Skip to main content

Home/ Future of the Web/ Group items tagged para

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Las mejores distribuciones Linux según tu profesión - 0 views

  •  
    "Igual que aquél anuncio de Coca-Cola, existe un GNU/Linux para los ingenieros, para los arquitectos, para los hackers, para los profesores, para los músicos, para los diseñadores, para los programadores, para los jugadores, para todos GNU/Linux. La gran cantidad de distribuciones existentes es enorme y lo más complicado a veces no es su manejo, sino elegir la más adecuada."
Paul Merrell

Internet Giants Erect Barriers to Spy Agencies - NYTimes.com - 0 views

  • As fast as it can, Google is sealing up cracks in its systems that Edward J. Snowden revealed the N.S.A. had brilliantly exploited. It is encrypting more data as it moves among its servers and helping customers encode their own emails. Facebook, Microsoft and Yahoo are taking similar steps.
  • After years of cooperating with the government, the immediate goal now is to thwart Washington — as well as Beijing and Moscow. The strategy is also intended to preserve business overseas in places like Brazil and Germany that have threatened to entrust data only to local providers. Google, for example, is laying its own fiber optic cable under the world’s oceans, a project that began as an effort to cut costs and extend its influence, but now has an added purpose: to assure that the company will have more control over the movement of its customer data.
  • A year after Mr. Snowden’s revelations, the era of quiet cooperation is over. Telecommunications companies say they are denying requests to volunteer data not covered by existing law. A.T.&T., Verizon and others say that compared with a year ago, they are far more reluctant to cooperate with the United States government in “gray areas” where there is no explicit requirement for a legal warrant.
  • ...8 more annotations...
  • Eric Grosse, Google’s security chief, suggested in an interview that the N.S.A.'s own behavior invited the new arms race.“I am willing to help on the purely defensive side of things,” he said, referring to Washington’s efforts to enlist Silicon Valley in cybersecurity efforts. “But signals intercept is totally off the table,” he said, referring to national intelligence gathering.“No hard feelings, but my job is to make their job hard,” he added.
  • In Washington, officials acknowledge that covert programs are now far harder to execute because American technology companies, fearful of losing international business, are hardening their networks and saying no to requests for the kind of help they once quietly provided.Continue reading the main story Robert S. Litt, the general counsel of the Office of the Director of National Intelligence, which oversees all 17 American spy agencies, said on Wednesday that it was “an unquestionable loss for our nation that companies are losing the willingness to cooperate legally and voluntarily” with American spy agencies.
  • Many point to an episode in 2012, when Russian security researchers uncovered a state espionage tool, Flame, on Iranian computers. Flame, like the Stuxnet worm, is believed to have been produced at least in part by American intelligence agencies. It was created by exploiting a previously unknown flaw in Microsoft’s operating systems. Companies argue that others could have later taken advantage of this defect.Worried that such an episode undercuts confidence in its wares, Microsoft is now fully encrypting all its products, including Hotmail and Outlook.com, by the end of this year with 2,048-bit encryption, a stronger protection that would take a government far longer to crack. The software is protected by encryption both when it is in data centers and when data is being sent over the Internet, said Bradford L. Smith, the company’s general counsel.
  • Mr. Smith also said the company was setting up “transparency centers” abroad so that technical experts of foreign governments could come in and inspect Microsoft’s proprietary source code. That will allow foreign governments to check to make sure there are no “back doors” that would permit snooping by United States intelligence agencies. The first such center is being set up in Brussels.Microsoft has also pushed back harder in court. In a Seattle case, the government issued a “national security letter” to compel Microsoft to turn over data about a customer, along with a gag order to prevent Microsoft from telling the customer it had been compelled to provide its communications to government officials. Microsoft challenged the gag order as violating the First Amendment. The government backed down.
  • Hardware firms like Cisco, which makes routers and switches, have found their products a frequent subject of Mr. Snowden’s disclosures, and their business has declined steadily in places like Asia, Brazil and Europe over the last year. The company is still struggling to convince foreign customers that their networks are safe from hackers — and free of “back doors” installed by the N.S.A. The frustration, companies here say, is that it is nearly impossible to prove that their systems are N.S.A.-proof.
  • In one slide from the disclosures, N.S.A. analysts pointed to a sweet spot inside Google’s data centers, where they could catch traffic in unencrypted form. Next to a quickly drawn smiley face, an N.S.A. analyst, referring to an acronym for a common layer of protection, had noted, “SSL added and removed here!”
  • Facebook and Yahoo have also been encrypting traffic among their internal servers. And Facebook, Google and Microsoft have been moving to more strongly encrypt consumer traffic with so-called Perfect Forward Secrecy, specifically devised to make it more labor intensive for the N.S.A. or anyone to read stored encrypted communications.One of the biggest indirect consequences from the Snowden revelations, technology executives say, has been the surge in demands from foreign governments that saw what kind of access to user information the N.S.A. received — voluntarily or surreptitiously. Now they want the same.
  • The latest move in the war between intelligence agencies and technology companies arrived this week, in the form of a new Google encryption tool. The company released a user-friendly, email encryption method to replace the clunky and often mistake-prone encryption schemes the N.S.A. has readily exploited.But the best part of the tool was buried in Google’s code, which included a jab at the N.S.A.'s smiley-face slide. The code included the phrase: “ssl-added-and-removed-here-; - )”
Paul Merrell

