Rights, Technology

The Child Exchange

Reuters investigative reporter Megan Twohey spent 18 months examining how American parents use the Internet to find new families for children they regret adopting. Reporters identified eight online bulletin boards where participants advertised unwanted children, often international adoptees, as part of an informal practice that’s called private re-homing. Reuters data journalist Ryan McNeill worked with Twohey and reporter Robin Respaut to analyse 5,029 posts from one of the bulletin boards, a Yahoo group called Adopting-from-Disruption.

Separately, Reuters examined almost two dozen cases from across the United States in which adopted children were privately re-homed. Twohey reviewed thousands of pages of records, many of them confidential, from law enforcement and child welfare agencies. In scores of interviews, reporters talked with parents who gave away or took in children, the facilitators who helped them, organisations that participated in re-homing, and experts concerned about the risks posed to the children and the legality of the custody transfers. Twohey also interviewed children themselves. They talked about being brought to America, discarded by their adoptive parents and moved from home to home — via redwolf.newsvine.com

Politics, Rights, Technology

Whistleblower reveals Australia’s spy agency has access to internet codes

Australia’s electronic spy agency reportedly has access to a top secret program that has successfully cracked the encryption used by hundreds of millions of people to protect the privacy of their emails, phone calls and online business transactions.

Documents disclosed by US intelligence whistleblower Edward Snowden reveal the program run by the US National Security Agency, codenamed Bullrun, has been used to secretly descramble high-level internet security systems globally.

They show the NSA and British Government Communications Headquarters (GCHQ) have successfully cracked the encryption used in personal communications such as email and telephone calls as well as global commerce and banking systems.

An undated briefing sheet on the program, provided to British analysts when they are cleared for access to Bullrun, was published on Friday in The New York Times and The Guardian newspapers.

It states that the Australian Signals Directorate — until recently called the Defence Signals Directorate (DSD) – was expected to be granted access — via redwolf.newsvine.com

Rights, Technology

NSA Able to Foil Basic Safeguards of Privacy on Web

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the NSA wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J Snowden, the former NSA contractor.

Beginning in 2000, as encryption tools were gradually blanketing the Web, the NSA invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own back door in all encryption, it set out to accomplish the same goal by stealth.

The agency, according to the documents and interviews with industry officials, deployed custom-built, super-fast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.

The NSA hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.

For the past decade, NSA has led an aggressive, multi-pronged effort to break widely used Internet encryption technologies, said a 2010 memo describing a briefing about NSA accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.

When the British analysts, who often work side by side with NSA officers, were first told about the program, another memo said, those not already briefed were gobsmacked!

An intelligence budget document makes clear that the effort is still going strong. We are investing in ground-breaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic, the director of national intelligence, James R Clapper Jr, wrote in his budget request for the current year — via redwolf.newsvine.com

Entertainment, Rights, Technology

Just call the NSA / Bahram Sadeghi

The NSA is in dire need of customer service training — at least in the case of Bahram Sadeghi, a Dutch-Iranian filmmaker who decided to call the surveillance agency for help after one of his e-mails was accidentally deleted. In a three-minute exchange with NSA spokespeople, Sadeghi manages to confound one with his request (you can almost hear the relief in her voice when Sadeghi asks to speak to someone else) and gets a curt reply from another — via The Washington Post

Politics, Rights, Technology

Coalition backflips on internet filtering policy

Less than five hours after releasing the policy (now deleted but original PDF here), the Coalition is seeking to deny that a policy around opt-out internet filtering is the current Coalition policy, despite Liberal MP, and author of the policy, Paul Fletcher speaking to ZDNet confirming the policy.

Fletcher confirmed to ZDNet tonight that the reason the Coalition had decided to go down this path was to take out the confusion for parents who are unsure who or where to get filtering products from.

What we intend to do is work with the industry to arrive at an arrangement where the default is that there is a filter in the home device, the home network, that is very similar to the filters that are available today. This is very much about protecting children from inappropriate content, particularly pornography, he said.

The key thing is it is an opt-out, so it will be open to the customer to call up and say ‘look I don’t want this’ and indeed we will work with the industry to make this a streamlined and efficient process, he said.

Shadow Communications Minister Malcolm Turnbull has said tonight that opt-out internet filtering is not the policy of the Coalition

The Coalition has never supported mandatory internet filtering. Indeed, we have a long record of opposing it, he said — via redwolf.newsvine.com

Politics, Rights, Technology

Australian opposition vows to implement internet filter by default

A Liberal National government in Australia would adopt the abandoned its plans for mandatory internet filtering, and three years after the Coalition announced that it would not support a policy for mandatory internet filtering.

The announcement, buried in an AU$10 million online safety policy published online today (PDF) announces that under a Tony Abbott government, Australians would have adult content filters installed on their phone services and fixed internet services unless they opt out — via redwolf.newsvine.com

New Zealand bans software patents

New Zealand has finally passed a new Patents Bill that will effectively outlaw software patents after five years of debate, delay and intense lobbying from multinational software vendors.

Aptly-named Commerce Minister Craig Foss welcomed the modernisation of patents law, saying it marked a significant step towards driving innovation in New Zealand.

