Download Des Impulses
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
BUGS in the SYSTEM a Primer on the Software Vulnerability Ecosystem and Its Policy Implications
ANDI WILSON, ROSS SCHULMAN, KEVIN BANKSTON, AND TREY HERR BUGS IN THE SYSTEM A Primer on the Software Vulnerability Ecosystem and its Policy Implications JULY 2016 About the Authors About New America New America is committed to renewing American politics, Andi Wilson is a policy analyst at New America’s Open prosperity, and purpose in the Digital Age. We generate big Technology Institute, where she researches and writes ideas, bridge the gap between technology and policy, and about the relationship between technology and policy. curate broad public conversation. We combine the best of With a specific focus on cybersecurity, Andi is currently a policy research institute, technology laboratory, public working on issues including encryption, vulnerabilities forum, media platform, and a venture capital fund for equities, surveillance, and internet freedom. ideas. We are a distinctive community of thinkers, writers, researchers, technologists, and community activists who Ross Schulman is a co-director of the Cybersecurity believe deeply in the possibility of American renewal. Initiative and senior policy counsel at New America’s Open Find out more at newamerica.org/our-story. Technology Institute, where he focuses on cybersecurity, encryption, surveillance, and Internet governance. Prior to joining OTI, Ross worked for Google in Mountain About the Cybersecurity Initiative View, California. Ross has also worked at the Computer The Internet has connected us. Yet the policies and and Communications Industry Association, the Center debates that surround the security of our networks are for Democracy and Technology, and on Capitol Hill for too often disconnected, disjointed, and stuck in an Senators Wyden and Feingold. unsuccessful status quo. -
2007 Annual Report
ELECTRONIC FRONTIER FOUNDATION Annual Report 2 0 0 7 About Us From the Internet to the iPhone, technologies are transforming our society and em- powering us as speakers, citizens, creators, and consumers. When our freedoms in the networked world come under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF broke new ground when it was founded in 1990 — well before the Internet was on most people’s radar — and continues to confront cutting-edge issues defending free speech, privacy, innovation, and consumer rights today. From the beginning, EFF has championed the public interest in every critical battle affecting digital rights. Blending the expertise of lawyers, policy analysts, activists, and technologists, EFF achieves significant victories on behalf of consumers and the general public. EFF fights for freedom primarily in the courts, bringing and defending lawsuits even when that means taking on the U.S. government or large corporations. By mobilizing more than 80,000 concerned citizens through our Action Center, EFF beats back bad legislation. In addition to advising policymakers, EFF educates the press and public. Sometimes just defending technologies isn’t enough, so EFF also supports the development of freedom- enhancing inventions. Support EFF! All of the important work EFF does would not be possible without the generous support of individuals like you. In 2007, nearly half of our operating income came from individuals and members. We try to make it easy for you to show your support, accepting everything from cash, check and credit card donations to Paypal and stock donations. We can set up automatic monthly distributions from your credit card, and we participate in many employer payroll deduction plans, including the Combined Federal Campaign (CFC). -
National Programmes for Mass Surveillance of Personal Data in Eu Member States and Their Compatibility with Eu Law
DIRECTORATE GENERAL FOR INTERNAL POLICIES POLICY DEPARTMENT C: CITIZENS' RIGHTS AND CONSTITUTIONAL AFFAIRS CIVIL LIBERTIES, JUSTICE AND HOME AFFAIRS NATIONAL PROGRAMMES FOR MASS SURVEILLANCE OF PERSONAL DATA IN EU MEMBER STATES AND THEIR COMPATIBILITY WITH EU LAW STUDY Abstract In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this study makes an assessment of the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of surveillance practices at stake, which represent a reconfiguration of traditional intelligence gathering, the study contends that an analysis of European surveillance programmes cannot be reduced to a question of balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The study argues that these surveillance programmes do not stand outside the realm of EU intervention but can be engaged from an EU law perspective via (i) an understanding of national security in a democratic rule of law framework where fundamental human rights standards and judicial oversight constitute key standards; (ii) the risks presented to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners, and (iii) the potential spillover into the activities and responsibilities of EU agencies. -
Statement of Kevin S. Bankston Policy Director of New America's Open
