"In a time of universal deceit telling the truth is a revolutionary act." -George Orwell

Posts Tagged ‘Apple’

Big Brother Is Prism: NSA Is Watching All Communications Over Phones, Facebook Google, Apple, Yahoo, Microsoft, Skype, Pal Talk, AOL & You Tube

In Uncategorized on June 7, 2013 at 8:01 pm

Prism Oldspeak:”It is a massive surveillance state of exactly the kind that the Church Committee warned was being constructed 35 years ago… the idea that the PATRIOT Act enables bulk collection, mass collection of the records of hundreds of millions of Americans, so that the government can store that and know what it is that we’re doing at all times, even when there’s no reason to believe that we’ve done anything wrong, that is ludicrous“. –Glenn Grunwald

If Someone want’s to know why their government has decided to go on fishing expedition through every personal record or private document – through library books they’ve read and phone calls they’ve made – this legislation gives people no rights to appeal the need for such a search in a court of law. No judge will hear their plea, no jury will hear their case. This is just plain wrong.” –Senator Barack Obama, 2005, On The USA Patriot Act.

I came in with a healthy skeptcism about these programs. My team evaluated them, we scrubbed them thoroughly, we actually expanded the oversight. But my assessment… was that they help us prevent terrorist attacks. And the modest encroachment… on privacy in getting phone numbers and durations without a name attached, and looking at content that – [I decided] net, it was worth us doing. Some other folks may have a different assessment. I think it’s important to recognize you can’t have 100 percent security and also 100 percent privacy, and also zero inconvenience. We’re going to have to make some choices as a society….In the abstract you can complain about Big Brother and how this is a program run amok, but when you actually look at the details, I think we’ve struck the right balance.” –President Barack Obama, 2013 

AHAHA! HA! My man went from “This is just plain wrong.” to “we scrubbed them throughly” and…decided it was worth doing.” My people Big Brother is OFFICIALLY watching you.  Obama was nice enough to scrub it down and balance it out for you, placing some of the burdens for surveillance on government and some on oligarchical collectivist corporations. We are living in the age of the painless concentration camp. Assume all your digital communications are insecure. I wonder though, when was it that society made these choices? When did “society” choose to be systematically surveilled during an endless war? To do away with, privacy safeguards, transparency, freedom of the press, freedom of speech, freedom of assembly, freedom from unlawful search & seizure, summary execution and indefinite detention? I think when Obama said “society” he meant the elites and the imperial institutions they control. If you look at what he said that way, it makes a lot more sense, as I’m fairly certain most of the people who live and suffer in this society did not make those “tough choices”.  The good news about this though is there are more and more leaks springing in the secret U.S. Government. This is the third whisleblower to speak the truth about Big Brother. Thomas Drake and Willam Binney preceded him. Hopefully, conscientious patriots will continue to expose the lies, illegality and anti-democratic actions of the Secret Corporatocracy. ”

Related Stories:

A Massive Surveillance State”: Glenn Greenwald Exposes Covert NSA Program Collecting Calls, Emails

We Don’t Live in a Free Country”: Jacob Appelbaum on Being Target of Widespread Gov’t Surveillance”

By Glenn Grunwald @ The U.K. Guardian:

Prism

A slide depicting the top-secret PRISM program.

The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.

The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.

The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims “collection directly from the servers” of major US service providers.

Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program.

In a statement, Google said: “Google cares deeply about the security of our users’ data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government ‘back door’ into our systems, but Google does not have a back door for the government to access private user data.”

Several senior tech executives insisted that they had no knowledge of Prism or of any similar scheme. They said they would never have been involved in such a program. “If they are doing this, they are doing it without our knowledge,” one said.

An Apple spokesman said it had “never heard” of Prism.

The NSA access was enabled by changes to US surveillance law introduced under President Bush and renewed under Obama in December 2012.

The program facilitates extensive, in-depth surveillance on live communications and stored information. The law allows for the targeting of any customers of participating firms who live outside the US, or those Americans whose communications include people outside the US.It also opens the possibility of communications made entirely within the US being collected without warrants.

