CRYPTO DEBATE BIBLIOGRAPHY in Reverse Chronological Order Major

Total Page:16

File Type:pdf, Size:1020Kb

CRYPTO DEBATE BIBLIOGRAPHY in Reverse Chronological Order Major CRYPTO DEBATE BIBLIOGRAPHY in reverse chronological order Major Announcements, Statements, General News Coverage Microsoft will encrypt Bing search traffic by default James Vincent, The Verge, June 16, 2015 ​ ​ http://www.theverge.com/2015/6/16/8788373/encrypted­search­microsoft­bing Wikipedia Is Now Using HTTPS By Default To Prevent Snooping And Censorship Kate Vinton, Forbes, June 12, 2015 ​ ​ http://www.forbes.com/sites/katevinton/2015/06/12/wikipedia­is­now­using­https­by­default­to­prevent­snoop ing­and­censorship/ If the FBI has a backdoor to Facebook or Apple encryption, we are less safe Trevor Timm, The Guardian, June 9, 2015 ​ ​ http://www.theguardian.com/commentisfree/2015/jun/09/fbi­facebook­backdoor­apple­encryption­less­safe­p rivacy With Islamic State using instant messaging apps, FBI seeks access to data Brian Bennett, The LA Times, June 8, 2015 ​ ​ http://www.latimes.com/world/middleeast/la­fg­terror­messaging­20150608­story.html#page=1 Congress on verge of major cuts to key cryptography agency Drew Mitnick, Access, June 5, 2015 ​ ​ https://www.accessnow.org/blog/2015/06/05/congress­on­verge­of­major­cuts­to­key­cryptography­agency FBI anti­terror official calls on tech firms to 'prevent encryption above all else' Alex Hern, The Guardian, June 5, 2015 ​ ​ http://www.theguardian.com/technology/2015/jun/05/fbi­anti­terror­tech­firms­encryption?CMP=twt_gu Microsoft Gives Details About Its Controversial Disk Encryption Micah Lee, The Intercept, June 4, 2015 ​ ​ https://firstlook.org/theintercept/2015/06/04/microsoft­disk­encryption/ Facebook introduces PGP encryption for sensitive emails Alex Hern, The Guardian, June 1, 2015 ​ ​ http://www.theguardian.com/technology/2015/jun/01/facebook­introduces­pgp­encryption­for­sensitive­email s Lawmakers urge FBI to stand down on decryption push Ellen Nakashima, The Washington Post, June 1, 2015 ​ ​ http://www.washingtonpost.com/blogs/post­politics/wp/2015/06/01/lawmakers­urge­fbi­to­stand­down­on­dec ryption­push/ The man behind Yahoo’s plan to become the most ‘trustworthy’ tech company Andrea Peterson, The Washington Post, May 29, 2015 ​ ​ 1 http://www.washingtonpost.com/blogs/the­switch/wp/2015/05/29/the­man­behind­yahoos­plan­to­become­th e­most­trustworthy­tech­company/ U.N. Special Rapporteur: Governments Must Not “Backdoor” Encryption For Spying Ryan Gallagher, The Intercept, May 28, 2015 ​ ​ https://firstlook.org/theintercept/2015/05/28/united­nations­encryption­anonymity­surveillance/ Today’s Internet users are still being hurt by ’90s­era U.S. encryption policies Andrea Peterson, The Washington Post, May 28, 2015 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2015/05/28/todays­internet­users­are­still­being­hurt­by ­90s­era­u­s­encryption­policies/ U.N. report: Encryption is important to human rights — and backdoors undermine it Andrea Peterson, The Washington Post, May 28, 2015 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2015/05/28/un­report­encryption­is­important­to­human ­rights­and­backdoors­undermine­it/ NSA chief: Encryption isn't bad, it's the future Steve Ranger, ZDNet, May 28, 2015 ​ ​ http://www.zdnet.com/article/nsa­chief­encryption­isnt­bad­its­the­future/ Loretta Lynch Joins Obama Administration Fearmongering Over Encryption Sam Sacks, The Intercept, May 27, 2015 ​ ​ https://firstlook.org/theintercept/2015/05/27/loretta­lynch­joins­obama­administration­fearmongering­encrypti on/ Microsoft’s Top Lawyer Says Company Must Weigh Encryption Limits Danny Yadron, The Wall Street Journal, May 27, 2015 ​ ​ http://blogs.wsj.com/digits/2015/05/27/brad­smith­suggests­microsoft­might­obey­law­that­limits­encryption/ Encryption innovator leaves US over surveillance Elise Viebeck, The Hill, May 26, 2015 ​ ​ http://thehill.com/policy/cybersecurity/243101­encryption­innovator­leaves­us­over­surveillance Is This the NSA’s Secret to Cracking Secure Comms? Nicholas Weaver, The Daily Beast, May 21, 2015 ​ ​ http://www.thedailybeast.com/articles/2015/05/21/is­this­the­nsa­s­secret­to­cracking­secure­comms.html Encryption, But With Backdoors? The FBI Has Business Running In Circles Tim Sparapani, Forbes, May 21, 2015 ​ ​ http://www.forbes.com/sites/timsparapani/2015/05/21/encryption­but­with­backdoors­the­fbi­has­business­ru nning­in­circles/ Anatomy of a LOGJAM ­ another TLS vulnerability, and what to do about it Paul Ducklin, Naked Security, May 21, 2015 ​ ​ https://nakedsecurity.sophos.com/2015/05/21/anatomy­of­a­logjam­another­tls­vulnerability­and­what­to­do­ about­it/ 2 Transcript: Comey Says Authors of Encryption Letter Are Uninformed or Not Fair­Minded Megan Graham, Just Security, May 20, 2015 ​ ​ http://justsecurity.org/23120/transcript­comey­authors­encryption­letter­uniformed­fair­minded/ FBI head found Silicon Valley encryption letter 'depressing' Corey Bennett, The Hill, May 20, 2015 ​ ​ http://thehill.com/policy/cybersecurity/242666­fbi­head­found­silicon­valley­encryption­letter­depressing HTTPS­crippling attack threatens tens of thousands of Web and mail servers Dan Goodin, ArsTechnica, May 20, 2015 ​ ​ http://arstechnica.com/security/2015/05/https­crippling­attack­threatens­tens­of­thousands­of­web­and­mail­ servers/ What You Need to Know About the New LogJam Bug Jennifer Valentino­Devries, The Wall Street Journal, May 20, 2015 ​ ​ http://blogs.wsj.com/digits/2015/05/20/what­you­need­to­know­about­the­new­logjam­bug/ Tech Giants Urge Obama to Reject Policies That Weaken Encryption Nicole Perlroth, The New York Times, May 19, 2015 ​ ​ http://www.nytimes.com/2015/05/20/technology/tech­giants­urge­obama­to­reject­policies­that­weaken­encr yption­technology.html?ref=technology&_r=0 Tech giants don’t want Obama to give police access to encrypted phone data Ellen Nakashima, The Washington Post, May 19, 2015 ​ ​ http://www.washingtonpost.com/world/national­security/as­encryption­spreads­us­worries­about­access­to­d ata­for­investigations/2015/04/10/7c1c7518­d401­11e4­a62f­ee745911a4ff_story.html Apple and Google sign letter urging Obama to support encryption Alex Hern, The Guardian, May 19, 2015 ​ ​ http://www.theguardian.com/technology/2015/may/19/apple­google­letter­president­obama­encryption­fbi­su rveillance Pretty Much Anyone With Any Understanding Of Crypto Tells President Obama That Backdooring Crypto Is Monumentally Stupid Mike Masnick, Tech Dirt, May 19, 2015 ​ ​ https://www.techdirt.com/articles/20150518/21180031044/pretty­much­anyone­with­any­understanding­crypt o­tells­president­obama­that­backdooring­crypto­is­monumentally­stupid.shtml “We Support Strong Encryption” Jonathan Mayer, Web Policy, May 12, 2015 ​ ​ http://webpolicy.org/2015/05/12/we­support­strong­encryption/ Bill would prohibit government­ordered tech ‘back doors’ Elise Viebeck, The Hill, May 5, 2015 ​ ​ http://thehill.com/policy/cybersecurity/241130­bill­would­prohibit­government­ordered­tech­back­doors Internet godfather warns about plans for technology ‘back doors’ 3 Julian Hattem, The Hill, May 4, 2015 ​ ​ http://thehill.com/policy/technology/240965­internet­godfather­warns­about­plans­for­technology­back­doors Increased encryption a double­edged sword Maria Korolov, CSO Online, May 4, 2015 ​ ​ http://www.csoonline.com/article/2917210/network­security/increased­encryption­a­double­edged­sword.htm The FBI wants us to have computer security so strong that only they can break in… John Naughton, The Guardian, May 3, 2015 ​ ​ http://www.theguardian.com/commentisfree/2015/may/03/fbi­computer­security­strong­break­in Encryption won't work if it has a back door only the 'good guys' have keys to Cory Doctorow, The Guardian, May 1, 2015 ​ ​ http://www.theguardian.com/technology/2015/may/01/encryption­wont­work­if­it­has­a­back­door­only­the­go