Posted on

WhatsApp Encryption Said to Stymie Wiretap Order

WhatsApp

By MATT APUZZOMARCH 12, 2016

WASHINGTON — While the Justice Department wages a public fight withApple over access to a locked iPhone, government officials are privately debating how to resolve a prolonged standoff with another technology company, WhatsApp, over access to its popular instant messaging application, officials and others involved in the case said.

No decision has been made, but a court fight with WhatsApp, the world’s largest mobile messaging service, would open a new front in the Obama administration’s dispute with Silicon Valley over encryption, security and privacy.

WhatsApp, which is owned by Facebook, allows customers to send messages and make phone calls over the Internet. In the last year, the company has been adding encryption to those conversations, making it impossible for the Justice Department to read or eavesdrop, even with a judge’s wiretap order.

https://www.nytimes.com/2016/03/13/us/politics/whatsapp-encryption-said-to-stymie-wiretap-order.html

Posted on

Apple encryption case risks influencing Russia and China, privacy experts say

Apple_iPhone_3G

Analysts and lawmakers warn FBI that ramifications over its demand that Apple unlock San Bernardino killer’s iPhone ‘could snowball around the world’

Authoritarian governments including Russia and China will demand greater access to mobile data should Apple lose a watershed encryption case brought by the FBI, leading technology analysts, privacy experts and legislators have warned.

Apple challenges ‘chilling’ demand to decrypt San Bernardino shooter’s iPhone

Apple’s decision to resist a court order to unlock a password-protected iPhone belonging to one of the San Bernardino killers has created a worldwide privacy shockwave, with campaigners around the world expecting the struggle to carry major implications for the future of mobile and internet security. They warned that Barack Obama’s criticism of a similar Chinese measure last year now risked ringing hollow.

Senator Ron Wyden of Oregon, a leading legislator on privacy and tech issues, warned the FBI to step back from the brink or risk setting a precedent for authoritarian countries.

“This move by the FBI could snowball around the world. Why in the world would our government want to give repressive regimes in Russia and China a blueprint for forcing American companies to create a backdoor?” Wyden told the Guardian.

“Companies should comply with warrants to the extent they are able to do so, but no company should be forced to deliberately weaken its products. In the long run, the real losers will be Americans’ online safety and security.”

Wyden, an Oregon Democrat on the Senate intelligence committee, said the FBI was using an “unprecedented reading of a nearly 230-year old law” that put “at risk the foundations of strong security for our people and privacy in the digital age.

“If upheld, this decision could force US technology companies to actually build hacking tools for government against their will, while weakening cybersecurity for millions of Americans in the process,” Wyden said.

https://www.theguardian.com/technology/2016/feb/17/apple-fbi-encryption-san-bernardino-russia-china

Posted on

Apple Fights Order to Unlock San Bernardino Shooter’s iPhone

apple

By KATIE BENNER and ERIC LICHTBLAUFEB. 17, 2016

SAN FRANCISCO — Apple said on Wednesday that it would oppose and challenge a federal court order to help the F.B.I. unlock an iPhone used by one of the two attackers who killed 14 people in San Bernardino, Calif., in December.

On Tuesday, in a significant victory for the government, Magistrate JudgeSheri Pym of the Federal District Court for the District of Central Californiaordered Apple to bypass security functions on an iPhone 5c used by Syed Rizwan Farook, who was killed by the police along with his wife, Tashfeen Malik, after they attacked Mr. Farook’s co-workers at a holiday gathering.

Judge Pym ordered Apple to build special software that would essentially act as a skeleton key capable of unlocking the phone.

But hours later, in a statement by its chief executive, Timothy D. Cook, Apple announced its refusal to comply. The move sets up a legal showdown between the company, which says it is eager to protect the privacy of its customers, and the law enforcement authorities, who say that new encryption technologies hamper their ability to prevent and solve crime.

https://www.nytimes.com/2016/02/18/technology/apple-timothy-cook-fbi-san-bernardino.html?_r=0

Posted on

Yes, Facebook is stalking you

facebook-lg1

By Megan McArdle

October 10, 2015 | 5:15am

Facebook is following you around the Web. You knew that, right?

