Skip to main content

Home/ History Readings/ Group items tagged encryption

Rss Feed Group items tagged

katyshannon

Apple Fights Order to Unlock San Bernardino Gunman's iPhone - The New York Times - 0 views

  • Last month, some of President Obama’s top intelligence advisers met in Silicon Valley with Apple’s chief, Timothy D. Cook, and other technology leaders in what seemed to be a public rapprochement in their long-running dispute over the encryption safeguards built into their devices.
  • But behind the scenes, relations were tense, as lawyers for the Obama administration and Apple held closely guarded discussions for over two months about one particularly urgent case: The F.B.I. wanted Apple to help “unlock” an iPhone used by one of the two attackers who killed 14 people in San Bernardino, Calif., in December, but Apple was resisting.
  • When the talks collapsed, a federal magistrate judge, at the Justice Department’s request, ordered Apple to bypass security functions on the phone.
  • ...24 more annotations...
  • The order set off a furious public battle on Wednesday between the Obama administration and one of the world’s most valuable companies in a dispute with far-reaching legal implications.
  • This is not the first time a technology company has been ordered to effectively decrypt its own product. But industry experts say it is the most significant because of Apple’s global profile, the invasive steps it says are being demanded and the brutality of the San Bernardino attacks.
  • Law enforcement officials who support the F.B.I.’s position said that the impasse with Apple provided an ideal test case to move from an abstract debate over the balance between national security and privacy to a concrete one
  • The F.B.I. has been unable to get into the phone used by Syed Rizwan Farook, who was killed by the police along with his wife after they attacked Mr. Farook’s co-workers at a holiday gathering.
  • Magistrate Judge Sheri Pym of the Federal District Court for the District of Central California issued her order Tuesday afternoon, after the F.B.I. said it had been unable to get access to the data on its own and needed Apple’s technical assistance.
  • Mr. Cook, the chief executive at Apple, responded Wednesday morning with a blistering, 1,100-word letter to Apple customers, warning of the “chilling” breach of privacy posed by the government’s demands. He maintained that the order would effectively require it to create a “backdoor” to get around its own safeguards, and Apple vowed to appeal the ruling by next week.
  • Apple argues that the software the F.B.I. wants it to create does not exist. But technologists say the company can do it.
  • pple executives had hoped to resolve the impasse without having to rewrite their own encryption software. They were frustrated that the Justice Department had aired its demand in public, according to an industry executive with knowledge of the case, who spoke on the condition of anonymity about internal discussions.
  • The Justice Department and the F.B.I. have the White House’s “full support,” the spokesman, Josh Earnest, said on Wednesday.
  • His vote of confidence was significant because James Comey, the F.B.I. director, has at times been at odds with the White House over his aggressive advocacy of tougher decryption requirements on technology companies. While Mr. Obama’s national security team was sympathetic to Mr. Comey’s position, others at the White House viewed legislation as potentially perilous. Late last year, Mr. Obama refused to back any legislation requiring decryption, leaving a court fight likely.
  • The dispute could initiate legislation in Congress, with Republicans and Democrats alike criticizing Apple’s stance on Wednesday and calling for tougher decryption requirements.
  • Donald J. Trump, the Republican presidential contender, also attacked Apple on Fox News, asking, “Who do they think they are?”
  • But Apple had many defenders of its own among privacy and consumer advocates, who praised Mr. Cook for standing up to what they saw as government overreach.
  • Many of the company’s defenders argued that the types of government surveillance operations exposed in 2013 by Edward J. Snowden, the former National Security Agency contractor, have prompted technology companies to build tougher encryption safeguards in their products because of the privacy demands of their customers.
  • Privacy advocates and others said they worried that if the F.B.I. succeeded in getting access to the software overriding Apple’s encryption, it would create easy access for the government in many future investigations.
  • The Apple order is a flash point in a dispute that has been building for more than a decade. Advertisement Continue reading the main story Advertisement Continue reading the main story
  • The F.B.I. began sounding alarms years ago about technology that allowed people to exchange private messages protected by encryption so strong that government agents could not break it. In fall 2010, at the behest of Robert S. Mueller III, the F.B.I. director, the Obama administration began work on a law that required technology companies to provide unencrypted data to the government.
  • Lawyers at the F.B.I., Justice Department and Commerce Department drafted bills around the idea that technology companies in the Internet age should be bound by the same rules as phone companies, which were forced during the Clinton administration to build digital networks that government agents could tap.
  • The draft legislation would have covered app developers like WhatsApp and large companies like Google and Apple, according to current and former officials involved in the process.
  • There is no debate that, when armed with a court order, the government can get text messages and other data stored in plain text. Far less certain was whether the government could use a court order to force a company to write software or redesign its system to decode encrypted data. A federal law would make that authority clear, they said.
  • But the disclosures of government surveillance by Mr. Snowden changed the privacy debate, and the Obama administration decided not to move on the proposed legislation. It has not been revived.
  • The legal issues raised by the judge’s order are complicated. They involve statutory interpretation, rather than constitutional rights, and they could end up before the Supreme Court.
  • As Apple noted, the F.B.I., instead of asking Congress to pass legislation resolving the encryption fight, has proposed what appears to be a novel reading of the All Writs Act of 1789.
  • The law lets judges “issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.”
anonymous

