People who were charged with a crime in England used to be told by the police that they did not have to say anything, but that anything they did say might be taken down and used as evidence against them. I think we should all be given this warning whenever we use a mobile telephone.
Theodore Dalrymple, “Nowhere to Hide”, Taki’s Magazine, 2014-02-23
September 24, 2014
August 15, 2014
I recently cancelled a contract with a different provider after some gizmo broke. The company first told me the whole thing was my problem, then at the last moment offered me hundreds of pounds to stay. When your phone company starts using the playbook of an emotionally abusive spouse, this is not a market in good working order.
July 15, 2014
Tim Cushing wonders why we don’t seem to sympathize with the plight of poor, overworked law enforcement officials who find the crushing burden of getting a warrant for accessing your cell phone data to be too hard:
You’d think approved warrants must be like albino unicorns for all the arguing the government does to avoid having to run one by a judge. It continually acts as though there aren’t statistics out there that show obtaining a warrant is about as difficult as obeying the laws of thermodynamics. Wiretap warrants have been approved 99.969% of the time over the last decade. And that’s for something far more intrusive than cell site location data.
But still, the government continues to argue that location data, while possibly intrusive, is simply Just Another Business Record — records it is entitled to have thanks to the Third Party Doctrine. Any legal decision that suggests even the slightest expectation of privacy might have arisen over the past several years as the public’s relationship with cell phones has shifted from “luxury item/business tool” to “even grandma has a smartphone” is greeted with reams of paper from the government, all of it metaphorically pounding on the table and shouting “BUSINESS RECORDS!”
When that fails, it pushes for the lower bar of the Stored Communications Act [PDF] to be applied to its request, dropping it from “probable cause” to “specific and articulable facts.” The Stored Communications Act is the lowest bar, seeing as it allows government agencies and law enforcement to access electronic communications older than 180 days without a warrant. It’s interesting that the government would invoke this to defend the warrantless access to location metadata, seeing as the term “communications” is part of the law’s title. This would seem to imply what’s being sought is actual content — something that normally requires a higher bar to obtain.
Update: Ken White at Popehat says warrants are not particularly strong devices to protect your liberty and lists a few distressing cases where warrants have been issued recently.
We’re faced all the time with the ridiculous warrants judges will sign if they’re asked. Judges will sign a warrant to give a teenager an injection to induce an erection so that the police can photograph it to fight sexting. Judges will, based on flimsy evidence, sign a warrant allowing doctors to medicate and anally penetrate a man because he might have a small amount of drugs concealed in his rectum. Judges will sign a warrant to dig up a yard based on a tip from a psychic. Judges will kowtow to an oversensitive politician by signing a warrant to search the home of the author of a patently satirical Twitter account. Judges will give police a warrant to search your home based on a criminal libel statute if your satirical newspaper offended a delicate professor. And you’d better believe judges will oblige cops by giving them a search warrant when someone makes satirical cartoons about them.
I’m not saying that warrants are completely useless. Warrants create a written record of the government’s asserted basis for an action, limiting cops’ ability to make up post-hoc justifications. Occasionally some prosecutors turn down weak warrant applications. The mere process of seeking a warrant may regulate law enforcement behavior soomewhat.
Rather, I’m saying that requiring the government to get a warrant isn’t the victory you might hope. The numbers — and the experience of criminal justice practitioners — suggests that judges in the United States provide only marginal oversight over what is requested of them. Calling it a rubber stamp is unfair; sometimes actual rubber stamps run out of ink. The problem is deeper than court decisions that excuse the government from seeking warrants because of the War on Drugs or OMG 9/11 or the like. The problem is one of the culture of the criminal justice system and the judiciary, a culture steeped in the notion that “law and order” and “tough on crime” are principled legal positions rather than political ones. The problem is that even if we’d like to see the warrant requirement as interposing neutral judges between our rights and law enforcement, there’s no indication that the judges see it that way.
