Rights, Technology

Google’s Gmail scanning unclear to users, judge finds

A US federal judge allowed a class-action suit against Google to proceed, saying the company’s terms of service are unclear when describing how it scans Gmail content in order to deliver advertisements.

Google had filed a motion to dismiss the suit, which alleges that the company intercepted and read email while in transit in order to deliver advertisements and create user profiles and models since 2008. The plaintiffs alleged the company violated federal and state wire-tapping laws.

The suit, which is being heard in US District Court for the Northern District of California, further contends non-Gmail users who sent email to Gmail users were also subject to illegal interception.

In her ruling Thursday, US District Judge Lucy H Koh wrote that Google’s terms of service and privacy policies do not explicitly say that the company intercepts users’ email to create user profiles or deliver targeted advertising.

Although Google revised its terms of service and privacy policy in 2012, Koh wrote that a reasonable Gmail user who read the Privacy Policies would not have necessarily understood that her emails were being intercepted to create user profiles or to provide targeted advertisements — via redwolf.newsvine.com

Politics, Rights, Technology

The corrosive effect of surveillance secrecy

When surveillance and national security supporters look back on the last three years at some remove, one of the lessons they may learn is that the reflexive obsession with secrecy cruelled the capacity of security institutions and governments to obtain any sort of social licence for surveillance, or even of basic trust.

The obsession of the United States government with secrecy has long since reached Kafkaesque proportions — but if you’re the victim of one of its campaigns, it is nightmarish.

Two weeks ago the US Department of Justice sought and obtained a gag order to prevent American journalist and sometime Crikey contributor Barrett Brown and his legal team from discussing his prosecution. Brown, who revealed many connections between the US government and the growing cyber military-industrial complex in the US, faces an array of charges with sentences totalling over 100 years in prison, including for sharing a link online.

At the point where even the US mainstream media had worked out that the prosecution of Brown was another example of the Obama administration’s war on investigative journalism, the administration decided enough was enough and secured a gag order to undermine the growing profile of Brown’s case. The prosecution argued the gag order was necessary because Brown was manipulating the public. This is Barack Obama’s America, where telling the world about your Kafkaesque prosecution for sharing a link is manipulating the public.

The gag order is symptomatic of the way this administration does business: it imposes secrecy requirements on others, while of course retaining the right to reveal whatever secret information it feels is in its own interests. An Obama administration gag order is routine in cases where it has pursued journalists and whistle-blowers, or its agencies have demanded the co-operation of IT and communications companies to spy on Americans, or provide back doors into their products to allow spying.

One of the genuinely amusing moments in the Obama administration’s hysterical overreaction to Edward Snowden was when Obama claimed in all seriousness that he had been planning to initiate a debate about the extensive powers that enabled the National Security Agency to spy on both Americans and the rest of us, but Edward Snowden came along and ruined his plans by revealing the true extent of surveillance — via redwolf.newsvine.com

Health, Science, Technology

Bionic eye testing moves into the field

A backpack computer has been developed to let people test a bionic eye so the implant can be perfected for those needing it.

The bionic eye project aims to give some vision to people who have lost their sight by transmitting images from a pair of glasses which have been fitted with a video camera.

Those images go to the implant, which stimulates the optic nerve.

The prototype computer will simulate the experience for testers and help researchers develop the algorithms required for mobility and orientation.

The head of the wearable computer laboratory at the University of South Australia, Bruce Thomas, says the testing project involves equipment readily available which has been modified and made easy to use for practical medical research — via redwolf.newsvine.com

Craft, Technology

Tooth Fairy Tooth Transport / Jeff Highsmith

When my older son discovered his first wiggly tooth, I realised that I had the chance to define the Tooth Fairy experience for another generation. As I pondered how the Tooth Fairy would collect our family’s teeth, it occurred to me that she has an awful lot of teeth to gather, especially considering the ever-rising world population. It seemed prudent to figure out a way to send the teeth to her for processing, rather than make her visit the homes of all 7,103,000,000 people on Earth. As such, I installed a pneumatic transport system (as at the bank drive-through) in my house, for the purpose of sending teeth to the Tooth Fairy, and receiving renumeration back from her.

