Monday, September 28, 2009
News: Swiss Federal Roads Office considers introducing GPS surveillance for speeders
Friday, September 25, 2009
Update: Border Laptop Searches
News: Programme Can Reveal the Sexual Orientation of Social Network Users
“Even if you don’t affirmatively post revealing information, simply publishing your friends’ list may reveal sensitive information about you, or it may lead people to make assumptions about you that are incorrect,” said Kevin Bankston, senior staff attorney for the Electronic Frontier Foundation, a nonprofit digital rights organization in San Francisco. “Certainly if most or many of your friends are of a particular religious or political or sexual category, others may conclude you are part of the same category - even if you haven’t said so yourself.”
Thursday, September 24, 2009
News: UK Environment Agency's use of RIPA Slammed
Reports from recent inspections show that “fundamental flaws” were discovered in some of its operations. The surveillance commissioner has also repeatedly raised concerns over the proportionality of the Environment Agency’s operations.
The reports – marked “restricted” - show that in 2007 the Home Office advised officials that “affixing a magnetic device to a vehicle on the public highway” was “not a criminal offence” and “putting an arm into a wheel arch or under the frame of a vehicle is straining the concept of trespass.”
The Environment Agency continues to trial a network of informants and intends to contruct 'a national spy network' the Commissioner reported.
EU Funding New Database to be used to Identify 'Abnormal Behaviour'
A number of interest groups have criticised the program:
Stephen Booth, an Open Europe analyst who has helped compile a dossier on the
European justice agenda, said these developments and projects such as Indect
sounded "Orwellian" and raised serious questions about individual liberty.
"This is all pretty scary stuff in my book. These projects would involve a huge invasion of privacy and citizens need to ask themselves whether the EU should be spending their taxes on them," he said. "The EU lacks sufficient checks and balances and there is no evidence that anyone has ever asked 'is this actually in the best interests of our citizens?'"[Liberty's Shami Chakrabarti commented] "Profiling whole populations instead of monitoring individual suspects is a sinister step in any society. "It's dangerous enough at national level, but on a Europe-wide scale the idea becomes positively
chilling."
News: EP Resolution on US SWIFT Access
The EP believes that the transfer requests should be "based on specific, targeted cases, limited in time and subject to judicial authorisation, and that any subsequent processing is limited to data which disclose a link with persons or organisations under examination in the US" and that "EU citizens and enterprises are granted the same defence rights and procedural guarantees and the same right of access to justice as exist in the EU and that the legality and proportionality of the transfer requests are open to judicial review in the US". In order to prevent any abuse, the transferred data should be "subject to the same judicial redress mechanisms as would apply to data held within the EU, including compensation in the event of unlawful processing of personal data." The resolution also asks for a reciprocity mechanism that would oblige the US authorities to equally transfer relevant financial data to the competent EU authorities, upon request.
News: UK ID Card Design and New ID Commissioner Unveiled
Will the ID Card number be randomly allocated, or will it betray information about the ID Card controllee, through batch sequences, which can also help to break the cryptographic protections on the Contactless / RFID chip, just as happened with the Netherlands biometric passport ?
The post at Spy Blog also criticises the limitations of the powers of the new ID Commissioner, Sir Joseph Pilling:
The National Identity Scheme Commissioner is specifically forbidden by the
terms of reference which appoint him under the Identity Cards Act 2006 section 22 Appointment of National Identity Scheme Commissioner to look into the following activities, which are exactly the secret activities which are the most likely to abuse the National Identity Register, and which therefore should be scrutinised the most:
(4) The matters to be kept under review by the Commissioner do not
include--
(a) the exercise of powers which under this Act are exercisable by
statutory instrument or by statutory rule for the purposes of the Statutory
Rules (Northern Ireland) Order 1979 (S.I. 1979/1573 (N.I. 12));
(b) appeals against civil penalties;
(c) the operation of so much of this Act or of any
subordinate legislation as imposes or relates to criminal offences;
(d) the provision of information to the Director-General of the Security Service, the
Chief of the Secret Intelligence Service or the Director of the Government Communications Headquarters;
(e) the provision to another member of the
intelligence services, in accordance with regulations under section 21(5), of
information that may be provided to that Director-General, Chief or Director;
(f) the exercise by the Secretary of State of his powers under
section 38; or
(g) arrangements made for the purposes of anything mentioned in paragraphs (a) to (f).
