privacy - Page 32

  • UK traffic cams used to build databases of cars, passengers and locationdata

    “This report focuses on the police use of ANPR as a mass surveillance tool. This is a network of police ANPR cameras that are used alongside a variety of databases that can be used to identify cars and their occupants. The data collected from the cameras is stored in local force databases (known as Back Office Facility or BOF) and in a centralised database the (National ANPR Data Centre or NADC). The data can then be used alongside data mining tools. The details of all vehicles passing police ANPR cameras are stored in these databases - the time, date, location and direction of travel of the vehicle and the image of the license plate are stored for two years and a photograph of the whole car and driver is stored for 90 days”

  • last year a total of 1.769.439 belgians or ONE FIFTH of its population were in the Belgian police database

    there are several reasons for it

    * all the different police databases have been unified into one, so this global number should really be the global number

    * the database is not very often cleaned of outdated data, making it sometimes more dangerous rubbish than a police database

    * every useful information should be entered in the database without a clear definition of what that is

    * if a policeman doesn't enter the 'useful' information he has in the database he can be prosecuted for neglect if afterwards that information - however trivial - seems to be very important to be able to arrest a dangerous criminal (like Dutroux, but most dangerous gangsters and terrorists can be arrested if one has an eye for the details)

    so what happens

    well everybody puts whatever information he has into the system and doesn't delete any data because

    you never know

    and we will never know why we are in that database and which information about us is in that database

    because you won't tell them that one in five (in a couple of years one in six) is dangerous, a criminal or has been arrested or is to be monitored

    a database full of crap is no base to organize your data, especially information used by the police

    where is the supervision ? Where is the legal democratic framework ? Where are the priorities ?

  • how safe is the encryption of the Snowden NSA files

    Glen Greenwald, a journalist for British daily The Guardian, who helped Snowden bring the secrets to light, told Newsnight that Snowden's files are so well encrypted that neither US nor Russian intelligence could crack them.


    "Data is stored on thumb drives, and on those thumb drives are very sophisticated means of encryption shells, that, as I said before, and I know this because I’ve read the documents that I have on this, not even the NSA can break," he said.

    how he knows that is a question to me

    at the other side there are clearly un-encrypted collections of the documents because otherwise the journalists wouldn't be able to work on them

    those will be targeted (files and journalists and networks they are working on)

    except if they work in closed off bunkers with no online connections and no windows and so on....

  • UK lawyers will have new guidelines to protect their information in a global total surveillance society

    The Law Society is considering issuing new guidance to solicitors across England and Wales amid growing concern that the government's mass online surveillance operations are undermining their ability to take legal cases against the state.

    Lawyers representing people who make serious complaints against the police, army or security services fear the industrial-scale collection of email and phone messages revealed by the Guardian over the past four months is threatening the confidential relationship between them and their clients, jeopardising a crucial plank of the criminal justice system.

    "These are absolutely fundamental issues," said Shamik Dutta, from Bhatt Murphy lawyers in London. "The NSA revelations are having a chilling effect on the way a crucial part of the justice system operates. Individuals who are making serious allegations of wrongdoing against the state are becoming increasingly concerned about whether the information they share with their lawyers will remain confidential."

    even if you don't like the word this is the world we are living in for the moment

    we have to change it, because this is not the world we elected to be in as free and democratic nonviolent citizens

    but it also means that many things will have to adapt their ways untill we have changed that

    lawyers are the first to having to consider which protection they will have to install and how to protect the information they get from their clients

    the cheapest are : use computers that are NOT logged on the internet and don't have USB or other activated disks with a backupdrive that you put

    never communicate electronically or digitally when the information is so important it shouldn't be known by others (face to face that is)

    back to paper and secretaries :) you can trust to keep a secret :(

    more expensive : go for full encryption and double authentification, go for double networks (offline and online) and full 100% monitoring and closing down of your network and things you use for work (give them a tablet to play with but don't read their business mail on)

  • an example of how general intercepts of communications may interfere with the right to a fair trial

    GCHQ is probably intercepting legally privileged communications between lawyers and their clients, according to a detailed claim filed on behalf of eight Libyans involved in politically sensitive compensation battles with the UK.