By clarifying the definition of what can be patented, we are giving New Zealand businesses more flexibility to adapt and improve existing inventions, while continuing to protect genuine innovations, Foss said.

The nearly unanimous passage of the Bill was also greeted by Institute of IT Professionals (IITP) chief executive Paul Matthews, who congratulated Foss for listening to the IT industry and ensuring software patents were excluded — via redwolf.newsvine.com

Australia’s indefinite detention of refugees cruel, inhuman, UN says

A UN watchdog has called on Australia to release 46 refugees being held in indefinite detention, labelling it cruel and arbitrary.

The UN Human Rights Committee has slammed Australia’s treatment of the group, saying the country broke global human rights rules by denying the group a chance to challenge their detention.

In a review of complaints from the refugees — 42 Sri Lankan Tamils, three Rohingya Muslims from Myanmar and a Kuwaiti — the committee said the detention was arbitrary and broke the International Covenant on Civil and Political Rights.

Australia’s indefinite detention of 46 recognised refugees on security grounds amounted to cruel, inhuman and degrading treatment, inflicting serious psychological harm on them, the committee said in a statement.

The plaintiffs arrived at Australia’s remote Christmas Island between March 2009 and December 2010 — via redwolf.newsvine.com

Spy law passed in New Zealand

New spy laws legalising domestic communications interception were narrowly passed in New Zealand yesterday by a vote of 61 to 59 in Parliament.

The Government argued the laws are necessary to clarify the powers of the Government Communications Services Bureau (GCSB), New Zealand’s cyber security agency, when it is asked to assist law enforcement agencies such as Police and the Security Intelligence Service.

That clarification was needed because, in a major embarrassment to the Government, surveillance mounted against Mega Upload founder Kim Dotcom in late 2011 and early 2012 at the request of the FBI was subsequently found to be illegal.

Opponents fear the law has done more than just clarify existing rules, however, and has broadened interception capabilities to allow the mass collection of domestic communications metadata and content.

The law’s passage through Parliament coincided with Edward Snowden’s ongoing disclosures about international communications interception which revealed data collection and mining on an unprecedented scale — via redwolf.newsvine.com

Forced Exposure

The owner of Lavabit tells us that he’s stopped using email and if we knew what he knew, we’d stop too.

There is no way to do Groklaw without email. Therein lies the conundrum.

What to do?

What to do? I’ve spent the last couple of weeks trying to figure it out. And the conclusion I’ve reached is that there is no way to continue doing Groklaw, not long term, which is incredibly sad. But it’s good to be realistic. And the simple truth is, no matter how good the motives might be for collecting and screening everything we say to one another, and no matter how “clean” we all are ourselves from the standpoint of the screeners, I don’t know how to function in such an atmosphere. I don’t know how to do Groklaw like this — via redwolf.newsvine.com

NSW Opposition plan to search criminals without a warrant

The New South Wales Opposition is pushing for new laws to allow police to search the homes and cars of some criminals without a warrant.

The extra powers would relate to bikies and other criminal gang members who were the subject of a Firearms Prohibition Order.

The order can be placed on criminals by the Police Commissioner to ban them from owning a gun.

Opposition Leader John Robertson will introduce legislation to State Parliament that would extend those powers, allowing police to stop and search anyone subject to a Firearms Prohibition Order, without a warrant.

Cars and homes would also be able to be searched for illegal guns under the plan — via redwolf.newsvine.com

Cameron Proves Greenwald Right

Readers know I have been grappling for a while with the vexing question of the balance between the surveillance state and the threat of Jihadist terrorism. When the NSA leaks burst onto the scene, I was skeptical of many of the large claims made by civil libertarians and queasily sympathetic to a program that relied on meta-data alone, as long as it was transparent, had Congressional buy-in, did not accidentally expose innocent civilians to grotesque privacy loss, and was watched by a strong FISA court.

Since then, I’ve watched the debate closely and almost all the checks I supported have been proven illusory. The spying is vastly more extensive than anyone fully comprehended before; the FISA court has been revealed as toothless and crippled; and many civilians have had their privacy accidentally violated over 3000 times. The president, in defending the indefensible, has damaged himself and his core reputation for honesty and candor. These cumulative revelations have exposed this program as, at a minimum, dangerous to core liberties and vulnerable to rank abuse. I’ve found myself moving further and further to Glenn’s position.