4 Proud Boys Charged With Conspiracy Over Capitol Attack : NPR - 0 views

  • Four alleged leaders of the Proud Boys have been indicted in connection with the Jan. 6 attack on the U.S. Capitol over allegedly conspiring, including in discussions on encrypted messaging apps, to obstruct the certification of President Biden's Electoral College victory.
  • The indictment unsealed Friday charges the defendants — Ethan Nordean, Joseph Biggs, Zach Rehl and Charles Donohoe — with six counts, including obstruction of an official proceeding, obstruction of law enforcement, destruction of government property and conspiracy.
  • Nordean is the president of his local Proud Boy chapter in Washington state; Biggs is a Proud Boy member and organizer in Florida; Rehl is the president of a local chapter of the group in Philadelphia; and Donohoe is the president of his local Proud Boy chapter in North Carolina. Nordean and Biggs had previously been charged by complaint.
  • ...13 more annotations...
  • The defendants are the latest with ties to the Proud Boys, a far-right extremist group, to face conspiracy charges over their alleged roles in the Jan. 6 storming of the Capitol by Trump supporters.
  • Two days before Congress met to certify the results, Washington, D.C., police arrested the Proud Boys chairman, Enrique Tarrio.
  • Prosecutors allege that after Tarrio's arrest, Donohoe expressed concern that encrypted communications that included Tarrio were now compromised and in the hands of police.
  • Donohoe then created a new channel, called "New MOSD," on an encrypted messaging app that included his co-defendants. Donohoe also, according to the indictment, "took steps to destroy or 'nuke' the earlier channel."
  • Donohoe posted a message that same day to the new channel in which he says: "Hey have been instructed an listen to me real good!
  • Later that day, an individual identified in court documents only as an unindicted co-conspirator posted: "[W]e had originally planned on breaking the guys into teams. Let's start divvying them up and getting baofeng channels picked out," referring to channels on handheld radios.
  • The following day, the indictment says, a new encrypted messaging channel called "Boots on the Ground" was set up for Proud Boys in Washington.
  • That evening, Biggs posted a message to the channel that said he was trying to get a sense of their numbers so they can "go over tomorrow's plan."
  • Rehl told the channel he was on his way to Washington and was bringing radios with him. He added that there was a person who would program the devices later that evening.
  • That same evening, Biggs allegedly posted a message that read: "We have a plan. I'm with Rufio."
  • The indictment alleges that the members of the encrypted messaging channels were told to meet at the Washington Monument at 10 a.m. on Jan. 6.Proud Boys did show up at the monument at 10, including the defendants, according to the indictment. From there, the group marched to the Capitol with Nordean, Biggs and Rehl near or at the front of the crowd.
  • Once there, the indictment says, the defendants "charged toward the capitol by crossing over the barriers that had been violently disassembled and trampled by the crowd moments before."
  • The Proud Boys are not the only extremist group to see its members charged with conspiracy in connection with the Capitol riot. Members of the Oath Keepers, a far-right paramilitary group, are also facing conspiracy charges. So far, more than 300 people have been charged in connection with the Capitol breach. Prosecutors say at least 100 more could still be charged.
katherineharron

Trump wants Apple to unlock the Pensacola shooter's iPhones. Here's why it won't - CNN - 0 views

  • President Donald Trump just slammed Apple for refusing to allow the US government access to the iPhones "used by killers, drug dealers and other violent criminal elements."
  • Trump's tweet came hours after Apple declined requests from US Attorney General William Barr and the FBI to unlock two iPhones believed to have been used by a 21-year-old man who killed three sailors in a shooting last month at a Pensacola, Florida, Air Force base.
  • Apple's commitment to protecting the privacy of its users is well known. The iPhone maker has hammered on privacy as a marketing pitch in recent years, with CEO Tim Cook repeatedly calling privacy a fundamental human right. Cook told CNN in 2018 that he wants governments around the world to restrict how much data companies can collect from their customers.
  • ...3 more annotations...
  • "We have always maintained there is no such thing as a backdoor just for the good guys. Backdoors can also be exploited by those who threaten our national security and the data security of our customers," Apple added. "Today, law enforcement has access to more data than ever before in history, so Americans do not have to choose between weakening encryption and solving investigations. We feel strongly encryption is vital to protecting our country and our users' data."
  • Facebook has faced a similar tussle on the other side of the world, squaring off against India's government over its mobile messaging service, WhatsApp. India — the company's biggest market with 400 million-plus WhatsApp users — demanded in 2018 that Facebook add the ability to track individual messages after a series of lynchings tied to viral hoax forwards.
  • WhatsApp has repeatedly refused, saying encryption is fundamental to its private nature. "We will not weaken the privacy protections WhatsApp provides," a spokesperson said at the time.
maddieireland334

Encryption key to free speech, says UN report - BBC News - 0 views

  •  
    Encryption software that makes it hard to spy on what people do and say online is "essential" for free speech, says a United Nations report. Without anonymising tools, many people will find it far harder to express opinions without censure, it says. Any attempt to weaken encryption software will only curb this ability, it warns.
Javier E

Top British Spy Warns of Terrorists' Use of Social Media - NYTimes.com - 0 views

  • One of Britain’s highest-ranking intelligence officials on Tuesday castigated the giant American companies that dominate the Internet for providing the “command-and-control networks of choice for terrorists and criminals” and challenged the companies to find a better balance between privacy and security.
  • the accusation went beyond what United States officials have said about Apple, Google and others that are now moving toward sophisticated encryption of more and more data on phones and email systems.
  • companies like his “will move to strengthen encryption,” and require governments to get court orders if they want data.
  • ...7 more annotations...
  • But the companies, saying they are responding to demand from their users, show no signs of backing down. Recently the chief executive of Apple, Tim Cook, said governments that want data should deal with the users of the technology, not with the providers of the hardware and services.
  • Mr. Hannigan, in an opinion article on Tuesday in The Financial Times, singled out the Islamic State, the radical group also known as ISIS and ISIL, as one “whose members have grown up on the Internet” and are “exploiting the power of the web to create a jihadi threat with near-global reach.”
  • Increasingly encrypted products and services are “a challenge,” Admiral Rogers said. “And we’ll deal with it.”But he also pushed for better sharing of data between the intelligence community and private technology companies. Moves to set up a formal information-sharing system have stalled in Congress in the face of objections from the private sector.
  • But Mr. Hannigan’s comments, calling for “a new deal between democratic governments and the technology companies in the area of protecting our citizens,” seemed to urge a further review of the balance between civil liberties and national security. Britain, like other European nations, has been increasingly concerned about online recruitment of potential fighters from within its borders by radical groups.
  • Facebook said in a company blog post that requests by governments for user information were rising steadily, by about a quarter in the first half of the year over the second half of last year.“In the first six months of 2014, governments around the world made 34,946 requests for data,” the post said. “During the same time, the amount of content restricted because of local laws increased about 19 percent.”
  • Twitter received more than 2,000 requests for information about user accounts from roughly 50 countries in the first six months of 2014, according to a company statement. The number of requests represented a 46 percent increase compared with the same period last year, and more than 60 percent of the requests came from the United States government.
  • In the past, Al Qaeda and its affiliates, which have broken with the Islamic State, “saw the Internet as a place to disseminate material anonymously or meet in ‘dark spaces,’ ” Mr. Hannigan wrote, while the Islamic State “has embraced the web as a noisy channel in which to promote itself, intimidate people and radicalize new recruits.”The opinion article by Mr. Hannigan referred specifically to messaging and social media sites and apps such as Twitter, Facebook and WhatsApp.“There is no need for today’s would-be jihadis to seek out restricted websites with secret passwords: They can follow other young people posting their adventures in Syria as they would anywhere else,” he wrote.
Javier E

