Feed Aggregator Page 2

Rendered on Fri, 04 Nov 2016 17:30:10 GMT  newer latest older 

State of Privacy in Chile: Future (im)perfect

via News by admin on Fri, 04 Nov 2016 14:01:53 GMT

Date: 
4 November 2016

The recent State of Privacy report on Chile shows a degree of stagnation in the field of policy reforms regarding privacy and personal data protection. At the same time recent developments have shown that risks to privacy continue to increase without proper public discussion or recourse for citizens.This is written by Juan Carlos Lara of Chilean organisation Derechos Digitales

In Chile, the protection of private life, private communications, and the sanctity of home lay the foundation that, in principle, provides individuals with sufficient protections from the abuse of both State and private actors. This framework, built on the Chilean Constitution and all human rights agreements of which Chile is part, also includes data protection law, specific safeguards for communication surveillance in criminal investigations, and penalises some privacy violations. But this framework, as shown in the State of Privacy report on Chile, has become stale and outdated in light of recent developments as well as current local and global trends.

From a public policy perspective, the outdated nature of the framework is most noticeable in data protection regulation, which consists of an outdated statute that was passed in 1999 and modified almost annually. Data protection law in Chile lacks proper consent rules, data protection authority, and effective procedures and sanctions against unlawful treatment of data. Although the current government has been drafting a new data protection bill for two and a half years, the draft bill has failed to enter Congress and no text of the proposal has been made publicly available.

This failure is only an expression of deeper problems with Chilean norms, which in turn reflects the sad state of affairs in the political arena. Discredited political actors from across the spectrum have failed to pass meaningful laws, and the lack of commitment by government allies prevents certain bills from even entering Congress. For example, an ongoing process to draft and approve a new Constitution which may include data protection (as the current Chilean Constitution is one of the few in the region without mention to personal data), is stalled and under heavy scrutiny by the opposing coalition.

And while laws become stagnant, new forms of collection and processing of personal and private data continue to thrive unopposed. Government surveillance capabilities are either actively being expanded or expansion is being sought, while rules passed long ago remain unfit to regulate or prohibit such activities. There are two recent situations which serve as examples of the obscurity of state surveillance and the ineffectiveness of the law.

The first example is the Hacking Team revelations from 2015, which revealed that an intermediary by the name of Mipolcar facilitated the sale and use of Hacking Team malware to the Chilean Investigations Polic. Their admission, however, included the claim that the use of such technology was legal and authorised by courts.Due to continued secrecy, it remains unknown where the malware has been used.

The second example is the use of three surveillance balloons since August 2015 by two municipalitiesin wealthy districts of Santiago, to film and monitor street level activity. The military-grade technology used by the municipalities allows for surveillance from up to a mile away, and has strong zooming capabilities, recording capabilities, and nocturnal vision. Similar balloons are reportedly also used in Afghanistan, the Gaza Strip and the Mexico-U.S. border. In this example, the balloons were installed in residential areas, where people could not only be followed and identified in the streets, but also in their homes.

Taking action against these balloons, several organisations on behalf of affected neighbours, filed a lawsuit on constitutional grounds against the two municipalities for their use of surveillance equipment, their violation of both privacy and the sanctity of home, as well as their collection of personal data without proper consent or legal authority. In the first decision on the matter in March 2016, the Court of Appeals of Santiago banned their use, but it was overturned on appeal. The Supreme Court, in its final ruling (case No. 18481-2016), recognised that this sweeping surveillance mechanism did indeed pose a threat to privacy and autonomy, but allowed their continued use provided some control mechanisms were put in place for the recordings and the access, use, and deletion of its records. Thus, rules and faculties that should be established by law and regulations, absent in this case, have been set by the judiciary with few or no mechanisms to enact proper safeguards.

In the end, it seems that the protection of the right to privacy in Chile is still too steep a price to pay when placed on the scales against the interests of the securitisation discourse and the incumbent market forces. But from the challenge arises an opportunity. Under these conditions, a sense of urgency for the protection of the privacy of Chile’s inhabitants continues to grow. The debates around seemingly unreachable milestones of a new Constitution, surveillance reform or a new data protection law, are also the opportunity to engage newer voices in policy discussions, to push political forces to move beyond party lines, and to help build a framework for the future of privacy and human rights, from the interest of citizens instead of State or corporations.

