EU Agencies Propose Encryption Backdoors and Cryptocurrency Surveillance

The EU is attacking encryption again, this time in a report put together by several agencies, including EU law enforcement Europol, and the European Council’s Counter-Terrorism Coordinator.

This EU’s site says that this “first report on encryption” – by what the bloc calls its Innovation Hub for Internal Security, is looking for ways to “uphold citizens’ privacy while enabling criminal investigation and prosecution.”

“The main challenge is to design solutions that would allow at the same time a lawful and targeted access to communications and that guarantees that a high level of cybersecurity, data protection and privacy,” says the report.

The objective answer to the supposed conundrum of how to achieve both goals is always the same: you can’t.

Yet the EU, various governments, and international organizations continue to push to undermine online encryption and keep framing their initiatives the same way – as both their supposed care for privacy (and importantly, security), and making law enforcement’s job much easier (saying that the goal is to “enable” that, suggests there’s no other way to investigate, which is not true.)

And, how on Earth the EU intends to “safeguard fundamental rights” (of citizens) while at the same time proposing what it does in this document, is anybody’s guess. But EU bureaucrats are “safe” from being asked these questions – at least not by legacy, corporate media.

The report’s proposals include a number of ways to break encryption, mention encryption backdoors (the sneaky euphemism is, “lawful access” to communications and data), as well as password cracking and cryptocurrency and other forms of surveillance.

The not-so-subtle abuse of language and tone continues while discrediting encryption, as services like Meta’s Messenger, Apple Private Relay, and Rich Communication Systems (RCS) protocol are dubbed, “warrant-proof encryption technologies.”

Keep reading

UN’s Antonio Guterres unveils global game plan for surveillance, control and censorship

United Nations Secretary-General Antonio Guterres recently released a framework program titled “Global Principles for Information Integrity,” which outlines key recommendations on population control, surveillance and censorship.

The said project promotes the globalist rhetoric of ending “harmful misinformation, disinformation and hate speech” online. It claims to make information spaces safer while “upholding human rights such as the freedom of speech.”

“At a time when billions of people are exposed to false narratives, distortions and lies, these principles lay out a clear path forward, firmly rooted in human rights, including the rights to freedom of expression and opinion,” Guterres said, addressing the media at the UN headquarters in New York.

Guterres urged governments, tech companies, advertisers and the public relations (PR) industry to take responsibility for spreading and monetizing content that results in harm. He also demanded that the media and advertisers take control and establish official narratives while suppressing opposition.

For SHTF Plan‘s Mac Slavo, the international organization is building an information surveillance and control system that crafts authoritarian narratives that limit access to the truth. These will not only censor but will dictate and will police people on what to say and think and how to behave.

“The UN wants to create a world of simps who surrender their sovereignty and bow down to manipulative and abusive entities and false authorities,” Slavo said.

He added that Big Tech’s algorithms or automated review processes will be programmed to filter and remove content deemed objectionable or politically sensitive, including blocking websites, social media posts or entire platforms that would criticize their chosen stakeholders. Slavo further predicted possible internet shutdowns or access restrictions to specific websites in times of political unrest or during manufactured crises.

Keep reading

Federal Judge, ICE Agents Linked to Compromised Spyware Use

Sometimes the government spies on you. And sometimes they hire a poorly secured Eastern European firm to do it for them.

Last week, hacktivists published the customer support database for Brainstack, a Ukrainian company that runs a phone tracking service called mSpy. (It was the third mSpy security breach in a decade.) The database includes messages from Immigrations and Customs Enforcement (ICE) agents, active-duty troops, and a U.S. circuit court judge interested in using mSpy to conduct surveillance.

Employees at the U.S. State Department, the Nebraska National Guard, and two federal auditing offices reached out to mSpy about using the service in official investigations. Many more low-level officials and service members seemed to be using mSpy to monitor people in their private lives, but signed up through their government emails. In some cases, it was unclear whether government employees were using mSpy for official or personal business. 

