[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Mail] [Sign-in] [Setup] [Help] [Register]
Status: Not Logged In; Sign In
LEFT WING LOONS Title: 9 Reasons Wired Readers Should Wear Tinfoil Hats 9 Reasons Wired Readers Should Wear Tinfoil Hats By David Kravets Theres plenty of reason to be concerned Big Brother is watching. Were paranoid not because we have grandiose notions of our self-importance, but because the facts speak for themselves. Heres our short list of nine reasons that Wired readers ought to wear tinfoil hats, or at least, fight for their rights and consider ways to protect themselves with encryption and defensive digital technologies. We know the list is incomplete, so if you have better reasons that we list here, put them in the comments and well make a list based off them. Until then, remember: Dont suspect a friend; report him. Warrantless Wiretapping The government refuses to acknowledge whether the National Security Agency is secretly siphoning the nations electronic communications to the National Security Agency without warrants, as the Electronic Frontier Foundation alleges. The lawsuit was based on evidence provided by a former AT&T technician Mark Klein that showed that AT&T had installed a secret spying room in an internet hub in San Francisco. The spying got so bad that Attorney General Ashcroft threatened to resign over it. When a federal judge said a lawsuit on that issue could go forward, Congress passed legislation stopping the case in its tracks. Two American lawyers for an Islamic charity did, however, prevail in their suit that they were wiretapped without warrants, but the Administration is appealing. Much of the program was legalized in 2008 by the FISA Amendments Act. The FBI has also built a nationwide computer system called the Digital Collection System, connected by fiber optic cables, to collect and analyze wiretaps of all types, including ones used in ultra-secret terrorism investigations. Warrantless GPS Tracking The Obama administration claims Americans have no right to privacy in their public movements. The issue surfaced this month in a landmark case before the U.S. Supreme Court to determine if law enforcement agents should be required to obtain a probable-cause warrant in order to place a GPS tracking device on a citizens car. The government admitted to the Supreme Court that it thinks it would have the power to track the justices cars without a warrant. The invasive technology allows police, the FBI, the Drug Enforcement Administration and other agencies to engage in covert round-the-clock surveillance over an extended period of time, collecting vast amounts of information about anyone who drives the vehicle that is being tracked. The Justice Department has said that law enforcement agents employ GPS as a crime-fighting tool with great frequency, and GPS retailers have told Wired that theyve sold thousands of the devices to the feds. Tracking Devices in Your Pocket That mobile phone in your pocket chronicles almost everything. Once-secret software developed by a private company pretty much chronicles all you do on your smartphone and sends it to the carriers. The carriers themselves keep a wealth of information, such as text messages, call-location data, and PINs though none of them disclose to their customers what data they store or how long they keep the data. Law enforcement can get at much of that historical data and often get real-time tracking information without proving probable cause to a judge. Fake Cell Phone Towers You make a call on your cellphone thinking the only thing standing between you and the recipient of your call is your carriers cellphone tower. In fact, that tower your phone is connecting to just might be a boobytrap set up by law enforcement to ensnare your phone signals and maybe even the content of your calls. So-called stingrays are one of the new high-tech tools that authorities are using to track and identify you. The devices, about the size of a suitcase, spoof a legitimate cellphone tower in order to trick nearby cellphones and other wireless communication devices into connecting to the tower, as they would to a real cellphone tower. The government maintains that the stingrays dont violate Fourth Amendment rights, since Americans dont have a legitimate expectation of privacy for data sent from their mobile phones and other wireless devices to a cell tower. While the technology sounds ultra-new, the feds have had this in their arsenal for at least 15 years, and used a stingray to bust the notorious hacker Kevin Mitnick in 1995. The Border Exception The Fourth Amendment doesnt exist along the U.S. border. You know that if youre a close supporter of WikiLeaks or a friend of alleged WikiLeaks leaker Bradley Manning. Youre no doubt very familiar with the U.S. governments laptop border search policy, which allows Customs and Border Protection agents to seize and search a laptop belonging to anyone crossing a border into the U.S. Agents can search through files on a travelers laptop, phone or other mobile device, read e-mail or view digital snapshots to uncover incriminating evidence, and they dont need any reason to do so. The government argues, and the 9th U.S. Circuit Court agrees that searching through a persons laptop for copyright violations is no different