Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Panopticon of global surveillance

British telecom firm helped government spy on millions, TV station claims

Reuters

  • Nov 21, 2014





LONDON Telecommunications firm Cable & Wireless helped Britain eavesdrop on millions of Internet users worldwide, a British TV channel reported Thursday, citing previously secret documents leaked by a fugitive former U.S. National Security Agency contractor.
Cable & Wireless, which was bought by Vodafone in 2012, provided British spies with traffic from rival foreign communications companies, Channel 4 television said, citing documents stolen by Edward Snowden.
Channel 4 said Cable & Wireless gave Britain's GCHQ eavesdropping agency access by renting space on one of the arteries of global communications, a cable that runs to the southern English region of Cornwall.
The Channel 4 report, which was impossible to immediately verify given the secrecy of the surveillance programs, said Cable & Wireless carried out surveillance on Internet traffic through its networks on behalf of British spies.
The documents cited in the report were not shown on Channel 4′s website. But previous disclosures by Snowden have illustrated the scale of U.S. and British eavesdropping on everything from phone calls and emails to Internet and social media.
Some telecommunications and Internet companies in Britain and the United States were asked or forced to cooperate with the eavesdropping programs, according to previous media reports.
When asked for comment on the Channel 4 report, Vodafone said in a statement that it had examined the history of Cable & Wireless compliance and found no evidence that would substantiate the allegations.
"We have found no indication whatsoever of unlawful activity within Vodafone or Cable & Wireless and we do not recognize any of the U.K. intelligence agency programs identified," it said in a statement. "Furthermore, Vodafone does not own or operate the cables referred to."
It added that national laws require it to disclose some information about its customers to law enforcement agencies or other government authorities when asked to do so.
In the wake of the Snowden revelations, GCHQ was accused by privacy groups and some lawmakers of illegally monitoring electronic communications.
British ministers denied any illegality and top spies dismissed suspicions of sinister intent, saying they sought only to defend the liberties of Western democracies. GCHQ declined to comment on the Channel 4 report.
Andrew Parker, director general of MI5, Britain's domestic security service, warned last year that the revelations from Snowden, who now lives in Moscow, were a gift to terrorists because they had exposed GCHQ's ability to track, listen and watch plotters.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
Peter Lemkin Wrote:When asked for comment on the Channel 4 report, Vodafone said in a statement that it had examined the history of Cable & Wireless compliance and found no evidence that would substantiate the allegations.
"We have found no indication whatsoever of unlawful activity within Vodafone or Cable & Wireless and we do not recognize any of the U.K. intelligence agency programs identified," it said in a statement. "Furthermore, Vodafone does not own or operate the cables referred to."

A classic non denial denial. "We have not found", "we have found no indication", we do not recognise", "Vodafone does not own or operate"...

PR lie-speak.
The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply
Would go a long way to to explain the reluctance of the authorities to go after them for all the tax they owe.
"The philosophers have only interpreted the world, in various ways. The point, however, is to change it." Karl Marx

"He would, wouldn't he?" Mandy Rice-Davies. When asked in court whether she knew that Lord Astor had denied having sex with her.

“I think it would be a good idea” Ghandi, when asked about Western Civilisation.
Reply

Auroragold: Cellular Spying Operation Infiltrates 70 Percent Of Global Networks

[Image: snowden-665x385.jpg]

Edward Snowden says that the National Security Agency has a secret program called Auroragold. The program was designed so that the agency could take control of every telecommunication network across the globe to obtain full access to every mobile phone user on Earth.

According to Computer World, the NSA has conducted a covert campaign to intercept internal communications of operators and trade groups in order to infiltrate mobile networks worldwide, according to the latest revelations from documents supplied by Edward Snowden.
"The NSA documents show that as of May 2012 the agency had collected technical information on about 70 percent of the estimated 985 mobile phone networks worldwide."
The Intercept, a publication that has played in integral role in helping Snowden leak NSA documents to the public through various media outlets, posted the information surrounding Auroragold in piece titled "Operation Auroragold: How The NSA Hacks Cellphone Networks Worldwide." Snowden notes that in March 2011, two weeks before the Western intervention in Libya, a secret message was delivered to the National Security Agency. An intelligence unit within the U.S. military's Africa Command needed help to hack into Libya's cellphone networks and monitor text messages.
For the NSA, the task was easy. The agency had already obtained technical information about the cellphone carriers' internal systems by spying on documents sent among company employees, and these details would provide the perfect blueprint to help the military break into the networks. The NSA's assistance in the Libya operation, however, was not an isolated case. It was part of a much larger surveillance programglobal in its scope and ramificationstargeted not just at hostile countries.
In fact, documents provided to The Intercept by Edward Snowden show that the NSA has spied on hundreds of companies and organizations internationally. However, it was not just hostile countries that were included in the program, the US even included countries with close ties to the US in an effort to find security weaknesses in cellphone technology as a whole. In turn, the NSA hoped to exploit the weaknesses found for surveillance purposes if needed.
If you look at the documents provided by Snowden, you can see that as of May 15, 2012, the Auroragold project touted that it had collected the technical information on 701 of the estimated 985 working networks. They also note that they have 1201 actively managed email selectors. This means that the NSA has actively monitored the content of messages sent and received of more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.
The Auroragold documents speak a lot to the GSM Association, or GSMA, which is an influential UK-headquartered trade group. The Intercept notes that the GSM Association works closely with large US-based firms including Microsoft, Facebook, AT&T, and Cisco, and is currently being funded by the US government to develop privacy-enhancing technologies.
When the Aurorogold documents were shown to cellphone security experts they were alarmed at what they saw. The Snowden documents show that the NSA is actively adding "security flaws" in to the cellphone networks to gain access to the systems. In the process they are opening the doors to other hackers. Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the Auroragold documents, put it bluntly.
"Collecting an inventory [like this] on world networks has big ramifications. Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities because once NSA introduces a weakness, a vulnerability, it's not only the NSA that can exploit it."
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
A new wave of U.S. National Security Agency (NSA) document leaks show the agency wasn't able to spy on everyone thanks to some encryption tools several programs use that successfully thwart digital espionage.
German magazine Der Spiegel reported the NSA couldn't decipher communications such as emails and online chat messages from a handful of services that use encryption beyond the NSA's code-cracking abilities, based on documents obtained from former NSA contractor and whistleblower Edward Snowden in 2013. Der Spiegel recently analyzed NSA documents Snowden previously released to news outlets in 2013.
"[U]biquitous encryption on the Internet is a major threat to NSA's ability to prosecute digital-network intelligence (DNI) traffic or defeat adversary malware," an NSA employee said in an internal training document from 2012.