od­guys­have­keys­to­ Mozilla goes all out for Web encryption Elise Viebeck, The Hill, May 1, 2015 ​ ​ http://thehill.com/policy/cybersecurity/240777­mozilla­goes­all­out­for­web­encryption Irate Congressman gives cops easy rule: “just follow the damn Constitution” Cyrus Farivar, Ars Technica, April 30, 2015 ​ ​ http://arstechnica.com/tech­policy/2015/04/irate­congressman­gives­cops­easy­rule­just­follow­the­damn­co nstitution/ InfoSec pros reject DHS criticisms of encryption Maria Korolov, CSO Online, April 30, 2015 ​ ​ http://www.csoonline.com/article/2916820/data­protection/infosec­pros­reject­dhs­criticisms­of­encryption.ht ml Feds are using fear, not facts, in anti­encryption crusade Joshua Kopstein, Al Jazeera America, April 30, 2015 ​ ​ http://america.aljazeera.com/opinions/2015/4/feds­are­using­fear­not­facts­in­anti­encryption­crusade.html Congressman with computer science degree: Encryption back­doors are ‘technologically stupid’ Andrea Peterson, The Washington Post, April 30, 2915 ​ ​ http://www.washingtonpost.com/blogs/the­switch/wp/2015/04/30/congressman­with­computer­science­degre e­encryption­back­doors­are­technologically­stupid/ Lawmakers Challenge FBI On Surveillance Backdoors, Encryption Hamza Shaban, Buzzfeed News, April 30, 2015 ​ ​ http://www.buzzfeed.com/hamzashaban/lawmakers­challenge­fbi­on­surveillance­backdoors­encryption#.qe 1aQ1xv6M Both sides of data encryption debate face off in Congress Joe Uchill, The Christian Science Monitor, April 30, 2015 ​ ​ http://www.csmonitor.com/World/Passcode/2015/0430/Both­sides­of­data­encryption­debate­face­off­in­Con gress 4 Lawmakers skeptical of FBI's encryption warnings Cory Bennet, The Hill, April 29, 2015 ​ ​ http://thehill.com/policy/cybersecurity/240553­lawmakers­skeptical­of­fbis­encryption­breaking­request Representatives question FBI and point out fallacies
Recommended publications
  • Bulk Powers in the Investigatory Powers Bill: the Question of Trust Remains Unanswered
    Bulk Powers In The Investigatory Powers Bill: The Question Of Trust Remains Unanswered BULK POWERS IN THE INVESTIGATORY POWERS BILL: The Question Of Trust Remains Unanswered September 2016 1/10 Bulk Powers In The Investigatory Powers Bill: The Question Of Trust Remains Unanswered Introduction We are on the brink of introducing the most pervasive and intrusive surveillance legislation of any democratic country in the world. The Investigatory Powers Bill sought to answer important questions about the place that modern and highly intrusive surveillance capabilities have in a democratic society, questions that were raised by the Edward Snowden disclosures in 2013 and subsequent reports produced by David Anderson QC, the Royal United Services Institute (RUSI) and the Intelligence and Security Committee (ISC) in 2015. But just a matter of weeks before the new law is enacted, significant questions of trust remain unanswered. This paper highlights some of the key flaws Privacy International sees in the current incarnation of the Investigatory Powers Bill, and urges the House of Lords to put the brakes on the bulk powers, about which many important questions remain unanswered. In this paper we set out how: • the Bill fails to provide sufficient clarity, which was promised at the outset of the legislative process, to alleviate confusion around the UK’s surveillance laws; • the Bill has not advanced transparency to the degree needed, still leaving most of the public in the dark about the extent of the surveillance powers; • significant questions remain about the Bill’s safeguards and oversight regime; and • major questions also remain regarding the bulk powers, even in light of David Anderson QC’s recent report.
    [Show full text]
  • Mass Surveillance
