Showing posts with label Electronic Surveillance Society. Show all posts
Showing posts with label Electronic Surveillance Society. Show all posts

December 20, 2010

72 State Fusion Centers Feed Information to the FBI's 'Nationwide Suspicious Activity Reporting Initiative'



Understanding the Mechanics of the Police State

By Michael Hampton, Homeland Stupidity
March 27, 2010

“People don’t know what fusion centers are,” says Catherine Bleish, who was the opening speaker at the 2010 New Hampshire Liberty Forum on March 19.

Fusion centers were created after the September 11, 2001, terrorist attacks as a way for local and state law enforcement agencies to share terrorism related information with the federal government, and vice versa. The idea quickly ran into problems, first among them the fact that there simply isn’t enough terrorist activity to justify the concept. Instead of shutting down as pointless, fusion centers gradually began expanding into sharing information about all crimes. Fusion center activity over the years has also raised concerns about government surveillance of legally protected political activity.

Bleish, who was led into becoming an activist by the 2008 Ron Paul presidential campaign, said she was informed of a report published by the Missouri Information Analysis Center, leaked in March 2009, which stated among other things that people with Gadsden flag and Ron Paul bumper stickers could be militia members or potential terrorists. Bleish, who is the executive director of the Liberty Restoration Project, spearheaded further investigation and activism, eventually leading to MIAC retracting the report.

“MIAC is a Department of Homeland Security fusion center,” she said during her speech. “These institutions are doing a lot of damage to the relationship between the general public and the law enforcement community.”

Bleish also runs Operation Defuse, a project to inform the public about the nature and activities of fusion centers and how those activities contribute to the federalization and militarization of law enforcement.

The New Hampshire Liberty Forum is an annual conference held by the Free State Project, a movement to bring 20,000 activists to New Hampshire to work toward reducing the size, scope and power of government and increasing individual liberty and responsibility. The project has signed over 10,000 participants, and over 800 have already moved. The Liberty Forum, and the project’s summer camping event, PorcFest, allow people undecided about the project to see the state firsthand and observe and participate in local activism.

Map of Fusion Centers as of December 2007

What's Wrong With Fusion Centers - Executive Summary

ACLU
Originally Published on December 5, 2007

A new institution is emerging in American life: Fusion Centers. These state, local and regional institutions were originally created to improve the sharing of anti-terrorism intelligence among different state, local and federal law enforcement agencies. Though they developed independently and remain quite different from one another, for many the scope of their mission has quickly expanded — with the support and encouragement of the federal government — to cover "all crimes and all hazards."

The types of information they seek for analysis has also broadened over time to include not just criminal intelligence, but public and private sector data; and participation in these centers has grown to include not just law enforcement, but other government entities, the military and even select members of the private sector.

These new fusion centers, over 40 of which have been established around the country, raise very serious privacy issues at a time when new technology, government powers and zeal in the "war on terrorism" are combining to threaten Americans' privacy at an unprecedented level.

Moreover, there are serious questions about whether data fusion is an effective means of preventing terrorism in the first place, and whether funding the development of these centers is a wise investment of finite public safety resources. Yet federal, state and local governments are increasing their investment in fusion centers without properly assessing whether they serve a necessary purpose.

There's nothing wrong with the government seeking to do a better job of properly sharing legitimately acquired information about law enforcement investigations — indeed, that is one of the things that 9/11 tragically showed is very much needed.

But in a democracy, the collection and sharing of intelligence information — especially information about American citizens and other residents — need to be carried out with the utmost care. That is because more and more, the amount of information available on each one of us is enough to assemble a very detailed portrait of our lives. And because security agencies are moving toward using such portraits to profile how "suspicious" we look.

New institutions like fusion centers must be planned in a public, open manner, and their implications for privacy and other key values carefully thought out and debated. And like any powerful institution in a democracy, they must be constructed in a carefully bounded and limited manner with sufficient checks and balances to prevent abuse.

Unfortunately, the new fusion centers have not conformed to these vital requirements.

Since no two fusion centers are alike, it is difficult to make generalized statements about them. Clearly not all fusion centers are engaging in improper intelligence activities and not all fusion center operations raise civil liberties or privacy concerns. But some do, and the lack of a proper legal framework to regulate their activities is troublesome.

This report is intended to serve as a primer that explains what fusion centers are, and how and why they were created. It details potential problems fusion centers present to the privacy and civil liberties of ordinary Americans, including:
  • Ambiguous Lines of Authority. The participation of agencies from multiple jurisdictions in fusion centers allows the authorities to manipulate differences in federal, state and local laws to maximize information collection while evading accountability and oversight through the practice of "policy shopping."

  • Private Sector Participation. Fusion centers are incorporating private-sector corporations into the intelligence process, breaking down the arm's length relationship that protects the privacy of innocent Americans who are employees or customers of these companies, and increasing the risk of a data breach.

  • Military Participation. Fusion centers are involving military personnel in law enforcement activities in troubling ways.

  • Data Fusion = Data Mining. Federal fusion center guidelines encourage whole sale data collection and manipulation processes that threaten privacy.

