-
Are your phones really secure?
Breakthroughs in technology have enabled malicious actors to listen in on any conversation using your phone even when not in use; eavesdroppers have circumvented encrypted audio channels by relying on a relatively simple principle in physics — resonance; by tapping into an object’s natural resonance, spies have turned phones and phone cables into listening devices even when they are not in use; researchers at Teo, a manufacturer of secure telecommunications equipment, were able to capture human voices using standard phones, unplugged Ethernet cables, or even a rock; to address this security gap, Teo has designed its IP TSG-6 phones with special vibration dampening circuitry and materials that render them impervious to these types of listening devices
-
-
Android apps send private data in the clear
Cell phones running the Android operating system fail to encrypt data sent to and from Facebook and Google Calendar, shortcomings that could jeopardize hundreds of millions of users’ privacy; Facebook’s recently unveiled always-on SSL encryption setting to prevent snooping over insecure networks — but the encryption is no good, meaning that all private messages, photo uploads, and other transactions are visible to eavesdroppers
-
-
U.S. appealing warrantless wiretapping court defeat
In the first and likely only lawsuit resulting in a ruling against the secret National Security Agency warrantless surveillance program adopted in the wake of the 9/11 terror attacks, a San Francisco federal judge in December awarded $20,400 each to two American lawyers illegally wiretapped by the George W. Bush administration, and granted their counsel $2.5 million for the costs litigating the case for more than four years; the Obama administration is appealing the judge’s ruling
-
-
More than half of iPhone apps track users
A recent study found that more than half of all iPhone apps could track users and collect data without an individual’s knowledge; researchers analyzed more than 1,400 iPhone apps to determine how they handle sensitive data; more than half collect an individual’s unique device ID or track a user’s location, and when combined with links to a Facebook account the app could gain a lot of sensitive data; researchers found that thirty six apps blatantly violated privacy rights by accessing an individual’s location without informing the user, while another five went so far as to take data from the user’s address book without first seeking permission
-
-
U.K. cyber-spy agency may sell technology to raise cash
The U.K. government is considering selling technical expertise developed by the hush-hush Government Communications Headquarters (GCHQ) to the private sector to raise money for the government; the cutting edge cyber-security and computer research carried out at GCHQ could potentially generate cash for the government, although any moves to involve the private sector would have to be handled carefully due to the highly sensitive nature of the signals intelligence material it handles
-
-
U.S. gov't wants Google, Facebook to expand wiretaps of subscribers
The U.S. government wants Silicon Valley companies such as Google and Facebook make it easier for law enforcement to wiretap the companies’ users; legislation under consideration would require cellphone carriers, Web sites, and other types of service providers to have a way to unscramble encrypted communications traveling over their networks
-
-
Canada introduces legislation to fight crime in today's high-tech world
The Canadian government has reintroduced two bills that would provide law enforcement and national security agencies with up-to-date tools to fight crimes such as gang- and terrorism-related offences and child sexual exploitation; the proposed legislation would provide law enforcement agencies with new, specialized investigative powers to help them take action against Internet child sexual exploitation, disrupt on-line organized crime activity and prevent terrorism
-
-
U.K. examines surveillance plan's £2 billion price tag
The U.K. coalition government has revived the sweeping digital surveillance program which had been abandoned by the previous Labor government — but the government said it is looking closely at the price tag, estimated at £2 billion, and that new figures will be released in November; industry sources had all along maintained that the original £2 billion estimate was unrealistically low; the government’s move means that they were correct, or that the scheme is being scaled back
-
-
U.K. revives sweeping digital surveillance scheme
The U.K. government has revived a sweeping surveillance scheme killed by its Labor predecessor last December; the scheme will require that every e-mail, phone call, and Web site visit be recorded and stored, allowing the security and police authorities to track every phone call, e-mail, text message, and Web site visit made by the public if they argue it is needed to tackle crime or terrorism; the information will include who is contacting whom, when, and where — and which Web sites are visited, but not the content of the conversations or messages
-
-
U.S. to make Internet wiretaps easier
The Obama administration plans to submit a bill next year that would require all online services that enable communications to be technically equipped to comply with a wiretap order; this would include providers of encrypted e-mail, such as BlackBerry, networking sites like Facebook, and direct communication services like Skype; federal law enforcement and national security officials say new the regulations are needed because terrorists and criminals are increasingly giving up their phones to communicate online
-
-
Case against teachers using Web cams to monitor students' bedrooms, laptops dropped
Federal investigations into whether a Pennsylvania school district used school-issue laptops to take pictures of students — and of what they were doing in their bed rooms and online — did not yield enough evidence to file charges; Lower Merion School District monitored more than 40 students who were issued laptop computers; the monitoring generated 30,881 Webcam photographs of students, and 27,761 screenshots of Web sites they visited
-
-
Indian government: Google, Skype will follow BlackBerry in being forced to open networks
The Indian government, in a meeting last month with representatives of network operators and Internet service providers, said that after RIM was forced to open BlackBerry-based communication to government eavesdropping, Google and Skype would be asked to do the same — or face bans on some of their services in India; It is unlikely that the Indian government is interested in Google’s search business, but about twenty million Indians are active on Google’s social networking service, Orkut, which encourages them to communicate with each other over Google Talk
-
-
U.S., too, uneasy with encrypted communication
The U.S. said it hoped RIM and foreign governments would find a compromise over BlackBerry encryption, but successive U.S. administrations tried to limit the export of encrypted technologies so U.S. spy agencies would have unfettered access to government and private communications abroad; until 1996 encryption at the level commonly in use today was classified by U.S. export regulations as “munitions”
-
-
Growing privacy concerns over Google's Street View
Worries about the privacy invasion by Google’s Street View project have led several countries to scrutinize the ambitious mapping project; Goolge offers concerned home owners the opportunity to submit a request to have their houses taken off the service, but a Google spokeswoman admits that “Processing these requests and applying blurring is a complex task which takes time”; concerns about privacy infringement were only heightened when it was learned that Google, inadvertently perhaps, also picks up private WiFi communication in the process of updating its maps — and that a Google U.K. executive has purchased a surveillance UAV (he said it was for personal use)
-
-
New age of pervasive surveillance, robot spies to test privacy
The author of a new study of the evolving surveillance landscape says: “In 50 years’ time there won’t be much privacy left. There’s going to be information everywhere. So what matters is who owns it, and the oversight”; there is an added danger: “Once you go over to data mining you are essentially handing the process over to robots, who roam through this material looking for patterns of suspicious activity”
-