Skip to main content

Home/ Indie Nation/ Group items tagged american

Rss Feed Group items tagged

John Lemke

Cops to Congress: We need logs of Americans' text messages | Politics and Law - CNET News - 0 views

  • CNET has learned a constellation of law enforcement groups has asked the U.S. Senate to require that wireless companies retain that information, warning that the lack of a current federal requirement "can hinder law enforcement investigations." They want an SMS retention requirement to be "considered" during congressional discussions over updating a 1986 privacy law for the cloud computing era -- a move that could complicate debate over the measure and erode support for it among civil libertarians. As the popularity of text messages has exploded in recent years, so has their use in criminal investigations and civil lawsuits. They have been introduced as evidence in armed robbery, cocaine distribution, and wire fraud prosecutions. In one 2009 case in Michigan, wireless provider SkyTel turned over the contents of 626,638 SMS messages, a figure described by a federal judge as "staggering."
John Lemke

NSA's bulk phone data collection ruled unconstitutional, 'almost Orwellian,' by federal... - 0 views

  • “The government does not cite a single case in which analysis of the NSA’s bulk metadata collection actually stopped an imminent terrorist attack,” the judge wrote.
  • “Given the limited record before me at this point in the litigation – most notably, the utter lack of evidence that a terrorist attack has ever been prevented because searching the NSA database was faster than other investigative tactics – I have serious doubts about the efficacy of the metadata collection program as a means of conducting time-sensitive investigations in cases involving imminent threats of terrorism.”
  • “I acted on my belief that the NSA's mass surveillance programs would not withstand a constitutional challenge, and that the American public deserved a chance to see these issues determined by open courts,” Snowden wrote. “Today, a secret program authorized by a secret court was, when exposed to the light of day, found to violate Americans’ rights. It is the first of many.”
John Lemke

World's Largest Solar Array Set to Crank Out 290 Megawatts of Sunshine Power - Scientif... - 0 views

  • Agua Caliente, the largest photovoltaic solar power facility in the world, was completed last week in Arizona.
  • ive million solar panels that span the equivalent of two Central Parks in the desert between Yuma and Phoenix. It generates 290 megawatts of power—enough electricity to fuel 230,000 homes in neighboring California at peak capacity.
  • The project, which cost a total of $1.8 billion to construct, received a million-dollar loan from the Loan Programs Office. Under its “SunShot” initiative (so-named in the spirit of president John F. Kennedy’s “moon shot” program), the DoE provides guaranteed loans to unproved ventures in solar power in the hopes of promoting innovation and making the technology more cost-effective.* Although Agua Caliente (owned by U.S. energy giant NRG Energy and partner MidAmerican Solar) is now the largest photovoltaic solar facility in the world, it probably will not hold that distinction for long. Other massive solar panel facilities, such as Antelope Valley Solar Ranch One in California’s Mojave Desert, are rapidly springing up across the Southwest.
  • ...1 more annotation...
  • The energy contained in just one hour of sunlight could power the world for a year, if only it could be harnessed.
John Lemke

Federal Prosecutors, in a Policy Shift, Cite Warrantless Wiretaps as Evidence - NYTimes... - 0 views

  • The practice contradicted what Mr. Verrilli had told the Supreme Court last year in a case challenging the law, the FISA Amendments Act of 2008. Legalizing a form of the Bush administration’s program of warrantless surveillance, the law authorized the government to wiretap Americans’ e-mails and phone calls without an individual court order and on domestic soil so long as the surveillance is “targeted” at a foreigner abroad. A group of plaintiffs led by Amnesty International had challenged the law as unconstitutional. But Mr. Verrilli last year urged the Supreme Court to dismiss the case because those plaintiffs could not prove that they had been wiretapped. In making that argument, he said a defendant who faced evidence derived from the law would have proper legal standing and would be notified, so dismissing the lawsuit by Amnesty International would not close the door to judicial review of the 2008 law. The court accepted that logic, voting 5-to-4 to dismiss the case. In a statement, Patrick Toomey, staff attorney with the American Civil Liberties Union, which had represented Amnesty International and the other plaintiffs, hailed the move but criticized the Justice Department’s prior practice.
  • Still, it remains unclear how many other cases — including closed matters in which convicts are already service prison sentences — involved evidence derived from warrantless wiretapping in which the National Security Division did not provide full notice to defendants, nor whether the department will belatedly notify them. Such a notice could lead to efforts to reopen those cases.
John Lemke

The NSA Uses Powerful Toolbox in Effort to Spy on Global Networks - SPIEGEL ONLINE - 0 views