than looking through their suitcase for cocaine and thus fits squarely with what is known as the border exception to the Fourth Amendment. That means a border agent doesnt need reasonable suspicion, probable cause or even a hunch to open your laptop, seize it and make copies of your data. At least three supporters of WikiLeaks, including security researcher Jacob Appelbaum. have been subject to the policy and had devices seized and searched as they re-entered the U.S. from foreign trips. U.S. Customs and Border Patrol seem to particularly like searching Appeblaums devices and questioning him, despite the fact that Wikileaks has never been charged with a crime in the U.S. The 6 Months and Its the Governments Rule If youre already not wanting a dose of Prozac, consider that the law allows the government to obtain Americans e-mails, without a warrant, if its stored on some other companys servers for more than six months. The Electronic Communications Privacy Act, adopted in 1986, turned 25 this year. When written, the law assumed e-mails left on a server for that long were abandoned. In the age of Gmail, thats simply ridiculous. A proposal to demand a court warrant for any and all e-mail never got a Senate hearing and was opposed by the Obama administration. The Patriot Act No paranoia list would be complete without including the Patriot Act, the now 10-year-old law adopted in the wake of September 11. The act, which has remained largely the same since former president George W. Bush signed the legislation six weeks after 9/11, gives the government, among other things, the power to acquire phone, banking and other records via the power of a so-called national security letter, which does not require a court warrant. National security letters, perhaps the most invasive facet of the law, are written demands from the FBI that compel internet service providers, financial institutions and others to hand over confidential records about their customers, such as subscriber information, phone numbers and e-mail addresses, bank records and arguably websites you have visited. The FBI need merely assert, in writing, that the information is relevant to an ongoing terrorism or national security investigation. Nearly everyone who gets a national security letter is prohibited from even disclosing that theyve received one. More than 200,000 letters have been issued by the FBI, despite a series of stinging reports from the Justice Departments internal watchdog, who found FBI agents werent just routinely sloppy; they also violated the law. Moreover, a decade after Bushs signature, information is sketchy about how the law is being used in practice. For instance, Sen. Ron Wyden (D-Oregon) claims the government applies a far broader, and classified, legal interpretation of the Patriot Acts power to let the government seize most anything it deems relevant to an investigation (Section 215). Were getting to a gap between what the public thinks the law says and what the American government secretly thinks the law says, the Senate Intelligence Committee member said in a recent interview with Wired. When youve got that kind of a gap, youre going to have a problem on your hands. Government Malware Its little known, but governments have their own malware/spyware that it deploys against suspected lawbreakers. The FBIs version, the last time we checked, was called CIPAV. Once an FBI agent convinced a target to install it (by clicking an e-mail attachment or link on the web), the spyware reports back everything that computer does online. German states recently came under fire for misusing a similar program that reportedly could turn on a computers camera and take screenshots. And a recent Wall Street Journal story catalogs a surveillance software company which trumpeted its ability to infect users via a fake iTunes update. The company sells its wares to governments around the world. Known Unknowns Former Secretary of Defense Donald Rumsfeld took an unfair amount of abuse for his deployment of the phrase known unknowns. And its these known unknowns that might be the most disturbing part of the list. For instance, does the government think the Patriot Act allows it to force Google to turn over information about anyone who has searched for certain keywords using orders that come with a gag order? Is the NSA sucking up everything we say on our phones and that we do online, under the theory it pushed in a court case that its not a search until a human actually looks at the data? How often do police investigating a crime ask wireless providers to give them a list of all the people whose phones were in use in the area when they think a crime was committed? What kind of sweeping surveillance orders have been issued under the 1998 law that Congress passed to legalize much of the warrantless wiretapping of Americans? And finally, how long is the government storing all this data, and how can we be sure that our future governments wont start using this data to target Americans based on activities protected by the First Amendment? And no a tinfoil hat wont help you at all.
Post Comment Private Reply Ignore Thread Top Page Up Full Thread Page Down Bottom/Latest
#1. To: CZ82 (#0)
jump
|
[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Mail] [Sign-in] [Setup] [Help] [Register]
|