jump to navigation

Jones Day | Congress Passes CLOUD Act to Facilitate Law Enforcement Access to Overseas Data April 11, 2018

Posted by sandyclaus in Security, Security State.
add a comment

Two Key Takeaways Providers of electronic communications and certain cloud services should analyze how the Act will apply to them and be prepared to respond to legal process under the new regime. Companies and individuals who use such services should consider whether the privacy and other implications of the Act require any change in their practices.

Source: Jones Day | Congress Passes CLOUD Act to Facilitate Law Enforcement Access to Overseas Data

Advertisements

The U.S. CLOUD Act and the EU: A Privacy Protection Race to the Bottom | Electronic Frontier Foundation April 11, 2018

Posted by sandyclaus in Copyright and Trademark Enforcement, Security, Security State.
add a comment

U.S. President Donald Trump’s $1.3 trillion government spending bill, signed March 23rd, offered 2,323 pages of budgeting on issues ranging from domestic drug policy to defense. The last-minute rush to fund the U.S. government through this all-or-nothing “omnibus” presented legislators with a golden opportunity to insert policies that would escape deep public scrutiny. Case in point: the Clarifying Lawful Use of Overseas Data (CLOUD) Act, whose broad ramifications for undermining global privacy should not be underestimated, was snuck into the final pages of the bill before the vote. Between the U.S. CLOUD Act and new European Union (EU) efforts to dismantle international rules for cross-border law enforcement investigations, the United States and EU are racing against one another towards an unfortunate finish-line: weaker privacy protections around the globe.  The U.S. CLOUD Act allows the U.S. President to enter into “executive agreements” with qualifying foreign governments in order to directly access data held by U.S. technology companies at a lower standard than required by the Constitution of the United States. To qualify, foreign governments would need to be certified by the U.S. Attorney General, and meet certain human rights standards set in the act. Those qualifying governments will have the ability to bypass the legal safeguards of the Mutual Legal Assistance Treaty (MLAT) regime.

Source: The U.S. CLOUD Act and the EU: A Privacy Protection Race to the Bottom | Electronic Frontier Foundation

Spyware embedded by U.S. in foreign networks, security firm says – Houston Chronicle February 17, 2015

Posted by sandyclaus in NSA, Security, Security State, US Military.
add a comment

Spyware embedded by U.S. in foreign networks, security firm says – Houston Chronicle.

What ISIS Really Wants – The Atlantic February 17, 2015

Posted by sandyclaus in Atheism, Internet Freedom, Politics, Security, Security State.
add a comment

What ISIS Really Wants

The Islamic State is no mere collection of psychopaths. It is a religious group with carefully considered beliefs, among them that it is a key agent of the coming apocalypse. Here’s what that means for its strategy—and for how to stop it.

via What ISIS Really Wants – The Atlantic.

The NSA’s Patents, in One Searchable Database August 2, 2014

Posted by sandyclaus in Academic Technology, NSA, Politics, Security State.
add a comment

What do a voice identifier, an automated translator, a “tamper-indicating” document tube, and a supersecure manhole cover have in common? They’re all technologies for which the secretive National Security Agency NSA has been granted patents by the U.S. government, giving the agency the exclusive rights to its inventions.The four technologies represent a tiny fraction of the more than 270 sleuthy devices, methods, and designs for which the nation’s biggest intelligence agency has been granted a patent since 1979, the earliest year for which public figures are available. As the patent holder, the NSA can license the particular technology — for a fee — to anyone who wants to use it, so long as the patent hasn’t expired.

via The NSA’s Patents, in One Searchable Database.

C.I.A. Admits Penetrating Senate Intelligence Computers – NYTimes.com July 31, 2014

Posted by sandyclaus in CIA, Security State.
add a comment

WASHINGTON — An internal investigation by the Central Intelligence Agency has found that its officers improperly penetrated a computer network used by the Senate Intelligence Committee to prepare its damning report on the C.I.A.’s detention and interrogation program.The report by the agency’s inspector general found that C.I.A. officers created a fake online identity to gain access on more than one occasion to computers used by members of the committee staff, and tried to cover their movements as they rooted around the system, according to an official with knowledge of the investigation’s findings.Continue reading the main storyFEATURED COMMENTJim R. CaliforniaThe separation of powers implications behind this are staggering. I’m a big supporter of the intelligence community and its very difficult job, but this is u-g-l-y, and the punishments severe.349 COMMENTS WRITE A COMMENTA statement issued Thursday morning by a C.I.A. spokesman said that John O. Brennan, the agency’s director, had apologized to the two senior members of the intelligence committee and would set up an internal accountability board to review the issue. The statement said that the board, which will be led by former Senator Evan Bayh, an Indiana Democrat, could recommend “potential disciplinary measures” and “steps to address systemic issues.”

via C.I.A. Admits Penetrating Senate Intelligence Computers – NYTimes.com.

NSA targets Linux Journal as ‘extremist forum’: Report | ZDNet July 4, 2014

Posted by sandyclaus in Computer Security, NSA, Security State.
add a comment

The Linux Journal, a Linux user community website, has been flagged as an “extremist forum” by the United States’ National Security Agency NSA, while its users have been flagged as “extremists” under the agency’s XKeyscore program, according to leaked source code.The source code, which was published this week by German public broadcaster, ARD, also identified at least two German Tor Directory Authority servers — one in Berlin, the other in Nuremberg — as being under surveillance by the NSA.

via NSA targets Linux Journal as ‘extremist forum’: Report | ZDNet.

N.S.A. Director Says Snowden Leaks Hamper Efforts Against Cyberattacks – NYTimes.com March 5, 2014

Posted by sandyclaus in NSA, Politics, Privacy, Security State.
add a comment

WASHINGTON — Gen. Keith B. Alexander, the director of the National Security Agency, said Tuesday that the leaks by the former agency contractor Edward J. Snowden had slowed the effort to protect the country against cyberattacks on Wall Street and other civilian targets.

via N.S.A. Director Says Snowden Leaks Hamper Efforts Against Cyberattacks – NYTimes.com.

NSA To Sanders: We Can’t Tell You If We’re Spying On You In Order To Protect You January 15, 2014

Posted by sandyclaus in NSA, Security, Security State.
add a comment

The National Security Agency on Friday told Sen. Bernie Sanders (I-VT) that it cannot reveal whether the agency has been targeting members of Congress in its metadata collection because doing so would violate privacy provisions accorded to civilians in the program, the Huffington Post reported Tuesday.

\”Among those protections is the condition that NSA can query the metadata only based on phone numbers reasonably suspected to be associated with specific foreign terrorist groups,\” NSA chief Keith Alexander wrote in a letter to Sanders.

via NSA To Sanders: We Can’t Tell You If We’re Spying On You In Order To Protect You.

Former FISA chief judge Bates slams key proposed NSA reforms as unnecessary, counterproductive – 1/14/2014 4:09:17 PM | Newser January 15, 2014

Posted by sandyclaus in NSA, Security, Security State.
add a comment

Speaking for the entire U.S. judiciary, U.S. District Judge John D. Bates sent a letter to the Senate Intelligence Committee saying that appointing an independent advocate to the secret surveillance court is unnecessary and possibly counterproductive, and he slammed other key reforms as adding too heavy a caseload to the secret courts work. In current FISC hearings, judges only hear from the government seeking a spy warrant.

via Former FISA chief judge Bates slams key proposed NSA reforms as unnecessary, counterproductive – 1/14/2014 4:09:17 PM | Newser.