Data Transfer Pact Between U.S. and Europe Is Ruled Invalid - The New York Times - 0 views

  • Europe’s highest court on Tuesday struck down an international agreement that allowed companies to move digital information like people’s web search histories and social media updates between the European Union and the United States. The decision left the international operations of companies like Google and Facebook in a sort of legal limbo even as their services continued working as usual.The ruling, by the European Court of Justice, said the so-called safe harbor agreement was flawed because it allowed American government authorities to gain routine access to Europeans’ online information. The court said leaks from Edward J. Snowden, the former contractor for the National Security Agency, made it clear that American intelligence agencies had almost unfettered access to the data, infringing on Europeans’ rights to privacy. The court said data protection regulators in each of the European Union’s 28 countries should have oversight over how companies collect and use online information of their countries’ citizens. European countries have widely varying stances towards privacy.
  • Data protection advocates hailed the ruling. Industry executives and trade groups, though, said the decision left a huge amount of uncertainty for big companies, many of which rely on the easy flow of data for lucrative businesses like online advertising. They called on the European Commission to complete a new safe harbor agreement with the United States, a deal that has been negotiated for more than two years and could limit the fallout from the court’s decision.
  • Some European officials and many of the big technology companies, including Facebook and Microsoft, tried to play down the impact of the ruling. The companies kept their services running, saying that other agreements with the European Union should provide an adequate legal foundation.But those other agreements are now expected to be examined and questioned by some of Europe’s national privacy watchdogs. The potential inquiries could make it hard for companies to transfer Europeans’ information overseas under the current data arrangements. And the ruling appeared to leave smaller companies with fewer legal resources vulnerable to potential privacy violations.
  • ...3 more annotations...
  • “We can’t assume that anything is now safe,” Brian Hengesbaugh, a privacy lawyer with Baker & McKenzie in Chicago who helped to negotiate the original safe harbor agreement. “The ruling is so sweepingly broad that any mechanism used to transfer data from Europe could be under threat.”At issue is the sort of personal data that people create when they post something on Facebook or other social media; when they do web searches on Google; or when they order products or buy movies from Amazon or Apple. Such data is hugely valuable to companies, which use it in a broad range of ways, including tailoring advertisements to individuals and promoting products or services based on users’ online activities.The data-transfer ruling does not apply solely to tech companies. It also affects any organization with international operations, such as when a company has employees in more than one region and needs to transfer payroll information or allow workers to manage their employee benefits online.
  • But it was unclear how bulletproof those treaties would be under the new ruling, which cannot be appealed and went into effect immediately. Europe’s privacy watchdogs, for example, remain divided over how to police American tech companies.France and Germany, where companies like Facebook and Google have huge numbers of users and have already been subject to other privacy rulings, are among the countries that have sought more aggressive protections for their citizens’ personal data. Britain and Ireland, among others, have been supportive of Safe Harbor, and many large American tech companies have set up overseas headquarters in Ireland.
  • “For those who are willing to take on big companies, this ruling will have empowered them to act,” said Ot van Daalen, a Dutch privacy lawyer at Project Moore, who has been a vocal advocate for stricter data protection rules. The safe harbor agreement has been in place since 2000, enabling American tech companies to compile data generated by their European clients in web searches, social media posts and other online activities.
  •  
    Another take on it from EFF: https://www.eff.org/deeplinks/2015/10/europes-court-justice-nsa-surveilance Expected since the Court's Advocate General released an opinion last week, presaging today's opinion.  Very big bucks involved behind the scenes because removing U.S.-based internet companies from the scene in the E.U. would pave the way for growth of E.U.-based companies.  The way forward for the U.S. companies is even more dicey because of a case now pending in the U.S.  The Second U.S. Circuit Court of Appeals is about to decide a related case in which Microsoft was ordered by the lower court to produce email records stored on a server in Ireland. . Should the Second Circuit uphold the order and the Supreme Court deny review, then under the principles announced today by the Court in the E.U., no U.S.-based company could ever be allowed to have "possession, custody, or control" of the data of E.U. citizens. You can bet that the E.U. case will weigh heavily in the Second Circuit's deliberations.  The E.U. decision is by far and away the largest legal event yet flowing out of the Edward Snowden disclosures, tectonic in scale. Up to now, Congress has succeeded in confining all NSA reforms to apply only to U.S. citizens. But now the large U.S. internet companies, Google, Facebook, Microsoft, Dropbox, etc., face the loss of all Europe as a market. Congress *will* be forced by their lobbying power to extend privacy protections to "non-U.S. persons."  Thank you again, Edward Snowden.
Paul Merrell

European Parliament Urges Protection for Edward Snowden - The New York Times - 0 views