How else would Facebook know to serve that panda video straight into your news feed, and leave your college friend’s ill-informed rant about Pacific trade deals in the dark bowels of its servers? How else would it know to serve you with 7,000 ads for wedding dress vendors the very day you announce your engagement?

Facebook knows what you like. It knows what you don’t like. It probably knows whether you have been naughty or nice, and will be selling that data to Santa this Christmas season.

This bothers many people, especially since Facebook keeps expanding the list of things it knows about you, and the ways it is willing to use that data to make money.

The recent announcement that Facebook would soon target ads using your “likes” and “shares” has triggered some Olympic-level teeth- gnashing from the Electronic Frontier Foundation, because Facebook will get information from you not just when you actually like, “like” something, but when you load a page that has a “like” button on it.

The EFF wants Facebook to agree to use a “Do Not Track” standard that will keep all that potentially profitable data from the greedy eyes of advertisers.

Of course people should be able to hide data about what sites they use. But there’s a perfectly good way to do this: Stay signed out of Facebook and tell your browser not to accept cookies or otherwise let advertisers follow you around.

The problem is, this level of security is incredibly inconvenient, because you have to spend a lot of time painfully re-entering data. The other problem is that naive users, who probably don’t spend a lot of time thinking about privacy, won’t bother.

https://nypost.com/2015/10/10/yes-facebook-is-stalking-you-thats-the-price-of-free-social-media/

Posted on

Cybersecurity bill could ‘sweep away’ internet users’ privacy, agency warns

big-brother-poster

Sam Thielman

Homeland Security admits Cybersecurity Information Sharing Act raises concerns while corporations and data brokers lobby for bill as it returns to Senate

The Department of Homeland Security (DHS) on Monday said a controversial new surveillance bill could sweep away “important privacy protections”, a move that bodes ill for the measure’s return to the floor of the Senate this week.

The latest in a series of failed attempts to reform cybersecurity, the Cybersecurity Information Sharing Act (Cisa) grants broad latitude to tech companies, data brokers and anyone with a web-based data collection to mine user information and then share it with “appropriate Federal entities”, which themselves then have permission to share it throughout the government.

Minnesota senator Al Franken queried the DHS in July; deputy secretary of the department Alejandro Mayorkas responded today that some provisions of the bill “could sweep away important privacy protections” and that the proposed legislation “raises privacy and civil liberties concerns”.

Much of the attention on Cisa has been directed at companies such as Google, Facebook and Comcast, which have large hoards of internet user behavior. But arguably more important are data brokers. Among the groups lobbying for the passage of Cisa are Experian, which tracks consumer trends using information from loyalty cards and other sources and licenses the information to help target advertising; Oracle, whose Data Cloud product works similarly; and Hitrust, which aggregates healthcare information.

The paragraph generating the most concern can be found in section 4 of the bill: “[a] private entity may, for cybersecurity purposes, monitor A) the information systems of such a private entity; B) the information systems of another entity, upon written consent of such other entity […] and D) information that is stored on, processed by, or transiting the information systems monitored by the private entity under this paragraph.”

https://www.theguardian.com/world/2015/aug/03/cisa-homeland-security-privacy-data-internet

Posted on

Concerns about civil liberties in the air as Bergen seeks to use drones

Drone Surveillance

JUNE 23, 2015, 3:57 PM    LAST UPDATED: TUESDAY, JUNE 23, 2015, 10:19 PM
BY JOHN C. ENSSLIN
STAFF WRITER |
THE RECORD

Bergen County’s recent bid to be the first county in New Jersey to add drones to its toolbox for handling emergencies comes amid a growing national debate over the use of unmanned flying machines by government agencies.

Leaders of the county’s emergency management operation are seeking freeholder approval to acquire two drones, which would be used for purposes ranging from finding a lost child to getting a bird’s-eye view of a fire or disaster.

