Fire Hydrant of Freedom

Politics, Religion, Science, Culture and Humanities => Politics & Religion => Topic started by: Crafty_Dog on October 06, 2021, 01:36:07 PM

Title: The Surveillance/Omnipotent State
Post by: Crafty_Dog on October 06, 2021, 01:36:07 PM
https://www.dailymail.co.uk/news/article-10063665/Government-orders-Google-track-searching-certain-names-addresses-phone-numbers.html

Title: Ellsberg and Snowden in conversation
Post by: Crafty_Dog on October 17, 2021, 03:23:01 PM
https://www.democracynow.org/2021/5/6/whistleblowers_daniel_ellsberg_edward_snowden_in
Title: Good thing that can't happen here! "global digital identity structure"
Post by: G M on November 12, 2021, 07:07:04 AM
https://childrenshealthdefense.org/defender/digital-vaccine-passports-surveillance-capitalism-covid-gates/


Title: South Korea AI facial recognition tracking Wuhan Virus suspects
Post by: Crafty_Dog on December 15, 2021, 01:52:30 AM
https://www.breitbart.com/asia/2021/12/14/south-korea-city-track-coronavirus-patients-facial-recognition-software/
Title: Asset forfeiture funding surveillance
Post by: Crafty_Dog on December 17, 2021, 09:59:30 AM
https://www.propublica.org/article/boston-police-bought-spy-tech-with-a-pot-of-money-hidden-from-the-public?utm_source=sailthru&utm_medium=email&utm_campaign=majorinvestigations&utm_content=river
Title: ChiComs planting chips in brain?
Post by: Crafty_Dog on December 25, 2021, 01:41:46 AM
https://www.theepochtimes.com/the-ethical-risks-of-chinas-brain-control-tech_4167051.html?utm_source=newsnoe&utm_campaign=breaking-2021-12-24-1&utm_medium=email&est=03UjmnwmPsN31ceIMKy2kS5dDaMIKiUiKkWqCUgn1Uf6e8rNgjsL5G%2FFt9Cx%2FgqH%2B6sn
Title: Search warrant of Google location data
Post by: Crafty_Dog on May 12, 2022, 05:34:16 AM
Man pleads guilty in case testing Google location history use

ASSOCIATED PRESS

RICHMOND | A Richmond man has pleaded guilty to federal bank robbery charges in a closely watched case that tested the constitutionality of broad search warrants that use Google location history to find people who were near crime scenes.

The Richmond Times-Dispatch reports Okello Chatrie pleaded guilty Monday to armed robbery and use of a firearm in the 2019 robbery of the Call Federal Credit Union in Midlothian.

Chatrie’s lawyers argued the use of a “geofence warrant” to identify people who were near the scene of the robbery violated their constitutional protection against unreasonable searches.

Federal prosecutors argued that Chatrie had no reasonable expectation of privacy since he voluntarily opted in to Google’s Location History.

U.S. District Judge M. Hannah Lauck ruled in March that the warrant violated the Constitution by gathering the location history of people near the bank without having any evidence they had anything to do with the robbery.

Geofence warrants seek location data on every person within a specific location over a certain period of time.

“The warrant simply did not include any facts to establish probable cause to collect such broad and intrusive data from each of these individuals,” Judge Lauck wrote in her ruling.

Privacy advocates said the ruling — believed to be the first time a federal district court judge has ruled on the constitutionality of a geofence warrant — could make it more difficult for police to continue using a popular investigative technique that has helped lead them to suspects in a list of crimes around the country. Judge Lauck’s ruling did not help Chatrie because she denied his motion to suppress the evidence produced by the warrant, finding the detective had acted in good faith by consulting with prosecutors before applying for the warrant and relied on his past experience in obtaining three similar warrants.

The judge said she was not ruling on whether geofence warrants can ever satisfy the Fourth Amendment. She urged legislative action on the issue, noting there is currently no law prohibiting Google and other companies from collecting and using vast amounts of data from their customers.

In a legal brief filed in the case, Google said geofence requests jumped 1,500% from 2017 to 2018, and another 500% from 2018 to 2019.

Google now reports that geofence warrants make up more than 25% of all the warrants Google receives in the U.S., the judge wrote in her ruling.

Chatrie’s lawyers did not immediately respond to an emailed request seeking comment on his guilty plea.

Judge Lauck scheduled sentencing for Aug. 2.
Title: Twitter and the Surveillance State
Post by: Crafty_Dog on August 24, 2022, 08:18:05 AM
https://theconservativetreehouse.com/blog/2022/08/23/twitter-whistleblower-surfaces-presenting-challenge-for-u-s-surveillance-state-enter-cnn-and-the-washington-post/?fbclid=IwAR2XXSFNWF1Lx1tHfZrB0eeo1mM5pP-Z47zV6BXJAryLB2NAFXbcVfs-kew
Title: Dan Bongino: We are living in a police state
Post by: Crafty_Dog on September 18, 2022, 04:30:58 PM
https://www.youtube.com/watch?v=zJj2eSnEV-Q
Title: Pentagon reviews pyscho operations on FB and Twitter
Post by: Crafty_Dog on September 20, 2022, 02:28:33 PM
https://www.washingtonpost.com/national-security/2022/09/19/pentagon-psychological-operations-facebook-twitter/?utm_campaign=wp_post_most&utm_medium=email&utm_source=newsletter&wpisrc=nl_most&carta-url=https%3A%2F%2Fs2.washingtonpost.com%2Fcar-ln-tr%2F37f73cf%2F632894f9f3d9003c58e23fb4%2F61cdf026ae7e8a4ac205b2b3%2F9%2F72%2F632894f9f3d9003c58e23fb4&wp_cu=10fdb05edea8f32c1b02f6dfec609335%7CD462DD329F9C56B3E0530100007F597F
Title: Post Office
Post by: Crafty_Dog on September 23, 2022, 03:36:02 AM
https://www.washingtontimes.com/news/2022/sep/22/postal-service-surveilled-protesters-pro-guns-anti/?utm_source=Boomtrain&utm_medium=subscriber&utm_campaign=morning&utm_term=newsletter&utm_content=morning&bt_ee=Pe1morUT15dB%2F19q%2Be8i4BC3hA1EH3488UAM%2BWH5pqWudc02tz%2FV%2FX0GvTFOZAxO&bt_ts=1663926332251
Title: Re: Post Office
Post by: G M on September 23, 2022, 07:46:50 AM
https://www.washingtontimes.com/news/2022/sep/22/postal-service-surveilled-protesters-pro-guns-anti/?utm_source=Boomtrain&utm_medium=subscriber&utm_campaign=morning&utm_term=newsletter&utm_content=morning&bt_ee=Pe1morUT15dB%2F19q%2Be8i4BC3hA1EH3488UAM%2BWH5pqWudc02tz%2FV%2FX0GvTFOZAxO&bt_ts=1663926332251

Utterly unacceptable, but zero consequences.
Title: WT: The Post Office Branch of the Surveillance State
Post by: Crafty_Dog on September 25, 2022, 05:05:50 PM
https://www.washingtontimes.com/news/2022/sep/25/mail-fraud-bidens-postal-inspectors-tracked-pro-gu/?utm_source=Boomtrain&utm_medium=subscriber&utm_campaign=newsalert&utm_content=newsalert&utm_term=newsalert&bt_ee=v0W9T7CJ7dubwLpy8IY%2Brh268AuD%2FxOky6Po%2BmsRpVZYh7L2Uqe%2BmTa2xxUMzDnX&bt_ts=1664111441364
Title: The Surveillance State/American Police State
Post by: G M on October 09, 2022, 08:18:06 AM
https://www.revolver.news/2022/10/surveillance-state-usa-biden-quietly-unleashes-spymasters-in-dramatic-executive-order/
Title: Fog Data selling location data to police
Post by: Crafty_Dog on October 15, 2022, 06:46:56 AM
https://www.eff.org/deeplinks/2022/08/inside-fog-data-science-secretive-company-selling-mass-surveillance-local-police
Title: Re: Fog Data selling location data to police
Post by: DougMacG on October 15, 2022, 10:32:20 AM
https://www.eff.org/deeplinks/2022/08/inside-fog-data-science-secretive-company-selling-mass-surveillance-local-police

We need to delete and stop using these people tracking apps.

My awareness began when a flashlight app needed permission to access my contacts and location etc.
Title: ET: Third Party Doctrine
Post by: Crafty_Dog on November 05, 2022, 01:40:44 PM
How Government Makes Your Bank Spy on You
By Kevin Stocklin November 4, 2022 Updated: November 4, 2022biggersmaller Print

0:00
7:14



1

When you open a bank account, do you surrender all rights to your privacy and personal data?

Today, the answer is yes. The Bank Secrecy Act of 1970 (BSA) and subsequent amendments mandated that your bank must inform the federal government about any customer’s transactions that they consider suspicious, however broadly defined that may be, in the form of Suspicious Activity Reports (SARs).

How often do banks think their customers are doing something suspicious? According to the U.S. Treasury Financial Crimes Enforcement Network, there were approximately 20 million bank reports of suspicious activity in 2019.

An August report by the Cato Institute titled “Government Surveillance Doesn’t Stop at Your Bank’s Door” states that this reporting requirement doesn’t just apply to banks but also to currency exchanges, payments companies, broker-dealers, casinos, pawnbrokers, travel agencies, and car dealerships.

All of this would seem to be illegal under the U.S. Constitution; the Fourth Amendment, for example, prohibits “unreasonable search and seizure” by our government and establishes the requirement for the government to obtain a warrant and show “probable cause” of a crime. But according to Jennifer Schulp, co-author of the Cato report, one reason that government surveillance-by-proxy has been allowed by U.S. courts, including the U.S. Supreme Court, is something called the “Third Party Doctrine.”

Schulp told The Epoch Times that the Third Party Doctrine is a legal principle that “essentially removed the expectation of privacy that an individual has from information that they share with a third party, including their banks. So under current Fourth Amendment jurisprudence, the information that you give to your bank is no longer private.”

Given that it is nearly impossible to function without a bank account in America today, this effectively blurs the line between public and private surveillance. When the Third Party Doctrine was adopted in the 1960s and 1970s, the courts began to allow government to conduct warrantless searches in the interest of preventing crime.

The Cato report points out that “while the government’s interest in stopping crime is certainly an important one, the Constitution’s Fourth Amendment already balances that interest with an individual’s interest in privacy by requiring the government to obtain a warrant to access a person’s documents and information.”

Another reason the Supreme Court allowed the Bank Secrecy Act to stand was that the law as originally written was more narrowly tailored, and only required reporting of transactions over $10,000. Taking inflation into account, this would be about $75,000 today. The limits of the BSA were never adjusted up for inflation, casting a much wider net today than when the law was passed.

How Extensive Is Government Surveillance?
Since being signed off on by the Supreme Court, the law has since been expanded to include many more types of transactions and institutions. But the fact that, according to the law, banks do not tell customers that they’re being surveilled, means that there are few challenges for courts to take up in order to reconsider their verdict.

“Banks are not allowed to let individuals know that this type of report is being filed on them,” Schulp said. “So to the extent that individual citizens might have objections to their information being shared with the government in a Suspicious Activity Report, they have no way of knowing that that’s happening to them, and thus can’t really bring the legal challenge themselves.”

Even at the time of the BSA’s original passage, some justices expressed concerns that the constitution was being violated. Justice Thurgood Marshall, for example, stated that “by compelling an otherwise unwilling bank to photocopy the checks of its customers, the government has as much of a hand in seizing those checks as if it had forced a private person to break into the customer’s home or office and photocopy the checks there.”

This issue is now being raised again today not only about bank surveillance but also about tech surveillance and even tech censorship. The question is: If the government is barred from warrantless searches, can it get around this simply by getting private corporations to search Americans’ data on its behalf? Likewise, if the government is barred from censoring Americans’ speech, can it just get private tech companies to do this instead?

The extent of bank surveillance has made headlines this year, in three cases in particular. The first was a New York Post report that Bank of America had data-mined its customers’ accounts to see which customers had made purchases or traveled to Washington, D.C., around the time of the Jan. 6 riots at the Capitol. The names of customers who had done so, or who had recently bought a firearm, were handed over to the FBI for investigation. One customer was reportedly questioned by the FBI as a result, but no charges were filed.


The second case regards a decision by credit card companies—Visa, Mastercard, and American Express, in particular—to begin tracking their customers’ purchases at gun shops. The CEO of Amalgamated Bank, a progressive bank that had lobbied heavily for the tracking of gun sales, stated that “where there may be gun sales that are intended for black markets or we see patterns of gun purchases made in multiple gun shops … we can provide that information to authorities to investigate.”

Gun rights advocates were quick to criticize this action.

“They’ve created this merchant category code that if you go into a gun store and you purchase anything from that gun store, and it looks like it may be something outside the norm, then that information could be turned over to the U.S. Treasury’s Financial Crimes Enforcement Network,” Mark Oliva, public affairs director for the National Shooting Sports Foundation, told The Epoch Times. “What we’re talking about with this is a heavy-handed approach that’s going to put people who are exercising their Second Amendment rights onto a government watchlist, simply for exercising that right.”

The third case occurred in February, when Canadian banks data-mined the private accounts of truckers protesting pandemic regulations, as well as those who had donated in support of protesters via crowdfunding sites like GoFundMe and GiveSendGo. Under orders from the Canadian government, banks froze the accounts of targeted customers, blocking them from accessing their own money or making credit card payments.

“That Third Party Doctrine has come under criticism a lot over the years, by current Supreme Court justices from very different schools of thought,” Schulp said. “Justice Neil Gorsuch and Justice Sonia Sotomayor have indicated that the Third Party Doctrine needs to be revisited. So I think it’s something that the current court might look at differently than the court did in the 1970s.”
Title: Napolitano: The FBI and Pegasus (Zero Click)
Post by: Crafty_Dog on November 20, 2022, 02:38:19 PM
https://dailycaller.com/2022/11/19/opinion-americans-should-pay-close-attention-to-the-fbi-and-zero-click-heres-why-judge-andrew-p-napolitano/?utm_medium=email&pnespid=rrpgV3tBZKpLyOPMqze0CYLT5E2kX4pmMePs3_lhohFmztVFjEO1lCC7hBJW1vuYLjh3xlWQ
Title: Re: The Surveillance State
Post by: ccp on November 20, 2022, 03:17:23 PM
I don't know if you watched Bong last night (that is what a do on a Saturday evening for excitement - a wild and crazy guy  :|)

he spent the first part of the show on this topic:

you can skim to minute 15:51:

https://www.youtube.com/watch?v=3bssk4kLS7g
Title: Carbon consumption permits coming; carbon credit emissions (and become a Lord?!?
Post by: Crafty_Dog on November 21, 2022, 04:34:09 PM
https://www.youtube.com/watch?v=kMT1bdGLxfw

Go to https://EstablishedTitles.com/lordwatson and help support the channel. They are now running a massive Black Friday sale, plus 10% off on any purchase with code LORDWATSON. Thanks to Established Titles for sponsoring this video!
Title: Good thing they would never use this on us , , ,
Post by: Crafty_Dog on December 15, 2022, 04:05:27 PM
https://www.defenseone.com/technology/2022/12/inside-armys-newest-spy-plane/380964/

PS:  Note that they are contracted , , , from whom?

Any chance here for the same Twitter/Public Square Dance wherein the Feds get to private sector to be their beard?
Title: FA: Mercenary Spyware
Post by: Crafty_Dog on December 16, 2022, 10:05:03 AM
https://www.foreignaffairs.com/world/autocrat-in-your-iphone-mercenary-spyware-ronald-deibert?utm_medium=newsletters&utm_source=twofa&utm_campaign=How%20to%20Stop%20Chinese%20Coercion&utm_content=20221216&utm_term=FA%20This%20Week%20-%20112017

The Autocrat in Your iPhone
How Mercenary Spyware Threatens Democracy
By Ronald J. Deibert
January/February 2023

Daniel Stolle
Sign in and save to read later
Print this article
Send by email
Share on Twitter
Share on Facebook
Share on LinkedIn
Get a link
Page url
https://www.foreignaffairs.com/world/autocrat-in-your-iphone-mercenary-spyware-ronald-deibert
Request Reprint Permissions
In the summer of 2020, a Rwandan plot to capture exiled opposition leader Paul Rusesabagina drew international headlines. Rusesabagina is best known as the human rights defender and U.S. Presidential Medal of Freedom recipient who sheltered more than 1,200 Hutus and Tutsis in a hotel during the 1994 Rwandan genocide. But in the decades after the genocide, he also became a prominent U.S.-based critic of Rwandan President Paul Kagame. In August 2020, during a layover in Dubai, Rusesabagina was lured under false pretenses into boarding a plane bound for Kigali, the Rwandan capital, where government authorities immediately arrested him for his affiliation with an opposition group. The following year, a Rwandan court sentenced him to 25 years in prison, drawing the condemnation of international human rights groups, the European Parliament, and the U.S. Congress.

Less noted at the time, however, was that this brazen cross-border operation may also have employed highly sophisticated digital surveillance. After Rusesabagina’s sentencing, Amnesty International and the Citizen Lab at the University of Toronto, a digital security research group I founded and direct, discovered that smartphones belonging to several of Rusesabagina’s family members who also lived abroad had been hacked by an advanced spyware program called Pegasus. Produced by the Israel-based NSO Group, Pegasus gives an operator near-total access to a target’s personal data. Forensic analysis revealed that the phone belonging to Rusesabagina’s daughter Carine Kanimba had been infected by the spyware around the time her father was kidnapped and again when she was trying to secure his release and was meeting with high-level officials in Europe and the U.S. State Department, including the U.S. special envoy for hostage affairs. NSO Group does not publicly identify its government clients and the Rwandan government has denied using Pegasus, but strong circumstantial evidence points to the Kagame regime.

In fact, the incident is only one of dozens of cases in which Pegasus or other similar spyware technology has been found on the digital devices of prominent political opposition figures, journalists, and human rights activists in many countries. Providing the ability to clandestinely infiltrate even the most up-to-date smartphones—the latest “zero click” version of the spyware can penetrate a device without any action by the user—Pegasus has become the digital surveillance tool of choice for repressive regimes around the world. It has been used against government critics in the United Arab Emirates (UAE) and pro-democracy protesters in Thailand. It has been deployed by Mohammed bin Salman’s Saudi Arabia and Viktor Orban’s Hungary.

Stay informed.
In-depth analysis delivered weekly.
But the use of spyware is hardly limited to the world’s authoritarians. As researchers have revealed, over the past decade many democracies, including Spain and Mexico, have begun using spyware, as well, in ways that violate well-established norms of human rights and public accountability. U.S. government documents disclosed by The New York Times in November 2022 show that the FBI not only acquired spyware services from NSO, possibly for counterintelligence purposes, but also contemplated deploying them, including on U.S. targets. (An FBI spokesperson told the Times that “there has been no operational use of the NSO product to support any FBI investigation.”)

