Skip to main content

Home/ Future of the Web/ Group items matching "Parliament" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gonzalo San Gil, PhD.

Europe reverses course on net neutrality legislation | Ars Technica - 0 views

  •  
    "by Duncan Geere Mar 7, 2015 3:05 pm UTC Share Tweet 164 Less than a year after the European Parliament voted to enshrine net neutrality in law, the principle has come under attack by the European Commission."
  •  
    "by Duncan Geere Mar 7, 2015 3:05 pm UTC Share Tweet 164 Less than a year after the European Parliament voted to enshrine net neutrality in law, the principle has come under attack by the European Commission."
Gonzalo San Gil, PhD.

Paso hacia atrás de la Unión Europea para garantizar la neutralidad de la red » MuyComputer - 0 views

  •  
    "La Unión Europea se ha mostrado implacable a la hora de defender los intereses de consumidores y usuarios, siempre y cuando esto no perjudicara a empresas europeas, como por ejemplo con el derecho al olvido. Sin embargo cuando se trata de las ISP se ha mostrado mucho más blanda, dando pasos titubeantes hacia la neutralidad de la red."
Paul Merrell

Canadian Spies Collect Domestic Emails in Secret Security Sweep - The Intercept - 0 views

  • Canada’s electronic surveillance agency is covertly monitoring vast amounts of Canadians’ emails as part of a sweeping domestic cybersecurity operation, according to top-secret documents. The surveillance initiative, revealed Wednesday by CBC News in collaboration with The Intercept, is sifting through millions of emails sent to Canadian government agencies and departments, archiving details about them on a database for months or even years. The data mining operation is carried out by the Communications Security Establishment, or CSE, Canada’s equivalent of the National Security Agency. Its existence is disclosed in documents obtained by The Intercept from NSA whistleblower Edward Snowden. The emails are vacuumed up by the Canadian agency as part of its mandate to defend against hacking attacks and malware targeting government computers. It relies on a system codenamed PONY EXPRESS to analyze the messages in a bid to detect potential cyber threats.
  • Last year, CSE acknowledged it collected some private communications as part of cybersecurity efforts. But it refused to divulge the number of communications being stored or to explain for how long any intercepted messages would be retained. Now, the Snowden documents shine a light for the first time on the huge scope of the operation — exposing the controversial details the government withheld from the public. Under Canada’s criminal code, CSE is not allowed to eavesdrop on Canadians’ communications. But the agency can be granted special ministerial exemptions if its efforts are linked to protecting government infrastructure — a loophole that the Snowden documents show is being used to monitor the emails. The latest revelations will trigger concerns about how Canadians’ private correspondence with government employees are being archived by the spy agency and potentially shared with police or allied surveillance agencies overseas, such as the NSA. Members of the public routinely communicate with government employees when, for instance, filing tax returns, writing a letter to a member of parliament, applying for employment insurance benefits or submitting a passport application.
  • Chris Parsons, an internet security expert with the Toronto-based internet think tank Citizen Lab, told CBC News that “you should be able to communicate with your government without the fear that what you say … could come back to haunt you in unexpected ways.” Parsons said that there are legitimate cybersecurity purposes for the agency to keep tabs on communications with the government, but he added: “When we collect huge volumes, it’s not just used to track bad guys. It goes into data stores for years or months at a time and then it can be used at any point in the future.” In a top-secret CSE document on the security operation, dated from 2010, the agency says it “processes 400,000 emails per day” and admits that it is suffering from “information overload” because it is scooping up “too much data.” The document outlines how CSE built a system to handle a massive 400 terabytes of data from Internet networks each month — including Canadians’ emails — as part of the cyber operation. (A single terabyte of data can hold about a billion pages of text, or about 250,000 average-sized mp3 files.)
  • ...1 more annotation...
  • The agency notes in the document that it is storing large amounts of “passively tapped network traffic” for “days to months,” encompassing the contents of emails, attachments and other online activity. It adds that it stores some kinds of metadata — data showing who has contacted whom and when, but not the content of the message — for “months to years.” The document says that CSE has “excellent access to full take data” as part of its cyber operations and is receiving policy support on “use of intercepted private communications.” The term “full take” is surveillance-agency jargon that refers to the bulk collection of both content and metadata from Internet traffic. Another top-secret document on the surveillance dated from 2010 suggests the agency may be obtaining at least some of the data by covertly mining it directly from Canadian Internet cables. CSE notes in the document that it is “processing emails off the wire.”
Paul Merrell