Statement of Kevin S. Bankston Policy Director of New America’s Open Technology Institute & Co-Director of New America’s Cybersecurity Initiative Before the U.S. House of Representatives Subcommittee on Information Technology of the Committee on Oversight and Government Reform Hearing on “Encryption Technology and Possible U.S. Policy Responses” April 29, 2015 Chairman Hurd, Ranking Member Kelly and Members of the Subcommittee: Thank you for giving me the opportunity to testify today on the importance of strong encryption technology to Americans’ continued security and prosperity, and allowing me to articulate the arguments against recent suggestions that Congress should legislate to limit the availability of strongly encrypted products and services. I represent New America’s Open Technology Institute (OTI), where I am Policy Director of the OTI program and also Co-Director of New America’s cross-programmatic Cybersecurity Initiative. New America is a nonprofit civic enterprise dedicated to the renewal of American politics, prosperity, and purpose in the digital age through big ideas, technological innovation, next generation politics, and creative engagement with broad audiences. OTI is New America’s program dedicated to technology policy and technology development in support of digital rights, social justice, and universal access to open and secure communications networks. In September, Apple and Google enhanced the security of all smartphone users by modifying the operating system software of iPhones and Android smartphones, respectively, -
1 Collect It All: Everyday Lives Turned Into Passive Signals Intelligence
GCHQ and UK Mass Surveillance Chapter 1 1 Collect it all: everyday lives turned into passive signals intelligence 1.1 Introduction The NSA and GCHQ have stated their desire to “collect all the signals, all the time”.i To fulfil this aim, they want the ability to collect all data generated by our daily use of the Internet, phones and other technology. Through the wiretapping of international fibre optic cables, the communications of billions of people are intercepted every day. These include our personal phone calls, emails, text messages and web searches. The information provided by these communications can be broadly split into the actual content of the communication and the communications data, also called metadata, the information on when, where and to whom it was communicated. GCHQ collects both the content of communications, what is being said, and the metadata of communications. Traditionally metadata collection was perceived as less intrusive than the interception of content – reading the envelope was not as bad as opening and reading the letter. But nowadays it is widely acknowledged that metadata can provide an intimate picture of an individual’s life. We can map social relationships and traveling patterns just from metadata, without anyone looking at the contents of messages. At present, content and communications data are treated differently under the law but they can both be used to gain intrusive insights into our life. As well as collecting our personal communications data, GCHQ and the NSA have programmes that can collect data from apps, web cams and social media. The data we 1 of 16 GCHQ and UK Mass Surveillance generate will proliferate as more and more household products, from cars to fridges, use digital technology. -
Syria: Syrian Telecommunications Establishment, Syrian Computer Society
2 ENEMIES OF THE INTERNET / 12 MARCH 2014 //////////////////////////////////////////////////////////////////////////////////////// INTRODUCTION ........................................................................................................... 4 EUROPE AND CENTRAL ASIA .................................................................................. 8 Belarus: Operations and Analysis Centre ....................................................... 8 Russia: Federal Security Service ............................................................................ 10 Turkmenistan: TurkmenTelecom ............................................................................. 12 United Kingdom: Government Communications Headquarters ....................... 13 Uzbekistan: Expert Commission on Information and Mass Communication ................................................................................. 16 AMERICAS .................................................................................................................... 18 Cuba: Ministry of Informatics and Communications ............................................ 18 USA: National Security Agency ............................................................................... 20 MIDDLE EAST AND NORTH AFRICA ............................................................................... 23 Bahrain: Ministry of Interior, National Security Apparatus ............................................................................ 23 Iran: Supreme Council for Cyberspace, Working Group -
Reframing the Crypto Wars
