Skip to main content

Home/ Geopolitics Weekly/ Group items tagged data

Rss Feed Group items tagged

Pedro Gonçalves

NSA collecting phone records of millions of Verizon customers daily | World news | The ... - 0 views

  • The National Security Agency is currently collecting the telephone records of millions of US customers of Verizon, one of America's largest telecoms providers, under a top secret court order issued in April.The order, a copy of which has been obtained by the Guardian, requires Verizon on an "ongoing, daily basis" to give the NSA information on all telephone calls in its systems, both within the US and between the US and other countries.The document shows for the first time that under the Obama administration the communication records of millions of US citizens are being collected indiscriminately and in bulk – regardless of whether they are suspected of any wrongdoing.The secret Foreign Intelligence Surveillance Court (Fisa) granted the order to the FBI on April 25, giving the government unlimited authority to obtain the data for a specified three-month period ending on July 19.Under the terms of the blanket order, the numbers of both parties on a call are handed over, as is location data, call duration, unique identifiers, and the time and duration of all calls. The contents of the conversation itself are not covered.
  • The unlimited nature of the records being handed over to the NSA is extremely unusual. Fisa court orders typically direct the production of records pertaining to a specific named target who is suspected of being an agent of a terrorist group or foreign state, or a finite set of individually named targets.
  • The order, signed by Judge Roger Vinson, compels Verizon to produce to the NSA electronic copies of "all call detail records or 'telephony metadata' created by Verizon for communications between the United States and abroad" or "wholly within the United States, including local telephone calls".
  • ...5 more annotations...
  • The court order expressly bars Verizon from disclosing to the public either the existence of the FBI's request for its customers' records, or the court order itself.
  • The information is classed as "metadata", or transactional information, rather than communications, and so does not require individual warrants to access. The document also specifies that such "metadata" is not limited to the aforementioned items. A 2005 court ruling judged that cell site location data – the nearest cell tower a phone was connected to – was also transactional data, and so could potentially fall under the scope of the order.
  • The court order appears to explain the numerous cryptic public warnings by two US senators, Ron Wyden and Mark Udall, about the scope of the Obama administration's surveillance activities.For roughly two years, the two Democrats have been stridently advising the public that the US government is relying on "secret legal interpretations" to claim surveillance powers so broad that the American public would be "stunned" to learn of the kind of domestic spying being conducted.
  • In a letter to attorney general Eric Holder last year, they argued that "there is now a significant gap between what most Americans think the law allows and what the government secretly claims the law allows.""We believe," they wrote, "that most Americans would be stunned to learn the details of how these secret court opinions have interpreted" the "business records" provision of the Patriot Act.
  • The NSA, as part of a program secretly authorized by President Bush on 4 October 2001, implemented a bulk collection program of domestic telephone, internet and email records. A furore erupted in 2006 when USA Today reported that the NSA had "been secretly collecting the phone call records of tens of millions of Americans, using data provided by AT&T, Verizon and BellSouth" and was "using the data to analyze calling patterns in an effort to detect terrorist activity." Until now, there has been no indication that the Obama administration implemented a similar program.These recent events reflect how profoundly the NSA's mission has transformed from an agency exclusively devoted to foreign intelligence gathering, into one that focuses increasingly on domestic communications.
Pedro Gonçalves

NSA shares raw intelligence including Americans' data with Israel | World news | The Gu... - 0 views

