Blaming America first became all too easy. After September 11, U.S. power was as overwhelming as it was uncontested. That it was squandered on two endless wars made it convenient to focus on America's sins, while underplaying Russia's and China's growing ambitions.
Today, the most brutal members of Autocracy Inc. don't much care if their countries are criticized, or by whom. The leaders of Myanmar don't really have any ideology beyond nationalism, self-enrichment, and the desire to remain in power. The leaders of Iran confidently discount the views of Western infidels. The leaders of Cuba and Venezuela dismiss the statements of foreigners on the grounds that they are "imperialists." The leaders of China have spent a decade disputing the human-rights language long used by international institutions, successfully convincing many people around the world that these "Western" concepts don't apply to them. Russia has gone beyond merely ignoring foreign criticism to outright mocking it.
The government's approach to technological surveillance is leading us down a dark path, experts warn, as it prepares to give law enforcement agencies new hacking powers.
Currently before parliament's Intelligence and Security Committee, the Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020 is the government's latest attempt to gain a watchful eye over cyber space.
Once the bill passes, it will dish out extra power to the Australian Federal Police (AFP) and the Australian Criminal Intelligence Commission (ACIC), giving the agencies access to new warrants that will let them modify and delete data, collect intelligence from online communities, and even take over the online accounts of supposed criminals.
The disease poses a grave and fast-moving threat to every nation. Governments have, quite reasonably, assumed emergency powers to counter it. But such powers can be abused. Governments have selectively banned protests on the grounds that they might spread the virus, silenced critics and scapegoated minorities. They have used emergency measures to harass dissidents. And they have taken advantage of a general atmosphere of alarm. With everyone’s attention on covid-19, autocrats and would-be autocrats in many countries can do all sorts of bad things, safe in the knowledge that the rest of the world will barely notice, let alone to object.
WhatsApp, which is used by 1.5bn people worldwide, discovered in early May that attackers were able to install surveillance software on to both iPhones and Android phones by ringing up targets using the app’s phone call function.
The malicious code, developed by the secretive Israeli company NSO Group, could be transmitted even if users did not answer their phones, and the calls often disappeared from call logs, said the spyware dealer, who was recently briefed on the WhatsApp hack.
NSO’s flagship product is Pegasus, a program that can turn on a phone’s microphone and camera, trawl through emails and messages and collect location data.
NSO advertises its products to Middle Eastern and Western intelligence agencies, and says Pegasus is intended for governments to fight terrorism and crime.
But mostly to spy on people said governments don't particularly like, of course.
Enligt Bahnhofs anonyma källor föreslår utredningen att datalagringen på flera sätt ska utökas. Dessutom ska internetoperatörerna tvingas bygga om sina system i syfte att underlätta övervakningen. En normalstor operatör kommer enligt inofficiella beräkningar att behöva lagra 300 Terabyte mer än idag, till en kostnad av hundratals miljoner kronor.
It’s a wretched yet predictable ritual after each new terrorist attack: Certain politicians and government officials waste no time exploiting the tragedy for their own ends. The remarks on Monday by John Brennan, the director of the Central Intelligence Agency, took that to a new and disgraceful low.
Speaking less than three days after coordinated terrorist attacks in Paris killed 129 and injured hundreds more, Mr. Brennan complained about “a lot of hand-wringing over the government’s role in the effort to try to uncover these terrorists.”
The leaked papers appear to show that drone strikes were often carried out based on insufficient and unreliable intelligence and when executed, often compromise further gathering of intelligence.
The documents reveal that in Afghanistan, drone strikes on 35 targets killed at least 219 other people.
US drone strikes in Yemen and Pakistan have killed as many as 1,147 unknown people in failed attempts to kill 41 named individuals, a report by human rights charity Reprieve has found.
The report looks at deaths resulting from US drone strikes in Yemen and Pakistan between November 2002 and November 2014. It identifies 41 men who appeared to have been killed multiple times – drawing into question the Obama administration’s repeated claims that the covert drone programme is ‘precise.’
While the US drone programme is shrouded in secrecy, security sources regularly brief the media on the names of those suspected militants targeted or killed in the strikes. Frequently, those individuals are reported to have been targeted or killed on multiple occasions.
When Edward Snowden exposed the scale and depth of the National Security Agency's surveillance programs, his findings led to another disheartening revelation: that our Internet has become too centralized. Webmail services like Yahoo and Google and social networks like Facebook and Twitter are convenient and efficient platforms, as well as easy to use, but they collect massive amounts of user data that can facilitate intelligence spying and other types of snooping. Meanwhile, securer methods of communication are often cumbersome and overly technical for the average user who would like to send an email without having to download and set up various software. Yet after Snowden’s leaks, an increasing demand for securer alternatives has led to the development of anti-surveillance products with an eye towards being user friendly.
That is certainly true for Miguel Freitas, a research engineer based in Rio de Janeiro, Brazil, who decided to create a decentralized alternative to Twitter to counter NSA spying and protect against shutdowns of social media sites; but it would also be “something that my grandmother could use,” Freitas tells techPresident.