  • Excessive Secrecy. Fusion centers are hobbled by excessive secrecy, which limits public oversight, impairs their ability to acquire essential information and impedes their ability to fulfill their stated mission, bringing their ultimate value into doubt.
The lack of proper legal limits on the new fusion centers not only threatens to undermine fundamental American values, but also threatens to turn them into wasteful and misdirected bureaucracies that, like our federal security agencies before 9/11, won't succeed in their ultimate mission of stopping terrorism and other crime.

The information in this report provides a starting point from which individuals can begin to ask informed questions about the nature and scope of intelligence programs being conducted in their communities. The report concludes with a list of recommendations for Congress and state legislatures.

Austin, Texas Fusion Center is One of About 70 in the Nation

KVUE News
October 21, 2010

Agencies across the state are working together to fight crime. The Texas Department of Public Safety (DPS) held a dedication Thursday morning for what is known as a Fusion Center.

The center sits inside a building at the DPS headquarters complex in North Austin.

DPS allowed media inside for a rare look at how the agencies work together to solve crimes. Large screens and rows of computers fill one room after another at the center. Each room is dedicated to a type of intelligence gathering including border security and gang activity.

The purpose of a fusion center is to create a central location where local, state, and federal agencies can work together to share the information they have gathered about different crimes or threats, in particular terror threats or trends in organized crime.
“This is a great day for the State of Texas. It's going to make us safer," said Congressman Michael McCaul, R-Texas. "Fusion centers, sharing information, sharing intelligence is what is going to detect, deter and prevent a future terrorist attack.”
McCaul is one of the heads of the Homeland Security Committee. He visited the Fusion Center on Thursday for its dedication. It is one of about 70 in the nation.

The center has actually been under development for about a year now. The dedication marks the official launch joining multiple state and local agencies.

A majority of the group was working during the recent shooting on the University of Texas campus, as well as during the suicide plane crash into the Echelon building earlier this year.

The Austin Police Department is part of the group working at the center. APD secured city approval in May to create a center within the complex to coincide with the fusion facility.

Money to fund the center comes from Homeland Security Grants.

Several rights groups have expressed concerns regarding a possible over-sharing of information. APD officials say they will allow watch groups certain access to oversee any potential concerns.

Combatting Homegrown Terrorism with Fusion Centers

The Washington Independent
September 23, 2010

Secretary Janet Napolitano and other officials from the Department of Homeland Security testified today on the growing threat of homegrown terrorists and small-scale attacks.

There’s a growing chorus from the homeland security community on this trend, and Napolitano testified that although for many years Al Qaeda and its allies seemed to be waiting for the opportunity to stage an attack on the dramatic scale of 9/11, these days, a looser network of groups is more willing to resort to tactics like planting IEDs:
It is clear that the threat of al Qaeda-style terrorism is not limited to the al-Qaeda core group, or organizations that have close operational links to al Qaeda. While al Qaeda continues to threaten America directly, it also inspires its affiliates and other groups and individuals who share its violent ideology and seek to attack the United States claiming it is in the name of Islam – a claim that is widely rejected.
One of the ways DHS is approaching this threat is by beefing up the country’s network of fusion centers — groups that fuse local law enforcement work with national-level intelligence. Napolitano has made the centers a major focus of the department’s FY11 grant cycle. The idea is, as Napolitano said today, is that
“In an environment where operatives may not have close links to international terrorist organizations – and where they may, in fact, be based within this country – these levels of law enforcement may be the first to notice something suspicious.”
Fusion centers don’t have the strongest records of keeping their focus on international terrorist organizations, though. As G.W. Schulz reports for the Center for Investigative Reporting:
One of the nation’s oldest fusion centers, known as the El Paso Intelligence Center, accidentally caused a California couple that owns a flight training school to be falsely held at gunpoint by police for the second time. Twice now EPIC has failed to clean up incorrect data that led authorities to believe a plane owned by the pair was stolen.
In Maryland, a fusion center and DHS ended up labeling a peace group as terrorists. Anti-abortion activists have also come under suspicion.

Despite these sorts of missteps, the number of fusion centers is only growing: there are currently 72 scattered across the country.

FBI Assembling Massive Database on Thousands of Americans

The Lookout via Yahoo News!
December 20, 2010

The FBI is assembling a massive database on thousands of Americans, many of whom have not been accused of any crime, the Washington Post's Dana Priest and William Arkin report. The reporters' latest look at the country's ballooning national security system focuses on the role that local agencies -- often staffed by people with little to no counter-terrorism training -- have played in combating terrorism since 2001.

Here are five striking revelations in their piece:
  1. The FBI's Nationwide Suspicious Activity Reporting Initiative currently contains 161,948 suspicious activity files, into which authorities can put information they've gathered about the people at the center of the files: employment history, financial documents, phone numbers, photos. In many cases, the people in the files have not been accused of any crime but have attracted the suspicions of a local cop, FBI agent or even fellow citizen. The files have led to five arrests but no convictions, the FBI says. Some of the files are unclassified so that local police agencies and even businesses can submit reports on anyone they deem suspicious.

  2. The Department of Homeland Security does not know how much it spends in funding state fusion centers, which synthesize security information from all state agencies and feeds information to the FBI's "Nationwide Suspicious Activity Reporting Initiative." But since 2001, DHS has doled out $31 billion to states and localities for homeland-security initiatives.