Civil liberties advocates say that’s fine. But they worry that what they termed “mission creep” could open the door to other uses for the new technology and lead to questions of who is watching whom and for what purpose.

https://www.northjersey.com/news/concerns-about-civil-liberties-in-the-air-as-bergen-seeks-to-use-drones-1.1361322

Posted on

Landscaping projects used to create privacy

Garden theridgewoodblog.net

JUNE 21, 2015    LAST UPDATED: SUNDAY, JUNE 21, 2015, 1:20 AM
BY JENNIFER V. HUGHES
SPECIAL TO THE RECORD |
THE RECORD

Given that New Jersey is the most densely populated state in the nation, it’s easy to understand why a bit of privacy from your neighbors may be hard to come by.

But the right plantings, trees, fencing and other elements can give your yard a little bit of seclusion. A big key is knowing what your town does — and does not — allow.

Leesa Povinelli hired John Freitag, co-owner of Yellow Wagon Landscaping in Ridgefield, to landscape her Ridgefield home to provide a little more privacy. Several years ago he planted a row of arborvitae along the rear, and later this year he’ll put in a line of burning bushes, a deciduous shrub.

“Burning bushes are great,” Freitag said. “They grow aggressively, like 8-10 inches a year and they have super dense leaves so you can’t see through them at all and then they get a nice fire engine red in the fall.”

Povinelli has a 5-foot-tall chain link fence around her property, and her neighbors have different styles of fences, so she was looking to also make her yard look more cohesive. She loved the quick-growing nature of the arborvitae, the skinny evergreen often used to create a soft line of vegetation.

https://www.northjersey.com/towns/landscaping-with-privacy-in-mind-1.1360066

Posted on

Adult dating site hack exposes sexual secrets of millions

adult_finder_theridgewoodblog

More than 3.5 million people’s sexual preferences, fetishes and secrets have been exposed after dating site Adult FriendFinder was hacked.

Already, some of the adult website’s customers are being identified by name.

Adult FriendFinder asks customers to detail their interests and, based on those criteria, matches people for sexual encounters. The site, which boasts 64 million members, claims to have “helped millions of people find traditional partners, swinger groups, threesomes, and a variety of other alternative partners.”

The information Adult FriendFinder collects is extremely personal in nature. When signing up for an account, customers must enter their gender, which gender they’re interested in hooking up with and what kind of sexual situations they desire. Suggestions AdultFriendfinder provides for the “tell others about yourself” field include, “I like my partners to tell me what to do in the bedroom,” “I tend to be kinky” and “I’m willing to try some light bondage or blindfolds.”

The hack, which took place in March, was first uncovered by independent IT security consultant Bev Robb on her blog Teksecurity a month ago. But Robb did not name the site that was hacked. It wasn’t until this week, when England’s Channel 4 News reported on the hack, that Adult FriendFinder was named as the victim.

https://theridgewoodblog.net/wp-admin/post.php?post=75430&action=edit

Posted on

In a cameras-everywhere culture, science fiction becomes reality

Jimmy-Kimmel-unveils-GoPro-camera-for-dogs

By Tracey Lien and Paresh Dave contact the reporters

Science fiction writer David Brin calls it “a tsunami of lights” — a future where tiny cameras are everywhere, lighting up everything we do, and even predicting what we’ll do next.

Unlike George Orwell’s novel “1984,” where only Big Brother controlled the cameras, in 2015, cheap, mobile technology has turned everyone into a watcher.

A snowboarder with a GoPro can post a YouTube video of a friend’s 540-degree McTwist in the halfpipe. But also — as happened recently — a Penn State fraternity can upload Facebook photos of partially naked, sleeping college women.