Disclosure of the Prism program follows a leak to the Guardian on Wednesday of a top-secret court order compelling telecoms provider Verizon to turn over the telephone records of millions of US customers.

The participation of the internet companies in Prism will add to the debate, ignited by the Verizon revelation, about the scale of surveillance by the intelligence services. Unlike the collection of those call records, this surveillance can include the content of communications and not just the metadata.

Some of the world’s largest internet brands are claimed to be part of the information-sharing program since its introduction in 2007. Microsoft – which is currently running an advertising campaign with the slogan “Your privacy is our priority” – was the first, with collection beginning in December 2007.

It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online.

Collectively, the companies cover the vast majority of online email, search, video and communications networks.

Prism

The extent and nature of the data collected from each company varies.

Companies are legally obliged to comply with requests for users’ communications under US law, but the Prism program allows the intelligence services direct access to the companies’ servers. The NSA document notes the operations have “assistance of communications providers in the US”.

The revelation also supports concerns raised by several US senators during the renewal of the Fisa Amendments Act in December 2012, who warned about the scale of surveillance the law might enable, and shortcomings in the safeguards it introduces.

When the FAA was first enacted, defenders of the statute argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the Prism program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

A chart prepared by the NSA, contained within the top-secret document obtained by the Guardian, underscores the breadth of the data it is able to obtain: email, video and voice chat, videos, photos, voice-over-IP (Skype, for example) chats, file transfers, social networking details, and more.

PRISM slide crop
The document is recent, dating to April 2013. Such a leak is extremely rare in the history of the NSA, which prides itself on maintaining a high level of secrecy.

The Prism program allows the NSA, the world’s largest surveillance organisation, to obtain targeted communications without having to request them from the service providers and without having to obtain individual court orders.

With this program, the NSA is able to reach directly into the servers of the participating companies and obtain both stored communications as well as perform real-time collection on targeted users.

The presentation claims Prism was introduced to overcome what the NSA regarded as shortcomings of Fisa warrants in tracking suspected foreign terrorists. It noted that the US has a “home-field advantage” due to housing much of the internet’s architecture. But the presentation claimed “Fisa constraints restricted our home-field advantage” because Fisa required individual warrants and confirmations that both the sender and receiver of a communication were outside the US.

“Fisa was broken because it provided privacy protections to people who were not entitled to them,” the presentation claimed. “It took a Fisa court order to collect on foreigners overseas who were communicating with other foreigners overseas simply because the government was collecting off a wire in the United States. There were too many email accounts to be practical to seek Fisas for all.”

The new measures introduced in the FAA redefines “electronic surveillance” to exclude anyone “reasonably believed” to be outside the USA – a technical change which reduces the bar to initiating surveillance.

The act also gives the director of national intelligence and the attorney general power to permit obtaining intelligence information, and indemnifies internet companies against any actions arising as a result of co-operating with authorities’ requests.

In short, where previously the NSA needed individual authorisations, and confirmation that all parties were outside the USA, they now need only reasonable suspicion that one of the parties was outside the country at the time of the records were collected by the NSA.

The document also shows the FBI acts as an intermediary between other agencies and the tech companies, and stresses its reliance on the participation of US internet firms, claiming “access is 100% dependent on ISP provisioning”.

In the document, the NSA hails the Prism program as “one of the most valuable, unique and productive accesses for NSA”.

It boasts of what it calls “strong growth” in its use of the Prism program to obtain communications. The document highlights the number of obtained communications increased in 2012 by 248% for Skype – leading the notes to remark there was “exponential growth in Skype reporting; looks like the word is getting out about our capability against Skype”. There was also a 131% increase in requests for Facebook data, and 63% for Google.

The NSA document indicates that it is planning to add Dropbox as a PRISM provider. The agency also seeks, in its words, to “expand collection services from existing providers”.

The revelations echo fears raised on the Senate floor last year during the expedited debate on the renewal of the FAA powers which underpin the PRISM program, which occurred just days before the act expired.

Senator Christopher Coons of Delaware specifically warned that the secrecy surrounding the various surveillance programs meant there was no way to know if safeguards within the act were working.

“The problem is: we here in the Senate and the citizens we represent don’t know how well any of these safeguards actually work,” he said.

