Skip to main content

Home/ Future of the Web/ Group items tagged brussels

Rss Feed Group items tagged

Paul Merrell

News - Antitrust - Competition - European Commission - 0 views

  • Google inquiries Commission accuses Google of systematically favouring own shopping comparison service Infographic: Google might be favouring 'Google Shopping' when displaying general search results
  • Antitrust: Commission sends Statement of Objections to Google on comparison shopping service; opens separate formal investigation on AndroidWed, 15 Apr 2015 10:00:00 GMTAntitrust: Commission opens formal investigation against Google in relation to Android mobile operating systemWed, 15 Apr 2015 10:00:00 GMTAntitrust: Commission sends Statement of Objections to Google on comparison shopping serviceWed, 15 Apr 2015 10:00:00 GMTStatement by Commissioner Vestager on antitrust decisions concerning GoogleWed, 15 Apr 2015 11:39:00 GMT
  •  
    The more interesting issue to me is the accusation that Google violates antitrust law by boosting its comparison shopping search results in its search results, unfairly disadvantaging competing shopping services and not delivering best results to users. What's interesting to me is that the Commission is attempting to portray general search as a separate market from comparison shopping search, accusing Google of attempting to leverage its general search monopoly into the separate comoparison shopping search market. At first blush, Iim not convinced that these are or should be regarded as separable markets. But the ramifications are enormous. If that is a separate market, then arguably so is Google's book search, its Google Scholar search, its definition search, its site search, etc. It isn't clear to me how one might draw a defensible line taht does not also sweep in every new search feature  as a separate market.   
Gonzalo San Gil, PhD.

Letter to the Council of the European Union: "Don't Turn Your Backs on Net Neutrality!"... - 0 views

  •  
    "Paris, November 26, 2014 - Tomorrow on Thursday November 27th, the "Transport, Telecommunications and Energy" (TTE) Council will meet in Brussels to discuss the general approach on Telecom Single Market the Italian Presidency sent to the delegations of the Member States on November 14th. This text, which aims at protecting Net Neutrality and therefore the freedom of our communications, unfortunatel" [# ! No #NetNeutrality # ! … No #HumanRights. # ! Is this what #Europe wants to be said about @ur #Union…? # ! want to guess that not…]
  •  
    "Paris, November 26, 2014 - Tomorrow on Thursday November 27th, the "Transport, Telecommunications and Energy" (TTE) Council will meet in Brussels to discuss the general approach on Telecom Single Market the Italian Presidency sent to the delegations of the Member States on November 14th. This text, which aims at protecting Net Neutrality and therefore the freedom of our communications, unfortunatel"
  •  
    "Paris, November 26, 2014 - Tomorrow on Thursday November 27th, the "Transport, Telecommunications and Energy" (TTE) Council will meet in Brussels to discuss the general approach on Telecom Single Market the Italian Presidency sent to the delegations of the Member States on November 14th. This text, which aims at protecting Net Neutrality and therefore the freedom of our communications, unfortunatel" [# ! No #NetNeutrality # ! … No #HumanRights. # ! Is this what #Europe wants to be said about @ur #Union…? # ! want to guess that not…]
Gonzalo San Gil, PhD.

Alert: Our Privacy About to be Destroyed in Brussels? | La Quadrature du Net - 0 views

  •  
    [ Submitted on 22 Jan 2013 - 14:35 data protection press release Printer-friendly version Send by email Paris, 22 January 2013 - The consideration of the "data protection" privacy regulation is in progress in the European Parliament, with a vote in the consumers committee (IMCO) on Wednesday. It is the object of an unprecedented lobbying campaign, mostly driven by US companies. If citizens don't act, banks, insurance companies and Internet service operators will have a free hand to collect, process, store and sell all of our personal data, which will enable them to know and direct all that we do online and offline. ...]
Gonzalo San Gil, PhD.

