Politics, Rights, Technology

Australian government warrantless data requests pass 500,000

Requests from government agencies for Australian telecommunications customers’ phone, internet, and address data surpassed 500,000 in the last financial year, according to the Australian Communications and Media Authority (ACMA).

The figure was revealed in the ACMA’s annual report (PDF) released this month. It says that there were 563,012 authorisations granted to government agencies for access to telecommunications metadata in the 2013-14 financial year.

Under the Telecommunications (Interception and Access) Act, government agencies can force telecommunications companies to hand over details about their customers, including address, phone number, IP address, call data, SMS data, and other held information without a warrant for the purpose of enforcing the law.

The ACMA recorded that total disclosures amounted to 748,079 for the financial year including to law enforcement for a range of reasons, such as to avert a threat to life, assist the ACMA, or enforce the criminal law of a foreign country.

The number of requests by far exceeds the more than 300,000 requests made in the 2012-13 financial year reported by the Attorney-General’s Department in its Telecommunications (Interception and Access) report last year. The report for this year has yet to be tabled in parliament.

A spokesperson for the Attorney-General’s Department had not responded to a request for comment on the disparity at the time of writing; however, security agencies such as the Australian Security and Intelligence Organisation (ASIO) are not required to publicly report the number of metadata access requests they make.

The department told The Guardian that the difference between the two figures was due to the department only counting the authorisation for a particular person’s details. So if the request is made to multiple telcos for that one person’s information, the access request is only counted as one from that particular government agency. The ACMA has compiled its report based on data from the telcos themselves, leading to the higher figure — via redwolf.newsvine.com

History, Rights
Frank Serpico by Antonino D’Ambrosio

The Police Are Still Out of Control

Forty-odd years on, my story probably seems like ancient history to most people, layered over with Hollywood legend. For me it’s not, since at the age of 78 I’m still deaf in one ear and I walk with a limp and I carry fragments of the bullet near my brain. I am also, all these years later, still persona non grata in the NYPD. Never mind that, thanks to Sidney Lumet’s direction and Al Pacino’s brilliant acting, Serpico ranks No 40 on the American Film Institute’s list of all-time movie heroes, or that as I travel around the country and the world, police officers often tell me they were inspired to join the force after seeing the movie at an early age.

In the NYPD that means little next to my 40-year-old heresy, as they see it. I still get hate mail from active and retired police officers. A couple of years ago after the death of David Durk — the police officer who was one of my few allies inside the department in my efforts to expose graft — the Internet message board NYPD Rant featured some choice messages directed at me. Join your mentor, Rat scum! said one. An ex-con recently related to me that a precinct captain had once said to him, If it wasn’t for that fuckin’ Serpico, I coulda been a millionaire today. My informer went on to say, Frank, you don’t seem to understand, they had a well-oiled money making machine going and you came along and threw a handful of sand in the gears.

In 1971 I was awarded the Medal of Honor, the NYPD’s highest award for bravery in action, but it wasn’t for taking on an army of corrupt cops. It was most likely due to the insistence of Police Chief Sid Cooper, a rare good guy who was well aware of the murky side of the NYPD that I’d try to expose. But they handed the medal to me like an afterthought, like tossing me a pack of cigarettes. After all this time, I’ve never been given a proper certificate with my medal. And although living Medal of Honor winners are typically invited to yearly award ceremonies, I’ve only been invited once — and it was by Bernard Kerick, who ironically was the only NYPD commissioner to later serve time in prison. A few years ago, after the New York Police Museum refused my guns and other memorabilia, I loaned them to the Italian-American museum right down street from police headquarters, and they invited me to their annual dinner. I didn’t know it was planned, but the chief of police from Rome, Italy, was there, and he gave me a plaque. The New York City police officers who were there wouldn’t even look at me — via redwolf.newsvine.com

Photo credit: Antonino D’Ambrosio

Politics, Rights

Call that a sword? This is a joke

tephen King once wrote that horror and humour were two of the most difficult story forms to master, because funny gone wrong is almost always horrifying, while a bungled horror story runs the risk of eliciting shrieks of laughter in place of terror.