  • The European Parliament narrowly adopted a nonbinding but nonetheless forceful resolution on Thursday urging the 28 nations of the European Union to recognize Edward J. Snowden as a “whistle-blower and international human rights defender” and shield him from prosecution.On Twitter, Mr. Snowden, the former National Security Agency contractor who leaked millions of documents about electronic surveillance by the United States government, called the vote a “game-changer.” But the resolution has no legal force and limited practical effect for Mr. Snowden, who is living in Russia on a three-year residency permit.Whether to grant Mr. Snowden asylum remains a decision for the individual European governments, and none have done so thus far. Continue reading the main story Related Coverage Open Source: Now Following the N.S.A. on Twitter, @SnowdenSEPT. 29, 2015 Snowden Sees Some Victories, From a DistanceMAY 19, 2015 Still, the resolution was the strongest statement of support seen for Mr. Snowden from the European Parliament. At the same time, the close vote — 285 to 281 — suggested the extent to which some European lawmakers are wary of alienating the United States.
  • The resolution calls on European Union members to “drop any criminal charges against Edward Snowden, grant him protection and consequently prevent extradition or rendition by third parties.”In June 2013, shortly after Mr. Snowden’s leaks became public, the United States charged him with theft of government property and violations of the Espionage Act of 1917. By then, he had flown to Moscow, where he spent weeks in legal limbo before he was granted temporary asylum and, later, a residency permit.Four Latin American nations have offered him permanent asylum, but he does not believe he could travel from Russia to those countries without running the risk of arrest and extradition to the United States along the way.
  • The White House, which has used diplomatic efforts to discourage even symbolic resolutions of support for Mr. Snowden, immediately criticized the resolution.“Our position has not changed,” said Ned Price, a spokesman for the National Security Council in Washington.“Mr. Snowden is accused of leaking classified information and faces felony charges here in the United States. As such, he should be returned to the U.S. as soon as possible, where he will be accorded full due process.”Jan Philipp Albrecht, one of the lawmakers who sponsored the resolution in Europe, said it should increase pressure on national governments.
  • ...1 more annotation...
  • “It’s the first time a Parliament votes to ask for this to be done — and it’s the European Parliament,” Mr. Albrecht, a German lawmaker with the Greens political bloc, said in a phone interview shortly after the vote, which was held in Strasbourg, France. “So this has an impact surely on the debate in the member states.”The resolution “is asking or demanding the member states’ governments to end all the charges and to prevent any extradition to a third party,” Mr. Albrecht said. “That’s a very clear call, and that can’t be just ignored by the governments,” he said.
Paul Merrell

F.B.I. Director to Call 'Dark' Devices a Hindrance to Crime Solving in a Policy Speech ... - 0 views

  • In his first major policy speech as director of the F.B.I., James B. Comey on Thursday plans to wade deeper into the debate between law enforcement agencies and technology companies about new programs intended to protect personal information on communication devices.Mr. Comey will say that encryption technologies used on these devices, like the new iPhone, have become so sophisticated that crimes will go unsolved because law enforcement officers will not be able to get information from them, according to a senior F.B.I. official who provided a preview of the speech.The speech was prompted, in part, by the new encryption technology on the iPhone 6, which was released last month. The phone encrypts emails, photos and contacts, thwarting intelligence and law enforcement agencies, like the National Security Agency and F.B.I., from gaining access to it, even if they have court approval.
  • The F.B.I. has long had concerns about devices “going dark” — when technology becomes so sophisticated that the authorities cannot gain access. But now, Mr. Comey said he believes that the new encryption technology has evolved to the point that it will adversely affect crime solving.He will say in the speech that these new programs will most severely affect state and local law enforcement agencies, because they are the ones who most often investigate crimes like kidnappings and robberies in which getting information from electronic devices in a timely manner is essential to solving the crime.
  • They also do not have the resources that are available to the F.B.I. and other federal intelligence and law enforcement authorities in order to get around the programs.Mr. Comey will cite examples of crimes that the authorities were able to solve because they gained access to a phone.“He is going to call for a discussion on this issue and ask whether this is the path we want to go down,” said the senior F.B.I. official. “He is not going to accuse the companies of designing the technologies to prevent the F.B.I. from accessing them. But, he will say that this is a negative byproduct and we need to work together to fix it.”
  • ...2 more annotations...
  • Mr. Comey is scheduled to give the speech — titled “Going Dark: Are Technology, Privacy and Public Safety on a Collision Course?” — at the Brookings Institution in Washington.
  • In the interview that aired on “60 Minutes” on Sunday, Mr. Comey said that “the notion that we would market devices that would allow someone to place themselves beyond the law troubles me a lot.”He said that it was the equivalent of selling cars with trunks that could never be opened, even with a court order.“The notion that people have devices, again, that with court orders, based on a showing of probable cause in a case involving kidnapping or child exploitation or terrorism, we could never open that phone?” he said. “My sense is that we've gone too far when we've gone there.”
  •  
    I'm informed that Comey will also call for legislation outlawing communication by whispering because of technical difficulties in law enforcement monitoring of such communications. 
Gonzalo San Gil, PhD.

Wikipedia:Asistente para la creación de artículos - Wikipedia, la enciclopedi... - 0 views

  •  
    "Asistente para la creación de artículos ¡Bienvenido(s) al asistente para la creación de artículos de Wikipedia! Este asistente te ayudará durante el proceso de creación de un artículo en Wikipedia. Para la redacción de un artículo válido, has de seguir unos breves pasos. A medida que avances, el siguiente paso será accesible. En esta página, te ayudaremos a utilizar las herramientas necesarias para redactar tus artículos."
Gonzalo San Gil, PhD.