A San Jose homeowner cowers behind a locked door while she watches an intruder stroll through her home on a surveillance video. A man launches a drone to spy on his neighbor tanning by her pool. Pet owners monitor their dogs.

https://www.latimes.com/business/la-fi-0411-cameras-everywhere-20150412-story.html#page=1

Posted on

Facebook accused of tracking all users even if they delete accounts, ask never to be followed

330facebook-800x420

ANDREW GRIFFIN
Tuesday 31 March 2015

A new report claims that Facebook secretly installs tracking cookies on users’ computers, allowing them to follow users around the internet even after they’ve left the website, deleted their account and requested to be no longer followed.

Academic researchers said that the report showed that the company was breaking European law with its tracking policies. The law requires that users are told if their computers are receiving cookies except for specific circumstances.

Facebook’s tracking — which it does so that it can tailor advertising — involves putting cookies or small pieces of software on users’ computers, so that they can then be followed around the internet. Such technology is used by almost every website, but European law requires that users are told if they are being given cookies or being tracked. Companies don’t have to tell users if the cookies are required to connect to a service or if they are needed to give the user information that they have specifically requested.

But Facebook’s tracking policy allows it to track users if they have simply been to a page on the company’s domain, even if they weren’t logged in. That includes pages for brands or events, which users can see whether or not they have an account.

Facebook disputes the accusations of the report, it told The Independent.

https://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-accused-of-tracking-all-users-even-if-they-delete-accounts-ask-never-to-be-followed-10146631.html

Posted on

Ridgewood Superintendent’s Column: On digital citizenship

agree-button-cursor-isolated-white-14653035

agree-button-cursor-isolated-white-14653035

Ridgewood Superintendent’s Column: On digital citizenship

MARCH 27, 2015    LAST UPDATED: FRIDAY, MARCH 27, 2015, 12:31 AM
BY DANIEL FISHBEIN
THE RIDGEWOOD NEWS

Years ago I ran in a local road race that had a very strange outcome.
…………..

Now you are probably wondering why is this guy telling this story? Well, it’s because I innocently signed up for this race as did a few hundred others and found that the organizers of the race gave away or sold that list. We do this same thing all the time when we hit the “Agree” button to get information off the Internet.

We hardly give it a thought when we electronically sign up, email, tweet, use Facebook, post on Instagram and blog as part of our everyday existence. Our lives have improved in many ways with the fast, easy, convenient and mostly free access to information at our online fingertips, whether we are researching directions, restaurant reviews or places to stay, ordering our clothing and books, or keeping track of our bank accounts, our photo albums, our documents.

Such convenience makes it easy to forget that when we log on, we also agree, yes, agree, to hand over access to all types of personal information about ourselves in exchange for that instant line of communication. Our privacy and personally identifiable information is easily shared, as we know from the personalized ads that appear on the sites we search. And yet, we get upset and outraged when the obvious happens, when a breach occurs and our files are hacked, or a company is called out as a spy on an individual.

Just this month, a student in another New Jersey district tweeted out some PARCC testing information. Pearson, the company that developed the assessment, followed its protocol to contact state officials, who then called to inform those school district administrators of a testing breach.

Many people were upset at this chain of events … and so was I … at first. Then I thought about Daniella. Sixteen years ago I had essentially “tweeted” out my personal information when I agreed to run that race, never thinking of the consequences. I did what we have all done dozens, maybe hundreds, of times when we readily fill out an electronic form, order over the phone, search for our next vacation and the like.

We know now that when we order from our favorite online vendor, they remember us. They know how our waist sizes have expanded or shrunk from the last time we ordered, our color preferences, the types of movies we like to watch.

As we move forward, others will know more and more about us because we have either given them this information directly, or granted them permission to access our files. We must hope that they use our personal information ethically, at least that is my expectation, but we must also make every effort to scrutinize to whom we give out our data so that it does not come back to haunt us. We must teach our children the same and pray every night that they’ve listened.

Taking responsibility for technology-based information, and having this conversation with our children, too, is called good digital citizenship. The Ridgewood Public Schools guards our data and only shares with state and federal officials the information that is required by law. We make every effort to teach our students about good digital citizenship and with the beginning next school year, we will teach it more formally through a Digital Citizenship Curriculum, from kindergarten through Grade 12.