The advent of advanced spyware has transformed the world of espionage and surveillance. Bringing together a largely unregulated industry with an invasive-by-design digital ecosystem in which smartphones and other personal devices contain the most intimate details of people’s lives, the new technology can track almost anyone, anywhere in the world. Governments have taken notice. For Israel, which approves export licenses for NSO Group’s Pegasus, the sale of spyware to foreign governments has brought new diplomatic clout in countries as disparate as India and Panama; a New York Times investigation found that NSO deals helped Israeli Prime Minister Benjamin Netanyahu seal the Abraham Accords with Bahrain, Morocco, and the UAE. In turn, client states have used Pegasus against not only opposition groups, journalists, and nongovernmental organizations (NGOs) but also geopolitical rivals. In 2020 and 2021, the Citizen Lab discovered that several devices belonging to officials in the United Kingdom’s Foreign Commonwealth and Development Office had been hacked with Pegasus, and that a client of NSO Group in the UAE had used the spyware to infiltrate a device located at 10 Downing Street, the residence of the British prime minister. In November 2021, the tech giant Apple notified 11 staff members of the U.S. embassy in Uganda that their iPhones had been hacked with Pegasus.

In response to these revelations, spyware firms have generally denied responsibility for their clients’ abuses or have declined to comment. In a statement to The New Yorker in April 2022, NSO Group said, “We have repeatedly cooperated with governmental investigations, where credible allegations merit, and have learned from each of these findings and reports and improved the safeguards in our technologies.” The Israeli company has also said that its technology is designed to help governments investigate crime and terrorism. But advanced spyware has now been implicated in human rights violations and interstate espionage in dozens of countries, and spyware companies have few legal obligations or incentives for public transparency or accountability. NSO Group has not provided any specific information to counter the Citizen Lab’s detailed evidence of abuses.

The consequences of the spyware revolution are profound. In countries with few resources, security forces can now pursue high-tech operations using off-the-shelf technology that is almost as easy to acquire as headphones from Amazon. Among democracies, the technology has become an irresistible tool that can be deployed with little oversight; in the last year alone, security agencies in at least four European countries—Greece, Hungary, Poland, and Spain—have been implicated in scandals in which state agencies have been accused of deploying spyware against journalists and political opposition figures. A global market for spyware also means that forms of surveillance and espionage that were once limited to a few major powers are now available to almost any country, and potentially to even more private firms. Left unregulated, the proliferation of this technology threatens to erode many of the institutions, processes, and values on which the liberal international order depends.

WE WILL SPY FOR YOU
The spyware revolution has emerged as a byproduct of a remarkable convergence of technological, social, and political developments over the past decade. Smartphones and other digital devices are vulnerable to surveillance because their applications often contain flaws and because they continually transmit data through insecure cellular and Internet networks. Although manufacturers of these technology platforms employ engineers to find and patch vulnerabilities, they tend to prioritize product development over security. By discovering and weaponizing “zero days”—software flaws that are unknown to their designers—spyware firms exploit the inherent insecurity of the digital consumer world.

But the extraordinary growth of the spyware market has also been driven by several broader trends. First, spyware takes advantage of a global digital culture that is shaped around always-on, always-connected smartphones. By hacking a personal device, spyware can provide its operators with a user’s entire pattern of life in real time. Second, spyware offers security agencies an elegant way to circumvent end-to-end encryption, which has become a growing barrier to government mass surveillance programs that depend on the collection of telecommunications and Internet data. By getting inside a user’s device, spyware allows its operators to read messages or listen to calls before they have been encrypted or after they have been decrypted; if the user can see it on the screen, so can the spyware. A third factor driving the industry’s growth has been the rise of digitally enabled protest movements. Popular upheavals such as the color revolutions in former Soviet states in the first decade of this century and the Arab Spring in 2010–11 took many autocrats by surprise, and the organizers often used phones to mobilize protesters. By offering an almost godlike way to get inside activist networks, spyware has opened up a powerful new method for governments to monitor dissent and take steps to neutralize it before large protests occur.

Finally, the spyware industry has also been fueled by the growing privatization of national security. Just as governments have turned to private contractors for complicated or controversial military operations, they have discovered that they can outsource surveillance and espionage to better-equipped and less visible private actors. Like soldiers of fortune, advanced spyware companies tend to put revenues ahead of ethics, selling their products without regard to the politics of their clients—giving rise to the term “mercenary spyware”—and like military contractors, their dealings with government security agencies are often cloaked in secrecy to avoid public scrutiny. Moreover, just as military contractors have offered lucrative private-sector careers for veterans of military and intelligence agencies, spyware firms and government security services have been building similarly mutually beneficial partnerships, boosting the industry in the process. Many senior members of NSO Group, for example, are veterans of Israeli intelligence, including the elite Military Intelligence Directorate.

Xenia Oliva, an investigative reporter who had her phone hacked seven times, checking her phone in San Salvador, El Salvador, January 2022
Xenia Oliva, an investigative reporter who had her phone hacked seven times, checking her phone in San Salvador, El Salvador, January 2022
Jessica Orellana / Reuters
Although lack of transparency has made the mercenary spyware industry difficult to measure, journalists have estimated it to be worth about $12 billion per year. Before recent financial setbacks brought on by a growing number of lawsuits, NSO Group was valued at $2 billion, and there are other major players in the market. Many companies now produce sophisticated spyware, including Cytrox (founded in North Macedonia and now with operations in Hungary and Israel), Israel-based Cyberbit and Candiru, Italy-based Hacking Team (now defunct), and the Anglo-German Gamma Group. Each of these firms can hypothetically serve numerous clients. Governments that appear to have used Cytrox’s Predator spyware, for example, include Armenia, Egypt, Greece, Indonesia, Madagascar, and Serbia. In 2021, Mexico’s secretary of Security and Public Safety, Rosa Icela Rodríguez, said that previous Mexican administrations had signed multiple contracts with NSO Group, totaling $61 million, to buy Pegasus spyware, and as Mexican and international researchers have shown, the government has kept using Pegasus despite the present leadership’s public assurances that it would not. (In October 2022, Mexican President Andrés Manuel López Obrador denied the findings, stating that his administration was not using the spyware against journalists or political opponents.)

On the basis of such lucrative deals, spyware firms have enjoyed backing from major private equity funds, such as the San Francisco firm Francisco Partners and the London-based Novalpina Capital, thus bolstering their resources. Francisco Partners, which had a controlling stake in NSO Group for five years, told Bloomberg News in 2021, “[We are] deeply committed to ethical business practices, and we evaluate all our investments through that lens.” Novalpina, which together with NSO’s founders acquired Francisco Partners’ stake in 2019, said it would bring the spyware firm “in full alignment with UN guiding principles on business and human rights,” but revelations of abuses of Pegasus have continued, and correspondence published by The Guardian in 2022 indicated that Novalpina sought to discredit NSO Group’s critics, including this author. (Lawyers for Novalpina told The Guardian that these were “tenuous and unsubstantiated allegations.”) After a dispute between Novalpina’s founding partners, the firm lost its controlling stake in NSO Group in 2021.

But the spyware industry also includes far less sophisticated firms in countries such as India, the Philippines, and Cyprus. As the surveillance equivalent of strip-mall phone repair shops, such outfits may lack the ability to identify zero days, but they can still accomplish objectives through simpler means. They may use credential phishing—using false pretenses, often via email or text message, to obtain a user’s digital passwords or other sensitive personal information—or they may simply purchase software vulnerabilities from other hackers on the black market. And these smaller firms may be more willing to undertake illegal operations on behalf of private clients because they are located outside the jurisdiction in which a victim resides or because enforcement is lax.

It is hard to overestimate the reach and power of the latest commercial spyware. In its most advanced forms, it can silently infiltrate any vulnerable device anywhere in the world. Take the zero-day, zero-click exploit that Citizen Lab researchers discovered in 2021 on a Pegasus-infected iPhone. Using the exploit, which researchers called ForcedEntry, a spyware operator can surreptitiously intercept texts and phone calls, including those encrypted by apps such as Signal or WhatsApp; turn on the user’s microphone and camera; track movements through a device’s GPS; and gather photos, notes, contacts, emails, and documents. The operator can do almost anything a user can do and more, including reconfigure the device’s security settings and acquire the digital tokens that are used to securely access cloud accounts so that surveillance on a target can continue even after the exploit has been removed from a device—all without the target’s awareness. After the Citizen Lab shared Pegasus’s ForcedEntry with analysts at Apple and Google, Google’s analysts described it as “one of the most technically sophisticated exploits we’ve ever seen,” noting that it provided capabilities that were “previously thought to be accessible to only a handful of nation states.”

SHOOTING THE MESSENGERS
Over the past decade, the rise of authoritarian regimes in many parts of the world has raised new questions about the durability of the liberal international order. As has been widely noted, many ruling elites have been able to slide toward authoritarianism by limiting or controlling political dissent, the media, the courts, and other institutions of civil society. Yet far less attention has been paid to the pervasive role of the mercenary spyware industry in this process. This neglect is partly the result of how little we know about spyware, including, in many cases, the identity of the specific government agencies that are using it. (Given the secretive nature of spyware transactions, it is far easier to identify victims than operators.) There is little doubt, however, that spyware has been used to systematically degrade liberal democratic practices and institutions.

One of the technology’s most frequent uses has been to infiltrate opposition movements, particularly in the run-up to elections. Researchers have identified cases in which opposition figures have been targeted, not only in authoritarian states such as Saudi Arabia and the UAE but also in democratic countries such as India and Poland. Indeed, one of the most egregious cases arose in Spain, a parliamentary democracy and European Union member. Between 2017 and 2020, the Citizen Lab discovered, Pegasus was used to eavesdrop on a large cross section of Catalan civil society and government. The targets included every Catalan member of the European Parliament who supported independence for Catalonia, every Catalan president since 2010, and many members of Catalan legislative bodies, including multiple presidents of the Catalan parliament. Notably, some of the targeting took place amid sensitive negotiations between the Catalan and Spanish governments over the fate of Catalan independence supporters who were either imprisoned or in exile. After the findings drew international attention, Paz Esteban, the head of Spain’s National Intelligence Center, acknowledged to Spanish lawmakers that spyware had been used against some Catalan politicians, and Esteban was subsequently fired. But it is still unclear which government agency was responsible, and which laws, if any, were used to justify such an extensive domestic spying operation.

In some countries, spyware has proved equally effective against journalists who are investigating those in power, with far-reaching consequences for both the targets and their sources. In 2015, several devices belonging to Mexican journalist Carmen Aristegui and a member of her family were sent Pegasus exploit links while she was investigating corruption involving then Mexican President Enrique Peña Nieto. There is no smoking gun that identifies the responsible party, though strong circumstantial evidence suggests a Mexican government agency. In 2021, a Hungarian journalist investigating corruption in President Viktor Orban’s inner circle was hacked with Pegasus. (The Hungarian government subsequently acknowledged that it had purchased the technology.) And that same year, the cellphone of New York Times Middle East correspondent Ben Hubbard was infected with Pegasus while he was working on a book about Saudi Arabia’s de facto leader, Crown Prince Mohammed bin Salman.

With spyware, governments can stop protests before they occur.
Almost as frequently, spyware has been used to undermine judicial officials and civil society organizations that are trying to hold governments to account. Take the case of Alberto Nisman, a well-known Argentine anticorruption prosecutor who was investigating an alleged criminal conspiracy by high-level Argentine officials. In January 2015, Nisman was found dead in suspicious circumstances—his death was later ruled a homicide—the day before he was to provide testimony to Congress implicating then president of Argentina Cristina Fernández de Kirchner and her foreign minister, Héctor Timerman, in a cover-up of alleged Iranian involvement in the 1994 bombing of a Jewish center in Buenos Aires. Later that year, the Citizen Lab documented how a South American hack-for-hire group had been contracted to target Nisman with spyware before his death, suggesting that someone in power was keen to peer into his investigations. In Mexico in 2017, a still unknown government agency or agencies used Pegasus spyware against human rights groups and international investigators that were tracking down potential government cover-ups of the notorious disappearance and gruesome murder of 43 students in Iguala, Mexico. Subsequent reports showed that the Mexican government had badly botched the investigations and that government personnel were implicated in a cover-up—findings that might never have come to light without the efforts of civil society watchdogs.

Other common Pegasus targets are lawyers involved with prominent or politically sensitive cases. In most liberal democracies, attorney-client privilege is sacrosanct. Yet the Citizen Lab has identified a variety of cases in which spyware has been used to hack or target lawyers’ devices. In 2015, the tactic was used against two lawyers in Mexico who were representing the families of Nadia Vera, a slain government critic and women’s rights advocate. More recently, multiple lawyers representing prominent Catalans were targeted as part of the Spanish surveillance campaign. And in Poland, Pegasus spyware was used several times to hack the device of Roman Giertych, legal counsel to Donald Tusk, a former prime minister and the leader of the country’s main opposition party. (In early 2022, Polish Deputy Prime Minister Jaroslaw Kaczynski publicly acknowledged that the government had bought Pegasus spyware but denied that it had been used against the Polish opposition.)

As the availability of spyware grows, private-sector clients are also getting in on the act. Consider the activities of BellTroX, an Indian hack-for-hire company responsible for extensive espionage on behalf of private clients worldwide. Between 2015 and 2017, someone used BellTroX’s services against American nonprofits that were working to publicize revelations that the oil company ExxonMobil had hidden its research about climate change for decades. BellTroX has also been used to target U.S. organizations working on net neutrality, presumably at the behest of a different client or clients that were opposed to that reform. BellTroX also has a burgeoning business in the legal world; law firms in many countries have used the company’s services to spy on opposing counsel. In April 2022, an Israeli private detective who acted as a broker for BellTroX pleaded guilty in U.S. court to wire fraud, conspiracy to commit hacking, and aggravated identity theft, but BellTroX’s India-based operators have remained out of reach of the law. (Asked by Reuters in 2020 to respond to the findings, the company’s founder, Sumit Gupta, denied any wrongdoing and declined to disclose his clients.)

NOWHERE TO HIDE
The proliferating use of spyware against political and civil society targets in advanced democracies is concerning enough. Even more threatening, however, may be the ways in which the technology has allowed authoritarian regimes to extend their repression far beyond their own borders. In past decades, autocrats faced significant barriers to repressing citizens who had gone into exile. With spyware, however, an operator can get inside a political exile’s entire network without setting foot inside the target’s adopted country, and with very few of the risks and costs associated with conventional international espionage.

Examples of this new form of transnational repression are manifold. Beginning in 2016, Cyberbit was used to target Ethiopian dissidents, lawyers, students, and others in nearly 20 countries. In 2021, the phones of two prominent Egyptians—exiled opposition politician Ayman Nour, who has been living in Turkey, and the host of a popular news program (who has asked to remain anonymous for his own safety)—were hacked with Cytrox’s Predator spyware. In fact, the phone of Nour, who is an outspoken critic of Egyptian President Abdel Fattah el-Sisi, was simultaneously infected with both Predator and NSO Group’s Pegasus spyware, each apparently operated by separate government clients—Egypt in the case of Predator and either Saudi Arabia or the UAE in the case of Pegasus. In a statement to Vice News, Cyberbit said that the Israeli government oversees its technology and that “the intelligence and defense agencies that purchase these products are obligated to use them in accordance with the law.” In the Egyptian hacking case, Cytrox’s CEO, Ivo Malinkovski, declined to comment; according to VICE news, he subsequently deleted references to Cytrox in his LinkedIn profile. (The governments of Egypt, Ethiopia, Saudi Arabia, and the UAE have declined to comment about the findings.)

Especially far-reaching has been the Saudi government’s transnational spyware campaign. In 2018, a phone belonging to Ghanem al-Masarir, a Saudi dissident living in the United Kingdom, was hacked with Pegasus spyware. Coinciding with the infection of his device, al-Masarir was tracked down and physically assaulted by Saudi agents in London. Spyware may have also played a part in the notorious killing of the exiled Saudi journalist Jamal Khashoggi in the Saudi consulate in Turkey. In 2018, a phone owned by Omar Abdulaziz—a Saudi activist, Canadian permanent resident, and close confidant of Khashoggi—was hacked with Pegasus spyware. Abdulaziz and Khashoggi had been discussing their activism against the Saudi regime over what they mistakenly assumed were secure communications platforms. After Khashoggi’s killing, forensic analysis revealed that the devices of several other people closest to Khashoggi, including his Egyptian wife and his Turkish fiancée, had also been infected. To what extent Khashoggi’s own phones were hacked is not known because his fiancée turned them over to Turkish authorities, who have withheld them from independent analysis, but his closest contacts were all under surveillance, providing Saudi agents with windows into Khashoggi’s personal life, political activism, and movements in the months leading up to his murder. (The Saudi government has declined to comment on the revelations. In 2021, NSO Group told The Guardian, “Our technology was not associated in any way with the heinous murder of Jamal Khashoggi.”)

A man reading at a stand for NSO Group Technologies at the European Police Congress in Berlin, February 2020
A man reading at a stand for NSO Group Technologies at the European Police Congress in Berlin, February 2020
Hannibal Hanschke / Reuters
In fact, targeting regime critics abroad with spyware is only one of several ways the Saudi government has employed digital technology to neutralize dissent. For example, according to a U.S. federal indictment, a top adviser to Saudi Crown Prince Mohammed bin Salman paid a Twitter employee $300,000 and provided other gifts in 2014 and 2015, apparently in exchange for spying on dissidents on the platform. The employee, who left Twitter in 2015, was convicted in U.S. court in 2022. When such tactics are used in combination with the type of highly intrusive surveillance that spyware represents, dissidents can come under extraordinary psychological pressure. Many victims of hacking have experienced debilitating shock knowing that their compromised devices have also put friends and associates at risk and that their every move is being watched. One female Saudi activist explained that being digitally targeted was a form of “psychological and emotional war” that caused her “endless fear and anxiety.” By using spyware, autocrats and despots are thus able to clamp down on civil society networks well beyond their own borders even as they strengthen autocracy at home.

Despite a large and growing body of documentation about spyware abuses around the world, there are several reasons that the technology seems likely to become even more widespread. First, although much scrutiny of mercenary spyware firms has concerned their contracts with national government agencies, many firms market to more than one client in a given country, including local law enforcement. For example, in a fact-finding trip to Israel in the summer of 2022, officials for the European Parliament learned that NSO Group has at least 22 clients in 12 European countries, suggesting that a significant number of these clients are subnational agencies. Such deals raise further questions about accountability, given that research has shown that local law enforcement agencies are often more susceptible to abuses, such as racial profiling or corruption, and tend to have poor transparency and insufficient oversight.

Second, although some mercenary spyware firms such as NSO Group claim that they deal only with government clients, there is little to prevent them from selling their technology to private firms or corrupt individuals. Evidence suggests that some already do: in July 2022, Microsoft’s Threat Intelligence Center issued a report on an Austria-based spyware and hack-for-hire firm called DSIRF that had targeted individuals in banks, law firms, and consultancies in several countries. Though Microsoft did not specify what type of clients hired DSIRF, the firm advertises “due diligence” services to businesses, implying that these hacking operations were undertaken on behalf of private clients. When Reuters asked DSIRF about the Microsoft report, the company declined to comment. Although it is illegal if done without a warrant, such private-sector hacking is less likely to be deterred when hackers’ firms are located outside the jurisdiction in which the targeting occurs. As protections for privacy rights, freedom of the press, and independent courts, come increasingly under threat in many countries, it will likely become even easier for corrupt firms or oligarchs to deploy mercenary spyware without accountability.