July 10, 2014
The “internet of things” is coming: more and more of your surroundings are going to be connected in a vastly expanded internet. A lot of attention needs to be paid to security in this new world, as Dan Goodin explains:
In the latest cautionary tale involving the so-called Internet of things, white-hat hackers have devised an attack against network-connected lightbulbs that exposes Wi-Fi passwords to anyone in proximity to one of the LED devices.
The attack works against LIFX smart lightbulbs, which can be turned on and off and adjusted using iOS- and Android-based devices. Ars Senior Reviews Editor Lee Hutchinson gave a good overview here of the Philips Hue lights, which are programmable, controllable LED-powered bulbs that compete with LIFX. The bulbs are part of a growing trend in which manufacturers add computing and networking capabilities to appliances so people can manipulate them remotely using smartphones, computers, and other network-connected devices. A 2012 Kickstarter campaign raised more than $1.3 million for LIFX, more than 13 times the original goal of $100,000.
According to a blog post published over the weekend, LIFX has updated the firmware used to control the bulbs after researchers discovered a weakness that allowed hackers within about 30 meters to obtain the passwords used to secure the connected Wi-Fi network. The credentials are passed from one networked bulb to another over a mesh network powered by 6LoWPAN, a wireless specification built on top of the IEEE 802.15.4 standard. While the bulbs used the Advanced Encryption Standard (AES) to encrypt the passwords, the underlying pre-shared key never changed, making it easy for the attacker to decipher the payload.
March 29, 2014
The University of Toronto’s Munk School of Global Affairs looks at how the Canadian security establishment operates:
The issue of lawful access has repeatedly arisen on the Canadian federal agenda. Every time that the legislation has been introduced Canadians have opposed the notion of authorities gaining warrantless access to subscriber data, to the point where the most recent version of the lawful access legislation dropped this provision. It would seem, however, that the real motivation for dropping the provision may follow from the facts on the ground: Canadian authorities already routinely and massively collect subscriber data without significant pushback by Canada’s service providers. And whereas the prior iteration of the lawful access legislation (i.e. C–30) would have required authorities to report on their access to this data the current iteration of the legislation (i.e. C–13) lacks this accountability safeguard.
In March 2014, MP Charmaine Borg received responses from federal agencies (.pdf) concerning the agencies’ requests for subscriber-related information from telecommunications service providers (TSPs). Those responses demonstrate extensive and unaccountable federal government surveillance of Canadians. I begin this post by discussing the political significance of MP Borg’s questions and then proceed to granularly identify major findings from the federal agencies’ respective responses. After providing these empirical details and discussing their significance, I conclude by arguing that the ‘subscriber information loophole’ urgently needs to be closed and that federal agencies must be made accountable to their masters, the Canadian public.
The government’s responses to MP Borg’s questions were returned on March 24, 2014. In what follows I identify the major findings from these responses. I first discuss the Communications Security Establishment Canada (CSEC), Canadian Security Intelligence Service (CSIS), Royal Canadian Mounted Police (RCMP), and Canadian Border Service Agency (CBSA). These agencies provided particularly valuable information in response to MP Borg’s questions. I then move to discuss some of the ‘minor findings’ related to the Canadian Revenue Agency (CRA), Competition Bureau, Statistics Canada, and the Transportation Safety Board (TSB).
March 22, 2014
Classic FM has a collection of 10 videos which use Bach’s music in varied ways, including this rather charming forest xylophone performance as an ad for a Japanese mobile phone:
Uploaded on 4 May 2011
Very nice music from a very long xylophone in the forest.
No CG or tape-cut. Four days spent.
This is for a newly launched cell phone of NTT Docomo, the largest mobile service provider in Japan. Shell of the new phone is wood and their idea is to use domestic woods that are produced after preservative maintenance of Japanese forest.
Music: “Jesu, Joy of Man’s Desiring”, by Bach
Cannes Lion Award Winner 2010
H/T to Samizdata for the link.
March 18, 2014
Selfies are “this year’s droopy pants, backwards baseball caps, or visible piercings, as a shorthand for all that is wrong with today’s youth”
Nick Gillespie loves the Millennials. No, he really does:
That discomfort you’re sensing all around you? It’s the American Establishment loading its Depends diapers over the prospect of a younger generation that is turning its back on political parties and other zombified artifacts of our glorious past.