Take action to stop secret lobbying | Democracy International e.V. - 0 views

  •  
    "On 12 September, members of the European Parliament (MEPs) who sit on the committee on constitutional affairs (AFCO) will presumably vote on the report on "Transparency, integrity and accountability in the EU institutions". The report includes important proposals on how to make decision-making in Brussels more transparent and ethical."
  •  
    "On 12 September, members of the European Parliament (MEPs) who sit on the committee on constitutional affairs (AFCO) will presumably vote on the report on "Transparency, integrity and accountability in the EU institutions". The report includes important proposals on how to make decision-making in Brussels more transparent and ethical."
Gonzalo San Gil, PhD.

Once Again, The Brussels Attacks Were An Intelligence Community Failure, Not An 'Encryp... - 0 views

  •  
    "After the Paris attacks late last year, we noted that it was clear that they were evidence of an intelligence community failure, rather than an "encryption" problem -- which kind of explained why the intelligence community quickly tried to blame encryption. But, as we noted, most of the attackers were already known to the intelligence community and law enforcement -- and there's still little evidence that they used any encryption. "
  •  
    "After the Paris attacks late last year, we noted that it was clear that they were evidence of an intelligence community failure, rather than an "encryption" problem -- which kind of explained why the intelligence community quickly tried to blame encryption. But, as we noted, most of the attackers were already known to the intelligence community and law enforcement -- and there's still little evidence that they used any encryption. "
Gonzalo San Gil, PhD.

EU doubles down on TTIP secrecy as public resistance grows | Ars Technica UK [# ! Note...] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! What kind of #Democracy is this where citiens # ! are kept aside of the process of elaboration of # ! essential legislation...? # ! :/
  •  
    "Top national politicians must visit a special room in Brussels to read key TTIP documents. by Glyn Moody - Aug 14, 2015 9:45 am UTC"
  •  
    "Top national politicians must visit a special room in Brussels to read key TTIP documents. by Glyn Moody - Aug 14, 2015 9:45 am UTC"
Gonzalo San Gil, PhD.

European citizens have spoken out, and it's time for the EU to pass Net Neutrality | Ac... - 0 views

  •  
    "As digital rights advocates around the world celebrate the victory for Net Neutrality in the U.S., we should remember that the fight in Europe is heating up. Right now decision makers in Brussels are negotiating over a crucial text to preserve the open internet, and it's time for them to make the right decision and pass Net Neutrality into law. The European Parliament holds the key."
  •  
    "As digital rights advocates around the world celebrate the victory for Net Neutrality in the U.S., we should remember that the fight in Europe is heating up. Right now decision makers in Brussels are negotiating over a crucial text to preserve the open internet, and it's time for them to make the right decision and pass Net Neutrality into law. The European Parliament holds the key."
Paul Merrell

German Parliament tells government to strictly limit patents on software - 0 views

  • Tens of thousands of software patents in Germany and Europe present enormous cost and liability risks, especially for SMEs. Several German SME associations welcomed the Parliament's decision. However they warn against giving all the responsibility to Brussels, as the EU has been consistently incapable of providing software developers with legal certainty. "Germany now has to implement this decision in law, to send a strong signal towards Brussels," says Johannes Sommer of BIKT, one of the associations.
Gonzalo San Gil, PhD.

Important victories on ACTA! Moving on to Final Steps | La Quadrature du Net - 0 views

  •  
    [Submitted on 31 May 2012 - 08:53 ACTA copyright Karel De Gucht David Martin Marielle Gallo Brussels, May 31st 2012 - Votes were cast in three of the four parliamentary committees preparing the EU Parliament's final decision on ACTA. Citizens' concerns, as well as Internet innovators & start-ups' interests have been upheld in "Civil Liberties" (LIBE) and the "Industry" (ITRE) committees. Even the "Legal affairs" (JURI) committee, usually very conservative and keen to support repression on copyright issues, rejected Marielle Gallo's pro-ACTA opinion. Citizens should rejoice but keep up the pressure for the upcoming steps, up until the final vote scheduled for early July. A massive rejection of ACTA would create a political symbol of global scale.]
Gonzalo San Gil, PhD.