RioCard: concentration of money and data in Rio transportation system

via News by admin on Fri, 04 Nov 2016 13:57:51 GMT

Date: 
4 November 2016

This piece comes courtesy of Joana Varon, Natasha Felizi e Danilo Doneda.

Vast amounts of information is compiled in the different varieties of RioCard, Rio de Janeiro's transportation cards. Citizens use the card to gain access to discounts or integrated fares in the transportation system. RioCard may be used without registering an official account, but in order to create one, it is required that everyone register their name, ID number, and date of birth.

While not mandatory, having an account is an advantage for lower income people, as it allows one to reclaim their credit if they lose the card. Creating an account becomes mandatory if you have transportation discounts for being a student, elderly, or an unemployed person, or if your employer pays for your transportation. In these cases, according to the benefit you are entitled, data from your school (including your degree of education), or your work records (such as occupation, company name, date of admission) would also be collected. And if a student is part of public support programs, his or her family data, such as income, is also required when creating a RioCard account. Biometric data is also collected from elderly passengers. Information regarding transportation routes and travel habits are collected from every user's card, which is  linked to people’s identity, if they have a registered account. With such data, it is straightforward to surmise a person’s patterns, habits, and even home and work locations.  With this data, it may even become possible to predict a person’s actions.

This trend toward integration of more and more services into one central card, is replicated outside of transportation. For example, in preparation for the 2016 Olympics, RioCard announced a partnership with Visa and together launched the RioCardDuo, which allows for users to use their cards for shopping, allowing for a record to be created about people’s spending habits.

But information gathered on transportation system in Rio goes beyond the information stored in RioCard. In 2013, while students were protesting the price of the public transportations, Rio's mayor approved the "Pact for Transparency in Transports". Deploying GPS and cameras was part of the process, and once they were implemented, these cameras got another layer of pervasiveness, as biometric identification through facial recognition was approved for the buses in 2015.

With all this data being compiled on citizens, it would be reasonable to expect that public authorities are careful and transparent to assure that this information will be stored securely. But this is not the case. An investigation from Coding Rights for a project focused on narratives to unveil surveillance in Latin America,  showed that:

a) a majority of data is concentrated in the hands of very few entrepreneurs and a network of agents (labelled by some as "transportations mafia") that have already been the target of investigations due to the lack of transparency in the billing processes;

b) there is no transparency, or proper privacy regulation, to guarantee that the data is being handled with appropriate care.

The discounted transportation fares are a result of "Bilhete Único" public policy, established in 2009. To implement this policy, the State of Rio de Janeiro have granted exclusively to the Federation of Companies for Passenger Transportation of Rio de Janeiro (Fetranspor) for ticketing services of all bus tickets, ferry, subway, and train in Rio de Janeiro. The Federation is also owner of RioCard IT, which is responsible for managing the data collected by ticket cards.

Fetranspor brings together 10 trade unions and gathers around 200 bus companies throughout the state. While it may seem a diverse range of companies, their ownership is concentrated in a very few people and companies, which sometimes are registered as owners, others as partners or directors. As a result, for instance, the businessman Jacob Barata, dubbed in Rio de Janeiro as the "King of Bus", is direct or indirectly owner of approximately 25% of the bus fleet of the city of Rio.

Thus, in addition to the profits generating from Rio’s vast transportation system, this small group also controls swaths of personal information about people who use their services. The investigation from Coding Rights made several FOIA requests to Fetransport and RioCard. Neither company provided substantive answers regarding who has access to the data that is collected, if it is shared for any other purpose than billing, how it are stored, for how long it is retained, and many other details. It is known that the Fetranspor sends reports to the Secretariats for Transportation of the Municipalities and the State of Rio billing data, but there is no further regulation regarding what they can or shall do with all the data that is collected. The scenario gets worse considering that the country has not enacted a Data Protection law, which would properly establish principles and provisions for data management of public data by the private sector.

That remains a dream while the task of trying to find protections spread out across the multiple statutes becomes an increasingly difficult one.

The Battle for Encryption in Brazil

via News by admin on Fri, 04 Nov 2016 13:51:31 GMT

Date: 
4 November 2016

This piece was written by Danilo Doneda and Joana Varon from Brazil

The Facebook-owned messaging platform WhatsApp, leads in the Brazilian mobile messaging market, surpassing 100 million users. Brazilian users have long ceased to use SMS messaging as a means of daily communication. The strong presence of WhatsApp is favoured by some telecom companies delivering the service for 'free' in the zero-rating model, in which the use of the app doesn’t use a user’s data.

