UK Government Greases Skids For Fleets of Surveillance Drones Over Cities

In what appears to be a cynical PR stunt, the UK government is considering plans to allow women who feel threatened on the street to call upon surveillance drones that would arrive in minutes and shine a bright light on any potential attacker.

What could possibly go wrong?

“Women in fear of an attack will be able to use a phone app to summon a drone, which could arrive within minutes armed with a powerful spotlight and thermal cameras to frighten off any potential assailant,” reports the Telegraph.

Trials will take place on campus at Nottingham University at a cost of £500,000 during which the tech will be used to “protect students and staff.”

The scheme will be submitted to the UK government’s Innovate research program, and could eventually see helicopters being replaced by drones as a front line tool of law enforcement.

“It is a high capability drone that costs just £100 an hour but can do 80 percent of what a police helicopter can do,” said Richard Gill, the founder of Drone Defence. “It cannot do high speed pursuits but it can do the other tasks such as searching for people and ground surveillance.”

Gill noted that 25 drones could do the job of one police helicopter in London for the same price, with the drones being housed at five base locations across the city.

The idea of countless government drones whizzing around a city keeping tabs on people is garishly dystopian.

Keep reading

In 2021, the Police Took a Page Out of the NSA’s Playbook: 2021 in Review

With increasing frequency, law enforcement has been using unconstitutional, suspicionless digital dragnet searches in an attempt to identify unknown suspects in criminal cases. Whether these searches are for everyone who was near a building where a crime occurred or who searched for a keyword like “bomb” or who shares genetic data with a crime scene DNA sample, 2021 saw more and more of these searches—and more attempts to push back and rein in unconstitutional law enforcement behavior.

While dragnet searches were once thought to be just the province of the NSA, they are now easier than ever for domestic law enforcement to conduct as well. This is because of the massive amounts of digital information we share—knowingly or not—with companies and third parties. This data, including information on where we’ve been, what we’ve searched for, and even our genetic makeup, is stored in vast databases of consumer-generated information, and law enforcement has ready access to it—frequently without any legal process. All of this consumer data allows police to, essentially, pluck a suspect out of thin air.

EFF has been challenging unconstitutional dragnet searches for years, and we’re now seeing greater awareness and pushback from other organizations, judges, legislators, and even some companies. This post will summarize developments in 2021 on one type of dragnet suspicionless search—reverse location data searches.

Keep reading

FBI ‘Secret Spy Plane Surveillance Program’ Detailed in Court Records

The FBI’s so-called “secret spy plane surveillance program” is under scrutiny in a Florida terrorism case, where the defendant has asked a U.S. judge to toss evidence from the bureau’s aerial surveillance activities.

The FBI’s aerial surveillance program was first revealed in June 2015 by the Associated Press, which reported that the bureau maintained a civilian air force through private shell companies. The FBI admitted to the program days later, saying in a statement that “it should come as no surprise that the FBI uses planes to follow terrorists, spies, and serious criminals.”

“Contrary to some recent media reporting, the FBI’s aviation program is not classified. Some of our aircraft are registered covertly because overt registration would put our aircraft and operations at risk of compromise,” the FBI said at the time.

Nevertheless, the existence of the FBI’s program sparked outrage among civil libertarians, who celebrated when U.S. Court of Appeals for the 4th Circuit found in June that a similar program operated by the Baltimore Police Department violated the Fourth Amendment.

Keep reading

Canada Admits To Secretly Tracking 33 Million Phones During Covid-19 Lockdown

Canada – which has a population of 38 million – has admitted to secretly tracking 33 million phones during the Covid-19 lockownaccording to the National Post, citing Blacklock’s Reporter which first noted the disclosure.

The country’s Public Health Agency (PHAC) did so to assess “the public’s responsiveness during lockdown measures,” according to the report.

In March, the Agency awarded a contract to the Telus Data For Good program to provide “de-identified and aggregated data” of movement trends in Canada. The contract expired in October, and PHAC no longer has access to the location data, the spokesperson said. -National Post

Evidence is coming in from many sources, from countries around the world, that what was seen as a huge surveillance surge — post 9/11 — is now completely upstaged by pandemic surveillance,” according to “Pandemic Surveillance” author David Lyon, the former director of the Surveillance Studies Centre and Queen’s University in Ontario. “I think that the Canadian public will find out about many other such unauthorized surveillance initiatives before the pandemic is over—and afterwards.”

Location and movement data was purchased from Canadian telecom giant Telus in order to “understand possible links between the movement of populations within Canada and the spread of COVID-19,” according to an agency spokesperson, who said that the mobility data analysis “helps to advance public health objectives.”

Keep reading

Americans get warning they’re being watched digitally

Americans are getting a warning that they are being watched digitally, whether they agree to the spying or not.