  • The National Security Agency routinely shares raw intelligence data with Israel without first sifting it to remove information about US citizens, a top-secret document provided to the Guardian by whistleblower Edward Snowden reveals.
  • the US government handed over intercepted communications likely to contain phone calls and emails of American citizens. The agreement places no legally binding limits on the use of the data by the Israelis.
  • The deal was reached in principle in March 2009, according to the undated memorandum, which lays out the ground rules for the intelligence sharing.The five-page memorandum, termed an agreement between the US and Israeli intelligence agencies "pertaining to the protection of US persons", repeatedly stresses the constitutional rights of Americans to privacy and the need for Israeli intelligence staff to respect these rights.But this is undermined by the disclosure that Israel is allowed to receive "raw Sigint" – signal intelligence. The memorandum says: "Raw Sigint includes, but is not limited to, unevaluated and unminimized transcripts, gists, facsimiles, telex, voice and Digital Network Intelligence metadata and content."According to the agreement, the intelligence being shared would not be filtered in advance by NSA analysts to remove US communications. "NSA routinely sends ISNU [the Israeli Sigint National Unit] minimized and unminimized raw collection"
  • ...5 more annotations...
  • a much stricter rule was set for US government communications found in the raw intelligence. The Israelis were required to "destroy upon recognition" any communication "that is either to or from an official of the US government". Such communications included those of "officials of the executive branch (including the White House, cabinet departments, and independent agencies), the US House of Representatives and Senate (member and staff) and the US federal court system (including, but not limited to, the supreme court)".
  • Although Israel is one of America's closest allies, it is not one of the inner core of countries involved in surveillance sharing with the US - Britain, Australia, Canada and New Zealand. This group is collectively known as Five Eyes.
  • In the top-secret 2013 intelligence community budget request, details of which were disclosed by the Washington Post, Israel is identified alongside Iran and China as a target for US cyberattacks.
  • another report, marked top secret and dated September 2007, states that the relationship, while central to US strategy, has become overwhelmingly one-sided in favor of Israel.
  • In another top-secret document seen by the Guardian, dated 2008, a senior NSA official points out that Israel aggressively spies on the US. "On the one hand, the Israelis are extraordinarily good Sigint partners for us, but on the other, they target us to learn our positions on Middle East problems," the official says. "A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the US."
Argos Media

Computer Spies Breach Fighter-Jet Project - WSJ.com - 0 views

  • Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever -- according to current and former government officials familiar with the attacks.
  • Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft.
  • The latest intrusions provide new evidence that a battle is heating up between the U.S. and potential adversaries over the data networks that tie the world together. The revelations follow a recent Wall Street Journal report that computers used to control the U.S. electrical-distribution system, as well as other infrastructure, have also been infiltrated by spies abroad.
  • ...18 more annotations...
  • Attacks like these -- or U.S. awareness of them -- appear to have escalated in the past six months, said one former official briefed on the matter.
  • while the spies were able to download sizable amounts of data related to the jet-fighter, they weren't able to access the most sensitive material, which is stored on computers not connected to the Internet.
  • The Joint Strike Fighter, also known as the F-35 Lightning II, is the costliest and most technically challenging weapons program the Pentagon has ever attempted. The plane, led by Lockheed Martin Corp.
  • A Pentagon report issued last month said that the Chinese military has made "steady progress" in developing online-warfare techniques. China hopes its computer skills can help it compensate for an underdeveloped military, the report said.
  • The Chinese Embassy said in a statement that China "opposes and forbids all forms of cyber crimes." It called the Pentagon's report "a product of the Cold War mentality" and said the allegations of cyber espionage are "intentionally fabricated to fan up China threat sensations."
  • The U.S. has no single government or military office responsible for cyber security. The Obama administration is likely to soon propose creating a senior White House computer-security post to coordinate policy and a new military command that would take the lead in protecting key computer networks from intrusions, according to senior officials.
  • The Bush administration planned to spend about $17 billion over several years on a new online-security initiative and the Obama administration has indicated it could expand on that.
  • Former U.S. officials say the attacks appear to have originated in China. However it can be extremely difficult to determine the true origin because it is easy to mask identities online.
  • Six current and former officials familiar with the matter confirmed that the fighter program had been repeatedly broken into. The Air Force has launched an investigation.
  • Foreign allies are helping develop the aircraft, which opens up other avenues of attack for spies online. At least one breach appears to have occurred in Turkey and another country that is a U.S. ally, according to people familiar with the matter.
  • Joint Strike Fighter test aircraft are already flying, and money to build the jet is included in the Pentagon's budget for this year and next.
  • Computer systems involved with the program appear to have been infiltrated at least as far back as 2007, according to people familiar with the matter. Evidence of penetrations continued to be discovered at least into 2008. The intruders appear to have been interested in data about the design of the plane, its performance statistics and its electronic systems, former officials said.
  • The intruders compromised the system responsible for diagnosing a plane's maintenance problems during flight, according to officials familiar with the matter. However, the plane's most vital systems -- such as flight controls and sensors -- are physically isolated from the publicly accessible Internet, they said.
  • The intruders entered through vulnerabilities in the networks of two or three contractors helping to build the high-tech fighter jet, according to people who have been briefed on the matter. Lockheed Martin is the lead contractor on the program, and Northrop Grumman Corp. and BAE Systems PLC also play major roles in its development.
  • The spies inserted technology that encrypts the data as it's being stolen; as a result, investigators can't tell exactly what data has been taken. A former Pentagon official said the military carried out a thorough cleanup.
  • Investigators traced the penetrations back with a "high level of certainty" to known Chinese Internet protocol, or IP, addresses and digital fingerprints that had been used for attacks in the past, said a person briefed on the matter.
  • As for the intrusion into the Air Force's air-traffic control systems, three current and former officials familiar with the incident said it occurred in recent months. It alarmed U.S. national security officials, particularly at the National Security Agency, because the access the spies gained could have allowed them to interfere with the system, said one former official. The danger is that intruders might find weaknesses that could be exploited to confuse or damage U.S. military craft.
  • In his speech in Austin, Mr. Brenner, the U.S. counterintelligence chief, issued a veiled warning about threats to air traffic in the context of Chinese infiltration of U.S. networks. He spoke of his concerns about the vulnerability of U.S. air traffic control systems to cyber infiltration, adding "our networks are being mapped." He went on to warn of a potential situation where "a fighter pilot can't trust his radar."
Pedro Gonçalves