In Response To Growing Protests, EU Pulls Corporate Sovereignty Chapter From TAFTA/TTIP... - 0 views

  •  
    "from the more-of-this,-please dept Here on Techdirt, we've been writing about the dangers of corporate sovereignty for a while. In recent months, more and more people and organizations have pointed out that the plan to include an investor-state dispute settlement (ISDS) in the TAFTA/TTIP agreement currently being negotiated is fraught with dangers -- and also completely unnecessary given the fair and efficient legal systems that exist on both sides of the Atlantic. It seems that this chorus of disapproval has finally been noticed, in Brussels at least: "
Gonzalo San Gil, PhD.

Save the Internet - contact your parlamentarian today! - 1 views

  •  
    "Your freedom online is threatened by an EU proposal. The fight for an open Internet is happening right now in Brussels. Take action!"
  •  
    * #Knowledge, #Feedom, #Future #Let's save 'em
Gonzalo San Gil, PhD.

Net Neutrality: A Great Step Forward for the Free Internet! | La Quadrature du Net - 1 views

  •  
    "Submitted on 3 Apr 2014 - 11:46 Kroes Telecoms Package Net neutrality Neelie Kroes Catherine Trautmann Pilar del Castillo Vera press release Printer-friendly version Send by email Français Brussels, 3 April 2014 - Today the European Parliament adopted in first reading the Regulation on the Single Telecoms Market (see the vote call). By amending the text with the amendment proposals made by the Social-Democrats (S&D), Greens (Greens/EFA), United Left (GUE/NGL) and Liberals (ALDE), the Members of the European Parliament took a historic step for the protection of Net Neutrality and the Internet commons in the European Union. La Quadrature du Net warmly thanks all citizens, organisations and parliamentarians who took part in this campaign, and calls on them to remain mobilised for the rest of the legislative procedure."
Gonzalo San Gil, PhD.

European Commission proposes new Investment Court System for TTIP and other EU trade an... - 0 views

  •  
    "Brussels, 16 September 2015 The European Commission has approved its proposal for a new and transparent system for resolving disputes between investors and states - the Investment Court System. The Investment Court System would replace the existing investor-to-state dispute settlement (ISDS) mechanism in all ongoing and future EU investment negotiations, including the EU-US talks on a Transatlantic Trade and Investment Partnership (TTIP)."
Gonzalo San Gil, PhD.

Gallo report: Copyright dogmatism wins a battle, not the war Submitted on 01 June 2010 ... - 1 views

  • Brussels, June 1st 2010 - The vote, in JURI committee of the European Parliament on the Gallo report "Enforcement of intellectual property", including the rapporteur's repressive amendments, reflects the asphyxiating influence of corporate lobbies on EU policy-making. The ALDE group, which had stood for fundamental freedoms on several occasions, this time sided with the entertainment industries. This vote should make EU citizens react and convince MEPs about the stakes of our evolving digital societies. Beyond the vote of the Gallo report in plenary session, there are other upcoming legislative battles where the public interest of creativity and access to knowledge can be upheld against an obsolete vision of copyright.
  •  
    Gallo Report on the future of EU copyright: repression or reflexion ? Submitted on 25 May 2010 in * copyright * proposals * Gallo * press release * Read more * Twitter * Facebook * Delicious * Digg * MySpace * Français Paris, May 25th, 2010 - The Gallo Report on the future of "intellectual property rights" (IPR) enforcement will be voted on June 1st, at 9 AM,1 in the Committee for Legal Affairs (JURI) of the European Parliament. Since no compromise was found between the members of the committee, two visions will frontally oppose. While the rapporteur -- French sarkozyst EPP member Marielle Gallo -- is pushing for more repression to tackle online file-sharing, some positive amendments from all the other political groups2 seek to end the dogmatic repression and call for the consideration of alternative schemes to fund creation. Every citizen concerned by the future of copyright in Europe and by the open nature of the Internet should express their views to the Members of the JURI committee3. 1. 1. http://www.europarl.europa.eu/activities/committees/calendarCom.do?langu... 2. 2. http://www.laquadrature.net/wiki/Rapport_Gallo_Amendments 3. 3. La Quadrature's wiki-based tool Political Memorycan be used for this purpose.
  •  
    Perhaps The (Only One) Association that cares about Internet Citizens' Freedoms here in Europe...
Paul Merrell

