CEO Admits Google Street-View Cars Recorded “Millions” of Homeowners’ Wifi Data

The Telegraph (June 4, 2010) reports that Google, which had been caught earlier recording private wifi messages has just ‘fessed up to the seriousness of what it did:

“In an interview with the Financial Times, the search engine’s boss admitted the company could have gained access to the personal details of millions of unsuspecting internet users.

Google is currently at the centre of a global privacy storm after it admitted that its Street View cars had mistakenly collected information Continue reading

National Health Service Accounts For 30% of Security Breaches Among UK Organizations

NHS Data Revelations Bode Badly For NPflT

Dylan Sharpe, bigbrotherwatch.org, April 29, 1010

“When Big Brother Watch released our report into the security of confidential medical dataBroken Records – one of our arguments against the number of non-medical personnel having access to patient records was the huge incidence of data loss within the NHS.

Today that fear has been confirmed as – for at the least the second year running – the NHS has topped the list of UK organisations subject to the highest number of data breaches. As reported by the Health Service Journal:

More serious data breaches have taken place within the NHS than any other UK organisation, according to the Information Commissioner’s Office (ICO).

A total of 2897 breaches were reported, accounting for more than 30% of the total number, deputy commissioner David Smith told the Infosec security conference.

The NHS, which is currently introducing digital patient records, said that 113 incidents occurred due to stolen data or hardware, with a further 82 cases of lost data or hardware.

How can we be expected to have faith in the government’s new online programme, when the NHS is incapable of keeping our private data safe now?

The Summary Care Record will provide over half-a-million people with access to our medical records and therefore massively increase the chances of that data falling into the wrong hands.

This latest scandal provides further proof that if you are contacted by the NHS asking for permission to upload your medical records onto the database, take the opportunity and opt out.”

Biometric ID Advocate Disses Full Body Scanner As Useless

A leading Israeli security expert thinks the new full body scanners are a waste of money, reports the Vancouver Sun :

“A leading Israeli airport security expert says the Canadian government has wasted millions of dollars to install “useless” imaging machines at airports across the country.

“I don’t know why everybody is running to buy these expensive and useless machines. I can overcome the body scanners with enough explosives to bring down a Boeing 747,” Rafi Sela told parliamentarians probing the state of aviation safety in Canada.”

Unfortunately, Sela seems to think the “trusted traveler” program is better:

“Sela testified it makes more sense to create a “trusted traveler” system so pre-approved low-risk passengers can move through an expedited screening process. That would leave more resources in the screening areas, where automatic sniffing technology would detect any explosive residue on a person or their baggage.”

Unfortunately for privacy advocates, this is a move from the frying pan to the fire. “Trusted traveler” is the name for the biometric ID program. Just recently, on April 14, the Department of Homeland Security announced that the US and Germany would be integrating their respective biometric travel programs.

Since it began in June 2008, the trusted traveler program has expanded rapidly from an initial 3 airports. Last fall, it reached 20 airports.

UK Foreign Office Warning to Travelers About Israeli Passport Forgery

I didn’t have time to complete this post from a week ago, but with the really bizarre story of the Polish plane, I thought I should revisit it, as is:

At the end of March, Haaretz (March 31) reported that the British Foreign Office issued a travel advisory last week to citizens traveling to Israel and Palestine, “hours” after it decided to expel an Israeli diplomat.

The risk applies in particular to passports without biometric security features,” the warning on the [UK foreign office] Web site said. “We recommend that you only hand your passport over to third parties including Israeli officials when absolutely necessary.”

This follows confirmation last week that killers of a Hamas operative in Dubai used forged passports from multiple countries, including the UK, Australia, France, Ireland, and Germany.

An editor at the Guardian notes that this is the lowest point in Anglo-Israeli relations since 1988, when an Israeli diplomat was expelled for being an agent of the Mossad.

Current relations with Israel are already strained, because senior Israeli officials visiting the UK have been threatened with arrest for alleged war crimes.

[Note:

The Hamas operative Mahmoud al-Mabhouh was killed in January in a hit that Dubai police have said they are 99 percent certain was the work of Israel’s spy service, Mossad. Israel has neither confirmed nor denied this.

Dubai has named 27 alleged conspirators in the pursuit and killing of the Palestinian, and has claimed that they used fraudulent British, Irish, French, German and Australian passports to enter and depart from Dubai. More than half of the people identified share the names of foreign-born Israeli nationals].

Earlier, UK foreign secretary David Miliband had said there were “compelling reasons” to believe Israel was responsible and had called the use of 12 forged British passports “intolerable,” according to an earlier report by the BBC (March 23).

