CONFIRMED – The U.S. Military Asks Tech Companies to Tweak Their Algorithms to Promote Certain Content

Screen Shot 2016-02-26 at 9.51.05 AM

You probably had no idea, but representatives from Silicon Valley, Hollywood and the U.S. government came together earlier this week to privately discuss how they could jointly fight ISIS propaganda online. Never mind the fact that ISIS is the child of reckless and inhumane preemptive wars of aggression perpetrated by the U.S. government. Such introspection naturally never crosses the mind of government bureaucrats ostensibly attempting to understand the epic disasters they created in the first place.

So who attended the meeting? We don’t know for sure because the plebes aren’t entitled to know such things. Fortunately, we have become privy to some information thanks to Buzzfeed News. Here’s what we learned:

WASHINGTON, D.C. — They flew in from New York, San Francisco, and Los Angeles to hole up in a windowless D.C. conference room for nearly five hours on Wednesday — representatives of the country’s top tech and entertainment companies brainstorming with U.S. counterterrorism officials to tackle one tough question: how to stop the spread of ISIS online.

Read more

Like this post?
Donate bitcoins: 35DBUbbAQHTqbDaAc5mAaN6BqwA2AxuE7G


Follow me on Twitter.

Apple Vows to Defend Its Customers as the FBI Launches a War on Privacy and Security

Screen Shot 2016-02-17 at 10.28.43 AM

Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.

In today’s digital world, the “key” to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.

The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.

The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.

We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.

– From Apple CEO Tim Cook’s letter: A Message to Our Customers

I’ve spend most of the morning reading as much as possible about the explosive battle between the FBI and Apple over consumer rights to digital privacy and security. I came away with a refined sense of just how monumental this case is, as well as a tremendous amount of respect for Apple CEO Tim Cook for his public stance against the feds.

Before I get into the issue at hand, some background is necessary. The feds, and the FBI in particular, have been very vocal for a long time now about the desire to destroy strong encryption, i.e., the ability of citizens to communicate privately. A year ago, I wrote the following in the post, By Demanding Backdoors to Encryption, U.S. Government is Undermining Global Freedom and Security:

Read more

Like this post?
Donate bitcoins: 35DBUbbAQHTqbDaAc5mAaN6BqwA2AxuE7G


Follow me on Twitter.

Forget the TPP – Wikileaks Releases Documents from the Equally Shady “Trade in Services Agreement,” or TISA

Screen Shot 2015-06-05 at 11.17.16 AM

If it sounds complicated, it is. The important point is that this trade agreement contains a crucial discussion of governments’ abilities to meaningfully protect civil liberties. And it is not being treated as a human rights discussion. It is being framed solely as an economic issue, ignoring the implications for human rights, and it is being held in a classified document that the public is now seeing months after it was negotiated, and only because it was released through WikiLeaks. 

The process is also highly secretive—in fact, trade agreement texts are classified. While the executive branch does consult with members of Congress, even congressional staffers with security clearance have until recently been prevented from seeing the texts. Furthermore, certain trade industry advisers are allowed access to U.S. negotiating objectives and negotiators that the public and public interest groups do not have.

– From the Slate article: Privacy Is Not a Barrier to Trade

If you haven’t heard about about the Trade in Services Agreement, aka TISA, don’t worry, you’re not alone. While I had heard of it before, I never read anything substantial about it until today. What sparked my reading interest on the subject were a series of very troubling articles published via several media outlets following a document dump by Wikileaks. Here’s how the whistleblower organization describes the TISA leak on it document release page:

WikiLeaks releases today 17 secret documents from the ongoing TISA (Trade In Services Agreement) negotiations which cover the United States, the European Union and 23 other countries including Turkey, Mexico, Canada, Australia, Pakistan, Taiwan & Israel — which together comprise two-thirds of global GDP. “Services” now account for nearly 80 per cent of the US and EU economies and even in developing countries like Pakistan account for 53 per cent of the economy. While the proposed Trans-Pacific Partnership (TPP) has become well known in recent months in the United States, the TISA is the larger component of the strategic TPP-TISA-TTIP ‘T-treaty trinity’. All parts of the trinity notably exclude the ‘BRICS’ countries of Brazil, Russia, India, China and South Africa. 

I’ve covered the extreme dangers of what’s colloquially known as trade “fast track” authority previously. In the post, As the Senate Prepares to Vote on “Fast Track,” Here’s a Quick Primer on the Dangers of the TPP, I noted:

Read more

Like this post?
Donate bitcoins: 35DBUbbAQHTqbDaAc5mAaN6BqwA2AxuE7G


Follow me on Twitter.

Retail Big Brother – Mannequins Are Now Using Facial Recognition Technology

Back in August, we learned about how certain trash cans in London are using ORB technology that allows them to spy on people’s habits through their smartphones. It appears that the spying trends just continue to get worse, and in most cases the users of the technology recognize that the people being spied on might not appreciate … Read more