    The accusation has been lodged with Britain's most secret court, the investigatory powers tribunal (IPT), which examines complaints about the intelligence services and government use of covert surveillance. Most of its hearings are in private.

    he allegation has emerged in the wake of the Guardian's revelations about extensive monitoring by GCHQ of the internet and telephone calls, chiefly through its Tempora programme.

    The system taps directly into fibre optic cables carrying the bulk of online exchanges transiting the UK and enables intelligence officials to screen vast quantities of data.

    The eight Libyans, members of two families now living in the country's capital, Tripoli, say they were victims of rendition. They claim they were kidnapped by MI6 and US intelligence agencies, forcibly returned to Colonel Muammar Gaddafi's regime and tortured. At that time, in 2004, when Gaddafi relinquished his nuclear weapons programme, intelligence relations between Tripoli, London and Washington were close.

    A landmark legal action between Abdel Belhaj, 47, and the UK government is due to be heard at the high court shortly to resolve the kidnap and torture allegations.

    But lawyers working with the human rights group Reprieve fear their ability to fight the case will be undermined because their legal correspondence may be surreptitiously monitored.

  • GCHQ is only an UK-US matter and the EU has nothing to say about that

    "The activities of intelligence services are equally the sole responsibility of each Member State and fall outside the competences of the Union. For that reason, and with respect, the UK must decline your invitation for the Director of GCHQ to attend your Hearing. Further, it is my Government’s consistent policy not to comment on intelligence matters."

    own comment

     so maybe it is time for our own Schengen of European Intelligence Services and if the UK - just as with Schengen doesn't want to participate - so be it - we can't wait untill the mule begins to understand what European Union means in the end if you want a democratic and efficient European Union (and not a technocratic commission dwarfed by a bunch of political leaders who change every so many years)

    together we will also be much stronger on the negotiation table with the Enchelon network or the US when there has to be negotiated about cooperation frameworks (if the Germans don't make their own deal while they think they are in a strong enough position after the Merkel phone scandal)

  • The European partners are for the GCHQ as much a target as the Soviets were

    The UK's overseas intelligence gathering service, MI6 (the Secret Intelligence Service, SIS), spies on other EU governments to strengthen their position in negotiations. As the Guardian put it: “The clearest confirmation from authoritative sources of a long-held suspicion comes in BBC 2's How to be Foreign Secretary..”. The programme broadcast on Sunday 8 January 1998 quotes a senior official, who could not be identified, as saying:
    "Of course, we spied on them. It is as vital to know what our European partners are doing as any Soviet battle plan.” (Times, 2.1.98)

    He is not talking about open intelligence and analysis, which is the most normal thing to do, no he talks about SPYING which is getting access to information that otherwise would not in that form be accessable to the outside world and isn't intended to be known by anyone outside the room

    so this is their corporate culture, as if they are still in the second world war and the European Mainland is still occupied by Hitler, ready to invade them and as hostile as the Russian missiles and tanks standing at the Iron Curtain were

    if we follow the same reasoning the CHCQ is in fact for the Europeans a Hostile base which organizes hostile spying activities against us

    wow, imagine that, a hostile spycenter located in a partner of the EU paid for and manned by the US and who is also used to conduct and organize hostile intelligence operations against the other EU partners ...

  • CGHQ did everything to keep the massive interception of all communication secret

    The papers also reveal that:

    GCHQ lobbied furiously to keep secret the fact that telecoms firms had gone "well beyond" what they were legally required to do to help intelligence agencies' mass interception of communications, both in the UK and overseas.

    GCHQ feared a legal challenge under the right to privacy in the Human Rights Act if evidence of its surveillance methods became admissible in court.

    GCHQ assisted the Home Office in lining up sympathetic people to help with "press handling", including the Liberal Democrat peer and former intelligence services commissioner Lord Carlile, who this week criticised the Guardian for its coverage of mass surveillance by GCHQ and America's National Security Agency.