European Lawmakers Demand Answers on Phone Key Theft - The Intercept - 0 views

  • European officials are demanding answers and investigations into a joint U.S. and U.K. hack of the world’s largest manufacturer of mobile SIM cards, following a report published by The Intercept Thursday. The report, based on leaked documents provided by NSA whistleblower Edward Snowden, revealed the U.S. spy agency and its British counterpart Government Communications Headquarters, GCHQ, hacked the Franco-Dutch digital security giant Gemalto in a sophisticated heist of encrypted cell-phone keys. The European Parliament’s chief negotiator on the European Union’s data protection law, Jan Philipp Albrecht, said the hack was “obviously based on some illegal activities.” “Member states like the U.K. are frankly not respecting the [law of the] Netherlands and partner states,” Albrecht told the Wall Street Journal. Sophie in ’t Veld, an EU Parliamentarian with D66, the Netherlands’ largest opposition party, added, “Year after year we have heard about cowboy practices of secret services, but governments did nothing and kept quiet […] In fact, those very same governments push for ever-more surveillance capabilities, while it remains unclear how effective these practices are.”
  • “If the average IT whizzkid breaks into a company system, he’ll end up behind bars,” In ’t Veld added in a tweet Friday. The EU itself is barred from undertaking such investigations, leaving individual countries responsible for looking into cases that impact their national security matters. “We even get letters from the U.K. government saying we shouldn’t deal with these issues because it’s their own issue of national security,” Albrecht said. Still, lawmakers in the Netherlands are seeking investigations. Gerard Schouw, a Dutch member of parliament, also with the D66 party, has called on Ronald Plasterk, the Dutch minister of the interior, to answer questions before parliament. On Tuesday, the Dutch parliament will debate Schouw’s request. Additionally, European legal experts tell The Intercept, public prosecutors in EU member states that are both party to the Cybercrime Convention, which prohibits computer hacking, and home to Gemalto subsidiaries could pursue investigations into the breach of the company’s systems.
  • According to secret documents from 2010 and 2011, a joint NSA-GCHQ unit penetrated Gemalto’s internal networks and infiltrated the private communications of its employees in order to steal encryption keys, embedded on tiny SIM cards, which are used to protect the privacy of cellphone communications across the world. Gemalto produces some 2 billion SIM cards a year. The company’s clients include AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers. “[We] believe we have their entire network,” GCHQ boasted in a leaked slide, referring to the Gemalto heist.
  • ...4 more annotations...
  • While Gemalto was indeed another casualty in Western governments’ sweeping effort to gather as much global intelligence advantage as possible, the leaked documents make clear that the company was specifically targeted. According to the materials published Thursday, GCHQ used a specific codename — DAPINO GAMMA — to refer to the operations against Gemalto. The spies also actively penetrated the email and social media accounts of Gemalto employees across the world in an effort to steal the company’s encryption keys. Evidence of the Gemalto breach rattled the digital security community. “Almost everyone in the world carries cell phones and this is an unprecedented mass attack on the privacy of citizens worldwide,” said Greg Nojeim, senior counsel at the Center for Democracy & Technology, a non-profit that advocates for digital privacy and free online expression. “While there is certainly value in targeted surveillance of cell phone communications, this coordinated subversion of the trusted technical security infrastructure of cell phones means the US and British governments now have easy access to our mobile communications.”
  • For Gemalto, evidence that their vaunted security systems and the privacy of customers had been compromised by the world’s top spy agencies made an immediate financial impact. The company’s shares took a dive on the Paris bourse Friday, falling $500 million. In the U.S., Gemalto’s shares fell as much 10 percent Friday morning. They had recovered somewhat — down 4 percent — by the close of trading on the Euronext stock exchange. Analysts at Dutch financial services company Rabobank speculated in a research note that Gemalto could be forced to recall “a large number” of SIM cards. The French daily L’Express noted today that Gemalto board member Alex Mandl was a founding trustee of the CIA-funded venture capital firm In-Q-Tel. Mandl resigned from In-Q-Tel’s board in 2002, when he was appointed CEO of Gemplus, which later merged with another company to become Gemalto. But the CIA connection still dogged Mandl, with the French press regularly insinuating that American spies could infiltrate the company. In 2003, a group of French lawmakers tried unsuccessfully to create a commission to investigate Gemplus’s ties to the CIA and its implications for the security of SIM cards. Mandl, an Austrian-American businessman who was once a top executive at AT&T, has denied that he had any relationship with the CIA beyond In-Q-Tel. In 2002, he said he did not even have a security clearance.
  • AT&T, T-Mobile and Verizon could not be reached for comment Friday. Sprint declined to comment. Vodafone, the world’s second largest telecom provider by subscribers and a customer of Gemalto, said in a statement, “[W]e have no further details of these allegations which are industrywide in nature and are not focused on any one mobile operator. We will support industry bodies and Gemalto in their investigations.” Deutsche Telekom AG, a German company, said it has changed encryption algorithms in its Gemalto SIM cards. “We currently have no knowledge that this additional protection mechanism has been compromised,” the company said in a statement. “However, we cannot rule out this completely.”
  • Update: Asked about the SIM card heist, White House press secretary Josh Earnest said he did not expect the news would hurt relations with the tech industry: “It’s hard for me to imagine that there are a lot of technology executives that are out there that are in a position of saying that they hope that people who wish harm to this country will be able to use their technology to do so. So, I do think in fact that there are opportunities for the private sector and the federal government to coordinate and to cooperate on these efforts, both to keep the country safe, but also to protect our civil liberties.”
  •  
    Watch for massive class action product defect litigation to be filed against the phone companies.and mobile device manufacturers.  In most U.S. jurisdictions, proof that the vendors/manufacturers  knew of the product defect is not required, only proof of the defect. Also, this is a golden opportunity for anyone who wants to get out of a pricey cellphone contract, since providing a compromised cellphone is a material breach of warranty, whether explicit or implied..   
Gonzalo San Gil, PhD.