Programs that used OTR or off-the-record or end-to-end encryption such as the anonymous network Tor and professional software company Zoho's email and chat services proved to be major challenges for the NSA. The agency also reported that it couldn't break into files using TrueCrypt, a recently decommissioned open-source, whole disk-encryption service, along with other encryption tools that kept some messages unreadable.
The NSA was stumped further if users incorporated a variety of security measures, such as using Tor to connect to the internet, CSpace to send online messages and ZRTP to make phone calls. That combination made individuals nearly invisible to the NSA, Der Spiegel reported.
But the leaked documents also revealed which services provide little privacy protections. The NSA labeled the services and files such as "trivial," "moderate" or "catastrophic" based on how easy they were to decrypt. Hacking into Facebook chats were considered "minor," Der Spiegel reported, while getting emails through "mail.ru," a Moscow internet service provider was a "moderate" task.
Moreover, using a virtual private network or VPN provides minimal security. VPNs, which can be used to circumvent online government censorship and surveillance, is exploited by the NSA thanks to a team dedicated to hacking VPN connections such as the ones used by Greek government agencies.
Public concerns over government surveillance have swelled and fueled a global push for better privacy practices, including standardized encryption across the internet since last year's Snowden revelations. The NSA released a slew of redacted documents Christmas Eve detailing how the agency and others in the intelligence community knowingly or unwittingly violated privacy laws to collect data. The document release confirms earlier reports and suspicions that the agency's spy programs mainly collected private online communications from ordinary citizens rather than suspected terrorists.
Earlier this year, Snowden encouraged tech companies at the SXSW conference to take the lead by encrypting all of their services to combat government surveillance. Everyday citizens have heeded Snowden's advice, increasing encryption use more than 60 percent since news of the NSA's spy program hit in 2013. Tech companies such as WordPress, Tumblr and Google have also boosted their web security with tougher encryption measures.
International governments have also taken more precautions to prevent U.S. intelligence agencies from eavesdropping on official communications. Germany and Russia vowed earlier this year to switch to paper communications including handwritten notes and typewriters to avoid detection. Other countries have responded by beefing up their own spy programs or doubling down on American tech companies operating overseas.
Companies such as Google and Facebook have had to combat international threats to ban their services if the companies fail to adhere to strict privacy guidelines. European regulators have chastised the companies for disregarding consumer privacy, and have moved to reign in indiscriminate voracious data collection practices. Italy recently gave the company 18 months to adopt newly imposed privacy policies that would require the company to routinely purge user data and get expressed permission before tracking consumers' internet activity for advertisements.
Facebook is awaiting a controversial European Union high court ruling that could determine whether the social network illegally let the NSA spy on European users. If the company loses, other tech companies could be face tougher privacy laws, like getting expressed permission to collect and store consumer data, if they want to do business in Europe.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
A class apart. Calls for GCHQ to leave alone journalists, MPs and lawyers. The rest of us are fair game for snooping.

I do so love double standards. Nice one Rusbridger.

Quote:GCHQ captured emails of journalists from top international media

Snowden files reveal emails of BBC, NY Times and more
Agency includes investigative journalists on threat' list
Editors call on Cameron to act against snooping on media


[Image: GCHQ-011.jpg]The journalists' communications were among 70,000 emails harvested in less than 10 minutes on one day in November 2008 by GCHQ. Photograph: GCHQ/EPA

