Massive Hack of 70 Million Prisoner Phone Calls Indicates Violations of Attorney-Client Privilege – calls recorded and searchable

The materials — leaked via SecureDrop by an anonymous hacker who believes that Securus is violating the constitutional rights of inmates — comprise over 70 million records of phone calls, placed by prisoners to at least 37 states, in addition to links to downloadable recordings of the calls. The calls span a nearly two-and-a-half year period, beginning in December 2011 and ending in the spring of 2014. Particularly notable within the vast trove of phone records are what appear to be at least 14,000 recor

Source: Massive Hack of 70 Million Prisoner Phone Calls Indicates Violations of Attorney-Client Privilege

The 4th Reich is at it again!

How to Create an Untraceable Messaging Device With an Old Phone

Secret, anonymous messages aren’t just for the dastardly. Luckily, a little privacy isn’t difficult to get. With some effort and a spare phone, you’ll be whistleblowing, protecting your privacy from harassers, and staying anonymous when selling on Craigslist or looking for dates on Match. Here’s how.

Source: How to Create an Untraceable Messaging Device With an Old Phone

Basically install Hushed to generate disposable phone numbers, cyberghost / hideman for a free VPN service and someone elses WiFi.

Note – there are limitations to this project 🙂

Cops are asking Ancestry.com and 23andMe for their customers’ DNA

When companies like Ancestry.com and 23andMe first invited people to send in their DNA for genealogy tracing and medical diagnostic tests, privacy advocates warned about the creation of giant genetic databases that might one day be used against participants by law enforcement.

Source: Cops are asking Ancestry.com and 23andMe for their customers’ DNA

So, people are surprised that they are mistakenly used as suspects? And how surprised will they be when they find out that insurance companies have been dipping into these databases to find genetic defects?

Microsoft now uses Windows 10’s Start menu to display ads

We’ve all become used to the idea of ads online — it’s something that has become part and parcel of using the internet — but in Windows? If you’ve updated to build 10565 of Windows 10, you’re in for something of a surprise: the Start menu is now being used to display ads.

Source: Microsoft now uses Windows 10’s Start menu to display ads

It’s not enough that all your search data, browsing habits and file listings are sent to Microsoft, you are now pushed with ads. Please, Microsoft, just release a paid, non-invasive version of Windows 10?

EU Court of Justice declares that the Commission’s US Safe Harbour Decision is invalid

The EU courts have found that Safe Harbour means that the 4th Reich may not have EU citizens’ data beamed to it, unless the company doing the beaming (eg Facebook) is prepared to safeguard the data from spying by the KGB. I mean Stazi. I mean NSA.

Source: The Court of Justice declares that the Commission’s US Safe Harbour Decision is invalid – cp150117en.pdf

Companies are whining that this will be bad for the EU economy, but I don’t see particularly that Chinese people are much the worse off for not having Facebook, and I’m sure that not having US government spying on the EU and then passing relevant information on to US companies gets rid of quite a significant competitive edge, allowing EU companies to grow a bit more fairly.

AVG to flog your web browsing, search history from mid-October

We collect non-personal data to make money from our free offerings so we can keep them free, including:

    Advertising ID associated with your device.
    Browsing and search history, including meta data.
    Internet service provider or mobile network you use to connect to our products.
    Information regarding other applications you may have on your device and how they are used.

Source: AVG to flog your web browsing, search history from mid-October • The Register

Time to quit using that then!

UK GCHQ stashes away 50+ billion records a day on people.

By 2010, GCHQ stated it was logging “30bn metadata records per day. By 2012, collection had increased to 50 billion per day, and work was underway to double capacity to 100 billion.”GCHQ has since “developed new population scale analytics for multi-petabyte cluster,” which allows “population scale target discovery.”In a vision document for 2013, its aim was to have created “the world’s biggest SIGINT engine to run cyber operations and to enable IA, Effects and SIGINT … [as well as] to perform CNE exfiltration, eAD, beaconry, and geo-location.”

Source: Blighty’s GCHQ stashes away 50+ billion records a day on people. Just let that sink in • The Register

Minority Report Predictive Policing hits US

The strategy, known as predictive policing, combines elements of traditional policing, like increased attention to crime “hot spots” and close monitoring of recent parolees. But it often also uses other data, including information about friendships, social media activity and drug use, to identify “hot people” and aid the authorities in forecasting crime.

Source: Police Program Aims to Pinpoint Those Most Likely to Commit Crimes

This is very worrying. Reading the article it seems they are handling it well – they are inviting potential purpetrators in and explaining what’s going on, hoping to shock them. If a crime is committed, everyone in the predictive chain is picked up and they sling the book at them for everything they can find. Fair enough, they shouldn’t have been breaking the law anyway and if they get picked up for it because they were in an associative chain is just as good as if they get picked up due to any other reason.

However, if you are friends with a criminal, you may get invited to the courts again and again and again, even if you did nothing wrong yourself – the same problem no-fly lists have: false positives. Another thing is that you need to troll through huge amounts of personal data in order to get these predictive models to work. This means that people and organisations could (in practice shows they do!) misuse their access to your personal data.

The article has some figures on how well this does compared to traditional policing and other predictive models, but the jury is still out on that really. It needs longer and more testing.

