Category: Privacy


Researchers Uncover Government Spy Tool Used To Hack Telecoms And Belgian Cryptographer

 

 

Regin-Architecture

 

 

” It was the spring of 2011 when the European Commission discovered it had been hacked. The intrusion into the EU’s legislative body was sophisticated and widespread and used a zero-day exploit to get in. Once the attackers established a stronghold on the network, they were in for the long haul. They scouted the network architecture for additional victims and covered their tracks well. Eventually, they infected numerous systems belonging to the European Commission and the European Council before being discovered.

  Two years later another big target was hacked. This time it was Belgacom, the partly state-owned Belgian telecom. In this case, too, the attack was sophisticated and complex. According to published news reports and documents leaked by Edward Snowden, the attackers targeted system administrators working for Belgacom and used their credentials to gain access to routers controlling the telecom’s cellular network. Belgacom publicly acknowledged the hack, but has never provided details about the breach.

  Then five months after that announcement, news of another high-profile breach emerged—this one another sophisticated hack targeting prominent Belgian cryptographer Jean-Jacques Quisquater. “

 

 

 

 

 

” Now it appears that security researchers have found the massive digital spy tool used in all three attacks. Dubbed “Regin” by Microsoft, more than a hundred victims have been found to date, but there are likely many others still unknown. That’s because the espionage tool—a malicious platform capable of taking over entire networks and infrastructures—has been around since at least 2008, possibly even earlier, and is built to remain stealth on a system for years.

  The threat has been known since at least 2011, around the time the EU was hacked and some of the attack files made their way to Microsoft, who added detection for the component to its security software. Researchers with Kaspersky Lab only began tracking the threat in 2012, collecting bits and pieces of the massive threat. Symantec began investigating it in 2013 after some of its customers were infected. Putting together information from each, it’s clear the platform is highly complex and modulated and can be customized with a wide range of capabilities depending on the target and the attackers’ needs. Researchers have found 50 payloads so far for stealing files and other data, but have evidence that still more exist.

“ It’s a threat that everyone has detected for some time, but no one has exposed [until now],” says Eric Chien, technical director of Symantec’s Security Technology and Response division.

  The researchers have no doubt that Regin is a nation-state tool and are calling it the most sophisticated espionage machine uncovered to date—more complex even than the massive Flame platform, uncovered by Kaspersky and Symantec in 2012 and crafted by the same team who created Stuxnet. “

 

The whole story may be read at Wired

 

 

 

 

 

 

 

 

 

About these ads

Americans Rate Two Agencies Worse Than The IRS

 

 

 

 

” What’s America’s favorite federal agency? Apparently it’s the U.S. Postal Service. Beyond the rate hikes, job cuts, hemorrhaging finances, processing center closures, union tensions and persistent calls for reform, a large majority of people—72 percent—think USPS does an “excellent” or “good” job. That’s a significantly higher rating than the next highest runner up, the FBI, at 58 percent, according to a new Gallup poll assessing American’s perceptions of 13 agencies.

  Four of the 13 agencies included in the poll—Postal Service, the Secret Service, the Federal Emergency Management Agency and the Veterans’ Affairs Department—were rated for the first time.

  Perhaps most striking was the fact that two agencies rated lower in Americans’ esteem than the scandal-plagued Internal Revenue Service, which may have the most onerous mission among federal agencies—parting people from their money. While only 41 percent of respondents thought IRS was doing a good to excellent job, fewer thought the Federal Reserve Board or Veterans Administration were doing excellent to good work, 38 percent and 29 percent, respectively. “

 

Story continues

 

 

 

 

 

 

 

 

 

Justice Department Defends US Marshals’ Airborne Cell Tower Spoofers; Refuses To Acknowledge Program Exists

 

 

 

 

 

 

” The Justice Department has been summoned to say a few words in defense of the US Marshals’ Cessna-mounted cell tower spoofers. And while it tried to leave a lot unsaid, it actually said quite a bit.

  The Justice Department, without formally acknowledging the existence of the program, defended the legality of the operation by the U.S. Marshals Service, saying the agency doesn’t maintain a database of everyday Americans’ cellphones.

  Because America’s criminal element is forever only moments away from permanently escaping the grasp of law enforcement, the DOJ has refused to confirm or deny the existence of technology everyone already knows exists — IMSI catchers and single-engine aircraft. The DOJ’s caginess is commendable. I’m sorry, I mean ridiculous. Here’s the same official further protecting and defending The Program That Dare Not Confirm Its Existence, using statements that indicate the program exposed by the Wall Street Journal not only exists, but functions pretty much as described.