Opinion | Zuckerberg's So-Called Shift Toward Privacy - The New York Times - 0 views

  • The platitudes were there, as I expected, but the evasions were worse than I anticipated: The plan, in effect, is to entrench Facebook’s interests while sidestepping all the important issues.
  • Here are four pressing questions about privacy that Mr. Zuckerberg conspicuously did not address: Will Facebook stop collecting data about people’s browsing behavior, which it does extensively? Will it stop purchasing information from data brokers who collect or “scrape” vast amounts of data about billions of people, often including information related to our health and finances? Will it stop creating “shadow profiles” — collections of data about people who aren’t even on Facebook? And most important: Will it change its fundamental business model, which is based on charging advertisers to take advantage of this widespread surveillance to “micro-target” consumers?
  • Mr. Zuckerberg said that the company would expand end-to-end encryption of messaging, which prevents Facebook — or anyone other than the participants in a conversation — from seeing the content of messages. I’m certainly in favor of messaging privacy: It is a cornerstone of the effort to push back against the cloud of surveillance that has descended over the globe.
  • ...7 more annotations...
  • But what we really need — and it is not clear what Facebook has in mind — is privacy for true person-to-person messaging apps, not messaging apps that also allow for secure mass messaging.
  • Once end-to-end encryption is put in place, Facebook can wash its hands of the content. We don’t want to end up with all the same problems we now have with viral content online — only with less visibility and nobody to hold responsible for it.
  • encrypted messaging, in addition to releasing Facebook from the obligation to moderate content, wouldn’t interfere with the surveillance that Facebook conducts for the benefit of advertisers. As Mr. Zuckerberg admitted in an interview after he posted his plan, Facebook isn’t “really using the content of messages to target ads today anyway.” In other words, he is happy to bolster privacy when doing so would decrease Facebook’s responsibilities, but not when doing so would decrease its advertising revenue.
  • Mr. Zuckerberg emphasized in his post was his intention to make Facebook’s messaging platforms, Messenger, WhatsApp and Instagram, “interoperable.” He described this decision as part of his “privacy-focused vision,” though it is not clear how doing so — which would presumably involve sharing user data — would serve privacy interests.
  • Merging those apps just might, however, serve Facebook’s interest in avoiding antitrust remedies. Just as regulators are realizing that allowing Facebook to gobble up all its competitors (including WhatsApp and Instagram) may have been a mistake, Mr. Zuckerberg decides to scramble the eggs to make them harder to separate into independent entities. What a coincidence.
  • This supposed shift toward a “privacy-focused vision” looks more to me like shrewd competitive positioning, dressed up in privacy rhetoric.
  • Sheryl Sandberg, Facebook's chief operating officer, likes to say that the company’s problem is that it has been “way too idealistic.” I think the problem is the invasive way it makes its money and its lack of meaningful oversight
Javier E

Opinion | Facebook's Unintended Consequence - The New York Times - 0 views

  • The deeper problem is the overwhelming concentration of technical, financial and moral power in the hands of people who lack the training, experience, wisdom, trustworthiness, humility and incentives to exercise that power responsibly.
  • Now Facebook wants to refurbish its damaged reputation by promising its users much more privacy via encrypted services as well as more aggressively policing hate speech on the site
  • This is what Alex Stamos, Facebook’s former chief security officer, called “the judo move: In a world where everything is encrypted and doesn’t last long, entire classes of scandal are invisible to the media.”
  • ...4 more annotations...
  • it’s a cynical exercise in abdication dressed as an act of responsibility. Knock a few high-profile bigots down. Throw a thick carpet over much of the rest. Then figure out how to extract a profit from your new model.
  • On the one hand, Facebook will be hosting the worst kinds of online behavior. In a public note in March, Zuckerberg admitted that encryption will help facilitate “truly terrible things like child exploitation, terrorism, and extortion.” (For that, he promised to “work with law enforcement.” Great.)
  • On the other hand, Facebook is completing its transition from being a simple platform, broadly indifferent to the content it hosts, to being a publisher that curates and is responsible for content.
  • the decision to absolutely ban certain individuals will always be a human one. It will inevitably be subjective.
Javier E

Compromised encryption machines gave CIA window into major human rights abuses in South... - 0 views

  • The U.S. spy agency was, in effect, supplying rigged communications gear to some of South America’s most brutal regimes and, as a result, in unique position to know the extent of their atrocities.
  • What the documents don’t show is any substantial effort by U.S. spy agencies, or senior officials privy to the intelligence, to expose or stop human rights violations unfolding in their view.
  • The countries’ initial target was a multinational rebel group operating in the southern part of the continent. But over time the operation morphed into a sprawling campaign involving mass killings in South America and assassinations of alleged rebel leaders and political exiles in Europe and the United States.
  • ...5 more annotations...
  • the Crypto documents reinforce the perception among Latin Americans that U.S. officials did little to stop the bloodshed in previous decades. “They have always suspected U.S. participation, and knowledge is a form of participation,” Osorio said. “This is confirmation of those suspicions.”
  • The list of countries targeted in the Crypto operation suggests that U.S. spies would have had extensive insight into turbulent developments across multiple continents and decades — massacres in Indonesia, abuses under apartheid in South Africa and violent crackdowns against dissidents waged by Hosni Mubarak in Egypt after the 1981 assassination of Anwar Sadat.
  • “Knowledge of atrocities creates legal obligations in extreme cases and moral obligations in all cases,” said John Sifton, a senior official at Human Rights Watch, an advocacy grou
  • “It would be interesting to go through all of the speeches and statements of the State Department — all the statements over the years where U.S. officials distanced themselves from allegations of atrocities, or professed ignorance,” Sifton said.
  • Former intelligence officials said such standards are unrealistic, and that the Crypto revelations reflect the ethical and moral compromises that espionage entails.
Javier E

In Nod to Law Enforcement, Obama Ends Attempt to Straddle Privacy Divide - The New York... - 0 views