It didn’t take long for the narrative threads of Death Cult in the Suburbs to unravel and the snickering to begin. And so we find, a few weeks after September’s terror raids, that the mystery sword that featured so prominently in everybody’s fever dreams of jihad come to Martin Place was not in fact the mighty blade of slashening; woe be unto the infidel. It was just a plastic toy, according to its owner. A replica artefact, as common in Shiite Muslim households as sun-faded happy snaps of Pope St John Paul II in the homes of Polish Catholics.

I guess it’s a lucky thing the raids only turned up a plastic sword then. What if those 800 cops had found a toy light sabre? The headlines would have screamed ISIS develops terrifying Stars Wars capability. The SAS might have been despatched to Tatooine.

There was always something dodgy about the scale of those raids, especially given the thin pickings they seemed to turn up. Very few arrests and now a prime piece of evidence negated.

Note the air quotes around the term evidence, though. The sword, which promised such horror in so many published, shared and retweeted photos, never made it into court.

If all the world’s a stage, it was a prop and the hundreds of citizens whose homes were raided weren’t even players. They were extras. Not even bit players, like the sailor whose story of being attacked while in uniform, perhaps because he was in uniform, was revealed as a bizarre fantasy, but only after that story had turned the crank on tensions a few notches further.

There’s something at play here that isn’t as simple a narrative as good v evil. For instance, in the month that Daash killers cut the heads off three captives on the internet, our Saudi Arabian allies publicly decapitated eight for various crimes including adultery, apostasy and sorcery. Woe be unto you, Harry Potter.

Our particular malady is not even a politics as theatre, however. Although Tony Abbott and the media are playing the terror card for all it’s worth and more, there are legitimate security issues buried somewhere beneath the witless hysteria, fear-mongering and click bait.

It’s fraught and complex, and the pity of our current derangement is that it not only prevents us from seeing this and dealing with the threat, it aggravates the condition — via redwolf.newsvine.com

Rights, Technology

Adobe Spyware Reveals (Again) the Price of DRM: Your Privacy and Security

The publishing world may finally be facing its rootkit scandal. Two independent reports claim that Adobe’s e-book software, Digital Editions, logs every document readers add to their local library, tracks what happens with those files, and then sends those logs back to the mother-ship, over the Internet, in the clear. In other words, Adobe is not only tracking your reading habits, it’s making it really, really easy for others to do so as well.

And it’s all being done in the name of copyright enforcement. After all, the great promise of Digital Editions is that it can help publishers “securely distribute” and manage access to books. Libraries, for example, encourage their patrons to use the software, because it helps them comply with the restrictions publishers impose on electronic lending.

How big is the problem? Not completely clear, but it could be pretty big. First, it appears Adobe is tracking more than many readers may realize, including information about self-published and purchased books. If the independent reports are correct, Adobe may be scanning your entire electronic library. Borrowing a copy of Moby Dick from your public library shouldn’t be a license to scan your cookbook collection.

Adobe claims that these reports are not quite accurate. According to Adobe, the software only collects information about the book you are currently reading, not your entire library. It also collects information about where you are reading that book, how long you’ve been reading it, and how much you’ve read. Still disturbing, if you ask us.

Second, sending this information in plain text undermines decades of efforts by libraries and bookstores to protect the privacy of their patrons and customers. (Adobe does not deny transmitting the information unencrypted.) Indeed, in 2011 EFF and a coalition of companies and public interest groups helped pass the Reader Privacy Act, which requires the government and civil litigants to demonstrate a compelling interest in obtaining reader records and show that the information contained in those records cannot be obtained by less intrusive means. But if readers are using Adobe’s software, it’s all too easy for folks to bypass those restrictions.

Third and most depressing: this flaw may have been unintentional, but we probably should have seen it coming. As our friend Cory Doctorow has been explaining for years, DRM for books is dangerous for readers, authors and publishers alike. Whether or not Adobe actually intended to create this particular vulnerability, if your computer is collecting information about you, and then transmitting it in ways you can’t control, chances are you’ve got a security problem — via redwolf.newsvine.com

Politics, Rights, Technology

Australian Government Scrambles to Authorise Mass Surveillance

This week, Australian Prime Minister Tony Abbott used recent terrorist threats as the backdrop of a dire warning to Australians that for some time to come, the delicate balance between freedom and security may have to shift. There may be more restrictions on some, so that there can be more protection for others.