Meanwhile, Israel’s ambassador to Britain, Ron Prosor, confirmed there would be no diplomatic retaliation, but expressed disappointment at Miliband’s decision. Israel has previously said there is no proof it was behind the killing at a Dubai hotel.

Israel claims the Australians are also going to follow suit, says this report:

“Official Israeli sources told The Australian newspaper that there is a high chance that Australia will follow Britain’s lead and also expel a high ranking Israeli diplomat. “It appears that Israeli officials have received indications in Canberra that Australia is preparing to expel a diplomat,” it said in the newspaper.”

Meanwhile, according to The Australian (March 31) ECAJ president Robert Goot told The Australian: “I think it would be an extreme reaction or possibly an overreaction (to expel an Israeli diplomat). The Jewish community would hope the Australian government might adopt a more nuanced position, depending on the outcome of the (Australian Federal Police) investigation.”

That’s not likely, now that former Mossad case officer Victor Ostrovsky has told ABC Radio that the spy agency had used Australian passports for previous operations before last month’s hit on a top Hamas commander in Dubai that has been blamed on Israel. (see the Sydney Morning Herald (Feb 26, 2010)

Israel has previously dismissed claims from Ostrovsky, who has detailed various accusations against the country in his books. He said Mossad prefers to use “false flag” passports, as Israeli papers frequently invoke suspicion in the Middle East.

“They need passports because you can’t go around with an Israeli passport, not even a forged one, and get away or get involved with people from the Arab world,” he said.

“So most of these (Mossad) operations are carried out on what’s called false flag, which means you pretend to be of another country which is less belligerent to those countries that you’re trying to recruit from.”

Ostrovsky said Mossad had a “very, very expensive research department” dedicated to manufacturing the fake documents which simulates different types of paper and ink.

The Australian newspaper also said Ali Kazak, a former Palestinian representative to Australia, had warned in 2004 that a Mossad agent in Sydney had obtained 25 false Australian passports.

According to The Age (Feb 26, 2010), in Dec 2004, a second secretary in the Israeli embassy in Canberra was recalled because he was suspected of ties to passport fraud in New Zealand, where in March 2004 two suspected Mossad agents were convicted for fraudulently trying to get local passports. The New Zealand case eventually led to the downgrading of diplomatic ties and the canceling of Israeli PM Moshe Katsav’s visit.

The same report notes that Mossad used forged Canadian passports in 1997 in a bungled plot to assassinate Hamas leader Khaled Meshal.

Then, as now, the Israeli prime minister, who has to approve all assassination attempts, was Benjamin Netanyahu.

King World News Reports DNS Attack Following Post On CFTC Whistleblower

GATA reports attacks on friendly sites:

“Eric King told GATA today, “We are on one of the top grid server systems in the world, where traffic is not an issue, and this has never happened before. This was a case of an entity needing to silence the messenger.”

No Internet site has given as much voice to GATA and other pro-gold and free-market advocates as King World News has, so given the scope of the attack on the the King World News Internet site, it is hard not be awfully suspicious about it.

King’s interview with Murphy, Douglas, and your secretary/treasurer can be found here:

http://www.kingworldnews.com/kingworldnews/Broadcast/Entries/2010/3/31_G…

Meanwhile, GATA’s friend Trace Mayer, proprietor of RunToGold.com, reports that his March 28 commentary on last week’s hearing of the U.S. Commodity Futures Trading Commission —

http://www.runtogold.com/2010/03/cftc-gold-and-silver-hearing-is-old-new…

— was followed by a similarly massive attack on RunToGold’s Internet server. “To handle spikes in traffic,” Mayer says, “I am on an expensive enterprise-level cloud server with a company that handles hosting for some of the big dogs, like Sony and Toyota, and my server got hammered. The site was down for 2 1/2 hours, from about noon to 2:30p PT on March 30. There were no issues with my hosting provider and it appears we have everything under control now. I have never had an issue like this before. Anyway, it looks like we have someone’s attention. Keep yanking on that tail.”

My Comment:

You see. This isn’t paranoia. In the past, following certain sorts of posts, I’ve experienced peculiar things too. Sometimes, the blog feels like it’s been hacked. Or my email suddenly doesn’t work. Or I get nasty comments from what sounds like the same person, only writing from different IP’s. Or I get flooded with spam from porn sites (more than the usual quota, I mean).

You tend to dismiss these things as coincidental. But after a couple of years of noticing when they happen, you start realizing that someone doesn’t like what you’re saying.

And if that’s true of my little blog, it’s going to be doubly so for bigger venues.