On the heels of the Pew Research report titled “Millennials in Adulthood,” two leading New York Times columnists have penned anxious articles sweating it out over the “The Self(ie) Generation” and “The Age of Individualism.”
“Millennials (defined by Pew as Americans ages 18 to 33) are drifting away from traditional institutions — political, religious and cultural,” muses Charles M. Blow, who sees a “a generation in which institutions are subordinate to the individual… This is not only the generation of the self; it’s the generation of the selfie.” Oh noes! And it’s only gonna get worse: “In the future,” worries Ross Douthat, “there will be only one ‘ism’ — Individualism — and its rule will never end. As for religion, it shall decline; as for marriage, it shall be postponed; as for ideologies, they shall be rejected; as for patriotism, it shall be abandoned; as for strangers, they shall be distrusted. Only pot, selfies and Facebook will abide.”
Does it strike anyone else as odd that selfies — clearly less the product of rising narcissism and more the product of the same awesome technology that empowers citizens to capture cops beating the shit of innocent people — have emerged as this year’s droopy pants, backwards baseball caps, or visible piercings, as a shorthand for all that is wrong with today’s youth? Getting bent out of shape over selfies may just be the ultimate #firstworldproblem.
March 13, 2014
Two Stanford grad students conducted a research project to find out what kind of actual data can be derived from mobile phone metadata:
Two Stanford computer science students were able to acquire detailed information about people’s lives just from telephone metadata — the phone number of the caller and recipient, the particular serial number of the phones involved, the time and duration of calls and possibly the location of each person when the call occurred.
The researchers did not do any illegal snooping — they worked with the phone records of 546 volunteers, matching phone numbers against the public Yelp and Google Places directories to see who was being called.
From the phone numbers, it was possible to determine that 57 percent of the volunteers made at least one medical call. Forty percent made a call related to financial services.
The volunteers called 33,688 unique numbers; 6,107 of those numbers, or 18 percent, were isolated to a particular identity.
They crowdsourced the data using an Android application and conducted an analysis of individual calls made by the volunteers to sensitive numbers, connecting the patterns of calls to emphasize the detail available in telephone metadata, Mayer said.
“A pattern of calls will, of course, reveal more than individual call records,” he said. “In our analysis, we identified a number of patterns that were highly indicative of sensitive activities or traits.”
For example, one participant called several local neurology groups, a specialty pharmacy, a rare-condition management service, and a pharmaceutical hotline used for multiple sclerosis.
Another contacted a home improvement store, locksmiths, a hydroponics dealer and a head shop.
The researchers initially shared the same hypothesis as their computer science colleagues, Mayer said. They did not anticipate finding much evidence one way or the other.
“We were wrong. Phone metadata is unambiguously sensitive, even over a small sample and short time window. We were able to infer medical conditions, firearm ownership and more, using solely phone metadata,” he said.
January 15, 2014
President Obama will issue new guidelines on Friday to curtail government surveillance, but will not embrace the most far-reaching proposals of his own advisers and will ask Congress to help decide some of the toughest issues, according to people briefed on his thinking.
Mr. Obama plans to increase limits on access to bulk telephone data, call for privacy safeguards for foreigners and propose the creation of a public advocate to represent privacy concerns at a secret intelligence court. But he will not endorse leaving bulk data in the custody of telecommunications firms, nor will he require court permission for all so-called national security letters seeking business records.
The emerging approach, described by current and former government officials who insisted on anonymity in advance of Mr. Obama’s widely anticipated speech, suggested a president trying to straddle a difficult line in hopes of placating foreign leaders and advocates of civil liberties without a backlash from national security agencies. The result seems to be a speech that leaves in place many current programs, but embraces the spirit of reform and keeps the door open to changes later.