This pronouncement came as two of a series of three bills effecting that erosion of freedoms made their way through Australia’s Federal Parliament. These were the second reading of a National Security Amendment Bill which grants new surveillance powers to Australia’s spy agency, ASIO, and the first reading of a Counter-Terrorism Legislation Amendment (Foreign Fighters) Bill that outlaws speech seen as advocating terrorism. A third bill on mandatory data retention is expected to be be introduced by the end of the year.

Whilst all three bills in this suite raise separate concerns, the most immediate concern—because the bill in question could be passed this week — is the National Security Amendment Bill. Introduced into Parliament on 16 July, it endured robust criticism during public hearings last month that led into an advisory report released last week. Nevertheless the bill was introduced into the Senate this Tuesday with the provisions of most concern still intact.

In simple terms, the bill allows law enforcement agencies to obtain a warrant to access data from a computer—so far, so good. But it redefines a computer to mean not only one or more computers but also one or more computer networks. Since the Internet itself is nothing but a large network of computer networks, it seems difficult to avoid the conclusion that the bill may stealthily allow the spy agency to surveil the entire Internet with a single warrant.

Apart from allowing the surveillance of entire computer networks, the bill also allows the addition, deletion or alteration of data stored on a computer, provided only that this would not materially interfere with, interrupt or obstruct a communication in transit or the lawful use by other persons of a computer unless … necessary to do one or more of the things specified in the warrant. Given the broad definition of computer, this provision is broad enough to authorise website blocking or manipulation, and even the insertion of malware into networks targeted by the warrant — via redwolf.newsvine.com

Politics, Rights, Technology, World

New Zealand denies it was planning mass domestic spying

New Zealand was preparing to conduct national covert surveillance last year, a US investigative journalist has said.

The claims by former Guardian newspaper reporter Glenn Greenwald were denied by New Zealand Prime Minister John Key.

The report was based on information disclosed by former US National Security Authority (NSA) contractor Edward Snowden, who said the government had planned to exploit new spying laws.

The revelations come just days ahead of a New Zealand general election — via redwolf.newsvine.com

Rights, Technology

WikiLeaks names NSW Police as FinFisher malware customer

WikiLeaks has today released parts of the FinFisher surveillance suite, as well as a customer list that it claims includes the police forces of the Netherlands and New South Wales, and the intelligence arms of the Hungarian, Qatari, Italian, and Bosnian governments.

Based on the price list it released, WikiLeaks has estimated that FinFisher licence sales brought in between €48 to €98 million, with total revenue said to be higher with FinFly ISP licences not being counted, nor the costs for support.

Of the customers listed, the NSW Police is listed as having purchased €1.8 million in FinFisher software, as well as submitting support requests relating to wanting to categorise keylogged conversations to avoid hot water by intruding on legal privilege, asking for reporting features to meet warrant requirements, and problems with FinSpy updates — via redwolf.newsvine.com

Business, Politics, Rights, Technology

Copyright infringement is terrorism, screech the revolution’s losers

You might have thought that Australia’s debate over online copyright infringement couldn’t get any sillier. But this week the journalists’ union came out as a fan of internet censorship, only to withdraw when they realised what they’d done. And Village Roadshow equated copyright infringement with terrorism and paedophilia, and came out in support of, oh, moonbats or something. Hard to say.

Village Roadshow’s submission (PDF) to the government’s copyright infringement discussion paper is the loopiest, with so much shouting and whining that it’s hard to take their hyperbole seriously.

The dangers posed by piracy are so great, the goal should be total eradication or zero tolerance. Just as there is no place on the internet for terrorism or paedophilia, there should be no place for theft that will impact the livelihoods of the 900,000 people whose security is protected by legitimate copyright, the submission says.

Oh get a grip.

The tone is clearly that of Village Roadshow’s co-CEO Graham Burke, whose manner at the best of times can most generously be described as eccentric. But to equate the abstract problem of a reduction in your profit margin with the damage done to the victims of child sexual abuse and the slaughter of innocents? That takes some chutzpah — via redwolf.newsvine.com

Rights, Technology

Android security mystery – ‘fake’ cellphone towers found in US

There have been many comments to this story from people who are assuming that these towers are physical installations. There’s no reason to assume this is the case: it’s far likelier that they are mobile installations of the kind used not only by law enforcement and government agencies, but also by scammers and other criminals — David Harley

Seventeen mysterious cellphone towers have been found in America which look like ordinary towers, and can only be identified by a heavily customized handset built for Android security — but have a much more malicious purpose, according to Popular Science.