GCHQ's bulk surveillance of electronic communications has scooped up emails to and from journalists working for some of the US and UK's largest media organisations, analysis of documents released by whistleblower Edward Snowden reveals.
Emails from the BBC, Reuters, the Guardian, the New York Times, Le Monde, the Sun, NBC and the Washington Post were saved by GCHQ and shared on the agency's intranet as part of a test exercise by the signals intelligence agency.
The disclosure comes as the British government faces intense pressure to protect the confidential communications of reporters, MPs and lawyers from snooping.
The journalists' communications were among 70,000 emails harvested in the space of less than 10 minutes on one day in November 2008 by one of GCHQ's numerous taps on the fibre-optic cables that make up the backbone of the internet.
The communications, which were sometimes simple mass-PR emails sent to dozens of journalists but also included correspondence between reporters and editors discussing stories, were retained by GCHQ and were available to all cleared staff on the agency intranet. There is nothing to indicate whether or not the journalists were intentionally targeted.
The mails appeared to have been captured and stored as the output of a then-new tool being used to strip irrelevant data out of the agency's tapping process.
New evidence from other UK intelligence documents revealed by Snowden also shows that a GCHQ information security assessment listed "investigative journalists" as a threat in a hierarchy alongside terrorists or hackers.
Senior editors and lawyers in the UK have called for the urgent introduction of a freedom of expression law amid growing concern over safeguards proposed by ministers to meet concerns over the police use of surveillance powers linked to the Regulation of Investigatory Powers Act 2000 (Ripa).
More than 100 editors, including those from all the national newspapers, have signed a letter, coordinated by the Society of Editors and Press Gazette, to the UK prime minister, David Cameron, protesting at snooping on journalists' communications.
In the wake of terror attacks on the Charlie Hebdo offices and a Jewish grocer in Paris, Cameron has renewed calls for further bulk-surveillance powers, such as those which netted these journalistic communications.
Ripa has been used to access journalists' communications without a warrrant, with recent cases including police accessing the phone records of Tom Newton-Dunn, the Sun's political editor, over the Plebgate investigation. The call records of Mail on Sunday reporters involved in the paper's coverage of Chris Huhne's speeding row were also accessed in this fashion.
Under Ripa, neither the police nor the security services need to seek the permission of a judge to investigate any UK national's phone records instead, they must obtain permission from an appointed staff member from the same organisation, not involved in their investigation.
However, there are some suggestions in the documents that the collection of billing data by GCHQ under Ripa goes wider and that it may not be confined to specific target individuals.
A top secret document discussing Ripa initially explains the fact that billing records captured under Ripa are available to any government agency is "unclassified" provided that there is "no mention of bulk".
The GCHQ document goes on to warn that the fact that billing records "kept under Ripa are not limited to warranted targets" must be kept as one of the agency's most tightly guarded secrets, at a classification known as "Top secret strap 2".
That is two levels higher than a normal top secret classification as it refers to "HMG [Her Majesty's government] relationships with industry that have areas of extreme sensitivity".
Internal security advice shared among the intelligence agencies was often as preoccupied with the activities of journalists as with more conventional threats such as foreign intelligence, hackers or criminals.
One restricted document intended for those in army intelligence warned that "journalists and reporters representing all types of news media represent a potential threat to security".
It continued: "Of specific concern are investigative journalists' who specialise in defence-related exposés either for profit or what they deem to be of the public interest.
"All classes of journalists and reporters may try either a formal approach or an informal approach, possibly with off-duty personnel, in their attempts to gain official information to which they are not entitled."
It goes on to caution "such approaches pose a real threat", and tells staff they must be "immediately reported" to the chain-of-command.
GCHQ information security assessments, meanwhile, routinely list journalists between "terrorism" and "hackers" as "influencing threat sources", with one matrix scoring journalists as having a "capability" score of two out of five, and a "priority" of three out of five, scoring an overall "low" information security risk.
Terrorists, listed immediately above investigative journalists on the document, were given a much higher "capability" score of four out of five, but a lower "priority" of two. The matrix concluded terrorists were therefore a "moderate" information security risk.
A spokesman for GCHQ said: "It is longstanding policy that we do not comment on intelligence matters. Furthermore, all of GCHQ's work is carried out in accordance with a strict legal and policy framework, which ensures that our activities are authorised, necessary and proportionate, and that there is rigorous oversight, including from the secretary of state, the interception and intelligence services commissioners and the parliamentary intelligence and security committee.
"All our operational processes rigorously support this position. In addition, the UK's interception regime is entirely compatible with the European convention on human rights."




The shadow is a moral problem that challenges the whole ego-personality, for no one can become conscious of the shadow without considerable moral effort. To become conscious of it involves recognizing the dark aspects of the personality as present and real. This act is the essential condition for any kind of self-knowledge.
Carl Jung - Aion (1951). CW 9, Part II: P.14
Reply

Forget Your Smartphone, the Government Is Secretly Tracking Where You Drive

By Jason Duaine Hahn
















If something can be spied upon, bet that the American government is already spying on it.
After filing dozens of Freedom of Information Act requests, the American Civil Liberties Union uncovered a secret Drug Enforcement Administration program that tracks drivers in real-time using license plate scanners. It launched in 2008, and uses DEA-owned scanners and devices used by local law enforcement to create a nationwide database that catalogs hundreds of millions of cars and "identifies the travel patterns" of drivers.
Though the documents were heavily censored by the governmentand many had their dates redactedthey showed that the DEA set up at least 100 of their own scanners in California, Arizona, New Mexico, Texas, Florida, Georgia, and New Jersey. If you're wondering why the DEA and not the NSA is running the program, that's because it was originally meant to be a weapon in the War on Drugs. The program initially monitored vehicles used by drug cartels near the border, but it expanded to allow local and state officials to tap into the database and track vehicles involved in kidnappings, rape, and murder across the country. A scanner on a police vehicle can collect information on more than 14,000 plates during a single shift.
According to the documents, one of the tracking program's main goals is "asset forfeiture," which lets agencies keep "cars, cash and other valuables" they come across when stopping suspected criminals. "Criminal" becomes a flexible word in a lot of these cases. Here's John Oliver's segment on the abuse of civil forfeiture:



"It's unconscionable that technology with such far-reaching potential would be deployed in such secrecy," the ACLU's Jay Stanley told the Wall Street Journal. "People might disagree about exactly how we should use such powerful surveillance technologies, but it should be democratically decided, it shouldn't be done in secret."
Luckily the DEA shortened the time it keeps the information from two years to three months. But if a driver isn't flagged for committing a crime, why not delete this data immediately? This is the same agency that admitted to keeping phone data for 15 years without any judicial oversight. During that time they "recreated" trails of evidence to hide the fact that they used phone data to get it.
You might feel it's not a big deal if the government knows you went to Target everyday this week, but don't forget that this is just one slice of information they collectwhich already includes phone metadata and GPS-tracking. This information adds up and can paint a more revealing profile of you than anything you've ever put on Facebook.
[Image: rks4lis0lpakuqs5f1al.png]
License plate scanner out in the wild.It's completely legal to record things that are in public view, like a license plate on a car traveling down a freeway, but it's creepy to think that your location is being logged and can be viewed by a collection of law enforcement agencies. While using this technology to find kidnappers, rapists, and murderers might seem like a good benefit, surveillance programs are usually clogged with abuse.
Edward Snowden's NSA leaks revealed that agencies constantly exploited their power. In one case, Snowden saw employees at the NSA sharing images they intercepted of naked women. NSA agents also regularly collected data on Internet users who had nothing to do with illegal activities, or used their tools to spy on love interests. It isn't clear if any court oversees the license plate program, and none of the documents say how much it's even working.
It's a little ironic that cops recently asked Google to disable Waze, an app that lets users tag the locations of cop cars, but they're cool with using a program to track millions of drivers.
Just wait until Wi-Fi becomes a regular thing in cars. That'll be fun.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply

In Latest Vindication Of Snowden, Court Rules UK Mass Surveillance Illegal


'We must not allow agencies to continue justifying mass surveillance programmes using secret interpretations of secret laws,' said Privacy International director Eric King.
By Nadia Prupis for Common Dreams @nadiaprupis | February 7, 2015


[Image: AP050726016574.jpg]

In the latest vindication of NSA whistleblower Edward Snowden, a U.K. ruled on Friday that the British government violated human rights law by failing to safeguard some aspects of its intelligence-sharing operations until December 2014.
The Investigatory Powers Tribunal found that the Government Communications Headquarters (GCHQ) accessed information obtained by the National Security Agency (NSA) without sufficient oversight, violating Articles 8 and 10 of the European convention on human rights. According to Reuters, "The tribunal's concern, addressed in the new ruling, was that until details of how GCHQ and the NSA shared data were made public in the course of the court proceedings, the legal safeguards provided by British law were being side-stepped."
The Guardian adds, "The ruling appears to suggest that aspects of the operations were illegal for at least seven yearsbetween 2007, when the Prism intercept [program] was introduced, and 2014."
Article 8 guarantees the right to privacy; Article 10 protects free expression.
"For far too long, intelligence agencies like GCHQ and NSA have acted like they are above the law," said Eric King, deputy director of Privacy International, one of the human rights groups that brought the case to the IPT. "Today's decision confirms to the public what many have said all alongover the past decade, GCHQ and the NSA have been engaged in an illegal mass surveillance sharing program that has affected millions of people around the world."
The New York Times reports:
Although privacy campaigners claimed the decision as a victory, many experts said the British and American intelligence agencies would continue to share information obtained with electronic surveillance, even if they had to slightly alter their techniques to comply with human rights law.
Named in the decision (pdf) were the NSA's controversial PRISM program, which whistleblower Edward Snowden revealed in 2013 as the invasive spying operations being conducted on U.S. citizens.
Investigative journalist Glenn Greenwald, who reported on Snowden's document leak, tweeted on Friday:


"We must not allow agencies to continue justifying mass surveillance programmes using secret interpretations of secret laws," King continued. "The world owes Edward Snowden a great debt for blowing the whistle, and today's decision is a vindication of his actions."
IPT's decision marks the first time that the highly-secretive court has ever ruled against any of the U.K.'s intelligence services in its entire 15-year existence.
During IPT hearings in 2014, Matthew Ryder, a lawyer for civil rights group Liberty, charged that intelligence agencies were building vast databases from unlawfully obtained emails and other communications.
However, the IPT ruled in December last year that British and American intelligence agencies had brought their oversight policies in line with European law, and could continue sharing information legally.
A GCHQ spokesperson did not address the IPT's new ruling in a statement on Friday, focusing only on the court's December decision which allowed the agency to continue its spying operations. "We are pleased that the court has once again ruled that the U.K.'s bulk interception regime is fully lawful," the spokesperson said. "By its nature, much of GCHQ's work must remain secret. But we are working with the rest of government to improve public understanding about what we do."
The privacy and human rights groups who brought the case against GCHQ to the IPT last year have also appealed that ruling.
"After a decade and a half of siding with the Government, it is welcome that the IPT is beginning to hold our spies to account," said Cori Crider, director of legal charity Reprieve. "But stark problems with the UK's surveillance system remain: for years the government has written itself a blank cheque to eavesdrop on confidential communications between lawyers and clients even in cases where the Government itself is in the dock. This is totally unfair and undermines the core premise of our legal system."
The European Court of Human Rights in Strasbourg, France will hear the appeal by the end of the year at the earliest. It will potentially allow citizens who believe they were targeted by surveillance programs before December 2014 to petition the court for the information that has been collected about them.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
Samsung's Smart TV may be a little too smart for its own good.
Tucked into the privacy policy of the South Korean electronics behemoth's Smart TV are a few paragraphs that may send chills down the spine of some consumers. According to the document, the unit's voice recognition protocols can "capture voice commands and associated texts so that [Samsung] can provide you with Voice Recognition features and evaluate and improve the features."




The boilerplate languagewhich granted few people read in its entiretysounds fairly anodyne. That is, until the company adds this warning: "Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition."
The TV's voice features can be disabled. However, the company adds another caveat: "While Samsung will not collect your spoken word, Samsung may still collect associated texts and other usage data so that we can evaluate the performance of the feature and improve it."

Samsung warns: Your smart TV may be listening




In other words, owners of the Samsung Smart TVs may need to watch what they say in their own homes, and especially where they say it.
A spokesperson for the company told CNBC that Samsung "takes consumer privacy very seriously," while adding that the company "does not retain voice data, or sell it to third parties. If a consumer consents and uses the voice recognition feature, voice data is provided to a third party during a requested voice command search."
The warning, first reported by The Korea Times and picked up on social media, may add fuel to a raging debate over how much control humans are willing to relinquish to automation for the sake of convenience. Tech companies are resorting to more creative, and some say surreptitious, ways to mine consumer data and profit from it.




Voice command technology is becoming more ubiquitous, and many consumers rely on those solutionssuch as Apple's Sirito power their devices.
Yet those protocols are only several degrees removed from autonomous devices, which is increasingly migrating from science fiction to reality. They also raise a host of privacy questions that experts are struggling to comprehend.
Artificial intelligence is an increasingly hot topic, with high-profile technophiles such as Elon Musk, Stephen Hawking and Bill Gates warning about the unintended consequences of unchecked smart technology.
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
New from Nafeez Ahmed:


https://medium.com/@NafeezAhmed/preventi...efd26191a9


Preventing dissent

How Britain's new police state will radicalise us all

by Nafeez Ahmed


INSURGE INTELLIGENCE, a new crowd-funded investigative journalism project, explores the dystopian implications of Britain's new Counter Terrorism and Security Bill, and the efforts to rush it through without public scrutiny.

