Skip to main content

Home/ ThoughtVectors2014/ Group items tagged surveillance

Rss Feed Group items tagged

symone008

http://www.surveillance-and-society.org/articles4(3)/escalating.pdf - 0 views

    • symone008
       
      Abstract- What legal and criminal events have facilitated a reevaluation of the balance privacy & security? Find examples Historically Police Strategies involve high surveillance and less privacy Preventive law enforcement has caused a new civil privacy paradigm. How does this affect us? Whitaker (2003: 52) claims that "the historical cycle in which violent threats generate the expansion of arbitrary and intrusive powers of government is being repeated. Once again, the constitutional protection of rights is being dismissed, sometimes from the highest offices in the land, as an inconvenient impediment to safety."  - police use crime control/drugs/terrorism to justify expanding their powers  Balancing of Competing Interest Standard- test devised to weigh the permissibility of police surveillance and search powers in relation to privacy Patriots Act ECPA- police may intercept electronic communications, without a warrant or court order CALEA- internet service provider easy access to law enforcement Effects of Increased Police Surveillance on civic life - diminution of privacy rights - Alien conspiracy - Public anxiety  - Public disruption- impediment to free movement - demise of fundamental democratic ideals -- Orwellian surveillance  there is an absence of  understanding, among researchers, about the scope of police surveillance effects on this  dimension of public existence - assess the social and psychological impact of the US police surveillance on civil life? How can we maintain the balance of security and privacy? Withnot being ill-equipped or not deminishing the quality of the US life. 
  •  
    Great article of the impact of US police surveillance on civil life.
jamieparkerson

Anonymous Browser Mass Hit as Russians Seek to Escape Internet Censorship | News - 0 views

  •  
    The government's campaign for online censorship has created a backlash, with the number of Russia-based users of anonymous web surfing software Tor more than doubling in the past three weeks. The Tor network, which allows users to anonymously visit websites blocked in their country, numbered almost 200,000 users from Russia on Wednesday, compared to some 80,000 as of June 1, according to official statistics for Tor usage on Torproject.org.
jamieparkerson

All of Iraq is in the Deep Web - 0 views

  •  
    AS THE Iraqi government censors large swathes of the internet following devastating attacks and victories by the militant group Islamic State of Iraq and Syria (ISIS), thousands of people are turning to the deep, anonymous web. Locals are adopting the browser Tor, the most popular anonymising tool online, to get around government obstruction, the Daily Dot reported.
jamieparkerson

The Pentagon is trying to make the internet more anonymous - 0 views

  •  
    If you want to use the internet and you don't want the National Security Agency to see what you're doing, you would likely turn to Tor, a network that anonymizes web traffic by bouncing it between servers. The NSA has been working on ways to get around " the Tor problem" for years with limited success.
jamieparkerson

Don\'t trust privacy apps, use Tor (Wired UK) - 0 views

  •  
    Tor is not a silver bullet, but as we become more aware of the types of ongoing government and corporate surveillance of our online lives, it remains a vital tool. This was the message delivered by Runa Sandvik, a contributor to the open source Tor Project, at Kaspersky Lab's open day.
jamieparkerson

Tor Internet privacy tool sees downloads jump to 120 million - 0 views

  •  
    In the year since Edward Snowden's leaks lifted the veil on the National Security Agency's massive global surveillance apparatus, the powerful online anonymity tool known as Tor has been downloaded about 120 million times, according to Andrew Lewman, the Tor project's executive director.
jamieparkerson

How to stay anonymous online (Wired UK) - 1 views

  •  
    One year after the first revelations of Edward Snowden, cryptography has shifted from an obscure branch of computer science to an almost mainstream notion: It's possible, user privacy groups and a growing industry of crypto-focused companies tell us, to encrypt everything from emails to IMs to a gif of a motorcycle jumping over a plane.
abdulrahmanabdo

More NSA revelations: backdoors, snooping tools and worldwide reactions - 0 views

  • “I cannot imagine a more ‘indiscriminate’ and ‘arbitrary invasion’ than this systemic and high-tech collection and retention of personal data on virtually every single citizen for purposes of querying and analysing it without prior judicial approval,” he wrote
    • abdulrahmanabdo
       
      US Judge displays his vital view on what the NSA did to the American people, can be important in making an argument in the inquiry paper.
  • A Presidential Task Force set up by Barack Obama to examine the NSA issue has issued its first report and has concluded that: “Excessive surveillance and unjustified secrecy can threaten civil liberties, public trust, and the core processes of democratic self-government.”
    • abdulrahmanabdo
       
      What the executive branch things of this whole NSA issue. This also states the possible outcomes that may have come with this issue.
  • Many people in the security industry remain unconvinced by RSA's denials.
    • abdulrahmanabdo
       
      Illustrates that the truth isn't always easily obtained, and that this story may dig deeper than anyone once anticipated before.
  • ...1 more annotation...
  • Some members of the group wanted him to step down following his part
    • abdulrahmanabdo
       
