Searching for "surveillance"

section 702

4 Big Intelligence Stories You Missed Amid The Comey Headlines This Week

++++++++++++++++++
more on surveillance and privacy in this IMS blog
http://blog.stcloudstate.edu/ims?s=surveillance

student privacy

Report: Tech Companies Are Spying on Children Through Devices and Software Used in Classroom

By Richard Chang 04/17/17

https://thejournal.com/articles/2017/04/17/report-tech-companies-are-spying-on-children-through-devices-and-software-used-in-classroom.aspx

according to a new report from the nonprofit Electronic Frontier Foundation (EFF), “Spying on Students: School-Issued Devices and Student Privacy

shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.

One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.

Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.

Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services

EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.

“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.

+++++++++++++++++++++++++
more on students and privacy
http://blog.stcloudstate.edu/ims?s=student+privacy
http://blog.stcloudstate.edu/ims?s=privacy+government

https://www.privateinternetaccess.com/blog/2017/03/us-senate-votes-50-48-away-broadband-privacy-rules-let-isps-telecoms-sell-internet-history/

https://www.washingtonpost.com/news/the-switch/wp/2017/03/28/the-house-just-voted-to-wipe-out-the-fccs-landmark-internet-privacy-protections/?utm_term=.34ed3dce7494

 

against government hackers

How to defend against government hackers

By Mark Rockwell Mar 31, 2017

https://fcw.com/articles/2017/03/31/rule41-aclu-defense-cyber.aspx

The 188-page “Challenging Government Hacking In Criminal Cases” report, released by the American Civil Liberties Union on March 30, addresses new amendments to Rule 41 of the Federal Rules of Criminal Procedure, which took effect last December.

Under the changes to criminal procedure rules, feds can remotely search computers in multiple jurisdictions with a single warrant. The rules are touted by law enforcement agencies as a way to streamline 100-year-old rules of criminal procedure

++++++++++++++++++++++++
more on surveillance in this IMS blog
http://blog.stcloudstate.edu/ims?s=surveillance

CIA hacks

WikiLeaks: Here’s how the CIA hacks your phones, TVs and PCs

The organization released thousands of documents it claims show how the US spy agency can crack open devices from Apple, Samsung, Google and Microsoft.

  https://www.cnet.com/news/wikileaks-cia-hacking-tools-phones-apple-samsung-microsoft-google/

This debate took off when the US Department of Justice sought to require Apple to help it open an encrypted iPhone belonging to one of the San Bernardino shooters. After Apple fought back in court, the FBI said it had obtained another way to access the phone.

Apple, Google and Motorola declined to comment on WikiLeaks’ claims. Samsung didn’t respond to a request for comment.

“The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,” said Moxie Marlinspike, the founder of Signal. “This story isn’t about Signal or WhatsApp, but to the extent that it is, we see it as confirmation that what we’re doing is working.”

Telegram said on its website that the problem lies with operating systems and not encrypted messaging apps and that naming specific encrypted services is “misleading.” WhatsApp declined to comment.

+++++++++++++++++++++++++++++++
more on surveillance in this IMS blog
http://blog.stcloudstate.edu/ims?s=surveillance

FBI can hack computers

This rule basically gives the FBI power to hack anyone

https://www.facebook.com/NowThisFuture/videos/1249249875165134/

Last-ditch effort to prevent changes to law enforcement hacking rule fails

++++++++++++++++++++
surveillance and privacy in this IMS bloghttp://blog.stcloudstate.edu/ims?s=surveillance

davos class

The Davos Class

http://davosclass.tni.org/

http://civicus.org/index.php/socs-2014-expert-perspectives/586-the-great-divide-exposing-the-davos-class-behind-global-economic-inequality

http://www.occupy.com/tags/davos-classhttps://en.wikipedia.org/wiki/Transnational_capitalist_class

http://www.redpepper.org.uk/who-are-the-davos-class/

http://www.nationalreview.com/corner/439803/scott-walker-davos-class-and-rest-ushttp://itsoureconomy.us/2014/01/exposing-the-davos-class/

State of Corporations – The rise of illegitimate power and the threat to democracy (PDF, 902KB)
Susan George

State of Davos – The camel’s nose in the tents of global governance (PDF, 308KB)
David Sogge

State of Surveillance –The NSA files and the global fightback (PDF, 778KB)
Ben Hayes

State of Empire – How failed foreign policy, new emerging economies, and peoples’ movements are undermining US power(PDF, 526KB)
Phyllis Bennis

https://www.theguardian.com/commentisfree/2016/nov/09/rise-of-the-davos-class-sealed-americas-fate

private versus government

Hayden calls Russian email hack ‘honorable state espionage’

By Matt Leonard Oct 18, 2016

https://fcw.com/articles/2016/10/18/hayden-email-espionage.aspx?

The Department of Homeland Security and the Office of the Director of National Intelligence issued a joint statement earlier this month that condemned Russia for the attacks.

“Do not drop this in the cyber problem box, drop this in the Russia problem box,” Hayden suggested, saying the focus should be on the actor, not the means. “And by the way, that Russian problem box needs a bigger box, there’s a lot of stuff going on.”