Counter-terrorism experts who have worked on the frontlines of the UK's battle against extremism reveal exclusively to INSURGE how the proposed new powers, far from making Britain safer, will criminalise legitimate political dissent and fail to prevent the next terrorist attack  despite generating stupendous profits for a parastical security industry.




In the UK, an insidious secret network of violent extremists is plotting to subvert democracy. The members of this network detest our way of life, and hate our freedoms. Walking amongst us, this dangerous fifth column is exploiting the very laws we hold dear to campaign for the establishment of an extremist, totalitarian state that would police every aspect of our lives based on a fanatical ideology that is devoid of reason.

No, the Islamic State' is not about to conquer Great Britain. But the neocons in government and industry who profit from fear might well be.

In the name of fighting terror, the UK government, hand-in-hand with the US, is leading the way to turn freedom of speech and dissent into mere formalities that, in practice, have no place in societies that will function, effectively, as full-fledged police-states.

Today, the British government's controversial Counter Terrorism and Security (CTS) Bill received Royal Assent, after having been passed by the House of Commons on 10th February with minor amendments.

"This important legislation will disrupt the ability of people to travel abroad to fight and then return, enhance our ability to monitor and control the actions of those who pose a threat, and combat the underlying ideology that feeds, supports and sanctions terrorism," said UK Home Secretary Theresa May.

The powers of the new legislation are unprecedented. The government will be able to unilaterally confiscate passports of British citizens suspected of involvement in terrorism, although the threshold for what exactly constitutes a reasonable suspicion is ambiguous.

Terror suspects, deemed as such not on the basis of a fair trial, but purely through secret hearings' based on secret evidence provided by security service assessments,' can already be subjected to constant monitoring, electronic tagging, travel bans, limited house arrest, and curfews under Terrorism Prevention and Investigation Measures. The CST bill will now add forced relocation to that mix.

Police and security services will have enhanced powers of surveillance, including the ability to identify the devices that send communications over the internet.

But perhaps the most outrageous element of the CTS bill is the prevent duty,' the establishment of a statutory duty on all public sector workers  teachers, lecturers, nurses, GPs and other professionals  to prevent extremism in their institutions. They will have to do that by monitoring nursery children, school children, students, patients, and so on for signs of being at risk to radicalisation.

The prevent duty' puts the Home Office's Channel Programme, a scheme coordinated by the Metropolitan Police in certain parts of the UK, on a national legal footing. Under the programme, individuals identified as extreme, or being at risk' of extremism, must be referred to Channel, which will make an assessment to determine whether the referred individual requires an intervention to deradicalise them, and the kind of intervention they will make.

In 2013, I revealed that the Channel Programme was a covert intelligence gathering exercise. Officially, the government and police claim that people who are referred to Channel are not kept on a database. However, I was told by a former Channel coordinator at a local authority that the Programme did in fact maintain a secret logging system to store all names and profiles of those referred, contrary to public claims.

The government's new prevent duty' guidance shows that under the new bill, the government is hoping to retroactively legitimise the secret logging programme in law:

"We expect local authorities to use the existing counter-terrorism local profiles (CTLPs), produced for every region by the police, to begin to assess the risk of individuals being drawn into terrorism. This includes not just violent extremism but also non-violent extremism."

Risk assessments must be "informed by engagement with Prevent co*ordinators, schools, universities, colleges, local prisons, probation services, health, immigration enforcement and others." The guidance also demands the same from university institutions in "assessing where and how students might be at risk" from violent and non-violent extremism.

Whereas previously, Channel Programme officers have gone to pains to deny the storage of such information about people suspected of being "at-risk," the government's new guidance repeatedly does the opposite, setting out the need for robust procedures for "internal and external information sharing" between agencies "about vulnerable individuals." The upshot is that the new bill is designed to slip through by stealth the legalisation of ongoing storage of risk assessment profiles of referred individuals.




Thought police




In 2011, the coalition government changed its Preventing Violent Extremism' (Prevent) strategy to focus not just on terrorism, but "also non-violent extremism, which can create an atmosphere conducive to terrorism and can popularise views which terrorists exploit."

The new definition of "extremism," though, is so broad, it could include a range of views held widely across British society, categorised as ideas that "terrorists exploit" (especially scepticism toward British foreign policy):

"Extremism is vocal or active opposition to fundamental British values, including democracy, the rule of law, individual liberty and mutual respect and tolerance of different faiths and beliefs."

This definition, though, which was criticised last year by Greater Manchester Police chief, Sir Peter Fahy, as being so vague it had turned police into "thought police," opens the door wide to casting suspicion on anyone raising ideas critical of British policy.

Apathy with democracy has become widespread, especially among young people, as illustrated by the popularity of celebrity comedian Russell Brand's opposition to voting as a viable means of effecting change. Numerous civil society and human rights groups regularly criticise the British government's interpretation and execution of both domestic and international law, including encroachment on civil liberties as well as foreign policies justified in the name of British values.'

Charles Shoebridge, a former British counter-terrorism intelligence officer, expressed scepticism of the new powers:

"The lack of any clear definition of extremism', and an understandable desire not to fall foul of legal obligations, are likely to mean workers erring on the side of caution and submitting reports on any adult or child expressing views not only that the worker himself considers extreme', but also that he considers anyone else might consider extreme' too. This could therefore conceivably include almost any expression of opinion not considered mainstream  and not only in relation to Islam, but to discussion of almost any aspect of political or religious discourse."

