Showing posts with label surveillance. Show all posts
Showing posts with label surveillance. Show all posts

Sunday, 4 July 2021

Queensland, West Australian and Victorian state police services have admitted trying to access logs of contract tracing services created since the start of the COVID-19 pandemic – the other five state & territory police services denying having done so thus far

 

Crikey, 1 June 2021:


Police across the country are attempting to access personal data from mandatory COVID-19 check-in apps for reasons other than contact tracing, despite promises that the data would only be used for public health reasons.


Police in Queensland, Western Australia and Victoria have all owned up to trying to access logs of data created by Australians using check-in applications as part of their investigations, and enquiries by Crikey suggest that police in other states could also access this data using a warrant.


Privacy advocates have slammed state governments for lying to Australians about what the data would be used for.


We were told this data would only be used for contact tracing. Police made that a lie,” Electronic Frontiers Australia’s Justin Warren told Crikey. “People will remember that next time governments want us to give them data about ourselves.”


One of the major tools in fighting the spread of COVID-19 and managing outbreaks has been contact tracing, which has been aided by various tech solutions.


When the federal government first proposed the contact tracing app COVIDSafe (which used Bluetooth to log close contacts), it responded to fears of a mass surveillance state by announcing the data would not be used by police.


But adoption of a QR code check-in system — the widely used, low-tech alternative now mandatory in many places around the country — was left to states to implement. As it turns out, these states did not assume the same protections for their citizens, meaning that data volunteered in the name of public health has been accessed for other reasons…..


Read the full article here.


Saturday, 14 October 2017

Political Tweets of the Week




Wednesday, 26 October 2016

This type of police surveillance will come as no surprise to Australian blogs which post on local and regional protests


CNN.com, 11 October 2016:

The ACLU of California reported that Geofeedia had been providing law enforcement with data -- including locations -- from the social media accounts of protestors. In response, it said Tuesday that Twitter, Facebook, and Instagram had cut off Geofeedia's access to their feeds.

The extent of law enforcement's social media surveillance was discovered through public records requests of 63 agencies in California, according to the ACLU of California. Emails obtained show the tools were used to monitor chatter around "the Ferguson situation," and that Geofeedia told California law enforcement agencies to find out how police in Baltimore used its tools to "stay one step ahead of rioters," after the death of Freddie Gray in police custody.

Geofeedia provided searchable data from public Instagram posts, troves of publicly shared information from Facebook (FBTech30) via the Topic Feed API, and public tweets. Information in Twitter, Facebook, and Instagram posts can be used to infer things like location, personal associations and religious affiliation.

The ACLU says Geofeedia and other social media surveillance tools can unfairly impact communities of color. Movements like #BlackLivesMatter began on social media, and Twitter, in particular, is used as a platform for organizing and amplifying protests.

"Communities of color rely on platforms to organize, to persuade, and to spread information," Matt Cagle, technology and civil liberties policy attorney at the ACLU of Northern California, told CNNMoney. "But here, the social networks left a side door open for surveillance by the police."

Law enforcement agencies invest thousands in the tools that aggregate and surveil conversation data --the Daily Dot reported that the Denver Police Department spent $30,000 on these types of tools in May. The ACLU launched an investigation in Denver in response to this report.

Based on information in the @ACLU's report, we are immediately suspending @Geofeedia's commercial access to Twitter data.
— Policy (@policy) October 11, 2016

In an email obtained by the ACLU of California through public records requests, Geofeedia claims "over 500 law enforcement and public safety agencies" use its services.

After the ACLU's report on Tuesday, Twitter tweeted that Geofeedia's access had been revoked.

"In addition to cutting off data access, the social networks should take additional steps to implement clear rules that prohibit the use of user data for surveillance, and oversight measures to ensure developers are not using the user data for surveillance," Cagle said.

The organization is joining with the Center for Media Justice and Color of Change to ask social media sites to commit to better protecting users engaged in political and social discourse.

Malkia Cyril, the executive director of the Center for Media Justice, said that people are using social media to expose human rights abuses, turning these platforms into modern day news outlets. However, the sites aren't not subject to the same kind of scrutiny or standards, she said.

"I wasn't surprised," Cyril told CNNMoney. "But I do think the average user should be shocked and dismayed at the scope and the scale of what the ACLU found."

Tuesday, 25 November 2014

What could possibly go wrong when the Abbott Government is creating Fortress Australia to protect us all from a veritable host of 'terrors'?


When the Abbott Government’s wider surveillance powers were passed by the Senate, the Australian public was being assured by both major parties that the sweeping ‘anti-terrorism’ legislation had built-in safeguards which would protect us all from over reach by intelligence agencies and police.

The good citizens of Tacoma in Pierce County, Washington, United States probably thought they were protected too. After all, didn’t the police need to get a warrant from a Superior Court judge?

The News Tribune article of 15 November 2014 shows just how easily a mockery can be made of surveillance laws:

Pierce County judges didn’t know until recently that they’d been authorizing Tacoma police to use a device capable of tracking someone’s cellphone.
Now they do, and they’ve demanded that police change the way they get permission to use their so-called cell site simulator.
From 2009 to earlier this year, the county’s Superior Court judges unwittingly signed more than 170 orders that Tacoma police and other local law enforcement agencies say authorized them to use a device that allows investigators to track a suspect’s cellphone but also sweeps cellphone data from innocent people nearby.
In August, the assistant chief of the Tacoma Police Department told The News Tribune that investigators never deployed the device — a cell site simulator, commonly known as a Stingray — without court authorization.
The newspaper since learned police never mentioned they intended to use the device when detectives swore out affidavits seeking so-called “pen register, trap and trace” orders allowing them to gather information about a suspect’s cellphone use and location…..
Neither the pen register orders nor the affidavits filed by law enforcement mentioned that police had a Stingray or intended to use it.
Instead, detectives used language commonly associated with requesting an order that would force a cellphone company to turn over records for a particular phone, and, where possible, the real-time location of the phone…..

The News Tribune 17 November 2014:
The Tacoma Police Department, which owns the Stingray, did not want to reveal it to the public. The FBI, which provided it, was leaning on the city to keep the technology secret. As a result, the judiciary that monitors investigations for constitutional abuses wasn’t aware of the kind of surveillance it was authorizing. However noble the motives, this was subterfuge….
But a Stingray — which employs technology known as cell site simulation — is so much more intrusive than conventional surveillance that it demands extra scrutiny. It pulls in cellphone transmissions from all callers in a given area and identifies the unique signatures of each phone…..
This could get spooky in a hurry. The Pierce County Superior Court now has another safeguard in place: Police must sign affidavits that they will not store data on people who are not targets of the investigation…..

Think this example of over reach is too far removed from Australia to matter? Think again…..

The Sydney Morning Herald reported on what is already occurring in Australia on 7 July 2014:

Australian federal and state police are ordering phone providers to hand over personal information about thousands of mobile phone users, whether they are targets of an investigation or not.
Fairfax Media has confirmed Australian law-enforcement agencies are using a technique known as a "tower dump", which gives police data about the identity, activity and location of any phone that connects to targeted cell towers over a set span of time, generally an hour or two.
A typical dump covers multiple towers, and mobile providers, and can net information about thousands of mobile phones.
The dumps are usually used in circumstances when police have few leads and can be a useful, powerful tool in tracking down criminals. But privacy advocates say that while they may be helpful to police, they also target thousands of innocent people and don’t have any judicial oversight.
In addition to no warrant being required to request a tower dump containing the mobile phone data of thousands of people to track down one or more criminals involved in a crime, privacy advocates also question what is being done to the data collected once an investigation is complete….