thewayne: (Default)
The Electronic Frontier Foundation has developed an open-source toolkit that, when installed in a very inexpensive portable hot spot, the device will report whether it sees any cell-site simulators (CSS) in your area.

CSS devices, also known as Stingrays, allow law enforcement to capture all identifying information in an area with great precision. It is blanket surveillance. The problem is that while they may have a warrant to surveil Suspect X, they don't have warrants to surveil and capture information on me, you, and everyone around us. Stingrays capture everyone's location information in their effective operating range and logs it. Also, we know very little about how these devices operate: this info is kept under very tight lockdown by the manufacturers and by the law enforcement agencies. There has been very little success in law suits filed to pry this information into direct sunlight.

Some CSS units can go beyond locating the suspect's phones and actually intercept communications. Whether they can intercept everyone's comms who it has sucked into connecting to it isn't known.

The concern is whether CSS is being used to surveil protests and religious gatherings, things that are protected by the First Amendment. There is some evidence that points to this, it is not known how widespread such surveillance may be.

This new toolkit by the EFF is called Rayhunter, i.e. hunting for stingrays. It requires the purchase of an Orbic WiFi hotspot, links in the article to Amazon and eBay show them available for $10-20. The software to turn the Orbic into a Rayhunter is available on the EFF site, but you must be running Linux or Mac OS to install it - no package for Windows at this time. I suppose you could probably run a Linux VM on Windows to install it that way. Once installed and running, in the presence of CSS a red line will appear on the top of the display and the event will be logged, otherwise a green line will show. Connecting to the device's browser will let you review the log file.

The device is not a counter-surveillance tool, it does nothing to interfere with CSS which would be against many FCC rules and probably against local and Federal law. The EFF believes that the Rayhunter is legal under U.S. law, but if you're not in the USA then you should talk to an attorney in your area to see what kind of risk that you might be taking.

Myself, I'd look into rehousing it into something else, like, say, a Gameboy box that also works as a Gameboy, as eventually The Powers That Be will be looking for people carrying this particular model of Orbic devices and plausible deniability might begin running thin. For the paranoids amongst us, perhaps having a tamper switch on the Gameboy that would fry the memory if it's opened incorrectly.

https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying
thewayne: (Default)
This is a VERY important case! A guy founded a website, public.resource.org, and began posting public laws, rules, and regulations that were passed and codified. Things like electrical regulations, etc.

Naturally he got sued by trade organizations that published these rules and made lots of bucks! Can't have people giving away our bread and butter!

Last month an appeals court confirmed an appeal of a 2022 decision upholding the site's right to publish this information.

From the EFF post: "As part of its mission of promoting public access to all kinds of government information, Public Resource acquires and posts online a wide variety of public documents, such as nonprofits’ tax returns, government-produced videos, and standards incorporated into law by reference. These standards include electrical, fire safety, and consumer safety codes that have been mandated by governments. But without Public Resource’s work, they are often difficult to access, much less share with others, which means that areas of law that profoundly affect our daily life are obscured from our view. Even courts have had trouble accessing the laws that they are supposed to apply.

The American Society for Testing and Materials (ASTM), National Fire Protection Association Inc. (NFPA), and American Society of Heating, Refrigerating, and Air-Conditioning Engineers (ASHRAE) are organizations that develop private sector codes and standards aimed at advancing public safety, ensuring compatibility across products and services, facilitating training, and spurring innovation.

ASTM, NFPA, and ASHRAE sued Public Resource in 2013 for copyright and trademark infringement and unfair competition."


It's nice to know that we do sometimes get our tax dollars worth, though sometimes it takes quite the fight for it to happen.

I might be able to use this as a source at my library. I've had requests for legal citations, and we don't have the material. THIS might have it! Definitely worth looking in to. And some of those nonprofit tax returns could also be interesting reading.

https://www.eff.org/press/releases/appeals-court-upholds-publicresourceorgs-right-post-public-laws-and-regulations

https://yro.slashdot.org/story/23/09/17/1647253/public-resource-wins-2012-case-judge-rules-posting-regulations-online-is-fair-use
thewayne: (Default)
Of course there's the 'absent exigent circumstances' clause inserted, always gotta have that. Regardless, huge step forward for privacy.

This is both complicated and simple. The simple part is that the government has a reasonable interest in preventing some things from entering the country, like drugs, undeclared/untaxed items, etc. But at the same time, our phones have become digital repositories of our lives, and even though it is not a declared constitutionally-protected value, we do have some legal rights to privacy.

