Skip to main content

Home/ Internetni praktikum/ Group items tagged fbi

Rss Feed Group items tagged

Jernej Prodnik

Aaron Swartz files reveal how FBI tracked internet activist | Technology | guardian.co.uk - 0 views

  • Aaron Swartz files reveal how FBI tracked internet activist Firedoglake blogger Daniel Wright publishes once-classified FBI documents that show extent of agency's investigation into Swartz
  • Amanda Holpuch guardian.co.uk, Tuesday 19 February 2013 22.42 GMT
  • A blogger has published once-classified FBI files that show how the agency tracked and collected information on internet activist Aaron Swartz. Swartz, who killed himself in January aged 26, had previously requested his files and posted them on his blog, but some new documents and redactions are included in the files published by Firedoglake blogger Daniel Wright.Wright was given 21 of 23 declassified documents, thanks to a rule that declassifies FBI files on the deceased. Wright said that he was told the other two pages of documents were not provided because of freedom of information subsections concerning privacy, "sources and methods," and that can "put someone's life in danger."
  • ...3 more annotations...
  • The FBI's files concern Swartz's involvement in accessing the Public Access to Court Electronic Records (Pacer) documents. In pursuit of their investigation, the FBI had collected his personal information and was surveilling an Illinois address where he had his IP address registered. Aaron H. Swartz FBI File by Daniel Wright
  • One page reads: "Washington Field Office requests that the North RA attempt to locate Aaron Swartz, his vehicles, drivers license information and picture, and others. Since Swartz is the potential subject of an ongoing investigation, it is requested that Swartz not be approached by agents." The FBI also collected information from his social networking profiles, including Facebook and Linkedin. The latter proved to be a catalog of his many notable accomplishments, which include being a co-founder of Reddit, a founder of a website to improve the government, watchdog.net and as metadata adviser at Creative Commons.
  • Information from a New York Times article about his Pacer hack was also included in the files, though strangely, since the article can still be read online, the name of the article's other subject, Carl Malamud, was blocked out.Hacking collective Anonymous released a State Department database Monday in memory of Swartz. The files included employees' personal information such as addresses, phone number and emails.
Anja Pirc

Online privacy: Difference Engine: Nobbling the internet | The Economist - 0 views

  • TWO measures affecting the privacy internet users can expect in years ahead are currently under discussion on opposite sides of the globe. The first hails from a Senate committee’s determination to make America’s online privacy laws even more robust. The second concerns efforts by the International Telecommunications Union (ITU), an intergovernmental body under the auspices of the United Nations, to rewrite its treaty for regulating telecommunications around the world, which dates from 1988, so as to bring the internet into its fief.
  • The congressional measure, approved overwhelmingly by the Senate Judiciary Committee on November 29th, would require criminal investigators to obtain a search warrant from a judge before being able to coerce internet service providers (ISPs) to hand over a person’s e-mail. The measure would also extend this protection to the rest of a person’s online content, including videos, photographs and documents stored in the "cloud"—ie, on servers operated by ISPs, social-network sites and other online provider
  • a warrant is needed only for unread e-mail less than six months old. If it has already been opened, or is more than six months old, all that law-enforcement officials need is a subpoena. In America, a subpoena does not need court approval and can be issued by a prosecutor. Similarly, a subpoena is sufficient to force ISPs to hand over their routing data, which can then be used to identify a sender’s various e-mails and to whom they were sent. That is how the FBI stumbled on a sex scandal involving David Petraeus, the now-ex director of the CIA, and his biographer.
  • ...7 more annotations...
  • No-one imagined that ISPs would one day offer gigabytes of online storage free—as Google, Yahoo!, Hotmail and other e-mail providers do today. The assumption back then was that if someone had not bothered to download and delete online messages within six months, such messages could reasonably be considered to be abandoned—and therefore not in need of strict protection.
  • wholesale access to the internet, powerful mobile phones and ubiquitous social networking have dramatically increased the amount of private data kept online. In the process, traditional thinking about online security has been rendered obsolete. For instance, more and more people nowadays keep their e-mail messages on third-party servers elsewhere, rather than on their own hard-drives or mobile phones. Many put their personal details, contacts, photographs, locations, likes, dislikes and inner thoughts on Google, Facebook, Twitter, Flickr, Dropbox and a host of other destinations. Bringing online privacy requirements into an age of cloud computing is only fit and proper, and long overdue.
  • the international telecoms treaty that emerged focused on how telephone traffic flows across borders, the rules governing the quality of service and the means operators could adopt to bill one another for facilitating international calls. As such, the regulations applied strictly to telecoms providers, the majority of which were state owned.
  • he goal of certain factions is to grant governments the authority to charge content providers like Amazon, Google, Facebook and Twitter for allowing their data to flow over national borders. If enacted, such proposals would most certainly deter investment in network infrastructure, raise costs for consumers, and hinder online access for precisely those people the ITU claims it wants to help.
  • a proposal sponsored by the United States and Canada to restrict the debate in Dubai strictly t
  • o conventional telecoms has met with a modicum of success, despite stiff opposition from Russia plus some African and Middle-Eastern countries. Behind closed doors, the conference has agreed not to alter the ITU’s current definition of “telecommunications” and to leave the introductory text concerning the existing treaty’s scope intact.
  • The sticking point has been what kind of organisations the treaty should apply to. Here, one word can make a huge difference. In ITU jargon, the current treaty relates only to “recognised operating agencies”—in other words, conventional telecoms operators. The ITU wants to change that to simply “operating agencies”. Were that to happen, not only would Google, Facebook and other website operators fall under the ITU’s jurisdiction, but so too would all government and business networks. It seems the stakes really are as high as the ITU’s critics have long maintained
1 - 2 of 2
Showing 20 items per page