    Conspiracy Theory with Jesse Ventura: Police State (Season 2, Episode 4):

  3. Local officials at these fusion centers are tasked with understanding terrorism with little or no training. To fill the void, self-styled experts with fairly extreme views on the scope of the Muslim terrorist threat are asked to come in and train local authorities, the Post reports.

    Expert Walid Shoebat told a group at the first annual South Dakota Fusion Center Conference in Sioux Falls this year that they should monitor local Muslim student groups and mosques and try to tap their phones. "You can find out a lot of information that way," he said.

    National intelligence officials told the Post they preferred that people with "evidence-based" approaches to Islam were lecturing instead, but that no guidelines are in place to determine the qualifications of a given speaker.

  4. The localities are often left without guidance from DHS, which can lead to confusion about the counter-terror activity they're supposed to be carrying out. Virginia's fusion center named historically black colleges as a "potential" terrorism hub, Maryland State Police infiltrated local groups that lobbied for bike lanes and human rights, and a contractor in Pennsylvania writing an intelligence bulletin flagged meetings of the Tea Party Patriots Coalition and environmental activists.

  5. Many states and towns are taking the unprecedented amounts of money handed out to fight terrorists and are using it instead to fight crime.
    "We have our own terrorists, and they are taking lives every day," Memphis Police Director Larry Godwin, said.
(Screenshot: The Post's interactive map of state and local counterterrorism agencies.)

NSA's $1.5 Billion Cyber-security Center in Utah is Under Way

July 17, 2010

Ten Ways We Are Being Tracked, Traced and Databased

By Activist Post
July 10, 2010

The war on terror is a worldwide endeavor that has spurred massive investment into the global surveillance industry — which now seems to becoming a war on “liberty and privacy.” Given all of the new monitoring technology being implemented, the uproar over warrantless wiretaps now seems moot. High-tech, first-world countries are being tracked, traced, and databased literally around every corner. Governments, aided by private companies, are gathering a mountain of information on average citizens who so far seem willing to trade liberty for supposed security. Here are just some of the ways the matrix of data is being collected:

GPS

Global positioning chips are now appearing in everything from U.S. passports to cell phones to cars. More common uses include tracking employees and all forms of private investigation. Apple recently announced they are collecting the precise location of iPhone users via GPS for public viewing in addition to spying on users in other ways.

Internet

Internet browsers are recording your every move, forming detailed cookies on your activities. The NSA has been exposed as having cookies on their site that don’t expire until 2035. Major search engines know where you surfed last summer, and online purchases are databased, supposedly for advertising and customer service uses. IP addresses are collected and even made public. Controversial websites can be flagged internally by government sites, as well as re-routing all traffic to block sites the government wants to censor. It has now been fully admitted that social networks provide NO privacy to users while technologies advance for real-time social network monitoring. The Cybersecurity Act attempts to legalize the collection and exploitation of your personal information. Apple’s iPhone also has browsing data recorded and stored. All of this despite the overwhelming opposition to cyber-surveillance by citizens.

RFID

Forget your credit cards, which are meticulously tracked, or the membership cards for things so insignificant as movie rentals which require your SSN. Everyone has Costco, CVS, grocery-chain cards, and a wallet or purse full of many more. RFID “proximity cards” take tracking to a new level in uses ranging from loyalty cards, student ID, physical access, and computer network access. Latest developments include an RFID powder developed by Hitachi, for which the multitude of uses are endless — perhaps including tracking hard currency so we can’t even keep cash undetected. (Also see microchips below).

Traffic cameras

License plate recognition has been used to remotely automate duties of the traffic police in the United States, but have been proven to have dual use in England, such as to mark activists under the Terrorism Act. Perhaps the most common use will be to raise money and shore up budget deficits via traffic violations, but uses may descend to such “Big Brother” tactics as monitors telling pedestrians not to litter.

Computer cameras and microphones

The fact that laptops — contributed by taxpayers — spied on public school children (at home) is outrageous. Years ago Google officially began to use computer “audio fingerprinting” for advertising uses. They have admitted to working with the NSA, the premier surveillance network in the world. Private communications companies already have been exposed routing communications to the NSA. Now, keyword tools — typed and spoken — link to the global security matrix.

Public sound surveillance

This technology has come a long way from only being able to detect gunshots in public areas, to now listening in to whispers for dangerous “keywords.” This technology has been launched in Europe to “monitor conversations” to detect “verbal aggression” in public places. Sound Intelligence is the manufacturer of technology to analyze speech, and their website touts how it can easily be integrated into other systems.

Biometrics

The most popular biometric authentication scheme employed for the last few years has been Iris Recognition. The main applications are entry control, ATMs and Government programs. Recently, network companies and governments have utilized biometric authentication including fingerprint analysis, iris recognition, voice recognition, or a combination of these, for use in National identification cards.

DNA

Blood from babies has been taken for all people under the age of 38. In England, DNA was sent to secret databases from routine heel prick tests. Several reports have revealed covert Pentagon databases of DNA for “terrorists” and now DNA from all American citizens is databased. Digital DNA is now being used as well to combat hackers.

Microchips

Microsoft’s HealthVault and VeriMed partnership is to create RFID implantable microchips. Microchips for tracking our precious pets is becoming commonplace and serves to condition us to accept putting them in our children in the future. The FDA has already approved this technology for humans and is marketing it as a medical miracle, again for our safety.