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • ...7 more annotations...
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
Gonzalo San Gil, PhD.

Save the Internet - contact your representative today! - 0 views

  •  
    "Defend net neutrality in Europe Your freedom online is threatened by an EU proposal. The fight for the open internet is happening right now in Brussels. "
Paul Merrell

Civil society organisations say no to intellectual property in EU - US trade agreement ... - 0 views

  • Brussels, 18 March 2013 -- More than 35 European and United States civil society organisations insist that a proposed trade agreement between the EU and the US exclude any provisions related to patents, copyright, trademarks, or other forms of so-called "intellectual property". Such provisions could impede citizens' rights to health, culture, and free expression and otherwise affect their daily lives.
  • We, the undersigned, are internet freedom and public health groups, activists, and other public interest leaders dedicated to the rights of all people to access cultural and educational resources and affordable medicines, to enjoy a free and open internet, and to benefit from open and needs-driven innovation. First, we insist that the European Union and United States release, in timely and ongoing fashion, any and all negotiating or pre-negotiation texts. We believe that secretive "trade" negotiations are absolutely unacceptable forums for devising binding rules that change national non-trade laws. Second, we insist that the proposed TAFTA exclude any provisions related to patents, copyright, trademarks, data protection, geographical indications, or other forms of so-called "intellectual property". Such provisions could impede our rights to health, culture, and free expression and otherwise affect our daily lives.
  • The civil society organisations also insist that the EU and US will release the negotiating texts of the trade agreement they intend to negotiate. They believe that secretive "trade" negotiations are absolutely unacceptable forums for devising binding rules that change national non-trade laws.
  • ...1 more annotation...
  • Past trade agreements negotiated by the US and EU have significantly increased the privileges of multinational corporations at the expense of society in general. Provisions in these agreements can, among many other concerns, limit free speech, constrain access to educational materials such as textbooks and academic journals, and, in the case of medicines, raise healthcare costs and contribute to preventable suffering and death. Unless "intellectual property" is excluded from these talks, we fear that the outcome will be an agreement that inflicts the worst of both regimes’ rules on the other party. From a democratic perspective, we believe that important rules governing technology, health, and culture should be debated in the US Congress, the European Parliament, national parliaments, and other transparent forums where all stakeholders can be heard—not in closed negotiations that give privileged access to corporate insiders. The TAFTA negotiations must not lead to a rewriting of patent and copyright rules in a way that tilts the balance even further away from the interests of citizens.
Paul Merrell

US websites should inform EU citizens about NSA surveillance, says report - 0 views