  A Justice Department official on Friday refused to confirm or deny the existence of such a program, because doing so would allow criminals to better evade law enforcement. But the official said it would be “utterly false’’ to conflate the law-enforcement program with the collection of bulk telephone records by the National Security Agency, a controversial program already being challenged in the courts and by some members of Congress.

  No one’s conflating the feds’ airborne ‘Stingray’ with the NSA’s ongoing bulk phone records collections. All people have done is note that surveillance technology of this sort has the ability to collect (and store) millions of unrelated phone records in a very short period of time. “

 

Read the rest at Techdirt

 

 

 

 

 

 

 

 

 

Mt Martha Woman Snapped Sunbaking In G-String By Real Estate Drone

 

 

 

” A BOARD showing a G-string-clad woman has been removed after she became the accidental attraction in a real estate advertising campaign for a house sale in Mt Martha.

  An ambitious agent enlisted a drone to take an aerial photograph of the property, which includes a sweeping image of the beach.”

 

 

 

 

 

 

” But the picture also captured small business owner Mandy Lingard, a mother of three and grandmother of one, sunbaking topless in the privacy of her back yard.

  The image, which includes Ms Lingard lying face down wearing just a G-string, was on the display advertising board outside her neighbour’s house before being removed today.

“I heard a noise and then I saw this odd thing flying around and thought it was a kid’s toy. It hovered around and luckily I was face down at the time,” Ms Lingard said.”

 

 

Read more at Perth Now

Maryland School Survey: Sex Questions Not The Most Relevant Issue…All Parents Need To Read This!

 

Maryland Grade School Survey

 

 

 

” It is always the stories that I assume are going to be easy that morph into the most important. EVERY PARENT WITH CHILDREN IN PUBLIC SCHOOL NEED TO DOWNLOAD THIS SURVEY. Not just Maryland parents, all parents. If Maryland has one of these surveys, eventually your state or the Federal Government will be getting something similar to this, into your child’s hands. This survey is: “Middle School FALL 2014 Maryland Youth Tobacco and Risk Behavior Survey”, Montgomery County sixth, seventh, and eighth graders. Basic age group is 11 to 14. The public school system is required to give these surveys, but parents have the choice to “opt-out” their children. The surveys are supposed to be anonymous, but that is highly suspect, based on some of the questions. This information is allegedly being collected to improve health education. The Maryland Department of Education and the Centers for Disease Control and Prevention are the originators of these surveys.

  There are 83 multiple choice questions, covering a wide range of topics. The four questions (#51-#54) regarding sex are not the most dangerous, inappropriate, or invasive of the questions. Some questions are asked more than once, just the way it is asked is different. This is a common technique to get the truth, not just the answer the child thinks is the ‘right’ answer. The length isjust long enough to lose the attention span of children and adults alike. I found myself drifting by the third time I reached a tobacco related question. They are interspersed throughout the survey. This isanother covert way to get the truth. Normally I advocate telling the truth, the whole truth, and nothing but the truth, however, when the ‘truth’ might possibly be used against you for a nefarious purpose, I object. I would encourage all parents to “opt-out” their children. “

 

The DC Gazette has the details and here is a PDF link to the survey itself 

 

 

 

 

 

 

 

 

 

AT&T Stops Adding Web Tracking Codes On Cellphones

” AT&T Mobility, the nation’s second-largest cellular provider, said Friday it’s no longer attaching hidden Internet tracking codes to data transmitted from its users’ smartphones. The practice made it nearly impossible to shield its subscribers’ identities online.

  The change by AT&T essentially removes a hidden string of letters and numbers that are passed along to websites that a consumer visits. It can be used to track subscribers across the Internet, a lucrative data-mining opportunity for advertisers that could still reveal users’ identities based on their browsing habits.

  Verizon Wireless, the country’s largest mobile firm, said Friday it still uses this type of tracking, known as “super cookies.” Verizon spokeswoman Debra Lewis said business and government customers don’t have the code inserted. There has been no evidence that Sprint and T-Mobile have used such codes.

” As with any program, we’re constantly evaluating, and this is no different,” Lewis said, adding that consumers can ask that their codes not be used for advertising tracking. But that still passes along the codes to websites, even if subscribers say they don’t want their data being used for marketing purposes.