Facial recognition

Anonymity in public is over. Admittedly used at Obama’s campaign events, sporting events, and most recently at the G8/G20 protests in Canada, this technology is also harvesting data from Facebook images; and it surely will be tied into the street “traffic” cameras.

All of this is leading to Predictive Behavior Technology — It is not enough to have logged and charted where we have been; the surveillance state wants to know where we are going through psychological profiling. It’s been marketed for such uses as blocking hackers.

Things seem to have advanced to a point where a truly scientific Orwellian world is at hand. It is estimated that computers know to a 93% accuracy where you will be, before you make your first move. Nanotech is slated to play a big role in going even further as scientists are using nanoparticles to directly influence behavior and decision making.

Many of us are asking: What would someone do with all of this information to keep us tracked, traced and databased? It seems the designers have no regard for the right to privacy and desire to become the Controllers of us all.

June 14, 2010

The Age of Privacy Is Over

Good-Bye to Privacy?

Learn about major new threats to your privacy, from social networks to advertisers to yourself.

By Tom Spring, PC World
May 23, 2010

New Yorker Barry Hoggard draws a line in the sand when it comes to online privacy. In May he said farewell to 1251 Facebook friends by deleting his account of four years to protest what he calls the social network's eroding privacy policies.

"I'm sick of keeping track of my Facebook privacy settings and what boxes I have to check to protect myself," says Hoggard, a computer programmer. "I don't have a lot of illusions about online privacy, but Facebook has gone too far," he says of Facebook's recent privacy policy changes.
From Facebook to advertisers who may be putting your online identity up for sale to the highest bidder, and to strangers who could track you across town, new ways of using technology and the Internet are making privacy issues a flash point for controversy.
"Privacy today isn't what it was a year ago," says Jeffrey Chester, director of the Center for Digital Democracy, a nonprofit group that promotes online privacy and free speech. "It wasn't long ago we were worried about advertisers planting cookies on our PC," he says. With today's trends, keeping a handle on your privacy is going to become even harder a year from now, he adds.
What follows are several emerging privacy threats.

Social Networks

Do social networks herald the end of privacy? Lots of former Facebook users who recently ditched their accounts in protest think so. With 450 million users, many say, Facebook is a bellwether for other social networks on user privacy.

Swapping small talk and vacation photos made Facebook addictive for users. But over the years, they've watched as their private info became shared with a growing sphere of strangers--advertisers. And in May, Facebook made changes to its privacy policy that exposed more personal data to a wider range of marketers.

One change involved the Instant Personalization pilot program, which let selected Facebook partner Websites access your data and tailor content to your tastes. With Instant Personalization activated, your Facebook information can be accessed the moment you arrive on partner sites including Microsoft's Docs.com, Pandora, and Yelp. When the program launched in April, Facebook automatically activated it for all users. However, a privacy uproar forced the company to revise its policy. Instant Personalization is now optional for users.

Facebook has suffered privacy backlashes before. In 2007 it introduced Beacon, an ad system that tracked certain actions of Facebook users on 44 partner sites so as to report those actions back to users' Facebook friends network. But many users revolted, citing privacy concerns. Facebook CEO Mark Zuckerberg quickly apologized and made Beacon an optional feature.

"Facebook is literally turning down the Facebook privacy settings for its users," says Electronic Privacy Information Center director Marc Rotenberg.
In early May, EPIC and 14 other consumer groups filed a complaint against Facebook with the Federal Trade Commission. The complaint accuses the site of following unfair and deceptive business practices, in part, for disclosing previously private details to the public.

Google Buzz (the search giant's social network) has also endured privacy issues. Buzz exposed a list of users' most frequently accessed e-mail contacts when it launched earlier this year.

Social networks have forced users to rethink what privacy is in a world where public sharing of private lives has become commonplace, observes Jeremy Mishkin, an attorney specializing in privacy law.

"The real issue is how best to assure individuals they have control of their own information," Mishkin says.
Facebook declined interviews, but issued a statement:
"It's important that Facebook and other sites provide [users] with clear control over what information they want to share, when they want to share it, and with whom. We're listening to feedback and evaluating the best way to respond to concerns."
Note: We have tips to help you negotiate the maze of Facebook's privacy settings.

Data Harvesting

Creating a digital profile on you gets a lot easier if you are on Facebook or Google Buzz and hanging a shingle on LinkedIn. That marketers use your interest in, say, Volkswagen cars to target-market you a new Jetta may be no surprise. But will your Facebook status ever be used by a credit agency, health care provider, or future employer to determine if you are a good bet?

Firms such as California-based Rapleaf say they are working with financial institutions to run their databases of e-mail addresses to assemble customer profiles based on information shared on social networks. Rapleaf's vice president of business development, Joel Jewitt, says it collaborates with company marketing departments, not credit-approval departments, to better target financial services to banking customers.

Rapleaf is merely one of many firms--ranging from Acxiom to Unbound Technology--that tap into social networks to marry your profiles, tweets, and LinkedIn information with your e-mail address. If a company wants to know more about you, it can just hire one of these outfits.

The firms bristle at the notion that your credit card interest rates could be jacked up based on a tweet that you just got laid off. But privacy experts say that this may be a reality in coming years (see related story: "Can Your Online Life Ruin Your Credit?").