    Mass Surveillance Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 January 2015 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance Part 1 – Risks, Opportunities and Mitigation Strategies” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof. Bart Preneel, KU Leuven; Raoul Chiesa, Security Brokers SCpA, CyberDefcon Ltd.; Prof.
    [Show full text]
  • Parallel Construction” on Communities of Color
    VIA ELECTRONIC COMMUNICATION Chief Commissioner Martin Castro United States Commission on Civil Rights 1331 Pennsylvania Ave., NW, Suite 1150 Washington, DC 20425 Request to the United States Commission on Civil Rights to investigate disproportionate impacts of “Parallel Construction” on communities of color October 23, 2015 Request prepared by: Sean Vitka X-Lab Fellow Email: [email protected] Request to USCCR re: impacts of “Parallel Construction” I. Introduction Parallel Construction is a broadly defined practice in which law enforcement conceals and/or recreates the origin of an investigation. It was first widely reported by Reuters in August 2013.1 The term is derived from government documents that reveal guidance on the deliberate masking and falsification of investigative history in order to erase investigations’ origins.2 According to the report, the Special Operations Division (SOD), a unit of the Drug Enforcement Administration (DEA), distributes information in partnership with two dozen other agencies, including the Federal Bureau of Investigations (FBI), the Central Intelligence Agency (CIA), the National Security Agency (NSA), and the Department of Homeland Security (DHS). Information distributed through this partnership has been used to spark domestic, non-national security related investigations.3 The information and its source are not merely concealed by the government in order to avoid legal challenges and judicial review of controversial surveillance methods. Instead, as described in the Reuters report, “[a]gents are instructed to then use ‘normal investigative techniques to recreate the information provided by SOD.’”4 In other words, investigators are told to find a second source for the same information, allowing the government to use evidence in court without ever facing legal scrutiny of its true sources and methods.
    [Show full text]
  • Two Years After Snowden
    TWO YEARS AFTER SNOWDEN PROTECTING HUMAN RIGHTS IN AN AGE OF MASS SURVEILLANCE (COVER IMAGE) A student works on a computer that is projecting former U.S. National Security Agency contractor Edward Snowden as he appears live via video during a world affairs conference in Toronto © REUTERS/Mark Blinch 2 TWO YEARS AFTER SNOWDEN JUNE 2015 © REUTERS/Zoran Milich © REUTERS/Zoran “The hard truth is that the use of mass surveillance technology effectively does away with the right to privacy of communications on the Internet altogether.” Ben Emmerson QC, UN Special Rapporteur on counter-terrorism and human rights EXECUTIVE SUMMARY On 5 June 2013, a British newspaper, The exposed by the media based on files leaked by Guardian, published the first in a series Edward Snowden have included evidence that: of revelations about indiscriminate mass surveillance by the USA’s National Security Companies – including Facebook, Google Agency (NSA) and the UK’s Government and Microsoft – were forced to handover Communications Headquarters (GCHQ). their customers’ data under secret orders Edward Snowden, a whistleblower who had through the NSA’s Prism programme; worked with the NSA, provided concrete evidence of global communications the NSA recorded, stored and analysed surveillance programmes that monitor the metadata related to every single telephone internet and phone activity of hundreds call and text message transmitted in of millions of people across the world. Mexico, Kenya, and the Philippines; Governments can have legitimate reasons GCHQ and the NSA have co- for using communications surveillance, for opted some of the world’s largest example to combat crime or protect national telecommunications companies to tap security.