October 7, 2013
If you haven’t heard of CSEC before, you’re certainly not alone. The signals intelligence service known as Communications Security Establishment Canada has been eager not to be in the public eye, but allegations are being made that CSEC has been spying on the Brazilian government’s mining and energy ministry:
The impact for Canada of these revelations could be equally grave: they come at a time when Brazil has become a top destination for Canadian exports, when a stream of delegations from the oil and gas industries are making pilgrimages to Rio de Janeiro to try to get a piece of the booming offshore oil industry, and when the Canadian government is eager to burnish ties with Brasilia. Foreign Affairs Minister John Baird visited Brazil in August, and spoke repeatedly about the country as a critical partner for Canadian business.
While CSEC’s role in conducting economic espionage has been alluded to before, how it does this job has not. The significance of the documents obtained by Globo in Brazil is that they speak to how “metadata” analysis by CSEC can be used to exploit a rival country’s computer systems.
The CSEC-labeled slides about the “Olympia” program describe the “Brazilian Ministry of Mines and Energy” as a “new target to develop” despite “limited access/target knowledge.”
The presentation goes on to map out how an individual’s smartphone — “target’s handset” — can be discerned by analysis, including by cross-referencing the smartphone’s Sim card with the network telephone number assigned to it and also to the handset’s unique number (IMEI).
The “top secret” presentation also refers to attacks on email servers.
“I have identified MX [email] servers which have been targeted to passive collection by the Intel analysts,” one slide says, without explaining who the speaker is.
September 19, 2013
In the Daily Beast, Robert Herritt reviews the latest book by Tyler Cowen, Average Is Over: Powering America Beyond the Age of the Great Stagnation.
Cowen’s main background assumption is that in the not-too-distant future various kinds of “genius machines” will be everywhere. In the workplace, business negotiations and client introductions “will be recorded, processed, and analyzed [and] … [e]ach party to the communications might receive a real-time report on when the other people are likely lying …” At the supermarket, “[y]our shopping cart will use GPS to track your moves through the store, including which aisles you visit most often.” As for our personal lives, “[a] woman might consult a pocket device in the ladies’ room during a date that tells her how much she really likes the guy. The machine could register her pulse, breathing, tone of voice … or whichever biological features prove to have predictive power.”
Even a few years ago, this forecast would have sounded silly, but that was before many of us trusted Match.com algorithms to suggest potential spouses and smartphones came with fingerprint scanners. Cowen’s not talking about flying cars (that futurist mainstay that always seems both just out of reach and comically unnecessary), but rather slightly more sophisticated versions of the technologies that many of us already use.
The bad news, he tells us, is that the rise of the machines will only worsen the wage polarization we are seeing today. Cowen predicts a situation where 10 percent to 15 percent of Americans are “extremely wealthy” with “fantastically comfortable and stimulating lives.” Most of the rest will see stagnant or falling wages but will benefit from plenty of “cheap fun and also cheap education.” For those wondering, this vanishing middle ground is where the book gets its catch-phrase title.
What will determine whether you end up a high earner or a low-wage left-behind will be, in large part, your answer to some variation on the following questions: “Are you good at working with intelligent machines or not? Are your skills a complement to the skills of the computer, or is the computer doing better without you?”
September 13, 2013
The Register‘s Andrew Orlowski speculates that we’ve hit PEAK SMARTPHONE:
Apple’s keynotes seem to command more mainstream front-page press attention than ever before — but each time, there’s less and less to report. Is the modern smartphone era limping to a close?
Apple’s announcements on Tuesday about the iPhone 5S and 5C were wearily predictable. Cupertino just doesn’t seem to be where the action is any more.
It is almost as if Apple and its arch-rival Samsung have exhausted themselves by suing each other around the world — and now look like two very knackered boxers agreeing to shuffle their way through the remaining rounds to the bell, rather than risk throwing big punches.
But the warning signs are there. Samsung reportedly held “crisis talks” this after sales of the Galaxy S4 failed to meet its expectations, Apple iPhone sales have declined for the past three quarters, and, well, “Peak Apple“.
Samsung piled on gimmicky and slightly creepy features like eyeball tracking, simply because it could. Apple’s user-facing innovation (the A7 64-bit chip is the real star of the show) entails building in a fingerprint scanner — a commodity laptop part for the past 10 years. Indeed, the only “radical” moves by Apple are adding colours to a slightly cheaper (but certainly not cheap) iPhone and rejecting NFC (or “Not F*cking Connecting”, as it’s known around here), which is a technology flop. Not so radical, then.
