×
The Military

The US Military's AI 'Swarm' Initiatives Speed Pace of Hard Decisions About Autonomous Weapons (apnews.com) 70

AI employed by the U.S. military "has piloted pint-sized surveillance drones in special operations forces' missions and helped Ukraine in its war against Russia," reports the Associated Press.

But that's the beginning. AI also "tracks soldiers' fitness, predicts when Air Force planes need maintenance and helps keep tabs on rivals in space." Now, the Pentagon is intent on fielding multiple thousands of relatively inexpensive, expendable AI-enabled autonomous vehicles by 2026 to keep pace with China. The ambitious initiative — dubbed Replicator — seeks to "galvanize progress in the too-slow shift of U.S. military innovation to leverage platforms that are small, smart, cheap, and many," Deputy Secretary of Defense Kathleen Hicks said in August. While its funding is uncertain and details vague, Replicator is expected to accelerate hard decisions on what AI tech is mature and trustworthy enough to deploy — including on weaponized systems.'

There is little dispute among scientists, industry experts and Pentagon officials that the U.S. will within the next few years have fully autonomous lethal weapons. And though officials insist humans will always be in control, experts say advances in data-processing speed and machine-to-machine communications will inevitably relegate people to supervisory roles. That's especially true if, as expected, lethal weapons are deployed en masse in drone swarms. Many countries are working on them — and neither China, Russia, Iran, India or Pakistan have signed a U.S.-initiated pledge to use military AI responsibly.

United States

Secretive White House Surveillance Program Gives Cops Access To Trillions of US Phone Records (wired.com) 104

An anonymous reader quotes a report from Wired: A little-known surveillance program tracks more than a trillion domestic phone records within the United States each year, according to a letter WIRED obtained that was sent by US senator Ron Wyden to the Department of Justice (DOJ) on Sunday, challenging the program's legality. According to the letter, a surveillance program now known as Data Analytical Services (DAS) has for more than a decade allowed federal, state, and local law enforcement agencies to mine the details of Americans' calls, analyzing the phone records of countless people who are not suspected of any crime, including victims. Using a technique known as chain analysis, the program targets not only those in direct phone contact with a criminal suspect but anyone with whom those individuals have been in contact as well.

The DAS program, formerly known as Hemisphere, is run in coordination with the telecom giant AT&T, which captures and conducts analysis of US call records for law enforcement agencies, from local police and sheriffs' departments to US customs offices and postal inspectors across the country, according to a White House memo reviewed by WIRED. Records show that the White House has, for the past decade, provided more than $6 million to the program, which allows the targeting of the records of any calls that use AT&T's infrastructure -- a maze of routers and switches that crisscross the United States. In a letter to US attorney general Merrick Garland on Sunday, Wyden wrote that he had "serious concerns about the legality" of the DAS program, adding that "troubling information" he'd received "would justifiably outrage many Americans and other members of Congress." That information, which Wyden says the DOJ confidentially provided to him, is considered "sensitive but unclassified" by the US government, meaning that while it poses no risk to national security, federal officials, like Wyden, are forbidden from disclosing it to the public, according to the senator's letter.
AT&T spokesperson Kim Hart Jonson said only that the company is required by law to comply with a lawful subpoena. However, "there is no law requiring AT&T to store decades' worth of Americans' call records for law enforcement purposes," notes Wired. "Documents reviewed by WIRED show that AT&T officials have attended law enforcement conferences in Texas as recently as 2018 to train police officials on how best to utilize AT&T's voluntary, albeit revenue-generating, assistance."

"The collection of call record data under DAS is not wiretapping, which on US soil requires a warrant based on probable cause. Call records stored by AT&T do not include recordings of any conversations. Instead, the records include a range of identifying information, such as the caller and recipient's names, phone numbers, and the dates and times they placed calls, for six months or more at a time." It's unclear exactly how far back the call records accessible under DAS go, although a slide deck released under the Freedom of Information Act in 2014 states that they can be queried for up to 10 years.
United States

US Privacy Groups Urge Senate Not To Ram Through NSA Spying Powers (wired.com) 35

Some of the United States' largest civil liberties groups are urging Senate majority leader Chuck Schumer not to pursue a short-term extension of the Section 702 surveillance program slated to sunset on December 31. From a report: The more than 20 groups -- Demand Progress, the Brennan Center for Justice, American Civil Liberties Union, and Asian Americans Advancing Justice among them -- oppose plans that would allow the program to continue temporarily by amending "must-pass" legislation, such as the bill needed now to avert a government shutdown by Friday, or the National Defense Authorization Act, annual legislation set to dictate $886 billion in national security spending across the Pentagon and US Department of Energy in 2024.