As always, please feel free to contact me with your questions or concerns.

Daniel Fishbein, Ed.D., is Superintendent of the Ridgewood Public Schools. Dr. Fishbein can be reached at 201-670-2700, ext. 10530, or via e-mail at dfishbein@ridgewood.k12.nj.us. For more information on the Ridgewood Public Schools visit the district website at www.ridgewood.k12.nj.us or visit the Facebook page at www.facebook.com/RidgewoodPublicSchools.

https://www.northjersey.com/opinion/opinion-guest-writers/on-digital-citizenship-1.1296988

Posted on

To Delete or Not to Delete: That’s the Uber Question

new-uber-logo

To Delete or Not to Delete: That’s the Uber Question

Call it Uber Angst.

This is a new quandary faced by customers reliant on Uber’s on-demand taxi app but unsettled about supporting a company whose attitudes toward privacy and women have been making headlines.

Margit Detweiler, founder of the website TueNight.com, is among those wondering what to do.

Last week, she was late for a conference and needed a ride, quickly. “I was faced with a moral dilemma,” she said.

The desire for punctuality won out, and she ordered a car from her Uber app. When she arrived at the conference, a friend sheepishly confessed to her that she, too, had used Uber to get there on time. “We thought we should tweet, ‘We have ‘Uber Shame,’ ” Ms. Detweiler said.

Her conflicted feelings reflect an intensifying refrain coming recently from devotees. They are re-examining their relationship with the company after reading about last week’s comments made by Emil Michael, Uber’s senior vice president for business at Uber, who suggested that the company hire researchers to spy on journalists critical of Uber’s policies and executives.

https://www.nytimes.com/2014/11/23/fashion/uber-delete-emil-michael-scandal.html?_r=0

Posted on

Privacy concerns lead to N.J. legislation restricting access to cars’ ‘black boxes’

Route_17_Glen062_theridgewoodblog.net

file photo Boyd Loving

Privacy concerns lead to N.J. legislation restricting access to cars’ ‘black boxes’

OCTOBER 15, 2014, 11:55 PM    LAST UPDATED: WEDNESDAY, OCTOBER 15, 2014, 11:58 PM
BY KIBRET MARKOS
STAFF WRITER
THE RECORD

A new federal requirement that automakers install black-box-type devices in nearly all new cars has been welcomed by New Jersey law enforcement officials, but the warnings of privacy advocates and others have prompted state lawmakers to call for safeguards that would restrict the use of the data collected.

The devices, called event data recorders, are already installed in most late-model cars and have been used by law enforcement authorities in North Jersey since at least 1994, said Andrew Rich, a retired accident investigator for the Bergen County Prosecutor’s Office who is now a consultant on collision investigations.

Back then, the devices provided information only about the change of speed immediately prior to a crash, he said. They have grown much more high-tech, and now collect information on change in speed, brake application, seat belt use and air bag deployment, among other things, Rich said.

Experts stress that although the devices are commonly called “auto black boxes,” they do not continuously record and store information like aircraft black boxes do. Instead, they record only seconds worth of data, and continuously override the recording. The boxes store data only in the case |of an incident, usually a crash, that causes the air bags to deploy, said Jim Harris, an accident reconstruction expert in Miami, Fla.

“Otherwise, if you try to download data from a random car in a parking lot, you will find no information,” Harris said.

– See more at: https://www.northjersey.com/news/privacy-concerns-lead-to-n-j-legislation-restricting-access-to-cars-black-boxes-1.1109979#sthash.W4tVUjug.dpuf

Posted on

Think the Supreme Court protected your cellphone from warrantless searches? Think again.

Screen-Shot-2014-07-30-at-14.40.16

Think the Supreme Court protected your cellphone from warrantless searches? Think again.

By Brian Fung July 30

It was supposed to be a simple day trip to Niagara Falls. Little did he know the visit might land him in prison for the next 100 years.