The fake towers — computers which wirelessly attack cellphones via the baseband chips built to allow them to communicate with their networks, can eavesdrop and even install spyware, ESD claims. They are a known technology — but the surprise is that they are in active use — via redwolf.newsvine.com

Politics, Rights, Technology

Leaked paper reveals Australia’s obsessive metadata secrecy

Last Friday, the Australian Attorney-General’s Department sent internet service providers (ISPs) a confidential discussion paper — subsequently leaked to Fairfax Media — that attempts to clarify exactly what metadata they’ll be required to store under the government’s proposed mandatory data-retention scheme. The detailed requirements are presumably designed to feed into the statutory specification of metadata that will be included in legislation to be introduced to parliament in coming weeks.

Until now, the only official government description of metadata we’d seen — apart from that breathtakingly confused TV performance by Australia’s favourite Attorney-General Senator George Brandis QC — was the hilariously inadequate one-pager (PDF) that the Attorney-General’s Department (AGD) tabled in Senate Estimates on October 15, 2012, after much prodding by Greens Senator Scott Ludlam.

You might therefore think that the description of the government’s metadata needs in Friday’s document was a recent development.

You’d be wrong.

A confidential document obtained by ZDNet shows that even more detailed descriptions of the government’s data-collection ambitions had been discussed with ISPs as far back as early 2010.

The document, Carrier-Carriage Service Provider Data Set Consultation Paper version 1.0 (PDF), is a 16-page PDF file created on 9 March 2010, at 14:49. Its core sections are similar in structure to the nine-page document obtained by Fairfax Media this week, with the addition of tables of sample data to further illustrate the expected type of data to be retained for each specific retention requirement from the data set, discussion questions for industry to answer, and an introductory background section rather than an executive summary.

The 2010 version of the document was quite specific about the data to be collected. For mobile calls, for example, the data would include the IMSI and IMEI of both the calling party’s and called party’s devices, whereas the current version simply specifies the identifier(s) of the devices. This is in line with the government’s intention to make the legislation technology neutral.

References to web-browser sessions and file transfers that were in the 2010 version have vanished, too, in line with such ideas being dropped as the data-retention debate has evolved — via redwolf.newsvine.com

Politics, Rights

Al Jazeera journalists teargassed by security forces – in Ferguson, Missouri, USA

Here is a sentence that will be immediately familiar to anyone who has ever followed even a little news out of the Middle East:

Journalists from the Qatari news outlet Al Jazeera were attacked by state security forces today and blanketed in tear gas, as they attempted to film an ongoing protest; this is the latest in a string of attacks on journalists by security forces.

Now see if you can guess the country. It’s not Egypt. Not Tunisia.

Nope: this happened, exactly as described, in the United States of America on Wednesday night, in the Missouri town of Ferguson. Here is the video of Al Jazeera America journalists in Ferguson being clearly targeted with tear gas by Ferguson police (apologies for the poor quality) — via redwolf.newsvine.com

Rights, Technology

Crypto Daddy Phil Zimmerman says surveillance society is DOOMED

A killer combination of rapidly advancing technology and a desire for greater privacy among the public should condemn current surveillance state to an historical anachronism, according to PGP creator Phil Zimmermann.

In an extended talk at Defcon 22 in Las Vegas, Zimmermann said it might seem as though the intelligence agencies have the whip hand at the moment but mankind had faced this situation before. He also said the abolition of slavery and absolute monarchy, and the achievement for civil rights, also once looked unlikely but were achieved.

Zimmermann praised the release of information by NSA whistleblower Edward Snowden, saying his efforts have alerted the populace to the real state of affairs and made people much more concerned about privacy. The revelations had also forced the technology industry to up its game and provide products to meet that demand, he opined — via redwolf.newsvine.com

Business, Rights, Technology

Google Protects Chilling Effects From Takedown Notices

Chilling Effects is the largest public repository of DMCA notices on the planet, providing a unique insight into the Internet’s copyright battles. However, each month people try to de-index pages of the site but Google has Chilling Effects’ back and routinely rejects copyright claims — via redwolf.newsvine.com

Politics, Rights, Technology

Brandis proposes website blocking and piracy crackdown

A leaked discussion paper from both Attorney-General George Brandis and Communications Minister Malcolm Turnbull has floated the possibility of websites being blocked, and measures to compel ISPs to take steps to prevent their customers infringing on copyright online.