The warning is coming from the Rutherford Institute, which has filed a friend-of-the-court brief in a dispute now pending before the Supreme Court, in Hammond v. U.S.

The warning is that “Americans are being swept up into a massive digital data dragnet that does not distinguish between those who are innocent of wrongdoing, suspects, or criminals. “

The Rutherford Institute said it is “challenging the government’s unconstitutional practice of warrantlessly tracking people’s location and movements through their personal cell phones in violation of the Fourth Amendment.”

Keep reading

Amazon patents show new level of surveillance

Amazon has registered 17 new patents for biometric technology intended to help its doorbell cameras identify “suspicious” people by scent, skin texture, fingerprints, eyes, voice, and gait.

The tech giant has been developing its doorbell security camera system since 2018, when Amazon acquired the firm named Ring and, with it, the original technology. According to media reports, Jeff Bezos’ company is now preparing to enable the devices to identify “suspicious” people with the help of biometric technology, based on skin texture, gait, finger, voice, retina, iris, and even odor.

On top of that, if Amazon’s new patents are anything to go by, all Ring doorbell cameras in a given neighborhood would be interconnected, sharing data with each other and creating a composite image of “suspicious” individuals.

One of the patents for what is described in the media as a “neighborhood alert mode” would allow users in one household to send photos and videos of someone they deem ‘suspicious’ to their neighbors’ Ring cameras so that they, too, start recording and can assemble a “series of ‘storyboard’ images for activity taking place across the fields of view of multiple cameras.

Aside from the possible future interconnectivity among the Ring devices themselves, Amazon’s doorbell cameras, as it stands now, already exchange information with 1,963 police and 383 fire departments across the US, according to Business Insider. Authorities do not even need a warrant to access Ring footage.

Keep reading

Attract Government Attention and Get Your Name Run Through a ‘Terrorist’ Database

In 2021, it’s unfortunately not surprising to learn about routine federal surveillance of people who attract official attention. We live, after all, at a moment when freedom looks haggard and unloved even in liberal democracies and a record number of journalists are behind bars. That the practice of running people’s names through multiple government databases appears to be routine doesn’t bode well for the United States, let alone the world beyond.

“Documents obtained by Yahoo News, including an inspector general report that spans more than 500 pages” expose snooping by Customs and Border Protection’s (CBP) Counter Network Division, Jana Winter wrote in a December 11 report. “The division, which still operates today, had few rules and routinely used the country’s most sensitive databases to obtain the travel records and financial and personal information of journalists, government officials, congressional members and their staff, NGO workers and others.”

CBP agent Jeffrey Rambo was initially implicated for inquiries about Ali Watkins, a reporter at The New York Times. That included “pulling email addresses, phone numbers and photos from passport applications and checking that information through numerous sensitive government databases, including the terrorism watchlist.” But it quickly becomes apparent that he’s been hung out to dry for doing what he was told by means that are considered normal within the federal government.

“According to records included in the inspector general report, such vetting was standard practice at the division,” Winter adds.

Given the range of tools available to the feds, it’s not a shock that their use has become rote. What’s the point of having vast (if unreliable) databases on people’s activities if you’re not going to use them? To the databases, add geotagging data and information scraped from social media by contractors. Running background checks as a matter of course may be creepy, but it’s difficult to imagine it not becoming standard practice when that information is available at agents’ fingertips.

Keep reading

Facebook, Google, and Snapchat Are Bypassing Apple’s APP Tracking Transparency and Still Collecting Data on Users

Downloading “free” apps onto devices more often than not allows app providers to collect personal data on users.  Of course, companies that manufacture and sell devices tend to collect personal data on users too (see 12345).  Having access to this data allows companies and providers to analyze users’ habits and preferences so they can market additional products and services to them.  They can also sell users’ data to 3rd parties.  This practice is sometimes referred to as “Surveillance Capitalism.”  As more customers are becoming aware of this, more want to be able to “opt out” of privacy invasive data collection.  Companies aren’t necessarily making this easy though.  Recently Verizon was exposed for automatically enrolling its customers into a new program that scans users’ browser histories.  Facebook, Google, and Snapchat are now also being exposed for continuing to collect data on without users’ knowledge or consent.

Keep reading

Verizon accused of collecting customer browsing history (and more)

The My Verizon App has been accused of secretly collecting a user’s browser information, tracking apps, location, and contacts, for the purposes of understanding user interests. The mobile network provider appears to be automatically enrolling users in the data collection feature.

Input was first to report about Verizon’s “Custom Experience” feature that is concealed in the My Verizon app. There is also the “Custom Experience Plus” feature that is more invasive in data collection.

According to Verizon, the purposes of these features are to “personalize” users’ experience and “give you more relevant product and service recommendations” through the “information about websites you visit and apps you use on your mobile device.”

The company further states that a user “must opt in to participate and you can change your choice at any time.” However, it appears users are automatically enrolled.

Keep reading