue along, looking like another TLS/SSH/Skype/whatever that just a little bit odd… Tor faces this problem immensely.

I don’t see us as having won, I see us as now knowing how to fight.

We know the devices they will use to easily detect our traffic, and in most cases we can get access to them. We must make our protocols indistinguishable on the wire. We know the ubiquitous services and protocols that we must work within or disguise ourselves as.

We know (some of? most of?) the statistical attacks adversaries of the future can conduct – we must make them as difficult and expensive as possible for them to achieve.

We know how woefully inadequate the user interfaces and requirements of the first generation of tools were, and we know where we must go: to browsers, smartphones, tablets, and consumer operating systems.
We have a much better idea of how normal people will react to our tools, and thus how much effort we must make to make them usable, and push for ubiquity.

We know what requirements are unreasonable of us to make upon people, and that we must design systems where those requirements are worked around, dulled, or the single ‘sharp edge’ of the system.

-tom

Read more: here

‘The Coming Surveillance Dystopia’

Via: Cryptogon

March 8th, 2013

I wasn’t going to post this. You know all of this, or, at least you should, if you’ve been hanging out here for any length of time.

But, Holder, “Dressed like Elvis and surrounded by the Real Housewives of Orange County,” won me over.

Must share.

Via: The Verge:

Assuming that some degree of privacy is still possible, most people don’t seem to think it’s worth the effort. The cypherpunks and their ilk fought to keep things like the PGP encryption program legal — and we don’t use them. We know Facebook and Google leak our personal online habits like a sieve and we don’t make much effort to cover our tracks.

 Perhaps some of us buy the good citizen cliché that if you’re not doing anything wrong, you don’t have anything to worry about, but most of us are just opting for convenience. 

We’ve got enough to deal with day to day without engaging in a privacy regimen. Occasionally, some slacker may lose his job because he posted a photo of himself cradling his bong or the like, but as with civil liberties more generally, as long as the daily outrages against individuals don’t reach epic proportions, we rubberneck in horror and then return to our daily activities.

Beneath this complacent surface lies a disquieting and mostly unexamined question. To what degree is the ubiquity of state surveillance a form of intimidation, a way to keep people away from social movements or from directly communicating their views?

Do you hesitate before liking WikiLeaks on Facebook?
Read more: here

Coming Soon: A $100 Drone To Do Your Bidding

Via: Coexist

Have some aerial photography you need done? Drones aren’t just for hunting terrorists anymore. Soon, you’ll be able to buy and launch your own UAV for cheap.

Unmanned aerial vehicles (UAVs)–or drones–have been used in the U.S. for over 50 years, largely for military purposes. It makes sense; drones can be used for surveillance and fighting enemies without putting pilots at risk. But there are plenty of uses for unmanned camera-equipped drones outside of the military, including documenting protest situations, monitoring fertilizer applications and water distribution on farms, and just taking pretty pictures.

Drones for Peace, a project currently working its way through the MassChallenge accelerator program, wants to bring these drones to the masses. The ultimate goal is a drone for aerial photography that sells for just $100. 

This is the first project for Rotary Robotics, a company that may eventually launch a whole line of drones for different applications. This first $100 drone is meant for general use. “We are engineers who were working in the military UAV space for awhile. We wanted to a create an aerial surveillance aircraft that was cheap enough that it would be accessible to everyone,” says cofounder James Peverill.

Read more: here

Malkin: The Feds’ Invasive Student Tracking Database

Via: Human Events

While many Americans worry about government drones in the sky spying on our private lives, Washington meddlers are already on the ground and in our schools gathering intimate data on children and families.

Say goodbye to your children’s privacy. Say hello to an unprecedented nationwide student tracking system, whose data will apparently be sold by government officials to the highest bidders. It’s yet another encroachment of centralized education bureaucrats on local control and parental rights under the banner of “Common Core.”

As the American Principles Project, a conservative education think tank, reported last year, Common Core’s technological project is “merely one part of a much broader plan by the federal government to track individuals from birth through their participation in the workforce.”

The 2009 porkulus package included a “State Fiscal Stabilization Fund” to bribe states into constructing “longitudinal data systems (LDS) to collect data on public-school students.”

Read more: here