"In its current form, [Section 702] is dangerous to our liberties and our democracy, and it should not be renewed for any length of time without robust debate, an opportunity for amendment, and -- ultimately -- far-reaching reforms," a letter from the groups to Schumer says. It adds that any attempt to prolong the program by rushed amendment "would demonstrate blatant disregard for the civil liberties and civil rights of the American people."

China

Five Republican Presidential Candidates Call for TikTok to Be Banned in America 194

Wednesday five of the U.S. Republican candidates for president gathered for their third debate in Miami — where they again urged the banning of TikTok in America:

Moderator: Last week congressman Mike Gallagher, who is chairman of the House bipartisan select committee on the Chinese Community party, published a long essay on TikTok... [H]e called the app "predatory... controlled by America's preeminent adversary," used to push propaganda and divide America. It's "spyware," he said — a means of surveillance.

Governor Christie, do you agree with chairman Gallgaher, and if so would you ban or force the sale of TikTok.

Chris Christie: I agree 100% with chairman Gallagher, and let me say this. TikTok is not only spyware. it is polluting the minds of American young people, all throughout this country. And they're doing it intentionally... This is China trying to further divide the United States of America...

In my first week as president, we would ban TikTok. They want to go ahead and sell it, let 'em go ahead and sell it. But I'll tell you another reason we would do it. Facebook's not in China. X is not in China. They're not permitting a free flow of information to the Chinese people from our social media companies. Yet we just open the door and let them do what they're doing. TikTok should be banned because they are poisoning American minds, and I would do it Week One... [Applause from audience.]

Ron DeSantis: [DeSantis began by saying he would also ban TikTok.] I think that China's the top threat we face. They've been very effective at infiltrating different parts of our society... And as the dad of a 6-, 5-, and a 3-year-old, I'm concerned about the data that they're getting from our young people, and what they're doing to pollute the minds of our young people... Their role in our culture? If we ignore that, we're not going to be able to win the fight...

Vivek Ramaswamy: In the last debate [Nikki Haley] made fun of me for joining TikTok? Well her own daughter was actually using the app for a long time, so you might want to take care of your family first... [Audience boos]

Nikki Haley: Leave my daughter out of your voice.

Vivek Ramaswamy: The next generation of Americans are using it, and that's actually the point... Here's the truth. The easy answer is actually to say that we're just going to ban one app. We gotta go further. We have to ban any U.S. company actually transferring U.S. data to the Chinese. Here's a story most people don't know. Airbnb hands over U.S. user data to the CCP. Now that's a U.S.-owned company... Even U.S. companies in Silicon Valley are regularly doing it...

Tim Scott: What we should do is ban TikTok, period... If you cannot ban TikTok, you should eliminate the Chinese presence on the app. Period.

In the previous debate Nikki Haley made her own position clear. "We can't have TikTok in our kids' lives. We need to ban it."
Security

Fusus' AI-Powered Cameras Are Spreading Across the United States 33

An anonymous reader quotes a report from 404 Media: Spread across four computer monitors arranged in a grid, a blue and green interface shows the location of more than 50 different surveillance cameras. Ordinarily, these cameras and others like them might be disparate, their feeds only available to their respective owners: a business, a government building, a resident and their doorbell camera. But the screens, overlooking a pair of long conference tables, bring them all together at once, allowing law enforcement to tap into cameras owned by different entities around the entire town all at once. This is a demonstration of Fusus, an AI-powered system that is rapidly springing up across small town America and major cities alike. Fusus' product not only funnels live feeds from usually siloed cameras into one central location, but also adds the ability to scan for people wearing certain clothes, carrying a particular bag, or look for a certain vehicle.