The Raspberry Pi serves up an interface that I built using Hype, which allowed me to quickly animate the movement of the capsule on the map and the spinning tooth on the Under Review page. I expect to eventually use the pneumatic transport system to exchange messages and objects with the other creatures that come at night, as my son calls them, so I included buttons for Santa Clause and the Easter Bunny. The HTML5 interface can play sounds, too, if it is Added to Home Screen as a web app — via Youtube

Rights, Technology

The Child Exchange

Reuters investigative reporter Megan Twohey spent 18 months examining how American parents use the Internet to find new families for children they regret adopting. Reporters identified eight online bulletin boards where participants advertised unwanted children, often international adoptees, as part of an informal practice that’s called private re-homing. Reuters data journalist Ryan McNeill worked with Twohey and reporter Robin Respaut to analyse 5,029 posts from one of the bulletin boards, a Yahoo group called Adopting-from-Disruption.

Separately, Reuters examined almost two dozen cases from across the United States in which adopted children were privately re-homed. Twohey reviewed thousands of pages of records, many of them confidential, from law enforcement and child welfare agencies. In scores of interviews, reporters talked with parents who gave away or took in children, the facilitators who helped them, organisations that participated in re-homing, and experts concerned about the risks posed to the children and the legality of the custody transfers. Twohey also interviewed children themselves. They talked about being brought to America, discarded by their adoptive parents and moved from home to home — via redwolf.newsvine.com

Politics, Rights, Technology

Whistleblower reveals Australia’s spy agency has access to internet codes

Australia’s electronic spy agency reportedly has access to a top secret program that has successfully cracked the encryption used by hundreds of millions of people to protect the privacy of their emails, phone calls and online business transactions.

Documents disclosed by US intelligence whistleblower Edward Snowden reveal the program run by the US National Security Agency, codenamed Bullrun, has been used to secretly descramble high-level internet security systems globally.

They show the NSA and British Government Communications Headquarters (GCHQ) have successfully cracked the encryption used in personal communications such as email and telephone calls as well as global commerce and banking systems.

An undated briefing sheet on the program, provided to British analysts when they are cleared for access to Bullrun, was published on Friday in The New York Times and The Guardian newspapers.

It states that the Australian Signals Directorate — until recently called the Defence Signals Directorate (DSD) – was expected to be granted access — via redwolf.newsvine.com

Business, Technology

Nokia is dead, Newkia rises from its ashes

Nokia’s fate would have been a lot different today if it had taken the Android route, and this is what freshly minted company — aptly named Newkia — plans to do by acquiring as much of Nokia’s know-how as possible.

Speaking to ZDNet in an interview Thursday, Thomas Zilliacus, executive chairman and founder of Mobile FutureWorks, did not mince his words when asked about his views on Microsoft’s US$7.2 billion deal to buy out Nokia’s devices and services unit. The deal reflects the complete failure of the Windows strategy Stephen Elop chose when he was appointed Nokia CEO some two years ago.

Nokia, which only three years ago was the world’s runaway market leader in mobile phones, is today a small and insignificant brand, he said, noting that the purchase price announced yesterday represented just 2 percent of Nokia’s market cap over 10 years ago — via redwolf.newsvine.com

Rights, Technology

NSA Able to Foil Basic Safeguards of Privacy on Web

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the NSA wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J Snowden, the former NSA contractor.

Beginning in 2000, as encryption tools were gradually blanketing the Web, the NSA invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own back door in all encryption, it set out to accomplish the same goal by stealth.

The agency, according to the documents and interviews with industry officials, deployed custom-built, super-fast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.

The NSA hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.

For the past decade, NSA has led an aggressive, multi-pronged effort to break widely used Internet encryption technologies, said a 2010 memo describing a briefing about NSA accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.

When the British analysts, who often work side by side with NSA officers, were first told about the program, another memo said, those not already briefed were gobsmacked!

An intelligence budget document makes clear that the effort is still going strong. We are investing in ground-breaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic, the director of national intelligence, James R Clapper Jr, wrote in his budget request for the current year — via redwolf.newsvine.com

Entertainment, Rights, Technology

Just call the NSA / Bahram Sadeghi

The NSA is in dire need of customer service training — at least in the case of Bahram Sadeghi, a Dutch-Iranian filmmaker who decided to call the surveillance agency for help after one of his e-mails was accidentally deleted. In a three-minute exchange with NSA spokespeople, Sadeghi manages to confound one with his request (you can almost hear the relief in her voice when Sadeghi asks to speak to someone else) and gets a curt reply from another — via The Washington Post

Politics, Rights, Technology

Coalition backflips on internet filtering policy

Less than five hours after releasing the policy (now deleted but original PDF here), the Coalition is seeking to deny that a policy around opt-out internet filtering is the current Coalition policy, despite Liberal MP, and author of the policy, Paul Fletcher speaking to ZDNet confirming the policy.