    [Show full text]
  • Rumold Declaration Final
    Case 2:15-cv-02573-PSG-JPR Document 32-1 Filed 07/27/15 Page 1 of 69 Page ID #:296 1 MARK RUMOLD (SBN 279060) [email protected] 2 DAVID GREENE (SBN 160107) 3 NATHAN D. CARDOZO (SBN 259097) LEE TIEN (SBN 148216) 4 KURT OPSAHL (SBN 191303) 5 HANNI FAKHOURY (SBN 252629) JAMIE L. WILLIAMS (SBN 279046) 6 ANDREW CROCKER (SBN 291596) 7 ELECTRONIC FRONTIER FOUNDATION 815 Eddy Street 8 San Francisco, CA 94109 9 Telephone: (415) 436-9333 Facsimile: (415) 436-9993 10 11 Counsel for Plaintiff Human Rights Watch 12 UNITED STATES DISTRICT COURT 13 CENTRAL DISTRICT OF CALIFORNIA 14 WESTERN DIVISION 15 16 17 HUMAN RIGHTS WATCH, ) Case No: 2:15-cv-2573-PSG-JPR ) 18 Plaintiff, ) DECLARATION OF MARK RUMOLD FILED IN SUPPORT 19 v. ) ) OF PLAINTIFF’S OPPOSITION 20 DRUG ENFORCEMENT ) TO DEFENDANTS’ MOTION TO DISMISS 21 ADMINISTRATION, et al., ) ) 22 Defendants. ) 23 ) Date: August 17, 2015 ) Time: 1:30 p.m. 24 ) Courtroom 880 – Roybal 25 ) Hon. Philip S. Gutierrez 26 27 28 DECLARATION OF MARK RUMOLD Case 2:15-cv-02573-PSG-JPR Document 32-1 Filed 07/27/15 Page 2 of 69 Page ID #:297 1 I, MARK RUMOLD, hereby declare: 2 1. I am an attorney of record for plaintiffs in this action and a member in 3 good standing of the California State Bar. I am admitted to practice before this 4 5 Court. I have personal knowledge of the matters stated in this declaration and if 6 called upon to do so I am competent to testify to all matters set forth herein.
    [Show full text]
  • Ben Buchanan • Nobody but Us 3
    A HOOVER INSTITUTION ESSAY Nobody But Us ThE RiSE AND FALL OF THE GOLDEN AGE OF SigNALS INTELLigENCE BEN BUCHANAN Aegis Series Paper No. 1708 Introduction The United States’ National Cryptologic Museum in Fort Meade, Maryland, displays versions of two important encryption machines. The first is the Enigma machine, the most famous cryptographic apparatus ever built. The second machine, less well known, is called SIGABA. These devices are similar in certain important respects. Each employs an electromechanical rotor-based design. Each was used during World War II; the Nazis deployed Enigma while US forces relied on SIGABA. It is no exaggeration to say that, during the conflict, these machines protected—or tried to protect—some of the most important messages in the world. National Security, Technology, and Law and Technology, Security, National Both sides treated the machines as closely guarded secrets. The United States took enormous steps to protect SIGABA, requiring that it only be deployed to areas where American forces could guard it and instructing these forces to destroy the machines before they could be captured.1 American cryptologists feared what could happen if the enemy gained access to SIGABA and reverse engineered it. On the other hand, the Allies achieved an enormous success when they captured an Enigma machine. Acquiring the physical device was one of the many factors that enabled the Allies to eventually understand its workings and decrypt the messages it protected.2 These encryption devices are more than just historical artifacts. They represent perhaps the purest form of signals intelligence work. One machine represents the challenge of breaking an enemy’s code, while the other represents the imperative to secure friendly communications.