404 Media has obtained a cache of internal emails, presentations, memos, photos, and more which provide insight into how Fusus teams up with police departments to sell its surveillance technology. All around the country, city councils are debating whether they want to have a system that qualitatively changes what surveillance cameras mean for a town's residents and public agencies. While many have adopted Fusus, others have pushed back, and refused to have the hardware and software installed in their neighborhoods. In some ways, Fusus is deploying smart camera technology that historically has been used in places like South Africa, where experts warned about it creating an ever present blanket of surveillance. Now, tech with some of the same capabilities is being used across small town America.

Rather than selling cameras themselves, Fusus' hardware and software latches onto existing installations, which can include government-owned surveillance cameras as well as privately owned cameras at businesses and homes. It turns dumb cameras into smart ones. "In essence, the Fusus solution puts a brain into every camera connected with the system," one memorandum obtained by 404 Media reads.
In addition to integrating with existing surveillance installations, Fusus' hardware, called SmartCORE, can turn cameras into automatic license plate readers (ALPRs). It can reportedly offer facial recognition features, too, although Fusus hasn't provided clear clarification on this matter.

The report says the system has been adopted by numerous police departments across the United States, with approximately 150 jurisdictions using Fusus. Orland Park police have called it a "game-changer." It's also being used internationally, launching in the United Kingdom.

Here's what Beryl Lipton, investigative researcher at the Electronic Frontier Foundation (EFF), had to say about it: "The lack of transparency and community conversation around Fusus exacerbates concerns around police access of the system, AI analysis of video, and analytics involving surveillance and crime data, which can influence officer patrols and priorities. In the absence of clear policies, auditable access logs, and community transparency about the capabilities and costs of Fusus, any community in which this technology is adopted should be concerned about its use and abuse."
Businesses

How Two Florida Men Scammed 'Uber Eats' Out of $1 Million (msn.com) 51

An anonymous Slashdot reader shared this report from Business Insider: Two men from the Fort Lauderdale, Florida area scammed Uber Eats out of more than $1 million over 19 months, local police say.

The suspects carried out the scheme — which began in January 2022 — by creating fake accounts on the Uber Eats app to act as both the customer and courier when placing grocery orders, the Broward County Sheriff's Office said in a statement. This worked because Uber Eats provides couriers with prepaid cards they can use to purchase up to $700 to complete customers' orders.

Police claim the suspects would show up as couriers for their fake grocery orders before canceling them and using the prepaid cards to purchase gift cards at the stores.

According to the sheriff's office, "On January 24, 2023, detectives conducted a surveillance operation and observed Morgan and Blackwood travel to 27 different Walgreens committing fraud that totaled a $5,013.28 loss for Uber that day. "
Encryption

Sandvine Scraps Plan To Market Tool in US That Tracks Encrypted Messages (bloomberg.com) 7

Computer networking company Sandvine has scrapped an effort to sell US law enforcement agencies a controversial internet surveillance technology that tracks encrypted messages and laid off most of the employees involved in the initiative, Bloomberg News reported Friday, citing four people with knowledge of the matter. From the report: Sandvine had pitched the new product, called "Digital Witness," to governments and law enforcement agencies in Europe, the Middle East, Asia and North America. It was marketed as a tool to covertly monitor people's internet use and encrypted messages sent using popular applications such as Meta Platform's WhatsApp and Signal, according to the people, who asked not to be identified to discuss confidential matters.

Sandvine had already provided trial versions of the technology in the US, these people said. But a combination of broader economic woes and lingering concern over the company's previous work with authoritarian governments hindered the product's success, the people said. Sandvine declined to comment when asked about Digital Witness. The company's marketing materials indicate the product is sold only to law enforcement and government agencies, and it is still listed on Sandvine's website.

AI

Signal President Says AI is Fundamentally 'a Surveillance Technology' (techcrunch.com) 38

An anonymous reader shares a report: Why is it that so many companies that rely on monetizing the data of their users seem to be extremely hot on AI? If you ask Signal president Meredith Whittaker (and I did), she'll tell you it's simply because "AI is a surveillance technology." Onstage at TechCrunch Disrupt 2023, Whittaker explained her perspective that AI is largely inseparable from the big data and targeting industry perpetuated by the likes of Google and Meta, as well as less consumer-focused but equally prominent enterprise and defense companies. "It requires the surveillance business model; it's an exacerbation of what we've seen since the late '90s and the development of surveillance advertising. AI is a way, I think, to entrench and expand the surveillance business model," she said.

