| Internet/Surveillance |
|Interest of||Yasha Levine|
|Wholesale surveillance of the citizenry is the new normal, introduced under the smokescreen of the "war on terror".|
The Internet is monitored as never before...
The official narrative is that mass surveillance of the internet is needed as part of the "war on terror" to prevent the nebulous threat of cyberterrorism. NSA director Keith Alexander has repeatedly lied about the illegal mass surveillance programmes, including the spurious but often repeated claim that mass surveillance "thwarted" 54 terror events. Under questioning about this, he reduced that number to one, which did not itself withstand close scrutiny. The correct figure would appear to be zero.
Large scale surveillance is carried out routinely by a variety of strategies. Individual, personalised, surveillance is carried out against specific targets.
Closed source software, such as that provided by Apple or Microsoft should be assumed to have no effective ability to prevent surveillance against the deep state, whatever 'privacy settings' are presented and whatever claims are made to the contrary.
Open source software allows users to inspect the source and thus (if they have sufficient technical skill) to understand what the software is doing.
Security researchers have uncovered systematic abuse by internet service providers in USA, including injection unique identifiers into users' web traffic to allow easy construction of personal browsing profiles.
By 2017, hundreds of the most popular websites were using “session replay scripts” to capture every click and keystroke to allow site operators to access information that users didn't actually submit.
In 2014 it was revealed via Edward Snowden that the NSA routinely backdoors networking hardware exported from the USA. Further, it stands to reason that some "bugs" in commercially available hardware are deliberate design flaws or planned features to give state actors speedy access to any system. The peculiar destruction of Laptops from The Guardian that held part of the Snowden archive, which was reported about by Privacy International in 2014, showed that GCHQ targeted specific chips on the mainboard and related components, while it could have chosen to instead/or in addition shred the whole hardware to conceal this very specific action. Intelligence agencies, when they get initial access to a system through a browser, may choose, depending on the capability and value of a target, to not write the data for their surveillance tools on the hard drive where it could more or less easily be found, but on these very chips whose firmware can likely be rewritten, as it is known to be the case with all USB components. This would make it possible to bypass all security monitoring and measures initiated on the level of the operating system running on the device. It is not clear if the restitution by GCHQ, the way it was done, was deliberate to communicate this very fact, or by mistake.
The legal status of mass internet surveillance is seldom questioned by the commercially-controlled media. Many national governments have passed legislation to try to prevent anonymous internet access, for example, by mandating a registry of all internet users and obliging ISPs to save connection and IP address data. Even one decade ago many countries still had consumer privacy legislation in force which mandated the exact opposite, but such legislation was overturned and monitoring is quickly becoming the rule rather than the exception.
In September 2014, Australian laws were being read which allows law enforcement agencies to obtain a warrant to access data from a computer — but which also redefine “a computer” to mean not only “one or more computers” but also “one or more computer networks”. Since the Internet itself is nothing but a large network of computer networks, it seems difficult to avoid the conclusion that the bill may allow the spy agency to carry out surveillance on the entire Internet with a single warrant.
In May 2014, New Zealand passed the Telecommunications (Interception Capability and Security) Act (TICSA), which mandates that ISPs use specified hardware for their networking and would only be allowed to build a network subject to certain specifications. They must get government approval for their building of internet infrastructure and must ensure that government agencies can access customer data and connections when needed.
GCHQ have admitted to collecting millions of images from unwitting computer users' webcams, some of which are pornographic in nature. In response to a lawsuit by a coalition of internet privacy groups, Charles Farr, the Director General of the Office for Security and Counter Terrorism, claimed that the indiscriminate interception of UK residents use of Facebook, Google, Hotmail and Twitter was by UK law because they qualified as "external communications", since the platforms were located in US.
In contrast to Barack Obama's public claim that he "welcomes" a debate on government surveillance, the US federal government has been secretly advising local police forces not to disclose details about mass surveillance technology suich as the 'Stingray' with which they are sweeping up cellphone data from entire neighbourhoods.
Clapper v. Amnesty International
- Full article: Clapper v. Amnesty International
- Full article: Clapper v. Amnesty International
According to Jameel Jaffer, deputy legal director of the ACLU, who argued Clapper v. Amnesty International before the US Supreme Court which challenged amendments made in 2008 to the Foreign Intelligence Surveillance Act essentially allow the National Security Agency (NSA) "to engage in dragnet surveillance of Americans’ international communications", even those "who might not be suspected at all of having done anything wrong," so that "it’s a very broad surveillance statute", "arguably broader than any surveillance statute that Congress has sanctioned in the past." The US Supreme Court, by requiring the plaintiffs to show that they, themselves, have been monitored under the law, has essentially created a barrier to judicial review preventing anyone from ever challenging this kind of statute in court as, indeed, nobody can show that they have been monitored under the law since the government is not disclosing its targets.
In 1998, the Russian government passed a law stating that all Internet Service Providers must install a computer black box with a link back to the FSB to record all the Internet activity of their users.
|National Security Agency||“Your Data: If You Have Nothing to Hide, You Have Nothing to Fear”||National Security Agency|
- https://www.theverge.com/2017/9/12/16294904/bluetooth-hack-exploit-android-linux-blueborne saved at Archive.org and Archive.is
- https://www.synacktiv.com/ressources/TCP32764_backdoor_again.pdf saved at Archive.org
- https://medium.com/@nweaver/how-the-nsa-could-hack-almost-any-browser-1b5ab05ac74e saved at Archive.is
- https://www.wired.com/2014/07/usb-security/ saved at Archive.org saved at Archive.is
- "ACLU Blasts Supreme Court Rejection of Challenge to Warrantless Spying Without Proof of Surveillance". Democracy Now!. February 27, 2013. Retrieved 21 April 2013.Page Module:Citation/CS1/styles.css must have content model "Sanitized CSS" for TemplateStyles (current model is "Scribunto").