Ali Saboonchi was returning from the Canadian side of the falls with his wife in 2012 when he was detained by customs agents at the U.S. border. The agents eventually let the Maryland man go, but not before seizing his electronic devices: an iPhone, an Android phone and a USB flash drive.

At a special facility in Baltimore nearly 400 miles away, officers from Immigration and Customs Enforcement made a copy of the drives and performed what a judge later called an invasive forensic search using “specialized software.”

In the devices’ storage was what U.S. officials say is evidence of a plot to violate U.S.-Iranian trade restrictions, according to federal court documents. Now Saboonchi, who was allegedly involved in the plot, faces four counts of illegal export and one count of conspiracy.

https://www.washingtonpost.com/blogs/the-switch/wp/2014/07/30/think-the-supreme-court-protected-your-cellphone-from-warrantless-searches-think-again/

Posted on

Do You Want Your Private Financial Information Automatically Shared with Russia or China?

Vladimir Putin signs 30-year gas deal with China

Do You Want Your Private Financial Information Automatically Shared with Russia or China?

David Burton / July 23, 2014

On Monday, the Organization for Economic Cooperation and Development released the full version of the global standard for automatic exchange of information.

The Standard for Automatic Exchange of Financial Account Information in Tax Matters calls on governments to obtain detailed account information from their financial institutions and exchange that information automatically with other jurisdictions on an annual basis. The standard was endorsed by G20 Finance Ministers in February 2014 and approved by the OECD Council.

It is one thing to exchange financial account information with Western countries that generally respect privacy and are allied with the United States. It is an entirely different matter to exchange sensitive financial information about American citizens or corporations with countries that do not respect Western privacy norms, have systematic problems with corruption or are antagonistic to the United States. States that fall into one of these problematic categories but are participating in the OECD automatic exchange of information initiative include Colombia, China and Russia.

The standard provides for governments to annually and automatically exchange financial account information—such as balances, interest, dividends and proceeds from sales of financial assets—that are reported to governments by financial institutions and cover accounts held by individuals and entities, including businesses, trusts and foundations. Banks, broker-dealers, investment funds and insurance companies are required to report.

Corrupt governments may use American’s financial information for criminal purposes such as identity theft

The Obama administration enthusiastically supports the OECD initiative, but even the administration has realized important privacy issues at are stake. Robert B. Stack, Deputy Assistant Secretary of the Treasury for International Tax Affairs, has testified that “the United States will not enter into an information exchange agreement unless the Treasury Department and the IRS are satisfied that the foreign government has strict confidentiality protections. Specifically, prior to entering into an information exchange agreement with another jurisdiction, the Treasury Department and the IRS closely review the foreign jurisdiction’s legal framework for maintaining the confidentiality of taxpayer information.”

Leaving these determinations to a tax agency with little institutional interest in anything other than raising tax revenue is dangerous. There is little doubt sensitive financial information about American citizens and businesses can and will be used by some governments for reasons that have nothing to do with tax administration, such as identifying political opponents’ financial resources or industrial espionage. In addition, individuals in corrupt governments may use the information for criminal purposes such as identity theft, to access others’ funds or to identify potential kidnapping victims. It is naïve to think otherwise.

Automatic information exchange should be limited to law enforcement and anti-terrorist purposes and should be restricted to governments that are (1) democratic, (2) respect free markets, private property and the rule of law, (3) can be expected to always use the information in a manner consistent with the security interests of the member states and (4) have in place—in law and in practice—adequate safeguards to prevent the information from being obtained by hostile parties or used for inappropriate commercial, political or other purposes.

In February, the Senate Foreign Relations Committee held a briefhearing on a number of treaties, including the Proposed Protocol Amending The Multilateral Convention On Mutual Administrative Assistance In Tax Matters, which would implement automatic information sharing and expand the number of countries that participate beyond the OECD and the Council of Europe.

The Senate should not ratify this protocol. The risks to American citizens and American businesses are too great.