"The Venn diagram is a circle." "And the use of AI is also surveillant, right?" she continued. "You know, you walk past a facial recognition camera that's instrumented with pseudo-scientific emotion recognition, and it produces data about you, right or wrong, that says 'you are happy, you are sad, you have a bad character, you're a liar, whatever.' These are ultimately surveillance systems that are being marketed to those who have power over us generally: our employers, governments, border control, etc., to make determinations and predictions that will shape our access to resources and opportunities."

China

Huawei's New SoC Features Processor Cores Designed In-House (arstechnica.com) 88

"Huawei is emulating Apple in developing the processors that power its latest smartphone," reports Ars Technica, "a breakthrough that will help the Chinese company to reduce its reliance on foreign technology as it confronts US sanctions." Analysis of the main chip inside the Mate 60 Pro smartphone, which launched at the end of last month and immediately sold out, reveals that Huawei has joined the elite group of Big Tech companies capable of designing their own semiconductors. Four of the eight central processing units in the Mate 60 Pro's "system on a chip" (SoC) rely purely on a design by Arm, the British company whose chip architecture powers 99 percent of smartphones. The other four CPUs are Arm-based but feature Huawei's own designs and adaptations, according to three people familiar with the Mate's development and Geekerwan, a Chinese technology testing company that took a closer look at the main chip...

While Huawei is still licensing Arm's basic designs, its own HiSilicon chip design business has improved on them to build its own processor cores on the Mate's Kirin 9000S SoC. This will give it the flexibility needed to produce high-end smartphones despite the constraints of US export controls, said analysts and industry insiders. The Kirin 9000S also features a graphics processing unit and neural processing unit developed by HiSilicon. Its predecessor, the Kirin 9000 SoC, had relied completely on Arm for its CPUs and GPU...

Huawei was able to produce its own phone processors by adapting CPU core designs that were originally used in its data center servers, according to people with direct knowledge of its development. The strategy resembles Apple's moves to turn its iPhone processors into chips capable of powering its Mac computers — but in reverse. "No one ever did this before," said analyst Brady Wang of Counterpoint Research of Huawei's server-to-phone innovation...

Various testing teams, including Geekerwan's, have found that Huawei's semiconductor capabilities are one to two years behind those of chips made by the US's Qualcomm, the leading mobile chipmaker. Huawei's chips also consume more power than its competitors', according to measurements, and can cause the phone to heat up.

Reuters reports that "The United States has no evidence that Huawei can produce smartphones with advanced chips in large volumes, U.S. Commerce Secretary Gina Raimondo said on Tuesday."

But meanwhile, a Huawei Technologies unit "is shipping new Chinese-made chips for surveillance cameras, in a fresh sign the Chinese tech giant is finding ways around four years of U.S. export controls, two sources briefed on the unit's efforts said." The shipments to surveillance camera manufacturers from the company's HiSilicon chip design unit started this year, according to one of the sources, and a third source familiar with the industry supply chain. One of the sources briefed on the unit said at least some of the customers were Chinese...

"These surveillance chips are relatively easy to manufacture compared to smartphone processors," said the source familiar with the surveillance camera industry's supply chain, adding that HiSilicon's return would shake up the market... Before the U.S. export controls, it was the dominant chip supplier to the surveillance camera sector, with brokerage Southwest Securities estimating its global share in 2018 at 60%. By 2021, HiSilicon's global market share plummeted to just 3.9%, according to data from consulting firm Frost & Sullivan...

TechInsights analyst Dan Hutcheson said their analysis of the Mate 60 Pro and other components such as its radio frequency power chip also suggested that Huawei had access to sophisticated electronic design automation (EDA) tools that "they are not supposed to have".

"We don't know if they got them illicitly, or more probably the Chinese developed their own EDA tools," he said.