Even if the private spying was for a legitimate purpose—such as parents monitoring their children’s internet usage—it was probably not the best idea to sign up for foreign spyware with known security issues from a government email account.

Judge Kevin Newsom, the circuit judge of the United States Court of Appeals for the 11th Circuit, used his government email address to log into an mSpy customer service chat in February 2019. “You can’t reliably monitor Snapchat, which is the only reason I got it,” he complained. He sent mSpy a follow-up email asking for a refund, signed with his official title as a judge.

“Judge Newsom’s use was entirely in his personal capacity to address a family matter,” says Kate Adams, director of workplace relations at the 11th Circuit.

MSpy has previously suffered serious security problems over the past decade. In May 2015, hackers stole data on mSpy’s targets and offered it for sale on the dark web. When cybersecurity journalist Brian Krebs broke the story, mSpy tried to claim the data was fake, then eventually admitted to the breach. In September 2018, mSpy accidentally left that same type of data on a public-facing server, then removed it when Krebs noticed.

In early June 2024, the Swiss hacktivist maia arson crimew, who had previously leaked the FBI’s No Fly List, claimed that an “anonymous source” had sent her 150 gigabytes of data from mSpy’s customer service branch. “From all the past stalkerware leaks, usually what leaks is victim data,” crimew tells Reason via encrypted voice chat. But this leak was about mSpy’s clients—essentially turning the surveillance back against the surveilers.

Last week, the leaked client data was published on DDoSecrets, a website widely considered to be WikiLeaks’ successor. (DDoSecrets is also famous for hosting BlueLeaks, a massive 2020 leak of police files.) The mSpy media team did not respond to an email asking for comment on the leak.

Keep reading

5 Devices You Can’t Hide From the Government ‘Alphabet Agencies’

I’m going to alert you to what many are considering to be on of the worst doomsday scenarios for free American patriots. One that apparently not many are prepping for, or even seem to care about.

By now everybody knows that the government ‘alphabet agencies’ including mainly the NSA have been methodically collecting data on us. Everything we do, say, buy and search on the internet will be on permanent data base file by next year. All phone calls now are computer monitored, automatically recorded and stored with certain flag/trigger words (in all languages).

As technology improves, every single phone call will be entirely recorded at meta-data bases in government computer cloud storage, when ‘They’ finish the huge NSA super spy center in Utah. Which means they will be available anytime authorities want to look them up and personally listen for any information reference to any future investigation. Super computer algorithms will pin point search extrapolations of ANY relationship to the target point.

You can rest uneasily, but assured, that in the very near future when a cop stops you and scans your driver license into his computer, he will know anything even remotely ’suspicious’ or ’questionable’ about ALL the recent activities and behavior in your life he chooses to focus upon!

This is the ‘privacy apocalypse’ coming upon us. And you need to know these five devices that you can run to protect your privacy, but you can’t hide from.

Keep reading

CARNIVORE (DCS1000): FBI Files on Their Email and Electronic Communication Monitoring Software

In the late 1990s and early 2000s, the FBI’s Carnivore system drew considerable attention and debate. Unveiled during this period, Carnivore was a sophisticated email wiretapping system designed to intercept and analyze digital communications. The system’s capabilities and the implications for privacy and civil liberties were subjects of intense scrutiny and concern among privacy advocates, Internet service providers (ISPs), and the public at large.

Carnivore, officially known as DCS1000, was a network diagnostic tool utilized by the FBI to monitor and intercept email and other online communications. The system was installed at an ISP’s premises and was capable of scanning vast amounts of digital data passing through the ISP’s network. Carnivore specifically targeted communications of suspects under investigation, allowing the FBI to capture emails, chat sessions, and other forms of online interactions.

The Carnivore system operated by tapping into the ISP’s network and filtering the data packets that flowed through it. According to an internal FBI document, the system was designed to “ensure that only the exact communications authorized by the court to be intercepted are what is intercepted”​​. This meant that Carnivore could be configured to capture only the communications of a specific target while excluding all other traffic.