  • All existing data sharing agreements between Europe and the US should be revoked, and US web site providers should prominently inform European citizens that their data may be subject to government surveillance, according to the recommendations of a briefing report for the European Parliament. The report was produced in response to revelations about the US National Security Agency (NSA) snooping on internet traffic, and aims to highlight the subsequent effect on European Union (EU) citizens' rights.
  • The report warns that EU data protection authorities have failed to understand the “structural shift of data sovereignty implied by cloud computing”, and the associated risks to the rights of EU citizens. It suggests “a full industrial policy for development of an autonomous European cloud computing capacity” should be set up to reduce exposure of EU data to NSA surveillance that is undertaken by the use of US legislation that forces US-based cloud providers to provide access to data they hold.
  • To put pressure on the US government, the report recommends that US websites should ask EU citizens for their consent before gathering data that could be used by the NSA. “Prominent notices should be displayed by every US web site offering services in the EU to inform consent to collect data from EU citizens. The users should be made aware that the data may be subject to surveillance by the US government for any purpose which furthers US foreign policy,” it said. “A consent requirement will raise EU citizen awareness and favour growth of services solely within EU jurisdiction. This will thus have economic impact on US business and increase pressure on the US government to reach a settlement.”
  • ...2 more annotations...
  • Other recommendations include the EU offering protection and rewards for whistleblowers, including “strong guarantees of immunity and asylum”. Such a move would be seen as a direct response to the plight of Edward Snowden, the former NSA analyst who leaked documents that revealed the extent of the NSA’s global internet surveillance programmes. The report also says that, “Encryption is futile to defend against NSA accessing data processed by US clouds,” and that there is “no technical solution to the problem”. It calls for the EU to press for changes to US law.
  • “It seems that the only solution which can be trusted to resolve the Prism affair must involve changes to the law of the US, and this should be the strategic objective of the EU,” it said. The report was produced for the European Parliament committee on civil liberties, justice and home affairs, and comes before the latest hearing of an inquiry into electronic mass surveillance of EU citizens, due to take place in Brussels on 24 September.
  •  
    Yee-haw! E.U. sanctuary and rewards for NSA whistle-blowers. Mandatory warnings for customers of U.S. cloud services that their data may be turned over to the NSA. Pouring more gasoline on the NSA diplomatic fire. 
Paul Merrell

Internet Giants Erect Barriers to Spy Agencies - NYTimes.com - 0 views

  • As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps.
  • After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. Google, for example, is laying its own fiber optic cable under the world’s oceans, a project that began as an effort to cut costs and extend its influence, but now has an added purpose: to assure that the company will have more control over the movement of its customer data.
  • A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant.
  • ...8 more annotations...
  • Eric Grosse, Google’s security chief, suggested in an interview that the N.S.A.'s own behavior invited the new arms race.“I am willing to help on the purely defensive side of things,” he said, referring to Washington’s efforts to enlist Silicon Valley in cybersecurity efforts. “But signals intercept is totally off the table,” he said, referring to national intelligence gathering.“No hard feelings, but my job is to make their job hard,” he added.
  • In Washington, officials acknowledge that covert programs are now far harder to execute because American technology companies, fearful of losing international business, are hardening their networks and saying no to requests for the kind of help they once quietly provided.Continue reading the main story Robert S. Litt, the general counsel of the Office of the Director of National Intelligence, which oversees all 17 American spy agencies, said on Wednesday that it was “an unquestionable loss for our nation that companies are losing the willingness to cooperate legally and voluntarily” with American spy agencies.
  • Many point to an episode in 2012, when Russian security researchers uncovered a state espionage tool, Flame, on Iranian computers. Flame, like the Stuxnet worm, is believed to have been produced at least in part by American intelligence agencies. It was created by exploiting a previously unknown flaw in Microsoft’s operating systems. Companies argue that others could have later taken advantage of this defect.Worried that such an episode undercuts confidence in its wares, Microsoft is now fully encrypting all its products, including Hotmail and Outlook.com, by the end of this year with 2,048-bit encryption, a stronger protection that would take a government far longer to crack. The software is protected by encryption both when it is in data centers and when data is being sent over the Internet, said Bradford L. Smith, the company’s general counsel.
  • Mr. Smith also said the company was setting up “transparency centers” abroad so that technical experts of foreign governments could come in and inspect Microsoft’s proprietary source code. That will allow foreign governments to check to make sure there are no “back doors” that would permit snooping by United States intelligence agencies. The first such center is being set up in Brussels.Microsoft has also pushed back harder in court. In a Seattle case, the government issued a “national security letter” to compel Microsoft to turn over data about a customer, along with a gag order to prevent Microsoft from telling the customer it had been compelled to provide its communications to government officials. Microsoft challenged the gag order as violating the First Amendment. The government backed down.
  • Hardware firms like Cisco, which makes routers and switches, have found their products a frequent subject of Mr. Snowden’s disclosures, and their business has declined steadily in places like Asia, Brazil and Europe over the last year. The company is still struggling to convince foreign customers that their networks are safe from hackers — and free of “back doors” installed by the N.S.A. The frustration, companies here say, is that it is nearly impossible to prove that their systems are N.S.A.-proof.
  • In one slide from the disclosures, N.S.A. analysts pointed to a sweet spot inside Google’s data centers, where they could catch traffic in unencrypted form. Next to a quickly drawn smiley face, an N.S.A. analyst, referring to an acronym for a common layer of protection, had noted, “SSL added and removed here!”
  • Facebook and Yahoo have also been encrypting traffic among their internal servers. And Facebook, Google and Microsoft have been moving to more strongly encrypt consumer traffic with so-called Perfect Forward Secrecy, specifically devised to make it more labor intensive for the N.S.A. or anyone to read stored encrypted communications.One of the biggest indirect consequences from the Snowden revelations, technology executives say, has been the surge in demands from foreign governments that saw what kind of access to user information the N.S.A. received — voluntarily or surreptitiously. Now they want the same.
  • The latest move in the war between intelligence agencies and technology companies arrived this week, in the form of a new Google encryption tool. The company released a user-friendly, email encryption method to replace the clunky and often mistake-prone encryption schemes the N.S.A. has readily exploited.But the best part of the tool was buried in Google’s code, which included a jab at the N.S.A.'s smiley-face slide. The code included the phrase: “ssl-added-and-removed-here-; - )”
Paul Merrell