CONTENTS Introduction 1 A Highlights Reel of the U.S. Encryption Debate 2 The Early “Crypto Wars” and the Clipper Chip 2 The Encryption Debate Sequel: Snowden and Surveillance 3 Privacy and the Encryption Debate 3 Earn It: Encryption Controversy Over Section 230 3 The Current International Debate Around Encryption 4 The Impact of International Encryption Policy on Domestic Policy 5 Security Versus Privacy or Security Versus Security 5 Challenges to Making Progress on the Encryption Debate 6 The Increased Availability of User-friendly Encryption Services 6 A Lack of a Common Language 6 A Lack of a Whole of Government Approach to Cybersecurity 7 Disagreement About Backdoor Alternatives 8 Conclusion 9 About the Authors 10 R STREET POLICY STUDY NO. 237 The debate was seemingly set to be answered by the courts in July 2021 2016, when Apple refused to craft new software at the behest of the Federal Bureau of Investigation (FBI) that would allow the agency to access encrypted information on a phone belonging to one of the shooters in a 2015 terrorist attack on Inland Regional Center in San Bernardino, California. REFRAMING THE CRYPTO WARS But the “going dark” encryption debate shares a key charac- By Kathryn Waldron and Sofia Lesmes teristic with the walking dead: no matter how many times you try to put it to rest, it keeps coming back. In October 2020, the Department of Justice (DOJ) issued an international INTRODUCTION statement calling for companies to “[e]nable law enforce- ment access to content in a readable and usable format where or the past several decades, policymakers, law enforce- authorisation is lawfully issued, is necessary and proportion- ment, private companies, civil liberties advocates and ate, and is subject to strong safeguards and oversight.”2 Both cybersecurity specialists have been locked in a pas- at home and abroad, there are increased government calls to sionate yet seemingly unending battle over encryp- weaken encryption in the name of national security. -
Intelligence Special Relationship’ Between Britain and the United States Written by Jonjo Robb
The ‘Intelligence Special Relationship’ between Britain and the United States Written by Jonjo Robb This PDF is auto-generated for reference only. As such, it may contain some conversion errors and/or missing information. For all formal use please refer to the official version on the website, as linked below. The ‘Intelligence Special Relationship’ between Britain and the United States https://www.e-ir.info/2014/06/15/the-intelligence-special-relationship-between-britain-and-the-united-states/ JONJO ROBB, JUN 15 2014 Is it accurate to talk of an ‘intelligence special relationship’ between Britain and the United States? The United Kingdom and the United States are often regarded as having incredibly close and cordial bilateral relations, to the extent that this is often described as a ‘special relationship’. President Barack Obama remarked when addressing Parliament on a state visit to the UK in 2011 that the two nations enjoyed ‘one of the oldest, one of the strongest alliances the world has ever known’.[1] On taking office in 2010, Secretary of State for Foreign & Commonwealth Affairs William Hague commented that ‘the United States is without doubt the most important ally of the United Kingdom’.[2] The two states share a language, a vast history, and a number of interests and values. The UK and USA have both in the past and at present cooperated intensively on military matters. Both were members of the ‘Big Three’ during World War II, both were founding members of NATO, and both formed the leading contingents in the invasions of Afghanistan and Iraq. As a result of their shared military experiences, the UK and USA have also cooperated on intelligence matters. -
EXHIBIT a Case M:06-Cv-01791-VRW Document 58-4 Filed 11/07/2006 Page 2 of 11
Case M:06-cv-01791-VRW Document 58-4 Filed 11/07/2006 Page 1 of 11 EXHIBIT A Case M:06-cv-01791-VRW Document 58-4 Filed 11/07/2006 Page 2 of 11 About EFF Cases Press Room DeepLinks Action Center Join EFF Sitemap | Calendar > Home > About Search eff.org Contact and Enter search terms About EFF Powered by Staff From the Internet to the iPod, technologies are transforming our Search EFF society and empowering us as speakers, citizens, creators, and Information consumers. When our freedoms in the networked world come » About EFF's search under attack, the Electronic Frontier Foundation (EFF) is the first » Contact Us line of defense. EFF broke new ground when it was founded in » Board of Directors Contents 1990 — well before the Internet was on most people's radar — » Staff List miniLinks and continues to confront cutting-edge issues defending free » Advisory Board Awards speech, privacy, innovation, and consumer rights today. From the » Volunteer, Intern, and EFF Victories beginning, EFF has championed the public interest in every Employment Opportunities EFF White Papers critical battle affecting digital rights. » How to Support the Electronic Frontier Foundation EFFector Blending the expertise of lawyers, policy analysts, activists, and technologists, EFF achieves Subscribe to significant victories on behalf of consumers and the general public. EFF fights for freedom EFFector! primarily in the courts, bringing and defending lawsuits even when that means taking on the US [our free email government or large corporations. By mobilizing more than 50,000 concerned citizens through newsletter] our Action Center, EFF beats back bad legislation. -
NSA Surveillance: Exploring the Geographies of Internet Interception