NSA taps in to user data of Facebook, Apple, Google and others, secret files reveal | W... - 0 views

  • Jameel Jaffer, director of the ACLU's Center for Democracy, that it was astonishing the NSA would even ask technology companies to grant direct access to user data."It's shocking enough just that the NSA is asking companies to do this," he said. "The NSA is part of the military. The military has been granted unprecedented access to civilian communications."This is unprecedented militarisation of domestic communications infrastructure. That's profoundly troubling to anyone who is concerned about that separation."
Argos Media

BBC NEWS | Science & Environment | 'More bad news' on climate change - 0 views

  • The scientists are concerned that the 2007 reports of the Intergovernmental Panel on Climate Change (IPCC) are already out of date. Their data suggests greater rises in sea levels this century.
  • this meeting is happening outside the IPCC, so it will have the very latest estimates, and the scientists will not need to agree every word with the political masters. This unfettered atmosphere is likely to produce greater clarity about the scale of some very worrying trends, especially sea level rise. The IPCC was widely criticised for stating that sea level rise this century would only amount to 59cm (23in). The most recent data, to be presented here, will suggest a far higher figure with dramatic implications for many island nations and coastal regions.
  • his meeting is happening outside the IPCC, so it will have the very latest estimates, and the scientists will not need to agree every word with the political masters. This unfettered atmosphere is likely to produce greater clarity about the scale of some very worrying trends, especially sea level rise. The IPCC was widely criticised for stating that sea level rise this century would only amount to 59cm (23in). The most recent data, to be presented here, will suggest a far higher figure with dramatic implications for many island nations and coastal regions.
Argos Media

BBC NEWS | Technology | Facebook users say yes to changes - 0 views

  • Facebook users have voted to back changes which give them control over data and content they post on the site. Early results suggest 75% of those who voted support the proposals.
  • The vote was triggered by changes Facebook made to its terms and conditions in February. The move drew fire because it appeared to hand the social network site ownership of images, videos and data that users posted on profile pages. Low turnout In response to the criticism, Facebook withdrew the changed terms, wrote a new set and invited its 200 million members to make their views known.
  • In total about 600,000 people took part in the week-long vote. Initially, Facebook said it would only adopt those new terms if 30% of its members voted in support of them.
  • ...2 more annotations...
  • However, writing in a blog posting on Facebook announcing the early results, Ted Ullyot, Facebook's legal chief, said it would adopt them anyway.
  • He said a preliminary count suggested 74.4% backed the new Facebook Principles and Statement of Rights and Responsibilities.
Argos Media