“The law doesn’t forbid purely domestic information from being collected. We know that at least one Fisa court has ruled that the surveillance program violated the law. Why? Those who know can’t say and average Americans can’t know.”

Other senators also raised concerns. Senator Ron Wyden of Oregon attempted, without success, to find out any information on how many phone calls or emails had been intercepted under the program.

When the law was enacted, defenders of the FAA argued that a significant check on abuse would be the NSA’s inability to obtain electronic communications without the consent of the telecom and internet companies that control the data. But the Prism program renders that consent unnecessary, as it allows the agency to directly and unilaterally seize the communications off the companies’ servers.

When the NSA reviews a communication it believes merits further investigation, it issues what it calls a “report”. According to the NSA, “over 2,000 Prism-based reports” are now issued every month. There were 24,005 in 2012, a 27% increase on the previous year.

In total, more than 77,000 intelligence reports have cited the PRISM program.

Jameel Jaffer, director of the ACLU’s Center for Democracy, that it was astonishing the NSA would even ask technology companies to grant direct access to user data.

“It’s shocking enough just that the NSA is asking companies to do this,” he said. “The NSA is part of the military. The military has been granted unprecedented access to civilian communications.

“This is unprecedented militarisation of domestic communications infrastructure. That’s profoundly troubling to anyone who is concerned about that separation.”

A senior administration official said in a statement: “The Guardian and Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. This law does not allow the targeting of any US citizen or of any person located within the United States.

“The program is subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress. It involves extensive procedures, specifically approved by the court, to ensure that only non-US persons outside the US are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about US persons.

“This program was recently reauthorized by Congress after extensive hearings and debate.

“Information collected under this program is among the most important and valuable intelligence information we collect, and is used to protect our nation from a wide variety of threats.

“The Government may only use Section 702 to acquire foreign intelligence information, which is specifically, and narrowly, defined in the Foreign Intelligence Surveillance Act. This requirement applies across the board, regardless of the nationality of the target.”

Additional reporting by James Ball and Dominic Rushe

Obama’s Faux Populism Sounds Like Bill Clinton’s Faux Populism

In Uncategorized on January 26, 2012 at 2:07 pm

Oldspeak:” ‘I’ll admit it: Listening to Barack Obama, I am ready to enlist in his campaign against the feed-the-rich Republicans … until I recall that I once responded in the same way to Bill Clinton’s faux populism. And then I get angry because betrayal by the “good guys” for whom I have ended up voting has become the norm.’ A Corporatist Democrat recycling the same high-flown but ultimately hollow rhetoric of corporate democrat of the past. A brilliant deconstruction of Obama’s faux populist oratory. Obama has mastered the essential political skill of words not matching deeds to devastating effect for many of us. America’s decline began under a Republican, and is currently being shepherded along by a Democrat. Party ‘in power’ changes periodically but the status quo never does. When will people wake up to the reality that their political class has been co-opted via a financial coup d’etat engineered by agents of the transnational corporate network? How many well-paying jobs have to be replaced with poverty wage jobs? How many inalienable rights have to be abrogated? How many small businesses have to be driven out of business? How many people have to be rendered homeless?  How much of our environment has to be destroyed before we see that our social and economic systems are unsustainable and on the brink of collapse?

Related Story

Staring At Empty Pages

By Robert Sheer @ Truthdig:

I’ll admit it: Listening to Barack Obama, I am ready to enlist in his campaign against the feed-the-rich Republicans … until I recall that I once responded in the same way to Bill Clinton’s faux populism. And then I get angry because betrayal by the “good guys” for whom I have ended up voting has become the norm.

Yes, betrayal, because if Obama meant what he said in Tuesday’s State of the Union address about holding the financial industry responsible for its scams, why did he appoint the old Clinton crowd that had legalized those scams to the top economic posts in his administration? Why did he hire Timothy Geithner, who has turned the Treasury Department into a concierge service for Wall Street tycoons?