  • Asked about the president’s backing of the Federal Bureau of Investigation’s inquiry into San Bernardino, one of the worst terror attacks in the United States since September 11, 2001, Mr. Obama’s press secretary declared on Wednesday that “the F.B.I. can count on the full support of the White House.”
  • The decision may have been all but inevitable for Mr. Obama, who every morning receives a classified intelligence briefing about the terrorist threats facing the United States. But he took the position after years of trying to find middle ground on the issue.
  • After Edward J. Snowden exposed some of the government’s most secret surveillance programs in 2013, the president repeatedly expressed support for the protection of user data on iPhones and other devices. But he also acknowledged the “legitimate need” to penetrate encryption, especially during terror investigations.
  • ...3 more annotations...
  • Several former Obama administration officials said they believed the president personally leaned, at least slightly, toward the view that technology companies must be allowed to secure personal data if they want to earn the trust of their customers.
  • But some civil libertarians view Mr. Obama as, at best, a weak supporter of their views and one who has too often been swayed by his national security and law enforcement apparatus.
  • “The fact that it’s linked to the shootings makes it much more difficult politically,’’ Mr. Bankston said. “But the answer is to highlight that it’s not just about this case. It’s about every encrypted device.”
anonymous

Prosecutors Share New Evidence In Capitol Riot Conspiracy Case : NPR - 0 views

  • The founder of the Oath Keepers militia had a 97-second phone call with a senior member of the group who minutes later took part in a military-style "stack" formation with other Oath Keepers to breach the U.S. Capitol on Jan. 6, according to federal prosecutors.
  • The allegation emerged in court papers the Justice Department filed overnight in the case against 10 alleged members or associates of the Oath Keepers facing conspiracy and other charges in connection with the Capitol riot.
  • Prosecutors allege that the call, along with a series of text messages in an encrypted chat group called "DC OP: Jan 6 21," amount to "substantial evidence" of a conspiracy to try to stop Congress' certification of the Electoral College count.
  • ...11 more annotations...
  • The filing sheds more light on the actions on Jan. 6 of Stewart Rhodes, who founded the Oath Keepers in 2009. Rhodes is only identified as "Person One" in the document but has been identified as the group's founder in previous court papers.
  • Rhodes has not been charged in connection with the Capitol insurrection, but the latest court document and previous statements by prosecutors suggest investigators are closely scrutinizing his actions on and around Jan. 6.
  • In the latest filing, prosecutors allege that Rhodes called Florida Oath Keeper leader Kelly Meggs at 2:32 p.m. on Jan. 6, just as Meggs and several of his associates were getting into a "stack" formation to push up the steps of the Capitol.
  • It is not clear what the two men spoke about, but prosecutors note that around six minutes later, the militia members who had coalesced into a stack formation "forcibly" entered the Capitol "by pushing past just opened and severely damaged Capitol building doors."
  • The latest government filing was made to oppose the pretrial release of one of the 10 defendants in the case, Jessica Watkins, who the government says was the leader of an Ohio militia and member of the Oath Keepers.
  • Prosecutors allege that Watkins was in a chat group on the encrypted messaging app Signal called "DC OP: Jan 6 21" with Meggs, Rhodes and two other Oath Keepers who have been charged over the Capitol riot.
  • The government says the group used the chat to talk about what weapons to bring to Washington, D.C., about using handheld radios to communicate on Jan. 6 and about the existence of so-called quick reaction forces waiting outside Washington with weapons in case "of worst case scenarios."
  • In the Signal chat on the day of the riot, prosecutors say shortly after 1 p.m. Rhodes messaged the group: "All I see Trump doing is complaining. I see no intent by him to do anything. So the patriots are taking it into their own hands. They've had enough."
  • Prosecutors say around 2:15 p.m., one of the chat participants told the group that ground had been taken at the Capitol and "we need to regroup any members who are not on mission," an apparent reference to Oath Keepers who were providing "security" in Washington during the Trump rally.
  • Around 2:32 p.m., the government says, Rhodes "exchanged a 97 second call with 'stack' member and Florida Oath Keepers leader, Kelly Meggs, as Meggs, Watkins and the rest of the stack embedded themselves among insurgents trying to force open the east side Capitol building double doors that officers were desperately trying to keep shut."
  • The government argues that evidence supports the theory that the defendants stormed the Capitol "with the shared objective of using force to upend the transition of presidential power."
Javier E

Mob Violence Against Palestinians in Israel Is Fueled by Groups on WhatsApp - The New Y... - 0 views

  • Last Wednesday, a message appeared in a new WhatsApp channel called “Death to the Arabs.” The message urged Israelis to join a mass street brawl against Palestinian citizens of Israel.
  • “Together we organize and together we act,” read a message in one of the WhatsApp groups. “Tell your friends to join the group, because here we know how to defend Jewish honor.”
  • The episode was one of dozens across Israel that the authorities have linked to a surge of activity by Jewish extremists on WhatsApp, the encrypted messaging service owned by Facebook.
  • ...16 more annotations...
  • Since violence between Israelis and Palestinians escalated last week, at least 100 new WhatsApp groups have been formed for the express purpose of committing violence against Palestinians, according to an analysis by The New York Times and FakeReporter, an Israeli watchdog group that studies misinformation.
  • While social media and messaging apps have been used in the past to spread hate speech and inspire violence, these WhatsApp groups go further, researchers said. That’s because the groups are explicitly planning and executing violent acts against Palestinian citizens of Israel, who make up roughly 20 percent of the population and live largely integrated lives with Jewish neighbors.
  • That is far more specific than past WhatsApp-fueled mob attacks in India, where calls for violence were vague and generally not targeted at individuals or businesses
  • Even the Stop the Steal groups in the United States that organized the Jan. 6 protests in Washington did not openly direct attacks using social media or messaging apps,
  • In the groups, attacks have been carefully documented, with members often gloating about taking part in the violence, according to The Times’s review. Some said they were taking revenge for rockets being fired onto Israel from militants in the Gaza Strip, while others cited different grievances. Many solicited names of Arab-owned businesses they could target next.
  • “It is a perfect storm of people empowered to use their own names and phone numbers to openly call for violence, and having a tool like WhatsApp to organize themselves into mobs,” said Achiya Schatz, director of FakeReporter.
  • Micky Rosenfeld, a spokesman for the Israeli police, said, “Police are tracking social media and monitoring movements on the ground.” He said that while Israelis have been involved in some attacks, they were largely “protecting themselves” against attacks by Palestinian citizens of Israel. He added, “Police investigations are continuing.”
  • One official, who spoke on the condition of anonymity, added that the police had not seen similar WhatsApp groups forming among Palestinians.
  • Islamist movements, including Hamas, the militant Palestinian organization that controls the Gaza Strip, have long organized and recruited followers on social media but do not plan attacks on the services for fear of being discovered.
  • A WhatsApp spokeswoman said the messaging service was concerned by the activity from Israeli extremists. She said the company had removed some accounts of people who participated in the groups. WhatsApp cannot read the encrypted messages on its service, she added, but it has acted when accounts were reported to it for violating its terms of service.
  • The groups have since grown steadily in size, Mr. Schatz said. Some have become so big that they have branched off into local chapters that are dedicated to certain cities and towns. To evade detection by WhatsApp, organizers of the groups are urging people to vet new members, he said.
  • On one new Telegram channel that The Times reviewed, “The Revenge Troops,” people recently shared instructions for how to build Molotov cocktails and makeshift explosives. The group asked its 400 members to also provide addresses of Arab-owned businesses that could be targeted.
  • In another group with just under 100 members, people shared photos of guns, knives and other weapons as they discussed engaging in street combat in mixed Jewish-Arab cities. Another new WhatsApp group was named “The unapologetic right-wing group.”
  • “We destroyed them, we left them in pieces,” said one person in “The Revenge Troops” Telegram channel, alongside a photo showing smashed car windows. In a different group, a video was uploaded of black-clad Jewish youths stopping cars on an unnamed street and asking drivers if they were Jewish or Arab.
  • We beat “the enemy car-by-car,” said a comment posted underneath the video, using an expletive.
  • “Our government is too weak to do what is necessary, so we take it into our own hands,” wrote one person in a WhatsApp group dedicated to the city of Ramle in central Israel. “Now that we have organized, they can’t stop us.”
katieb0305