Copyright Reform: The European Parliament Must Follow the Reda Report! | La Quadrature du Net * - 0 views

  •  
    "Submitted on 26 Jan 2015 - 11:47 copyright creative contribution Andrus Ansip Günther Oettinger press release Printer-friendly version Send by email Français Paris, January 26, 2015 - Yesterday, MEP Julia Reda presented in the Committee on Legal Affairs (JURI) of the European Parliament a report on the harmonization of copyright in Europe. She tables modest but welcome proposals for a reform of copyright, several of which have been supported by La Quadrature du Net." [# ! And You can still take part... https://www.discuto.io/en/consultation/6240?page=2]
  •  
    "Submitted on 26 Jan 2015 - 11:47 copyright creative contribution Andrus Ansip Günther Oettinger press release Printer-friendly version Send by email Français Paris, January 26, 2015 - Yesterday, MEP Julia Reda presented in the Committee on Legal Affairs (JURI) of the European Parliament a report on the harmonization of copyright in Europe. She tables modest but welcome proposals for a reform of copyright, several of which have been supported by La Quadrature du Net." [# ! And You can still take part... https://www.discuto.io/en/consultation/6240?page=2]
  •  
    "Submitted on 26 Jan 2015 - 11:47 copyright creative contribution Andrus Ansip Günther Oettinger press release Printer-friendly version Send by email Français Paris, January 26, 2015 - Yesterday, MEP Julia Reda presented in the Committee on Legal Affairs (JURI) of the European Parliament a report on the harmonization of copyright in Europe. She tables modest but welcome proposals for a reform of copyright, several of which have been supported by La Quadrature du Net." [# ! And You can still take part... https://www.discuto.io/en/consultation/6240?page=2]
Gonzalo San Gil, PhD.