Why hasn’t he pushed for a restoration of the Glass-Steagall Act, which Clinton’s deregulation reversed? Does the president really believe that the Dodd-Frank slap-on-the-wrist sellout represents “new rules to hold Wall Street accountable, so a crisis like this never happens again”? Can he name one single too-big-to-fail banking monstrosity that has been reduced in size on his watch instead of encouraged to grow ever larger by Treasury and Fed bailouts and interest-free money?

When Obama declared Tuesday evening “no American company should be able to avoid paying its fair share of taxes by moving jobs and profits overseas,” wasn’t he aware that Jeffrey Immelt, the man he appointed to head his jobs council, is the most egregious offender? Immelt, the CEO of GE, heads a company with most of its workers employed in foreign countries, a corporation that makes 82 percent of its profit abroad and has paid no U.S. taxes in the past three years.

It was also a bit bizarre for Obama to celebrate Steve Jobs as a model entrepreneur when the manufacturing jobs that the late Apple CEO created are in the same China that elsewhere in his speech the president sought to scapegoat for America’s problems. Apple, in its latest report on the subject, takes pride in attempting to limit the company’s overseas suppliers to a maximum workweek of 60 hours for their horribly exploited employees. Isn’t it weird to be chauvinistically China baiting when that country carries much of our debt?

 

Advertisement

I’m also getting tired of the exhortations to improve the nation’s schools, certainly a worthy endeavor, but this economic crisis is the result not of high school dropouts as Obama suggested, but rather the corruption of the best and brightest graduates of our elite academies. As Obama well knows from his own trajectory in the meritocracy, which took him from one of the most privileged schools in otherwise educationally depressed Hawaii to Harvard Law, the folks who concocted the mathematical formulas and wrote the laws justifying fraudulent collateralized debt obligations and credit default swaps were his overachieving professors and classmates.

If he doesn’t know that, he should check out the record of Lawrence Summers, the man he picked to guide his economic program and who had been rewarded with the presidency of Harvard after having engineered Clinton’s deregulatory deal with Wall Street.

That is the real legacy of the Clinton years, and it is no surprise that GOP presidential contender Newt Gingrich has been campaigning on his rightful share of it. The international trade agreements that exported good U.S. jobs, the radical financial deregulation that unleashed Wall Street greed, and the free market zealotry of then-Fed Chairman Alan Greenspan, who was reappointed by Clinton, were all part of a deal Clinton made with Gingrich, House speaker at that time.

As Gingrich put it in the first Republican debate in South Carolina: “As speaker … working with President Bill Clinton, we passed a very Reagan-like program, less regulation, lower taxes.” Even the 15 percent tax break that Mitt Romney exploited for his carryover private equity income was a result of the unholy Clinton-Gingrich alliance. Both principals of that alliance were pimps for the financial industry, and that includes Freddie Mac, the for-profit stock-traded housing agency that Clinton coddled while it stoked the Ponzi scheme in housing and that rewarded the former speaker with $1.6 million to $1.8 million in consulting fees.

There were, finally, some bold words in Obama’s speech about helping beleaguered homeowners, but they ring hollow given this administration’s efforts to broker a sweetheart deal between the leading banks and the state attorneys general that would see the banks fined only a pittance for their responsibility in the mortgage meltdown. Obama could have had success demanding mortgage relief if he had made that a condition for bailing out the banks. Now the banksters know he’s firing blanks, and they are placing their bets on their more reliable Republican allies to prevent any significant demand for helping homeowners with their underwater mortgages.

Of course, Romney, Obama’s most likely opponent in the general election, will never challenge the Wall Street hold on Washington, since he is the personification of the vulture capitalism that is the true cause of America’s decline. Obama should shine in comparison with his Republican challenger, but there is little in his State of the Union speech to suggest he will chart a much-needed new course in his second term.