    It is as with Kafka, you are targeted and questioned for something that you didn't know they knew and you don't know what is the proof (wrong or right) because it is not in the investigation even as the investigation was started by this secret information and guided by the unknown secret information

    off course there are circumstances in which it is difficult to make the methods and information public because of the protection of your agents and methods but this should be the clear exception and not a general rule and we are not living in exceptional times in which the exception becomes the general rule (the war on terrorism has become a fight and is NOT a war anymore)

    making a war out of every fight is what 1984 is all about, creating an atmosphere of permanent general fear out of incidents and isolated cells

  • NSA has a cooperation with all the NATO members

    More limited cooperation occurs with many more countries, including formal arrangements called Nine Eyes and 14 Eyes and Nacsi, an alliance of the agencies of 26 NATO countries.

    NATO Advisory Committee on Signal Intelligence (NACSI) but on Google you will also find  the other one  which says NACSI means NATO Agency
    Committee Special Inteligence but the NSA calls it herself
    14 jan. 1988 NACSI - see NATO Advisory Committee for Special Intelligence

    NATO sigint activities

  • the importance of NSA for the USA policymakers

    By many accounts, the agency provides more than half of the intelligence nuggets delivered to the White House early each morning in the President’s Daily Brief — a measure of success for American spies. (One document boasts that listening in on Nigerian State Security had provided items for the briefing “nearly two dozen” times.) In every international crisis, American policy makers look to the N.S.A. for inside information.

    but they probably didn't ask themselves where all that information was coming from and if there would be no diplomatic or polical negative consequences if it was discovered

    mostly it was probably a kind of 'don't ask because you don't want to know'

    but they should have knowon because they were politically responsable for the democratic oversight

  • more information about the Snowden leaked NSA documents

    The N.S.A. documents taken by Mr. Snowden and shared with The Times, numbering in the thousands and mostly dating from 2007 to 2012, are part of a collection of about 50,000 items that focus mainly on its British counterpart, Government Communications Headquarters or G.C.H.Q.

    so if the nsa documents leaked by Snowden focus on the Enchelon collaboration with the GCHQ this means that these relevations will mostly be European and that even if there are other documents they are only part of the global picture

    * the are one third to half of all the documents that were on the internal NSA network about their collaboration

    * they are getting older by the day, week or month and soon the media will lose interest (that is why Greenwald is starting to look over the possibility of releasing a great part of them in one bunch to the public)

    * those internal documents mostly presentations and sometimes they are overboosting their successes because they were used in internal discussions before their chefs

  • more about NSA general total surveillance programs

    The agency’s Dishfire database — nothing happens without a code word at the N.S.A. — stores years of text messages from around the world, just in case. Its Tracfin collection accumulates gigabytes of credit card purchases. The fellow pretending to send a text message at an Internet cafe in Jordan may be using an N.S.A. technique code-named Polarbreeze to tap into nearby computers. The Russian businessman who is socially active on the web might just become food for Snacks, the acronym-mad agency’s Social Network Analysis Collaboration Knowledge Services, which figures out the personnel hierarchies of organizations from texts.

  • more trouble for the NSA : US supreme court will have to make a decision about warantless wiretapping

    The Justice Department for the first time has notified a criminal defendant that evidence being used against him came from a warrantless wiretap, a move that is expected to set up a Supreme Court test of whether such eavesdropping is constitutional.

    Prosecutors filed such a notice late Friday in the case of Jamshid Muhtorov, who was charged in Colorado in January 2012 with providing material support to the Islamic Jihad Union, a designated terrorist organization based in Uzbekistan.

    Mr. Muhtorov is accused of planning to travel abroad to join the militants and has pleaded not guilty. A criminal complaint against him showed that much of the government’s case was based on intercepted e-mails and phone calls.