News: Insurers Offering Discounts to Put Cameras in Cars
News: Newly Obtained Declassified Documents Reveal More Details about FBI's NSAC
• International travel records of citizens and foreigners
• Financial forms filed with the Treasury by banks and casinos
• 55,000 entries on customers of Wyndham Worldwide, which includes Ramada Inn, Days Inn, Super 8, Howard Johnson and Hawthorn Suites
• 730 records from rental-car company Avis
• 165 credit card transaction histories from Sears
• Nearly 200 million records transferred from private data brokers such Accurint, Acxiom and Choicepoint
• A reverse White Pages with 696 million names and addresses tied to U.S. phone numbers
• Log data on all calls made by federal prison inmates
• A list of all active pilots
• 500,000 names of suspected terrorists from the Unified Terrorist Watch List
• Nearly 3 million records on people cleared to drive hazardous materials on the nation’s highways
• Telephone records and wiretapped conversations captured by FBI investigations
• 17,000 traveler itineraries from the Airlines Reporting Corporation
Wired reports that the database system is being used in conjunction with a meta-search engine and link and pattern analysis software.
Friday, September 11, 2009
News: EC Proposes Police Access to Asylum Fingerprint Database
The European Council on Refugees and Exiles (ECRE) has said the move could potentially put asylum-seekers in danger, since Europol has the right to exchange data with other EU bodies and with non-EU countries. “How would it be ensured that information about people fleeing persecution doesn't reach their persecutors?”, Bjarte Vandvik, the ECRE's secretary-general, has said.
Comment: Henry Porter on DNA and Certainty
Police officers in the past have been tempted to "fit up" those they believe guilty of a crime. It is easy to imagine how DNA might, in the future, be manufactured to gain a rock solid conviction against a person who was proving inconvenient to the authorities. We may chose to doubt that this will ever happen but legislators must allow for the possibility. Whatever the advances we celebrate today the actual anniversary of the Jeffrey's discovery – it is vital to absorb that DNA evidence is not fool proof.
George Bush Airport Testing New Body Scanners
Both technologies provide clear images of the subject's naked body.
Comment: Brown on the Wilson Doctrine
The author calls attention to the careful wording 'all forms of surveillance and interception that are subject to authorisation by Secretary of State warrant' would appear to only apply to:
- Interception of Communications (electronic or postal) under the Regulation of Investigatory Powers Act 2000 Part 1 Chapter 1., which requires a Warrant or a Certificate signed by a Secretary of State (either the Home Secretary or the Foreign Secretary, usually)
- A property interference and / or interference with wireless telegraphy warrant under the Intelligence Services Act 1994 sections 5 to 7
But leave out:
- GCHQ or any other public body authorised to intercept electronic communications, not via a Warrant but via a more general Certificate (e.g. for snooping, in bulk, on transatlantic fibre optic cables or satellite communications)
- Police units using the Police Act 1997 Part III powers
- Property Interference i.e. authorised breaking and entering into homes or vehicles, usually to plant electronic bugging or tracking devices.
- Police or intelligence agency units using the rest of the Regulation of Investigatory Powers Act 2000 for: the various kinds of Surveillance:
- Directed Surveillance
- Covert Surveillance
- Intrusive Surveillance
- The use of Covert Human Intelligence Sources (CHIS) - informants and infiltrators
- Seizure of cryptographic keys and / or de-crypted plaintext.
- Communications Data:
- Subscriber Details - Name and Address of land line or registered mobile phones<
- Location Based Services Data (instantaneous and historical tracking of mobile phone handsets)
- Communications Traffic Data (itemised phone bills, who called who and when "friendship trees", email server logfiles, internet access log files etc.
The Police or Military covert surveillance units (but not the Intelligence Agencies, without a Warrant) could also use the Counter Terrorism Act 2008 section 18 Material not subject to existing statutory restrictions
- DNA or fingerprint samples obtained in secret, through Property Interference or by Confidential Human Intelligence Sources
There are "official surveillance" techniques and Databases which are not covered by RIPA e.g.
- Automatic Number Plate Recognition (the Metropolitan Police have access to all of the Transport for London Congestion Charge ANPR data "in bulk, in real time", exempt from the Data Protection Act).