  The tracking codes are part of the latest plan by the cellular industry to keep tabs on users and their devices. While the codes don’t explicitly contain personal information, they’re unique and nonetheless sent to websites alongside personal details that a user may submit voluntarily — like a name or a phone number.

  That means enough data can transform a large chunk of random digits into a digital fingerprint that’s as identifying as a Social Security number. AT&T said Friday its tracker was part of a testing project that’s been phased off of its network.

” This is more like a license plate for your brain,” said Jacob Hoffman-Andrews, a senior staff technologist with the Electronic Frontier Foundation, a civil liberties organization that opposed the practice. “Everything you wonder about, and read, and ask the Internet about gets this header attached to it. And there are ad agencies out there that try to associate that browsing history with anything that identifies you.”

AP News

Last Week Tonight With John Oliver: Net Neutrality

 

 

 

     We’ve run this video before but now that the FCC’s attempt to regulate the internet have been brought back to the public’s attention we thought that Mr Oliver’s take on the cronyism and statism that is represented by the Obama administration’s plans to make the internet a “public utility” deserve further prominence . 

Americans’ Cellphones Targeted In Secret Spy Program

 

 

 

” The Justice Department is scooping up data from thousands of cellphones through fake communications towers deployed on airplanes, a high-tech hunt for criminal suspects that is snagging a large number of innocent Americans, according to people familiar with the operations.

  The U.S. Marshals Service program, which became fully functional around 2007, operates Cessna aircraft from at least five metropolitan-area airports, with a flying range covering most of the U.S. population, according to people familiar with the program.

  Planes are equipped with devices–some known as “dirtboxes” to law-enforcement officials because of the initials of the Boeing Co. BA, +0.26%  unit that produces them–which mimic cell towers of large telecommunications firms and trick cellphones into reporting their unique registration information.”

 

Market Watch

 

 

 

 

 

 

 

 

 

Masque Attack: All Your iOS Apps Belong To Us

 

 

 

 

 

 

” In July 2014, FireEye mobile security researchers have discovered that an iOS app installed using enterprise/ad-hoc provisioning could replace another genuine app installed through the App Store, as long as both apps used the same bundle identifier. This in-house app may display an arbitrary title (like “New Flappy Bird”) that lures the user to install it, but the app can replace another genuine app after installation. All apps can be replaced except iOS preinstalled apps, such as Mobile Safari. This vulnerability exists because iOS doesn’t enforce matching certificates for apps with the same bundle identifier. We verified this vulnerability on iOS 7.1.1, 7.1.2, 8.0, 8.1 and 8.1.1 beta, for both jailbroken and non-jailbroken devices. An attacker can leverage this vulnerability both through wireless networks and USB. We named this attack “Masque Attack,” and have created a demo video here: ” (see above)

” We have notified Apple about this vulnerability on July 26. Recently Claud Xiao discovered the “WireLurker” malware. After looking into WireLurker, we found that it started to utilize a limited form of Masque Attacks to attack iOS devices through USB. Masque Attacks can pose much bigger threats than WireLurker. Masque Attacks can replace authentic apps,such as banking and email apps, using attacker’s malware through the Internet. That means the attacker can steal user’s banking credentials by replacing an authentic banking app with an malware that has identical UI. Surprisingly, the malware can even access the original app’s local data, which wasn’t removed when the original app was replaced. These data may contain cached emails, or even login-tokens which the malware can use to log into the user’s account directly.

  We have seen proofs that this issue started to circulate. In this situation, we consider it urgent to let the public know, since there could be existing attacks that haven’t been found by security vendors. We are also sharing mitigation measures to help iOS users better protect themselves.

Security Impacts

  By leveraging Masque Attack, an attacker can lure a victim to install an app with a deceiving name crafted by the attacker (like “New Angry Bird”), and the iOS system will use it to replace a legitimate app with the same bundle identifier. Masque Attack couldn’t replace Apple’s own platform apps such as Mobile Safari, but it can replace apps installed from app store. Masque Attack has severe security consequences:

  1. Attackers could mimic the original app’s login interface to steal the victim’s login credentials. We have confirmed this through multiple email and banking apps, where the malware uses a UI identical to the original app to trick the user into entering real login credentials and upload them to a remote server.
  2. We also found that data under the original app’s directory, such as local data caches, remained in the malware local directory after the original app was replaced. The malware can steal these sensitive data. We have confirmed this attack with email apps where the malware can steal local caches of important emails and upload them to remote server.
  3. The MDM interface couldn’t distinguish the malware from the original app, because they used the same bundle identifier. Currently there is no MDM API to get the certificate information for each app. Thus, it is difficult for MDM to detect such attacks.
  4. As mentioned in our Virus Bulletin 2014 paper “Apple without a shell – iOS under targeted attack”, apps distributed using enterprise provisioning profiles (which we call “EnPublic apps”) aren’t subjected to Apple’s review process. Therefore, the attacker can leverage iOS private APIs for powerful attacks such as background monitoring (CVE-2014-1276) and mimic iCloud’s UI to steal the user’s Apple ID and password.
  5. The attacker can also use Masque Attacks to bypass the normal app sandbox and then get root privileges by attacking known iOS vulnerabilities, such as the ones used by the Pangu team. “

 

Read more on how to protect yourself from this latest iPhone privacy threat .

 

 

 

 

 

 

 

 

 

Drones Now Patrol Half Of Mexico Border

 

 

 

 

 

 

” The U.S. government now patrols nearly half the Mexican border by drones alone in a largely unheralded shift to control desolate stretches where there are no agents, camera towers, ground sensors or fences, and it plans to expand the strategy to the Canadian border.

  It represents a significant departure from a decades-old approach that emphasizes boots on the ground and fences. Since 2000, the number of Border Patrol agents on the 1,954-mile border more than doubled to surpass 18,000 and fencing multiplied nine times to 700 miles.

  Under the new approach, Predator Bs sweep remote mountains, canyons and rivers with a high-resolution video camera and return within three days for another video in the same spot, according to two officials with direct knowledge of the effort on condition of anonymity because details have not been made public.

  The two videos are then overlaid for analysts who use sophisticated software to identify tiny changes — perhaps the tracks of a farmer or cows, perhaps those of immigrants who entered the country illegally or a drug-laden Hummer, they said.

  About 92 percent of drone missions have shown no change in terrain, but the others raised enough questions to dispatch agents to determine if someone got away, sometimes by helicopter because the area is so remote. The agents look for any sign of human activity — footprints, broken twigs, trash.

  About 4 percent of missions have been false alarms, like tracks of livestock or farmers, and about 2 percent are inconclusive. The remaining 2 percent offer evidence of illegal crossings from Mexico, which typically results in ground sensors being planted for closer monitoring.”

 

NewsMax has the story

 

 

 

 

 

 

 

 

 

 

Guns And Pot: Which States Are Friendly To Both?

 

 

 

 

” A Reddit user recently posted a graphic called “The Venn Diagram of Cultural Politics,” showing which states allow at least some citizens to use marijuana, which states recognize gay marriages, and which do both. The chart got us wondering: Which places embrace the personal freedoms beloved by the left and the right? Where can you buy both a vibrator and a Big Gulp? Where can a gay couple not just marry but avoid a high sin tax on the cigarettes they smoke after sex? Where can you carry a gun while passing a joint?

  The image below tackles that last question. If you include states that have legalized marijuana for medicinal purposes only, there are now 24 states that permit pot. There are 42 states where an adult non-felon’s right to carry a concealed gun is either unrestricted or subject only to permissive “shall issue” laws. Sixteen states fall into both categories.

  If you narrow the question, though—limiting yourself to places that allow marijuana even without a prescription and concealed carry even without a permit—the intersection shrinks to contain just one state. The Guns and Dope Party has found its regional base.”

 

Reason

 

 

 

 

 

 

 

 

 

House Committee Demands Answers On Truthy Project

 

 

 

 

 

 

” The House Science, Space, and Technology Committee sent a letter to the head of the National Science Foundation (NSF) on Monday, demanding answers about the origins of the nearly $1 million taxpayer-funded project to track “misinformation” on Twitter.

  The Truthy project, being conducted by researchers at Indiana University, is under investigation for targeting political commentary on Twitter. The project monitors “suspicious memes,” “false and misleading ideas,” and “hate speech,” with a goal of one day being able to automatically detect false rumors on the social media platform.

  The web service has been used to track tweets using hashtags such as #tcot (Top Conservatives on Twitter), and was successful in getting accounts associated with conservatives suspended, according to a 2012 book co-authored by the project’s lead researcher, Filippo Menczer, a professor of Informatics and Computer Science at Indiana University.