    The government’s notice allows Mr. Muhtorov’s lawyer to ask a court to suppress the evidence by arguing that it derived from unconstitutional surveillance, setting in motion judicial review of the eavesdropping.

    this means that their broad warantless tapping even for terrorist cases can be curtailed which would of course only increase its dependence on its intelligence partners like Enchelon and the need to have a comprehensive collaboration with the intelligence services of the EU based upon mutual respect and democratic oversight within a clear legal framework

    this decision may take a few months or even years to be final, but it is a clear signal that the times for the NSA of being a nearly total independent state within the state (contrary to the CIA who after the Church Investigations got pressured back into a strict legal framework) are coming to an end

    just as the WAR against terrorism is coming to an end as a WAR, which doesn't mean that the fight is over, but the WARlike powers and liberties (and the silencing of all dissident voices as if they are traitors) should be coming to an end

  • why biometric authentification like fingerprints can be spoofed

    In the course of its research, TABULA RASA hosted a “Spoofing Challenge” in which invited researchers from around the world were tasked to develop attack plans and to attempt to deceive various biometric systems. Participants showed there are many different and creative ways to attack the systems. The most innovative attack proposed during the challenge used make-up to spoof a 2D face recognition system that succeeded in being recognized as the victim. Other researchers used well-known tactics such as photographs, masks or fake fingerprints (“gummy fingers”) to successfully spoof the systems.

    the EU investment was crucial

    and it is crucial to conduct such tests against your own protocols and networks, just be sure that if your developing new defenses you are targeting the real vulnerabilities and not theoretical ones you will find by the thousand on the internet and in research

    and even if the development of those attacktools costs millions, some countries or criminal cybergangs have the people and money to develop them if they want to

    so if you don't know them and have tested them (and maybe have found vulnerabilities in those attacks) you won't know what is hitting you when it will be used

    cyberdefense is a bit like a military armsrace

    untill there are some international rules and conventions like we have for real warfare (for example not hitting on civilean infrastructure)

  • the new Irish e-passport with protected new RFID chip

    The new Irish e-passport replaces the previous document, and provides an exceptional level of security including HID Global’s polycarbonate electronic data page with contactless chip inlays making the passports very hard to forge or copy. The new e-passports also incorporate HID Global’s innovative Crack Prevention Feature (CPF) that enhances the durability and reliability of polycarbonate e-passport datapages, especially those with embedded RFID chips. With CPF, governments can fully leverage the advantages of smart card technology and protect their investment by extending the life of ID credentials for up to ten years.

    if this technology is new, than our own Belgian passport don't have it (yet)

  • what is the NSA-CIA most secret team doing in Brussels ?

    A "top secret" classified NSA document from the year 2010 shows that a unit known as the "Special Collection Service" (SCS) is operational in Berlin, among other locations. It is an elite corps run in concert by the US intelligence agencies NSA and CIA.


    The secret list reveals that its agents are active worldwide in around 80 locations, 19 of which are in Europe -- cities such as Paris, Madrid, Rome, Prague and Geneva. The SCS maintains two bases in Germany, one in Berlin and another in Frankfurt. That alone is unusual. But in addition, both German bases are equipped at the highest level and staffed with active personnel.


    The SCS teams predominantly work undercover in shielded areas of the American Embassy and Consulate, where they are officially accredited as diplomats and as such enjoy special privileges. Under diplomatic protection, they are able to look and listen unhindered. They just can't get caught.


    Wiretapping from an embassy is illegal in nearly every country. But that is precisely the task of the SCS, as is evidenced by another secret document. According to the document, the SCS operates its own sophisticated listening devices with which they can intercept virtually every popular method of communication: cellular signals, wireless networks and satellite communication.


    The necessary equipment is usually installed on the upper floors of the embassy buildings or on rooftops where the technology is covered with screens or Potemkin-like structures that protect it from prying eyes.

    this is an investigation about Berin but they will surely be also here in Brussels - they should be mad not to have one in Brussels - and a big team that is because with the number of targets running around here and the number of meetings and negotiations and international and financial and military installations you would surely need a very big team in Brussels with a lot of technological stuff

    this is also why Belgium is a prime target in Europe for the NSA according to other leaked NSA documents

    it means that in Brussels sensible computers have to be protected against leakage and that 'noleak meetings' have to held in especially protected rooms without windows (for starters)

    this is not science fiction, this is proven (again) to be of normal activity for spies and if you want a city where there are many private and official spies running around, than think of Brussels

    if you don't understand the risk, than you know nothing about risks

  • Merkel is NOT the best advocate for a privacyprotecting framework in Europe

    Great Britain, itself suspected of spying on its EU partners, and Prime Minister David Cameron, who has former Google CEO Eric Schmidt as one of his advisors, put up considerable resistance. He pushed instead for the final summit statement to call simply for "rapid" progress on a solid EU data-protection framework.