From the article: "Just as in Riley, the cell phone likely contains huge quantities of highly sensitive information—including copies of that person’s past communications, records of their physical movements, potential transaction histories, Internet browsing histories, medical details, and more … No traveler would reasonably expect to forfeit privacy interests in all this simply by carrying a cell phone when returning home from an international trip."

Apple introduced a feature in the previous(?) version of their phone operating system that disables the interface port and the facial recognition unlock to tighten security. It is recognized that the government has to go through great lengths to compel you to produce something you know - a password or passcode - versus something you posses - a key to a lockbox or your fingerprint or face, being the key to your phone. By disabling these, your phone is much harder to access since the phone will wipe itself after X number of failed attempts. I believe Android has something similar, but I'm not familiar with their specifics.

A lot of people would simply wipe their phone before re-entering the USA, then reload their contacts from an iCloud backup once they're past Customs and restore everything once they're back home to avoid such things.

A second part of the article is also quite interesting: The court focused on the internet and cloud storage, stating: “Stopping the cell phone from entering the country would not … mean stopping the data contained on it from entering the country” because any data that can be found on a cell phone—even digital contraband—“very likely does exist not just on the phone device itself, but also on faraway computer servers potentially located within the country.” This is different from physical items that if searched without a warrant may be efficiently interdicted, and thereby actually prevented from entering the country."

But I'm not sure what this means for potential laptop searches and siphoning. Best to use solid full-disk encryption and a BIOS password if you're at all concerned about your laptop contents.

https://www.eff.org/deeplinks/2023/05/federal-judge-makes-history-holding-border-searches-cell-phones-require-warrant

https://yro.slashdot.org/story/23/05/31/0439200/federal-judge-makes-history-in-holding-that-border-searches-of-cell-phones-require-a-warrant
thewayne: (Cyranose)
NSL's are investigative tools used by the FBI to "fight terrorism". They go to an internet service provider, or a bank, or a library, and slap down the letter requesting information about a customer/client. The letter not only requires information, but is also a gag order on discussing it.

This particular case has a heck of a twist. An ISP was issued an NSL and appealed. "After the telecom challenged the NSL, the Justice Department took its own extraordinary measure and sued the company, arguing in court documents that the company was violating the law by challenging its authority."

The EFF was working with the ISP to challenge the NSL ASAP, IYKWIM. And a judge said there were lots of problems with them and has banned them, but the government has 90 days to appeal to the 9th Circuit.

I'm sure this will end up in the SCOTUS, one way or another. And it really needs to be exposed there, because unlike a search warrant, the FBI doesn't need a judge or demonstrated probable cause to get an NSL. They've been abused in the past, they're a bad tool, and they should be banned.

http://www.wired.com/threatlevel/2013/03/nsl-found-unconstitutional/
thewayne: (Default)
Apparently they didn't like Eckhart calling their software a rootkit and sent him a C&D. Eckhart sent it to the EFF, who sent Carrier a letter explaining that Eckhart is within his constitutional rights.

http://www.h-online.com/security/news/item/Carrier-IQ-drops-cease-and-desist-against-security-researcher-1384209.html
thewayne: (Cyranose)
Just goes to show that almost anything good can be twisted. I was going to say perverted, but we're talking about child pornography, and that is really beyond perversion. The hosting service, ironically called Freedom Hosting, hosted 40+ web sites dedicated to illegal porn, one such site called Lolita City reportedly had 100 gig of such stuff.

The dark net stuff is the interesting part. I've often wondered how such a thing would be created, and it has been done: they use TOR, The Onion Router, an anonymizing software package from the Electronic Freedom Foundation that was intended for people in highly-restrictive countries like China and Iran to be able to access the internet and get information out without the government being able to trace it back to them.

Anonymous learned of Freedom Hosting providing services for this site, sent them a demand telling them to remove this content, and when Freedom didn't, Anonymous took them offline.

http://www.securitynewsdaily.com/anonymous-hackers-child-porn-sites-1260/

http://yro.slashdot.org/story/11/10/22/1325238/anonymous-hackers-take-down-child-porn-websites
thewayne: (Default)
Very interesting stuff. This guy, John Barlow, is not only a co-founder of the Electronic Freedom Foundation, he was also a lyricist for the Grateful Dead. He had some very interesting takes on what the other people on the panel were saying because, unlike them, he personally produced creative entertainment.