Passenger Name Records, credit card and email details data slurped from Airline, Train and Ferry Booking Systems
Transport for London Oyster Travel Smart Card data
The planned National Identity Register / ID Card scheme
Literally millions of CCTV surveillance cameras and recording devices There are also other Government Departments which have granted themselves snooping powers, which fall outside of the RIPA or Intelligence Services legal frameworks:
- HM Treasury can demand "any document" by invoking the words "money laundering" or "terrorism finance"
- The Department for Work and Pensions employs thousands of "benefits fraud" investigators, and abuses the Social Security Act 2003 to get hold of Communications Data , without having to pay for it, which they would have to do under RIPA.
- Private companies designated as "anti-fraud organisations" under the Serious Crime Act 2007 can get hold of MPs' or Constituents' financial or medical data -- The next Home Office data security and privacy disaster ? Sharing all our financial details with private sector "specified anti-fraud organisations"
News: ACPO Publish Policy Advice on the Use of ANPR
The post calls attention to the potential for the guidelines to result in 'false positives' and innocent people being flagged up for stop and search. Also some categories for 'flagging' vehicles do not seem to be indicative in any way of having any involvement in criminality such as 'Protest' - presubably flagging the driver as involved in protests. The full pdf can be found here
News: FOI Request Reveals DHS Travel Records
- Credit card number and expiration (really)
- IP address used to make web travel reservations
- Hotel information and itinerary
- Full Name, birth date and passport number
- Full airline itinerary, including flight numbers and seat numbers
- Cruise ship itinerary
- Phone numbers, incl. business, home & cell
- Every frequent flyer and hotel number associated with the subject, even ones not used for the specific reservation
News: Italy to Create National DNA Database
- "Lacks any general provision that would oblige all the responsible parties to adopt serious and adequate security measures against unauthorized access, data tampering, and illegal handling of data and information."
- It says "nothing about the need for a properly established chain of custody...[making it]...impossible for a "planted" or "altered" sample to be used."
- Nothing is said "about the effect of an improperly managed chain of custody on admissibility of the samples as evidence in Court"
- "Law enforcement officers can access the NDNA database without prior authorisation from the prosecutor or the judge that is responsible for the investigation involving the sample or profile in question (under Italian law, law enforcement bodies are under the direction and control of the public prosecutor). Since the article is silent about the matter, only future court decisions will determine whether prior authorization is needed to access the NDNA database, thus leaving wide open a window of several years in which "anything can happen".
- Requires "neither the positive identification of the personnel accessing the NDNA database and material in the central lab, nor the secure logging of access to and activity involving the profile and sample."
- Does not "clearly identify who is in charge of ordering the destruction of samples and profiles."
- Punishment for a public officer "that communicates or uses data and information without authorization, or for purposes other than those stipulated specifically in the law" is negligible: "a jail term of between one and three years...[which in practice could be reduced to]... "a final jail term of less than six months that could be avoided by simply paying a fine."
- By leaving white collar crime profiles out the legislation opens the door to the database skewing, say, the racial balance of future crime statistics.
News: More Complaints About Google Street View
Meanwhile in Switzerland the country's Data Protection Commissioner have called for the interruption of Street View less than a week after it went live, demanding that the blurring technology be improved. This is a demand they have agreed to, but that has not reassured everyone in the debate:
Sébastien Fanti, a lawyer specialised in Internet issues, warns on the fact that all the data gathered by Google is available to US authorities as according to the USA Patriot Act, any US government agency has access to data collected anywhere in the world by US firms, even without a court order. "If the CIA asks to see what was going on in Zurich this spring, Google isn't going to provide blurred images," says Fanti.
Google's Switzerland spokesman Matthias Meyer admitted that the companies is collaborating with authorities but stated that "What we are putting on line are photos of the past. Once they've been taken they don't change, nothing is shown in real time."
News: Belgian Justice Minister Wants 2 Year Retention of Data
Comment: Locational Privacy
What can be done? As much as possible, location-specific information should not be collected in the first place, or not in personally identifiable form. There are many ways, as the Electronic Frontier Foundation notes, to use cryptography and anonymization to protect locational privacy. To tell you about nearby coffee shops, a cellphone application needs to know where you are. It does not need to know who you are.
When locational information is collected, people should be given advance notice and a chance to opt out. Data should be erased as soon as its main purpose is met. After you pay your E-ZPass bill, there is no reason for the government to keep records of your travel.