    A Setback for ' Europe 's Declaration of Independence '


    Merkel also joined those applying the brakes. Over the weekend, SPIEGEL ONLINE gained access to internal German Foreign Ministry documents concerning the EU leaders' final summit statement. The "track changes" feature reflects a crucial proposed change to item No. 8 under the subject heading "Digital Economy" -- the suggestion that the phrase "adoption next year" be replaced with "The negotiations have to be carried on intensively."


    Ultimately, the official version of the final summit statement simply called for "rapid" progress on the issue -- just as Great Britain was hoping for.


    This amounts to a setback for proponents of the proposed data-protection law, which EU Justice Commissioner Viviane Reding has called "Europe's declaration of independence."

    it could even all be more a tric to be able to join the Enchelon network as a partner - and pushing national intelligence objectives (not being spied upon by the other partners and having access to a worldwide network of intelligence) before the European interests

    all that is theater, so forget about the phone

    the phone is even the best example why Merkel is rumoured to be wanting Germany to join the Enchelon network, her own intelligence agencies are clearly incapable of even protecting her own phone from even friendly spy agencies

  • snowden may get asylm in Germany, negotiations going on

    from leaksource

    Human rights attorneys have been discussing the possibility of asylum for former NSA contractor Edward Snowden with left-wing politicians in Germany. The plan being developed involves giving testimony in an official government setting on recent revelations, such as the fact that the United States spied on Chancellor Angela Merkel’s cellphone. In return, he would be given asylum.

    Jesselyn Radack, an attorney and national security and human rights director of the Government Accountability Project, confirmed the above details as part of an exclusive for Firedoglake.

    what this means

    it means that Snowden will be able to be invited by every European parliament to give testimony.

    this is a ticking timebomb if you know that he is rumored to have taken about 20.000 internal NSA documents (or from their partners)

    the possibility that Germany will risk this is low (there are also documents from their own intelligence service BND (who works together with the NSA (and had some cooperation during the Enchelon network while there were still US troops in Germany))

    for Obama it becomes a race against the time after he has already pushed out the chief of the NSA and has claimed that he will change things - although it becomes clear that the special commission will lead to nowhere

    while it is quite simple, just go back to what was decided after the Church investigations in the 70's and adapt those principles to the technological digital century we are living in

  • ik wil niet dat Belgacom weet wat mijn kijkgedrag of kijkprofiel is

    een nieuwe functie

    zo te zien moet ik hem aanzetten

    niet dus

    maar het maakt me wel curieus, wat weet Belgacom nu al over mijn kijkgedrag en waar houden ze dat bij

  • why the GCHQ should be european funded and controlled

    It is clear from the Snowden documents that GCHQ has become Europe's intelligence hub in the internet age, and not just because of its success in creating a legally permissive environment for its operations. Britain's location as the European gateway for many transatlantic cables, and its privileged relationship with the NSA has made GCHQ an essential partner for European agencies. The documents show British officials frequently lobbying the NSA on sharing of data with the Europeans and haggling over its security classification so it can be more widely disseminated. In the intelligence world, far more than it managed in diplomacy, Britain has made itself an indispensable bridge between America and Europe's spies

    for now this british hub is part of Echelon and is paid and controlled by the US-NSA

    it should be paid for by EU funds (100 million dollars a year) and staffed by EU people under EU laws and supervision and the US can have liaison officers who on the basis of procedures, agreements and oversight can ask or look for certain agreed upon information

    it is time to close the enchelonoperation in Europe because the cold war is over, the US troops have gone and in the fight against terrrorism, massive tax fraud and organized (cyber)crime we are all in this together