Third, spyware has become a central component of a broader menu of surveillance tools, such as location tracking and biometric identification, used by many government security agencies. The more that spyware is incorporated into everyday intelligence gathering and policing, the harder it will be to rein it in. More ominously, spyware may soon acquire even more invasive capabilities by exploiting wearable applications, such as biomedical monitors, emotional detection technology, and Internet-connected neural networks currently in development. Already, many digital applications aim to drill deeper into the subliminal or the unconscious aspects of users’ behavior and gather data on their health and physiology. It is no longer science fiction to envision spyware that might use covert access to these data about our biological or cognitive systems to monitor and even manipulate a victim’s behavior and overall well-being.

RESTRAINING ORDERS
For nearly a decade, the mercenary spyware industry has been able to expand its reach across the globe largely without regulation or accountability. But that is a choice governments have made, not an inevitable outcome that must simply be accepted. As civil society watchdogs and journalists have brought to light flagrant abuses, it has become more difficult for major spyware vendors and government clients to hide their operations. In Europe and the United States, committees have held hearings on spyware, and government agencies have begun to develop new policies to limit its use. Notably, the U.S. Commerce Department has placed NSO Group, Candiru, and other hack-for-hire firms on an export restriction list, limiting their access to U.S. products and technology and sending a strong signal to potential investors that spyware companies are under growing scrutiny. Technology platforms have also taken action. Meta (the parent company of Facebook) and Apple have sued NSO Group in U.S. courts, notified victims of spyware infections, and worked to support civil society watchdogs. Apple has also donated $10 million to cybersurveillance research and has pledged to do likewise with any damages awarded from its lawsuit against NSO Group.

But curbing the global spread of mercenary spyware will require a comprehensive approach. To begin with, companies need to devote far more resources to identifying and rooting out spyware and ensuring that their services are properly secured against exploitation. WhatsApp and Apple have already shown how to alert victims when spyware is detected and hold spyware vendors such as NSO Group legally responsible for violations of their terms of service and other legal offenses. Whether through a shift in business culture, or more likely through stronger government regulations, technology platforms should also put more emphasis on security and scale back the relentless quest to vacuum up user data. In turn, the forensic investigations of the Citizen Lab, Amnesty International, journalists, and others will need to be broadened and supplemented by other organizations doing similar work, whether at NGOs, universities, or investigative news organizations. Digital forensic science and digital accountability should be recognized as a formal research discipline that can monitor spyware activity, assist victims and targets, and keep pressure on governments and corporations to be more transparent and accountable for their actions. For such a field to emerge, many years of public, private, and philanthropic support will be needed.

Oliva at the office of GatoEncerrado, an investigative news outlet, in San Salvador, El Salvador, January 2022
Oliva at the office of GatoEncerrado, an investigative news outlet, in San Salvador, El Salvador, January 2022
Jessica Orellana / Reuters
Ultimately, governments themselves will need to adopt a robust regulatory framework for spyware use. Regulating the industry will likely require the enactment of a complex set of rules that address various aspects of the spyware market. For example, domestic-based spyware companies could be required to make regular public disclosures about their exports, and, in turn, government agencies could be required to report from whom and where they are importing spyware. Export rules need to be strengthened to prevent the sale of spyware to governments or other clients that are likely to use them in violation of international human rights law. Clear rules and standards of oversight for the use of spyware are also necessary. Specific legislation addressing the zero-day market will likely also be needed, although it will have to be carefully crafted so that legitimate security research is not hindered. Governments could also pass legislation giving victims of spyware the right to sue both foreign governments and spyware vendors for harms caused by espionage.

Such efforts could be reinforced at an international level through the development of a global spyware control regime. Military activities, for example, have long been subject to international oversight through such mechanisms as the UN’s Register of Conventional Arms and the policies that have been put in place relating to standards for private military and security contractors or the banning of land mines. A similar process could lead to the international regulation of spyware, including requirements for transparency and reporting about its use. These existing models, however, suggest that success will require the buy-in of a significant number of countries, and more pressure is needed to persuade governments and world leaders that mercenary spyware poses a serious and growing threat to international security and the liberal international order.

No doubt, authoritarian governments and security agencies that currently benefit from spyware will seek to obstruct such regulation, but the growing risks to national security of an unregulated market may prompt a more sober assessment. In November 2022, Sir Jeremy Fleming, a top British intelligence official, warned that the proliferating use of mercenary spyware and “hackers for hire” by countries and malefactors “will increase the future threat to UK cybersecurity.” Should the use of mercenary spyware continue to grow unchecked, the risks for democracy will become acute. If elites in any country can use this technology to neutralize legitimate political opposition on any point on earth, silence dissent through targeted espionage, undermine independent journalism, and erode public accountability with impunity, then the values on which the liberal international order is built may soon be no more secure than the passwords on our phones.
Title: 2015: Some interesting discussion of NSA trying to outsource 4A violations
Post by: Crafty_Dog on December 17, 2022, 01:15:37 PM
https://www.eff.org/deeplinks/2015/08/was-nsa-trying-outsource-responsibilty-its-fourth-amendment-violations?fbclid=IwAR0Kba4Ht7uvDaEsS_r51dDY64bnwVjZaUfPaJKYgKcYLDeBB7jbvGmWS88

Was the NSA Trying to Outsource Responsibility for Its Fourth Amendment Violations?
LEGAL ANALYSIS BY CINDY COHNAUGUST 16, 2015
We're still sifting through the documents released as part of the recent bombshells in the press discussing AT&T's "extreme willingness to help" the NSA in its mass spying programs. One area where the new documents add detail is the division of labor between AT&T and the NSA—according to the New York Times, at times "telecoms have done the sifting and forwarded messages the government believes it may legally collect." To some, including Lawfare's Timothy Edgar, this new information somewhat contradicts claims that critics have been making for years that the NSA has direct access to all the data transiting the Internet backbone. We disagree that this is what the documents actually show: for instance there's the SSO Unilateral tap shown on page 39 of the slides that has the NSA tapping right into the backbone cables.

Regardless, we do agree with Mr. Edgar that the reason this story is important is because the government continues to try to kill litigation like EFF's Jewel v. NSA on behalf of AT&T's customers by claiming that the involvement of AT&T is a state secret. Edgar notes, "the government bears much blame, as it continues to maintain the pretense such banal facts can or should be kept secret. Perhaps there could be a new marking – “still officially classified but blindingly obvious” – to cover situations like this."

But even if AT&T is doing some of the surveillance itself and handing what if finds over to the government, it doesn't absolve the NSA of legal responsibility for the surveillance acts done by AT&T.

First some law: the Fourth Amendment applies whenever a "private party acts as an ‘instrument or agent’ of the government." This rule is clear. In the Ninth Circuit, where our Jewel v. NSA case against mass spying is pending, it has been held to apply when an employee opens someone's package being shipped in order to obtain a DEA reward (US v. Walther), when a hotel employee conducts a search while the police watch (US v. Reed), and when an airline conducts a search under a program designed by the FAA (United States v. Davis), among others.

The concept behind this rule is straightforward: the government cannot simply outsource its seizures and searches to a private party and thereby avoid protecting our constitutional rights.  It seems that the NSA may have been trying to do just that. But it won't work.

Saturday's stories about AT&T's cozy relationship with the NSA confirm that, for purposes of tapping into the Internet backbone, AT&T was acting as the agent of the government. For its part, AT&T denied that it engaged in any surveillance voluntarily, noting: "We do not voluntarily provide information to any investigating authorities other than if a person's life is in danger and time is of the essence."  So AT&T is certainly not claiming that it acted on its own agenda. This is consistent with the funding numbers -- $188 million in 2011 and $232 million in 2010 (page 26 of the NYT release).

As the legal cases cited above explain, this means that the Fourth Amendment violations caused by the surveillance rest with the NSA regardless of who actually did the technical work of spying. The slides disclosed by the New York Times make this very clear, showing that the NSA viewed these structures as a coherent whole. For instance, while the Fairview (aka AT&T) Dataflow Diagrams on pages 47-53 of the NYT release indicate that some of the spying was "partner controlled" (marked in orange) and some "NSA controlled" (marked in yellow), both pieces are part of the NSA's overall collection and analysis schemes:



The slides even helpfully explain why in a bullet point on page 5:




We're not sure what the "legal authorities" reference means, but to the extent the NSA thought it could escape responsibility by getting AT&T to do its dirty work, that's a dodge that has been tried before. And it won't work.
Title: Jordan Peterson
Post by: Crafty_Dog on December 18, 2022, 06:56:01 AM


https://www.youtube.com/watch?v=xAPjGljGVxw&t=1s
Title: Deep Fakes
Post by: Crafty_Dog on December 21, 2022, 06:38:51 PM
https://www.youtube.com/watch?v=WQwMFx0rSW8

This man and I move in the same circles.  Army background. He regularly appears on survival TV shows as an expert and has a martial arts school up the road from me. 
Title: Tik Tok Surveillance State
Post by: Crafty_Dog on December 22, 2022, 09:10:35 AM

https://techcrunch.com/2021/06/03/tiktok-just-gave-itself-permission-to-collect-biometric-data-on-u-s-users-including-faceprints-and-voiceprints/

https://www.boredpanda.com/tik-tok-reverse-engineered-data-information-collecting/?utm_source=search.brave&utm_medium=referral&utm_campaign=organic
Title: Surveillance via your phone
Post by: Crafty_Dog on December 24, 2022, 08:39:10 AM
Recommended by Frankie McRae

https://www.youtube.com/watch?v=FNesDitYqnY
Title: Fog Data Science selling mass surveillance to police
Post by: Crafty_Dog on December 26, 2022, 09:00:18 AM

https://www.eff.org/deeplinks/2022/08/inside-fog-data-science-secretive-company-selling-mass-surveillance-local-police

Inside Fog Data Science, the Secretive Company Selling Mass Surveillance to Local Police
BY BENNETT CYPHERSAUGUST 31, 2022
An animated image showing location pins dropping onto a street map from above, tracing several paths
This article is part of EFF’s investigation of location data brokers and Fog Data Science. Be sure to check out our issue page on Location Data Brokers.

A data broker has been selling raw location data about individual people to federal, state, and local law enforcement agencies, EFF has learned. This personal data isn’t gathered from cell phone towers or tech giants like Google — it’s obtained by the broker via thousands of different apps on Android and iOS app stores as part of the larger location data marketplace.

The company, Fog Data Science, has claimed in marketing materials that it has “billions” of data points about “over 250 million” devices and that its data can be used to learn about where its subjects work, live, and associate. Fog sells access to this data via a web application, called Fog Reveal, that lets customers point and click to access detailed histories of regular people’s lives. This panoptic surveillance apparatus is offered to state highway patrols, local police departments, and county sheriffs across the country for less than $10,000 per year.

The records received by EFF indicate that Fog has past or ongoing contractual relationships with at least 18 local, state, and federal law enforcement clients; several other agencies took advantage of free trials of Fog’s service. EFF learned about Fog after filing more than 100 public records requests over several months for documents pertaining to government relationships with location data brokers. EFF also shared these records with The Associated Press.

Troublingly, those records show that Fog and some law enforcement did not believe Fog’s surveillance implicated people’s Fourth Amendment rights and required authorities to get a warrant.

In this post, we use public records to describe how Fog’s service works, where its data comes from, who is behind the company, and why the service threatens people’s privacy and safety. In a subsequent post, we will dive deeper into how it is used by law enforcement around the country and explore the legal issues with its business model.

How does the service work?
In materials provided to law enforcement, Fog states that it has access to a “near real-time” database of billions of geolocation signals derived from smartphones. It sells subscriptions to a service, which the company usually billed as “Fog Reveal,” that lets law enforcement look up location data in its database through a website. The smartphone signals in Fog’s database include latitude, longitude, timestamp, and a device ID. The company can access historical data reaching back to at least June 2017.

Fog’s materials describe how users can run two different queries:

“Area searches”: This feature allows law enforcement to draw one or more shapes on a map and specify a time range they would like to search. The service will show a list of all cell-phone location signals (including location, time, and device ID) within the specified area(s) during that time. The records EFF obtained do not say how large an area Fog’s Area searches are capable of covering with a single query.
“Device searches”: Law enforcement can specify one or more devices they’ve identified and a time range, and Fog Reveal will return a list of location signals associated with each device. Fog’s materials describe this capability as providing a person’s “pattern of life,” which allows authorities to identify “bed downs,” presumably meaning where people sleep, and “other locations of interest.” In other words, Fog’s service allows police to track people’s movements over long periods of time.
Fog Reveal is typically licensed for a year at a time, and records show that over time the company has charged police agencies between $6,000 - $9,000 a year. That basic service tier typically includes 100 queries per month, though Fog sells additional monthly query allocations for an additional fee. For example, in 2019, the California Highway Patrol paid $7,500 for a year of access to Reveal plus $2,400 for 500 more queries per month.

Fog states that it does not collect personally identifying information (for example, names or email addresses). But Fog allows police to track the location of a device over long stretches of time — several months with a single query — and Fog touts the use of its service for “pattern of life” analyses that reveal where the device owner sleeps, works, studies, worships, and associates. This can tie an “anonymous” device to a specific, named individual.

Together, the “area search” and the “device search” functions allow surveillance that is both broad and specific. An area search can be used to gather device IDs for everyone in an area, and device searches can be used to learn where those people live and work. As a result, using Fog Reveal, police can execute searches that are functionally equivalent to the geofence warrants that are commonly served to Google.

This service could be used to determine who was near the scene of a violent crime around the time it was committed. It also could be used to search for visitors to a Planned Parenthood or an immigration law office on a specific day or everyone who attended a protest against police violence.


Image from Fog’s marketing brochure, sent to North Dakota and Chino, CA, which appears to show a single location signal as viewed with Fog’s service.

The basics of Fog’s services are laid out in a marketing brochure which was sent to several prospective customers. The brochure explains that Fog’s “unique, proprietary and patented data platform” processes data from “hundreds of millions of mobile devices” and can deliver “both forensic and predictive analytics and near real-time insights on the daily movements of the people identified with those mobile devices[.]” The materials state that Fog’s collection of people’s location data is “100% Opt-in. All users opt-in to location data collection,” though as we will discuss later, this claim is hard to take at face value.

At the core of Fog’s pitch is a series of claims about the breadth and depth of its location data. It claims to process over 250 million devices per month within the United States. (There are an estimated 301 million mobile devices nationally). According to Fog, these devices generate 15 billion signals per day, or over 5 trillion per year.

 


Excerpt from Fog’s marketing brochure describing the properties of its dataset

EFF could not verify Fog’s claims. But there is reason to be skeptical: Thanks to the nature of its data sources, it’s likely that Fog can only access location data from users while they have apps open, or from a subset of users who have granted background location access to certain third-party apps. Public records indicate that some devices average several hundred pings per day in the dataset, while others are seen just a few times a day. Users who do not install many third-party apps, or who have opted out of tracking via Apple’s App Tracking Transparency (ATT), may not be present in the dataset at all.

Additionally, the records EFF reviewed show that several of the agencies that worked with Fog have since canceled their subscriptions, and at least one said they were not sure if they ever used Fog to successfully solve a case. Those potential shortcomings are not a reason to underestimate Fog’s invasiveness or its capability for unfettered dragnet monitoring. But it’s important to understand its limits. Fog's data may be patchy and incomplete, with data about some people some of the time. But if we take Fog’s claims at face value, it would mean that the company collects the location data of a majority of people in the United States on a monthly basis. This means Fog may have limits in its ability to locate any given person at a specific moment in time. But Fog’s service may still be capable of identifying a significant portion of the hundreds of attendees at a protest or other sensitive location.



The brochure gives some insight into how Fog intends for its service to be used. It lists a series of “use cases” from the dramatic (“Human Trafficking,” “Terrorism Investigations,” “Counter-Intelligence”) to the more mundane (“Drug Investigations,” “Soft Target Protection”). It seems to be aimed at both local law enforcement and at intelligence/homeland security agencies.

The language used in the document often invokes terms used by intelligence agencies. For example, a core advertised feature is the ability to run a “pattern of life analysis,” which is what intelligence analysts call a profile of an individual’s habits based on long-term behavioral data. Fog Reveal is also “ideal for tipping and cueing,” which means using low-resolution, dragnet surveillance to decide where to perform more targeted, high-resolution monitoring. The brochure also includes a screenshot of Fog Reveal being used to monitor “a location at the US/Mexico border,” and an alternate version of the brochure listed “Border Security/Tracking” as a possible use case. As we will discuss in our next post, records show that Fog has worked with multiple DHS-affiliated fusion centers, where local and federal law enforcement agencies share resources and data.

In other materials, Fog emphasizes the convenience of its service. An email titled “Solve crimes faster: Here’s how” reads:

Find strong leads at your desk in minutes. Just type in a location, date and time, then watch app signals disclose what mobile devices were present at the crime scene. We’d love to help your department save time and money too. Let’s schedule a 10-minute demo next week.

Fog’s Reveal customers are given direct access to raw location data, which can be exported from the web portal into portable formats for processing elsewhere. Fog emphasizes that its license permits “processing, analysis, and sub-licensing of location data,” potentially allowing law enforcement to share the data with private contractors. Fog routinely encouraged law enforcement agencies to share one license among multiple users, and some customers used Fog to run queries on behalf of other law enforcement agencies on request.



Fog claims that it only sells its Reveal service to law enforcement agencies. But Fog’s materials also advertise “out-sourced analytic services” for non law enforcement customers, including “private sector security clients.” An email exchange between Fog and Iowa police appears to corroborate this policy: Fog says it will not grant private companies direct access to its database, but it will perform analysis on behalf of “law firms and investigative firms.” According to a brochure, this analysis may include:

Verifiable presence at a location on a specific date and time
Likely locations for residences, places of business and frequent activities
Links to other individuals, places and devices
Patterns of activity correlating to certain events, times or alibis
In other words, Fog advertises that it can use its data to surveil the private lives of individuals on behalf of private companies. The records EFF has obtained do not provide any details about specific relationships Fog has with any private-sector clients.

Where does the data come from?
The kind of data that Fog sells to law enforcement originates from third-party apps on smartphones. Apps that have permission to collect a user’s location can share that data with third-party advertisers or data brokers in exchange for extra ad revenue or direct payouts. Downstream, data brokers collect data from many different apps, then link the different data streams to individual devices using advertising identifiers. Data brokers often sell to other data brokers, obfuscating the sources of their data and the terms on which it was collected. Eventually, huge quantities of data can end up in the hands of actors with the power of state violence: police, intelligence agencies, and the military.

Over the past few years, journalists have uncovered several links between private brokers of app-derived location data and the US government. Babel Street, best known for its open-source intelligence (OSINT) tools for analyzing social media and the like, sells location data as part of a secret add-on service called “Locate X.” Venntel, a subsidiary of marketing data company Gravy Analytics, has sold raw location data to several different US agencies, including ICE, Customs and Border Protection (CBP), and the FBI. And broker X-Mode paid app developers around 3 cents per user per month for access to location data, then sold it directly to defense contractors.