  Menczer has also said that Truthy monitored tweets using #p2 (Progressive 2.0), but did not discuss any examples of getting liberal accounts suspended in his book.

“ The Committee and taxpayers deserve to know how NSF decided to award a large grant for a project that proposed to develop standards for online political speech and to apply those standards through development of a website that targeted conservative political comments,” wrote Chairman Lamar Smith (R., Texas) in a letter to NSF Director France Cordova. 

“ While some have argued that Truthy could be used to better understand things like disaster communication or to assist law enforcement, instead it appears Truthy focused on examples of ‘false and misleading ideas, hate speech, and subversive propaganda’ communicated by conservative groups,” he said.”

 

    Latecomers can find out more on the “Truthy Project” here and read more about the Congressional investigation here .

 

 

 

 

 

 

 

 

 

Hidden Camera Shows What Cleaners Really Get Up To In Your Hotel Room

 

 

 

 

” Almost every time we stay at a hotel, especially a ‘brand-name’ hotel, we leave our trust in the hands of those that clean our rooms when we’re out.

  It’s just normal for us to believe that these people have respect for our privacy. However, someone recently tested this theory out in a ‘brand-named’ hotel, and what he caught on camera was actually quite eye opening.

  Watch as this cleaner browses through this guy’s luggage, checks out his PS3 games, spends a good few minutes trying to log into his tablet and laptop then finally decides to do a bit of (pretty casual) cleaning.”

UniLad

 

 

 

 

 

 

 

 

 

 

 

A Creepy Website Is Streaming From 73,000 Private Security Cameras

 

A Creepy Website Is Streaming From 73,000 Private Security Cameras

 

” It shouldn’t be so easy to peer into a stranger’s bedroom, much less hundreds of strangers’ bedrooms. But a website has collected the streaming footage from over 73,000 IP cameras whose owners haven’t changed their default passwords. Is this about highlighting an important security problem, or profiting off creepy voyeurism—or both?

  Insecam claims to feature feeds from IP cameras all over the world, including 11,000 in the U.S. alone. A quick browse will pull up parking lots and stores but also living rooms and bedrooms. “This site has been designed in order to show the importance of the security settings,” the site’s about page says. But it’s also clearly running and profiting off ads. “

Gizmodo has more

Rap Sheets, Watchlists And Spy Networks Now Available With Single Click

 

 

 

” Law enforcement officials nationwide now have the ability to search multiple sensitive databases, including spy agency intranets and homeland security suspicious activity reporting – with a single login. 

  The breakthrough in interconnectivity is expected to close information gaps that, among other things, have contributed to the rise in homegrown terrorism and school shootings. 

” Let’s say you have a lone-wolf incident or an active-shooter incident, where you need to be able to securely share information in a timely way. With a single sign-on capability, there is no wrong door,” Kshemendra Paul, program manager for the Information Sharing Environment at the Office of Director of National Intelligence, said during an interview. “If you have an account, you can get to the virtual command center that the fusion center may be using – in a very direct way.” “

 

Read it all at NextGov.com

 

 

 

 

 

 

 

 

 

Court Rules Police Can Force Users To Unlock iPhones With Fingerprints, But Not Passcodes

 

 

 

 

 

” A Circuit Court judge in Virginia has ruled that fingerprints are not protected by the Fifth Amendment, a decision that has clear privacy implications for fingerprint-protected devices like newer iPhones and iPads.

  According to Judge Steven C. Fucci, while a criminal defendant can’t be compelled to hand over a passcode to police officers for the purpose of unlocking a cellular device, law enforcement officials can compel a defendant to give up a fingerprint.

  The Fifth Amendment states that “no person shall be compelled in any criminal case to be a witness against himself,” which protects memorized information like passwords and passcodes, but it does not extend to fingerprints in the eyes of the law, as speculated by Wired last year. “

 

MacRumors

 

 

 

 

 

 

 

 

 

Sharyl Attkisson Releases Chilling Video Of Mysterious Deletions On Her Computer

 

 

 

 

 

 

” Investigative journalist Sharyl Attkisson, a senior independent contributor to The Daily Signal, released video showing what she believes to be a hacker deleting data from her computer right before her eyes.

  Attkisson began experiencing technological problems during her reporting of the 2012 terrorist attacks on the U.S. consulate in Benghazi, Libya, she writes in her new book, “Stonewalled: My Fight for Truth Against the Forces of Obstruction, Intimidation, and Harassment in Obama’s Washington.”