Anonymous presenta Operación Goya - 0 views

  • lunes 24 de enero de 2011 Acude a Los Goya y felicita a González-Sinde por su Ley El DOMINGO 13 DE FEBRERO por la noche se celebran LOS GOYA en el Teatro Real de MADRID. Anonymous irá de excursión hasta las vallas de la alfombra roja para hacer ruido contra la LEY SINDE y contra aquellos que nos llaman ladrones.Si quieres estar allí TIENES HASTA EL DÍA 3 DE FEBRERO para ENVIAR UN MAIL a la DIRECCIÓN QUE SE CORRESPONDA CON TU ZONA. Según los que se apunten en cada ciudad se informará si el viaje es viable o no, medios de transporte y demás. Es importante saber cuantos somos y tener un contacto para organizar la excursión, así que ENVÍA EL MAIL. Cada dirección la lleva alguien de esa zona.
  •  
    [lunes 24 de enero de 2011 Acude a Los Goya y felicita a González-Sinde por su Ley El DOMINGO 13 DE FEBRERO por la noche se celebran LOS GOYA en el Teatro Real de MADRID. Anonymous irá de excursión hasta las vallas de la alfombra roja para hacer ruido contra la LEY SINDE y contra aquellos que nos llaman ladrones. Si quieres estar allí TIENES HASTA EL DÍA 3 DE FEBRERO para ENVIAR UN MAIL a la DIRECCIÓN QUE SE CORRESPONDA CON TU ZONA. Según los que se apunten en cada ciudad se informará si el viaje es viable o no, medios de transporte y demás. Es importante saber cuantos somos y tener un contacto para organizar la excursión, así que ENVÍA EL MAIL. Cada dirección la lleva alguien de esa zona.]
  •  
    The Proseccution Against P2P and Free Downloads is stiflin much more than the Freedom Of Expression. Join The Demonstrations along All Countries (Of The Still Free World...)
Gonzalo San Gil, PhD.

Copyright: Los derechos humanos como punto de partida - ONG Derechos Digitales - 0 views

  •  
    "¿Desde dónde partimos para construir un modelo de derecho de autor balanceado, que otorgue incentivos para crear y garantías de acceso para el público? Hay a lo menos cuatro principios que se desprenden de declaraciones conjuntas de relatores de libertad de expresión a nivel mundial que nos ayudan a concebir un modelo respetuoso con los derechos humanos."
  •  
    "¿Desde dónde partimos para construir un modelo de derecho de autor balanceado, que otorgue incentivos para crear y garantías de acceso para el público? Hay a lo menos cuatro principios que se desprenden de declaraciones conjuntas de relatores de libertad de expresión a nivel mundial que nos ayudan a concebir un modelo respetuoso con los derechos humanos."
Paul Merrell

European Human Rights Court Deals a Heavy Blow to the Lawfulness of Bulk Surveillance |... - 0 views