 

Carrier IQ Is Watching You – Secret App On Millions Of Phones Logs Key Taps, Geographic Locations & Received Messages Of Users

In Uncategorized on December 2, 2011 at 2:04 pm

Oldspeak:“So apparently it’s not just iPhones that keep a secret record of your movements. Surveillance companies can use your iPhone to take photos of you and your surroundings without your knowledge. If you use an Apple, Android, BlackBerry, or Nokia smartphone then you may be at risk of being illegally wire-tapped by Carrier IQ. Carrier IQ’s “mobile intelligence platform”, currently on at least 150 million devices surreptitiously records keystrokes, SMS messages, and internet search topics. Without your knowledge or consent. It can’t be turned off or opted out of. It’s always running even, when your phone’s screen is off. The ostensible reason given for this spyware on your phone is it is “a diagnostic tool designed to give network carriers and device manufacturers detailed information about the causes of dropped calls and other performance issues.” –Carrier IQ VP of Marketing Andrew Coward I’m not sure what your private information  has to do with dropped calls and performance. But if it’s simply a ‘diagnostic tool’ Why is its purpose not explicitly delineated? Why is it not accessible to users? Why is there no privacy policy as there is with every other app? These troubling questions remain unanswered by Carrier IQ? But more people are beginning to ask questions. “Without controls on this industry, the threat that surveillance poses to freedom on expression and human rights in general is only going to increase.” –Steven Murdoch of Cambridge Security Group “Ignorance Is Strength”

Related Video:

Related Stories:

Does your smartphone run Carrier IQ? Find out here

Secret app on millions of phones logs key taps

By James Mulroy @ PC World:

If you use an Android, BlackBerry, or Nokia smartphone then you may be at risk of being illegally wire-tapped by Carrier IQ–a provider of performance monitoring software for smartphones–according to reports.

Earlier this month, security researcher Trevor Eckhart announced that he found software made by Carrier IQ that may be logging your every move on your mobile phone. Trevor referred to it as a “rootkit“, a piece of software that hides itself while utilizing privileged access like watching your every move. Carrier IQ didn’t take too kindly to this accusation, and responded aggressively with acease-and-desist letter, and went on to deny this accusation. However, to further back his accusation, Eckhart released a video that he says shows the software in action.

In the video, Eckhart navigates to a list of running applications on his phone, and he found that the application IQRD–made by Carrier IQ–was not shown. However, when he searched all of the applications on the device, Eckhart discovered that IQRD showed up with the option to force stop it; therefore, he determined that the app must have been running. However, when he tried to stop the application, the force stop function did absolutely nothing. Additionally, this application always runs when the device is started, according to his research.

After connecting his HTC device to his computer, Trevor found that IQRD is secretly logging every single button that he taps on the phone–even on the touchscreen number pad. IQRD is also shown to be logging text messages.

In the video, Eckhart shows that Carrier IQ is also logging Web searches. While this doesn’t sound all that bad by itself, it suggests that Carrier IQ is logging what happens during an HTTPS connection which is supposed to be encrypted information. Additionally, it can do this over a Wi-Fi connection with no 3G, so even if your phone service is disconnected, IQRD still logs the information.

Wired goes on to say that the application “cannot be turned off without rooting the phone and replacing the operating system.”

While Eckhart tested his accusation on an HTC device it is likely that Carrier IQ is logging information on millions of more devices. According to Carrier IQ (pdf)”Carrier IQ’s Mobile Intelligence platform is currently deployed with more than 150 million devices worldwide.”

While Carrier IQ has since backed off and apologized for its aggressive legal action against Eckhart, this isn’t the end of the story for Carrier IQ. Paul Ohm, a former Justice Department prosecutor and professor at the University of Colorado Law School, told Forbes that this isn’t just creepy, but it’s also likely grounds for a class action lawsuit, citing a federal wiretapping law.

Make sure to check out the video below to see what Trevor discovered.

 

Update, Nov 30, 2011: iOS jailbreak developer Grant Paul (AKA chpwn) points out on Twitter that earlier versions of iOS appear to have included Carrier IQ. And Erica Sadum of The Unofficial Apple Weblog (TUAW) notes that iOS 5 makes references to Carrier IQ as well. In the TUAW post, Erica analyzes the Carrier IQ references and concludes that Carrier IQ in iOS 5 doesn’t appear to be collecting much data–if any at all (i.e. it may need to be explicitly turned on). Read her story for the full details.

Update 2: The Verge claims that neither the Nexus-branded Android phones nor the Motorola Xoom tablet include Carrier IQ, and suggests that the carriers insist on including the software. We haven’t been able to verify this, but if you have any more information, feel free to tip us off.