In its submission to the British government's Prevent guidance consultation process last month, the London-based Campaign Against Criminalising Communities (CAMPACC) noted that anti-terror legislation had already been abused by the government to support "oppressive regimes allied with the UK" and to persecute opponents of those regimes inside Britain.

The CAMPACC briefing highlighted the examples of "Turkey's oppression of Kurdish separatists, Sri Lanka's oppression of Tamil minorities, Israel's attacks on the democratically elected Hamas government of Gaza, etc. More recently, these powers have been used against UK Kurds suspected of joining the anti-ISIS resistance in Syria."

Prevent funding was originally allocated to 30 areas in England and Wales based purely on the size of their respective Muslim populations: the potential for terrorism, in other words, was considered proportional to the number of Muslims, as opposed to any other criteria. Recently, other areas have been allocated Prevent funding due to evidence of young Muslims traveling abroad to fight in Syria and elsewhere. British Muslim grievances over US-UK involvement in crises in the Muslim world, which are widespread, are increasingly being seen as equivalent to extremism.

CAMPACC thus criticised the Prevent agenda for manufacturing "a rationale for systematic surveillance of non-violent extremism,'" which in effect "treats Muslims as a suspect community which must undergo pervasive surveillance and demonstrate its allegiance to British values'  which are contradicted by UK foreign policy especially in relation to Iraq, Afghanistan and Palestine."

The government's blanket equation of criticisms of government policy in the Muslim world with a propensity to violent extremism, leads experts to raise concerns about the unwarranted demonisation and criminalisation of political dissent. The Orwellian implication is that Britons who are critical of Britain's policies in the war on terror' are extremists who must be shut down and deradicalised.

Other counter-terrorism experts have raised probing questions about whether the new powers will even work in any meaningful way to address the risk of terrorism.

Des Thomas, a former senior police officer who was deputy head of the Criminal Investigation Department (CID) and Senior Investigating Officer (SIO) on the UK component of the 9/11 inquiry, said the CTS bill "is misguided and counter productive. Terrorists are just political criminals. Treating them differently from other criminals grants them a sort of legitimacy."

For Thomas, who is currently an honorary visiting professor at Cardiff University's School of Law, the biggest problem is "where and how do ordinary people draw the line between radical thought and the belief that violence is a legitimate way of securing political objectives? As one animal rights activist said to me  you cannot change the world by killing people because they are also animals. Other activists did not agree and were busy burning things down. Does this mean animal rights activism itself is extreme'?"




The Muslim problem




According to Jahan Mahmood, a former unpaid adviser to the Home Office's Organisation for Security and Counter Terrorism (OSCT) who works on deradicalisation with young Muslim men in Birmingham, the new measures are so broadly defined that they will specifically exacerbate the risk of criminalising British Muslims.

"The problem at the moment is that Muslims are widely perceived as being synonymous with terrorism due to media stereotypes and the government's own approach to the Prevent agenda," Mahmood told me.

"The new measures are therefore likely to disproportionately affect Muslims, in a way that will alienate them even further. When the government itself is unable to come up with a clear and robust definition of extremism, you have to wonder how public sector workers suddenly burdened with the duty of identifying supposed extremists in their midst are supposed to do so."

Mahmood's principal concern is that this sort of approach is inherently prone to mistakes that could be counterproductive.

"With pre-emptive terrorism investigations, you're operating in a pre-crime' space where you have to identify the potential for crime, rather than actual crime," he said.

"But no one really knows what that potential is, and how to assess it. The result is that the chances of mistakenly labeling someone as an extremist, or potential criminal, is amplified. In a climate where people are now being forced to inform on each other, such a draconian law can only dampen trust within and between communities, and divide Muslims further from the mainstream, when we need to be building trust."

Some years ago, a leaked MI5 behavioural study of pathways to terrorism concluded that there was no single profile or pathway to violent radicalisation. It also found, contrary to conventional assumptions, that religious conservatism tended to act as a bulwark against extremism.

Teachers in an area of London who have received recent Prevent training in preparation for the new law described the training as "very basic and vague." One teacher told me on condition of anonymity that the criteria that was used to identify a pupil who might be "vulnerable" to extremism included watching out for issues like "social alienation, being withdrawn, or introspective," as well as other issues like "abrupt changes in appearance."

One of the case studies of a successful instance of preventing terrorism concerned a female Muslim pupil who wrote about her belief that homosexuality is haraam,' a sin. She was referred to Channel and provided an intervention which, supposedly, dealt with this. The teacher who mentioned this example provided by the trainers expressed confusion as to how this was linked to preventing terrorism, and told me that dealing with such issues was something done routinely in schools.

Although the Prevent trainers did not bring up religion, teachers who undertook the training repeatedly raised questions about religious and political identity, especially relating to Muslims. One teacher raised an example of concerns about groups of young Muslims praying in their classroom together without permission, rather than in the communal prayer space, which Prevent trainers agreed was a "serious risk."

The episode shows that even without mentioning religion, filtered through the preconceptions and fears of individuals in the public sector, the implementation of the prevent duty' referral programme could end up being discriminatory toward Muslims.

The new legislation will also grant "Prevent co-ordinators" extraordinary powers to "monitor" and "enforce" the implementation of the new laws in schools and universities. Current drafts of the government's proposed prevent duty' guidance to be given to public sector institutions, show that a particular focus of the monitoring will be not just the hosting of external speakers, but also faith groups on campus and their use of prayer facilities.




If all you have is a hammer, everything looks like a nail




Alyas Karmani, a Bradford Imam, councilor, and former counter-terrorism consultant to the police and government, explained that the track record of past anti-terror laws was fairly dismal from a prevention perspective: "Every anti-terror measure the government has introduced over the last decade or more has itself been radicalising, and polarising. The new measures do not address the biggest push factor of all, which is fuelling the extremist narrative, namely the militarism of our government abroad. Terrorism and militarism are two sides of the same coin."