To privacy activists, online advertisers have always been too smart for their own good. Now two emerging trends in advertising have privacy groups once more complaining that Madison Avenue has gone too far.

BlueKai, DataLogic, and Nielsen are working with online advertisers to help them reach Internet users with ads based on their offline behaviors and demographic attributes. Advertisers are careful to note that only nonpersonally identifiable information is used and that people are never identified by name, but rather as demographic subgroups. Want to show a banner ad to, say, a conservative Caucasian mom with three kids, age 34, with a household income of $120,000, who works out four times a week at the gym? No problem.

Connections between the offline and online worlds are often made via an e-mail address kept on record by a company that you do business with. That e-mail address could create a link to a composite profile made up of your online activities from sites such as social networks. By cross-referencing that e-mail address, advertisers can show you banner ads tailored to your spending habits and to your political views expressed on Twitter.

Real-Time Shark Bait

The second trend is a real-time ad-bidding technology that lets advertisers, such as Google and Yahoo, track users online and deliver customized third-party ads--all in the blink of an eye.

Here is how it works. As you go from site to site, advertisers can bid in real time to show you an ad tied to your online activity. For example, if you are shopping for a Nikon digital SLR camera, you may see an ad for a competing Canon DSLR model on the next site you visit. If you buy that Canon, advertisers can then bid--in a fraction of second--for the right to show you, on the next site you jump to, ads for lenses for that camera.

Advertisers can track you from site to site only if the same advertising company delivers ads to those sites. For instance, Google-owned DoubleClick delivers ads to thousands of the Web's top destinations. Its real-time ad-bidding program is called DoubleClick Ad Exchange.

Privacy Double Whammy

The rise of those two online marketing trends that create cunningly effective advertising campaigns--tailored in just a fraction of a second to a Web surfer's household income, interests, and online activity--may not be a real surprise. But privacy activists say that they go too far and that advertisers are unfairly tracking people and profiting from their data.

"Consumers will be most shocked to learn that companies are instantaneously combining the details of their online lives with information from previously unconnected offline databases without their knowledge, let alone consent," says Ed Mierzwinski of the Public Interest Research Group, a government watchdog organization.
The Center for Digital Democracy's Jeffrey Chester says that this type of advertising fosters predatory ads. Examples could be dubious health cures or high-interest loans for HDTVs.

The CDD, PIRG, and the World Privacy Forum have asked the Federal Trade Commission to look into ad networks such as Google's and Yahoo's. The groups seek more transparency from advertisers and a way for consumers to opt out of this type of profiling.

Advertisers have been sensitive to privacy concerns, according to the Ponemon Institute, a privacy research group. Ponemon says such concerns have prompted online advertisers to use behavioral ads 75 percent less than they would otherwise.

Transparency is key for advertisers, says Scott Meyer, chief executive of Better Advertising. He says the industry has stepped up efforts to ward off government regulation by developing self-regulatory programs. One is the use of transparency icons: Click on such an icon in an ad, and it tells you that the targeted ad is using demographics and behavioral data.

Better Advertising offers a browser plug-in called Ghostery that can alert you to hidden trackers and block scripts from tracking you. Chrome, Firefox, and Internet Explorer support the add-on; but, except in Chrome, the blocking functions don't work.

Mobile Stalking

Without a handle on your GPS-equipped smartphone or geolocation services, you may have only yourself to blame for "friending" Big Brother. Here's why.

Mobile social networks Foursquare, Gowalla, and Loopt are designed to make it easy for your friends to track your whereabouts as you go to restaurants, bars, and shopping malls. A bevy of iPhone and Android mobile apps make use of location information. Facebook says it will introduce features later this summer that will make location sharing as easy as updating your status.

These services have privacy advocates urging consumers to be careful as to how much they reveal about themselves. In February, privacy groups spoke at congressional hearings on consumer privacy and have been urging lawmakers to limit how much advertisers can track users of these services. Privacy guidelines for location-based services and advertising are outdated and obsolete, they say.

Peer Privacy Pressure

Reward-based geolocation services such as Foursquare, which doles out coupons and "points" for members who broadcast their location, spur these concerns.

"You need to consider whether there is anything that your location might indicate about you that you don't want to be public," says Peter Eckersley, senior staff technologist with the Electronic Frontier Foundation civil liberties group. For example, he says, "are you going to church? To a political meeting? To a nightclub? To the beach on a Tuesday? Are there people who might hold those things against you?"
Mobile Ad Targeting

Still other experts worry about advertisers eager to break into a nascent direct-to-mobile marketing industry. Mobile social network Loopt says it is developing an ad service that can target offers to repeat customers of a specific store just as they walk in. The company says that advertisers want to reach people as they are making a buying decision.

Apps that run on smartphones and location-aware gadgets, such as the iPad, also concern privacy activists.

"With the help of GPS technology, every advertiser is going know where you are [and] what you're doing on your phone," says the CDD's Chester.
Mobile apps--even e-readers--will know how close you are to a mall, a restaurant, or your doctor's office, for instance.

Can We Stop Looking Over Our Shoulders?

What is the future of privacy? Will we all just throw up our hands and agree with Facebook CEO Mark Zuckerberg, who famously stated in 2009 that "the age of privacy is over"? Better Advertising's Meyer believes that the creepy "someone is watching me" feeling will dissipate as technology allows you greater control over your privacy, and as transparency increases.