Thanks to long-time Slashdot reader AmiMoJo for sharing the news.
Encryption

Meredith Whittaker Reaffirms That Signal Would Leave UK If Forced By Privacy Bill (techcrunch.com) 69

Meredith Whittaker, the president of the Signal Foundation, which maintains the nonprofit Signal messaging app, reaffirmed that Signal would leave the U.K. if the country's recently passed Online Safety Bill forced Signal to build "backdoors" into its end-to-end encryption. From a report: "We would leave the U.K. or any jurisdiction if it came down to the choice between backdooring our encryption and betraying the people who count on us for privacy, or leaving," Whittaker said. "And that's never not true." The Online Safety Bill, which was passed into law in September, includes a clause -- clause 122 -- that, depending on how it's interpreted, could allow the U.K.'s communications regulator, Ofcom, to break the encryption of apps and services under the guise of making sure illegal material such as child sexual exploitation and abuse content is removed.

Ofcom could fine companies not in compliance up to $22.28 million, or 10% of their global annual revenue, under the bill -- whichever is greater. Whittaker didn't mince words in airing her fears about the Online Safety Bill's implications. "We're not about political stunts, so we're not going to just pick up our toys and go home to, like, show the bad U.K. they're being mean," she said. "We're really worried about people in the U.K. who would live under a surveillance regime like the one that seems to be teased by the Home Office and others in the U.K."

United States

New Revelations From the Snowden Archive Surface (computerweekly.com) 151

An anonymous reader quotes a report from Computer Weekly: A doctoral thesis by American investigative journalist and post-doctoral researcher Jacob Appelbaum has now revealed unpublished information from the Snowden archive. These revelations go back a decade, but remain of indisputable public interest:

- The NSA listed Cavium, an American semiconductor company marketing Central Processing Units (CPUs) – the main processor in a computer which runs the operating system and applications -- as a successful example of a "SIGINT-enabled" CPU supplier. Cavium, now owned by Marvell, said it does not implement back doors for any government.
- The NSA compromised lawful Russian interception infrastructure, SORM. The NSA archive contains slides showing two Russian officers wearing jackets with a slogan written in Cyrillic: "You talk, we listen." The NSA and/or GCHQ has also compromised Key European LI [lawful interception] systems.
- Among example targets of its mass surveillance program, PRISM, the NSA listed the Tibetan government in exile.

These revelations have surfaced for the first time thanks to a doctoral thesis authored by Appelbaum towards earning a degree in applied cryptography from the Eindhoven University of Technology in the Netherlands. Communication in a world of pervasive surveillance is a public document and has been downloaded over 18,000 times since March 2022 when it was first published. [...] We asked Jacob Appelbaum, currently a post-doctoral researcher at the Eindhoven University of Technology, why he chose to publish those revelations in a technically written thesis rather than a mass-circulation newspaper. He replied: "As an academic, I see that the details included are in the public interest, and highly relevant for the topic covered in my thesis, as it covers the topic of large-scale adversaries engaging in targeted and mass surveillance."
According to The Register, "Marvell (the owner of Cavium since 2018) denies the allegations that it or Cavium placed backdoors in products at the behest of the U.S. government.

Appelbaum's thesis wasn't given much attention until it was mentioned in Electrospaces.net's security blog last week.
China

Was China's 'Spy Balloon' Just Blown Off Course? (cbsnews.com) 112

China appears to have suspended its global surveillance balloon program after a balloon was spotted drifting over the United States in February.

But now an anonymous reader shares this report from CBS News: Seven months later, Gen. Mark Milley, chairman of the Joint Chiefs of Staff, tells "CBS News Sunday Morning" the balloon wasn't spying. "The intelligence community, their assessment — and it's a high-confidence assessment — [is] that there was no intelligence collection by that balloon," he said.

So, why was it over the United States? There are various theories, with at least one leading theory that it was blown off-track. The balloon had been headed toward Hawaii, but the winds at 60,000 feet apparently took over. "Those winds are very high," Milley said. "The particular motor on that aircraft can't go against those winds at that altitude..."

After the Navy raised the wreckage from the bottom of the Atlantic, technical experts discovered the balloon's sensors had never been activated while over the Continental United States. But by then, the damage to U.S.-China relations had been done.

On the CBS News show Sunday Morning, the host had this exchange with America's chairman of the Joint Chiefs of Staff.

CBS: "Bottom line, it was a spy balloon, but it wasn't spying?"