Enter Fog Data Science. Like the other companies, Fog buys data from the private market and packages it for use by law enforcement. Unlike most others, Fog seems to target smaller agencies. Venntel has sold a year’s worth of data to the Department of Homeland Security for more than $650,000; meanwhile, Fog sold its service to the sheriff of Washington County, OH, for $9,000 a year. While Venntel, Babel Street, and Anomaly 6 have made headlines for dealings with three-letter federal agencies, public records show that Fog appears to have targeted its business at local, regional, and state law enforcement. That is, Fog sells its services to police agencies that most Americans are far more likely to interact with than federal law enforcement. The records received by EFF confirm past or ongoing contractual relationships with at least 18 state and local law enforcement clients; several other agencies took advantage of free trials of Fog’s service. Notes from one agency’s meeting with Fog state that the company works with “50-60” agencies nationwide.

So where, exactly, does Fog’s data come from? The short answer is that we don’t know for sure. Several records explain that Fog’s data is sourced from apps on smart phones and tied to mobile advertising identifiers, and one agency relayed that Fog gathers data from “over 700 apps.” Fog officials have referred to a single “data provider” in emails and messages within Fog Reveal. One such message explained that the data provider “works with multiple sources to ensure adequate worldwide coverage,” and that a “newly added source” was causing technical issues.

But when asked about which apps or companies originate its data, Fog has demurred. Some answers implied that Fog itself might not know. In July 2020, Mark Massop responded to a point-blank question from the Chino police that “Our data provider protects the sources of data that they purchase from.” Massop did say that at least two sources were not included in Fog’s dataset: Twitter and Facebook. Separately, a Santa Clara County attorney wrote that Fog gets information from “lots of smaller apps,” but not Google or Facebook.

Another document, shared in 2019 with the city of Anaheim, CA, says that Fog’s portal uses “unstructured geo-spatial data emanating from open apps (Starbucks, Waze, etc.)” It’s unclear whether this means that Fog actually receives data from the apps listed, or whether Starbucks and Waze are simply examples of “open apps” that could be sharing data. On Android, both Starbucks and Waze (which is owned by Google) have access to location permissions, and both apps use third-party advertising or analytics services. Waze was also mentioned in a presentation about Fog’s capabilities to the Greensboro, NC police, according to Davin Hall, a former data analyst for the department interviewed by EFF. Per Hall, “Waze got brought up a lot” in the context of apps that could share data with Fog. “It got mentioned because it was a common one for people to have up while they were driving around, so it would be pinging regularly so that you could see the movement of the device actively,” he said.

The document further claims that Fog’s competitors all buy their data from a single source, and that Fog has a unique and privileged relationship as an “associate” of that source.

[The use of app-based location data] for Law Enforcement and Intelligence Analysis purposes is limited to only a few carriers. Currently, these carriers purchase their source of data from an associate company of FOG Data Science. As non-associates, they are charged a much higher premium to purchase the data, thereby forcing higher prices for their products. […]

Additionally, [FOG’s] direct access to, and association with, the database vendor allows it to offer low prices both per seat license and per additional query.

This implies that Fog’s data provider was, to its knowledge, the sole upstream source of app-based location data for all law enforcement and intelligence clients.

Links to Venntel
Other documents suggest that the “associate company” referenced in the Anaheim document — and the source of Fog’s data — is Venntel, perhaps the largest seller of location data to the government.

The most direct link comes from an email exchange with the Iowa Department of Public Safety. In response to an Iowa intelligence analyst’s question about Fog’s data, a Fog representative said it would ask “our data partner” for assistance. Fog then forwarded the question (including a device identifier) to a representative of Venntel, who sent back a series of screenshots illustrating how the analyst should interpret the data.

There are other links between Fog and Venntel.

The marketing materials provided by Fog to multiple law enforcement agencies are nearly identical to material that Venntel provided to DHS, according to records obtained by ACLU. The style, much of the language, and several of the graphics appear to be identical. It even appears that both companies use the same screenshot of a location in Santa Teresa, NM to illustrate their capabilities. Furthermore, both companies make identical claims about their data coverage, including that they analyze “location signals from 250 million mobile devices in the U.S.” and “15+ billion daily location signals.” These claims could be evidence that both companies have access to the same dataset.

Other records connect the two companies as well. One of the first records EFF received was a version of Fog’s Software License Agreement (SLA) from the Missouri State Highway Patrol. A piece of text in the header—edited to be hidden in the final document, but not deleted—reads “Venntel Analytics, Inc. Event Data Licensing Agreement.” .

Finally, our investigation into the code hosted at fogreveal.com turned up several literal links to Venntel. Many different URLs with the word “Venntel” in their path are referenced in the code. For example, when a Reveal user performs any geofenced device query, that query is submitted by sending a request to the url path “/Venntel/GetLocationData.”

This collection of evidence suggests that Venntel is Fog’s “associate,” that is, the source of its data. This conclusion would be consistent with Fog’s claim that its “associate” was the only source of data for other law-enforcement-facing location data brokers. Previous reporting has revealed that Venntel supplies data to other brokers, including Babel Street, which sells location data to the government through its secret “Locate X” service.



EFF has redacted this screenshot to remove potentially identifiable information.

Records released to EFF also give us new information about how Venntel works. The screenshots appear to be taken from Venntel’s own web-based portal. It has previously been reported that Venntel lets users search for devices in a specific area, then perform deep dives on specific devices. This functionality parallels Fog Reveal’s “area search” and “device search” capabilities. To our knowledge, this is the first time the public has been able to see what Venntel’s user interface looks like. The interface is similar to Fog’s, though the visual style is slightly different. Venntel’s interface also appears to display more information than Fog’s does, including an IP address associated with each signal. You can read more about how Fog Reveal likely operates in our deep dive into its code.

Consent and Identifiability
In marketing materials and emails, Fog has reassured prospective customers that its data is “100% opt-in” and that “no PII [personally-identifiable information] is ever collected.” But records obtained by EFF and the nature of precise, individualized location data shows that the data is incredibly personal and can easily identify people.

First, Fog’s assertion that the people in its database have “opted in” rests on a legal fiction of consent that EFF, courts, and members of Congress have repeatedly criticized because it fails to adequately protect people’s privacy. Modern smartphones require user consent before allowing certain kinds of data, including location, to be shared with apps. However, phones do very little to limit how the data is used after that permission is obtained. As a result, every permission is an all-or-nothing proposition: when you let a weather app access your location in order to see a five-day forecast, you may also give it the ability to sell, share, and use that data for whatever other purposes it chooses. In the United States, often the only legal limits on an app’s use of data are those it places on itself in a privacy policy. And these policies can be written so vaguely and permissively that there are, functionally, no limits at all.

In other words, even if a user consents to an app collecting location data, it is highly unlikely that they consent to that data winding up in Fog’s hands and being used for law enforcement surveillance.

Fog’s second claim, that its data contains no personally identifying information, is hard to square with common understandings of the identifiability of location data as well as with records showing Fog’s role in identifying individuals.

Location data is understood to be “personally identifying” under many privacy laws. The Colorado Privacy Act specifically defines “identified individuals” as people who can be identified by reference to “specific geolocation data.” The California Privacy Rights Act considers “precise geolocation data” associated with a device to be “sensitive personal information,” which is given heightened protections over other kinds of personal information. These definitions exist because location data traces can often be tied back to individuals even in the absence of other PII. Academic researchers have shown over and over again that de-identified or “anonymized” location data still poses privacy risks.

Fog’s data can allow police to determine where a person sleeps, works, or worships; where they go to get lunch, or health care, or to unwind on a Friday night. Tying a location trace to a real identity is often more of a mild inconvenience than a serious barrier to police. Fog’s own literature clarifies this: in a PowerPoint presentation shared with Chino, CA, it explains, “While there is no Pll data provided, the ability to identify a location based on a device's signal strength can provide potential identifications when combined with other data that agencies have access to.” After attending a meeting with Fog representatives, a St. Louis County officer summarized: “There is no PI linked to the [device ID]. (But, if we are good at what we do, we should be able to figure out the owner).”

Furthermore, Fog’s data is directly tied to “hashed” advertising identifiers, and multiple records show how Fog has helped its customers use “device searches” to track devices with specific ad IDs. A phone’s ad ID is available to anyone with access to the device, and ad IDs shared widely among app developers, advertising companies, and data brokers of all stripes. Once an agency has access to a target’s ad ID, they can use Fog to search for a detailed history of that person’s movement.

Emails between Fog and the California Highway Patrol indicate that Fog did not believe the Carpenter v. U.S. decision—which held that law enforcement need a warrant to access cell site location information (CSLI)—applied to their service, and therefore no warrant was required to access the app-based location data that Fog sells. But as we have discussed, Fog’s data is acquired and sold without meaningful consent and can frequently be used to track individuals just as effectively as CSLI. We discuss the legal issues with Fog and what we know about how agencies have treated the law in a subsequent post.

A perfect storm
The market for app-derived location data is massive. Dozens of companies actively buy and sell this data with assistance from thousands more. Many of them put raw data up for sale on the open market. And at least a handful of companies sell this kind of data to the federal government. Despite this, Fog Data Science is the only company EFF is aware of that sells individualized location data to state and local law enforcement in the United States.

Fog’s product represents a direct and uniquely modern threat to our privacy. Its business is only possible because of a cascade of decisions by tech platforms, app developers, lawmakers, and judges, all of whom have failed to adequately protect regular users. Apple and Google have designed their mobile operating systems to support third-party tracking, giving brokers like Fog essential tools like the ad identifier. Thousands of app developers have monetized their software by installing invasive tracking code on behalf of data brokers and ad tech. Congress has repeatedly failed to pass even basic privacy protections, allowing a multibillion dollar data broker industry to operate in the open. And courts have failed to clarify that a person’s Fourth Amendment rights aren’t diminished just because they’re carrying a smartphone that can transmit their location to apps and data brokers.

Fog Reveal can be used to harm vulnerable people and suppress civil liberties. Fog’s area searches can let police perform dragnet surveillance on attendees of peaceful protests, religious services, or political rallies. Some of Fog’s customers already have a history of doing so by other means: an investigation by ACLU revealed how California Highway Patrol used helicopters with high-tech surveillance cameras to capture zoomed-in video of attendees at peaceful demonstrations against police violence.

Fog’s service is especially dangerous in the wake of the Supreme Court’s Dobbs decision. Many states have criminalized abortion, giving state and local police license to unleash their surveillance powers against people seeking reproductive healthcare as well as the professionals that provide it. Fog Reveal lets an officer sitting at a desk draw geofences around abortion clinics anywhere in the world, then track all devices seen visiting them.

Finally, Fog’s service is ripe for abuse. The records we received indicated that some agencies required warrants to use Fog in some circumstances but did not show that law enforcement placed any limits on individual officers’ use of the technology, nor that they conducted routine oversight or auditing. It is possible that officers with access to Fog Reveal could misuse it for personal ends, just like some have misused other investigative tools in the past. In June, news broke that a US Marshal is being charged for allegedly using a different geolocation surveillance service in 2018 that was then sold by a prison payphone company — Securus — to track “people he had personal relationships with as well as their spouses.” (The US Marshals have previously contracted with Fog as well.) It’s possible that officers could similarly misuse Fog to surveil people they know.

How to protect yourself
The good news, if any, is that it is relatively straightforward to protect yourself from Fog’s surveillance. Fog relies on data gathered by code embedded in third-party apps. That means you can cut off its supply by revoking location permissions to any apps that you do not completely trust. Furthermore, turning off location services at the operating system level should prevent Fog and other app-based data brokers from accessing your location data at all. (This does not always prevent location data from being gathered by other actors, like your cellular carrier. You can read more about avoiding a range of threats to privacy in one of EFF’s Surveillance Self-Defense guides.)

There is no evidence that Google Maps, Apple, or Facebook provide data to Fog, and emails from Fog representatives and its customers state that Fog does not gather data from Google or Facebook. While there are other reasons to restrict Google’s access to your location, it does not appear as though data shared exclusively with one of these map providers will end up in Fog’s database.

Finally, evidence suggests that Fog’s service relies on using advertising identifiers to link data together, so simply disabling your ad ID may stymie Fog’s attempts to track you. One email suggests that Apple’s App Tracking Transparency initiative — which made ad ID access opt-in and resulted in a drastic decrease in the number of devices sharing that information — made services like Fog less useful to law enforcement. And former police analyst Davin Hall told EFF that the company wanted to keep its existence secret so that more people would leave their ad IDs enabled.

You can reset or disable your ad ID by following the instructions here.

Fog and its customers have spent years trying to remain in the shadows. Its service cannot function properly otherwise. Exposed to the light of day, Fog’s product becomes clear: an all-seeing eye that invades millions of Americans’ privacy without warrant or accountability.

Read more about Fog Data Science:

Press release: Data Broker Helps Police See Everywhere You’ve Been with the Click of a Mouse: EFF Investigation
What is Fog Data Science? Why is the Surveillance Company so Dangerous?
How Law Enforcement Around the Country Buys Cell Phone Location Data Wholesale
Fog Revealed: A Guided Tour of How Cops Can Browse Your Location Data
Fog Data Science Puts our Fourth Amendment Rights up for Sale
How Ad Tech Became Cop Spy Tech
 
Title: Kill Switches mandated on cars by 2026
Post by: Crafty_Dog on January 11, 2023, 07:59:11 AM
https://www.theepochtimes.com/mkt_app/biden-signs-law-putting-kill-switches-in-cars-update-on-brunson-case_4972738.html?utm_source=Morningbrief&src_src=Morningbrief&utm_campaign=mb-2023-01-11&src_cmp=mb-2023-01-11&utm_medium=email&est=M21dxCuYYRq9LbmBR1JEPY2N2cprxRq0%2B%2Bz9%2Bmokp2hYJ0XCjBvcEBnaCBUFDZ%2FZFzhU
Title: more on kill switches
Post by: ccp on January 11, 2023, 08:04:58 AM
https://www.yahoo.com/now/law-install-kill-switches-cars-170000930.html

 :x
Title: Re: Kill Switches mandated on cars by 2026
Post by: DougMacG on January 11, 2023, 08:21:24 AM
Buy the best car you can find made before cars connected to the internet, and keep it!

It started with gallons per flush and incandescent light bulbs, seat belts and helmes.  Some good ideas.  Some bad.    They decide where you can live.  They can shut off your air conditioner, your furnace and now your car. 

If they have their way and it looks like they will, we will be the last generation to have private automobiles.

When is it that people (mainstream Biden Democrat voters) will say they've had enough?
Title: Re: The Surveillance State
Post by: Crafty_Dog on January 11, 2023, 02:34:02 PM
"Buy the best car you can find made before cars connected to the internet, and keep it!"
Title: GPF: What to expect as states begin enforcing data privacy laws
Post by: Crafty_Dog on January 20, 2023, 07:24:38 AM
What to Expect as U.S. States Begin Enforcing Data Privacy Laws
7 MIN READJan 19, 2023 | 18:28 GMT


Five U.S. states will begin enforcing new EU-styled data privacy laws in 2023, which will create more stringent data requirements for companies operating in these states, posing financial and reputational risks for companies that fail to comply. California, Colorado, Connecticut, Utah and Virginia are all slated to enact changes to their data privacy legislation later in the year and two of these states have already made the changes effective as of Jan. 1. These new laws integrate a number of modifications based on the European Union's General Data Protection Regulation (GDPR), a legal framework that pursues a ''rights-based approach'' to data protection and is arguably the most stringent data privacy legal framework in the world. These newly enacted and proposed state laws incorporate broader definitions for personally identifiable information (PII), stricter requirements regarding data collection and processing and certain oversight assessments to ensure improved data security practices.

The European Union's GDPR is a legal framework that upholds data privacy protections for EU member states and citizens. It was first implemented in May 2018 and represents the most stringent data laws in the world, requiring extensive controls around how EU citizens' data is collected, processed and stored. The GDPR upholds seven basic principles surrounding personal data protection, including transparency, minimization, confidentiality and various data rights, including accessibility, erasure, rectification and portability.

The California Privacy Rights Act (CPRA), which was first passed in November 2020 and became effective Jan. 1, amended past California legislation to create a number of individual rights modeled after the GDPR, including expanding employers' requirements for practices including data collection, data storage, data usage and data sharing. The new legislation also expands definitions for different types of PII that employers can collect and requires these employers to ensure that collected data upholds citizens' rights, including that their data is up to date, accurate and can be deleted upon their request.

The Virginia Consumer Data Privacy Act (VCDPA), which was first passed in March 2021 and also became effective Jan. 1, follows closely in line with these other states' expanded data rights modeled on the GDPR. The new legislation was altered to omit the right to data erasure, but allows users to opt out of certain data processing practices if they choose.

The Colorado Privacy Act (CPA), which was first passed in July 2021 and will become effective July 1, will also create expanded rights for individual data protection akin to the GDPR, including requiring certain data security provisions for vendors.

The Connecticut Data Privacy Act (CDPA), which was first passed in May 2022 and will become effective July 1, will bolster a number of GDPR-modeled individual rights with an emphasis on data minimization, security and assessments for high-risk processing (defined as data processing that involves new technologies or AI, genetic or biometric data, large scale processing, or combinations of data from different data sources).

The Utah Consumer Privacy Act (UCPA), which was first passed in March 2022 and will become effective Dec. 31, will similarly require GDPR-styled individual rights and data security and contract provisions, but will not expressly require risk assessments.

The push by these states to enhance data protection is in response to the U.S. federal government's lack of a comprehensive federal data privacy law and continued allegations of data misuse by U.S. corporations. While there are some federal data laws pertaining to specific sectors and critical infrastructure, the U.S. government does not have a comprehensive federal data privacy law, despite various efforts by lawmakers to reach a bipartisan consensus on a legal framework. In the absence of a federal mandate, U.S. states have been responsible for their own data laws and the vast majority of U.S. states similarly do not have a comprehensive data privacy legal framework. It was only in 2018 that California set the precedent with the California Consumer Privacy Act (CCPA), which California's new CPRA has recently amended and on which these other states' based their own new legislation. The lack of clear data regulation requirements in the United States has historically given companies excessive leeway in their data collection practices, a trend that also contributed to recent efforts by some U.S. states to enforce better data protections for their citizens. In the last year alone, a number of state governments sued U.S. companies, alleging various examples of misusing data or implementing insufficient data protection measures for their clients and users.

In February 2022, Texas Attorney General Ken Paxton filed a lawsuit against Facebook's parent company, Meta, over allegations that the tech company was collecting Texans' facial recognition information without their informed consent. Later, in October 2022, Paxton's office filed another privacy lawsuit against Google, accusing the company of similarly collecting Texans' facial and voice recognition information without their explicit consent. Both lawsuits remain ongoing.

In November 2022, Google agreed to a record $391.5 million privacy settlement with 40 U.S. states under the charge that the company misled users into thinking they had turned off location tracking in their settings even while Google continued to collect data from them. The settlement was the largest internet privacy settlement by U.S. states and will also require Google to make its location tracking disclosures clearer in 2023.