    [Show full text]
  • Amicus Briefs on Behalf of Itself and Others in Cases Involving
    Case: 13-50572, 11/05/2015, ID: 9745936, DktEntry: 25, Page 1 of 47 13-50572 IN THE United States Court of Appeals FOR THE NINTH CIRCUIT dUNITED STATES OF AMERICA, Plaintiff-Appellee, —v.— BASAALY MOALIN, Defendant-Appellant. ON APPEAL FROM THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF CALIFORNIA CASE NO.10-CR-4246 HONORABLE JEFFREY T. MILLER, SENIOR DISTRICT JUDGE BRIEF OF AMICI CURIAE BRENNAN CENTER FOR JUSTICE, AMERICAN LIBRARY ASSOCIATION, ELECTRONIC PRIVACY INFORMATION CENTER, FREEDOM TO READ FOUNDATION, NATIONAL ASSOCIATION OF CRIMINAL DEFENSE LAWYERS, NINTH CIRCUIT FEDERAL AND COMMUNITY DEFENDERS, REPORTERS COMMITTEE FOR FREEDOM OF THE PRESS IN SUPPORT OF DEFENDANT-APPELLANT AND REVERSAL MICHAEL PRICE* FAIZA PATEL BRENNAN CENTER FOR JUSTICE BRENNAN CENTER FOR JUSTICE AT NEW YORK UNIVERSITY AT NEW YORK UNIVERSITY SCHOOL OF LAW SCHOOL OF LAW 161 Avenue of the Americas 161 Avenue of the Americas New York, New York 10013 New York, New York 10013 (646) 292-8335 (646) 292-8325 *Counsel of Record Attorneys for Amici Curiae Brennan Center for Justice, American Library Association, and Freedom to Read Foundation (Counsel continued on inside cover) Case: 13-50572, 11/05/2015, ID: 9745936, DktEntry: 25, Page 2 of 47 ALAN BUTLER LISA HAY ELECTRONIC PRIVACY INFORMATION FEDERAL PUBLIC DEFENDER CENTER (EPIC) DISTRICT OF OREGON 1718 Connecticut Avenue NW One Main Place Washington, DC 20009 101 Southwest Main Street, (202) 483-1140 Room 1700 Portland, Oregon 97204 DAVID M. PORTER (503) 326-2123 CO-CHAIR, NACDL AMICUS COMMITTEE HEATHER ERICA WILLIAMS 801 I Street, 3rd Floor FEDERAL PUBLIC DEFENDER Sacramento, California 95814 EASTERN DISTRICT OF CALIFORNIA (916) 498-5700 801 I Street, 3rd Floor Sacramento, California 95814 BRUCE D.