Keep reading

Scotland Plans Live Facial Recognition Technology

More controversy is developing in the UK, this time in Scotland, around the use by law enforcement of cameras equipped with live facial recognition technology.

Reports say that the police in Scotland may intend to start using this tech to catch shoplifters and persons who break bail conditions. But civil rights group Big Brother Watch is warning against any kind of deployment of live facial recognition as incompatible with democracy – primarily because it indiscriminately jeopardizes the privacy of millions of people.

To make sure this is not happening, the non-profit’s head of research Jake Hurfurt has told the press that the tech should be banned.

That would be an improvement also from the point of view of legal clarity around how AI and big data are used by law enforcement; since currently, Hurfurt remarked, the government and the police “cobble together patchwork legal justifications to experiment on the public with intrusive and Orwellian technology.”

Big Brother Watch offered another observation – the UK is a rare country outside of China and Russia (apparently, even the EU is “scaling back”) that is ramping up this type of surveillance.

The previous heated debate over live face recognition had to do with the London police, and at the moment, the Met’s decision to deploy it – besides being “a multi-million pound mistake,” is also facing a legal challenge, the group said.

They are hopeful this might serve as a teachable moment for the police in Scotland and dissuade them from repeating the same costly “experiment” of trying to usher in a “hi-tech police state.”

Keep reading

The UN Cybercrime Draft Convention is a Blank Check for Surveillance Abuses

The United Nations Ad Hoc Committee is just weeks away from finalizing a too-broad Cybercrime Draft Convention. This draft would normalize unchecked domestic surveillance and rampant government overreach, allowing serious human rights abuses around the world.

The latest draft of the convention—originally spearheaded by Russia but since then the subject of two and a half years of negotiations—still authorizes broad surveillance powers without robust safeguards and fails to spell out data protection principles essential to prevent government abuse of power.

As the August 9 finalization date approaches, Member States have a last chance to address the convention’s lack of safeguards: prior judicial authorization, transparency, user notification, independent oversight, and data protection principles such as transparency, minimization, notification to users, and purpose limitation. If left as is, it can and will be wielded as a tool for systemic rights violations.

Countries committed to human rights and the rule of law must unite to demand stronger data protection and human rights safeguards or reject the treaty altogether. These domestic surveillance powers are critical as they underpin international surveillance cooperation

Keep reading

Musk Declares War on Apple: Threatens to Ban Devices Over “Creepy Spyware” AI Integration

Elon Musk, the CEO of Tesla, SpaceX, and X (formerly Twitter), has declared war on big tech Apple.

The tech mogul threatens to ban Apple devices across his companies unless Apple abandons its plans to integrate OpenAI’s woke ChatGPT technology into its operating system.

Apple announced on Monday that it would be integrating ChatGPT into iOS, iPadOS, and macOS. This integration would allow users to access ChatGPT’s capabilities, including image and document understanding, without needing to switch between tools. Siri, Apple’s virtual assistant, could also tap into ChatGPT’s intelligence when necessary.

“We’re excited to partner with Apple to bring ChatGPT to their users in a new way. Apple shares our commitment to safety and innovation, and this partnership aligns with OpenAI’s mission to make advanced AI accessible to everyone. Together with Apple, we’re making it easier for people to benefit from what AI can offer,” said Sam Altman, CEO of OpenAI.

“It’s personal, powerful, and private—and it’s integrated into the apps you rely on every day. Introducing Apple Intelligence—our next chapter in AI,” said Tim Cook, Apple’s CEO.

In response to Tim Cook’s announcement, Musk stated, “Don’t want it. Either stop this creepy spyware or all Apple devices will be banned from the premises of my companies.”

Keep reading

Ugandan human rights lawyer’s arrest exposes use of national ID for surveillance

A Ugandan human rights lawyer’s recent arrest highlights the country’s surveillance and government control via the use of the national identification card.