Evaluation of the EU Copyright Directive | Discuto - 2 views

  •  
    "DRAFT REPORT on the implementation of Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society (2014/2256(INI))"
Paul Merrell

Operation Socialist: How GCHQ Spies Hacked Belgium's Largest Telco - 0 views

  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • The full story about GCHQ’s infiltration of Belgacom, however, has never been told. Key details about the attack have remained shrouded in mystery—and the scope of the attack unclear. Now, in partnership with Dutch and Belgian newspapers NRC Handelsblad and De Standaard, The Intercept has pieced together the first full reconstruction of events that took place before, during, and after the secret GCHQ hacking operation. Based on new documents from the Snowden archive and interviews with sources familiar with the malware investigation at Belgacom, The Intercept and its partners have established that the attack on Belgacom was more aggressive and far-reaching than previously thought. It occurred in stages between 2010 and 2011, each time penetrating deeper into Belgacom’s systems, eventually compromising the very core of the company’s networks.
  • Snowden told The Intercept that the latest revelations amounted to unprecedented “smoking-gun attribution for a governmental cyber attack against critical infrastructure.” The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.”
  • ...7 more annotations...
  • When the incoming emails stopped arriving, it seemed innocuous at first. But it would eventually become clear that this was no routine technical problem. Inside a row of gray office buildings in Brussels, a major hacking attack was in progress. And the perpetrators were British government spies. It was in the summer of 2012 that the anomalies were initially detected by employees at Belgium’s largest telecommunications provider, Belgacom. But it wasn’t until a year later, in June 2013, that the company’s security experts were able to figure out what was going on. The computer systems of Belgacom had been infected with a highly sophisticated malware, and it was disguising itself as legitimate Microsoft software while quietly stealing data. Last year, documents from National Security Agency whistleblower Edward Snowden confirmed that British surveillance agency Government Communications Headquarters was behind the attack, codenamed Operation Socialist. And in November, The Intercept revealed that the malware found on Belgacom’s systems was one of the most advanced spy tools ever identified by security researchers, who named it “Regin.”
  • Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company. Belgacom invested several million dollars in its efforts to clean-up its systems and beef-up its security after the attack. However, The Intercept has learned that sources familiar with the malware investigation at the company are uncomfortable with how the clean-up operation was handled—and they believe parts of the GCHQ malware were never fully removed.
  • The revelations about the scope of the hacking operation will likely alarm Belgacom’s customers across the world. The company operates a large number of data links internationally (see interactive map below), and it serves millions of people across Europe as well as officials from top institutions including the European Commission, the European Parliament, and the European Council. The new details will also be closely scrutinized by a federal prosecutor in Belgium, who is currently carrying out a criminal investigation into the attack on the company. Sophia in ’t Veld, a Dutch politician who chaired the European Parliament’s recent inquiry into mass surveillance exposed by Snowden, told The Intercept that she believes the British government should face sanctions if the latest disclosures are proven.
  • What sets the secret British infiltration of Belgacom apart is that it was perpetrated against a close ally—and is backed up by a series of top-secret documents, which The Intercept is now publishing.
  • Between 2009 and 2011, GCHQ worked with its allies to develop sophisticated new tools and technologies it could use to scan global networks for weaknesses and then penetrate them. According to top-secret GCHQ documents, the agency wanted to adopt the aggressive new methods in part to counter the use of privacy-protecting encryption—what it described as the “encryption problem.” When communications are sent across networks in encrypted format, it makes it much harder for the spies to intercept and make sense of emails, phone calls, text messages, internet chats, and browsing sessions. For GCHQ, there was a simple solution. The agency decided that, where possible, it would find ways to hack into communication networks to grab traffic before it’s encrypted.
  • The Snowden documents show that GCHQ wanted to gain access to Belgacom so that it could spy on phones used by surveillance targets travelling in Europe. But the agency also had an ulterior motive. Once it had hacked into Belgacom’s systems, GCHQ planned to break into data links connecting Belgacom and its international partners, monitoring communications transmitted between Europe and the rest of the world. A map in the GCHQ documents, named “Belgacom_connections,” highlights the company’s reach across Europe, the Middle East, and North Africa, illustrating why British spies deemed it of such high value.
  • Documents published with this article: Automated NOC detection Mobile Networks in My NOC World Making network sense of the encryption problem Stargate CNE requirements NAC review – October to December 2011 GCHQ NAC review – January to March 2011 GCHQ NAC review – April to June 2011 GCHQ NAC review – July to September 2011 GCHQ NAC review – January to March 2012 GCHQ Hopscotch Belgacom connections
Gonzalo San Gil, PhD.