More U.S. states will likely also pursue revised legislation to bolster data protection practices, expanding compliance requirements for companies operating in these states and potentially exposing companies to heightened legal, regulatory and compliance risks. Legislatures in several U.S. states — including Michigan, New Jersey, Ohio and Pennsylvania — are also considering data privacy bills that were all first proposed in either 2021 or 2022. While such efforts will likely bolster data protection practices in the long term, they will also probably pose significant legal, regulatory and compliance challenges to companies operating in those states. The many domestic and foreign companies that operate across various U.S. states will likely struggle to keep up with the varying timelines and data privacy provisions of each state law. The laws that California, Colorado, Connecticut, Utah and Virginia will begin enforcing in 2023 — along with those being considered in Michigan, New Jersey, Ohio and Pennsylvania — are all relatively consistent in their approach to incorporating GDPR-styled language. Some, however, include certain nuances based on local political will that will further complicate compliance efforts. Many companies, especially smaller companies or those with fewer resources, may inadvertently expose themselves to financial and reputational risks if they are fined or penalized by these states for violating the new legislation. Additionally, many of these states' new data privacy laws pertain to only certain organizations exceeding specific thresholds, making it all the more difficult for companies to discern their legal and regulatory obligations.
Bipartisan support in Congress for either a federal data breach notification law or a framework similar to the GDPR will likely also increase over the next year amid growing concerns about malicious cyber activity targeting databases in both the public and private sectors. Importantly, however, continued divides between Democrats and Republicans in Washington, along with political infighting on both sides of the aisle, will likely impede such efforts to pass or enact national data privacy policies in the short term. As a whole, the shifting regulatory landscape for data protection in the United States will create an additional layer of complexity for companies in their data compliance efforts throughout 2023.

Some of these states' new legal provisions (including those that address data processing), only apply to certain companies that reach preset thresholds, such as processing the data of a certain number of residents. Because of these specificities, smaller companies may not be impacted. But the nuance of each state's requirements will nevertheless require a high level of awareness by all companies operating in these states.

Some states altered language in their bills on the basis of state-level pushback. For example, in 2022, Virginia tweaked its VCDPA bill to replace the ''right-to-delete'' with the right to opt out of certain processing. While this is only a slight variation from other states' provisions, such small differences will still create more legal headaches and compliance challenges for companies.
Title: Are your thoughts and opinions government approved?
Post by: G M on January 30, 2023, 01:43:49 PM
https://ace.mu.nu/archives/402960.php
Title: Re: The Surveillance State
Post by: Crafty_Dog on January 30, 2023, 02:47:36 PM
That point about the British making themselves useful as a cut out is well worth noting.   

Isn't that pretty much what they did when having Steele provide the infamous dossier?
Title: Re: The Surveillance State
Post by: G M on January 30, 2023, 03:02:03 PM
That point about the British making themselves useful as a cut out is well worth noting.   

Isn't that pretty much what they did when having Steele provide the infamous dossier?

That’s definitely part of it. You have zero legal protections from being surveilled by the other 5 eyes nations.
Title: WSJ: What is this? Russia?
Post by: Crafty_Dog on February 05, 2023, 01:17:01 PM
Encryption Bans . . . What Is This, Russia?
Many in the U.S., U.K. and Australia would like to force companies like mine to add backdoors giving access to both law enforcement and hackers.
By Andrew Milich
Feb. 3, 2023 1:43 pm ET


My company is on the front lines of the battle for online privacy. On Wednesday the Russian government blocked Skiff, a private email service I built with my co-founder Jason Ginsberg, because our product allowed ordinary people to express themselves freely online. Skiff has since seen an 81% drop in traffic from Russia, and our engineers are scrambling to find ways to restore access to those who rely on us to keep their emails private.

This type of behavior is not surprising from authoritarian regimes. But what we at Skiff worry about most is not despots tightening their grip on the internet in their countries. We worry that the U.S., European Union and Australia—all of which claim to protect privacy and free expression—are trying to do the same thing.

End-to-end encryption makes it impossible for messaging apps such as WhatsApp and Signal to share users’ messages with law enforcement, leading some to argue that encryption hinders criminal investigations.

This argument has landed on sympathetic ears in Congress. The Lawful Access to Encrypted Data Act was introduced in the Senate in 2020 to force tech companies such as Signal, WhatsApp and Skiff to make user information decryptable so it can be shared with law enforcement. The bill failed to gain traction and hasn’t been reintroduced. Similarly, an EU proposal would create a new agency to scan messaging apps for illicit content, undermining end-to-end encryption. The Australian government recently passed a law banning end-to-end encryption, and the U.K. Parliament hopes to pass similar legislation. Banning strong encryption would force companies like mine to hobble their security protocols by adding backdoors that would be exploited.


Advocates for these laws overstate the potential threats that encryption poses and forget its critical security benefits. Law enforcement has found ways to investigate crimes even without backdoor access to encrypted messages. For example, Azimuth Security, a small Australian hacking firm, helped the FBI unlock an iPhone used by a terrorist in the 2015 San Bernardino shooting.

Most important, there is no way to use strong encryption while making data accessible only to some third parties. Any backdoor for law enforcement would also be exploited by bad actors. Banning or undermining encryption protocols would make network traffic, private messages, encrypted emails, and digital voice or video calls vulnerable to surveillance, interception and misuse.

Ironically, the same products targeted by proposed encryption bans have become ubiquitous in the national-security community. The Senate approved Signal for staff use in 2017, and British soldiers have been encouraged to use the app.

If the U.S., EU and others follow Russia’s playbook, Americans and their allies will no longer be able to send encrypted messages without fearing that government officials, companies, advertisers or criminals will take a peek.

The U.S. government can do better than Russia. Encrypted communications undergird freedom and national security. It is time to reject these bans as anti-freedom, anti-American, and better left to Vladimir Putin.

Mr. Milich is CEO of Skiff.

Title: Re: WSJ: What is this? Russia?
Post by: G M on February 05, 2023, 01:20:34 PM
This is post-coup Amerika. The American Republic is dead.


Encryption Bans . . . What Is This, Russia?
Many in the U.S., U.K. and Australia would like to force companies like mine to add backdoors giving access to both law enforcement and hackers.
By Andrew Milich
Feb. 3, 2023 1:43 pm ET


My company is on the front lines of the battle for online privacy. On Wednesday the Russian government blocked Skiff, a private email service I built with my co-founder Jason Ginsberg, because our product allowed ordinary people to express themselves freely online. Skiff has since seen an 81% drop in traffic from Russia, and our engineers are scrambling to find ways to restore access to those who rely on us to keep their emails private.

This type of behavior is not surprising from authoritarian regimes. But what we at Skiff worry about most is not despots tightening their grip on the internet in their countries. We worry that the U.S., European Union and Australia—all of which claim to protect privacy and free expression—are trying to do the same thing.

End-to-end encryption makes it impossible for messaging apps such as WhatsApp and Signal to share users’ messages with law enforcement, leading some to argue that encryption hinders criminal investigations.

This argument has landed on sympathetic ears in Congress. The Lawful Access to Encrypted Data Act was introduced in the Senate in 2020 to force tech companies such as Signal, WhatsApp and Skiff to make user information decryptable so it can be shared with law enforcement. The bill failed to gain traction and hasn’t been reintroduced. Similarly, an EU proposal would create a new agency to scan messaging apps for illicit content, undermining end-to-end encryption. The Australian government recently passed a law banning end-to-end encryption, and the U.K. Parliament hopes to pass similar legislation. Banning strong encryption would force companies like mine to hobble their security protocols by adding backdoors that would be exploited.


Advocates for these laws overstate the potential threats that encryption poses and forget its critical security benefits. Law enforcement has found ways to investigate crimes even without backdoor access to encrypted messages. For example, Azimuth Security, a small Australian hacking firm, helped the FBI unlock an iPhone used by a terrorist in the 2015 San Bernardino shooting.

Most important, there is no way to use strong encryption while making data accessible only to some third parties. Any backdoor for law enforcement would also be exploited by bad actors. Banning or undermining encryption protocols would make network traffic, private messages, encrypted emails, and digital voice or video calls vulnerable to surveillance, interception and misuse.

Ironically, the same products targeted by proposed encryption bans have become ubiquitous in the national-security community. The Senate approved Signal for staff use in 2017, and British soldiers have been encouraged to use the app.

If the U.S., EU and others follow Russia’s playbook, Americans and their allies will no longer be able to send encrypted messages without fearing that government officials, companies, advertisers or criminals will take a peek.

The U.S. government can do better than Russia. Encrypted communications undergird freedom and national security. It is time to reject these bans as anti-freedom, anti-American, and better left to Vladimir Putin.

Mr. Milich is CEO of Skiff.
Title: Re: The Surveillance State
Post by: Crafty_Dog on February 05, 2023, 04:03:29 PM
Well, we're still talking shit and talking the American Creed here!
Title: Re: The Surveillance State
Post by: G M on February 05, 2023, 04:12:47 PM
Well, we're still talking shit and talking the American Creed here!

For now. They have plans for us.
Title: Re: The Surveillance State
Post by: Crafty_Dog on February 05, 2023, 04:24:38 PM
Indeed, but until they shut us down the coup has not solidified and we continue to live by and fight for our American Creed.
Title: Re: The Surveillance State
Post by: G M on February 05, 2023, 04:55:29 PM
Indeed, but until they shut us down the coup has not solidified and we continue to live by and fight for our American Creed.

https://westernrifleshooters.us/wp-content/uploads/2022/12/74qwmg.jpg

(https://westernrifleshooters.us/wp-content/uploads/2022/12/74qwmg.jpg)
Title: Re: The Surveillance State
Post by: DougMacG on February 06, 2023, 02:40:48 AM
https://thehill.com/opinion/judiciary/3843751-congress-is-set-to-expose-what-may-be-the-largest-censorship-system-in-u-s-history/
Title: US testing balloons to monitor "homeland security threats" and drug trafficking
Post by: ccp on February 06, 2023, 06:02:52 AM
if Doug's post is not alarming enough
here is even more outrage :

https://www.theguardian.com/us-news/2019/aug/02/pentagon-balloons-surveillance-midwest



Title: Re: US testing balloons to monitor "homeland security treats" and drug trafficking
Post by: G M on February 06, 2023, 06:16:45 AM
if Doug's post is not alarming enough
here is even more outrage :

https://www.theguardian.com/us-news/2019/aug/02/pentagon-balloons-surveillance-midwest

Look up "Gorgon Stare".
Title: gorgon stare
Post by: ccp on February 06, 2023, 06:35:44 AM
https://en.wikipedia.org/wiki/Gorgon_Stare

and Gorgon :
https://en.wikipedia.org/wiki/Gorgon

similar to cameras everywhere in NYC
just on wider scale

Title: Welcome to the financial surveillance grid!
Post by: G M on March 17, 2023, 10:00:10 AM
https://media.gab.com/system/media_attachments/files/132/239/328/original/38b3356bab443cf3.png

(https://media.gab.com/system/media_attachments/files/132/239/328/original/38b3356bab443cf3.png)
Title: Re: The Surveillance State
Post by: Crafty_Dog on March 17, 2023, 01:15:01 PM
Spreading that around!
Title: CDC buys cell phone data
Post by: ccp on March 17, 2023, 01:18:36 PM
https://notthebee.com/article/cdc-bought-access-to-at-least-55-million-americans-phone-location-data-to-monitor-lockdown-compliance

I am trying to figure this out
2000 mules cell phone pings was called BS

but yet this cell phone was bought and paid for by - the CDC -

the medical profession is turned into a political propaganda tool .  :cry:
Title: Re: The Surveillance State
Post by: Crafty_Dog on March 17, 2023, 01:33:17 PM
 :-o :-o :-o
Title: The Surveillance State and Big Tech
Post by: G M on March 23, 2023, 06:23:25 AM
https://threadreaderapp.com/thread/977559925680467968.html
Title: Facial recognition in Russia
Post by: Crafty_Dog on April 03, 2023, 10:52:36 AM

https://www.reuters.com/investigates/special-report/ukraine-crisis-russia-detentions/?fbclid=IwAR03HfXQn0vK-7MOh3ZobbRg9oVXVK0E0H3vYiGNIa7vf1TRD51nfD_6SNI

Facial recognition is helping Putin curb dissent with the aid of U.S. tech
Anti-war activist Andrey Chernyshov (right) photographs the moment of his detention in Moscow last year.

A Reuters review of more than 2,000 court cases shows how Russia uses facial recognition to identify and sweep up the Kremlin's opponents.

By LENA MASRI Filed March 28, 2023, 10 a.m. GMT
Andrey Chernyshov had just entered a Moscow metro station on his way to an anti-war protest last May, when police officers stopped him, informed him he was on a wanted list and, without further explanation, escorted him to a police office inside the station.

There officers told the 51-year-old bank employee that the metro’s facial recognition system had flagged him for detention because of his political activism. A little over a week earlier Chernyshov stood alone by a fountain in central Moscow’s Pushkin Square and held up a home-made poster that said “Peace to Ukraine,” “No War” and “Freedom for Russia.”

Released without charge after a few hours, Chernyshov was detained again later the same day as he travelled home. This time he was questioned about his views on the war in Ukraine and President Vladimir Putin. A man in plain clothes identified himself as an official from Russia’s Centre for Combating Extremism, known by Russians as Centre E, and advised Chernyshov to refrain from joining future demonstrations because he had a young child to care for.

“I took his words as a threat,” said Chernyshov, who has a 5-year-old son.

Chernyshov spent seven hours with police that day.

And that wasn’t the end of it. Police detained Chernyshov again in the metro in June, August and September, and they twice visited his home to warn him against protesting. In June, he had defied authorities by handing out badges to passers-by that read “No to War” and “Russia will be free.”

Russian authorities did not respond to questions from Reuters about Chernyshov’s brushes with law enforcement.


Activist Andrey Chernyshov provided this photograph in which he is seen holding  up an anti-war poster in Moscow’s Pushkin Square on May 1, 2022.

Shortly afterwards, police are seen leading Chernyshov away.
​​It’s no secret that the Russian government uses facial recognition to keep an eye on citizens. In 2017, the city of Moscow announced the launch of one of the world’s largest facial recognition video surveillance networks. In a news release at the time, Moscow’s Department of Information Technologies said 160,000 cameras across the city - more than 3,000 of them connected to the facial recognition system - would help law enforcement.

Now a Reuters review of more than 2,000 court cases shows these cameras have played an important role in the arrests of hundreds of protesters. Most of these people were detained in 2021 after they joined anti-government demonstrations, court records show. But after Russia invaded Ukraine in February 2022, authorities began using facial recognition to prevent people from protesting in the first place, according to interviews with more than two dozen detainees and information gathered by a Russian monitoring group. Facial recognition is now helping police to identify and sweep up the Kremlin’s opponents as a preventive measure, whenever they choose.

“It’s a new practice, which is being used to chilling effect, especially in Moscow where protests have been the largest and where people know that they are being watched by facial recognition cameras,” said Daria Korolenko, a lawyer with OVD-Info, an independent human rights group that monitors repression in Russia.

Western technology has aided the crackdown. The facial recognition system in Moscow is powered by algorithms produced by one Belarusian company and three Russian firms. At least three of the companies have used chips from U.S. firms Nvidia Corp or Intel Corp in conjunction with their algorithms, Reuters found. There is no suggestion that Nvidia or Intel have breached sanctions.

Video: Under surveillance
Reuters also found that the Russian and Belarusian companies participated in a U.S. facial-recognition test program, aimed at evaluating emerging technologies and run by an offshoot of the Department of Commerce. One of the firms received $40,000 in prize money awarded by an arm of U.S. intelligence.

Approached for comment, Nvidia and Intel said they halted all shipments to Russia in March 2022 after the United States tightened export restrictions. They added that they can’t always know how their products are used.

A spokesperson for Commerce’s National Institute of Standards and Technology said participation in its assessments is not a seal of approval. The Intelligence Advanced Research Projects Activity, which awarded the prizes, said challenges are for “market analysis” and “IARPA has no access to or role in an organisation’s continued development of a technology after the close of a prize challenge.”

Surveillance cameras are just one piece of the Russian government’s campaign to suppress opposition to the war, according to OVD-Info and more than a dozen activists interviewed by Reuters. It is illegal to engage in "public actions aimed at discrediting the use of the armed forces of the Russian Federation" and to deliberately and publicly spread false information about the Russian armed forces. Such actions are punishable by fines and prison sentences ranging from three to 15 years.




Chernyshov is among at least 141 people who were detained preventively in 2022, according to data collected by OVD-Info. They were stopped in the metro on national holidays, when authorities were expecting protests, or at other times when anti-war sentiment was running high, for example after Russia announced a mass draft of men into the military in September.

Reuters interviewed 29 people who were stopped by police in Moscow metro stations. All but one said they understood from officers that they were flagged for detention by facial recognition. At least 14 said officials referred to a system called Sfera, or Sphere. Moscow’s department for transportation stated in a December 2022 news release that its Sfera video analytics system uses VisionLabs technology. Reuters couldn’t determine which other products underpin Sfera.

Those detained included students, pensioners, a scientist, an academic researcher and a courier. Some were commuting to or from work. One man was going to the theatre with his wife and children. A woman was taking her mother to a doctor’s appointment. All had one thing in common - they were critical of the Kremlin. Most had previously joined anti-government protests.

These people said they were held at a metro station or police station for periods ranging from 10 minutes to 18 hours. Seven told Reuters that police informed them they were picked up to stop them protesting. At least 12 said that before their release they signed a document: either promising not to protest or acknowledging they had received a warning against protesting. None was charged with any offence.

The Kremlin referred detailed questions for this article to the Moscow mayor’s office which did not respond. Russia’s Interior Ministry, which oversees law enforcement, also did not respond to questions sent via the Kremlin.

Lightning speed

The Moscow metro uses facial recognition as part of its fare payment system as well as for security. Passengers are photographed as they walk through the gates and a computer algorithm compares the face to a pictures database. If the system flags a passenger for detention, police respond within seconds or minutes, according to the 29 people who were detained in this way. Alexander Zharov, a 32-year-old civil rights activist, recorded the moment of his detention on his cellphone in August last year and shared the footage with Reuters.

Facial recognition technology uses artificial intelligence algorithms to analyse and identify faces. The Moscow metro has deployed algorithms from three Russian companies, according to a 2021 news release on the city of Moscow’s website. These firms are Tevian, an artificial intelligence company founded by staff at Moscow State University; NtechLab, which from 2018 was part-owned by Russian defence firm Rostec State Corp; and VisionLabs, owned by Russia’s largest mobile operator, MTS, and headquartered in the Netherlands.

A screen in a Moscow metro train broadcasts Russian President Vladimir Putin's New Year address on December 31, 2022. REUTERS/Shamil Zhumatov
VisionLabs’ executive Anton Nazarkin told Reuters the company provides facial recognition to Moscow via a third party, which he declined to name. He said VisionLabs’ algorithm has been used in Moscow’s facial recognition system since it was rolled out across the capital during the 2018 FIFA World Cup, which Russia hosted, and is also used in the metro’s voluntary Face Pay payment system. Nazarkin said he was not aware of the company’s technology being used in other ways in the metro. MTS did not respond to a request for comment.

An NtechLab spokesperson said that as of 2022, the Moscow metro no longer uses the firm’s technology. He declined to go into detail about its wider deployment in the capital, citing a non-disclosure agreement. He noted, however, that software is independently managed by the customer.

Tevian did not respond to requests for comment.

Contracts published in 2022 on Russia’s state tender website provide further technical details about the capital’s facial recognition system. They show Moscow uses VisionLabs’ Luna Platform, NtechLab’s FindFace and Tevian’s FaceSDK, as well as facial recognition software called Kipod, made by Synesis, a Belarusian company. Synesis is under American, EU and British sanctions for its role in suppressing pro-democracy movements in Belarus and Russia. Synesis has rejected the sanctions as “unfounded.” It didn’t comment for this article.