Thursday, September 3, 2009
News: Facebook Adopts Improved Privacy Controls
News: ECHR Affirms Prisoner's Right to Private Medical Correspondence
News: Scottish Government Seeks to Curb Data Collection
"Organisations should avoid creating large centralised databases of personal information and store personal and transactional data separately," said a statement outlining the plans. "People should only be asked for identity when necessary and they should be asked for as little information as possible."
News: UK Government Plans to Link ID Cards to Criminal Records
This research is still in the early stages of feasibility and several options are being considered as part of this work, including options for the use of ID card data and fingerprints. The CRB is not considering the use of other biometrics at this stage,
News: Fears of More US Access to EU Banking Details
The EC is drafting a new agreement on access with US authorities in advance of the new server, to the exclusion of the European Parliament and heavy criticism of MEPs. The Commission claim they are trying to negotiate a better deal, although this will apparently not include any EU access to US banking transactions.
In the meanwhile the Council of Foreign Ministers authorised the Swedish Presidency to negotiate a temporary agreement whereby information would be granted on a per request basis and could be stored in the US for up to five years.
News: New DHS Privacy Standards
“There are two key aspects of this new policy worth applauding – the limitations on the time that electronic devices can be held by Customs officers and requirements that information from electronic devices only be retained if there is probable cause that a crime has been committed. These procedural safeguards recognize that the old system was invasive and harmed many innocent travelers.
“But unless and until the government requires agents to have individualized suspicion before reviewing such sensitive information as medical records, legal papers and financial information, even the most elaborate procedural safeguards will be insufficient for the government to live up to its constitutional obligations. It is now time for Congress to act and create concrete standards for searches and directly confront the problem of racial and religious profiling.”
News: EDPS Opinion on ITS
- More clarity with regard to the legal requirements of data protection accross Europe
- Data Controllers to be clearly identified: "as they will bear the responsibility to ensure that privacy and data protection considerations are implemented at all levels of the chain of processing."
- Appropriate safeguards "so that the use of location technologies is not intrusive from a privacy viewpoint. This should notably require further clarification as to the specific circumstances in which a vehicle will be tracked, strictly limiting the use of location devices to what is necessary for that purpose and ensuring that location data are not disclosed to unauthorized recipients".
- Implementation "with due respect for data protection principles and practical safeguards on security"
- Gathered data not to be used "for further purposes that are incompatible with those for which they were collected" - calling for Privacy by Design in ITS applications
- Privacy and data protection to be built in from the beginning
- Data Protection Authorities such as itself and the Article 29 Working Party to be involved through consultation on all ITS deployment initiatives.
News: Another Case of Intimate Information Lost
Of course, disclosure of this sort of information has been considerably more significant in some cases than others."Personal information is valuable," said Sally-anne Poole, head of enforcement and investigations at the ICO. “In this case, it also involved the details of criminal convictions which, if accessed, could potentially result in distress being caused to the individuals concerned."
The trade body has made a written undertaking to the ICO committing it to encrypting machines and to training staff in its information policies and procedures to try to ensure that such an incident is not repeated.
Comment: ACLU Seeks Info on Border Laptop Searches
The court rejected the argument that a laptop is like a human mind because of its ability to record ideas and emails, and held instead that a laptop is the same as closed containers such as purses and wallets.While clearly it would be silly to take the analogy between human minds and any inanimate object literally (pace some of my more extreme philosophical friends) there is clearly a real issue here. Not all searches of 'closed containers' or other objects are going to be on a par here - its reasonable to expect a search of my diary to be much more invasive than searching my lunchbox. Laptop computers record some of the most intimate information about us. Surely this is a distinction that ought to be recognised?
News: ACLU Seeks Info on Border Laptop Searches
In April of last year, the US Court of Appeals for the Ninth Circuit Ruled that reasonable suspicion is not necessary for a warrantless search of a laptop or other digital device at the border due to inherent national security interests. The court rejected the argument that a laptop is like a human mind because of its ability to record ideas and emails, and held instead that a laptop is the same as closed containers such as purses and wallets.
Zurich DETECTER Site Launched
Tuesday, September 1, 2009
Update: Registered Traveler
I discussed the Registered Traveler Program in a post concerning the CLEAR program last month. Verified Identity Pass, Inc., mentioned in the FederalComputerWeek article, is the parent company of CLEAR.