Italian Parliament Publishes Draft Internet Bill Of Rights | Techdirt - 0 views

  •  
    "For several years, Techdirt covered the twists and turns of the "Marco Civil" saga, Brazil's bill of rights for the Internet, which finally passed back in March. Rather depressingly, this welcome move seemed to be something of a one-off, but now the Italian Parliament has announced its own draft bill of rights. Here's the introduction (original in Italian -- pdf): ... Statement of Rights on the Internet ...
Gonzalo San Gil, PhD.

The incoming European Commissioner Andrus Ansip declares his support for free software | April - 0 views

  •  
    "Paris, October 8th, 2014, press release. During the course of his European Parliament hearing, Andrus Ansip, the designated EU Commissioner for the Digital Single Market, expressed his support for free software several times. April hopes that this is a sign towards the implementation of proactive policies in favour of free software."
  •  
    "Paris, October 8th, 2014, press release. During the course of his European Parliament hearing, Andrus Ansip, the designated EU Commissioner for the Digital Single Market, expressed his support for free software several times. April hopes that this is a sign towards the implementation of proactive policies in favour of free software."
Gonzalo San Gil, PhD.

Democracy.OS - 0 views

  •  
    "We are working on a user-friendly, open-source, vote and debate tool, crafted for parliaments, parties and decision-making institutions that will allow citizens to get informed, join the conversation and vote on topics, just how they want their representatives to vote."
  •  
    "We are working on a user-friendly, open-source, vote and debate tool, crafted for parliaments, parties and decision-making institutions that will allow citizens to get informed, join the conversation and vote on topics, just how they want their representatives to vote."
Gonzalo San Gil, PhD.

Pirate Bay Founder Peter Sunde Shouldn't Be in Jail, MEP Says | TorrentFreak - 0 views

  •  
    " Ernesto on August 14, 2014 C: 13 News [Julia Reda], Member of the European Parliament for the Pirate Party, will be visiting Peter Sunde in prison later today. According to Reda the Pirate Bay founder's imprisonment is a failure of a justice system that lost touch with digital culture. "The tactic of draconian deterrence against file sharing has failed," she says. "
  •  
    " Ernesto on August 14, 2014 C: 13 News [Julia Reda], Member of the European Parliament for the Pirate Party, will be visiting Peter Sunde in prison later today. According to Reda the Pirate Bay founder's imprisonment is a failure of a justice system that lost touch with digital culture. "The tactic of draconian deterrence against file sharing has failed," she says. "
  •  
    " Ernesto on August 14, 2014 C: 13 News [Julia Reda], Member of the European Parliament for the Pirate Party, will be visiting Peter Sunde in prison later today. According to Reda the Pirate Bay founder's imprisonment is a failure of a justice system that lost touch with digital culture. "The tactic of draconian deterrence against file sharing has failed," she says. "
Gonzalo San Gil, PhD.

Copyright Education Needed in Every School, Parliament Hears | TorrentFreak - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! #Perfect: This way, children will learn soon about the abuses committed 'in the name of culture' while really are weapons of 'Thought Control'... and can work to change the 'copy laws' once and forever... # ! ... if They are really educated... and not manipulated...
Paul Merrell

Russia passes law to force websites onto Russian servers | Reuters - 0 views

  • (Reuters) - Russia's parliament passed a law on Friday to force Internet sites that store the personal data of Russian citizens to do so inside the country, a move the Kremlin says is for data protection but which critics see an attack on social networks. The law will mean that from 2016, all Internet companies will have to move Russian data onto servers based in Russia or face being blocked from the web. That would likely affect U.S.-based social networks such as Facebook, analysts say.
  • Putin, an ex-KGB officer who has called the Internet a "CIA project", denied he was restricting web freedoms, saying his main concern was protecting children from indecent content.
Gonzalo San Gil, PhD.

Pirate Party Keeps a Seat At The European Parliament | TorrentFreak - 0 views

  •  
    " Ernesto on May 26, 2014 C: 6 Breaking A few hours after all polling booths across Europe closed, it now becomes clear that the Pirate Party has kept a seat at the European Parliament. The results show that the Pirates won one seat in Germany. That's also the only one, although the Czech Republic Pirates came awfully close. "
Gonzalo San Gil, PhD.