To speed image-matching, NtechLab and VisionLabs have turned to U.S. technology. Both firms have used graphics processing units (GPUs) made by Santa Clara, California-based Nvidia, according to Nvidia’s website. GPUs are powerful chips originally designed to improve image rendering in video games.

RELATED CONTENT


A Russian graveyard reveals Wagner’s prisoner army


Abandoned Russian base holds secrets of retreat in Ukraine


How Russia spread a secret web of agents across Ukraine

Nazarkin, the VisionLabs executive, told Reuters that Nvidia GPUs are the “industry standard” for training a facial recognition system to accurately identify images. “Pretty much any company out there that is doing any kind of AI application is utilising Nvidia GPUs,” said Nazarkin in a phone interview from Moscow.

In a statement to Reuters, Nvidia said it halted sales to Russia in March 2022 after the U.S. imposed extensive export controls and sanctions but cannot track every downstream use of its products. A spokesperson said Nvidia had a brief engagement with VisionLabs and NtechLab that concluded before February 2022.

Russian customs records show that at least 129 shipments of Nvidia products reached Russia via third parties between April 1 and Oct. 31, 2022, however. Records for at least 57 of these shipments stated that they contained GPUs. In response to these findings, the spokesperson said, “We comply with all applicable laws, and insist our customers do the same. If we learn that any Nvidia customer has violated U.S. export laws and shipped our products to Russia, we will cease doing business with them.”

“I realised that I needed to leave Russia as quickly as I could”

Andrey Chernyshov
Facial recognition algorithms also run on high-speed central processing units (CPUs), the chips that provide the processing power a computer needs to complete its tasks.

A document that appeared on Intel’s website as recently as October last year said Synesis, the Belarusian firm, tested Intel technology in 2019 and was using Intel CPUs to improve the performance of its Kipod platform “for law enforcement.”

The European Union and Britain sanctioned Synesis in December 2020, saying Kipod was used to track and repress civil-society and pro-democracy activists in Belarus. Synesis has called the assertions “absurd.” After Russia’s invasion of Ukraine in February 2022, the U.S. Department of the Treasury announced it too was sanctioning Synesis because Russian and Belarusian authorities were using the firm’s video surveillance system to persecute protesters.

Intel told Reuters that its sales in Russia for over a decade have been through distributors that are required to comply with U.S. export controls. It said it suspended all shipments to customers in Russia and Belarus after Russia’s invasion of Ukraine. Reuters has previously reported that at least $457 million worth of Intel products arrived in Russia between April 1 and Oct. 31, 2022, according to Russian customs records. “We take reports of continued availability of our products seriously and we are looking into the matter,” an Intel spokesperson said.


U.S. technology leads the field in image matching. Nvidia Corporation says it halted sales to Russia in March last year. REUTERS/Tyrone Siu
Rights in peril

To be sure, the Russian and Belarusian companies began using Western technology before the latest export restrictions were imposed. But as far back as 2009, Intel joined the United Nations Global Compact that says companies should not be complicit in human rights violations. Nvidia joined the compact in 2022. In its human rights policy, Nvidia says it endorses the United Nations Guiding Principles on Business and Human Rights, which require companies to mitigate the risk that their products could be used for rights abuses. Intel’s human rights policy also says it embodies the U.N. principles.

In response to Reuters findings, seven lawyers said the use of facial recognition against protesters and activists in Moscow likely constitutes human rights violations.

Klara Polackova Van der Ploeg, head of the Business, Trade and Human Rights Unit at the University of Nottingham’s Human Rights Law Centre, said, “An appropriate process for those companies would be to know who their business partners are, learn how their products are used, and exercise leverage to prevent their technology from being utilised in violations of human rights.” Intel and Nvidia declined to comment on this point.

The Russian and Belarusian firms have previously had some contact with U.S. government agencies. All have taken part in facial recognition tests by the National Institute of Standards and Technology (NIST), an agency of the U.S. Department of Commerce, documents show. In 2017, NtechLab received two prizes worth a total of $25,000 in a facial recognition contest organised and funded by Intelligence Advanced Research Projects Activity (IARPA), an arm of the Office of the Director of National Intelligence, which oversees the U.S. intelligence community. Two years later, NtechLab won a $15,000 second-place prize in another IARPA technology challenge.


Activist Andrey Chernyshov said this photo, which he provided, was taken after an unidentified man sprayed paint on his face on Sept. 18, 2022.

Chernyshov also shared this photo of the anti-Putin T-shirt he was wearing when attacked.
“Participation in the assessment does not indicate NIST approval of the business or other practices of any participant,” NIST told Reuters in an email. An IARPA spokesperson said its work requires it to maintain awareness of the world’s leading innovations and that awards do not signal government endorsement.

The CEOs and founders of VisionLabs, NtechLab and Tevian are now on a list of people who jailed Russian opposition leader Alexei Navalny’s Anti-Corruption Foundation believes should be sanctioned. The foundation points to the companies’ involvement in Moscow’s video surveillance system, which it says is used to persecute political activists. The companies did not respond to questions about their inclusion on the list.

Under observation

The preventive detentions, coupled with other pressure from police, so upended the lives of some of its targets, they say they felt driven to leave Russia.

Luba Krutenko, a 32-year-old architect who was in police sights because of two prior arrests for protesting, said police showed up at her home seven or eight times in March and April last year. In early March, they came three times in two days.

“They were just giving me warnings, documents saying that I shouldn’t go to rallies and if I go, a criminal case could be opened,” she said.

She stopped answering the door to avoid the encounters. Then they began to call her.

Anti-war protesters clashed with police in September after Putin announced that reservists would be called up to fight in Ukraine. REUTERS
During a phone call in April, a police officer told her they knew she was home. “They told me they can check the footage from the cameras by the entrance to my building and know if I’m inside,” she said. She showed Reuters screenshots of several missed calls from police and of a text message informing her that they were standing outside her home.

She stopped answering the phone and went on vacation in the town of Onega in northern Russia. When she got back to Moscow, on May 6, police were waiting for her on the platform as she exited the train.

“They knew what carriage I was in because they waited right outside it,” she said. Krutenko showed Reuters a video of the encounter. Police asked her to sign a document warning her against protesting. Krutenko shared a copy of the signed document and said she signed six such documents during different encounters with the police last year.

The next encounter came three days later, just after she entered a Moscow metro station on Russia’s Victory Day. Two police officers approached, asked her to show her ID and informed her that the security camera by the metro’s payment gate had recognised her. They told her she was on a wanted list and escorted her to a police point in the metro station. After about 40 minutes, two more officers arrived and told her she was being detained and would be taken to the police station. One of the officers carried a machine gun, she said.




At the police station, she demanded an explanation for her detention. She told one officer they were violating her rights. “I was angry. I told her ‘you’re keeping me here. This is my weekend. I have plans with friends’.” Krutenko said the officer replied that people like her have no rights and called her a traitor. Another police officer told her that they were detaining her because an anti-war protest was planned in the city centre that day and that they had a list of would-be protesters – including her – whom they were trying to prevent from attending.

She was allowed to leave after about three hours, with another warning that she would risk jail if she was charged again with protesting.

“Because police are present in your life all the time, it makes it unpredictable,” she said, describing the repeated encounters. “You think you can be detained at any time.”

The surveillance and risk of detention made her decide to leave Russia in September. She now lives in Bonn, Germany, where she is in the process of completing an integration course.


Sergei Pinchuk, an opponent of Russia’s war in Ukraine, says he moved to Seattle in fear of arrest. He is now seeking asylum in the United States. REUTERS/Matt Mills McKnight
On May 9, the same day Krutenko was detained, a police officer approached Sergei Pinchuk, a 27-year-old courier, seconds after he entered the Moscow metro. Pinchuk, who wore blue and yellow, the colours of the Ukrainian flag, that day, said police had a handheld electronic device with about 10 photos of him, all seemingly taken by metro security cameras on different dates.

At a nearby police station, a detective pushed him into the wall, grabbed him by the neck and called him names, he said.

A month prior, Pinchuk had stood alone in front of the Kremlin building holding a sign with the words ‘353 Criminal Code of Russia. Stop Putin,’ referencing a Russian law that says waging an aggressive war is punishable by up to 20 years in prison. The detective asked about this. “He said ‘why did you do that? It’s a hard time for our country’,” said Pinchuk, who had been arrested, charged and fined for the protest. The detective also threatened to jail him for years and create problems for his family, he said.

In mid-August, Pinchuk and his friend climbed a cell tower in his town Naro-Fominsk, southwest of Moscow, and placed a Ukrainian flag at the top. The next day, while Pinchuk was visiting his parents, his brother called and informed him that police had stopped by Pinchuk’s home and were looking for him. A few hours later, Pinchuk was at the airport, catching the first flight he could find to Tbilisi, Georgia. Later police called his mother and texted his friends asking where he was. He decided to relocate to the United States where he said he felt safer. He now lives in Seattle and is seeking asylum.


Sergei Pinchuk shared this photo of his one-man protest in Moscow in August 2021. The sign makes reference to jailed opposition leader Alexei Navalny. It reads: “Putin fears Navalny, free elections and the people.”
Chernyshov, the protester detained twice on the same day, left Russia and is in Minneapolis with his wife and son. He decided to leave after police again detained him in the metro on Sept. 1 on his way to work. He said they kept him handcuffed in a cell overnight and tased him with a stun gun when he asked them to loosen or remove the cuffs. They didn’t allow him to drink or use the bathroom and kept the lights on all night, he said. The next morning, they released him without charge. Chernyshov provided Reuters with photos of several of his detentions and protests.

More than two weeks later, he said, as he was about to get into his car to return home from the gym, a hooded man sprayed paint on his face. The paint stung his eyes and left marks on his face. After the incident, he received an anonymous letter threatening to harm or jail him if he didn’t stop expressing his political views. The letter contained a photo of the attack.

“So I realised that I needed to leave Russia as quickly as I could,” he said.
Title: end of AM radio
Post by: ccp on May 14, 2023, 03:26:32 PM
AM radio

of course the home of conservative talk shows

! how simply convenient!!! just a coincidence !!!

https://www.msn.com/en-us/news/us/end-of-a-love-affair-am-radio-is-being-removed-from-many-cars/ar-AA1b8VO1

 :x
Title: Re: The Surveillance State
Post by: ccp on May 14, 2023, 03:29:57 PM
additionally
it may not be easy to switch to FM

the spectrum I thought is controlled and owned
and bid out by FCC

can FM spectrum even be available for those from AM?

 :x
Title: The Surveillance State stockpiling dirt on us
Post by: G M on June 14, 2023, 10:44:33 PM
https://www.zerohedge.com/technology/nightmare-scenario-us-government-has-been-secretly-stockpiling-dirt-americans-data
Title: Sharyl Attkisson vs the Surveillance State
Post by: Crafty_Dog on June 17, 2023, 09:10:29 AM
HT:  GM

=============

https://sharylattkisson.com/2023/06/new-read-my-affidavit-in-government-computer-intrusion-case/
Title: It's not your military anymore
Post by: G M on June 20, 2023, 07:13:00 AM
https://www.breitbart.com/tech/2023/06/19/your-tax-dollars-at-work-military-monitors-social-media-for-mean-posts-about-generals/
Title: Federal Disinfo Bureaus
Post by: Crafty_Dog on June 21, 2023, 05:47:38 AM
https://www.gatestoneinstitute.org/19745/federal-disinformation-bureaus
Title: DHS domestic intel program
Post by: Crafty_Dog on July 02, 2023, 07:06:45 AM
https://www.politico.com/news/2023/03/06/dhs-domestic-intelligence-program-00085544

HT GM
Title: The normalization of post-american tyranny
Post by: G M on July 02, 2023, 09:38:01 AM
https://campusreform.org/article?id=23518

Title: Ruling against Fed-Goolag collusion
Post by: Crafty_Dog on July 04, 2023, 01:50:08 PM
https://www.theepochtimes.com/judge-delivers-major-blow-to-biden-admin-in-social-media-censorship-case_5373891.html?utm_source=News&src_src=News&utm_campaign=rtbreaking-2023-07-04-1&src_cmp=rtbreaking-2023-07-04-1&utm_medium=email&est=DbENSGDaSXqu0cRgQCOdZ52dUYYAp0rQDhQupk8D2QN2ZILpc7WCywqYRRqHKE0aWK2%2B
Title: Re: The Surveillance State
Post by: ccp on July 04, 2023, 02:51:52 PM
of course this gets pointed out and will be highlighted:

The judge, a Trump appointee
Title: Re: The Surveillance State
Post by: Crafty_Dog on July 04, 2023, 03:31:41 PM
Thus building support for Trump haha.
Title: Re: The Surveillance State
Post by: ccp on July 04, 2023, 03:50:48 PM
not the point I intended

DeSantis could appoint right of center judges too
that are recommended to him just as easily

My point was how the LEFT tries to discredit any ruling they do not like by labelling it from a  Trump judge
or Conservative judge etc

Of course we do that here too for liberal decisions I suppose .

This is how the ruling gets headlines on Yahoo (DNC) news as of right now:

***Trump-appointed judge blocks Biden officials from contacting social media sites***
Title: Re: The Surveillance State
Post by: Crafty_Dog on July 04, 2023, 07:26:42 PM
"not the point I intended"

I know  :-D
Title: MY: Nobody asked
Post by: Crafty_Dog on July 06, 2023, 05:26:50 PM
https://michaelyon.locals.com/upost/4251945/i-made-a-flight-within-europe-that-was-similar-last-year-during-that-flight-adventure-nobody-aske
Title: AI mass surveillance takes root in another state
Post by: Crafty_Dog on July 07, 2023, 09:02:10 AM
https://resistthemainstream.com/nationwide-ai-mass-surveillance-system-takes-root-in-another-state/?utm_source=newsletter2
Title: Audio Surveillance with Shot Spotter Technology
Post by: Crafty_Dog on July 21, 2023, 08:22:48 AM


https://www.cbsnews.com/sanfrancisco/news/shooting-crime-privacy-tech-oaklands-shotspotter-equipment-records-voice-conversations/
Title: Smarty pants surveillance tech
Post by: Crafty_Dog on September 04, 2023, 10:46:52 AM
https://theintercept.com/2023/09/02/smart-epants-wearable-technology/
Title: Uh oh , , , Spec Ops AI program stalking horse for private sector?
Post by: Crafty_Dog on September 04, 2023, 05:55:56 PM
https://theconservativetreehouse.com/blog/2023/09/01/us-special-operations-command-will-deploy-argus-ai-program-to-scour-social-media-for-disinformation-misinformation-and-malinformation-national-security-authority-to-protect-u-s-internet-from-pain/
Title: Geofence Warrants
Post by: Crafty_Dog on October 06, 2023, 08:43:46 AM
https://www.theguardian.com/technology/2023/oct/03/techscape-geofence-warrants
Title: Kill Switches mandated on cars by 2026
Post by: Crafty_Dog on October 25, 2023, 07:55:21 AM
https://www.youtube.com/watch?v=qjXw56GuIZQ&t=36s
Title: Re: Kill Switches mandated on cars by 2026
Post by: DougMacG on October 25, 2023, 09:58:15 AM
https://www.youtube.com/watch?v=qjXw56GuIZQ&t=36s

That is the path we are on. Don't they already have a kill switch on your air conditioner? Next on your furnace? Gas stove?

Even when we win any election or two, it is a mere pause on our path to totalitarianism.
Title: Geofence warrants
Post by: Crafty_Dog on October 29, 2023, 06:05:04 AM
Just the Facts on ‘Geofencing’
The Intrusive, App-Baed ‘Dragnet’ That Sgt. Joe Friday Never Dreamed Of

By Maggie MacFarland Phillips
October 29, 2023
As worshippers gathered at the Calvary Chapel in 2020, they were being watched from above.

Satellites were locking in on cell phones owned by members of the nondenominational Protestant church in San Jose, Calif. Their location eventually worked its way to a private company, which then sold the information to the government of Santa Clara County. This data, along with observations from enforcement officers on the ground, was used to levy heavy fines against the church for violating COVID-19 restrictions regarding public gatherings.

“Every Sunday,” Calvary’s assistant pastor, Carson Atherly, would later testify, the officers “would serve me a notice of violation during or after church service.”

Calvary is suing the county for its use of location data, a controversial tool increasingly deployed by governments at all levels – notably in relation to the U.S. Capitol riot on Jan. 6, 2021. While enabling law enforcement to more easily identify potential offenders, the practice, called “geofencing,” has also emerged as a cutting-edge privacy issue, raising constitutional issues involving warrantless searches and, with Calvary Chapel, religious liberty.

“We are in the space between the emergence of this technological practice and courts having ruled on its constitutionality,” said Alex Marthews, national chair for Restore the 4th, a nonprofit organization dedicated to the protection of the Fourth Amendment, which protects Americans’ rights against “unreasonable search and seizure.”

“Geofencing” often begins with an innocent click. Smartphone apps ask if they can access location to improve service. When users say they yes, they often don’t realize that the apps that help them drive, cook, or pray are likely reselling their information to far-flung for-profit entities. This and other information detailing people’s behaviors and preferences is valuable for businesses trying to target customers. The global location intelligence market was estimated at $16 billion last year, according to Grand View Research.

While it is legal for private companies to broker this information, constitutional questions arise when government accesses data from a third party that it would be prohibited from collecting on its own. The lawsuit filed by Calvary Chapel argues that Santa Clara County carried out a warrantless surveillance of the church when it acquired information in 2020 on the church’s foot-traffic patterns for analysis by a research team from Stanford University. Court documents show the researchers acquired the information, which originated with Google Maps, from the location data company SafeGraph, which Calvary is also suing.

Geofencing allows users to build a fence around certain areas or points-of-interest such as Calvary Chapel or the area near the Capitol on Jan. 6 and see when people entered that space.

It is becoming routine for law enforcement agencies to use warrants to require companies like Google to hand over location data that may be connected to criminal activity. Rep. Jim Jordan recently wrote a letter to Attorney General Merrick Garland saying, “The use of geofence warrants raises serious Constitutional concerns.” Privacy advocates and a bipartisan group of legislators say that acquisition of such information without a warrant presents a troubling and relatively new constitutional dilemma.

Data brokers, including SafeGraph, insist that their information is anonymized. But it is precisely the lack of specificity that worries critics. “There’s no particular individual who the government is suspicious of,” Adam Schwartz of the Electronic Frontier Foundation, told RealClearInvestigations. “It’s a dragnet.”

Moreover, there is no guarantee that the data collected through geofencing stays anonymous. “It is often very easy to take supposedly de-identified data and re-identify a person,” said Schwartz, “And it’s very, very easy to do that with location data.”

At Calvary Chapel, for example, in-person surveillance conducted by the county, as well as numerous in-person depositions of Chapel members and employees during the previous legal contretemps between the county and the church that began in 2020, would have provided local officials with detailed knowledge of who was on the premises, and when.

In any event, critics say, law enforcement’s use of geofencing – even when it is backed by a warrant – violates the Fourth Amendment.

Geofencing proponents argue that it falls under the “administrative search” exception to the Fourth Amendment, which lets regulatory enforcement personnel conduct warrantless searches when the greater good is at issue (i.e., police sobriety checkpoints, airport TSA scans).