Maybe then we can all stop looking over our shoulders.

May 27, 2010

Will Your Smart Phone Rat You Out? (Updated 7/18/2011)

GPS Location Tracking: Track and Spy Any Cell Phone



SpyingBubbles.com
September 17, 2010

This is the ultimate in covert surveillance, the best spy bug in the world. Simply insert the software as you would in an ordinary mobile phone and then the Mobile Phone is converted into an ultimate spy tool. You can now call the device using a telephone from anywhere you like and the device will automatically activate, allowing you to hear all conversations from the device with crystal clarity.

Government Can Eavesdrop on You Even When Your Cell Phone Is Turned Off



Fox News
June 17, 2009

Using your cell phone's tracking device and microphone, the government can eavesdrop on your conversations even if your cell phone is turned off. The only way around it is to remove your phone's battery.

From CNet, December 1, 2006:

The FBI appears to have begun using a novel form of electronic surveillance in criminal investigations: remotely activating a mobile phone's microphone and using it to eavesdrop on nearby conversations.

The technique is called a "roving bug," and was approved by top U.S. Department of Justice officials for use against members of a New York organized crime family who were wary of conventional surveillance techniques such as tailing a suspect or wiretapping him.

Nextel cell phones owned by two alleged mobsters, John Ardito and his attorney Peter Peluso, were used by the FBI to listen in on nearby conversations. The FBI views Ardito as one of the most powerful men in the Genovese family, a major part of the national Mafia.

The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.

Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.

While the Genovese crime family prosecution appears to be the first time a remote-eavesdropping mechanism has been used in a criminal case, the technique has been discussed in security circles for years.

The U.S. Commerce Department's security office warns that "a cellular telephone can be turned into a microphone and transmitter for the purpose of listening to conversations in the vicinity of the phone." An article in the Financial Times last year said mobile providers can "remotely install a piece of software on to any handset, without the owner's knowledge, which will activate the microphone even when its owner is not making a call" ...

The Pocket Spy: Will Your Smartphone Rat You Out?

By Linda Geddes, NewScientist
October 14, 2009

... A decade ago, our phones' memories could just about handle text messages and a contacts book. These days, the latest smartphones incorporate GPS, Wi-Fi connectivity and motion sensors. They automatically download your emails and appointments from your office computer, and come with the ability to track other individuals in your immediate vicinity. And there's a lot more to come. Among other things, you could be using the next generation of phones to keep tabs on your health, store cash and make small transactions -- something that's already happening in east Asia (see "Future Phones" below).

These changes could well be exploited in much the same way that email and the internet can be used to "phish" for personal information such as bank details. Indeed, some phone-related scams are already emerging, including one that uses reprogrammed cellphones to intercept passwords for other people's online bank accounts.
"Mobile phones are becoming a bigger part of our lives," says Andy Jones, head of information security research at British Telecommunications. "We trust and rely on them more. And as we rely on them more, the potential for fraud has got to increase."
So just how secure is the data we store on our phones? If we are starting to use them as combined diaries and wallets, what happens if we lose them or they are stolen? And what if we simply trade in our phones for recycling?

According to the UK government's Design and Technology Alliance Against Crime (DTAAC), 80 per cent of us carry information on our handsets that could be used to commit fraud -- and about 16 per cent of us keep our bank details on our phones. I thought my Nokia N96 would hold few surprises, though, since I had only been using it for a few weeks when I submitted it to DiskLabs. Yet their analysts proved me wrong ...

In February, Google launched Latitude, networking software for smartphones that shares your location with friends. It can be turned off, but campaign group Privacy International is concerned by Latitude's complex settings and says it is possible the program could broadcast your location to others without your knowledge.
"Latitude could be a gift to stalkers, prying employers, jealous partners and obsessive friends," the organisation warns.
A phone-based calendar could also leave you vulnerable. Police in the UK have already identified burglaries that were committed after the thief stole a phone and then targeted the individual's home because their calendar said they were away on holiday, says Joe McGeehan, head of Toshiba's research lab in Europe and leader of DTAAC's Design Out Crime project, which recently set UK designers the challenge of trying to make cellphones less attractive to people like hackers and identity thieves.
"It's largely opportunistic, but if you've got all your personal information on there, like bank details, social security details and credit card information, then you're really asking for someone to 'become' you, or rob you, or invade your corporate life," McGeehan says ...
Future Phones

By next year about 1 in 3 new smartphones will have accelerometers. Pressure sensors and gyroscopes will follow, and soon your handset may keep tabs on your health and pay your bills too.

For example, Nokia is experimenting with adding biosensors capable of monitoring heart and breathing rates, as well as glucose and oxygen levels in the blood.
"Your phone could act as a wellness diary, and start to integrate data with the primary health records kept by your doctor," says Marc Bailey, a researcher at the Nokia Research Centre in Cambridge, UK.
Meanwhile mobile commerce, or M-commerce, in which phones are used to transfer money or pay for shopping, is already expanding rapidly. Cellphone users in Japan can buy train or airline tickets with their handset, while people in Afghanistan, the Philippines and east Africa can use their handsets to transfer money to each other.
"M-commerce is coming, and the expectation is that it will become prevalent in the UK and other European countries within four years," says Joe McGeehan, head of Toshiba's research lab in Europe.