Will the Italian Presidency of the EU Council Support Net Neutrality? | La Quadrature du Net - 0 views

  •  
    "Submitted on 9 May 2014 - 16:11 Kroes Telecoms Package Net neutrality press release Printer-friendly version Send by email Français Paris, 9 May 2014 - The voice of the Italian presidency of the Council of the European Union could mark a real departure from the usual government talk chastising the vote on Net Neutrality adopted by the European Parliament! According to the information portal Euractiv, the Italian presidency could support the text voted by the Members of the European Parliament and be ready to defend it in front of the European governments and telecommunications industry. As the publication of the guidance report of the Council of the European Union about the Net Neutrality (scheduled for 5 or 6 of June) nears, La Quadrature du Net welcomes this encouraging position and asks European citizens to invite their governments to follow this example."
  •  
    "Submitted on 9 May 2014 - 16:11 Kroes Telecoms Package Net neutrality press release Printer-friendly version Send by email Français Paris, 9 May 2014 - The voice of the Italian presidency of the Council of the European Union could mark a real departure from the usual government talk chastising the vote on Net Neutrality adopted by the European Parliament! According to the information portal Euractiv, the Italian presidency could support the text voted by the Members of the European Parliament and be ready to defend it in front of the European governments and telecommunications industry. As the publication of the guidance report of the Council of the European Union about the Net Neutrality (scheduled for 5 or 6 of June) nears, La Quadrature du Net welcomes this encouraging position and asks European citizens to invite their governments to follow this example."
Gonzalo San Gil, PhD.

Net Neutrality: A Great Step Forward for the Free Internet! | La Quadrature du Net - 1 views

  •  
    "Submitted on 3 Apr 2014 - 11:46 Kroes Telecoms Package Net neutrality Neelie Kroes Catherine Trautmann Pilar del Castillo Vera press release Printer-friendly version Send by email Français Brussels, 3 April 2014 - Today the European Parliament adopted in first reading the Regulation on the Single Telecoms Market (see the vote call). By amending the text with the amendment proposals made by the Social-Democrats (S&D), Greens (Greens/EFA), United Left (GUE/NGL) and Liberals (ALDE), the Members of the European Parliament took a historic step for the protection of Net Neutrality and the Internet commons in the European Union. La Quadrature du Net warmly thanks all citizens, organisations and Parliamentarians who took part in this campaign, and calls on them to remain mobilised for the rest of the legislative procedure."
Gonzalo San Gil, PhD.

The Next Five Years Could Determine Our Liberties | TorrentFreak - 0 views

  •  
    " Rick Falkvinge on April 6, 2014 C: 3 Opinion There's a European Election coming up. Voting starts in about one month, with the main election days on May 22-25. We've had many victories as activists and concerned citizens in the past five years to defend the net and its liberty, but the main showdown looks like it'll come down in the next five years. Your vote is going to matter."
  •  
    " Rick Falkvinge on April 6, 2014 C: 3 Opinion There's a European Election coming up. Voting starts in about one month, with the main election days on May 22-25. We've had many victories as activists and concerned citizens in the past five years to defend the net and its liberty, but the main showdown looks like it'll come down in the next five years. Your vote is going to matter."
Paul Merrell

Theresa May warns Yahoo that its move to Dublin is a security worry | Technology | The Guardian - 0 views