  One September night last year while Attkisson — then with CBS News —  prepped for an interview with Thomas Pickering, chairman of the Benghazi Accountability Review Board, she watched as information in a document began disappearing before her eyes. The information, she writes, was “deleted line by line in a split second: it’s gone, gone, gone.” “

 

Read more

 

 

 

 

 

 

 

 

 

 

California Officer Allegedly Stole Nude Photos During Arrest

 

 

 

 

” A California Highway Patrol officer is being investigated for allegedly sending nude photos of a DUI suspect from her cell phone to his personal phone.

  The Contra Costa, Calif., district attorney’s office is investigating Sean Harrington, 35, of Martinez, for a possible felony computer theft charge.

  Harrington is suspected of sending himself six photos of a 23-year-old San Ramon, Calif., woman in a state of undress while she was being booked into Martinez County Jail in August. He allegedly found the photos stored on her iPhone. “

 

UPI

 

 

 

 

 

 

 

 

 

 

Civil Liberties Groups Appeal Ruling Over Automatic License Plate Reader Data

 

 

 

 

” The Electronic Frontier Foundation and the ACLU Foundation of Southern California are taking the fight over automatic license plate reader (ALPR) data to the next level by asking the California Court of Appeal to rule that the public has a right to know how Los Angeles cops are tracking their locations.

  ALPRs are cameras mounted to patrol cars and fixed locations, such as light poles, that are able to capture, process, and store the license plates of every vehicle that passes nearby. The Los Angeles Police Department and Los Angeles County Sheriff’s Department together collect close to 3 million license plates each week; these data points could give police an intimate picture of the comings and goings of the entire population over several years. By our estimates, these agencies currently have an average of 61 plate scans for each vehicle registered in Los Angeles County.”

 

EFF has more

 

 

 

 

 

 

 

New York’s Registry Of Mentally Ill People Barred From Having Firearms Draws Heavy Criticism

 

 

 

 

 

 

” A newly created database of New Yorkers deemed too mentally unstable to carry firearms has grown to roughly 34,500 names, a previously undisclosed figure that has raised concerns among some mental health advocates that too many people have been categorized as dangerous.

  The database, established in the aftermath of the mass shooting in 2012 at the Sandy Hook Elementary School in Newtown, Connecticut, and maintained by the state Division of Criminal Justice Services, is the result of the Safe Act. It is an expansive package of gun control measures pushed through by the administration of Gov. Andrew M. Cuomo. The law, better known for its ban on assault weapons, compels licensed mental health professionals in New York to report to the authorities any patient “likely to engage in conduct that would result in serious harm to self or others.

  But the number of entries in the database highlights the difficulty of America’s complicated balancing act between public safety and the right to bear arms when it comes to people with mental health issues.

“ That seems extraordinarily high to me,” said Sam Tsemberis, a former director of New York City’s involuntary hospitalization program for homeless and dangerous people, now the chief executive of Pathways to Housing, which provides housing to the mentally ill. “Assumed dangerousness is a far cry from actual dangerousness.” “

 

Post Gazette

 

With This Tiny Box, You Can Anonymize Everything You Do Online

 

 

 

 

 

 

” No tool in existence protects your anonymity on the Web better than the software Tor, which encrypts Internet traffic and bounces it through random computers around the world. But for guarding anything other than Web browsing, Tor has required a mixture of finicky technical setup and software tweaks. Now routing all your traffic through Tor may be as simple as putting a portable hardware condom on your ethernet cable.

  Today a group of privacy-focused developers plans to launch a Kickstarter campaign for Anonabox. The $45 open-source router automatically directs all data that connects to it by ethernet or Wifi through the Tor network, hiding the user’s IP address and skirting censorship. It’s also small enough to hide two in a pack of cigarettes. Anonabox’s tiny size means users can carry the device with them anywhere, plugging it into an office ethernet cable to do sensitive work or in a cybercafe in China to evade the Great Firewall. The result, if Anonabox fulfills its security promises, is that it could become significantly easier to anonymize all your traffic with Tor—not just Web browsing, but email, instant messaging, filesharing and all the other miscellaneous digital exhaust that your computer leaves behind online.