  • In a seminal decision updating and consolidating its previous jurisprudence on surveillance, the Grand Chamber of the European Court of Human Rights took a sideways swing at mass surveillance programs last week, reiterating the centrality of “reasonable suspicion” to the authorization process and the need to ensure interception warrants are targeted to an individual or premises. The decision in Zakharov v. Russia — coming on the heels of the European Court of Justice’s strongly-worded condemnation in Schrems of interception systems that provide States with “generalised access” to the content of communications — is another blow to governments across Europe and the United States that continue to argue for the legitimacy and lawfulness of bulk collection programs. It also provoked the ire of the Russian government, prompting an immediate legislative move to give the Russian constitution precedence over Strasbourg judgments. The Grand Chamber’s judgment in Zakharov is especially notable because its subject matter — the Russian SORM system of interception, which includes the installation of equipment on telecommunications networks that subsequently enables the State direct access to the communications transiting through those networks — is similar in many ways to the interception systems currently enjoying public and judicial scrutiny in the United States, France, and the United Kingdom. Zakharov also provides a timely opportunity to compare the differences between UK and Russian law: Namely, Russian law requires prior independent authorization of interception measures, whereas neither the proposed UK law nor the existing legislative framework do.
  • The decision is lengthy and comprises a useful restatement and harmonization of the Court’s approach to standing (which it calls “victim status”) in surveillance cases, which is markedly different from that taken by the US Supreme Court. (Indeed, Judge Dedov’s separate but concurring opinion notes the contrast with Clapper v. Amnesty International.) It also addresses at length issues of supervision and oversight, as well as the role played by notification in ensuring the effectiveness of remedies. (Marko Milanovic discusses many of these issues here.) For the purpose of the ongoing debate around the legitimacy of bulk surveillance regimes under international human rights law, however, three particular conclusions of the Court are critical.
  • The Court took issue with legislation permitting the interception of communications for broad national, military, or economic security purposes (as well as for “ecological security” in the Russian case), absent any indication of the particular circumstances under which an individual’s communications may be intercepted. It said that such broadly worded statutes confer an “almost unlimited degree of discretion in determining which events or acts constitute such a threat and whether that threat is serious enough to justify secret surveillance” (para. 248). Such discretion cannot be unbounded. It can be limited through the requirement for prior judicial authorization of interception measures (para. 249). Non-judicial authorities may also be competent to authorize interception, provided they are sufficiently independent from the executive (para. 258). What is important, the Court said, is that the entity authorizing interception must be “capable of verifying the existence of a reasonable suspicion against the person concerned, in particular, whether there are factual indications for suspecting that person of planning, committing or having committed criminal acts or other acts that may give rise to secret surveillance measures, such as, for example, acts endangering national security” (para. 260). This finding clearly constitutes a significant threshold which a number of existing and pending European surveillance laws would not meet. For example, the existence of individualized reasonable suspicion runs contrary to the premise of signals intelligence programs where communications are intercepted in bulk; by definition, those programs collect information without any consideration of individualized suspicion. Yet the Court was clearly articulating the principle with national security-driven surveillance in mind, and with the knowledge that interception of communications in Russia is conducted by Russian intelligence on behalf of law enforcement agencies.
  • ...6 more annotations...
  • This element of the Grand Chamber’s decision distinguishes it from prior jurisprudence of the Court, namely the decisions of the Third Section in Weber and Saravia v. Germany (2006) and of the Fourth Section in Liberty and Ors v. United Kingdom (2008). In both cases, the Court considered legislative frameworks which enable bulk interception of communications. (In the German case, the Court used the term “strategic monitoring,” while it referred to “more general programmes of surveillance” in Liberty.) In the latter case, the Fourth Section sought to depart from earlier European Commission of Human Rights — the court of first instance until 1998 — decisions which developed the requirements of the law in the context of surveillance measures targeted at specific individuals or addresses. It took note of the Weber decision which “was itself concerned with generalized ‘strategic monitoring’, rather than the monitoring of individuals” and concluded that there was no “ground to apply different principles concerning the accessibility and clarity of the rules governing the interception of individual communications, on the one hand, and more general programmes of surveillance, on the other” (para. 63). The Court in Liberty made no mention of any need for any prior or reasonable suspicion at all.
  • In Weber, reasonable suspicion was addressed only at the post-interception stage; that is, under the German system, bulk intercepted data could be transmitted from the German Federal Intelligence Service (BND) to law enforcement authorities without any prior suspicion. The Court found that the transmission of personal data without any specific prior suspicion, “in order to allow the institution of criminal proceedings against those being monitored” constituted a fairly serious interference with individuals’ privacy rights that could only be remedied by safeguards and protections limiting the extent to which such data could be used (para. 125). (In the context of that case, the Court found that Germany’s protections and restrictions were sufficient.) When you compare the language from these three cases, it would appear that the Grand Chamber in Zakharov is reasserting the requirement for individualized reasonable suspicion, including in national security cases, with full knowledge of the nature of surveillance considered by the Court in its two recent bulk interception cases.
  • The requirement of reasonable suspicion is bolstered by the Grand Chamber’s subsequent finding in Zakharov that the interception authorization (e.g., the court order or warrant) “must clearly identify a specific person to be placed under surveillance or a single set of premises as the premises in respect of which the authorisation is ordered. Such identification may be made by names, addresses, telephone numbers or other relevant information” (para. 264). In making this finding, it references paragraphs from Liberty describing the broad nature of the bulk interception warrants under British law. In that case, it was this description that led the Court to find the British legislation possessed insufficient clarity on the scope or manner of exercise of the State’s discretion to intercept communications. In one sense, therefore, the Grand Chamber seems to be retroactively annotating the Fourth Section’s Liberty decision so that it might become consistent with its decision in Zakharov. Without this revision, the Court would otherwise appear to depart to some extent — arguably, purposefully — from both Liberty and Weber.
  • Finally, the Grand Chamber took issue with the direct nature of the access enjoyed by Russian intelligence under the SORM system. The Court noted that this contributed to rendering oversight ineffective, despite the existence of a requirement for prior judicial authorization. Absent an obligation to demonstrate such prior authorization to the communications service provider, the likelihood that the system would be abused through “improper action by a dishonest, negligent or overly zealous official” was quite high (para. 270). Accordingly, “the requirement to show an interception authorisation to the communications service provider before obtaining access to a person’s communications is one of the important safeguards against abuse by the law-enforcement authorities” (para. 269). Again, this requirement arguably creates an unconquerable barrier for a number of modern bulk interception systems, which rely on the use of broad warrants to authorize the installation of, for example, fiber optic cable taps that facilitate the interception of all communications that cross those cables. In the United Kingdom, the Independent Reviewer of Terrorism Legislation David Anderson revealed in his essential inquiry into British surveillance in 2015, there are only 20 such warrants in existence at any time. Even if these 20 warrants are served on the relevant communications service providers upon the installation of cable taps, the nature of bulk interception deprives this of any genuine meaning, making the safeguard an empty one. Once a tap is installed for the purposes of bulk interception, the provider is cut out of the equation and can no longer play the role the Court found so crucial in Zakharov.
  • The Zakharov case not only levels a serious blow at bulk, untargeted surveillance regimes, it suggests the Grand Chamber’s intention to actively craft European Court of Human Rights jurisprudence in a manner that curtails such regimes. Any suggestion that the Grand Chamber’s decision was issued in ignorance of the technical capabilities or intentions of States and the continued preference for bulk interception systems should be dispelled; the oral argument in the case took place in September 2014, at a time when the Court had already indicated its intention to accord priority to cases arising out of the Snowden revelations. Indeed, the Court referenced such forthcoming cases in the fact sheet it issued after the Zakharov judgment was released. Any remaining doubt is eradicated through an inspection of the multiple references to the Snowden revelations in the judgment itself. In the main judgment, the Court excerpted text from the Director of the European Union Agency for Human Rights discussing Snowden, and in the separate opinion issued by Judge Dedov, he goes so far as to quote Edward Snowden: “With each court victory, with every change in the law, we demonstrate facts are more convincing than fear. As a society, we rediscover that the value of the right is not in what it hides, but in what it protects.”
  • The full implications of the Zakharov decision remain to be seen. However, it is likely we will not have to wait long to know whether the Grand Chamber intends to see the demise of bulk collection schemes; the three UK cases (Big Brother Watch & Ors v. United Kingdom, Bureau of Investigative Journalism & Alice Ross v. United Kingdom, and 10 Human Rights Organisations v. United Kingdom) pending before the Court have been fast-tracked, indicating the Court’s willingness to continue to confront the compliance of bulk collection schemes with human rights law. It is my hope that the approach in Zakharov hints at the Court’s conviction that bulk collection schemes lie beyond the bounds of permissible State surveillance.
Gonzalo San Gil, PhD.