  • Theresa May summoned the internet giant Yahoo for an urgent meeting on Thursday to raise security concerns after the company announced plans to move to Dublin where it is beyond the reach of Britain's surveillance laws.By making the Irish capital rather than London the centre of its European, Middle East and Africa operations, Yahoo cannot be forced to hand over information demanded by Scotland Yard and the intelligence agencies through "warrants" issued under Britain's controversial anti-terror laws.Yahoo has had longstanding concerns about securing the privacy of its hundreds of millions of users – anxieties that have been heightened in recent months by revelations from the whistleblower Edward Snowden.
  • In February, the Guardian revealed that Britain's eavesdropping centre GCHQ intercepted and stored the images of millions of people using Yahoo webcams, regardless of whether they were suspects. The data included a large quantity of sexually explicit pictures.The company said this represented "a whole new level of violation of our users' privacy".The home secretary called the meeting with Yahoo to express the fears of Britain's counter-terrorism investigators. They can force companies based in the UK to provide information on their servers by seeking warrants under the Regulation of Investigatory Powers Act, 2000 (Ripa).
  • the Guardian has been told that Charles Farr, the head of the office for security and counter-terrorism (OSCT) within the Home Office, has been pressing May to talk to Yahoo because of anxiety in Scotland Yard's counter-terrorism command about the effect the move to Dublin could have on their inquiries.Farr, a former senior intelligence officer, coordinates the work of Scotland Yard and the security service MI5, to prevent terrorist attacks in the UK."There are concerns in the Home Office about how Ripa will apply to Yahoo once it has moved its headquarters to Dublin," said a Whitehall source. "The home secretary asked to see officials from Yahoo because in Dublin they don't have equivalent laws to Ripa. This could particularly affect investigations led by Scotland Yard and the national crime agency. They regard this as a very serious issue."
  • ...3 more annotations...
  • The move to make Dublin the centre of its headquarters for Europe, the Middle East and Africa (EMEA) was announced last month and will take effect from Friday.In a statement at the time, Yahoo said Dublin was a natural home for the company and that it would be incorporated into Irish laws.The firm insisted the move was driven by "business needs … we believe it is in the best interest of our users. Dublin is already the European home to many of the world's leading global technology brands."However, the firm has been horrified by some of the surveillance programmes revealed by Snowden and is understood to be relieved that it will be beyond the immediate reach of UK surveillance laws.
  • Following the Guardian's disclosures about snooping on Yahoo webcams, the company said it was "committed to preserving our users trust and security and continue our efforts to expand encryption across all of our services." It said GCHQ's activity was "completely unacceptable..we strongly call on the world's governments to reform surveillance law."Explaining the move to Dublin, the company said: "The principal change is that Yahoo EMEA, as the new provider of services to our European users, will replace Yahoo UK Ltd as the data controller responsible for handling your personal information. Yahoo EMEA will be responsible for complying with Irish privacy and data protection laws, which are based on the European data protection directive."Emma Carr, deputy director of Big Brother Watch, said: "It should not come as a surprise if companies concerned about maintaining their users' trust to hold their information start to move to countries with more rigorous oversight processes, particularly where courts oversee requests for information." Surveillance laws have a direct impact on our economy and Yahoo's decision should be ring an alarm in Parliament that ignoring the serious questions about surveillance that are being debated around the world will only harm Britain's digital economy."
  • From Friday, investigators may have to seek information by using a more drawn out process of approaching Yahoo through a Mutual Legal Assistance Treaty between Ireland and the UK.
Gonzalo San Gil, PhD.

EU Parliament Committee to Cast Crucial Vote on Net Neutrality | La Quadrature du Net - 1 views

  •  
    "Submitted on 14 Mar 2014 - 15:30 Kroes Telecoms Package Net neutrality Neelie Kroes Catherine Trautmann Pilar del Castillo Vera press release Printer-friendly version Send by email Français Paris, 14 March 2014 - On Tuesday, 18 March at 10 a.m., the "Industry" (ITRE) committee of the European Parliament will take a crucial decision for the future of Net Neutrality in Europe. The adoption of the report could mark a point of no return. Two conflicting visions for the future of the Internet oppose the two largest political groups in the EU Parliament, the social democratic party (S&D) and the conservative party (EPP). The outcome of the vote might be decided by the MEPs of the liberal group (ALDE) who appear not to have chosen which vision they will support, although their rapporteur, Jens Rohde, is pushing for the adoption of anti-Net Neutrality provisions. If adopted, these provisions would end the Internet as we know it, harming the freedom of communication and innovation."
Gonzalo San Gil, PhD.

Statute of Anne - Wikipedia, the free encyclopedia - 0 views

  •  
    "The Statute of Anne (c.19), an act of the Parliament of Great Britain, was the first statute to provide for copyright regulated by the government and courts, rather than by private parties. Prior to the statute's enactment in 1710, copying restrictions were authorized by the Licensing Act of 1662. These restrictions were enforced by the Stationers' Company, a guild of printers given the exclusive power to print-and the responsibility to censor-literary works. The censorship administered under the Licensing Act led to public protest; as the act had to be renewed at two-year intervals, authors and others sought to prevent its reauthorisation.[1] In 1694, Parliament refused to renew the Licensing Act, ending the Stationers' monopoly and press restrictions.[2]"
‹ Previous 21 - 40 of 63 Next › Last »
Showing 20 items per page