Belgium sues Facebook over illegal Privacy Violations of Users and Non-Users | nsnbc in... - 0 views

  • The Belgian government will be suing Facebook. The Commission for the Protection of Privacy states that Facebook violates Belgian and EU law by tracking systems that target both Facebook users as well as non-Facebook users. Facebook is known for cooperating with the U.S.’ National Security Agency. 
  • The Belgian privacy watchdog’s case against the internet giant Facebook will be heard at a court in Brussels on Thursday. The Commission has repeatedly requested that Facebook should comply with Belgian and EU law. Facebook failed to comply, and the Commission has no power to enforce the law; hence the decision to sue Facebook to attain a a court ruling. The President of the Commission for the Protection of Privacy, Willem Debeuckelaere, told the press that: “Facebook treats its users’ private lives without respect and that needs tackling. It’s not because we want to start a lawsuit over this, but we cannot continue to negotiate through other means. .. We want a judge to impose our recommendations. These recommendations are chiefly aimed at protecting internet users who are not Facebook members.”
  • The Belgian privacy watchdog alleges that Facebook tracks the web browsing of all visitors, including those who have specifically turned the tracking function off; This gathering of private information allegedly also includes those who do not have a Facebook account. Moreover, the Commission claims that Facebook has the capability to surveil computers without consent, even when users are logged out; and Facebook can monitor every PC of users that use websites with Facebook plugins. The capability to monitor both Facebook users and non-Facebook users allegedly functions via Cookies that store information about user’s internet activities, including preferential settings of websites and which websites internet users have visited. The Commission claims that Facebook installs these Cookies on all computers that visit websites that for example have a Facebook plugin to share internet content. That includes the computers of persons who do not make use of Facebook’s “share” or “like” button.
  • ...1 more annotation...
  • In other words, Facebook has the capacity to monitor your browser settings as well as which websites you have visited if you have read this article or any other article on any website that contains a Facebook “share” button, whether you “like” it or not. The Commissions lawsuit against Facebook is or particular importance due to the fact that the corporation is known for its cooperation with the United States’ National Security Agency (NSA). While the lawsuit is of particular interest for Belgian and EU citizens, it also sheds light on Facebook’s monitoring of U.S. citizens.
1 - 20 of 26 Next ›
Showing 20 items per page