Como obtener un Certificado SSL para un sitio web - 0 views

  •  
    "Tipos de certificados TLS, donde comprarlos o adquirirlos gratis para habilitar la navegación con HTTPS. Principales y mejores servicios de certificación. Todos los pasos para crear un archivo CSR (Solicitud de Firma de Certificado), para poder adquirir un certificado. "
Gonzalo San Gil, PhD.

Propuesta sobre los pasos siguientes para las redes emergentes del Procomún y... - 0 views

    • Gonzalo San Gil, PhD.
       
      [# ! Via, Gracias pod C@mpartir, Michel Bauwens' FB...]
  •  
    [Michel Bauwens Traducido por Stacco Troncoso, editado por Alicia Aguirre de Cárcer - Guerrilla Translation! Artículo original en el blog de la P2P-Foundation. "En resumen, necesitamos una alianza del procomún para fomentar su poder político y civil e influir sobre todos los niveles de la sociedad; necesitamos filés con las que reforzar nuestra economía al margen del sistema dominante de maximización de ganancias; y necesitamos una Cámara del Procomún para formalizar una política territorial junto a las condiciones legales e infraestructurales necesarias para estimular la creación de una economía política afín a los valores humanos y ecológicos. ...]
Gonzalo San Gil, PhD.

Edición social de "Todo va a cambiar" » El Blog de Enrique Dans - 0 views

  •  
    [... Hoy publico en la red una iniciativa en la que llevo bastante tiempo trabajando y que me hace especial ilusión: la edición social de mi libro, "Todo va a cambiar". ¿Qué es exactamente una edición social? Básicamente, una idea a la que llevaba bastante tiempo dandole vueltas: quería poner el libro en texto completo en la red, pero no quería limitarme simplemente a eso, sino además, explorar un poco más un formato que pudiese aprovechar las ventajas que la red puede ofrecer frente al papel. Lo que hice fue, por tanto, trabajar sobre el texto del libro pensando en dotarlo de una "dimensión red", intentando añadirle un nivel de profundidad adicional mediante una gran cantidad de enlaces (definiciones de términos en Wikipedia, referencias, entradas de mi propio blog en las que desarrollo más algunos temas, artículos o comentarios en otros sitios, etc.), y también mediante ilustraciones y vídeos que pudieran hacer más amena la lectura, plantear metáforas o evocaciones sobre los temas comentados, o contribuir al sentido o al entendimiento de lo escrito. La verdad es que es un trabajo intenso, pero que tiene mucho sentido para alguien que, como yo, utiliza el formato blog para expresarse de manera habitual: de hecho, recuerdo cómo, durante el proceso de escritura del libro, lamentaba en muchas ocasiones no poder añadir esos enlaces o referencias por no tener sentido en un formato papel. Seguro que no funciona para todos los tipos de libros ni para todas las temáticas, pero en el caso de "Todo va a cambiar", parecía tener mucha lógica. La próxima vez, si todo va bien, trataré de hacerlo durante el proceso inicial de escritura. ...]
Gonzalo San Gil, PhD.

La Fiscalía de Ciberdelincuencia archiva las Diligencias incoadas por escucha... - 0 views

  •  
    "Entendíamos que "dada la relevancia de los riesgos que conlleva para la sociedad este tipo de actuaciones y la posible existencia de espionajes masivos de las comunicaciones sin control, incluso para fines que nada tienen que ver con la Seguridad del Estado", y al amparo del art. 5 del Estatuto Orgánico del Ministerio Fiscal ("para el esclarecimiento de los hechos que aparezcan en los atestados de los que conozca, puede llevar a cabo u ordenar aquellas diligencias para las que esté legitimado..."), era precisa esa investigación y que los ciudadanos pudieran saber qué había ocurrido."
Paul Merrell

WhatsApp Encryption Said to Stymie Wiretap Order - The New York Times - 0 views

  • While the Justice Department wages a public fight with Apple over access to a locked iPhone, government officials are privately debating how to resolve a prolonged standoff with another technology company, WhatsApp, over access to its popular instant messaging application, officials and others involved in the case said. No decision has been made, but a court fight with WhatsApp, the world’s largest mobile messaging service, would open a new front in the Obama administration’s dispute with Silicon Valley over encryption, security and privacy.WhatsApp, which is owned by Facebook, allows customers to send messages and make phone calls over the Internet. In the last year, the company has been adding encryption to those conversations, making it impossible for the Justice Department to read or eavesdrop, even with a judge’s wiretap order.
  • As recently as this past week, officials said, the Justice Department was discussing how to proceed in a continuing criminal investigation in which a federal judge had approved a wiretap, but investigators were stymied by WhatsApp’s encryption.The Justice Department and WhatsApp declined to comment. The government officials and others who discussed the dispute did so on condition of anonymity because the wiretap order and all the information associated with it were under seal. The nature of the case was not clear, except that officials said it was not a terrorism investigation. The location of the investigation was also unclear.
  • To understand the battle lines, consider this imperfect analogy from the predigital world: If the Apple dispute is akin to whether the F.B.I. can unlock your front door and search your house, the issue with WhatsApp is whether it can listen to your phone calls. In the era of encryption, neither question has a clear answer.Some investigators view the WhatsApp issue as even more significant than the one over locked phones because it goes to the heart of the future of wiretapping. They say the Justice Department should ask a judge to force WhatsApp to help the government get information that has been encrypted. Others are reluctant to escalate the dispute, particularly with senators saying they will soon introduce legislation to help the government get data in a format it can read.
Gonzalo San Gil, PhD.