Fletcher confirmed to ZDNet tonight that the reason the Coalition had decided to go down this path was to take out the confusion for parents who are unsure who or where to get filtering products from.

What we intend to do is work with the industry to arrive at an arrangement where the default is that there is a filter in the home device, the home network, that is very similar to the filters that are available today. This is very much about protecting children from inappropriate content, particularly pornography, he said.

The key thing is it is an opt-out, so it will be open to the customer to call up and say ‘look I don’t want this’ and indeed we will work with the industry to make this a streamlined and efficient process, he said.

Shadow Communications Minister Malcolm Turnbull has said tonight that opt-out internet filtering is not the policy of the Coalition

The Coalition has never supported mandatory internet filtering. Indeed, we have a long record of opposing it, he said — via redwolf.newsvine.com

Politics, Rights, Technology

Australian opposition vows to implement internet filter by default

A Liberal National government in Australia would adopt the abandoned its plans for mandatory internet filtering, and three years after the Coalition announced that it would not support a policy for mandatory internet filtering.

The announcement, buried in an AU$10 million online safety policy published online today (PDF) announces that under a Tony Abbott government, Australians would have adult content filters installed on their phone services and fixed internet services unless they opt out — via redwolf.newsvine.com

Business, Technology

Microsoft to buy Nokia’s devices, services unit for $7.2B

Microsoft announced on Monday it will acquire Nokia’s devices and services unit in a bid to accelerate the software giant’s Windows ecosystem.

The deal is set to go ahead for about $5 billion (€3.79bn), with an additional $2.17 billion (€1.65bn) to be spent on licensing Nokia’s patents.

Boards of both companies agreed the transaction, which will see the Redmond, Wash.-based software giant purchase the Espoo, Finland-based company’s phone making unit, patents, and license and use its mapping services — via redwolf.newsvine.com

Technology

A Data Broker Offers a Peek Behind the Curtain

It can be disconcerting to learn what, not to mention how much, marketers know about us. Consider a consumer like Scott E Howe.

The Acxiom Corporation, a marketing technology company that has amassed details on the household make-up, financial means, shopping preferences and leisure pursuits of a majority of adults in the United States, knows that Mr Howe is 45, married with children, the owner of a house in the 2,500-square-foot range, and is interested, among other things, in tennis, domestic travel, cooking, crafts, sweepstakes and contests. Those intimate details, Mr Howe says, are entirely accurate.

I am crazy about that stuff, he says of the sweepstakes and contests.

Mr Howe is one of the first Americans to get a detailed glimpse of his own marketing profile because he happens to be the chief executive of Acxiom. But most consumers never learn the specific pieces of information that have been compiled about them by marketers.

That is about to change. Acxiom, one of the most secretive and prolific collectors of consumer information, is embarking on a novel public relations strategy: openness. On Wednesday, it plans to unveil a free Web site where United States consumers can view some of the information the company has collected about them, just as Mr Howe did.

The data on the site, called AbouttheData.com, includes biographical facts, like education level, marital status and number of children in a household; homeownership status, including mortgage amount and property size; vehicle details, like the make, model and year; and economic data, like whether a household member is an active investor with a portfolio greater than $150,000. Also available will be the consumer’s recent purchase categories, like plus-size clothing or sports products; and household interests like golf, dogs, text-messaging, cholesterol-related products or charities.

Each entry comes with an icon that visitors can click to learn about the sources behind the data — whether self-reported consumer surveys, warranty registrations or public records like voter files. The program also lets people correct or suppress individual data elements, or to opt out entirely of having Acxiom collect and store marketing data about them — via redwolf.newsvine.com

Parallels Access recreates Windows and Mac software as tablet apps for the iPad

Parallels has released an app that allows Windows and Mac OS X software to be used on the iPad.

Parallels Access customises the way apps are launched and how they respond to make them better suited to a touchscreen device.

Mac and Windows apps are run through a launcher, which presents each one as a large touchscreen icon. The launcher is automatically populated but apps can be added or removed.