UK DRIPA privacy invasion blocked by EU courts

The judges identified two key problems with the law: that it does not provide for independent court or judicial scrutiny to ensure that only data deemed “strictly necessary” is examined; and that there is no definition of what constitutes “serious offences” in relation to which material can be investigated. For legal authority, the judges relied on an earlier decision, known as Digital Rights Ireland, by the European Court of Justice in Luxemburg, which is binding on UK courts.In their challenge, Davis and Watson argued that the law allowed the police and security services to spy on citizens without sufficient privacy safeguards.They said the legislation was incompatible with article eight of the European convention on human rights, the right to respect for private and family life, and articles seven and eight of the EU charter of fundamental rights, respect for private and family life and protection of personal data.The MPs complained that use of communications data was not limited to cases involving serious crime, that individual notices of data retention were kept secret, and that no provision was made for those under obligation of professional confidentiality, in particular lawyers and journalists. Nor, they argued, were there adequate safeguards against communications data leaving the EU.

Source: High court rules data retention and surveillance legislation unlawful | World news | The Guardian

Nice to see that at least EU courts can display sanity from time to time!

ProxyGambit – anonymise your internet traffic via GSM or Radio links

ProxyGambit is a simple anonymization device that allows you to access the Internet from anywhere in the world without revealing your true location or IP, fracturing your traffic from the Internet/IP through either a long distance radio link or a reverse tunneled GSM bridge that ultimately drops back onto the Internet and exits through a wireless network you’re no where near.

While a point to point link is supported, the reverse GSM-to-TCP bridge allows you to proxy from thousands of miles away with nothing other than a computer and Internet with no direct link back to your originating machine.

Fake Mobile Phone Towers Operating In The UK

Sky News has found evidence that rogue mobile phone towers, which can listen in on people’s calls without their knowledge, are being operated in the UK.IMSI catchers, also known as Stingrays, mimic mobile phone masts and trick phones into logging on.The controversial surveillance technology is used by police agencies worldwide to target the communications of criminals.However, Stingrays also collect the data of all other phones in the area, meaning innocent people’s communications are spied on.

NB this means they can also collect en masse without a warrant…

How To Make A Secret Phone Call

His step-by-step instructions for making a clandestine phone call are as follows:

Analyze your daily movements, paying special attention to anchor points (basis of operation like home or work) and dormant periods in schedules (8-12 p.m. or when cell phones aren’t changing locations);
Leave your daily cell phone behind during dormant periods and purchase a prepaid no-contract cell phone (“burner phone”);
After storing burner phone in a Faraday bag, activate it using a clean computer connected to a public Wi-Fi network;
Encrypt the cell phone number using a onetime pad (OTP) system and rename an image file with the encrypted code. Using Tor to hide your web traffic, post the image to an agreed upon anonymous Twitter account, which signals a communications request to your partner;
Leave cell phone behind, avoid anchor points, and receive phone call from partner on burner phone at 9:30 p.m.—or another pre-arranged “dormant” time—on the following day;
Wipe down and destroy handset.

http://m.fastcompany.com/3044637/secret-phone-network

this is part of an art project which was looking at the surveillance state we live in

Hacker hijack ‘threat’: Your car’s security is Adobe Flash-grade BAD

as we’ve long suspected, the computers in today’s cars can be hijacked wirelessly by feeding specially crafted packets of data into their networks. There’s often no need for physical contact; no leaving of evidence lying around after getting your hands dirty.

This means, depending on the circumstances, the software running in your dashboard can be forced to unlock doors, or become infected with malware, and records on where you’ve have been and how fast you were going may be obtained. The lack of encryption in various models means sniffed packets may be readable.

Key systems to start up engines, the electronics connecting up vital things like the steering wheel and brakes, and stuff on the CAN bus, tend to be isolated and secure, we’re told.

http://www.theregister.co.uk/2015/02/09/car_security_senator_report/

Uber: Selling your data

This year, we are going to see the transformation of Uber into a big data company cut from the same cloth as Google, Facebook and Visa – using the wealth of information they know about me and you to deliver new services and generate revenue by selling this data to others.Starwood is Just the beginningRecently, Uber launched a service that lets its customers connect their Uber account to their Starwood Prefered Guest account. The benefit to customers: get points when you take Uber. The quid pro quo? Customers give Uber the right to share all Uber ride information with Starwood.

via Uber: The Big Data Company.

America’s most powerful men explain why they’re scared of email

Graham told a confused Bloomberg News: "I’ve tried not to have a system where I can just say the first dumb thing that comes to my mind. I’ve always been concerned. I can get texts, and I call you back, if I want."

McCain meanwhile said this: "I’m afraid that if I was emailing, given my solid, always calm temperament that I might email something that I might regret. You could send out an email that you would regret later on and would be maybe taken out of context."

via We have no self-control: America's most powerful men explain why they're scared of email • The Register.

This makes perfect sense to me – people are people, not reasoning machines. People make mistakes and they don’t want their mistakes to be replayable through never deletable digital media. The article slams them for this, but basically the writers are saying there should be no expectation of people in power actually being humans. Because people can be called out for any infestimally stupid thing they ever do over email, far after the fact and without any context attached these people have been pushed out of using modern communications because the risks far outweigh the usefulness.