Chairman of the Joint Chiefs of Staff: "I would say it was a spy balloon that we know with high degree of certainty got no intelligence, and didn't transmit any intelligence back to China."
China

China's Spy Balloon Program Appears to Have Been Suspended, US Officials Say (cnn.com) 81

An anonymous reader shared this report from CNN: China appears to have suspended its surveillance balloon program following a major diplomatic incident earlier this year, when one of the country's high-altitude spy balloons transited the United States, multiple sources familiar with US intelligence assessments told CNN. US officials believe that Chinese leaders have made a deliberate decision not to launch additional balloons since the one over the US was shot down by American fighter jets in February, the sources said. The US has not observed any new launches since the episode occurred... The US intelligence community believes that Chinese Communist Party leaders did not intend for the balloon to cross over the United States, and even reprimanded the operators of the surveillance program over the incident, one of the sources said...

The US assessed at the time that the spy balloon was part of an extensive surveillance program run by the Chinese military, CNN has previously reported. The balloon fleet had conducted at least two dozen missions over at least five continents in recent years, according to US officials. The suspension of the program is likely China's way of trying to stabilize its relations with the United States in the run-up to a potential meeting between President Biden and Xi in November at the Asia-Pacific Economic Cooperation summit in San Francisco, said Christopher Johnson, a former senior China analyst at the CIA and now a senior fellow at the Center for Strategic and International Studies. Although China is unlikely to publicly acknowledge that the balloon was part of an espionage program or announce it will no longer conduct such surveillance on the United States, Johnson said, quietly suspending the program is "a positive step" and likely Beijing's way of showing the US it is trying to address some of the friction points in the relationship...

The FBI concluded its analysis of the balloon's remnants earlier this year, and the Pentagon announced in June that the US government assessed that the balloon did not collect intelligence while flying over the country...In the wake of the incident, the US widened the aperture of its radar systems so that they could better detect objects traveling above a certain altitude and at certain speeds. The aim was to fix a "domain awareness gap" that had allowed three other suspected Chinese spy balloons to transit the continental United States undetected under the Trump administration, Gen. Glen VanHerck, commander of US Northern Command and North American Aerospace Defense Command, said at the time. The more sensitive radar systems led the US military to spot more unidentified objects in US airspace, however, leading to three additional shootdowns of unidentified high-altitude objects in the weeks following the Chinese balloon incident.

Electronic Frontier Foundation

EFF Recognizes Signal, Library Freedom Project for Protecting Privacy (eff.org) 16

For over 30 years the EFF has presented awards recognizing those "advancing innovation and championing digital rights," according to its web site, celebrating "the accomplishments of people working toward a better future... both in the public eye and behind the scenes."

This year's ceremony — hosted by Cory Doctorow — didn't just recognize Sci-Hub's founder. The EFF also gave its award for "Communications Policy" to the Signal Foundation — and its "Information Democracy" award to the Library Freedom Project.

From the Electronic Frontier Foundation web site: Since 2013, with the release of the unified app and the game-changing Signal Protocol, Signal has set the bar for private digital communications. With its flagship product, Signal Messenger, Signal provides real communications privacy, offering easy-to-use technology that refuses the surveillance business model on which the tech industry is built. To ensure that the public doesn't have to take Signal's word for it, Signal publishes their code and documentation openly, and licenses their core privacy technology to allow others to add privacy to their own products. Signal is also a 501(c)(3) nonprofit, ensuring that investors and market pressure never provides an incentive to weaken privacy in the name of money and growth. This allows Signal to stand firm against growing international legislative pressure to weaken online privacy, making it clear that end-to-end encryption either works for everyone or is broken for everyone — there is no half measure.

The Library Freedom Project (LFP) is radically rethinking the library professional organization by creating a network of values-driven librarian-activists taking action together to build information democracy. LFP offers trainings, resources, and community building for librarians on issues of privacy, surveillance, intellectual freedom, labor rights, power, technology, and more — helping create safer, more private spaces for library patrons to feed their minds and express themselves. Their work is informed by a social justice, feminist, anti-racist approach, and they believe in the combined power of long-term collective organizing and short-term, immediate harm reduction.