The stark truth is that smartphones, like computers, were only ever a means to an end — and once the services and apps markets matured, the smartphone itself became less … important. It didn’t really matter what access device you were carrying. The PC reached a point where the devices became beige boxes competing on price, and the smartphone era is drawing to the point where it doesn’t really matter what black rectangle you’re carrying — provided it accesses the services and apps you want. Fetishising the access devices is as strange as thanking LG or Panasonic for creating BBC2. No wonder both Samsung and Apple are looking at new higher-margin peripherals such as watches.
September 3, 2013
Oh, sorry, I misread the headline … it should say “Microsoft buys Finland’s tech sector“:
Microsoft has agreed a deal to buy Nokia’s mobile phone business for 5.4bn euros ($7.2bn; £4.6bn).
Nokia will also license its patents and mapping services to Microsoft. Nokia shares jumped 45% on news of the deal.
The purchase is set to be completed in early 2014, when about 32,000 Nokia employees will transfer to Microsoft.
While Nokia has struggled against competition from Samsung and Apple, Microsoft has been criticised for being slow into the mobile market.
Describing the deal as a “big, bold step forward”, Microsoft chief executive Steve Ballmer told the BBC that his company was in the process of transforming itself from one that “was known for software and PCs, to a company that focuses on devices and services”.
“We’ve done a lot of great work in the two-and-a-half years that we’ve been in partnership with Nokia, going literally from no phones to 7.4 million smart Windows phones in the last quarter that was reported,” he said.
But he admitted: “We have more work to do to expand the range of applications on our product.”
I guess we can now retire the “Microsoft is buying
RIM Blackberry” rumours…
August 18, 2013
A linkapalooza of information at Zero Hedge:
- Just weeks after NSA boss Alexander said that a review of NSA spying found not even one violation, the Washington Post published an internal NSA audit showing that the agency has broken its own rules thousands of times each year
- 2 Senators on the intelligence committee said the violations revealed in the Post article were just the “tip of the iceberg”
- Glenn Greenwald notes: “One key to the WashPost story: the reports are internal, NSA audits, which means high likelihood of both under-counting & white-washing”.(Even so, the White House tried to do damage control by retroactively changing on-the-record quotes)
- The government is spying on essentially everything we do. It is not just “metadata” … although that is enough to destroy your privacy
- The government has adopted a secret interpretation of the Patriot Act which allows it to pretend that “everything” is relevant … so it spies on everyone
- NSA whistleblowers say that the NSA collects all of our conversations word-for-word
- It’s not just the NSA … Many other agencies, like the FBI and IRS – concerned only with domestic issues – spy on Americans as well
That’s just the first few items of a long list. Read the whole thing.
August 13, 2013
In Maclean’s, Peter Nowak wonders why Microsoft hasn’t already purchased Blackberry:
The logic is pretty solid. Android and Apple have run away with the smartphone market, with the Canadian company clutching at a distant and declining third-place slice. The latest numbers say the company has indeed lost that spot to Microsoft and its Windows Phone.
That’s not cause for any excitement — these are low, single-digit scraps we’re talking about. Android and Apple have about 80 and 13 per cent of the market, respectively. (As an aside, it’s funny how those numbers are starting to look like the historical division between Windows and Mac computers, huh?)
So what’s the fastest and easiest way for a company to make its anemic market share bigger? It doesn’t take a mathematician to figure out the answer: combine it with somebody else’s equally anemic share into something with a little more meat on its bones. Putting BlackBerry and Microsoft’s Windows phones together would amount to almost seven-per-cent share. That’s still small, but it’s almost within striking distance of Apple.
More importantly, Microsoft — through an acquisition — would eliminate its biggest obstacle. In some countries, especially Canada. BlackBerry still enjoys decent success as the de facto third brand that buyers gravitate to because they’re loyal and/or hate Android and Apple. By most accounts, Windows Phone sales are extra anemic to non-existent in these markets as a result.