A trained psychologist who has worked for decades with young people and especially young Muslims on deradicalisation and, more recently, sexual violence, Dr. Karmani described the CTS bill as a "blunt instrument" which is being used "to silence and control" people in a way that would lead those genuinely at risk of being involved in terrorism to go further underground.

"Referring and labeling children in nurseries and primary school as extremists, or even potential extremists, is completely opposed to British values," he said. "This is not an evidenced-based initiative driven by real social issues. It's a purely politicised agenda, motivated by the upcoming elections. We are sleep-walking into a police-state. Anyone who questions or challenges mainstream discourses can be labeled an extremist."

Karmani emphasised that the biggest problem with the new powers is that by conflating increasingly prevalent social vulnerabilities with terrorism, the government will end up solving neither.

"The biggest problems I'm seeing on the ground facing not just young Muslims, but young people in general, are the lack of opportunity and deprivation," said Karmani. He added:

"Other problems include mental health challenges and lack of emotional well-being and self-esteem; an avalanche of substance abuse including increasingly risky consumption of drugs and alcohol; abusive domestic contexts in the family; the growing attraction of criminality and gangs; and as we are now learning, an epidemic of sexual violence, abuse and rape."

Instead of new social programmes to address such issues, by associating their symptoms with a risk of extremism,' they are likely to worsen, while actual extremists will adapt, conceal their beliefs, and fall through the cracks.




Losing the needle in a bigger haystack




In the meantime, the practical consequences of the prevent duty' for the police and security services could, in fact, be catastrophic. Shoebridge, who worked as a commissioned British Army officer before joining the Metropolitan Police for twelve years where he specialised in counter-terrorism, pointed out that recent terrorist attacks including the 7/7 London bombings, the murder of Lee Rigby and the Charlie Hebdo attack in Paris, show that "while intelligence services complain about a lack of resources, their real failings have been in decision making in respect of the deployment of existing resources against people whom they already know  in other words, picking the right needles from the haystack."

The new referral and reporting requirements would likely "swamp receiving agencies with information which, in almost every case, will be of absolutely no value in identifying or combating potential terrorist threats." Instead, the government's new prevent duty' will "massively increase the size of the information haystack in which the needles need to be found," especially because "political extremism and terrorism are far from being the same thing."




The deradicalisation industry




The only likely beneficiary of this scheme according to Shoebridge is the "burgeoning publicly funded deradicalisation industry  the same industry that provided much of the expertise' upon which the claimed value of the legislation is predicated."

Karmani agrees with this. Himself a former service provider to the Home Office's OSCT, Karmani points out that there are no proper standards to ensure the competence and independence of companies contracted by the government to deliver so-called deradicalisation' initiatives under the Prevent referral scheme.

According to sources who have worked in Prevent implementing the Channel programme, contractors have an incentive to maximise the delivery of interventions, to maximise their profits  even where evidence of extremism of any kind is thin.

One former Prevent officer revealed that under the coalition government, a number of highly competent practitioners who had received praise from local police for successful deradicalisation programmes were blacklisted from the Channel programme simply due to being religiously conservative. Due to Home Office pressure, police officers are no longer permitted to talk to these counter-terrorism experts, despite their exemplary track record. So, the source said, officers are forced to consult with them in secret to avoid reprimands. The source also revealed that police officers routinely use Channel providers to conduct monitoring and surveillance of communities, rather than simply to deliver social interventions. This is the case not just for Muslims, but also for for members of far-right groups.

In some cases, the logic of the Prevent programme leads to absurdities. In Tower Hamlets, for instance, which has a large Muslim and ethnic minority population, the source said that social workers are under pressure from central government to implement harsh child protection measures for extremist' parents. How this pressure is exerted, he could not say. In one case, social workers admitted they were uncomfortable with the expectation from government that such measures were appropriate, and refused to move a child out of parental custody despite that pressure, because they remained convinced there was no real child safety issue involved.




Preventing terror, or policing dissent?




This sort of case raises urgent questions about the sweeping implications of legislation that the government is attempting to rush through with as little scrutiny as possible.

Jahan Mahmood, who for three years advised Home Office counter-terrorism czar Charles Farr on deradicalisation issues and participated in regular OSCT consultations with some of the most vulnerable members of Muslim communities up and down the country, said that the coalition government has deliberately ignored its own evidence on the root causes of radicalisation. In 2010, Mahmood was involved in an extensive Home Office research process based on interviews with vulnerable individuals, which culminated in a landmark OSCT report. The report documented three primary root causes of terrorism: first and foremost, grievances with British foreign; secondly, a perception of racism and Islamophobia toward Muslims in the UK; and thirdly, a profound sense of a lack of belonging to wider British society, reinforced by awareness of entrenched inequalities and poverty amongst British Muslims. But the report was removed from the Home Office website after the coalition government took power, and its recommendations buried.

For Mahmood, this sort of politicised suppression of the Home Office's own research on the drivers of violent radicalisation is a major reason why government counter-terrorism policies have failed. While he acknowledged that extremist ideology is an important factor, he emphasised: "Ideology is rarely ever the push factor. Usually, it's the last pull factor that helps to rationalise a violent course of action with pseudo-religious language that has already been decided on."

The obsession with ideology  and specifically with non-violent extremist' ideology  has meant that Muslims are being disproportionately targeted by draconian anti-terror laws, the result being to compound a sense of alienation and victimhood amongst more vulnerable members of Muslim communities.

"The disproportionate focus on Muslims is clear from the data on terrorism arrests," said Karmani. "If you compare two extremist groups, al-Muhajiroun and the English Defence League (EDL), they are exactly the same. Both advocate violence and have links to violent organisations. The EDL for instance has links with far right neo-Nazi groups involved in violence. Yet al-Muhajiroun is proscribed and the EDL isn't. When you compare the arrests of members of both groups, you find that despite committing exactly the same sorts of crimes, al-Muhajiroun members are invariably arrested under terrorism legislation, whereas EDL and other far-right activists are arrested for civil order offenses, even though they do the same things."