News

Lithuania Was the Country That Secretly Wiretapped the World for the FBI (404media.co) 107

Slash_Account_Dot shares a report: The FBI had a problem. In 2019 the agency was secretly running an encrypted phone company called Anom. Serious organized criminals were using the phones and Anom was gaining popularity. But even though Anom contained a backdoor -- a chunk of code that silently copied every message sent -- the FBI was unable to actually read Anom's messages. The FBI had not obtained legal approval to rummage through that treasure trove of intelligence.

[...] So the agency turned to what court records have described as a "third country," the first country being America and the second being Australia, which ran a beta test of the Anom surveillance operation. The third country allowed the FBI to overcome this legal hurdle. The country hosted the Anom interception server for the FBI, and then provided Anom's messages to American authorities every Monday, Wednesday, and Friday. That country "requested its participation be kept confidential," according to a document I previously obtained. The document said the third country was a European Union member but did not name the country itself. "The FBI is neither now nor in the future in a position to release the identity of the aforementioned third country," the document added. That country was Lithuania, 404 Media has learned from a source briefed on the operation but who did not work on it on the U.S. side.

Your Rights Online

NYPD Spent Millions To Contract With Firm Banned by Meta for Fake Profiles (theguardian.com) 27

New York law enforcement agencies have spent millions of dollars to expand their capabilities to track and analyze social media posts, new documents show, including by contracting with a surveillance firm accused of improperly scraping social media platforms for data. From a report: Documents obtained by the Surveillance Technology Oversight Project (Stop), a privacy advocacy non-profit and shared with the Guardian, reveal the New York police department in 2018 entered a nearly $9m contract with Voyager Labs, a surveillance company that has been sued by Meta for allegedly using nearly 40,000 fake Facebook accounts to collect data on an estimated 600,000 users. NYPD purchased Voyager Labs products that the company claims can use artificial intelligence to analyze online human behavior and detect and predict fraud and crimes, the documents show.

A separate document reveals a contract between the Queens district attorney and Israeli firm Cobwebs Technologies, which also offers social network mapping products, as well as tools to track location information through phones. It's unclear how much that contract is worth. Law enforcement across the United States have worked with social media analytics companies for years, hoping to more effectively and efficiently collect and make sense of the hordes of personal information available on the internet. But experts have argued the practice can cross ethical and legal lines, particularly when used to access private information, make inferences or predict future criminality based on the content posted on social media, or otherwise help law enforcement skip obtaining subpoenas and warrants before gathering information on someone.

Privacy

Polish Senate Says Use of Government Spyware is Illegal in the Country (techcrunch.com) 4

A special commission within Poland's Senate concluded that the government's use of spyware, like the one made by NSO Group, is illegal. From a report: The commission announced on Thursday the conclusion of its 18-month-long investigation into allegations that the Polish government used NSO's spyware, known as Pegasus, to spy on an opposition politician and other politicians around the time of the country's 2019 elections. "Pegasus cannot be used under Polish law," the report read, according to a machine translation. "This is because the Polish legal system does not allow the use of programs in which acquired operational data is transferred through transmission channels uncontrolled by the relevant services, as this creates the risk of violating its integrity and does not ensure its confidentiality, as required by law."

In other words, NSO's spyware is not designed in a way that respects Polish law, collects too much information, and cannot guarantee that that information is secured properly, according to the report. The commission also concluded that the Polish government used Pegasus to retaliate against opposition figures, and that these surveillance operations negatively influenced the 2019 elections in the country. The commission compared these abuses with Russian government hackers activities in the 2016 elections in the United States.

United States

US Spy Agency Dreams of Surveillance Underwear (theintercept.com) 82

The future of wearable technology, beyond now-standard accessories like smartwatches and fitness tracking rings, is ePANTS, according to the intelligence community. The Intercept: The federal government has shelled out at least $22 million in an effort to develop "smart" clothing that spies on the wearer and its surroundings. Similar to previous moonshot projects funded by military and intelligence agencies, the inspiration may have come from science fiction and superpowers, but the basic applications are on brand for the government: surveillance and data collection. Billed as the "largest single investment to develop Active Smart Textiles," the SMART ePANTS -- Smart Electrically Powered and Networked Textile Systems -- program aims to develop clothing capable of recording audio, video, and geolocation data, the Office of the Director of National Intelligence announced in an August 22 press release. Garments slated for production include shirts, pants, socks, and underwear, all of which are intended to be washable.