In their complaint, Calvary Chapel attorneys assert that the county is arguing in effect “that, as long as they call it research, any level of government can target and spy on any individual or group at any time for any duration and, if they so choose, they can wield the collected data against said individuals or groups who oppose their orders.”

Pushback is mounting against the sharing of location data. In a 2022 letter to Congress, numerous privacy and civil liberties groups petitioned for committee hearings on a bill called the Fourth Amendment is Not For Sale Act. The bill, which has a companion in the Senate introduced in 2021, would prohibit warrantless government purchases of cell phone location data from third party brokers. It passed unanimously through the House Judiciary Committee, 30-0, this past July, and awaits full review by the House.

This article was adapted from a RealClearInvestigations article published Sept. 26.
Title: NYPD expands drone surveillance bigly
Post by: Crafty_Dog on November 18, 2023, 04:58:42 PM
https://dronexl.co/2023/11/16/nypd-drone-usage-investigation-nyc/
Title: Coming in 2026: Kill switches for cars
Post by: Crafty_Dog on November 19, 2023, 05:59:05 PM
https://cowboystatedaily.com/2023/11/08/house-blocks-hagemans-move-to-end-law-requiring-kill-switches-in-cars/?fbclid=IwAR1enlHcbqx7WkR87GF6dV-mMId-_mY4tchZCwQ2WCUZDrVjqj1OUnyXaaY
Title: FBI backdoor searches
Post by: Crafty_Dog on November 23, 2023, 07:04:59 AM
https://www.techdirt.com/2023/11/21/fbi-director-admits-agency-rarely-has-probable-cause-when-it-performs-backdoor-searches-of-nsa-collections/
Title: The purpose of electric cars
Post by: Crafty_Dog on November 26, 2023, 03:43:43 PM
https://www.instagram.com/p/C0Hzgt6NqxK/?igshid=NTYzOWQzNmJjMA%3D%3D&fbclid=IwAR3GQtAnu9fSx7MXVUhUq0qvQRYWf6PiAeqIZQX-Vz1eEVVgXskoLQz_6x4&img_index=2
Title: NSA appt held hostage for leverage over privacy issues
Post by: Crafty_Dog on December 02, 2023, 11:14:59 AM


https://www.theregister.com/2023/12/02/nsa_held_hostage/
Title: AI enabling a surveillance state from which escape is impossible
Post by: Crafty_Dog on January 10, 2024, 05:55:23 AM


https://endoftheamericandream.com/artificial-intelligence-is-allowing-them-to-construct-a-global-surveillance-prison-from-which-no-escape-is-possible/
Title: Drone helps nab shoplifters
Post by: Crafty_Dog on January 11, 2024, 11:51:33 AM


https://wtop.com/crime/2024/01/watch-montgomery-county-police-drone-helps-nab-2-shoplifting-suspects/
Title: Re: The Surveillance/Omnipotent State
Post by: Crafty_Dog on January 12, 2024, 05:18:02 AM
Pasting this one by BBG here as well; yes it is lefty, but the larger point remains:

https://www.justsecurity.org/90879/advances-in-ai-increase-risks-of-government-social-media-monitoring/?utm_source=rss&utm_medium=rss&utm_campaign=advances-in-ai-increase-risks-of-government-social-media-monitoring
Title: Facial recognition sends wrong man to jail
Post by: Crafty_Dog on January 25, 2024, 06:26:24 AM
https://www.fox26houston.com/news/how-did-facial-recognition-technology-send-the-wrong-man-to-jail-where-he-was-brutally-attacked
Title: Re: The Surveillance/Omnipotent State
Post by: ccp on January 25, 2024, 06:29:22 AM
 :-o
Title: Ring Camera and the Police
Post by: Crafty_Dog on January 25, 2024, 01:32:38 PM
https://apnews.com/article/ring-amazon-camera-police-request-56a128dcd77a4cb0b27d71be9384fe1a
Title: What do Spooks Share with Other Nations & the Impact Thereof
Post by: Body-by-Guinness on January 26, 2024, 09:57:16 PM
I suspect the civilian death concern is something of a red herring—this source is very left leaning and hence embraces a zero collateral damage ethos meant to serve orgs like Hamas that embed themselves among non-combatants—but I am all sorts of down with monitoring outcomes in which US intelligence was used by other countries, particularly that which negatively impacts US citizens:

https://www.justsecurity.org/91451/congress-must-strengthen-oversight-on-intelligence-sharing-and-civilian-harm/?utm_source=rss&utm_medium=rss&utm_campaign=congress-must-strengthen-oversight-on-intelligence-sharing-and-civilian-harm
Title: Re: The Surveillance/Omnipotent State
Post by: Crafty_Dog on January 27, 2024, 03:27:51 AM
Ummm , , , not sure about that.

Congressional oversight means leaking, lots of leaking.   
Title: NSA Fesses Up: Purchases Info Re US Citizens Via Databrokers
Post by: Body-by-Guinness on January 28, 2024, 12:38:35 PM
Likely the least of it, but still progress of sorts:

https://arstechnica.com/tech-policy/2024/01/nsa-finally-admits-to-spying-on-americans-by-purchasing-sensitive-data/
Title: Taibbi: Big Brother via Private Financial Companies
Post by: Crafty_Dog on February 08, 2024, 03:08:18 AM
https://www.zerohedge.com/political/matt-taibbi-warns-financial-big-borther-watching-you
Title: Get the Facts First, then Reform, FISA
Post by: Body-by-Guinness on February 10, 2024, 08:58:53 PM


Memo to Congress: Before Acting on FISA, Get the Full Facts

Cato @ Liberty / by Patrick G. Eddington / February 09, 2024 at 02:33PM

Patrick G. Eddington

If published reports are accurate, House Speaker Mike Johnson (R‑LA) intends to bring some sort of Foreign Intelligence Surveillance Act (FISA) reform bill to the House floor. As it stands now, Section VII of FISA—of which the serially abused Section 702 program is a key part—is set to expire on April 19 unless Congress renews it. Given the multiple legislative meltdowns in the House since the start of the year—the failure to pass aid bills for Ukraine, Israel, and Taiwan that can clear the Senate, as well as the failed impeachment of DHS Secretary Mayorkas—it’s no surprise that the House GOP leadership is looking for any kind of legislative win.

But when Congressional leaders act out of political desperation is usually when bad law gets made, and that’s especially been true of giving executive branch agencies and departments radically expanded surveillance powers in the post‑9/​11 era.

It’s worth remembering that in the fear‐​filled aftermath of al Qaeda’s deadly terrorist attacks on our country, Congress passed the sweeping and also frequently abused PATRIOT Act less than two months after that terrible day—and before the Congressional Joint Inquiry to investigate the attacks had even been constituted, much less issued any report. And as became apparent in the years after its enactment, the Section 215 telephone metadata surveillance component of the PATRIOT Act was both repeatedly abused and ineffectual before it was finally terminated in 2019.

The same was true of the illegal STELLAR WIND mass electronic surveillance program started under George W. Bush’s administration in the days immediately after the September 11, 2011 attacks, as I’ve previously noted in Senate testimony.

Indeed, it was the exposure of that program in December 2005 by the New York Times that led to the creation of the FISA Section 702 program in July 2008. Because executive branch officials made false claims of legality and effectiveness about the PATRIOT Act Section 215 program and STELLAR WIND, Congress should be just as skeptical now about Biden administration claims that previous FISA Section 702 abuses have been curtailed.

Department of Justice (DoJ) officials tout internal FISA Section 702 database query audits as evidence that their reforms are working and that there’s no need for additional congressional legislative reform action on the program. These internal audits are designed to catch potential improper searches of the FISA Section 702 database by FBI personnel. But data related to those audits have only been released in summary form; the underlying audits themselves have never been made public.

Thus, there is at present no way for Congress or the public to judge whether the Administration’s summarized claims of Section 702 compliance and database query audit efficacy are in line with the actual audit findings themselves.

Last June, the Cato Institute filed a Freedom of Information Act (FOIA) request with the DoJ seeking the release of the underlying FISA Section 702 database query audits. This week, after waiting in vain for over eight months for the DoJ to comply, Cato filed a lawsuit in DC federal court to compel the release of the audits.

The fact of the matter is that in light of the past false executive branch claims of legal propriety and operational effectiveness of multiple post‑9/​11 surveillance programs, we’ve learned the hard way that those claims cannot, and should not, be taken at face value. Cato is doing what it can to help Congress do its job, but the House and Senate should themselves demand that those audits be made public before any vote to reauthorize the Section 702 program. Anything less would be a disservice to the voters whose rights they took an oath to protect.

https://www.cato.org/blog/memo-congress-acting-fisa-get-full-facts
Title: 702, Citizen Surveillance, & the ACLU
Post by: Body-by-Guinness on February 26, 2024, 11:54:21 AM
One of the reasons high school and I parted ways prematurely is 'cause I sicced the ACLU on the school (an acquaintance flashed several hundred dollars that a security guard saw and confiscated, reasoning he was going to buy weed with it, which was exactly what he planned to do). Back in those days the ACLU reliably and consistently defended all manner of civil rights, something it seems to have strayed from of late in favor of focussing on rights that serve "Progressive" causes. I'm heartened to see them now joining a second amendment effort or two, and totally agree with their efforts to derail "702" surveillance renewal efforts:

Five Things to Know About NSA Mass Surveillance and the Coming Fight in Congress

Congress must take this opportunity rein in the pervasive government surveillance enabled by Section 702.

Sarah Taitz,
Former National Security Fellow, ACLU

One of the most sweeping surveillance statutes ever enacted by Congress is set to expire at the end of this year — creating an important opportunity to rein in America’s sprawling surveillance state.
Section 702 of the Foreign Intelligence Surveillance Act permits the U.S. government to engage in mass, warrantless surveillance of Americans’ international communications, including phone calls, texts, emails, social media messages, and web browsing. The government claims to be pursuing vaguely defined foreign intelligence “targets,” but its targets need not be spies, terrorists, or criminals. They can be virtually any foreigner abroad: journalists, academic researchers, scientists, or businesspeople. And in the course of this surveillance, the government casts a wide net that ensnares the communications of ordinary Americans on a massive scale — in violation of our constitutional rights.

Stop Mass Warrantless Surveillance: End Section 702

Section 702 of the Foreign Intelligence Surveillance Act allows for blatant abuses of privacy. Tell your representative it must expire.

As Congress debates the reauthorization of Section 702, it’s vital that we tell our representatives in Congress that we want an end to warrantless mass surveillance. Here’s what you need to know to follow the debate and speak up for your right to privacy.

1. The NSA uses Section 702 to conduct at least two large-scale surveillance programs.

The government conducts at least two kinds of surveillance under Section 702:

PRISM: The NSA obtains communications — such as international messages, emails, and internet calls — directly from U.S. tech and social media companies like Facebook, Google, Apple, and Microsoft. The government identifies non-U.S. person accounts it wishes to monitor, and then orders the company to disclose all communications and data to and from those accounts, including communications with U.S. persons.

Upstream: Working with companies like AT&T and Verizon, the NSA intercepts and copies Americans’ international internet communications in bulk as they flow into and out of the United States. The NSA then searches for key terms, such as email addresses or phone numbers, that are associated with its hundreds of thousands of foreign targets. Communications determined to be to and from those targets — as well as those that happen to be bundled with them in transit — are retained in NSA databases for further use and analysis.

Critically, while Section 702 does not allow the NSA to target Americans at the outset, vast quantities of our communications are still searched and amassed in government databases simply because we are in touch with people abroad. And this is the bait-and-switch: Although the law allows surveillance of foreigners abroad for “foreign intelligence” purposes, the FBI routinely exploit this rich source of our information by searching those databases to find and examine the communications of individual Americans for use in domestic investigations.

2. Section 702 surveillance is expanding.

The scale of Section 702 has been growing significantly over time, meaning more and more Americans are caught in this net.

When the government first began releasing statistics, after the Snowden revelations in 2013, it reported having 89,138 targets. By 2021, the government was targeting the communications of a staggering 232,432 individuals, groups, and organizations. Although the government often seeks to portray the surveillance as “targeted” and narrow, the reality is that it takes place on a massive scale.

Indeed, the government reported that in 2011, Section 702 surveillance resulted in the retention of more than 250 million internet communications (a number that does not reflect the far larger quantity of communications whose contents the NSA searched before discarding them). Given the rate at which the number of Section 702 targets is growing, it’s likely that the government today collects over a billion communications under Section 702 each year. But these statistics tell only part of the story. The government has never provided data on the number of Americans who are surveilled under PRISM and Upstream, a number that is surely also increasing. That is a glaring gap in its transparency reports.

3. Section 702 has morphed into a domestic surveillance tool.

Although Congress intended Section 702 to be used for counterterrorism purposes, it’s frequently used today to pursue domestic investigations of all kinds. Both the FBI and CIA have access to some of the raw data produced by this surveillance, and they increasingly use that access to examine the private communications of Americans they are investigating — all without a warrant.

FBI agents routinely run searches looking for information about Americans as part of criminal investigations, including those that have nothing to do with national security. Based on transparency reporting, agents have conducted millions of these U.S. person queries — also known as “backdoor searches” — in recent years. The only limitation on backdoor searches is that they must be “reasonably likely” to retrieve foreign intelligence or evidence of a crime.

The standard for conducting backdoor searches is so low that, without any showing of suspicion, an FBI agent can type in an American’s name, email address, or phone number, and pull up whatever communications the FBI’s Section 702 collection has vacuumed into its databases over the past five years. These searches are a free pass for accessing constitutionally protected communications that would otherwise be off-limits to the FBI, unless it got a warrant.

Evidence that agents have refused to comply with this low bar for conducting searches has piled up. Agents have violated the FBI’s own rules over and over, accessing Americans’ private communications without any legitimate purpose. They have dipped into Section 702 data for information about relatives, potential witnesses and informants, journalists, political commentators, and government officials, including a member of Congress.

4. Section 702 violates our constitutional rights, but the courts have failed to intervene.

The Fourth Amendment guarantees the right to be free from unreasonable searches and seizures. Government agents are required to obtain a warrant to access our emails, online messages, and chats. Large-scale, warrantless surveillance of Americans’ private communications is at odds with this basic constitutional principle.

Section 702 also violates the Constitution by inhibiting freedom of speech and association. The reasonable fear that the U.S. government is spying on communications may deter journalists, lawyers, activists, and others from communicating freely on the Internet. We all have a right to exchange messages with our friends, family, colleagues, and clients abroad without worrying that the government is reading over our shoulder.

Because Section 702 is unconstitutional, the ACLU and others have attempted to challenge it in court. But the courts have failed to protect our constitutional rights. Instead, courts have repeatedly dismissed civil cases challenging Section 702 — citing government claims of secrecy — and have declined to rule on claims in criminal cases that the government’s backdoor searches violate the Fourth Amendment. This year, we brought one of these cases to the Supreme Court, but it refused to consider it.

5. Congress has the power to stop Section 702 surveillance.

Given the courts’ inaction, it is up to Congress to stand up for our rights. Fifteen years ago, Congress enacted Section 702. Members of Congress should not vote to renew this law without fundamental reforms to protect Americans’ privacy.
These reforms should include:

Putting an end to rampant backdoor searches of Americans by requiring agents to obtain a warrant before searching Section 702 databases for an American’s private information.

Narrowing the scope of Section 702 surveillance by imposing stricter rules on who the government can “target,” thereby limiting the number of Americans whose communications are swept up in the course of this spying.
Limiting how long the government can retain information collected under Section 702 and how the NSA shares that information with other agencies.

Ensuring that the government notifies individuals when Section 702 information is used against them in court and provides those individuals with sufficient information to obtain full and fair court review.
Increasing transparency about the number of Americans’ communications searched and collected through Section 702 surveillance.

Beyond reforming Section 702 itself, Congress should also adopt broader safeguards that protect Americans in the face of bulk surveillance and strengthen court oversight when the government engages in spying for intelligence purposes.
Over the next year, the ACLU will be seizing on this moment to press Congress to reclaim our privacy rights. We invite you to join us by sending a message to your representatives now.

https://www.aclu.org/news/national-security/five-things-to-know-about-nsa-mass-surveillance-and-the-coming-fight-in-congress
Title: Tracking President via Secret Service agent's phone
Post by: Crafty_Dog on March 07, 2024, 04:10:54 PM
https://joefriedcpa.substack.com/p/fani-and-the-politics-of-the-ping?r=1qo1e&utm_campaign=post&utm_medium=web&fbclid=IwAR2XNH6XoupA0Z0fgibJjzJUly3VqyHxANOluQJCwQjIP72-lxgZ4P99-_Q&triedRedirect=true
Title: Creating Samizdat in the Digital Gulag
Post by: Body-by-Guinness on March 08, 2024, 10:35:18 AM
Great overview of the evolution of internet info exchange:

America Enters the Samizdat Era
Thanking fellow honorees Dr. Jay Bhattacharya and Miranda Devine, and explaining why an American Samizdat Prize is both great and scary
MATT TAIBBI
MAR 7, 2024

I began studying in Leningrad, in the waning days of the Soviet Union, beginning in the fall of 1989. I was 19 years old, more interested in girls than politics, and thought of life behind the Iron Curtain as more novelty than terror. There was little visible suffering or hardship. The once-mighty Soviet government was already a ghost ship and the closest thing to repression I saw was a farsovshik or black-market dealer shoved into a cop car near my school’s subway station.

Not until much later, after I’d heard years of stories from Russians who’d lived through harder times, did I start to understand the brutal system whose end I got to witness. Parents of friends talked about going on vacations and trying to guess who was the snitch on the “Intourist” bus (the ratio was one party snoop for every four or five travelers), or making sure to be out of earshot of the old lady sitting na lavochke (on the bench outside the apartment building) before sharing a dangerous opinion, or the stress of sharing a kommunalka, or communal apartment, with a politically orthodox family. The bloodiest period of Soviet totalitarianism ended in the fifties, but the habits remained long after, including the advanced system of alternative media that ultimately broke the state: samizdat.

Tonight, along with Stanford’s Dr. Jay Bhattacharya and New York Post reporter Miranda Devine, I’ll be accepting the inaugural Samizdat Prize, given by the RealClear Media Fund. Samizdat is a bit of a play on words, since like a lot of politically oppressive groups the Soviets had a mania for reducing beautiful language to state-acceptable ugly compound words (GosPlan, GULAG, etc.), so in place of GosIzdat (State-Publish, the official publisher) dissidents created Sam- or “Self” Izdat: “Self-Publish.”

Ten years ago PBS did a feature that quoted a Russian radio personality calling Samizdat the “precursor to the Internet.” Sadly this is no longer accurate. Even a decade ago Internet platforms were mechanical wonders brimming with anarchic energy whose ability to transport ideas to millions virally and across borders made episodes like the Arab Spring possible. Governments rightly trembled before the destabilizing potential of tools like Twitter, whose founders as recently as 2012 defiantly insisted they would remain “neutral” on content control, seeing themselves as the “free speech wing of the free speech party.”

As writers like former CIA analyst Martin Gurri began noticing long before the election of Donald Trump, the Internet gave ordinary people access to information in ways that before had never been allowed. The inevitable result was that populations all over the world began to see more clearly the warts of leaders and governments that had previously been covered up, thanks to tight control over the flow of information. It also made communication and organization of dissident movements much easier. We started to see this with Occupy and the Tea Party in the United States, and the aforementioned Arab Spring, but the election of Donald Trump was the Rubicon-crossing event for information overlords.