Europol Now Official Police Agent of EU

The New American (hat-tip to Michael Rozeff)

“According to the terms of its new status as the “official” criminal intelligence-gathering branch of the EU government, “Europol now benefits from increased powers to collect criminal information and a wider field of competence in supporting investigations.” Among these increased powers is the power to access the voluminous personal data stored on the computers of Scotland Yard if agents suspect a person may be participating in a “preparatory” act that may lead to criminal behavior.

As has been reported in The New American, the database of information compiled and stored by the government of Prime Minister Gordon Brown is the most extensive in any developed nation. The database was established in 1995 and is the world’s largest. It contains the DNA material of over five million Britons, a figure that represents 8 percent of the population of England and Wales. The recording system was initially developed, ostensibly, to aid the police in the investigation of crime scenes and function as a “vital crime-fighting tool” in tracking down elusive offenders.

Now, every byte of that very personal information is available to Europol, without regard for the national laws of the United Kingdom. The relevant data to which Europol now has unfettered access includes political affiliation, routine, places frequented, DNA, tax obligations, voiceprints, and sexual preference. In fine, everything stored on those massive mainframes is now firmly within the province of distant Europol investigators.

The standard for granting Europol access to the personal data of Britons is much different from that governing their own national law enforcement. According to terms of Title VI of the Maastricht Treaty, the Europol Convention, and the new directives, a mere suspicion of likely criminal behavior in the following vague areas will trigger Europol investigation: racism, environmental crime, xenophobia, computer fraud, and crimes against the environment.

You read that correctly, Europol can now extract “behavioral data” on any citizen of any member state that it suspects — rightly or wrongly — is likely participating in any of the above listed “serious crimes.”

India Begins First Biometric Census

India launches the first biometric census today, reports the BBC.

“India is launching a new census in which every person aged over 15 will be photographed and fingerprinted to create a biometric national database. The government will then use the information to issue identity cards.

Officials will spend a year classifying India’s population of around 1.2 billion people according to gender, religion, occupation and education. The exercise, conducted every 10 years, faces big challenges, not least India’s vast area and diversity of cultures.

Census officials must also contend with high levels of illiteracy and millions of homeless people – as well as insurgencies by Maoists and other rebels which have left large parts of the country unsafe.
President Pratibha Patil was the first person to be listed, and appealed to fellow Indians to follow her example “for the good of the nation”. “Everyone must participate and make it successful,” she said in Delhi.

‘Unstoppable’
This is India’s 15th census and the first time a biometric element has been included.”

If only it were an April Fool’s prank. Unfortunately, it’s the real thing.

The master mind behind it is Nandan Nilekani, the co-founder of IT outsourcing giant Infosys, hero of the Gideon’s Bible of globalization, Thomas Friedman’s “The World Is Flat” (a book I confess I’ve given a small thrashing to), and the man who coined the irritating meme in the first place.

As this Times article points out, less than 7% of the Indian population of over a billion (that is, around 75 million) pays income taxes. There’s also rampant corruption, a thriving black market, endless bureaucracy, and documentation requirements that make cross-state travel a time-consuming burden.

The ID is supposed to end all that. What it will begin, we can only guess.

As we blogged a while back, even the UK, the Anglophone world’s police-state petri dish, crammed to the gills with CCTV and traffic cameras, managed to squash this frightening initiative when it was introduced there.

Unfortunately, Europe has taken to it, with Germany, France, Belgium, Greece, Luxembourg, Portugal, and Spain among the 100 countries that use compulsory national identity cards.

But India, it need hardly be said, is not Europe. Besides the civil liberties dangers, the costs are heavy. In the UK, they were estimated to have been between 10-20 billion pounds. In India, they are said to be around 3 billion pounds (other figures I’ve seen are $6.6 billion and 300 billion rupees), an enormous burden on the public treasury. And the number is only an estimate, which, like all government estimates of future costs, is almost 100% certain to be over optimistic.

The other major mandate that Nilekani claims is that the new ID will help bring services and subsidies to the poor and prevent their theft or loss. This would be more reassuring if Nilekani didn’t count among former clients of Infosys such experts at combining doing good with doing well as Goldman Sachs.

The Times article describes the card thus:

“A computer chip in each card will contain personal data and proof of identity, such as fingerprint or iris scans. Criminal records and credit histories may also be included.

Mr Nilekani, who left Infosys, the outsourcing giant that he co-founded, to take up his new job, wants the cards to be linked to a “ubiquitous online database” accessible from anywhere.”

Nilekani is head of the newly-created Unique Identification Database Authority of India (IDAI) and he has received 19 bids for its first project from vendors including Tata Consultancy Services, Wipro, HCL, IBM, and his own company, Infosys.