BBC NEWS | Technology | Net firms start storing user data - 0 views

  • Details of user e-mails and net phone calls will be stored by internet service providers (ISPs) from Monday under an EU directive.
  • The plans were drawn up in the wake of the London bombings in 2005.
  • All ISPs in the European Union will have to store the records for a year. An EU directive which requires telecoms firms to hold on to telephone records for 12 months is already in force.
  • ...3 more annotations...
  • Sweden has decided to ignore the directive completely while there is a challenge going through the German courts at present.
  • The data stored does not include the content of e-mails or a recording of a net phone call, but is used to determine connections between individuals. Authorities can get access to the stored records with a warrant.
  • Isabella Sankey, Policy Director at Liberty, said the directive formalised what had already been taking place under voluntary arrangement for years. "The problem is that this regime allows not just police to access this information but hundreds of other public bodies."
Pedro Gonçalves

'Killer robots' pose threat to peace and should be banned, UN warned | Science | The Gu... - 0 views

  • "Machines lack morality and mortality, and as a result should not have life and death powers over humans,"
  • "States are working towards greater and greater autonomy in weapons, and the potential is there for such technologies to be developed in the next 10 or 20 years,"
  • Unmanned aerial vehicles were intended initially only for surveillance, and their use for offensive purposes was prohibited, yet once strategists realised their perceived advantages as a means of carrying out targeted killings, all objections were swept out of the way.
  • ...4 more annotations...
  • Drone technology has already moved a step closer to a fully autonomous state in the form of the X-47B, a super-charged UAV developed by the US Navy that can fly itself, and which last week completed the first takeoff from an aircraft carrier. The drone is billed as a non-combat craft, yet its design includes two weapons bays capable of carrying more than 4,000lbs.Britain is developing its own next generation of drone, known as Taranis, that can be sent to tackle targets at long range and can defend itself from enemy aircraft. Like X-47B it has two in-built weapons bays, though is currently unarmed.
  • South Korea has set up sentry robots known as SGR-1 along the Demilitarized Zone with North Korea that can detect people entering the zone through heat and motion sensors; though the sentry is currently configured so that it has to be operated by a human, it is reported to have an automatic mode, which, if deployed, would allow it to fire independently on intruders.
  • the Pentagon is spending about $6bn a year on research and development of unmanned systems, though in a directive adopted last November it said that fully autonomous weapons could only be used "to apply non-lethal, non-kinetic force, such as some forms of electronic attack".
  • The possibility of "out of the loop" weapons raises a plethora of moral and legal issues, Heyns says. Most worryingly, it could lead to increasing distance between those carrying out the attack and their targets: "In addition to being physically removed from the kinetic action, humans would also become more detached from decisions to kill – and their execution."
Pedro Gonçalves

Crisis for Europe as trust hits record low | World news | The Guardian - 0 views

  • "The damage is so deep that it does not matter whether you come from a creditor, debtor country, euro would-be member or the UK: everybody is worse off," said José Ignacio Torreblanca, head of the ECFR's Madrid office. "Citizens now think that their national democracy is being subverted by the way the euro crisis is conducted."
  • The most dramatic fall in faith in the EU has occurred in Spain, where the banking and housing market collapse, eurozone bailout and runaway unemployment have combined to produce 72% "tending not to trust" the EU, with only 20% "tending to trust".
  • In Spain, trust in the EU fell from 65% to 20% over the five-year period while mistrust soared to 72% from 23%.
  • ...4 more annotations...
  • The data compares trust and mistrust in the EU at the end of last year with levels in 2007, before the financial crisis, to reveal a precipitate fall in support for the EU of the kind that is common in Britain but is much more rarely seen on the continent.
  • Five years ago, 56% of Germans "tended to trust" the EU, whereas 59% now "tend to mistrust". In France, mistrust has risen from 41% to 56%. In Italy, where public confidence in Europe has traditionally been higher than in the national political class, mistrust of the EU has almost doubled from 28% to 53%.Even in Poland, which enthusiastically joined the EU less than a decade ago and is the single biggest beneficiary from the transfers of tens of billions of euros from Brussels, support has plummeted from 68% to 48%, although it remains the sole country surveyed where more people trust than mistrust the union.In Britain, where Eurobarometer regularly finds majority Euroscepticism, the mistrust grew from 49% to 69%, the highest level with the exception of the extraordinary turnaround in Spain.
  • "Overall levels of political trust and satisfaction with democracy [declined] across much of Europe, but this varied markedly between countries. It was significant in Britain, Belgium, Denmark and Finland, particularly notable in France, Ireland, Slovenia and Spain, and reached truly alarming proportions in the case of Greece," it said.
  • Aart de Geus, head of the Bertelsmann Stiftung, a German thinktank, also warned that the drive to surrender more key national powers to Brussels would backfire. "Public support for the EU has been falling since 2007. So it is risky to go for federalism as it can cause a backlash and unleash greater populism."
Pedro Gonçalves