Justice Dept. Strongly Discouraged Comey on Move in Clinton Email Case - The New York T... - 0 views

  • The day before the F.B.I. director, James B. Comey, sent a letter to Congress announcing that new evidence had been discovered that may be related to the completed Hillary Clinton email investigation, the Justice Department strongly discouraged the step and told him that he would be breaking with longstanding policy, three law enforcement officials said on Saturday.
  • Senior Justice Department officials did not move to stop him from sending the letter, officials said, but they did everything short of it, pointing to policies against talking about current criminal investigations or being seen as meddling in elections.
  • Justice Department officials were particularly puzzled about why Mr. Comey had alerted Congress — and by extension, the public — before agents even began reading the newly discovered emails to determine whether they contained classified information or added new facts to the case.
  • ...11 more annotations...
  • but there is no chance that the review will be completed before Election Day, several law enforcement officials said.
  • disgraced former congressman Anthony D. Weiner — opened Mr. Comey up to fierce criticism not only from Democrats but also from current and former officials at the F.B.I. and the Justice Department, including Republicans.
  • The letter is also the latest example of an at-times strained relationship between the Justice Department and Mr. Comey, who technically answers to the attorney general but who — on issues of race, encryption, policing and, most notably, the Clinton investigation — has branded himself as someone who operates outside Washington’s typical chain of command.
  • about the new emails far outweighed concerns about the department guidelines, one senior law enforcement official said.
  • Under Justice Department policy, restated each election cycle, politics should play no role in any investigative decisions.
  • Mr. Weiner had sent illicit text messages to a 15-year-old girl in North Carolina, top prosecutors in Charlotte and Manhattan jockeyed for the case
  • F.B.I.’s New York field office understood that the Weiner investigation could possibly turn up additional emails related to Mrs. Clinton’s private server, according to a senior federal law enforcement official. Mr. Weiner’s estranged wife, Huma Abedin, is a top adviser to Mrs. Clinton.
  • During the course of searching the seized devices, the F.B.I. discovered thousands of emails, according to senior law enforcement officials, some of them sent between Ms. Abedin and other Clinton aides.
  • The government has not yet concluded that the new emails contain classified information, but investigators felt obligated to look.
  • which said emails had surfaced in a case unrelated to the Clinton case. Mr. Comey said that the F.B.I. would review the emails to determine if they improperly contained classified information, adding that the emails “appear to be pertinent.”
  • They charged that just 11 days before an election, he was unnecessarily inserting himself into politics.
Javier E

How to Muddy Your Tracks on the Internet - NYTimes.com - 0 views

  • There are no secrets online. That emotional e-mail you sent to your ex, the illness you searched for in a fit of hypochondria, those hours spent watching kitten videos (you can take that as a euphemism if the kitten fits) — can all be gathered to create a defining profile of you.
  • Your information can then be stored, analyzed, indexed and sold as a commodity to data brokers who in turn might sell it to advertisers, employers, health insurers or credit rating agencies.
  • you can take steps to do the technological equivalent of throwing on a pair of boxers and a T-shirt. Some of these measures are quite easy and many are free.
  • ...8 more annotations...
  • He advised logging off sites like Google and Facebook as soon as practicably possible and not using the same provider for multiple functions if you can help it. “If you search on Google, maybe you don’t want to use Gmail for your e-mail,”
  • Another shrouding tactic is to use the search engine DuckDuckGo, which distinguishes itself with a “We do not track or bubble you!” policy. Bubbling is the filtering of search results based on your search history. (Bubbling also means you are less likely to see opposing points of view or be exposed to something fresh and new.)
  • turn on your browser’s “private mode,” usually found under Preferences, Tools or Settings. When this mode is activated, tracking cookies are deleted once you close your browser, which “essentially wipes clean your history,”
  • private mode does nothing to conceal your I.P. address, a unique number that identifies your entry or access point to the Internet. So Web sites may not know your browsing history, but they will probably know who you are and where you are as well as when and how long you viewed their pages.
  • Shielding your I.P. address is possible by connecting to what is called a virtual private network, or V.P.N., such as those offered by WiTopia, PrivateVPN and StrongVPN. These services, whose prices price from $40 to $90 a year, route your data stream to what is called a proxy server, where it is stripped of your I.P. address before it is sent on to its destination. This obscures your identity not only from Web sites but also from your Internet service provider.
  • there is Tor, a free service with 36 million users that was originally developed to conceal military communications. Tor encrypts your data stream and bounces it through a series of proxy servers so no single entity knows the source of the data or whence it came. The only drawback is that with all that bouncing around, it is very S-L-O-W.
  • Free browser add-ons that increase privacy and yet will not interrupt your work flow include Ghostery and Do Not Track Plus, which prevent Web sites from relaying information about you and your visit to tracking companies.
  • “Companies like Google are creating these enormous databases using your personal information,” said Paul Hill, senior consultant with SystemExperts, a network security company in Sudbury, Mass. “They may have the best of intentions now, but who knows what they will look like 20 years from now, and by then it will be too late to take it all back.”
Javier E

British Prime Minister Suggests Banning Some Online Messaging Apps - NYTimes.com - 0 views