Hence, the multiple recent bans on WhatsApp’ services ordered by Brazilian magistrates ignited widespread discussion. Currently, the platform has been ordered to suspend its services four times, with law enforcement authorities arguing that the company hasn’t released to law enforcement user data which was deemed fundamental for criminal investigations. The issue recently escalated with WhatsApp adopting end-to-end encryption by default to all its users, meaning that in theory, the company will hold no user content data.

Throughout 2016, several court orders have demanded temporarily blockage of WhatsApp due to disputes over access to encrypted data, however, Brazilian Law does not prohibit or ban encryption. The most recent of these court orders occurred in October 2016. The third order occurred in July 2016 and the platform was subsequently banned in the country for hours. Unlike previous cases in which a magistrate required the company to produce users' IDs and the content of conversations, in this case the magistrate asked WhatsApp to disable its encryption and allow for real time monitoring of conversations. The case in question was an investigation on criminal organizations.

In the previous cases, WhatsApp's CEO Jan Koum argued: "Not only do we encrypt messages end-to-end on WhatsApp to keep people's information safe and secure, we also don't keep your chat history on our servers. When you send an end-to-end encrypted message, no one else can read it—not even us."

The core of the investigations are being kept secret, which means it is impossible to clearly extract the legal justification that underpins these orders. However, it should be taken into account that temporary blockage of applications is foreseen in Article 12 of the Civil Rights Framework (Marco Civil da Internet) as a possible sanction – but this sanction is intended to apply specifically and only if the right to privacy, data protection, and secrecy of communications are not respected in the Articles 10 and 11 by a connection or service provider (even if it is located abroad). Therefore, a provision that was enacted to increase protection of privacy may be mistakenly applied to implement an excessive and disproportional reaction.

This misleading interpretation has been so polemical that there are several draft bills addressing the issue of blocking applicationscurrently under debate in the National Congress, some of which forbid such practice interpreted as unnecessary and disproportional, while others were conceived to change the Internet Bill of Rights (Marco Civil da Internet, a law aimed at promoting internet users' rights) and explicitly allow for application blockage by court order, particularly in the context of criminal investigations. The Supreme Court is also holding a public hearing asking experts to provide technical inputs, particularly on how WhatsApp encryption can prevent access to the content of communications relevant for criminal investigations. The court is meant to deliver a decision on an action demanding the prohibition of application blockages but it is unclear when they intend to do that.

The latest attempt to force access to data also included another strategy: block Facebook's money. In July 2016, a judge blocked US$6.07 million of Facebook's cash, as WhatsApp as a service ran entirely from outside Brazil without bank accounts in the country. Nevertheless, the fight over sustaining encryption remains, even because what's at stake, more than one application or service in particular, is the very possibility of implementing a privacy-friendly technology to a very broad number of users, enabling privacy to non tech-savvy users and even to users unaware of the privacy risks embodied in unprotected communication tools.

Tracking the Global State of Privacy

via News by editor on Fri, 04 Nov 2016 13:48:13 GMT

Date: 
4 November 2016
Authors: 

In March 2016, Privacy International launched the State of Surveillance reports – a global effort to benchmark surveillance policies and practices in the countries that are part of the Global Privacy Network, by undertaking collaborative research with our partner organisations. Today, we update that work and expand on it- both topically and geographically- with the ‘State of Privacy’(link to page when created).

 Having already published State of Surveillance reports from partner organisations in Argentina, Chile, Colombia, India, Indonesia, Kenya, Morocco, Pakistan, the Philippines, Thailand, Tunisia and Uganda, we returned to these reports with the updated and expanded survey. We also have the pleasure in bringing in reports from new members of the Network, and now have reports on Brazil, Jordan, Mexico, and South Africa. (links to each of these pages including the ones above in the paragraph).

A new survey of questions was developed, expanding into areas beyond surveillance such as Data protection regulation; Smart Cities; Data breaches; Biometric IDs; Voter registration; SIM card registration, Cybersecurity, Cybercrime, Encryption, Licensing of telecommunications industry; E-governance; Health sector; Smart policing; Transport; Smart cities; Migration; Emergency response; Humanitarian programmes; and Social media.