UPDATE 4-Powerful 'Flame' cyber weapon found in Iran | Reuters - 0 views

  • a highly sophisticated computer virus is infecting computers in Iran and other Middle East countries and may have been deployed at least five years ago to engage in state-sponsored cyber espionage. Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran's nuclear program in 2010, according to Kaspersky Lab
  • Iran has accused the United States and Israel of deploying Stuxnet.
  • Kaspersky's research shows the largest number of infected machines are in Iran, followed by Israel and the Palestinian territories, then Sudan and Syria.
  • ...4 more annotations...
  • There is some controversy over who was behind Stuxnet and Duqu. Some experts suspect the United States and Israel, a view that was laid out in a January 2011 New York Times report that said it came from a joint program begun around 2004 to undermine what they say are Iran's efforts to build a bomb.
  • Flame can gather data files, remotely change settings on computers, turn on PC microphones to record conversations, take screen shots and log instant messaging chats.
  • Hungarian researcher Boldizsar Bencsath, whose Laboratory of Cryptography and Systems Security first discovered Duqu, said his analysis shows that Flame may have been active for at least five years and perhaps eight years or more. That implies it was active long before Stuxnet.
  • "The scary thing for me is: if this is what they were capable of five years ago, I can only think what they are developing now," Mohan Koo, managing director of British-based Dtex Systems cyber security company.
Pedro Gonçalves

Analysis - Russia's wealth gap wounds Putin | Reuters - 0 views

  • The gap between rich and poor in Russia is a growing problem for Prime Minister Vladimir Putin as he prepares to return to the presidency in an election next March.During his 12-year rule, as president and then prime minister, Russians have broadly speaking become wealthier than they were in the chaotic years following the collapse of the Soviet Union. But the citizen of Putin's Russia can easily lose even a modest sense of well being when confronted with the sometimes flamboyant ostentation of the rich.In Soviet times privilege was often a well guarded secret.
  • Many people cited the wealth gap in ditching Putin's ruling party in a December 4 election that cut its majority in parliament.
  • If a gap has widened between individuals, it is also evident between Russia's many poor regions and wealthy cities like Moscow and the booming oil heartland.
  • ...9 more annotations...
  • Real disposable income has slightly declined this year, official data show, and the difference in income between the bottom 10 percent of the population and the top 10 percent grew by nearly one-fifth between 2000 and 2010.
  • As in other former Soviet republics, pensioners are among the worst off because they were too old to make the most of the opportunities offered by the free market that followed the collapse of the Soviet Union in 1991.Moscow is home to 2.65 million retired people and some elderly people have taken part in the recent protests, although many more are young middle-class professionals.
  • The number of Russians who made the Forbes' list of the world's billionaires jumped from none in 2000 to 101 last year, with Moscow becoming the billionaire capital of the world.The average monthly salary in Russia, however, was only 21,000 roubles ($670) last year.
  • Dissatisfaction over income distribution played its role in United Russia's performance in the December 4 election. The party had its two-thirds majority cut to a slim majority after winning just under 50 percent of the votes cast.
  • Russia's Communist Party, which targeted hard-up voters in its election campaign, won almost 20 percent of votes and will have 92 representatives in the 450-seat lower house.
  • He still appears to have more support in the countryside, where disparities are probably less manifest, than in big cities such as Moscow and St Petersburg where bright lights and luxury boutiques contrast with grim suburban tower block developments."It is obvious that people are very unhappy with the display of wealth they see around them and with the lack of progress to ensure their lives are better
  • economists at Renaissance Capital investment bank in Moscow say that income inequality in Russia is adequate for gross-domestic-product-per-capita levels."Considering its wealth, the level of income inequality is far from excessive," said Ivan Tchakarov, a Renaissance Capital economist."In the BRIC universe (of emerging countries Brazil, Russia, India and China), Russia is only marginally more income-unequal than China and India, but far better placed than Brazil."China, however, with a population nearly 10 times that of Russia, had only 14 more billionaires last year, according to Forbes.
  • The poverty rate in Russia stood at 13.1 percent in 2010, according to the World Bank, affecting about 18.6 million people.
  • John Roemer, a Yale University political science professor, has said that switching from Russia's flat 13 percent rate of income tax to a progressive tax system would raise living standards for the population as a whole.
Pedro Gonçalves