The project is being undertaken by the Intelligence Advanced Research Projects Activity, the intelligence community's secretive counterpart to the military's better-known Defense Advanced Research Projects Agency, or DARPA. IARPA's website says it "invests federal funding into high-risk, high reward projects to address challenges facing the intelligence community." Its tolerance for risk has led to both impressive achievements, like a Nobel Prize awarded to physicist David Wineland for his research on quantum computing funded by IARPA, as well as costly failures. "A lot of the IARPA and DARPA programs are like throwing spaghetti against the refrigerator," Annie Jacobsen, author of a book about DARPA, "The Pentagon's Brain," told The Intercept. "It may or may not stick."

Crime

NYPD To Deploy Drones To Monitor Backyard Parties This Holiday Weekend (techspot.com) 120

"The NYC police department intends to use drones to monitor Labor Day backyard parties, raising privacy concerns," writes Slashdot reader jjslash. "Drone usage by U.S. police departments is increasing, with some operating them beyond visual line of sight. TechSpot reports: "If a caller states there's a large crowd, a large party in a backyard, we're going to be utilizing our assets to go up and go check on the party," said assistant NYPD Commissioner Kaz Daughtry at a recent press conference. Naturally, the admission attracted the attention of privacy and civil liberties advocates who questioned if the department's plans violate existing laws governing surveillance in the area.

In its unmanned aircraft systems (UAS): Impact and use policy from 2021, the NYC police department said drones would not be used in areas where there is a reasonable expectation of privacy without a search warrant, except in exigent circumstances (PDF). Are backyard parties really all that pressing?
"Deploying drones in this way is a sci-fi inspired scenario," said Daniel Schwarz, a technology and privacy strategist with the New York Civil Liberties Union. Schwarz added that it is at variance with the Public Oversight of Surveillance Technology (POST) Act, which "requires the reporting and evaluation of surveillance technologies used by the NYPD."
Government

IBM Returns To the Facial Recognition Market 17

During the Black Lives Matter protests in 2020, IBM announced that it would no longer offer "general purpose" facial recognition technology due to concerns about racial profiling, mass surveillance, and other human rights violations. Now, according to The Verge and Liberty Investigates, "IBM signed a $69.8 million contract with the British government to develop a national biometrics platform that will offer a facial recognition function to immigration and law enforcement officials." From the report: A contract notice for the Home Office Biometrics Matcher Platform outlines how the project initially involves developing a fingerprint matching capability, while later stages introduce facial recognition for immigration purposes -- described as "an enabler for strategic facial matching for law enforcement." The final stage of the project is described as delivery of a "facial matching for law enforcement use-case." The platform will allow photos of individuals to be matched against images stored on a database -- what is sometimes known as a "one-to-many" matching system. In September 2020, IBM described such "one-to-many" matching systems as "the type of facial recognition technology most likely to be used for mass surveillance, racial profiling, or other violations of human rights."

IBM spokesman Imtiaz Mufti denied that its work on the contract was in conflict with its 2020 commitments. "IBM no longer offers general-purpose facial recognition and, consistent with our 2020 commitment, does not support the use of facial recognition for mass surveillance, racial profiling, or other human rights violations," he said. "The Home Office Biometrics Matcher Platform and associated Services contract is not used in mass surveillance. It supports police and immigration services in identifying suspects against a database of fingerprint and photo data. It is not capable of video ingest, which would typically be needed to support face-in-a-crowd biometric usage."

Human rights campaigners, however, said IBM's work on the project is incompatible with its 2020 commitments. Kojo Kyerewaa of Black Lives Matter UK said: "IBM has shown itself willing to step over the body and memory of George Floyd to chase a Home Office contract. This won't be forgotten." Matt Mahmoudi, PhD, tech researcher at Amnesty International, said: "The research across the globe is clear; there is no application of one-to-many facial recognition that is compatible with human rights law, and companies -- including IBM -- must therefore cease its sale, and honor their earlier statements to sunset these tools, even and especially in the context of law and immigration enforcement where the rights implications are compounding."

Slashdot Top Deals