  • “Are we going to allow a means of communications which it simply isn’t possible to read?” Mr. Cameron said at an event on Monday, in reference to services like WhatsApp, Snapchat and other encrypted online applications. “My answer to that question is: ‘No, we must not.’ ”
  • Mr. Cameron said his first duty was to protect the country against terrorist attacks.
  • “The attacks in Paris demonstrated the scale of the threat that we face and the need to have robust powers through our intelligence and security agencies in order to keep our people safe,”
  • ...2 more annotations...
  • Mr. Cameron’s comments are part of a growing debate in Europe and the United States over whether Internet companies and telecom providers must cooperate fully with intelligence agencies, who have seen an increased use of social media by groups like the Islamic State, also known as ISIS or ISIL.
  • After the Paris attacks, European leaders, for example, called on Internet service providers to report potentially harmful online material aimed at inciting hatred or terror.
Javier E

China Is Said to Use Powerful New Weapon to Censor Internet - NYTimes.com - 0 views

  • The Great Cannon, the researchers said in a report published on Friday, allows China to intercept foreign web traffic as it flows to Chinese websites, inject malicious code and repurpose the traffic as Beijing sees fit.
  • With a few tweaks, the Great Cannon could be used to spy on anyone who happens to fetch content hosted on a Chinese computer, even by visiting a non-Chinese website that contains Chinese advertising content.
  • “The operational deployment of the Great Cannon represents a significant escalation in state-level information control,” the researchers said in their report. It is, they said, “the normalization of widespread and public use of an attack tool to enforce censorship.”
  • ...10 more annotations...
  • The device has the ability not only to snoop on Internet traffic but also to alter the traffic and direct it — on a giant scale — to any website, in what is called a “man in the middle attack.”
  • The American system, according to the documents, which were published by The Intercept, can deploy a system of programs that can intercept web traffic on a mass scale and redirect it to a site of their choosing. The N.S.A. and its partners appear to use the programs for targeted surveillance, whereas China appears to use the Great Cannon for an aggressive form of censorship.
  • The similarities of the programs may put American officials on awkward footing, the researchers argue in their report. “This precedent will make it difficult for Western governments to credibly complain about others utilizing similar techniques,” they write.
  • the Chinese program illustrates how far officials in Beijing are willing to go to censor Internet content they deem hostile. “This is just one part of President Xi Jinping’s push to gain tighter control over the Internet and remove any challenges to the party,
  • Beijing continues to increase its censorship efforts under its State Internet Information Office, an office created under Mr. Xi to gain tighter control over the Internet within the country and to clamp down on online activism. In a series of recent statements, Lu Wei, China’s Internet czar, has called on the international community to respect China’s Internet policies.
  • “The position of the Chinese government is that efforts to serve what it views as hostile content inside China’s borders is a hostile and provocative act that is a threat to its regime stability and ultimately its national security.”
  • by sweeping up Baidu’s would-be visitors in its attacks, researchers and foreign policy experts say, Beijing could harm the company’s reputation and market share overseas.
  • “Because both the Great Cannon and Great Firewall are operating on the same physical link, we believe they are both being run under the same authority,
  • researchers’ fear is that the state could use its new weapon to attack Internet users, particularly dissidents, without their knowledge. If they make a single request to a server inside China or even visit a non-Chinese website that contains an ad from a Chinese server, the Great Cannon could infect their web communications and those of everyone they communicate with and spy on them.
  • Ultimately, researchers say, the only way for Internet users and companies to protect themselves will be to encrypt their Internet traffic so that it cannot be intercepted and diverted as it travels to its intended target.“Put bluntly,” the researchers said, “unprotected traffic is not just an opportunity for espionage but a potential attack vector.”
Javier E

How Trump Consultants Exploited the Facebook Data of Millions - The New York Times - 0 views