Though there are aspects of cybersecurity that only government can handle, most of it will be driven by the private industry, Hayden said. Government can help the private sector by getting out of the way — removing liability, enabling legal protections, sharing information and redoing the classification system.

And since the government too depends on the private sector for security innovation, Hayden said he sides with Apple regarding whether the company should have to create a back door for the FBI to bypass iPhone encryption.

+++++++++++++++++

more on surveillance, government in this IMS blog:

http://blog.stcloudstate.edu/ims?s=surveillance

classroom discussions on privacy

Dear colleagues,

the topics of privacy pertaining technology is becoming ubiquitous.
If you feel that the content of your class material can benefit of such discussions, please let us know.

Please have  some titles, which can help you brainstorm topics for discussions in your classes:

Power, Privacy, and the Internet
http://blog.stcloudstate.edu/ims/2015/12/03/power-privacy-internet/

Privacy groups slam Department of Homeland Security social media proposal
http://blog.stcloudstate.edu/ims/2016/08/24/dhs-social-media-proposal/

FBI quietly changes its privacy rules for accessing NSA data on Americans
http://blog.stcloudstate.edu/ims/2016/03/09/surveillance-and-privacy/

Facebook canceled a student’s internship after he highlighted a massive privacy issue
http://blog.stcloudstate.edu/ims/2015/08/17/facebook-and-privacy/

Samsung’s Privacy Policy Warns Customers Their Smart TVs Are Listening
http://blog.stcloudstate.edu/ims/2015/02/10/privacy-smart-devices/

Teenagers, The Internet, And Privacy
http://blog.stcloudstate.edu/ims/2014/11/05/teenagers-the-internet-and-privacy/

Online privacy: It’s time for a new security paradigm
http://blog.stcloudstate.edu/ims/2014/09/25/online-privacy-its-time-for-a-new-security-paradigm/

On social media, privacy, etc.
http://blog.stcloudstate.edu/ims/2014/03/14/on-social-media-privacy-etc/

Hacking the Future: Privacy, Identity, and Anonymity On the Web
http://blog.stcloudstate.edu/ims/2013/12/03/hacking-the-future-privacy-identity-and-anonymity-on-the-web/

Are We Puppets in a Wired World?
http://blog.stcloudstate.edu/ims/2013/10/23/pro-domo-sua-are-we-puppets-in-a-wired-world-surveillance-and-privacy-revisited/

How Teens Deal With Privacy and Mobile Apps
http://blog.stcloudstate.edu/ims/2013/08/28/how-teens-deal-with-privacy-and-mobile-apps/

If you seek  more tangible, hands-on assistance with similar and/or any topics regarding technology, please do not hesitate to contact us.

DHS social media proposal

Privacy groups slam DHS social media proposal

By Sean Carberry Aug 23, 2016

https://fcw.com/articles/2016/08/23/dhs-social-carberry.aspx

The Department of Homeland Security’s proposed policy to collect information on the social media profiles of foreign travelers violates the rights of travelers and their American associates, according to privacy groups.

n a strongly worded rebuke of the proposed Customs and Border Protection policy, the Electronic Frontier Foundation argued that the rule change would do little to enhance national security and would open the door to greater spying on Americans.

Visa Waiver Program (VWP) travelers by adding requests for social media identifiers to the Electronic System for Travel Authorization and I-94W forms.

As FCW reported in June, the rule change came on the heels of a number of policies CBP initiated after criticism from Congress that potential terrorists could be exploiting the VWP, which allows citizens of 38 countries to enter the U.S. without a visa for up to 90 days.

Other human rights groups and civil liberties organizations submitted a joint letter to CBP stating that “DHS collection of online identity information is an intelligence surveillance program clothed as a customs administration mechanism.”

In more supportive comments delivered to CBP, the Center for Data Innovation said that just as universities, employers and lenders check social media profiles of potential clients, DHS should collect social media information from foreign travelers.

technology and activism

How the Rich and Powerful Use Tech to Silence Activists

Culture Date of Publication: 03.25.16.

http://www.wired.com/2016/03/truth-and-power/

Truth and Power, the final episode of which airs tonight on Pivot. Directed by Brian Knappenberger.

Knappenberger, who directed the feature-length documentary The Internet’s Own Boy, about the late Reddit co-founder Aaron Swartz.

Social Media Has Helped Activists Reclaim the Narrative

it’s not just activists who are benefiting from new technologies. Knappenberger spends nearly half the series carefully explaining the myriad ways governments and corporations use digital tools to surveil social movements. From examining the cell-phone tracking technologies used by law enforcement to uncovering how repressive regimes work with American tech companies to thwart social movements, the series offers up a smart meditation on the threat of digital surveillance on political dissent

It’s a problem Knappenberger illustrates in the “Activists or Terrorists” episode, where he unpacks how “Ag-gag” laws were passed under pressure from corporate lobbying and have made it illegal to film or photograph inside any animal farm without consent of the facility’s owner.

Prisoners for Sale,” the seventh episode, explores the story of two inmates-turned-journalists who started an independent publication to document systemic failures of the prison industrial complex.

++++++++

More on technology and civil disobedience in this IMS blog

http://blog.stcloudstate.edu/ims/?s=civil&submit=Search

1 3 4 5 6