Apps launch in full screen, with Access adding support for touchscreen taps and swipes, and a magnifying glass. When a user fails to tap squarely on a screen button, the app makes a best guess at the most likely intended action, making it easier to use touch with tiny buttons and other UI features designed for a mouse pointer.

Users can switch between running apps by tapping to bring up a quick bar.

Words and graphics can also be copied from within apps and pasted to other iPad apps or between Mac and Windows apps, using iPad-native select and drag copying.

Access works by streaming applications from a Mac or Windows PC over a network to the iPad. The machine can’t be used while the connection is active. Parallels Access can operate on both 3G and wi-fi networks but Parallels recommends using a broadband wi-fi network for a more stable connection — via redwolf.newsvine.com

New Zealand bans software patents

New Zealand has finally passed a new Patents Bill that will effectively outlaw software patents after five years of debate, delay and intense lobbying from multinational software vendors.

Aptly-named Commerce Minister Craig Foss welcomed the modernisation of patents law, saying it marked a significant step towards driving innovation in New Zealand.

By clarifying the definition of what can be patented, we are giving New Zealand businesses more flexibility to adapt and improve existing inventions, while continuing to protect genuine innovations, Foss said.

The nearly unanimous passage of the Bill was also greeted by Institute of IT Professionals (IITP) chief executive Paul Matthews, who congratulated Foss for listening to the IT industry and ensuring software patents were excluded — via redwolf.newsvine.com

Hackers Controlled The New York Times By Breaking Into A Leading Australian Web Service

A group claiming to be the Syrian Electronic Army was able to take down the New York Times on Tuesday by hacking into a web site in Australia, The New York Times said in a statement.

The group gained control of the Times’ domain name registrar, Melbourne IT. A domain name registrar is a site that sells domain names and controls a domain name server (DNS). DNS is the server that sends you to a web page when you type a URL address into your browser, such as nytimes.com.

By hacking into the DNS server, the group could redirect the traffic going to nytimes.com. The Syrian Electronic Army also said it hacked Twitter. Twitter reportedly also uses Melbourne IT.

Melbourne IT is the dominant provider of domain name services in Australia, partly because it long had the monopoly on allowing the registration of .com.au site names. It claims to have more than 350,000 worldwide customers. It current CEO announced plans to step down yesterday — via redwolf.newsvine.com

Forced Exposure

The owner of Lavabit tells us that he’s stopped using email and if we knew what he knew, we’d stop too.

There is no way to do Groklaw without email. Therein lies the conundrum.

What to do?

What to do? I’ve spent the last couple of weeks trying to figure it out. And the conclusion I’ve reached is that there is no way to continue doing Groklaw, not long term, which is incredibly sad. But it’s good to be realistic. And the simple truth is, no matter how good the motives might be for collecting and screening everything we say to one another, and no matter how “clean” we all are ourselves from the standpoint of the screeners, I don’t know how to function in such an atmosphere. I don’t know how to do Groklaw like this — via redwolf.newsvine.com

Cameron Proves Greenwald Right

Readers know I have been grappling for a while with the vexing question of the balance between the surveillance state and the threat of Jihadist terrorism. When the NSA leaks burst onto the scene, I was skeptical of many of the large claims made by civil libertarians and queasily sympathetic to a program that relied on meta-data alone, as long as it was transparent, had Congressional buy-in, did not accidentally expose innocent civilians to grotesque privacy loss, and was watched by a strong FISA court.

Since then, I’ve watched the debate closely and almost all the checks I supported have been proven illusory. The spying is vastly more extensive than anyone fully comprehended before; the FISA court has been revealed as toothless and crippled; and many civilians have had their privacy accidentally violated over 3000 times. The president, in defending the indefensible, has damaged himself and his core reputation for honesty and candor. These cumulative revelations have exposed this program as, at a minimum, dangerous to core liberties and vulnerable to rank abuse. I’ve found myself moving further and further to Glenn’s position.

What has kept me from embracing it entirely has been the absence of any real proof than any deliberate abuse has taken place and arguments that it has helped prevent terror attacks. This may be too forgiving a standard. If a system is ripe for abuse, history tells us the only question is not if such abuse will occur, but when. So it is a strange and awful irony that the Coalition government in Britain has today clinched the case for Glenn — via redwolf.newsvine.com