  • Christopher Wylie, who helped found Cambridge and worked there until late 2014, said of its leaders: “Rules don’t matter for them. For them, this is a war, and it’s all fair.”
  • “They want to fight a culture war in America,” he added. “Cambridge Analytica was supposed to be the arsenal of weapons to fight that culture war.”
  • But the full scale of the data leak involving Americans has not been previously disclosed — and Facebook, until now, has not acknowledged it. Interviews with a half-dozen former employees and contractors, and a review of the firm’s emails and documents, have revealed that Cambridge not only relied on the private Facebook data but still possesses most or all of the trove.
  • ...22 more annotations...
  • The documents also raise new questions about Facebook, which is already grappling with intense criticism over the spread of Russian propaganda and fake news. The data Cambridge collected from profiles, a portion of which was viewed by The Times, included details on users’ identities, friend networks and “likes.”
  • “Protecting people’s information is at the heart of everything we do,” Mr. Grewal said. “No systems were infiltrated, and no passwords or sensitive pieces of information were stolen or hacked.”Still, he added, “it’s a serious abuse of our rules.”
  • The group experimented abroad, including in the Caribbean and Africa, where privacy rules were lax or nonexistent and politicians employing SCL were happy to provide government-held data, former employees said.
  • Mr. Nix and his colleagues courted Mr. Mercer, who believed a sophisticated data company could make him a kingmaker in Republican politics, and his daughter Rebekah, who shared his conservative views. Mr. Bannon was intrigued by the possibility of using personality profiling to shift America’s culture and rewire its politics, recalled Mr. Wylie and other former employees, who spoke on the condition of anonymity because they had signed nondisclosure agreements.
  • Mr. Wylie’s team had a bigger problem. Building psychographic profiles on a national scale required data the company could not gather without huge expense. Traditional analytics firms used voting records and consumer purchase histories to try to predict political beliefs and voting behavior.
  • But those kinds of records were useless for figuring out whether a particular voter was, say, a neurotic introvert, a religious extrovert, a fair-minded liberal or a fan of the occult. Those were among the psychological traits the firm claimed would provide a uniquely powerful means of designing political messages.
  • Mr. Wylie found a solution at Cambridge University’s Psychometrics Centre. Researchers there had developed a technique to map personality traits based on what people had liked on Facebook. The researchers paid users small sums to take a personality quiz and download an app, which would scrape some private information from the their profiles and those of their friends, activity that Facebook permitted at the time. The approach, the scientists said, could reveal more about a person than their parents or romantic partners knew — a claim that has been disputed.
  • When the Psychometrics Centre declined to work with the firm, Mr. Wylie found someone who would: Dr. Kogan, who was then a psychology professor at the university and knew of the techniques. Dr. Kogan built his own app and in June 2014 began harvesting data for Cambridge Analytica. The business covered the costs — more than $800,000 — and allowed him to keep a copy for his own research, according to company emails and financial records.
  • He ultimately provided over 50 million raw profiles to the firm, Mr. Wylie said, a number confirmed by a company email and a former colleague. Of those, roughly 30 million contained enough information, including places of residence, that the company could match users to other records and build psychographic profiles. Only about 270,000 users — those who participated in the survey — had consented to having their data harvested.Image
  • Under the guidance of Brad Parscale, Mr. Trump’s digital director in 2016 and now the campaign manager for his 2020 re-election effort, Cambridge performed a variety of services, former campaign officials said. That included designing target audiences for digital ads and fund-raising appeals, modeling voter turnout, buying $5 million in television ads and determining where Mr. Trump should travel to best drum up support.
  • “We wanted as much as we could get,” he acknowledged. “Where it came from, who said we could have it — we weren’t really asking.”
  • The firm was effectively a shell. According to the documents and former employees, any contracts won by Cambridge, originally incorporated in Delaware, would be serviced by London-based SCL and overseen by Mr. Nix, a British citizen who held dual appointments at Cambridge Analytica and SCL. Most SCL employees and contractors were Canadian, like Mr. Wylie, or European.
  • In a memo to Mr. Bannon, Ms. Mercer and Mr. Nix, the lawyer, then at the firm Bracewell & Giuliani, warned that Mr. Nix would have to recuse himself “from substantive management” of any clients involved in United States elections. The data firm would also have to find American citizens or green card holders, Mr. Levy wrote, “to manage the work and decision making functions, relative to campaign messaging and expenditures.”
  • In summer and fall 2014, Cambridge Analytica dived into the American midterm elections, mobilizing SCL contractors and employees around the country. Few Americans were involved in the work, which included polling, focus groups and message development for the John Bolton Super PAC, conservative groups in Colorado and the campaign of Senator Thom Tillis, the North Carolina Republican.
  • While Cambridge hired more Americans to work on the races that year, most of its data scientists were citizens of the United Kingdom or other European countries, according to two former employees.
  • Mr. Wylie said the Facebook data was “the saving grace” that let his team deliver the models it had promised the Mercers.
  • Mr. Grewal, the Facebook deputy general counsel, said in a statement that both Dr. Kogan and “SCL Group and Cambridge Analytica certified to us that they destroyed the data in question.”
  • But copies of the data still remain beyond Facebook’s control. The Times viewed a set of raw data from the profiles Cambridge Analytica obtained.
  • While Mr. Nix has told lawmakers that the company does not have Facebook data, a former employee said that he had recently seen hundreds of gigabytes on Cambridge servers, and that the files were not encrypted.
  • Today, as Cambridge Analytica seeks to expand its business in the United States and overseas, Mr. Nix has mentioned some questionable practices. This January, in undercover footage filmed by Channel 4 News in Britain and viewed by The Times, he boasted of employing front companies and former spies on behalf of political clients around the world, and even suggested ways to entrap politicians in compromising situations.
  • Mr. Nix is seeking to take psychographics to the commercial advertising market. He has repositioned himself as a guru for the digital ad age — a “Math Man,” he puts it. In the United States last year, a former employee said, Cambridge pitched Mercedes-Benz, MetLife and the brewer AB InBev, but has not signed them on.
  • Mr. Wylie found a solution at Cambridge University’s Psychometrics Centre. Researchers there had developed a technique to map personality traits based on what people had liked on Facebook. The researchers paid users small sums to take a personality quiz and download an app, which would scrape some private information from their profiles and those of their friends, activity that Facebook permitted at the time. The approach, the scientists said, could reveal more about a person than their parents or romantic partners knew
Javier E

Christchurch mosque killer's theories seeping into mainstream, report warns | World new... - 0 views

  • Researchers have found that organised far-right networks are pushing a conspiracy known as the “great replacement” theory to the extent that references to it online have doubled in four years, with more than 1.5 million on Twitter alone, a total that is rising exponentially.
  • The theory emerged in France in 2014 and has become a dominant concept of the extreme right, focusing on a paranoia that white people are being wiped out through migration and violence. It received increased scrutiny after featuring in the manifesto of the gunman who killed 51 people in the Christchurch attacks in New Zealand in March.
  • Now the Institute for Strategic Dialogue (ISD), a UK-based counter-extremist organisation, has found that the once-obscure ideology has moved into mainstream politics and is now referenced by figures including US president Donald Trump, Italian interior minister Matteo Salvini and Björn Höcke of the German Alternative für Deutschland (AfD).
  • ...7 more annotations...
  • Despite its French origins, the ISD’s analysis has revealed that the theory is becoming more prevalent internationally, with English-speaking countries now accounting for 33% of online discussion.
  • She said that of the 10 most influential Twitter accounts propagating the ideology, eight were French. The other two were Trump’s account and the extreme-right site Defend Europa.
  • The study reveals that alternative social media platforms, image boards, fringe forums and encrypted chat channels are instrumental in diffusing influential ideologies that propagate hatred and violence. Far-right propagandists primarily use mainstream platforms such as Facebook, YouTube and Twitter as avenues to disseminate material to audiences, while fringe platforms remain safe havens for the initiated to radicalise further.
  • The new media ecosystem has been used, for instance, to promote the fear of a “white genocide”, a topic that is active across unregulated image-board threads on 8chan and 4chan, censorship-free discussion platforms such as Voat, ultra-libertarian social-media sites such as Gab and Minds, and closed-chat channels
  • Defined as a form of ethnic cleansing through the forced deportation of minority communities, the concept of “remigration” has been a particularly fevered subject. Since 2014, the volume of tweets featuring the word has surged, rising from 66,000 in 2014 to 150,000 in 2018.
  • Jacob Davey, co-author of the report at ISD, said: “Social media platforms are built to promote clickbait content to get more users liking, sharing and commenting. This research shows how the extreme right is exploiting this to boost hateful content in the form of memes, distorted statistics and pseudo-scientific studies.
  • “The far right is able to take ownership of the ‘grey zone’ around contentious issues like migration because politicians and society are less willing to take on the role of thought leaders in these areas for fear of public outcry and outrage,” said Ebner.
Javier E

Revealed: the true identity of the leader of an American neo-Nazi terror group | World ... - 0 views