For every rupee of IT spending on the project, industry experts estimate, around 60 per cent of this will go to hardware vendors (see Biometrics4You)

Update:

Biometrics4You lists other aspects of the initiative:

The Reserve Bank of India (RBI – the central bank of India) has announced plans to roll out new guidelines to help financial institutions use biometrics at ATMs in rural areas without access to banking. The Orwellian term for this is un-banked or under banked...as though there were some optimal level of banking every square foot of the earth should have.

Chinese Electronic Espionage Leads To UK Office of Cyber Security…

The Times Online reported in January that the UK’s MI5 was battling devious Chinese attempts to entrap UK businessmen, with electronic bugging devices….and sexual “honey traps”. (Not as imaginative as the CIA’s “acoustic kitty,”  but probably more effective):

“A leaked MI5 document says that undercover intelligence officers from the People’s Liberation Army and the Ministry of Public Security have also approached UK businessmen at trade fairs and exhibitions with the offer of “gifts” and “lavish hospitality”.

The gifts — cameras and memory sticks — have been found to contain electronic Trojan bugs which provide the Chinese with remote access to users’ computers.

MI5 says the Chinese government “represents one of the most significant espionage threats to the UK” because of its use of these methods, as well as widespread electronic hacking.

Written by MI5’s Centre for the Protection of National Infrastructure, the 14-page “restricted” report describes how China has attacked UK defence, energy, communications and manufacturing companies in a concerted hacking campaign.

It claims China has also gone much further, targeting the computer networks and email accounts of public relations companies and international law firms. “Any UK company might be at risk if it holds information which would benefit the Chinese,” the report says.

The explicit nature of the MI5 warning is likely to strain diplomatic ties between London and Beijing. Relations between the two countries were damaged last month after China’s decision to execute a mentally ill British man for alleged drug trafficking.

Earlier this month the United States demanded that China investigate a sophisticated hacking attack on Google and a further 30 American companies from Chinese soil.

China has occasionally attempted sexual entrapment to target senior British political figures. Two years ago an aide to Gordon Brown had his BlackBerry phone stolen after being picked up by a Chinese woman who had approached him in a Shanghai hotel disco.”

So now you know better than to fraternize too cozily at a Chinese trade event.

The 14-page “restricted” report by MI5 Director General, Jonathan Evans, lists attacks on UK defense, energy, communications and manufacturing companies and is the latest and most explicit warning from UK authorities on Chinese espionage.  It was sent to hundreds of business leaders in 2009.

Evans’ lobbying led to the creation of the Office of Cyber Security (due to open in March 2010).

The UK only follows the US on this. As far back as June 2009, Barack Obama announced the need for a new official position to oversee cybersecurity in the US, a move applauded by some in the IT community, like McAfee’s Director of Threat Intelligence, Phyllis Schneck, but criticized by others, like Wayne Crews, VP at the Competitive Enterprise Institute, who argued that attempts to collectivize and centralize information technology risks were liable to crowd out private enterprise solutions.

The Cat They Sent Out Into The Cold…

The more you dig into the history of the CIA’s covert programs, the more it resembles not so much a fast-paced who-dunnit as a low-rent why-ever-did-they-do-it. Only it wasn’t low rent. A hefty wad of tax-payer money subsidized such expensive follies as Project Acoustic Kitty, in which the agency’s whizzes tried to turn man’s favorite feline into a wired-up bot that would snoop on conversations in back-alleys:

“Victor Marchetti, a former CIA officer, told The Telegraph that Project Acoustic Kitty was a gruesome creation. He said: “They slit the cat open, put batteries in him, wired him up. The tail was used as an antenna. They made a monstrosity. They tested him and tested him. They found he would walk off the job when he got hungry, so they put another wire in to override that.”

Mr Marchetti said that the first live trial was an expensive disaster. The technology is thought to have cost more than £10 million. He said: “They took it out to a park and put him out of the van, and a taxi comes and runs him over. There they were, sitting in the van with all those dials, and the cat was dead.”

The document, which was one of 40 to be declassified from the CIA’s closely guarded Science and Technology Directorate – where spying techniques are refined – is still partly censored. This implies that the CIA was embarrassed about disclosing all the details of Acoustic Kitty, which took five years to design.

Dr Richelson, who is the a senior fellow at the National Security Archive in Washington, said of the document: “I’m not sure for how long after the operation the cat would have survived even if it hadn’t been run over.”

From “CIA Recruited Cat To Bug Russians,” The Telegraph, November, 2001