MI5 and MI6 are the only agencies exempt from preventing terror




The incentive behind ramping up arrests of Muslims under the terrorism legislation, said Karmani, is precisely to vindicate pre-existing counter-terrorism policy. The large numbers are cited as empirical proof that the threat is real, and thus vindication of the policy and its approach. By seemingly proving the existence of an acute threat, they justify the growth of an already multi-billion pound security industry.

Perhaps the strangest element of the CTS bill, though, pertains to who is exempt from prevent duty.'

"The Counter-Terrorism and Security Act will make it a legal obligation on public sector workers to stop individuals from being drawn into terrorism. That is, except for the security agencies," said Asim Qureshi, research director of the London-based human rights and advocacy group, Cage Prisoners.

Why would MI5 and MI6, the very agencies tasked with protecting British national security at home and abroad, be exempt from the statutory obligation to prevent people from being drawn into terrorism?

According to Shoebridge, there might be "sound operational reasons" for the exemption, namely the need to have human intelligence inside a terrorist group to learn more about it. But, he said, this may not be the only reason.

"It's also true that ISIS and similar groups have acted as effective foreign policy tools for countries such as the UK in helping to destabilise perceived enemies such as Syria," said Shoebridge, referring to the lax attitude of countries like the US, Britain and France to their own nationals traveling to Syria and Iraq between 2011 and 2013, because it suited the strategy of toppling Assad. "Arguably, such a tool could be lost if the intelligence services were under a legal obligation not only to monitor such activities, but also to prevent them."

There is mounting evidence that Britain, alongside the US and France, played a lead role in coordinating financial and military support to anti-Assad rebels, most of which ended up in the hands of the most virulent extremists, including al-Qaeda and Islamic State' (IS). Even now, key allies like Turkey who are supposed to be fighting IS and training moderate' rebels continue to support al-Qaeda and IS-linked rebels, yet are slavishly courted by the US and UK rather than reprimanded.

Qureshi  whose organization exposed how one of Lee Rigby's killers had been known to MI5 and MI6 for years, and had harassed him to become an informant before allowing the Kenyan authorities to torture him  further argued that the exemption is "in all likelihood to allow [the security agencies] to continue their entrapment exercises, and to continue using agent provocateurs in communities to incite vulnerable individuals. The entire notion of their exemption is hypocritical."

Historians of MI5 and MI6 have documented that throughout their existence, entrapment has been a common practice used to foil plots that are to a significant extent laid out by the agencies themselves  often to target all sorts of democracy activists, from environmental protestors and antiwar campaigners, to nationalists and suffragettes.

According to Des Thomas, who during his career had investigated environmental and animal rights groups, Qureshi's view could be correct. "The exemption of MI5 and MI6 is connected to the use of informants," Thomas told me, in order to "infiltrate agents into organisations which contain political criminals."

Much of this is to do with avoiding legal liability for potential consequences when the use of informants, or the effort to recruit them, backfires, as it appeared to do in the case of Lee Rigby. "There is nothing more treacherous than an informant," said Thomas.

"Imagine if the police arrested an informant, and there was evidence that he or she had played MI5 and MI6 for mugs, and as a result had managed to perpetrate a 7/7 atrocity. In short, the exemption is a get out of jail card for those who may be guilty of poor leadership and management at MI5 and MI6."

Although MI5 to this day claims the 7/7 bombers had only entered the radar of the intelligence service on the periphery of another investigation, and not fully identified, police and intelligence sources confirmed that all four of the 7/7 bombers had in fact been identified and under surveillance. Thomas has previously criticised the security services on these grounds, and supported the call for an independent public inquiry into the London bombings.

If these experts are correct, then far from making us safer, the new law will set Britain on the road to becoming a more paranoid and polarised society, vulnerable to another terrorist attack, where political dissent and freedom of speech are criminalised as threats to public safety.

Welcome to Great Britain.

Welcome to Prevent.

Welcome to the Police State.
“The most difficult subjects can be explained to the most slow-witted man if he has not formed any idea of them already; but the simplest thing cannot be made clear to the most intelligent man if he is firmly persuaded that he knows already, without a shadow of doubt, what is laid before him.”
― Leo Tolstoy,
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Dumbo : how the CIA blind surveillance cameras Magda Hassan 0 33,952 14-08-2017, 12:16 AM
Last Post: Magda Hassan
  HR 658 Authorizes 30.000 surveillance drones over the USA - to be increased! Peter Lemkin 8 17,320 31-01-2017, 02:50 AM
Last Post: Magda Hassan
  AP Sues US Gov’t over Fake FBI News Article Booby Trapped with Surveillance Virus Magda Hassan 0 5,767 06-12-2015, 02:39 PM
Last Post: Magda Hassan
  The Limits of The Panopticon Magda Hassan 0 5,475 22-11-2015, 07:41 AM
Last Post: Magda Hassan
  US spy chief Clapper defends Prism and phone surveillance David Guyatt 485 105,411 13-12-2014, 10:08 AM
Last Post: David Guyatt
  'Five Eyes' surveillance pact should be published, Strasbourg court told Magda Hassan 1 3,917 09-09-2014, 09:34 AM
Last Post: David Guyatt
  Defensive Shift - Turning the Tables on Surveillance Magda Hassan 0 3,542 26-08-2014, 03:14 PM
Last Post: Magda Hassan
  Surveillance Capitalism Magda Hassan 0 3,088 05-07-2014, 02:44 AM
Last Post: Magda Hassan
  Biggest anti-mass surveillance event in the U.K. Magda Hassan 2 6,009 12-06-2014, 10:05 AM
Last Post: Magda Hassan
  Secret EU surveillance drone project revealed David Guyatt 0 4,281 12-02-2014, 09:43 AM
Last Post: David Guyatt

Forum Jump:


Users browsing this thread: 1 Guest(s)