First introduced by the National Identification and Registration Authority (NIRA) nearly a decade ago, Uganda’s national ID card was initially touted as a solution to streamline administrative processes and bolster citizen services.

However, Nick Opiyo, one of Uganda’s human rights lawyers, believes that there was an ulterior motive for his December 2020 imprisonment as he became ensnared in this surveillance dragnet, enduring arbitrary detention and harassment for his endeavors to expose state-backed human rights transgressions, a Bloomberg feature uncovers. His plight spotlights the impact of state surveillance on dissent and freedom of expression.

In fact, a 2023 study by the African Center for Media Excellence (ACME) concludes that the implementation of biometric and digital identity (BDI) programs in Uganda has given room for surveillance and intrusion on journalism and media in the region, unveiling that journalists in the country have become targets due to the mass collection of data under the government’s biometric and digital ID programs and its ability to engage in communications surveillance.

The expansion of Uganda’s surveillance apparatus hasn’t gone unnoticed by the global community.

Presently, in the country, possessing a NIRA-issued ID card isn’t just advantageous but essential for accessing fundamental services and participating in societal affairs.

Keep reading

Pentagon’s AI office awards Palantir a contract to create a data-sharing ecosystem

The Department of Defense’s Chief Digital and Artificial Intelligence Office, or CDAO, leveraged its marketplace for fast-tracking the acquisition of innovative technologies to award Silicon Valley-based Palantir a contract to develop a data-sharing ecosystem — a tool that will help the Pentagon with its connect-everything initiative.

CDAO announced last Thursday that the ecosystem — known as Open Data and Applications Government-owned Interoperable Repositories, or Open DAGIR — will enable the Department of Defense to scale its use of data, analytics and artificial intelligence capabilities through greater collaboration with private sector partners. 

Palantir said it received a $33 million prototype Other Transaction award from CDAO “to rapidly and securely onboard third-party vendor and government capabilities into the government-owned, Palantir-operated data environment to meet priority combatant command digital needs.”

The contract was awarded through CDAO’s Tradewinds Solution Marketplace, which allows private firms of all sizes to pitch DOD their AI, machine learning and data capabilities through five minute infomercial-style videos. Once companies are accepted into the marketplace, Pentagon components can search the platform to view videos of solutions from industry partners. Companies, in turn, are able to access post-competition, readily awardable contracts. 

Bonnie Evangelista, CDAO’s acting deputy for acquisition directorate, told Nextgov/FCW earlier this year that the platform can significantly shorten the time it takes for companies to receive DOD contracts.

During a NetApp conference on Tuesday, CDAO Director of Procurement Quentin McCoy said Palantir’s use of the Tradewinds marketplace allowed it to receive the award for Open DAGIR in 30 days. 

“It’s a sort of healthy prototype,” McCoy said about the Open DAGIR solution Palantir will provide, noting that “it’s going to allow industry and government to ingest data together and share and bring in third-party vendors to do this action.”

DOD said it will initially use Open DAGIR to support its Combined Joint All Domain Command and Control — or CJADC2 — initiative that is designed to promote interoperability across disparate military environments. Deputy Secretary of Defense Kathleen Hicks announced in February that CDAO had achieved “the minimum viable capability” of the information-sharing network.

CDAO is also planning to use its ongoing Global Information Dominance Experiments, or GIDE, to determine whether any additional capabilities should be added to the Open DAGIR ecosystem. GIDE is designed, in part, to help inform the Pentagon’s use of emerging technologies to support its CJADC2 initiative. 

The GIDE series — created by U.S. Northern Command and relaunched by CDAO last year — tests out AI and data analytics tools to determine how they can be used for military decisionmaking. The department finished its GIDE 9 iteration in March. 

McCoy said CDAO is planning to hold several industry days in the next few months, including one scheduled for mid-July, in preparation for the office’s next GIDE iteration. 

Keep reading