Control: China Launches National GPS System - 0 views

  • This Chinese satellite navigation network will obviate the need to use the Pentagon-created and U.S.-run GPS system, which dominates location technology worldwide.
  • This strictly Chinese system, according to a defense tech expert in today's Wall Street Journal, "could help the Chinese military to identify, track and strike U.S. ships in the region in the event of armed conflict." It has already been used to coordinate the movement of Chinese troops.
  • The BNSS is not believed to be as accurate as the GPS system, but it may, in time, get there. Bedou, which means Big Dipper in Mandarin, is only the first step toward a global system, called Compass, which is slated to have 35 functioning satellites around the world by 2020.
  • ...3 more annotations...
  • The network, called the Beidou Navigation Satellite System (BNSS), began transmitting yesterday, after 11 years of development. It consists of 10 satellites, with another six slated for deployment in the coming year. The BNSS is run by the China Aerospace Science and Technology Corporation, a state contractor serving the nation's space program and run by the Chinese military.
  • Like the GPS system, the BNSS would also make its data available for developers.
  • The only other GPS alternative is Russia's Glonass. The European Union is building its own, called Galileo, also scheduled to go live by 2020.
Argos Media

BBC NEWS | Technology | Privacy fears over Google tracker - 0 views

  • Google has announced a new feature that allows users to share their locations among a chosen network of friends. The "opt-in" Latitude service uses data from mobile phone masts, GPS, or wi-fi hardware to update a user's location automatically. Users can also manually set their advertised location anywhere they like, or turn the broadcast off altogether.
  • privacy watchdog Privacy International argues that there are opportunities for abuse of the system for those who may not know that their phone is broadcasting its location. Privacy International director Simon Davies gives the example of employers who might give phones to employees with Latitude enabled.
Pedro Gonçalves

untitled - 0 views

  • A key security operative of the Palestinian Islamist movement Hamas was under arrest in Syria tonight on suspicion of having helped an alleged Israeli hit squad identify Mahmoud al-Mabhouh before he was assassinated in Dubai, the Guardian has learned.
  • Nahro Massoud, a Hamas security official, was in detention and under interrogation in Damascus in connection with the 19 January killing, which is now widely assumed to have been mounted by Israel's Mossad secret intelligence service.
  • Killings of Palestinians by Israel have often involved Palestinian agents being used to identity the target.
  • ...3 more annotations...
  • Middle East experts and diplomats see the Dubai plot as part of a wider clandestine struggle between Israel and Hamas – and a deliberate attempt to weaken the Palestinian organisation's links with Iran. Israel considered Mabhouh to be the point man in smuggling longer-range Iranian rockets into Gaza that would be capable of striking Israel's urban heartland.
  • Dubai police identified Austria as ­"command centre" for the assassins, after mobile phone data showed at least seven numbers originating there.
  • In December 2008 radical Islamic terrorists also coordinated their bomb attacks in Mumbai, in which 160 people were killed, using Austrian mobile phone numbers.
Argos Media

BBC NEWS | Europe | Russia expels Canadian diplomats - 0 views

  • Russia has expelled two Canadian diplomats working for Nato's Moscow office in response to an "unfriendly act" by the military alliance. Last week Nato expelled two Russian envoys from its headquarters in Brussels, reportedly due to spying.
  • The diplomatic spat comes as Nato begins military exercises in Georgia, seen by Russia as a "provocation"
  • This latest round of tit-for-tat expulsions stems from a spy scandal in Estonia in which thousands of pages of sensitive data were handed to Russian agents.
Pedro Gonçalves