Though these developments should bring many benefits, security is expected to become a problem. "As soon as you put money on anything, criminals become more interested in it," says McGeehan.

To counter this, manufacturers are developing more secure ways of encrypting data on handsets. According to Nokia, users will be able to alter security settings depending on how much data they want available at any one time. Phones with built-in fingerprint scanners are already on the market, and Sharp has experimented with face recognition on handsets, though hackers have recently shown that face recognition is easily defeated with just a photograph.

Meanwhile, Apple is thought to be considering adding biometric security measures, such as a fingerprint scanner, to future iPhones. However effective these security features are, though, they will only work when turned on.

Phone Security Q & A

If I delete a message or photo on my phone will it disappear completely?

Data often remains on a phone's memory chip until it is overwritten. Phones also create extra copies that are spread around its memory. It is possible to overwrite files by copying new data onto the phone. Commercial software will "zero fill" a memory or SIM card to overwrite it.

Where do recycled handsets end up?

According to Andy Jones, a security specialist at British Telecommunications, the main markets for recycled phones are Nigeria and China, "both of which are regarded as areas posing a high threat to the security of information."

What if I smash up my SIM card?

Forensic analysts can often recreate SIM cards using the data that's stored on the handset. How much information they can retrieve depends on the phone model. It is also possible to stick a damaged SIM card back together and then extract its data.

Can my movements be tracked, even if I don't have GPS on my phone?

A technique called cell site analysis can be used to track someone to within 10 to 15 metres, using cellphone masts to triangulate their position. GPS can give more detailed information, such as your altitude or the speed you are travelling at.

Can my handset be used to spy on me?

If someone can get direct access to your handset, they can install software that lets them listen to conversations and monitor text messages without your knowledge. Without direct access, they can still monitor your phone usage remotely, but not eavesdrop on your conversations. It is also possible to send text messages that look like they come from someone else -- a technique called SMS spoofing. This makes it possible to upload messages to someone else's Twitter account, or send your boss rude messages using a colleague's number.

How do I improve my phone's security?

Switch on all security options such as handset PIN codes. Download software to wipe your phone before you throw it away or send it for recycling. Consider buying a handset with fingerprint recognition security. Alternatively, add software that can find your phone or even take control of it remotely should it be stolen, allowing you to encrypt all data stored on it, disable it entirely or even make it emit a loud alarm.

Is it legal for my employer or partner to send my cellphone for analysis?

If it is a company phone, or was a present from your partner, beware. Chances are that they can claim legal ownership and so can do what they want with it.

Smartphone Tracks User Interests, Habits, Finances, Location

The International Herald Tribune
March 11, 2009

The millions of people who use their cellphones daily to play games, download applications and browse the Web may not realize that they have an unseen companion: advertisers that can track their interests, their habits and even their location.

Smartphones, like the iPhone and BlackBerry Curve, are the latest and potentially most extensive way for advertisers to aim ads at certain consumers... Advertisers will pay high rates for the ability to show, for example, ads for a nearby restaurant to someone leaving a Broadway show, especially when coupled with information about the gender, age, finances, and interests of the consumer.

Eswar Priyadarshan, the chief technology officer of Quattro Wireless, which places advertising for clients like Sony on mobile sites, says he typically has 20 pieces of information about a customer who has visited a site or played with an application in his network.
“The basic idea is, you go through all these channels, and you get as much data as possible,” he said.
The capability for collecting information has alarmed privacy advocates.
It's potentially a portable, personal spy," said Jeff Chester, the executive director of the Center for Digital Democracy, who will appear before Federal Trade Commission staff members this month to brief them on privacy and mobile marketing.
He is particularly concerned about data breaches, advertisers' access to sensitive health or financial information, and a lack of transparency about how advertisers are collecting data.
"Users are going to be inclined to say, sure, what's harmful about a click, not realizing that they've consented to give up their information" ...

Banks Spying on Your Bills, Rent Payments, Paychecks

November 6, 2010

Raw Story - The age of the plain old credit score is gone, says a report at the Wall Street Journal, and it's been replaced by ever more intrusive efforts by banks and credit agencies to gauge exactly what you're worth, and what you can pay.

To that end, financial firms are now tracking their customers' bank deposits, rent payments or home values, and even utility bills to figure out who may soon become a financial risk, reports WSJ's Karen Blumenthal.

So, for example, if your employer pays you through direct deposits and those deposits stop, financial institutions can now have warning that your money situation is likely to tighten, and may deny you credit on that basis.

But the efforts don't end there. A new area of research, income estimation, "took off earlier this year," WSJ reports, and involves financial firms collecting information about mortgages, personal loans and credit history to determine how much an individual makes and how much credit they should be given.

In this new era of deep data-mining, even your utility bills and rent check aren't out of bounds.

An estimated 40 million consumers, including young people and people who prefer to pay in cash, have too little credit experience to generate a useful credit score. But they are likely to pay rent or utility bills, which could help credit bureaus better assess their credit-worthiness.

Experian, one of the three major credit bureaus, bought RentBureau—which collects rental-payment data from large property managers—and expects to integrate that information into credit records before the end of the year.