These reports detail a number of growing trends, many of great concern. But the initiative itself is a positive trend. Around the world, more civil society organisations are standing up and getting involved in more debates about identity, about accountability of technology, about the exploitation of citizens’ data. This is a benchmarking exercise, but it is also a landmark initiative in the breadth and depth of the information that is available around the world courtesy of the next generation of privacy activists.

Growing up with technology while technology is growing up

There are a number of areas that a few years ago would have been considered emerging trends which can now be considered established orthodoxy for some countries. SIM Card Registration has now been established in 11 of the 16 State of Privacy countries (Argentina, Indonesia, Jordan, Kenya, Mexico, Morocco, Pakistan, South Africa, Thailand, Tunisia, Uganda), with two more countries – Chile and Colombia – currently discussing device registration.

When we look at emerging trends, Biometric identity card programmes are operating in 11 of the 16 State of Privacy countries (Argentina, India, Indonesia, Jordan, Kenya, Morocco, Pakistan, South Africa, Thailand, Tunisia, Uganda), with initiatives being discussed Brazil and the Philippines. In addition, “Smart City” initiatives have been launched in India (100 “smart cities” in the country by 2020), Indonesia (Jakarta), Jordan (Amman), Morocco (Casablanca), and the Philippines (Davao City).

That each of these “smart city” adopters are also – save the Philippines – Biometric identity adopters should come as no surprise. These countries have drunk the Kool-Aid on data: that data provides solutions to the social and infrastructural problems these countries face. All they need is more of it coming from more places. Biometric Identity cards were the vessel for that message years ago, it now seems initiatives like “Smart Cities” have become the next vessel.

So, with the increase in data collected about how citizens identify themselves, how they communicate, and how they interact with their city you would expect to see robust protection frameworks in place, right?

Wrong.

9 of the countries in the reports are completely without a comprehensive data protection law, including those countries racing towards innovation in the form of “smart cities”: Indonesia, India, and Jordan.

Well, you may ask, in absence of legal protections, at least if the data is protected at a technical level that should be sufficient….

If only. The ‘State of Privacy’ reports detail data breaches in Brazil, India, Mexico and the Philippines, among others, indicating that collecting data on its citizens appears to be more of a priority to States than securing it. 

Elections and security do not seem to go together these days with this year’s Philippines COMELEC breach of 55 million records of registered Filipino voters. The COMELEC breach was the largest data breach to date, for about a month. In April 2016,  a database containing voter registration records were published online in Mexico, exposing the personal information of 93.4 million Mexican citizens.

Brazil had data of 650,000 patient and public agents from the public health system of Sao Paolo leaked, the data included identification, address, phone number, and even medical information. And India was reported to have suffered 20 breaches in 2015 resulting in 32.1 million records being exposed.

Brave New Worlds

These trends demonstrate the challenges organisations from around the world working to strengthen the right to privacy face with data exploitation. The important point here is that those organisations exist, and Privacy International are able to support those groups working on this topic. This debate cannot just be about the United States or Europe; the majority of the world struggles with these issues. There are challenges – and solutions - out there that risk being muted due to the vaunted challenges faced by stereotypically “rich” or “developed” countries.

Privacy International and the Global Privacy Network will continue to update and expand on the State of Privacy as time passes. The next update will be in the new year. This is necessary as topics evolve so quickly and without warning that to try and present something static will inevitably age badly, and do so very quickly. If you’d like to suggest a country or topic to be included in a ‘State of Privacy’ report, we would love to hear from you at research@privacyinternational.org .

Bit by bit, we continue to build on the work begun years ago, aiming at creating a unique, forward looking resource that will develop over time, whatever those challenges are, and wherever they occur.

Google Linking Anonymous Browser Tracking with Identifiable Tracking

via Schneier on Security by Bruce Schneier on Thu, 03 Nov 2016 18:00:40 GMT

Google's new ways to violate your privacy and -- more importantly -- how to opt out....

Teaching a Neural Network to Encrypt

via Schneier on Security by Bruce Schneier on Thu, 03 Nov 2016 11:05:04 GMT

Researchers have trained a neural network to encrypt its communications. In their experiment, computers were able to make their own form of encryption using machine learning, without being taught specific cryptographic algorithms. The encryption was very basic, especially compared to our current human-designed systems. Even so, it is still an interesting step for neural nets, which the authors state "are...