China orders PC makers to install blocking software | World news | The Guardian - 0 views

  • Computer makers in China have been instructed to pre-install blocking software on every PC hard drive from next month, under a government push to control access to the internet.The new software, which has been developed by companies working with the Chinese military, is specifically aimed at restricting online pornography, but it could also be used to strengthen barriers to politically sensitive websites.
  • China's authorities currently block overseas-based sites they disapprove of, such as those relating to Tibetan independence, or the Falun Gong spiritual movement, with a mesh of filters and keyword restrictions, widely known as the Great Firewall.
  • The new software – called Green Dam Youth Escort – potentially adds a powerful new tool at the level of the individual computer. It updates a list of forbidden sites from an online database, much as network security programs automatically download the latest defences against new worms, trojans and viruses.The software, designed to work with the Microsoft Windows operating system, also collects private user data.
  • ...6 more annotations...
  • A separate instruction on the ministry's website obliged schools to install Green Dam on every computer in their institutions by the end of last month.
  • China's ministry of industry and information technology issued a notice to personal computer-makers on 19 May that every machine sold from 1 July must be preloaded with the software. Last year 40m PCs were sold in China, the world's second biggest market after the US.
  • Optional programs that allow parents to restrict internet access by their children have existed for some time, but this is the first time the government has instructed that every computer be installed with a single centralised system.
  • The software was developed by Jinhui Computer System Engineering in Henan under a 21m yuan (£2.2m) deal with the government.
  • Bryan Zhang, the founder of Jinhui, told reporters his company was compiling a database of forbidden sites, all related to pornography. He claimed users would have the option of uninstalling the software, or choosing to unblock sites, though they will not be permitted to see the list.
  • China periodically launches campaigns against online porn. In the latest drive more than 1,900 websites have been shut down and search engines, such as Google and Baidu, have been castigated for failing to self-regulate. Rights groups say the same techniques, along with cruder methods, are used to stifle websites that embarrass, irritate or threaten the government.Last week the authorities blocked Twitter and Hotmail in the run-up to the 20th anniversary of the Tiananmen Square crackdown.
Pedro Gonçalves

BBC NEWS | Europe | Obama lauds Putin at Russia talks - 0 views

  • US President Barack Obama has praised Russian PM Vladimir Putin at talks outside Moscow, saying there was an excellent chance to improve ties.
  • Mr Obama praised Mr Putin for his "extraordinary work" as president and PM as the pair met for the first time. Mr Putin said Mr Obama's own role would be key in improving relations.
  • Mr Obama said: "I am aware of not only the extraordinary work that you've done on behalf of the Russian people in your previous role as prime minis-, uh, as president, but in your current role as prime minister."
  • ...4 more annotations...
  • Mr Putin said: "We link hopes for development of our relationship with your name."
  • Last week, Mr Obama said he thought the former Russian president turned prime minister had "one foot in the old ways of doing business and one foot in the new".
  • Russia also agreed to allow the US military to fly troops and weapons across its territory into Afghanistan, allowing it to avoid using supply routes through Pakistan that are attacked by militants.
  • However, on the contentious issue of US plans to base parts of a missile defence shield in Eastern Europe, the presidents merely said they had agreed to a joint study into ballistic missile threats and the creation of a data exchange centre.
Pedro Gonçalves

CIA doctors face human experimentation claims | World news | guardian.co.uk - 0 views

  • Doctors and psychologists the CIA employed to monitor its "enhanced interrogation" of terror suspects came close to, and may even have committed, unlawful human experimentation, a medical ethics watchdog has alleged.
  • The most incendiary accusation of PHR's latest report, Aiding Torture, is that doctors actively monitored the CIA's interrogation techniques with a view to determining their effectiveness, using detainees as human subjects without their consent. The report concludes that such data gathering was "a practice that approaches unlawful experimentation".
  • In April, a leaked report from the International Committee of the Red Cross found that medical staff employed by the CIA had been present during waterboarding, and had even used what appeared to be a pulse oxymeter, placed on the prisoner's finger to monitor his oxygen saturation during the procedure
1 - 20 of 30 Next ›
Showing 20 items per page