What has kept me from embracing it entirely has been the absence of any real proof than any deliberate abuse has taken place and arguments that it has helped prevent terror attacks. This may be too forgiving a standard. If a system is ripe for abuse, history tells us the only question is not if such abuse will occur, but when. So it is a strange and awful irony that the Coalition government in Britain has today clinched the case for Glenn — via redwolf.newsvine.com

Greenwald Partner falsely detained as Terrorist: How to Create a Dictatorship

How to turn a democracy into a STASI authoritarian state in 10 easy steps:

  1. Misuse the concept of a Top Secret government document (say, the date of D-Day) and extend classification to trillions of mundane documents a year
  2. Classify all government crimes and violations of the Constitution as secret
  3. Create a class of 4.5 million privileged individuals, many of them corporate employees, with access to classified documents but allege it is illegal for public to see leaked classified documents
  4. Spy on the public in violation of the Constitution
  5. Classify environmental activists as terrorists while allowing Big Coal and Big Oil to pollute and destroy the planet
  6. Share info gained from NSA spying on public with DEA, FBI, local law enforcement to protect pharmaceuticals & liquor industry from competition from pot, or to protect polluters from activists
  7. Falsify to judges and defence attorneys how allegedly incriminating info was discovered
  8. Lie and deny to Congress you are spying on the public
  9. Criminalise the revelation of government crimes and spying as Espionage
  10. Further criminalise whistleblowing as Terrorism, have compradors arrest innocent people, detain them, and confiscate personal effects with no cause or warrant (i.e. David Miranda, partner of Glenn Greenwald)

Presto, what looks like a democracy is really an authoritarian state ruling on its own behalf and that of 2000 corporations, databasing the activities of 312 million innocent citizens and actively helping destroy the planet while forestalling climate activism — via redwolf.newsvine.com

Germany becomes first European country to recognise undetermined sex

Germany will become the first country in Europe to join a small group of nations which recognise a third or “undetermined” sex when registering births, according to a report in the Süddeutsche Zeitung.

From 1 November, babies born in Germany without clear gender-determining physical characteristics will be able to be registered without a sex on their birth certificates, according to the report.

The change is being seen as the country’s first legal acknowledgement that it is possible for a human to be neither male nor female — which could have far-reaching consequences in many legal areas.

While transsexuals — people born of one gender who feel they belong to the other and wish to be recognised as such — are already legally recognised in Germany, hermaphrodites – those with both male and female genitalia — have always been forcibly registered as one or other sex at birth.

The German decision to recognise a third gender was based on a recommendation by the constitutional court, which sees legal recognition of a person’s experienced and lived gender as a personal human right — via redwolf.newsvine.com

Detaining my partner: a failed attempt at intimidation

At 6:30 am this morning my time — 5:30 am on the East Coast of the US — I received a telephone call from someone who identified himself as a security official at Heathrow airport. He told me that my partner, David Miranda, had been detained at the London airport under Schedule 7 of the Terrorism Act of 2000.

David had spent the last week in Berlin, where he stayed with Laura Poitras, the US filmmaker who has worked with me extensively on the NSA stories. A Brazilian citizen, he was returning to our home in Rio de Janeiro this morning on British Airways, flying first to London and then on to Rio. When he arrived in London this morning, he was detained.

At the time the security official called me, David had been detained for 3 hours. The security official told me that they had the right to detain him for up to 9 hours in order to question him, at which point they could either arrest and charge him or ask a court to extend the question time. The official — who refused to give his name but would only identify himself by his number: 203654 — said David was not allowed to have a lawyer present, nor would they allow me to talk to him.

I immediately contacted the Guardian, which sent lawyers to the airport, as well various Brazilian officials I know. Within the hour, several senior Brazilian officials were engaged and expressing indignation over what was being done. The Guardian has the full story here — via redwolf.newsvine.com

NSA breached privacy rules thousands of times, leaked documents show

The US National Security Agency (NSA) broke privacy rules thousands of times in the past two years, according to an internal audit leaked by whistleblower Edward Snowden.

The internal documents, cited in the Washington Post, cast fresh doubts on pledges from US president Barack Obama to prevent abuses and protect Americans’ civil rights.

The documents were leaked by Snowden, a former NSA contractor who has exposed the massive scale of America’s surveillance of phone records and internet traffic in recent leaks to the media.

Snowden, who describes himself as a whistleblower for civil liberties, has obtained asylum in Russia, despite appeals from Washington for extradition on espionage charges — via redwolf.newsvine.com

Northern Territory government to repeal centuries-old witchcraft, tarot card law

The Northern Territory Government is repealing old legislation which makes tarot card reading and witchcraft illegal.

A recent review of the Territory’s Summary Offences Act found a centuries-old law citing anyone caught conjuring spells or predicting the future could face one year in prison.

The Witchcraft Act of 1735 has been inherited from Britain and has since been repealed in most other parts of the Western world.

But Northern Territory Attorney-General John Elferink says a legal quirk meant it stayed on the Territory’s statute books.

He says a year in prison is a pretty stiff punishment for a tarot card reader and has promised to finally repeal the legislation — via redwolf.newsvine.com

Storm Rages After Google Argues Against Gmail Privacy

Privacy? What privacy? That attitude by Google in a recent court filing is causing a storm of controversy that shows at least some users have not yet given up on their right to privacy.

In a motion to dismiss a class-action suit in which Google was accused of violating federal and state wiretap laws because its ad service automatically scans e-mails to determine targeting, the technology giant seemed to have put its foot into it.

Google said that just as a sender of a letter to a business colleague cannot be surprised that the recipient’s assistant opens the letter, people who use Web-based e-mail today cannot be surprised if their communications are processed by the recipient’s ECS provider in the course of delivery. ECS stands for electronic communications service — via redwolf.newsvine.com