Free Cybersecurity MOOC from F-Secure and the University of Finland

via Schneier on Security by Bruce Schneier on Wed, 02 Nov 2016 16:24:13 GMT

Looks interesting. Finnish residents can take it for credit....

Edward Snowden's Boss at Booz Allen Hamilton Speaks

via Schneier on Security by Bruce Schneier on Wed, 02 Nov 2016 11:48:37 GMT

Interesting. I have no idea how much of it to believe....

Another Shadow Brokers Leak

via Schneier on Security by Bruce Schneier on Tue, 01 Nov 2016 19:10:08 GMT

There's another leak of NSA hacking tools and data from the Shadow Brokers. This one includes a list of hacked sites. According to analyses from researchers here and here, Monday's dump contains 352 distinct IP addresses and 306 domain names that purportedly have been hacked by the NSA. The timestamps included in the leak indicate that the servers were targeted...

Card Game Based on the Iterated Prisoner's Dilemma

via Schneier on Security by Bruce Schneier on Tue, 01 Nov 2016 11:21:18 GMT

Interesting....

How to Avoid Kidnapping Children on Halloween

via Schneier on Security by Bruce Schneier on Mon, 31 Oct 2016 19:27:12 GMT

A useful guide....

A High-End Card-Reading Device

via Schneier on Security by Bruce Schneier on Mon, 31 Oct 2016 18:12:57 GMT

An impressive Chinese device that automatically reads marked cards in order to cheat at poker and other card games....

Friday Squid Blogging: Squid Nebula

via Schneier on Security by Bruce Schneier on Fri, 28 Oct 2016 21:11:00 GMT

Beautiful. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....

Eavesdropping on Typing Over Voice-Over-IP

via Schneier on Security by Bruce Schneier on Fri, 28 Oct 2016 10:24:23 GMT

Interesting research: "Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP": Abstract: Acoustic emanations of computer keyboards represent a serious privacy issue. As demonstrated in prior work, spectral and temporal properties of keystroke sounds might reveal what a user is typing. However, previous attacks assumed relatively strong adversary models that are not very practical in many real-world settings. Such strong models...

Hardware Bit-Flipping Attacks in Practice

via Schneier on Security by Bruce Schneier on Thu, 27 Oct 2016 19:23:20 GMT

A year and a half ago, I wrote about hardware bit-flipping attacks, which were then largely theoretical. Now, they can be used to root Android phones: The breakthrough has the potential to make millions of Android phones vulnerable, at least until a security fix is available, to a new form of attack that seizes control of core parts of the...

How Powell's and Podesta's E-mail Accounts Were Hacked

via Schneier on Security by Bruce Schneier on Thu, 27 Oct 2016 11:20:25 GMT

It was a phishing attack....

OPM Attack

via Schneier on Security by Bruce Schneier on Wed, 26 Oct 2016 18:37:56 GMT

Good long article on the 2015 attack against the US Office of Personnel Management....

Malicious AI

via Schneier on Security by Bruce Schneier on Wed, 26 Oct 2016 11:38:50 GMT

It's not hard to imagine the criminal possibilities of automation, autonomy, and artificial intelligence. But the imaginings are becoming mainstream -- and the future isn't too far off. Along similar lines, computers are able to predict court verdicts. My guess is that the real use here isn't to predict actual court verdicts, but for well-paid defense teams to test various...

How was the Internet of Things able to take down the Internet?

via The Privacy Blog by lance on Tue, 25 Oct 2016 00:00:54 GMT

A huge number of websites, including some of the biggest names, were knocked off the internet recently due to a gigantic distributed denial of service (DDoS) attack. A DDoS attack is where thousands to millions of devices all send traffic to a target to completely overload its servers or internet connection. In the recent case the […]

The post How was the Internet of Things able to take down the Internet? appeared first on The Privacy Blog.

UK Admitting "Offensive Cyber" Against ISIS/Daesh

via Schneier on Security by Bruce Schneier on Mon, 24 Oct 2016 19:12:27 GMT

I think this might be the first time it has been openly acknowledged: Sir Michael Fallon, the defence secretary, has said Britain is using cyber warfare in the bid to retake Mosul from Islamic State. Speaking at an international conference on waging war through advanced technology, Fallon made it clear Britain was unleashing its cyber capability on IS, also known...

 newer latest older