http://arstechnica.com/tech-policy/news/2011/05/eff-co-founder-enters-copyright-lions-den-rips-into-lions.ars

http://politics.slashdot.org/story/11/05/25/1157250/EFF-Co-founder-Faces-Copyright-Heavyweights-At-EG8
thewayne: (Default)
It's an interesting proposition, and it's not using current router tech. Basically, each person who connects to a router would be separately encrypted, presumably through a shared key. The problem is that once someone can connect to a router it isn't too difficult to listen in to other people's traffic. If each connection is separately encrypted, you pretty much eliminate that possibility.

https://www.eff.org/deeplinks/2011/04/open-wireless-movement (their site kinda sucks, on my browser I have to scroll down quite a bit to get to the text)

http://mobile.slashdot.org/story/11/04/28/150241/EFF-Advocates-Leaving-Wireless-Routers-Open


At the same time, you have the issue that people are getting raided by ATF/DHS/MOUSE at 3am, getting guns pointed at their head, having people with guns shout at them that they're child molesters, and they didn't do anything: people used their open connection to download porn, and in one case, send death threats to the vice president. I'm not entirely clear on how full encryption will prevent this. But for the time being, I'm keeping my router encrypted, no broadcast SSID, and MAC filtering. It's not totally hack-proof, but it's as close as I can easily get. I'd like to have an open router, but if I do, it's going to have all connections logged.
thewayne: (Cyranose)
If you have a business with extensive intellectual property holdings, the TPP (Trans Pacific Partnership Agreement) is probably a great treaty for you. But just like ACTA, it's being negotiated pretty much in total secrecy. And just like ACTA, it's been leaked.

Some of the provisions would make the U.S. patent (USPTO) a rubber-stamp for applications (which sucks because Congress is actually looking at making some significant improvements there), ISP's would become extensions of Hollywood when it comes to copyright enforcement, parallel import would be banned (no more gray market goods), criminal enforcement would be REQUIRED for DRM circumvention(!). I'm sure there's more lovely stuff in it.

The Techdirt article also has links to more info at the EFF with more details and a list of all Congresscritters in both the House and Senate so you can easily contact them and express displeasure.

I just wish they would try to negotiate this in the open. There's no reason for this to be secret, except for the fact that Hollywood wants to be able to totally side-step the normal method for creating laws and gain a fait accompli over everyone.

Now, as if this isn't bad enough, they want a VERY fast approval: they want it all to be wrapped up in November OF THIS YEAR.

http://www.techdirt.com/articles/20110311/00104713434/us-proposals-secret-tpp-son-acta-treaty-leaked-chock-full-awful-ideas.shtml

https://secure.eff.org/site/Advocacy?cmd=display&page=UserAction&id=471

http://yro.slashdot.org/story/11/03/11/2134224/Son-of-ACTA-Worse-Than-Original


[EDITED 15-JUNE-2013 TO ADD TOR TAG]
thewayne: (Default)
It's been an interesting few days. First, the full text of the working ACTA treaty is to be released on the 21st. All of the countries attending the conference in New Zealand were in favor of its release, saying that earlier release was premature. It has been leaked massively and those unofficial copies were not at all friendly to personal digital rights. Allegedly the forthcoming release will not include border searches of electronic equipment and USB flash drives, we'll see what it contains soon enough.

http://www.zdnet.co.uk/news/regulation/2010/04/16/acta-copyright-enforcement-treaty-to-go-public-40088663/?tag=mncol;txt

http://politics.slashdot.org/story/10/04/17/0050203/ACTA-Draft-To-Be-Made-Public-Next-Week


There's always fun in ??AA land! The entertainment industry submitted a wish list in response to "Intellectual Property Enforcement Coordinator's request for comments on the forthcoming "Joint Strategic Plan" for intellectual property enforcement." Included in the list:

"Anti-infringement" software for home computers
Pervasive copyright filtering
Intimidate and propagandize travelers at the border
Bully countries that have tech-friendly policies (such as Canada, the vile den of sinners!)
Federal agents working on Hollywood's clock

Yes, they want armed Federal DOJ and DHS officers protecting Independence Day 2.

http://www.eff.org/deeplinks/2010/04/entertainment-industrys-dystopia-future (you might need to scroll down a bit to get to the article text, it displays a lot of white space on my Mac in the latest Firefox)

http://www.tomsguide.com/us/RIAA-MPAA-Illegal-downloads-Torrent,news-6496.html

http://yro.slashdot.org/story/10/04/17/1211205/Media-Industry-Wants-Mandated-Spyware-and-More?art_pos=28

December 2025

S M T W T F S
  12 3456
78 9 1011 1213
14151617181920
2122 23 24252627
28293031   

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Dec. 24th, 2025 06:02 pm
Powered by Dreamwidth Studios