Five months after first flagging a crackdown was on its way, Brandis appears to be pushing ahead with plans to crack down on Australians using programs such as BitTorrent to obtain copyright-infringing content such as TV shows, music, and films.

The discussion paper, leaked to Crikey, had been expected to be released this month, following Brandis meeting with representatives in the US and UK governments on their respective copyright infringement deterrence schemes.

It outlines a number of potential legislative measures the government can implement to deter what the paper said is a long standing issue with Australians having high illegal download rates.

The government states in the document that it believes even if an ISP doesn’t have a direct power to prevent its users from infringing on copyright, there are reasonable steps it can take to deter infringement.

In a move to undo the 2012 High Court judgment that iiNet did not authorise its users’ copyright infringement, the paper proposes amending the Copyright Act to extend authorisation of copyright infringement and the power to prevent infringement would just be one factor the courts would consider in determining whether an ISP was liable for infringement — via redwolf.newsvine.com

Politics, Rights, World

High Court injunction blocks handover of 153 asylum seekers to Sri Lanka

The High Court has granted an interim injunction to block the handover of 153 asylum seekers to Sri Lanka, just hours after the Government confirmed another vessel had been returned.

On Monday the court heard an urgent claim from barristers seeking to protect the group, which includes 32 women and 37 children and is believed to be under the Government’s control at sea.

We argued that the asylum seekers are entitled to have their allegations — claims against the Sri Lankan government — heard and processed in accordance with the law, solicitor George Newhouse said.

The Minister can’t simply intercept them in the night and disappear them — via redwolf.newsvine.com

Politics, Rights, World

Suspected spy arrested in Germany for passing US information on NSA inquiry

An alleged spy has been arrested in Germany accused of passing the US information from a committee looking into NSA activities.

It has heightened diplomatic tensions between the two countries following allegations in the Edward Snowden leaks that the US electronic spy agency tapped Angela Merkel’s phone along with wider surveillance of German citizens.

The German government has not denied reports by Der Spiegel and the Sueddeutsche Zeitung that the suspected spy was a double agent and worked for Germany’s foreign intelligence service, the BND.

The newspapers said the man allegedly passed the US information about a German parliamentary committee’s investigation into the NSA’s activities.

He claimed to have worked with US intelligence since 2012, they reported — redwolf.newsvine.com

Rights

A Good Man / StoryCorps

Bryan Wilmoth and his seven younger siblings were raised in a strict, religious home. At StoryCorps, Bryan talks with his brother Mike about what it was like to reconnect years after their dad kicked Bryan out for being gay — via Youtube

Rights, Technology

Quora’s misogyny problem: A cautionary tale

Quora’s misogyny problem is a tempest out of the teapot, and it’s a perfect example of why user based websites need to change the way they think about targeted users.

What women have been going through on Quora is harrowing: Harassment and threats, stalking on and off the site, and an atmosphere that enables ongoing targeting with moderators that don’t understand, or help.

That’s because Quora’s baseline of normal behavior around gender is all screwed up — and it was made that way — via redwolf.newsvine.com

Rights

Pennsylvania Judge Sentenced For 28 Years For Selling Kids to the Prison System

Mark Ciavarella Jr, a 61-year old former judge in Pennsylvania, has been sentenced to nearly 30 years in prison for literally selling young juveniles for cash. He was convicted of accepting money in exchange for incarcerating thousands of adults and children into a prison facility owned by a developer who was paying him under the table. The kickbacks amounted to more than $1 million.

The Pennsylvania Supreme Court has overturned some 4,000 convictions issued by him between 2003 and 2008, claiming he violated the constitutional rights of the juveniles — including the right to legal counsel and the right to intelligently enter a plea. Some of the juveniles he sentenced were as young as 10-years old.

Ciavarella was convicted of 12 counts, including racketeering, money laundering, mail fraud and tax evasion. He was also ordered to repay $1.2 million in restitution — via redwolf.newsvine.com