      This may prove to help shed some light on the big question of, is this issue, making the NSA fall apart.
  •  
    First of my three sources for Nugget Research #1.
abdulrahmanabdo

How the NSA's Domestic Spying Program Works | Electronic Frontier Foundation - 0 views

  • When the NSA’s spying program was first exposed by the New York Times in 2005, President Bush admitted to a small aspect of the program—what the administration labeled the “Terrorist Surveillance Program”—in which the NSA monitored, without warrants, the communications of between 500-1000 people inside the US with suspected connections to Al Qaeda.
    • abdulrahmanabdo
       
      The first time the NSA's spying programs where first exposed and what was chosen to be revealed by the Bush administration.
  • But other aspects of the Program were aimed not just at targeted individuals, but perhaps millions of innocent Americans never suspected of a crime.
  • A person familiar with the matter told USA Today that the agency's goal was "to create a database of every call ever made" within the nation's borders. All of this was done without a warrant or any judicial oversight.
    • abdulrahmanabdo
       
      The main reason why some Americans are upset by the NSA's recent actions. It was a breach in the balance of power that much of American government is run by, for now hundreds of years.
  • ...4 more annotations...
  • This equipment gave the NSA unfettered access to large streams of domestic and international communications in real time—what amounted to at least 1.7 billion emails a day, according to the Washington Post.
    • abdulrahmanabdo
       
      The intelligence gathering power of the NSA.
  • First, the government convinced the major telecommunications companies in the US, including AT&T, MCI, and Sprint, to hand over the “call-detail records” of their customers. According to an investigation by USA Today, this included “customers' names, street addresses, and other personal information.” In addition, the government received “detailed records of calls they made—across town or across the country—to family members, co-workers, business contacts and others.”
    • abdulrahmanabdo
       
      How the intensive intelligence gathering began for the NSA.
  • It works like this: when you send an email or otherwise use the internet, the data travels from your computer, through telecommunication companies' wires and fiber optics networks, to your intended recipient. To intercept these communications, the government installed devices known as “fiber-optic splitters” in many of the main telecommunication junction points in the United States (like the AT&T facility in San Francisco). These splitters make exact copies of the data passing through them: then, one stream is directed to the government, while the other stream is directed to the intended recipients.
    • abdulrahmanabdo
       
      How intelligence gathering works for the NSA.
  • In April 2012, long-time national security author James Bamford reported NSA is spending $2 billion to construct a data center in a remote part of Utah to house the information it has been collecting for the past decade. “Flowing through its servers and routers and stored in near-bottomless databases,” Bamford wrote, “will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital ‘pocket litter.’
  •  
    The NSA's Domestic Spying Program and how it works.
abdulrahmanabdo

Researchers split over NSA hacking : Nature News & Comment - 0 views

  • Furthermore, the NSA has designated more than 150 colleges and universities as centres of excellence, which qualifies students and faculty members for extra support. It can also fund research indirectly through other agencies, and so the total amount of support may be much higher. A leaked budget document says that the NSA spends more than $400 million a year on research and technology — although only a fraction of this money might go to research outside the agency itself.
    • abdulrahmanabdo
       
      Shows the sort of investing the NSA goes through in order to receive its top-level of intelligence gathering that it does yearly.
  • Many US researchers, especially those towards the basic-research end of the spectrum, are comfortable with the NSA’s need for their expertise.
    • abdulrahmanabdo
       
      Shows that some are okay with what the NSA is conducting and shows the partnership the US researches have with the NSA. The researches are among many of the processes that paints the full picture of how NSA incorporates their domestic surveillance by using their PRISM program, which is the main focus of this inquiry project.
  • “I understand what’s in the newspapers,” he says, “but the NSA is funding serious long-term fundamental research and I’m happy they’re doing it.”
    • abdulrahmanabdo
       
      A new view on the NSA issue that Snowden revealed.
  • ...3 more annotations...
  • also wants to maintain the relationship.
    • abdulrahmanabdo
       
      It almost seems as if they both need each other. This could be used in the article to illustrate how the NSA is partnered with US researches and need them to function. Another issue that would be covered in the inquiry paper to argue one of the many pieces that the NSA uses to accomplish its goal.
  • When it was revealed that the NSA had inserted a ‘back door’ into the NIST standards to allow snooping, some of them felt betrayed. “We certainly had no idea that they were tampering with products or standards,” says Green.
    • abdulrahmanabdo
       
      A feeling of betrayal from the NSA to a researcher at Johns Hopkins (Mr. Green), can prove to be damaging as more researchers from all over the US find out about this betrayal and start to rethink their partnership with the NSA which then hinders the NSA advancement in intelligence gathering. It would seem that the NSA is hurting itself rather than helping itself at this moment, an interesting view to point out in the inquiry paper.
  • “There was a sense of certain lines that NSA wouldn’t cross,” says Felten, “and now we’re not so sure about that.”
    • abdulrahmanabdo
       
      More proof of the annotation that was done directly above this one.
  •  
    Source #2 for my Research Nugget #1.
1 - 10 of 10
Showing 20 items per page