 

Wired has more

 

 

 

 

 

 

 

 

 

 

 

 

A Dramatic Number Of Teens Just Dropped Facebook

 

 

 

 

” Facebook can’t stay on top forever—not with so many new social apps nipping at its heels, anyway. A new survey of 7,200 U.S. students by research group Piper Jaffray suggests that the social giant is in fact dramatically losing teen users, despite what COO Sheryl Sandberg might want us to believe. In spring 2014, 72 percent of respondents between the ages of 13 and 19 reported that they used Facebook; by fall 2014, that number fell to 45 percent. By all accounts, that’s a massive drop for a company that’s downplayed its waning popularity among the key demographic of younger users for the last year.

  Facebook proper may have fallen from grace, but Facebook-owned Instagram is on the rise among teens. The number of teens using Instagram nudged upward from 69 percent to 76 percent in the same time period while Twitter fell slightly from 63 percent to 59 percent, Google+ dropped considerably from 29 percent to 12 percent and Twitter, Pinterest, and Reddit held steady.”

 

Daily Dot

 

 

 

 

 

 

 

 

 

This Is How The Feds Illegally Obtain Evidence Of A Crime And Lie About It In Court

 

 

 

” The president continues to dispatch his National Security Agency (NSA) spies as if he were a law unto himself, and Congress—which is also being spied upon—has done nothing to protect the right to privacy that the Fourth Amendment was written to ensure. Congress has taken an oath to uphold the Constitution, yet it has failed miserably to do so. But the spying is now so entrenched in government that a sinister and largely unnoticed problem lurks beneath the surface.

  NSA documents released by Edward Snowden show that the feds seriously deceived Congress and the courts in an effort to spy upon all of us and to use the gathered materials in criminal prosecutions, even though they told federal judges they would not. Among the more nefarious procedures the feds have engaged in is something called “parallel reconstruction.” This procedure seeks to hide the true and original source of information about a criminal defendant when it was obtained unlawfully.

  Thus, in order to maintain the facade of spying only for domestic intelligence purposes, and to appear faithful to public and secret promises (the FISA court only sits in secret) that any evidence of criminal behavior inadvertently discovered by NSA spies will not be used in criminal prosecutions, and so as to keep the mechanisms of domestic spying hidden from non-FISA federal judges who are more likely to apply normative interpretations of the Fourth Amendment than their FISA court colleagues, the NSA and the DOJ began the process of parallel reconstruction.

  Parallel reconstruction consists largely of the creation of a false beginning—an untrue one—of the acquisition of evidence. This, of course, is criminal. Lawyers and agents for the NSA and DOJ may no more lawfully lie to federal judges and criminal defense attorneys about the true origins of evidence than may a bank robber who testifies in his own defense claiming to have been at Mass at the time of the robbery.

  While parallel reconstruction is deceptive, unlawful and unconstitutional, I suspect it is but the tip of a dangerous iceberg spawned by the unbridled NSA spying that Bush and Obama have given us. When you mix a lack of fidelity to the plain meaning of the Constitution with a legal fiction, and then add in a drumbeat of fear, enforced secrecy, and billions of unaccounted-for taxpayer dollars, you get a dangerous stew of unintended tyrannical consequences.”

 

Read the whole thing at Reason

 

 

 

 

 

 

 

 

 

 

 

 

How To Delete And Disable Your Google Location History

 

google map 1

 

 

” Google can track your location and show you on Google Maps and Google Earth where you have been recently, which you may find useful, interesting, or invasive. Here’s how to see if you have location history turned on and how to disable it.

  I had location history enabled for Google Maps and didn’t know it. I found it interesting to see which spots Google logged for me over the past week or month, and I don’t plan on disabling the service. It’s nice to know, however, that I can delete portions of my location history or all of it, as well as disable the feature from tracking me in the future.

  To see if you have location history enabled, head to the Google Maps Location history page. Click the gear-icon button to access History settings. Here, you can choose to disable or enable the service.”

 

 

 

 

 

 

” Disabling location history, however, does not remove your past history. If you’d like to erase the locations Google has stored for the past 30 days, head back to the Location history page. The default time period shows location history for the current day, so you may not see any plots on the map.

  Use the pull-down menu below the calendar on the left to show your history, up to 30 days. If you choose a time period in which Google has tracked your location, you’ll see the points where you’ve been on the map. And below the calendar, you’ll see options to delete your history from the time period you have chosen or to delete all history.”

 

 

CNET has all the details

 

 

 

 

 

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 6,844 other followers