NSA Surveillance: Exploring the Geographies of Internet Interception Andrew Clement1 1 Faculty of Information, University of Toronto Abstract The National Security Agency’s various surveillance programs recently revealed by Edward Snowden are collectively arguably the largest personal data collection and analysis operation in history. While the foremost exemplar of a fine-grained, global information system, they also represent among the most serious contemporary challenges to democratic governance and civil liberties. Based on media coverage and leaked secret documents, this paper analyses the main NSA data interception programs and their geographic characteristics. This research also draws on IXmaps.ca, a crowd-sourced, interactive mapping application to show internet users where their personal traffic may be intercepted by the NSA. In particular, it demonstrates that internet surveillance facilities located in relatively few strategic locations enable a nearly comprehensive collection of domestic U.S. internet traffic. Keywords: NSA surveillance, warrantless wiretapping, internet surveillance, privacy Citation: Clement, A. (2014). NSA Surveillance: Exploring the Geographies of Internet Interception. In iConference 2014 Proceedings (p. 412–425). doi:10.9776/14119 Copyright: Copyright is held by the author. Acknowledgements: The IXmaps project is the work of a research team that currently includes Jonathan Obar, Colin McCann and Antonio Gamba. David Phillips, Steve Harvey, Gabby Resch, Erik Stewart, Nancy Paterson, Misha Snyder and Lauren DiMonte have made invaluable contributions at earlier stages of the project. We are also grateful to those individuals, largely anonymous, who have contributed to the database by installing and running TRgen, or have provided feedback that has helped improve the application. This research has received funding from Canada’s Social Sciences and Humanities Research Council and the Office of the Privacy Commissioner of Canada. -
Witness Statement of Eric King
IN THE INVESTIGATORY POWERS TRIBUNAL Case No IPT/13/92/CH BETWEEN: PRIVACY INTERNATIONAL Claimants -and- (1) SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS (2) GOVERNMENT COMMUNICATION HEADQUARTERS Defendants WITNESS STATEMENT OF ERIC KING I, Eric King, Deputy Director, Privacy International, 62 Britton Street, London EC1M 5UY, SAY AS FOLLOWS: 1. I am the Deputy Director of Privacy International. 2. I hold a Bachelor of Laws from the London School of Economics and have worked on issues related to communications surveillance at Privacy International since 2011. My areas of interest and expertise are signals intelligence, surveillance technologies and communications surveillance practices. I regularly speak at academic conferences, with government policy makers, and to international media. I have spent the past year researching the “Five Eyes” intelligence-sharing arrangement and the materials disclosed by Edward Snowden. 3. I make this statement in support of Privacy International’s claim. The contents of this statement are true to the best of my knowledge, information and belief and are the product of discussion and consultation with other experts. Where I rely on other sources, I have endeavoured to identify the source . 4. In this statement I will address, in turn, the following matters: a. The transmission and interception of digital communications; b. The difference between internal and external communications under RIPA, as applied to the internet and modern communications techniques; c. Intelligence sharing practices among the US, UK, Australia, New Zealand and Canada (“the Five Eyes”); d. The UK’s consequent access to signals intelligence collected by the United States through its PRISM and UPSTREAM collection programmes; e. -
United Kingdom
FREEDOM ON THE NET 2013 1 UNITED KINGDOM 2012 2013 POPULATION: 63.2 million INTERNET FREEDOM STATUS FREE FREE INTERNET PENETRATION 2012: 87 percent SOCIAL MEDIA/ICT APPS BLOCKED: No Obstacles to Access (0-25) 2 2 POLITICAL/SOCIAL CONTENT BLOCKED: No Limits on Content (0-35) 6 6 BLOGGERS/ICT USERS ARRESTED: No Violations of User Rights (0-40) 16 16 PRESS FREEDOM 2013 STATUS: Free † Total (0-100) 24 24 * 0=most free, 100=least free KEY DEVELOPMENTS: MAY 2012 – APRIL 2013 In an effort to protect children from harmful content, filtering on mobile phones is enabled by default and has resulted in instances of over-blocking. In contrast, ISPs did not block politically orientated content on household connections (see LIMITS ON CONTENT). Revisions to the Defamation Act provided greater legal protections for intermediaries and reduced the scope for “libel tourism” (see LIMITS ON CONTENT and VIOLATIONS OF USER RIGHTS). The Protection of Freedoms Act of 2012 created new requirements to obtain judicial approval prior to accessing online surveillance data, although revelations surrounding the GCHQ’s Tempora program have since brought many of these protections into doubt (see VIOLATIONS OF USER RIGHTS). Several web users were prosecuted or fined for breaking court injunctions, violating the privacy of crime victims, and committing libel using social networks (see VIOLATIONS OF USER RIGHTS). UNITED KINGDOM FREEDOM ON THE NET 2013 2 EDITOR’S NOTE ON RECENT DEVELOPMENTS The following chapter covers developments in the United Kingdom from May 1, 2012 to April 30, 2013. However, beginning in June 2013, British daily newspaper the Guardian published a series of revelations on secret surveillance practices by the British General Communications Headquarters (GCHQ) and American National Security Agency (NSA).