  • According to internal NSA documents viewed by SPIEGEL, these on-call digital plumbers are involved in many sensitive operations conducted by American intelligence agencies. TAO's area of operations ranges from counterterrorism to cyber attacks to traditional espionage. The documents reveal just how diversified the tools at TAO's disposal have become -- and also how it exploits the technical weaknesses of the IT industry, from Microsoft to Cisco and Huawei, to carry out its discreet and efficient attacks. The unit is "akin to the wunderkind of the US intelligence community," says Matthew Aid, a historian who specializes in the history of the NSA. "Getting the ungettable" is the NSA's own description of its duties. "It is not about the quantity produced but the quality of intelligence that is important," one former TAO chief wrote, describing her work in a document. The paper seen by SPIEGEL quotes the former unit head stating that TAO has contributed "some of the most significant intelligence our country has ever seen." The unit, it goes on, has "access to our very hardest targets."
  •  
    Page One of a good three page read on just how extensive the government's illegal spying operations actually are... the worst part is it is just how extensive the portions of it we know about are!
John Lemke

Former Microsoft Privacy Chief Says He No Longer Trusts The Company - HotHardware - 0 views

  • This is a fundamental problem for nations that aren't interested in exposing their traffic to American observation, whether they're engaged in nefarious activities or not. Long term, the problem could lead to the construction of digital firewalls, in which the United States is effectively isolated behind protective nodes built by local governments to scrub and redirect traffic away from potential capture points. This is directly in opposition to the central concept of the Internet, which is a dynamic structure capable of responding to outages or damage by routing around the problem.
John Lemke

FBI surveillance malware in bomb threat case tests constitutional limits | Ars Technica - 0 views

  • The FBI has an elite hacker team that creates customized malware to identify or monitor high-value suspects who are adept at covering their tracks online, according to a published report.
  • as the capability to remotely activate video cameras and report users' geographic locations—is pushing the boundaries of constitutional limits on searches and seizures
  • Critics compare it to a physical search that indiscriminately seizes the entire contents of a home, rather than just those items linked to a suspected crime. Former US officials said the FBI uses the technique sparingly, in part to prevent it from being widely known.
  • ...1 more annotation...
  • "We have transitioned into a world where law enforcement is hacking into people’s computers, and we have never had public debate,” Christopher Soghoian, principal technologist for the American Civil Liberties Union, told The Washington Post, speaking of the case against Mo. "Judges are having to make up these powers as they go along."
John Lemke

Corn-waste biofuels might be worse than gasoline in the short term | Plugged In, Scient... - 0 views

  • Biofuels made using corn waste could release 7 percent more greenhouse gases in the early years compared to conventional gasoline. As a result, this type of cellulosic ethanol could be inelligible to meet quotas under the 2007 Energy Independence and Security Act (EISA).
  • In the longer-term, the study says that these types of biofuels will result in a net emissions decrease. However, the short term increase is enough to keep this type of biofuel from complying with regulations in the 2007 Energy Independence and Security Act (EISA).
John Lemke

The White House Big Data Report: The Good, The Bad, and The Missing | Electronic Fronti... - 0 views

  • the report recognized that email privacy is critical
  • one issue was left conspicuously unaddressed in the report. The Securities and Exchange Commission, the civil agency in charge of protecting investors and ensuring orderly markets, has been advocating for a special exception to the warrant requirement. No agency can or should have a get-out-of-jail-free card for bypassing the Fourth Amendment.
  • the algorithm is only as fair as the data fed into it.
  • ...22 more annotations...
  • the danger of discrimination remains due to the very digital nature of big data
  • especially the elderly, minorities, and the poor
  • an example of this in Boston, which had a pilot program to allow residents to report potholes through a mobile app but soon recognized that the program was inherently flawed because “wealthy people were far more likely to own smart phones and to use the Street Bump app. Where they drove, potholes were found; where they didn’t travel, potholes went unnoted.”
  • The authors of the report agree, recommending that the Privacy Act be extended to all people, not just US persons.
  • metadata (the details associated with your communications, content, or actions, like who you called, or what a file you uploaded file is named, or where you were when you visited a particular website) can expose just as much information about you as the “regular” data it is associated with, so it deserves the same sort of privacy protections as “regular” data.
    • John Lemke
       
      What is Metadate... then discuss
  • The report merely recommended that the government look into the issue.
    • John Lemke
       
      Did the report give a strong enough recommendation? "looking into" and doing are much different
  • several other government reports have taken a much stronger stance and explicitly stated that metadata deserves the same level of privacy protections as “regular” data.
  • We think the report should have followed the lead of the PCAST report and acknowledged that the distinction between data and metadata is an artificial one, and recommended the appropriate reforms.
    • John Lemke
       
      I very strongly agree.  The report failed in this area.
  • the White House suggested advancing the Consumer Privacy Bill of Rights, which includes the idea that “consumers have a right to exercise control over what personal data companies collect from them and how they use it,” as well as “a right to access and correct personal data.”
  • Consumers have a right to know when their data is exposed, whether through corporate misconduct, malicious hackers, or under other circumstances. Recognizing this important consumer safeguard, the report recommends that Congress “should pass legislation that provides a single national data breach standard along the lines of the Administration's May 2011 Cybersecurity legislative proposal.”
  • While at first blush this may seem like a powerful consumer protection, we don’t think that proposal is as strong as existing California law. The proposed federal data breach notification scheme would preempt state notification laws, removing the strong California standard and replacing it with a weaker standard.
    • John Lemke
       