Credit bureaus say they also would like to offer data on cellphone payments, but have run into concerns over privacy issues, which may require legislation to untangle.

BUSINESSES TARGET CELL PHONES, SOCIAL NETWORKING SITES

The WSJ report comes as new concerns emerge over the extent to which businesses are digging into the lives of their customers in order to assess risk or market products.

Raw Story reported this week on SocialMiner, a new software application from Cisco Systems that allows businesses to monitor social networking sites such as Facebook and Twitter. The software has raised concerns over the prospect of employers spying on the personal lives of their employees.
"With more and more Web-based conversations taking place over these social platforms, it's now more critical than ever that businesses are aware of what their customers are saying about them and are able to respond to general inquiries or rectify customer service issues so as to enhance and protect brand reputation," Cisco stated in a press release.
Meanwhile, a federal class action lawsuit alleges that numerous media companies, including Fox News and CNN, received detailed personal information on millions of cellphone users from an advertising company that circumvented security measures on their phones. Courthouse News reports:
Delaware-based Ringleader "stamped" a "Unique Device Identifier" into customers' cell phones, compatible with iPhone, iPad, iTouch and PDAs and other devices, the complaint states.

Once entered into their phones, the class claims, say the code sent their private information to a database that Ringleader shared with AccuWeather, CNN, ESPN, FOX News, Go2 Media, Merriam-Webster, Travel Channel, and WhitePages, all of them named as defendants.
"Essentially, defendants hacked the mobile phones of millions of consumers ... by embedding a tracking code in each user's mobile device database to circumvent users' browser controls for managing web privacy and security," the complaint states.
The class claims the database collected information about "gender, age, race, number of children, education level, geographic location, and household income."

When they learned about the invasion of their privacy, some customers tried to delete the code, but it was programmed for "perpetual re-spawning, creating in effect: 'Zombie Databases,'" the complaint states.

Security Holes Discovered in iPhones, iPads

The Associated Press
July 7, 2011

A new security hole has opened up in Apple Inc.'s iPhone, iPad and iPod Touch devices, raising alarms about the susceptibility of some of the world's hottest tech gadgets to hacker attacks.

Flaws in the software running those devices came to light after a German security agency warned that criminals could use them to steal confidential data off the devices. Apple, the world's largest technology company by market value, said Thursday that it is working on a fix that will be distributed in an upcoming software upgrade.

With the security hole, an attacker can get malicious software onto a device by tricking its owner into clicking an infected PDF file. Germany's Federal Office for Information Security called the flaws "critical weaknesses" in Apple's iOS operating system.

Internet-connected mobile devices are still subject to fewer attacks than personal computer, but they could eventually prove a juicy target for hackers because they are warehouses of confidential banking, e-mail, calendar, contact and other data.

Software vulnerabilities are discovered all the time. What makes the latest discovery alarming is that the weaknesses are already being actively exploited — albeit in a consensual way.

The latest concerns were prompted by the emergence of a new version of a program to allow Apple devices to run any software and circumvent the restrictions that Apple notoriously retains over software distributed through its online store. There are security risks of doing so, but many people find it liberating to install their own software.

Although this program is something people would seek out, the weaknesses that its authors discovered could easily be used for malice, security experts say.

There is an irony in the controversy: The site distributing the program offers a fix for the problem, but to get the fix, a user has to first install the program in question. So a user must defy Apple's restrictions to get the protection until Apple comes up with a fix of its own.

Charlie Miller, a prominent hacker of Apple products, said it likely took months to develop the program to break Apple's restrictions, but a criminal might need only a day or two to modify it for nefarious purposes.

Apple Inc. spokeswoman Bethan Lloyd said Thursday the company is "aware of this reported issue and developing a fix." She would not say when the update will be available.

One reason for gadget owners to take heart: Attacks on smartphones and other Internet gadgets are still relatively rare. One reason is PC-based attacks are still highly lucrative. Still, vulnerabilities such as the ones Apple is confronting show that consumers should take care of securing their mobile devices as they would their home computer.

"These things are computers — they're just small, portable computers that happen to have a phone tacked onto them," said Marc Fossi, manager of research and development for Symantec Security Response. "You've got to treat them more like a computer than a phone. You have to be aware of what's going on with these devices."
Out of Financial Chaos, Futurist Predicts Cashless Society and Robocops
New Monopoly Game is Cashless
Using RFID-enabled Cell Phones, Customers Scan Products and Pay for Purchases
Road warriors: Smartphones with built-in GPS
GPS on smartphones is no longer an emerging trend. It's almost a must-have feature nowadays, and more and more handsets are offering it. With the embedded GPS receiver and a mapping service, you can get real-time position tracking, text- and voice-guided directions, and points of interest. However, taking advantage of GPS, and the navigation powers that come with it, sometimes come at a price. If you want features, such as voice-guided directions, you often have to subscribe to a location-based service (LBS), such as TeleNav or VZ Navigator, which require a subscription fee. However, Google and Nokia are shaking things up by offering the premium features for free on such devices as the Motorola Droid, Nexus One, and Nokia 5800 Navigation Edition. How this will affect the LBS business remains to be seen, but one thing's for sure: if you're forever getting lost or are constantly traveling, there's help out there for you.
Go to The Lamb Slain Home Page