I had the privilege (misfortune?) of seeing how presidential campaign journalism worked before the Internet took over. Politicians needed the mainstream press to reach high office. Sitting among the traveling press on campaigns of people like John Kerry and Barack Obama, I heard how campaign reporters talked, how they thought of their jobs. They were fiercely protective of their gatekeeping role, which gave them enormous power. If reporters didn’t think a candidate was good enough for them — if he was too “kooky” like Ron Paul, too “elfin” like Dennis Kucinich, or too “lazy” as just a handful of influential reporters decided about Fred Thompson — the “Boys on the Bus” would snort and trade cutting remarks in riffing sessions before and after events. Campaigns would be elevated or die in these moments. I thought it was crazy, and said so in print, which made me a pariah, and I never thought it would end.

Then Trump came along and destroyed the whole system with one stroke, getting elected in spite of the blunt disapproval of media. His single Twitter account allowed him to bypass the press and speak to people directly. When that worked, and similar episodes like Brexit caused panic abroad, governments decided to take the anarchic potential of the Internet and turn it on its head. What was something like the “Self-publish” culture of the Soviet Union suddenly became, as we saw in the Twitter Files, an instrument of surveillance and social control.

Jay, Miranda, and I all share a connection to the same story. When Miranda published her blockbuster New York Post exposé of October 14, 2020, “Smoking-gun email reveals how Hunter Biden introduced Ukrainian businessman to VP dad,” Internet platforms Twitter and Facebook experimented for the first time with disappearing a major political story in the middle of an election year. Not only did both platforms suppress the story, but as I later found in internal correspondence, Twitter used tools previously reserved for child pornography to prevent individuals from sharing the story in direct messages — the digital version of a Cheka agent intercepting that copy of a Solzhenitsyn or Voinovich story before one person could hand it to another.

Meanwhile, when Dr. Bhattacharya conducted an experiment on his own initiative proving that the WHO had massively overstated the infection mortality rate of Covid-19, and later organized against lockdown policies he and many others felt were both ineffective and dangerous, the result was digital suppression — not because he was incorrect, but because his message was politically undesirable. Along with Bari Weiss, one of the first things I saw when Elon Musk opened Twitter’s internal files was a page showing Jay had been placed on a “trends blacklist.” This was just before we discovered that the platforms were in regular contact about content with agents of the American versions of the KGB or NKVD in the Departments of Justice, Homeland Security, State, and Defense, among others.

The Internet, in other words, was being transformed from a system for exchanging forbidden or dissenting ideas, like Samizdat, to a system for imposing top-down control over information and narrative, a GozIzdat. Worse, while the Soviets had to rely on primitive surveillance technologies, like the mandatory registration of typewriters, the Internet offered breathtaking new surveillance capability, allowing authorities to detect thoughtcrime by algorithm and instantaneously disenfranchise those on the wrong side of the information paradigm, stripping them of the ability to raise money or conduct business or communicate at all.

Like Jay and Miranda I’m sure, I’m honored to be chosen for the Samizdat prize, but also a little horrified that such an award is now necessary. People with dissenting ideas will now have to find alternative ways to distribute. As was the case in the Soviet Union, official news will be unpopular in America because the public will know in advance that it is full of untruths and false narratives — but that won’t translate into instant popularity for true reporting or great satire or comedy, because the reach of these things can be artificially suppressed.

We’re going to need to find new ways of getting the truth to each other, and it’s not clear yet how those networks will work, if they will at all. It may come down to handing each other mimeographed papers in subway tunnels, as they did in Soviet times. We haven’t built that informational underground yet, but no matter what, the first steps will necessarily involve raising awareness that there’s a problem at all. That’s why prizes like this are important, and the agitation and resistance of people like Jay and Miranda and so many others right now are so crucial. We don’t want our speech freedoms to go gentle into that good night; we want them to go kicking and screaming, or better yet, not go at all.

The good news? As the Soviets proved, lies don’t have staying power, but even passed hand to hand, truth and good art do. The more the Soviets tried to clamp down, the more power they gave to books and stories like Master and Margarita or A Circle of Friends. As depressing as things sometimes look now, those who would suppress speech have the real problem. Imagine the problem of stopping the truth in the digital age? There will always be people who’ll try, but history shows — they never succeed for long.

https://www.racket.news/p/america-enters-the-samizdat-era?utm_campaign=post&utm_medium=web&fbclid=IwAR1R1B51EcGG8FfMSp7pGXDBbUFWGLJmvL7cG29Uuwf4FNfDCLkSc2rdgoE
Title: Jordan Peterson's Congressional Testimony: Skynet is reifying
Post by: Crafty_Dog on March 12, 2024, 06:17:18 AM


https://www.youtube.com/watch?v=KdhHO9HBZvc
Title: Anti-surveillance
Post by: Crafty_Dog on March 12, 2024, 10:32:08 AM


https://weburbanist.com/2016/11/28/how-to-be-invisible-15-anti-surveillance-designs-installations/
Title: How the Pentagon learned targeted ads to find targets and Putin
Post by: Crafty_Dog on March 20, 2024, 11:19:12 AM
https://www.wired.com/story/how-pentagon-learned-targeted-ads-to-find-targets-and-vladimir-putin/?s=04&fbclid=IwAR0J6AuUyKqJ1kiIUWWIvEeirzG4nhwe5p8_VEYGvAM-dD7rHEFGlJGF8W0
Title: The WSJ Hearts 702
Post by: Body-by-Guinness on March 28, 2024, 04:25:11 PM
Oddly given their reputation the WSJ editorial board comes out in favor or renewing broad surveillance tools:

WSJ Ed Board Knifes Fourth Amendment, Betrays Journal's Reporters and Readers

Cato @ Liberty / by Patrick G. Eddington / Mar 27, 2024 at 12:19 PM

Patrick G. Eddington

Financial Surveillance
I’ve been in Washington over 30 years, but sometimes even I can be stunned by the short memories and shortsightedness of members of the Fourth Estate. Today’s example is the editorial board of the venerable (and usually pretty sane) Wall Street Journal.

The ostensible topic of their latest pronouncement (paywall) was the recent terrorist attack in Moscow, which appears to have been the work of violent Salafist terrorists. After offering some fairly standard pre‐​Trump era Establishment fare on the need for still more US military action in the Islamic world, the WSJ ed board ended its piece by stating,

The ISIS comeback also argues for the House to overcome its disagreements and reauthorize Section 702 authority to surveil foreign communications even if it accidentally catches some Americans in the sweep. The House Intelligence bill contains enough safeguards without adding bureaucratic and political obstacles to rapid surveillance of real threats. Americans don’t want another attack on U.S. soil like last week’s horror show in Moscow.

Item 1: The Foreign Intelligence Surveillance Act (FISA) Section 702 telecommunications intercept program does not “accidentally” sweep up the communications of US persons with no connection to criminal activity. The very structure and operational characteristics of both the 702 program and the global telecommunications system guarantee that the emails, text messages, and the like of innocent Americans are inevitably captured and stored in a vast database for years. It is a database that agents of the Federal Bureau of Investigation (FBI) have repeatedly been found to have used to conduct warrantless digital fishing expeditions on Americans not wanted for any crime.

That means that the communications of Journal reporters (especially those traveling to or reporting from overseas) are very likely getting swept up via the 702 program. The same thing is almost certainly happening to the digital letters to the editor or op‐​eds submitted to the Journal by Americans overseas or who visit the Journal’s website to read its news coverage, etc. All of that, and literally millions of communications of other Americans are available for perusal by FBI agents with access to the 702 database. To be a cheerleader for a surveillance program that’s likely collecting the communications of its reporters and readers is probably not what those reporters or readers view as a legitimate government function or use of their taxpayer dollars.

Item 2: Multiple bills have been introduced to impose an actual warrant requirement for any federal law enforcement access to that stored data, but the most recent one introduced is a bipartisan Senate bill that, while not going as far as many privacy and civil liberties advocates would like, would be a vast improvement over where we are now with the 702 program. The House Intelligence Committee bill championed by the WSJ ed board would, if enacted, largely be another classic example of the old Capitol Hill game of “Let’s not but say we did” when it comes to surveillance reform. The Journal ed board seems not to recognize that the House and Senate Intelligence Committees have long been “organizationally captured” by the various intelligence and law enforcement entities they were created to oversee in 1978. Both committees are cheerleaders for mass surveillance, not our protectors from it.

Item 3: The Journal ed board is engaged in a form of magical thinking with respect to mass surveillance. No mass surveillance program has ever stopped a terrorist attack on America. That was the case with the 702 program’s progenitor, the infamous STELLAR WIND program. It was also the case with the PATRIOT Act’s Section 215 telephone metadata mass surveillance program. And while the FBI and the Office of the Director of National Intelligence (ODNI) continue to make incredible claims about the program’s effectiveness, the actual FBI internal audits of the 702 program have never been released. Cato is trying to remedy that information deficit via a Freedom of Information Act (FOIA) lawsuit currently before D.C. Circuit Judge Tanya Chutkan.

The WSJ ed board could’ve enlightened its readers with all of these publicly available, sourced facts. Instead, it chose to fearmonger in favor of a program that is not and never has been Fourth Amendment compliant in the way the Founders intended, a program that almost certainly sweeps up the communications of its own reporters, editors, and readers. How the mighty have fallen.
Title: CA
Post by: Crafty_Dog on March 30, 2024, 05:49:49 PM
https://twitter.com/i/web/status/1773738867126161838
Title: Re: The Surveillance/Omnipotent State
Post by: ccp on March 31, 2024, 07:27:25 AM
" Can’t help but wonder if the plan was always to let crime become rampant so they could justify the implementation of a surveillance state. "

as a victim of having my car stolen twice I am not opposed to this.
Title: Re: CA
Post by: DougMacG on March 31, 2024, 08:03:16 AM
https://twitter.com/i/web/status/1773738867126161838

The wildest conspiracy ideas don't look so crazy anymore.

All those cameras and witnesses and no one knows who burned 1600 buildings in the Twin Cities in the summer of 2000. We don't know who burned the police precinct headquarters down. We don't know who burned the U. S. Post Office. But we have a list of every parent in the country who went to a school board meeting to speak out against sexualizing second grade children.

Selective surveillance.

Criminal laws literally incentivize gangs to use juveniles to commit their worst crimes.

What could go wrong.
Title: Anti Options
Post by: Crafty_Dog on March 31, 2024, 08:21:34 AM

https://petapixel.com/2023/03/01/hacker-hoodie-blinds-surveillance-cameras-with-infrared-light/

https://www.macpierce.com/the-camera-shy-hoodie


https://www.macpierce.com/blog/2019/11/4/the-opt-out-cap-assembly
Modify message


https://www.businessinsider.com/facial-recognition-cameras-sweater-protect-privacy-data-trick-fool-clothes-2023-2?op=1#the-team-at-cap-able-said-it-tested-its-designs-using-yolo-an-algorithm-for-real-time-object-detection-16
Title: FO: Section 702
Post by: Crafty_Dog on April 10, 2024, 11:12:43 AM
(2) HOUSE MOVING TO PASS 702 WITH LAWMAKER PRIVACY CUTOUT: According to Rep. Thomas Massie (R-KY), the Foreign Intelligence Surveillance Act (FISA) Section 702 reauthorization bill Congress is planning to pass by 19 April includes notification and consent requirements for any database searches that include personal information of a member of Congress.

Rep. Matt Gaetz (R-FL) said he will oppose a House rule vote on the bill, stopping a floor vote.

Why It Matters: This cutout is very likely intended to secure votes to pass this version of the Section 702 reauthorization bill. There is strong bipartisan support for a version of the bill that included a warrant requirement for FBI searches that include American citizens after it was discovered that the FBI conducted millions of possibly illegal searches that included at least one member of Congress. However, House Speaker Mike Johnson (R-LA) chose not to bring that version of the bill to the Rules Committee. – R.C.
Title: Senate Votes Down FISA
Post by: Body-by-Guinness on April 11, 2024, 04:00:56 PM
I was unaware the House version contained a requirement that the FBI inform congress if a congressgrifter is the focus of a FISA inquiry. The rest of us, not so much:

https://amgreatness.com/2024/04/10/group-of-conservative-republicans-join-democrats-to-block-fisa-renewal-bill/?fbclid=IwAR2EsWMyJSNkCWdGVMCdE_Y2vE6LGeAlBl26H2n170M_P6Y1qPJr-iAop2E_aem_ATRM1ap0lCGFeeug6NtQG04tIrynxVx35dHf4rLtKzAUgugm9fGq6Lanyetojnz_rhilmhtJMTgVrNql1iKS3bQY
Title: My congressman
Post by: Crafty_Dog on April 15, 2024, 06:39:01 AM
https://danbishop.house.gov/media/press-releases/bishop-stands-against-expansion-warrantless-surveillance
Title: Re: My congressman, government surveillance
Post by: DougMacG on April 15, 2024, 10:14:34 AM
https://danbishop.house.gov/media/press-releases/bishop-stands-against-expansion-warrantless-surveillance

This is an issue where my own view has flipped perhaps more so than on any other.  In the early 2000s I believed the agencies needed every possible tool to stop terrorism. Investigating (suicidal attacks) after they happen isn't good enough.  And there was no real reason to believe our trusted agencies would misuse this potentially excessive power.

Now I fear the agencies more than I fear the terrorists.  The government agencies are not using the tools they already have to protect us, cf border wall, law enforcement, courts, prisons, foreign intelligence.

The agencies (deep state) have tragically proven themselves untrustworthy, often an enemy of the people. The list of evidence to support that is very long. IRS targeting, 'Russian collusion", false FISA warrants, lying to Congress, eavesdropping and so on. They have been personally and politically motivated at the highest levels, and conspiratorial, and our security is the victim. "Emergency" powers must end.  Amend the constitution if you want more federal power.
Title: previous post reminds me of this quote
Post by: ccp on April 15, 2024, 11:17:04 AM
The quote "Power tends to corrupt, and absolute power corrupts absolutely"12is attributed to Lord Acton, a British historian and politician13. He wrote this remark in a letter to Bishop Mandell in 188713. He also added that "Great men are almost always bad men"423. The quote implies that power has a corrupting influence on those who wield it, and that the more power one has, the more likely one is to abuse it

Can anyone imagine if the Dems finish the job seizing full power and making us into one party country?

(their obvious goal)

The system was designed so the media would be an additional check on gov. power but that no longer exists for 90 % of the media .

Title: Re: The Surveillance/Omnipotent State
Post by: Crafty_Dog on April 16, 2024, 06:41:21 AM
Doug:

We have walked the same path here.
Title: FO: House passes FISA renewal without warrant reform
Post by: Crafty_Dog on April 16, 2024, 04:27:14 PM
(1) HOUSE PASSES FISA RENEWAL WITHOUT WARRANT REFORM: The House passed the Foreign Intelligence Surveillance Act (FISA) Section 702 renewal bill in a 273-147 vote on Friday, 12 April.

The amendment to add a warrant requirement for Section 702 database searches of American citizens’ data was defeated in a 212-212 vote after House Speaker Mike Johnson (R-LA) voted to break the tie.

“I will do everything in my power to stop this bill” when it reaches the senate, Senator Ron Wyden (D-OR) said. Wyden added, “The House bill represents one of the most dramatic and terrifying expansions of government surveillance authority in history.”

Why It Matters: Republican lawmakers who voted against the warrant reform amendment argue that a warrant requirement would undermine national security by slowing the process of collecting and analyzing data on foreign threats. However, the warrant requirement would have only applied to Section 702 database searches targeting Americans. The bill now moves to the Senate, which is likely to face bipartisan opposition ahead of the Friday deadline when Section 702 authorities lapse. – R.C.
Title: WSJ: The 4th is not in jeopardy
Post by: Crafty_Dog on April 17, 2024, 08:33:57 AM

The Fourth Amendment Isn’t in Jeopardy
A bill headed for a House vote would harm U.S. intelligence and law enforcement with little impact on privacy.
By
The Editorial Board
Follow
April 16, 2024 5:34 pm ET



There is no shortage of bad ideas in Congress, and too many have a chance to become law these days. An example is the Fourth Amendment Is Not For Sale Act, which would prohibit the U.S. government from buying digital information that would remain available to the likes of China and Russia.

The bill, scheduled for a House vote on Wednesday, would ban the government from buying information on Americans from data brokers. This would include many things in the cloud of digital exhaust most Americans leave behind online, from information on the websites they visit to credit-card information, health information and political opinions.

Our libertarian friends fret that letting the government buy data infringes on the Fourth Amendment’s guarantee against unreasonable searches. But the Supreme Court held in U.S. v Miller (1976) that “a person has no legitimate expectation of privacy in information he voluntarily turns over to third parties.” The Court updated Fourth Amendment law on tracking cellphone location data in Carpenter v. U.S. (2018), but the Not For Sale Act goes much further.

The Justice Department says the bill, sponsored by Rep. Warren Davidson (R., Ohio), would limit the ability of U.S. law enforcement to seek information online that often helps solve federal crimes, including hacks and other malicious digital acts. The bill also bans the purchase of records on Americans’ location information, a change that Justice says would hinder the ability to track missing children, hunt fugitives and investigate criminal networks.

The bill would force U.S. intelligence officials to avoid data that could include information on an American. That’s a burden on tools the Defense Department uses to protect foreign military bases and troops abroad.

In a letter to Judiciary Chairman Jim Jordan and ranking Democrat Jerrold Nadler in December 2023, the Fraternal Order of Police wrote that banning the use of digital information would end law enforcement’s access to “tools that generate leads into crucial and often complex cases.” The National Sheriffs Association says the proposal “empowers the cartels.”

The bill’s co-sponsors include voices on the extremes of both parties, including Rep. Andy Biggs (R., Ariz.) and Democrats Pramila Jayapal (D., Wash.) and Mr. Nadler. Let’s hope the sensible center prevails on this one.
Title: Re: The Surveillance/Omnipotent State
Post by: Crafty_Dog on April 17, 2024, 09:24:47 AM
https://cointelegraph.com/news/nsa-days-from-taking-over-internet-whistleblower-edward-snowden

A very savvy tech friend responds:

"No. Also Snowden lives in a house paid for by Putin and has security from Putin.  He is guy responsible for maybe 200 cia deaths from the documents he stole and then passed to China/Russia which led to multiple networks being revealed and the people killed.  So I always take any article like this quoting him with a big piece of kosher salt."

That said the part about seizing servers etc seems both plausible and frightening.
Title: Israeli Facial Recognition
Post by: Crafty_Dog on April 22, 2024, 09:56:53 AM
https://www.theguardian.com/technology/2024/apr/19/idf-facial-recognition-surveillance-palestinians
Title: WT: Everyone is a spy
Post by: Crafty_Dog on April 22, 2024, 03:39:01 PM
https://washingtontimes-dc.newsmemory.com/?token=75113e2914a674447326b4859dfbbeee_66266102_6d25b5f&selDate=20240422
Title: Banks in league with The Surveillance State
Post by: Crafty_Dog on April 25, 2024, 05:50:14 PM


https://www.dailymail.co.uk/news/article-13346959/banks-maga-supporters-january-6-investigation-biden-administration-trump.html