    [Show full text]
  • Surveillance Giants
    SURVEILLANCE GIANTS: HOW THE BUSINESS MODEL OF GOOGLE AND FACEBOOK THREATENS HUMAN RIGHTS Amnesty International is a global movement of more than 7 million people who campaign for a world where human rights are enjoyed by all. Our vision is for every person to enjoy all the rights enshrined in the Universal Declaration of Human Rights and other international human rights standards. We are independent of any government, political ideology, economic interest or religion and are funded mainly by our membership and public donations. © Amnesty International 2019 All images: © Sebastien Thibault/agoodson.com Except where otherwise noted, content in this document is licensed under a Creative Commons (attribution, non-commercial, no derivatives, international 4.0) licence. https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode For more information please visit the permissions page on our website: www.amnesty.org Where material is attributed to a copyright owner other than Amnesty International this material is not subject to the Creative Commons licence. First published in 2019 by Amnesty International Ltd Peter Benenson House, 1 Easton Street, London WC1X 0DW, UK Index: POL 30/1404/2019 Original language: English amnesty.org SURVEILLANCE GIANTS: HOW THE BUSINESS MODEL OF GOOGLE AND FACEBOOK THREATENS HUMAN RIGHTS SURVEILLANCE GIANTS: HOW THE BUSINESS MODEL OF GOOGLE AND FACEBOOK THREATENS HUMAN RIGHTS 3 Amnesty International CONTENTS EXECUTIVE SUMMARY 5 1. THE BUSINESS OF SURVEILLANCE 8 The business model of Google and Facebook 9 Dominant power of Google and Facebook 10 Data extraction and accumulation 12 BOX 1: Harvesting data in the Global South 13 Ubiquitous surveillance 15 BOX 2: Business and human rights 17 2.
    [Show full text]
  • Cowardly Traitor Or Heroic Whistleblower?: the Impact of Edward Snowden’S Disclosures on Canada and the United Kingdom’S Security Establishments
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Lincoln Memorial University, Duncan School of Law: Digital Commons... LINCOLN MEMORIAL UNIVERSITY LAW REVIEW _____________________________________ VOLUME 3 FALL 2015 _____________________________________ COWARDLY TRAITOR OR HEROIC WHISTLEBLOWER?: THE IMPACT OF EDWARD SNOWDEN’S DISCLOSURES ON CANADA AND THE UNITED KINGDOM’S SECURITY ESTABLISHMENTS Daniel Alati1 The ‘world’s most wanted man,’ Edward Snowden, might be one of the most polarizing figures in modern history. This is particularly true in the United States, where the debates pertaining to his leaks of classified information could not be more divided. Many Americans, including senior level government officials, have publicly argued that Snowden is a cowardly traitor, and have forcefully stated their belief that Snowden should return home to face a myriad of criminal charges, including those under the 1917 Espionage Act. However, many others have gone to great lengths and taken immense personal risks to support Snowden and help further his goal of bringing to light some of the most egregious surveillance abuses ever released into the public sphere. 1 Dr. Daniel Alati is a post-doctoral researcher at the City University of Hong Kong. His doctoral studies at the University of Oxford focused on comparative anti-terrorism mechanisms in Canada and the United Kingdom. COWARDLY TRAITOR OR HEROIC WHISTLEBLOWER? 92 Snowden’s closest confidants are still eager to tell his story: Laura Poitras’ documentary
    [Show full text]
  • Intervention Big Brother Watch and Others V. the United Kingdom Application No. 58170/13 Introduction and Summ
    Intervention Big Brother Watch and Others v. the United Kingdom Application No. 58170/13 Introduction and Summary Access Now is honoured to submit this intervention in Big Brother Watch and Others v. the ​ United Kingdom (Application no. 58170/13). Access Now is a global civil society organization ​ dedicated to defending and extending the digital rights of users at risk.1 Through representation in 10 countries around the world – including in the European Union ­ Access Now provides ​ ​ thought leadership and policy recommendations to the public and private sectors to ensure the internet’s continued openness and universality and wields an action­focused global community of nearly half a million users from more than 185 countries. Access Now also operates a 24/7 digital security helpline that provides real­time direct technical assistance to users around the world. Access Now is non­partisan, not­for­profit, and not affiliated with any country, corporation, or religion. The issues the Court is being asked to rule upon in Big Brother Watch and Others v. the United ​ Kingdom implicate human rights to privacy and free expression for internet users around the ​ world. The internet empowers individuals and enables citizens to take part in struggles for ​ ​ justice, participate in society, and realize human rights around the globe. But government surveillance has turned the internet into a tool of repression, granting unprecedented abilities to invade privacy and quell political dissent and the spread of non­conforming ideas. Human rights must be preserved equally on the internet as they have traditionally been implemented in the physical world. This intervention provides an overview of issues that will further color the Court’s consideration of the vital questions for consideration in this case.