  • Using encrypted apps, members of the highly organized group planned terror campaigns; vandalized synagogues; established armed training camps and recruited new members.
  • The US attorney for Maryland, Robert K Hur, speaking after the recent arrest of three members of the Base, said that they “did more than talk – they took steps to act and act violently on their racist views”.
  • Rinaldo Nazzaro has maintained a decidedly low profile: he has no visible presence on any major social media platforms, no published writings under his own name, and no profile in local or national media.
  • ...9 more annotations...
  • The Guardian was able to unravel Nazzaro’s identity due to his 2018 activities in a remote corner of the Pacific north-west.
  • Last August, an Oregon-based antifascist group, Eugene Antifa, warned that the Base was planning a “hate camp” in the neighboring state of Washington, and claimed Nazzaro (operating under the alias of “Spear”) had purchased land in Stevens county for training purposes. This warning came after a leak of the Base’s internal chats.
  • Property record searches revealed that three 10-acre blocks of undeveloped land were purchased in December 2018 for $33,000 in the name of a Delaware LLC called “Base Global”. In a telephone conversation in late November, Manke confirmed that this was the block of land he had been referring to.
  • The location of the land is consistent with “Norman Spear’s” advocacy of a white supremacist strategy called the Northwest Territorial Imperative (NTI), which was promoted by the deceased white supremacist Harold Covington.
  • The strategy argues for the creation of a separatist ethnostate in the Pacific north-west and encourages white supremacists to move to the region.
  • The plan, he said, would trigger the relocation to the Pacific north-west of the white population in the United States.
  • Under the motto “there is no political solution”, the Base embraces an “accelerationist” ideology, which holds that acts of violence and terror are required in order to push liberal democracy towards collapse, preparing the way for white supremacists to seize power and institute an ethnostate.
  • Materials inspected and sources consulted by the Guardian indicate that Nazzaro, as “Spear”, has faced persistent suspicions from current and former members of the group that he is a “fed”, or the agent of a foreign government, or that the Base is a “honeypot” intended to lure neo-Nazis out into the open for the benefit of law enforcement agencies.
  • The Guardian has discovered that all of the business addresses associated with Nazzaro’s OSI LLCs are “virtual offices”. This describes a situation where a second company provides a business address, and sometimes meeting rooms and greeting services, for businesses who do not wish to maintain their own premises.
leilamulveny

Oath Keepers Founder Is Said to Be Investigated in Capitol Riot - The New York Times - 0 views

  • F.B.I. agents and federal prosecutors are investigating Stewart Rhodes, the founder and leader of the Oath Keepers militia, for any role he might have played in the storming of the Capitol two months ago, according to court documents and a law enforcement official with knowledge of the matter.
  • If he were ultimately charged, it could amount to a crippling blow to the militia.
  • In court papers filed on Monday night, prosecutors significantly raised the stakes against Mr. Rhodes, saying that they now have evidence that he was in direct communication with some of the plot suspects before, during and after the assault on the Capitol. Prosecutors said they have recovered messages — batched together under the title “DC OP: Jan 6 21” — from the encrypted chatting app Signal connecting Mr. Rhodes to regional Oath Keepers leaders from around the country, including two who have been charged in the conspiracy case: Jessica M. Watkins of Ohio and Kelly Meggs of Florida.
  • ...5 more annotations...
  • Prosecutors overseeing the investigation of Mr. Rhodes, who attended Yale Law School after his military service, have nonetheless struggled to make a case against him. The official with knowledge of the matter said his activities have so far have seemed to stay within the boundaries of the First Amendment.
  • Known for his distinctive black eye patch — the result of a gun accident — Mr. Rhodes has long been known to the F.B.I. and remains under investigation for a matter separate from the riot at the Capitol, a Justice Department official said. For years, he has earned a reputation as a leader of the right-wing “Patriot” movement, often spewing incendiary rhetoric to recruit and inspire militia members.
  • At a ceremony in Lexington, Mass., the site of a famous battle of the Revolutionary War, Mr. Rhodes said his plan was for members of the Oath Keepers to disobey certain illegal orders from the government and instead uphold their oath to the Constitution.
  • Mr. Rhodes was particularly vocal in supporting the former president’s relentless lies that the 2020 elections were marred by fraud and that President Biden’s victory was illegitimate.
  • Some of the Oath Keepers charged in connection with the Capitol attack have evinced a similar devotion to Mr. Trump. According to court papers, Ms. Watkins said she was “awaiting direction” from Mr. Trump about how to handle the results of the vote only after the election took place.“POTUS has the right to activate units,” she wrote in a text message to an associate on Nov. 9, according to court documents. “If Trump asks me to come, I will.”
anonymous

Your Amazon Echo Will Share Your Wireless Network With Neighbors, Unless You Opt Out : NPR - 0 views

  • Amazon is building a wireless network – using your internet bandwidth.It's called Amazon Sidewalk, and the company touts it as a way to help its devices work better, by extending the range of low-bandwidth devices to help them stay online.It does that by pooling neighbors' bandwidth to help connectivity for devices that are out of range.
  • Here's how it works.Let's say you and your next-door neighbors both have devices that Amazon has added to its Sidewalk scheme, and neither of you have opted out
  • Your neighbors decide to put a Ring security camera on their garage, but the device is too far from their Wi-Fi router to get a good signal. Perhaps your router is closer, or you pay for better connectivity. Their camera will be able to send small amounts of data using your Internet bandwidth. Amazon says the maximum bandwidth of a device on the Sidewalk server is 80 kilobits per second, or about 1/40th of the bandwidth used to stream a typical high-definition video. The total monthly data used by Sidewalk-enabled devices, per customer, is capped at 500 megabytes, which Amazon says is equivalent to streaming about 10 minutes of high-definition video.
  • ...4 more annotations...
  • Amazon says that customers' privacy and security are "foundational" to how it has built Amazon Sidewalk. The network has three layers of encryption and has protections to keep customers from viewing data from others' Sidewalk-enabled devices. Amazon also put together a white paper outlining Sidewalk's privacy and security measures.
  • Instead of trying to sell device owners on the merits of joining the program, Amazon adds devices to the shared network unless owners go through the steps to opt out.
  • The company says it's all in the customer's interest.An Amazon spokesperson says the company "believe[s] Sidewalk will provide value for every customer and we want to make it is easy for them to take advantage of benefits such as more reliable connections, extended working range for their devices, easier troubleshooting and no additional connectivity costs to customers."
  • And customers can decide to opt out at any time, the spokesperson says. If you opt out, your connection won't be pooled, and you can't draw from the pool, either.
1 - 20 of 26 Next ›
Showing 20 items per page