      In other words, it failed at what can be done and it would actually lower standards when compared to what California has in place currently.
  • We were particularly disconcerted
  • the Fort Hood shooting by Major Nidal Hasan
    • John Lemke
       
      WTF? how did he get in this group?
  • two big concerns
  • First, whistleblowers are simply not comparable to an Army officer who massacres his fellow soldiers
  • Secondly, the real big-data issue at play here is overclassification of enormous quantities of data.
  • Over 1.4 million people hold top-secret security clearances. In 2012, the government classified 95 million documents. And by some estimates, the government controls more classified information than there is in the entire Library of Congress.
    • John Lemke
       
      Don't leave this stat out.  More classified documents than LOC documents.  WTF? A "democracy" with more secret documents than public?
  • The report argues that in today’s connected world it’s impossible for consumers to keep up with all the data streams they generate (intentionally or not), so the existing “notice and consent” framework (in which companies must notify and get a user’s consent before collecting data) is obsolete. Instead, they suggest that more attention should be paid to how data is used, rather than how it is collected.
    • John Lemke
       
      This is the most troubling part perhaps,  isn't the collection without consent where the breech of privacy begins?
    • John Lemke
       
      "notice and consent"
  • An unfortunate premise of this argument is that automatic collection of data is a given
  • While we agree that putting more emphasis on responsible use of big data is important, doing so should not completely replace the notice and consent framework.
  • Despite being a fairly thorough analysis of the privacy implications of big data, there is one topic that it glaringly omits: the NSA’s use of big data to spy on innocent Americans.
    • John Lemke
       
      If we ignore it, it will go away?  Did they not just mostly ignore it and accept it as a given for corporations and completely ignore it regarding the government? Pretty gangster move isn't it?
  • Even though the review that led to this report was announced during President Obama’s speech on NSA reform, and even though respondents to the White House’s Big Data Survey “were most wary of how intelligence and law enforcement agencies are collecting and using data about them,” the report itself is surprisingly silent on the issue.2 This is especially confusing given how much the report talks about the need for more transparency in the private sector when it comes to big data. Given that this same logic could well be applied to intelligence big data programs, we don’t understand why the report did not address this vital issue.
John Lemke

Spy court renews NSA metadata program | TheHill - 0 views

  • With a surveillance reform bill stuck in the Senate, the federal court overseeing spy agencies on Friday reauthorized the National Security Agency’s controversial bulk collection of Americans' phone records.
  • Given that legislation has not yet been enacted, and given the importance of maintaining the capabilities of the Section 215 telephony metadata program, the government has sought a 90-day reauthorization of the existing program,” the Justice Department and Office of the Director of National Intelligence said in a joint statement, referring to the section of the Patriot Act that authorizes the program.
  • The NSA’s phone records program needs to be reauthorized by the FISC every 90 days. The current authority expires on Dec. 5.
John Lemke

Earth's Impending Magnetic Flip - Scientific American - 0 views

  • The European Space Agency's satellite array dubbed “Swarm” revealed that Earth's magnetic field is weakening 10 times faster than previously thought, decreasing in strength about 5 percent a decade rather than 5 percent a century. A weakening magnetic field may indicate an impending reversal, which scientists predict could begin in less than 2,000 years. Magnetic north itself appears to be moving toward Siberia.
  • There is a good chance the weakening magnetic field that the Swarm satellites observed will not lead to a full flip. Indeed, Glatzmaier notes that there have been several false starts over geologic history. The intensity of Earth's magnetic field, though waning, now equals its average strength over millions of years. The field would need to weaken at its current rate for around 2,000 years before the reversal process actually begins.
  • It is hard to know how a geomagnetic reversal would impact our modern-day civilization, but it is unlikely to spell disaster. Although the field provides essential protection from the sun's powerful radiation, fossil records reveal no mass extinctions or increased radiation damage during past reversals. A flip could possibly interfere with power grids and communications systems—external magnetic field disturbances have burned out transformers and caused blackouts in the past. But Glatzmaier is not worried. “A thousand years from now we probably won't have power lines,” he says. “We'll have advanced so much that we'll almost certainly have the technology to cope with a magnetic-field reversal.”
    • John Lemke
       
      Likely not the end of the world for past reversals have not show evidence of mass extinctions.
John Lemke

Snowden Leak: NSA Flagged Israel as Leading Espionage Threat - 0 views

  • The National Security Agency listed Israel among a handful of nations considered to pose the “greatest threat” to American government, military and industrial secrets, classified documents leaked by whistleblower Edward Snowden reveal.
1 - 14 of 14
Showing 20 items per page