The press review catalogues press articles related to la Quadrature's issues, compiled by its volunteers.
See also our French press review.
[...] A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.com. [...]
[It] works by instructing the visitor’s Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user’s device a number that uniquely identifies it.
[...] They can’t be prevented by using standard Web browser privacy settings or using anti-tracking tools such as AdBlock Plus.
The researchers found canvas fingerprinting computer code [...] on 5 percent of the top 100,000 websites [...]
Controversial emergency laws will be introduced into the Commons next Monday to reinforce the powers of security services to require internet and phone companies to keep records of their customers' emails and calls. [...]
There will be no power to look at the content of phone calls, only location, date and the phone numbers. Government sources say they have been forced to act due to European court of justice ruling in April saying the current laws invaded individual privacy. The government says if there had been no new powers there would have been no obligation on phone and internet companies to keep records if there was a UK court challenge to the retention of data. [...]
Labour backbencher Tom Watson [...] added: "The government was aware of this ECJ ruling six weeks ago and what they are doing is railroading this through. No one in civil society has got a chance to be consulted." The shadow cabinet had not seen the proposals until this morning, he added.
The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.
The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users. [...]
Here is a quote from Harry van Dorenmalen of IBM Europe: "Data flows and the Transatlantic Trade and Investment Partnership (TTIP) will be high on the agenda at the Summit. TTIP offers a unique opportunity to set the example as a 21st Century trade agreement that supports cross border data flow provisions…" [...]
The data flow debate relates to the recent surveillance scandals, and the post-snowden world. Having your data on European servers won’t help against criminal actions of partner countries. What it does achieve is data governance by your jurisdiction and preventing undesirable lawful access of a foreign government – as in the SWIFT scandal. There the US government dared to spy on the most toxic European data you could imagine, financial and stock market transaction data collected by the SWIFT processing agency, data mirrored on US servers. [...]
With fearmongering about “data separatism”, “fragmentation” of the internet, building on the old “free flow” ideals of the internet technologist community and European mainstream narratives of free cross-border exchange of goods and services the transatlantic free data flow agenda pursues a devilish assault on the privacy and freedoms of European citizens and nation states in the digital world.
Why is online child abuse so unimportant that, politically, it does not need laws? Why is online child abuse so unimportant that the policies that are proposed to address this problem are never subject to review to test their effectiveness? Why is online child abuse protection so unimportant that policies that are implemented are never subject to any review? [...]
The blocking “voluntarily” introduced in the UK for dubious child protection reasons has now devolved into a blocking free-for-all where everything from a conservative blog to a Porsche brokerage to a feminist blog, while the Swedish private and for-profit company Netclean recently hit the jackpot with a contract for 40 million Euro to provide blocking and filtering technology to Turkey, which has been repeatedly condemned before the European Court of Human Rights for illegal blocking. Netclean’s software comes “pre-configured” with the IWF blocking list but, usefully, can use ”multiple lists”. [...]
A French judge has ruled against a blogger because her scathing restaurant review was too prominent in Google search results.
The judge ordered that the post's title be amended and told the blogger Caroline Doudet to pay damages. [...]
Ms Doudet was sued by the owner of Il Giardino restaurant in the Aquitaine region of southwestern France after she wrote a blogpost entitled "the place to avoid in Cap-Ferret: Il Giardino". [...]
After weeks of broadcasting his intention to “name names” and publish the identities of specific Americans targeted by the NSA and FBI for surveillance, journalist Glenn Greenwald finally made good on his promise.
Greenwald spoke with WIRED prior to publication of his story late Tuesday night to talk about it. In the story, Greenwald and colleague Murtaza Hussein identified five Muslim-Americans whose email addresses appeared on a lengthy surveillance target list that NSA whistleblower Edward Snowden provided to Greenwald last year. The list included more than 7,000 email addresses, at least 200 of which were tagged by the government as being “U.S. persons.” In naming five of those on the list, it’s the first time that American targets of the government’s surveillance who were never arrested or accused of terrorist activity have been identified. [...]
“There’s a huge discrepancy between how American Muslims are treated and how non-Muslims are treated. Because there are so many similarly situated non-Muslims who have done as much, if not more, to end up on the list [but] who aren’t on the list.” [...]
Google is trying to make sense of a sweeping decision about the Internet. In May, the European Court of Justice ruled that people have the right to be forgotten. That is, if you don't like something about you that pops up on a Google search, you can make Google hide that result.
The top court left a lot of room for interpretation. Google could have dragged its feet or waited for privacy regulators in the European Union to give more direction. Instead the search giant has moved swiftly to implement the ruling. But it's hitting some bumps. [...]
William Binney is one of the highest-level whistleblowers to ever emerge from the NSA. He was a leading code-breaker against the Soviet Union during the Cold War but resigned soon after September 11, disgusted by Washington’s move towards mass surveillance.
On 5 July he spoke at a conference in London organised by the Centre for Investigative Journalism and revealed the extent of the surveillance programs unleashed by the Bush and Obama administrations.
“At least 80% of fibre-optic cables globally go via the US”, Binney said. “This is no accident and allows the US to view all communication coming in. At least 80% of all audio calls, not just metadata, are recorded and stored in the US. The NSA lies about what it stores.” [...]
Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by The Washington Post. [...]
The surveillance files highlight a policy dilemma that has been aired only abstractly in public. There are discoveries of considerable intelligence value in the intercepted messages — and collateral harm to privacy on a scale that the Obama administration has not been willing to address. [...]
Many other files, described as useless by the analysts but nonetheless retained, have a startlingly intimate, even voyeuristic quality. They tell stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes. The daily lives of more than 10,000 account holders who were not targeted are catalogued and recorded nevertheless. [...]