Kali linux 2.0, la distribución GNU/Linux para hacker - Software Libre - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! :/ no sabía... # ! ... ahora, sí.
  •  
    [Para los aficionados a la seguridad informática y que gusten de tener herramientas especiales para su trabajo, es una buena noticia la reciente salida a la luz de y una distro de linux pensada especialmente para estos profesionales. ...]
Paul Merrell

Security Experts Oppose Government Access to Encrypted Communication - The New York Times - 0 views

  • An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.A new paper from the group, made up of 14 of the world’s pre-eminent cryptographers and computer scientists, is a formidable salvo in a skirmish between intelligence and law enforcement leaders, and technologists and privacy advocates. After Edward J. Snowden’s revelations — with security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds — encryption has emerged as a major issue in the debate over privacy rights.
  • That has put Silicon Valley at the center of a tug of war. Technology companies including Apple, Microsoft and Google have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers.
  • Yet law enforcement and intelligence agency leaders argue that such efforts thwart their ability to monitor kidnappers, terrorists and other adversaries. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data, but to divide the key into pieces and secure it so that no one person or government agency could use it alone.The encryption debate has left both sides bitterly divided and in fighting mode. The group of cryptographers deliberately issued its report a day before James B. Comey Jr., the director of the Federal Bureau of Investigation, and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to testify before the Senate Judiciary Committee on the concerns that they and other government agencies have that encryption technologies will prevent them from effectively doing their jobs.
  • ...2 more annotations...
  • The new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers, including Whitfield Diffie, a pioneer of public key cryptography, and Ronald L. Rivest, the “R” in the widely used RSA public cryptography algorithm. In the report, the group said any effort to give the government “exceptional access” to encrypted communications was technically unfeasible and would leave confidential data and critical infrastructure like banks and the power grid at risk. Handing governments a key to encrypted communications would also require an extraordinary degree of trust. With government agency breaches now the norm — most recently at the United States Office of Personnel Management, the State Department and the White House — the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals. They added that if the United States and Britain mandated backdoor keys to communications, China and other governments in foreign markets would be spurred to do the same.
  • “Such access will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend,” the report said. “The costs would be substantial, the damage to innovation severe and the consequences to economic growth hard to predict. The costs to the developed countries’ soft power and to our moral authority would also be considerable.”
  •  
    Our system of government does not expect that every criminal will be apprehended and convicted. There are numerous values our society believes are more important. Some examples: [i] a presumption of innocence unless guilt is established beyond any reasonable doubt; [ii] the requirement that government officials convince a neutral magistrate that they have probable cause to believe that a search or seizure will produce evidence of a crime; [iii] many communications cannot be compelled to be disclosed and used in evidence, such as attorney-client communications, spousal communications, and priest-penitent communications; and [iv] etc. Moral of my story: the government needs a much stronger reason to justify interception of communications than saying, "some crooks will escape prosecution if we can't do that." We have a right to whisper to each other, concealing our communicatons from all others. Why does the right to whisper privately disappear if our whisperings are done electronically? The Supreme Court took its first step on a very slippery slope when it permitted wiretapping in Olmstead v. United States, 277 U.S. 438, 48 S. Ct. 564, 72 L. Ed. 944 (1928). https://goo.gl/LaZGHt It's been a long slide ever since. It's past time to revisit Olmstead and recognize that American citizens have the absolute right to communicate privately. "The President … recognizes that U.S. citizens and institutions should have a reasonable expectation of privacy from foreign or domestic intercept when using the public telephone system." - Brent Scowcroft, U.S. National Security Advisor, National Security Decision Memorandum 338 (1 September 1976) (Nixon administration), http://www.fas.org/irp/offdocs/nsdm-ford/nsdm-338.pdf   
Gonzalo San Gil, PhD.

Tails: Distribución Linux para el anonimato en la red - 0 views

  •  
    [Todos los días la privacidad de los usuarios se reduce un poco más gracias a los embates que llevan adelante las compañías que manejan grandes cantidades de información y que requieren de la nuestra como para darnos un servicio a cambios. Google, Microsoft, Facebook, Oracle y bueno, casi todo el resto de la internet superficial toma algún rastro de los tantos que dejamos. Si eres de aquellos a los que esto les preocupa y mucho, una distribución Linux para el anonimato en la red es lo que andas buscando. Su nombre, Tails. ]
Gonzalo San Gil, PhD.