    [Show full text]
  • COVID-19: Potential Implications for International Security Environment— Overview of Issues and Further Reading for Congress
    COVID-19: Potential Implications for International Security Environment— Overview of Issues and Further Reading for Congress Updated May 27, 2020 Congressional Research Service https://crsreports.congress.gov R46336 SUMMARY R46336 COVID-19: Potential Implications for May 27, 2020 International Security Environment—Overview Ronald O'Rourke of Issues and Further Reading for Congress Specialist in Naval Affairs Some observers argue the COVID-19 pandemic could be a world-changing event with potentially Kathleen J. McInnis profound and long-lasting implications for the international security environment and the U.S. Specialist in International role in the world. Other observers are more skeptical that the COVID-19 pandemic will have Security such effects. Observers who argue the COVID-19 pandemic could be world-changing for the international Michael Moodie security environment and the U.S. role in the world have focused on several areas of potential Assistant Director and change, including the following, which are listed here separately but overlap in some cases and Senior Specialist in Foreign Affairs, Defense and Trade can interact with one another: world order, international institutions, and global governance; U.S. global leadership and the U.S. role in the world; China’s potential role as a global leader; U.S. relations and great power competition with China and Russia, including the use of the COVID-19 pandemic as a theme or tool for conducting ideological competition; the relative prevalence of democratic and authoritarian or autocratic forms of government; societal tension, reform, transformation, and governmental stability in various countries; the world economy, globalization, and U.S. trade policy; the characteristics and conduct of conflict; allied defense budgets and U.S.
    [Show full text]
  • Mass Surveillance Part 1 - Risks and Opportunities Raised by the Current Generation of Network Services and Applications
    Science and Technology Options Assessment (STOA) Mass Surveillance Part 1 - Risks and opportunities raised by the current generation of network services and applications STUDY EPRS | European Parliamentary Research Service Scientific Foresight (STOA) Unit PE 527.409 EN Mass Surveillance What are the risks for the citizens and the opportunities for the European Information Society? What are the possible mitigation strategies? Part 1 - Risks and opportunities raised by the current generation of network services and applications Study IP/G/STOA/FWC-2013-1/LOT 9/C5/SC1 December 2014 PE 527.409 STOA - Science and Technology Options Assessment The STOA project “Mass Surveillance – Risks, Opportunities and Mitigation Strategies Part 1” was carried out by TECNALIA Research and Investigation in Spain. AUTHORS Arkaitz Gamino Garcia Concepción Cortes Velasco Eider Iturbe Zamalloa Erkuden Rios Velasco Iñaki Eguía Elejabarrieta Javier Herrera Lotero Jason Mansell (Linguistic Review) José Javier Larrañeta Ibañez Stefan Schuster (Editor) The authors acknowledge and would like to thank the following experts for their contributions to this report: Prof. Nigel Smart, University of Bristol; Matteo E. Bonfanti PhD, Research Fellow in International Law and Security, Scuola Superiore Sant’Anna Pisa; Prof. Fred Piper, University of London; Caspar Bowden, independent privacy researcher; Maria Pilar Torres Bruna, Head of Cybersecurity, Everis Aerospace, Defense and Security; Prof. Kenny Paterson, University of London; Agustín Martin and Luis Hernández Encinas, Tenured Scientists, Department of Information Processing and Cryptography (Cryptology and Information Security Group), CSIC; Alessandro Zanasi, Zanasi & Partners; Fernando Acero, Expert on Open Source Software; Luigi Coppolino,Università degli Studi di Napoli; Marcello Antonucci, EZNESS srl; Rachel Oldroyd, Managing Editor of The Bureau of Investigative Journalism; Peter Kruse, Founder of CSIS Security Group A/S; Ryan Gallagher, investigative Reporter of The Intercept; Capitán Alberto Redondo, Guardia Civil; Prof.
    [Show full text]