VII FORO DE INDUSTRIAS CULTURALES | ¿Cultura o barbarie? Diez propuestas al b... - 0 views

  •  
    "PROGRAMA PROVISIONAL ¿Cultura o barbarie? Diez propuestas al borde del abismo Jueves, 5 de noviembre de 2015 Museo Nacional Centro de Arte Reina Sofía Mañana 10:30-12:00 h. Mesa institucional Intervienen: José Luis Acosta, presidente de la Sociedad de General de Autores y Editores (SGAE). Basilio Baltasar, director de la Fundación Santillana (área cultural). Fernando Carro, presidente de Bertelsmann España y miembro del Comité ejecutivo. Laura Halpern, directora de la Fundación Jesús Serra Ignacio Polanco, presidente de la Fundación Santillana. Pere Portabella, presidente de la Fundación Alternativas. 12:00-12:30 h. Pausa 12:30-14:00 h. El papel de las políticas y el Estado Modera: Luz Sanchez-Mellado, periodista de El País. Intervienen: Carmen Alborch, ex ministra de cultura y senadora. Juan Cruz, adjunto a la dirección de El País para Cultura y Babelia. Santiago Eraso, director de contenidos de Madrid Destino. Rosina Gómez-Baeza, presidenta de Factoría Cultural, Vivero de Industrias Creativas. Enric Juliana, periodista de La Vanguardia. César Antonio Molina, escritor y director de la Casa del Lector. 14:00-16:00 h. Almuerzo Tarde 16:00-17:30 h. Decálogo: exigencias y urgencias Modera: Joana Bonet, articulista de La Vanguardia. Intervienen: Antonio María Ávila, director ejecutivo de la Federación del Gremio de Editores. Jesús Cimarro, presidente de la Federación Estatal de Asociaciones de Empresas Productoras de Teatro y Danza de España. Ramon Colom, presidente FAPAE (Confederación de Productores Audiovisuales Españoles). Patricia Gabeiras, directora de Legal Music Producciones Vocal en la Junta Directiva de la Asociación de Promotores Musicales. Isidro López-Aparicio, artista plástico y miembro de la UAAV, Unión de Asociaciones de Artistas Visuales. Profesor de Bellas Artes de la Universidad de Granada y del I
  •  
    "PROGRAMA PROVISIONAL ¿Cultura o barbarie? Diez propuestas al borde del abismo Jueves, 5 de noviembre de 2015 Museo Nacional Centro de Arte Reina Sofía Mañana 10:30-12:00 h. Mesa institucional Intervienen: José Luis Acosta, presidente de la Sociedad de General de Autores y Editores (SGAE). Basilio Baltasar, director de la Fundación Santillana (área cultural). Fernando Carro, presidente de Bertelsmann España y miembro del Comité ejecutivo. Laura Halpern, directora de la Fundación Jesús Serra Ignacio Polanco, presidente de la Fundación Santillana. Pere Portabella, presidente de la Fundación Alternativas. 12:00-12:30 h. Pausa 12:30-14:00 h. El papel de las políticas y el Estado Modera: Luz Sanchez-Mellado, periodista de El País. Intervienen: Carmen Alborch, ex ministra de cultura y senadora. Juan Cruz, adjunto a la dirección de El País para Cultura y Babelia. Santiago Eraso, director de contenidos de Madrid Destino. Rosina Gómez-Baeza, presidenta de Factoría Cultural, Vivero de Industrias Creativas. Enric Juliana, periodista de La Vanguardia. César Antonio Molina, escritor y director de la Casa del Lector. 14:00-16:00 h. Almuerzo Tarde 16:00-17:30 h. Decálogo: exigencias y urgencias Modera: Joana Bonet, articulista de La Vanguardia. Intervienen: Antonio María Ávila, director ejecutivo de la Federación del Gremio de Editores. Jesús Cimarro, presidente de la Federación Estatal de Asociaciones de Empresas Productoras de Teatro y Danza de España. Ramon Colom, presidente FAPAE (Confederación de Productores Audiovisuales Españoles). Patricia Gabeiras, directora de Legal Music Producciones Vocal en la Junta Directiva de la Asociación de Promotores Musicales. Isidro López-Aparicio, artista plástico y miembro de la UAAV, Unión de Asociaciones de Artistas Visuales. Profesor de Bellas Artes de la Universidad de Granada y del I
Gonzalo San Gil, PhD.

#igfspain 2016 Convocado el VI FORO DE LA GOBERNANZA DE INTERNET - 0 views

  •  
    "El Foro de la Gobernanza de Internet en España se convoca en su sexta edición para los próximos días 13 y 14 de octubre en la sede de la Secretaría de Estado de Telecomunicaciones y para la Sociedad de la Información ? SETSI, en Madrid. El evento será inaugurado por el Secretario de Estado de Telecomunicaciones y para la Sociedad de la Información D. Víctor Calvo Sotelo y D. Jorge Pérez Martínez, Coordinador del Foro de la Gobernanza de Internet en España."
Gonzalo San Gil, PhD.

Cómo evitar la ley Sinde, y cómo se bloquearán las páginas de descargas - 0 views

  •  
    [La aprobada Ley Sinde ya hace temblar a muchos de los españoles que utilizan la red, ya sea como webmasters de páginas de descargas, o como usuarios de esas mismas páginas, que dejarán de poder disfrutar de estas. Y es que la amenaza del cierre ya vuela sobre las webs, pudiendo tomar efecto en cualquier momento. Por ello, los chicos de haktivistas.com se han puesto manos a la obra para elaborar el Manual de desobediencia a la Ley Sinde que explica qué métodos se podrán utilizar para cerrar las webs de descargas, y qué medidas pueden tomar los webmasters y los usuarios para evitar los contratiempos que podría traerles la aplicación de la nueva ley. ...]
1 - 20 of 183 Next › Last »
Showing 20 items per page