Hacker News with Generative AI: Government Surveillance

Apple pulls data protection tool after UK government security row (bbc.com)
Apple is taking the unprecedented step of removing its highest level data security tool from customers in the UK, after the government demanded access to user data.
ICE wants to know if you're posting negative things about it online (theintercept.com)
Amid anger and protest over the Trump administration’s plan to deport millions of immigrants, U.S. Immigration and Customs Enforcement plans to monitor and locate “negative” social media discussion about the agency and its top officials, according to contract documents reviewed by The Intercept.
MI5 lied to courts to protect violent neo-Nazi spy (bbc.com)
MI5 lied to three courts while defending its handling of a misogynistic neo-Nazi state agent who attacked his girlfriend with a machete, the BBC can reveal.
Apple's Best Option: Decentralize iCloud (mnot.net)
As has been widely reported, the government of the United Kingdom has secretly ordered Apple to build a back door into iCloud to allow ‘blanket capability to view fully encrypted material.’
The UK's Demands for Apple to Break Encryption Is an Emergency for Us All (eff.org)
The Washington Post reported that the United Kingdom is demanding that Apple create an encryption backdoor to give the government access to end-to-end encrypted data in iCloud.
U.K. orders Apple to let it spy on users' encrypted accounts (msn.com)
UK government reportedly demands Apple backdoor to encrypted cloud data (techcrunch.com)
Government officials in the United Kingdom have reportedly secretly ordered Apple to build a backdoor that would give its authorities access to users’ encrypted iCloud data.
Spyware maker Paragon confirms U.S. government is a customer (techcrunch.com)
Israeli spyware maker Paragon Solutions confirmed to TechCrunch that it sells its products to the U.S. government and other unspecified allied countries.
Cointelpro (wikipedia.org)
COINTELPRO (a syllabic abbreviation derived from Counter Intelligence Program) was a series of covert and illegal[1][2] projects conducted between 1956 and 1971 by the United States Federal Bureau of Investigation (FBI) aimed at surveilling, infiltrating, discrediting, and disrupting American political organizations that the FBI perceived as subversive.[3][4][5][6]
Big brother becomes little brother (kenklippenstein.com)
Envious of the power and wealth of corporate America, the head of U.S. intelligence has issued a new directive calling on the spy agencies to “routinize”  and “expand” their partnerships with private companies.
Court Says Feds Must Obtain Warrant to Search FISA Spy Databases (gizmodo.com)
One of the government’s most controversial warrantless spying practices does, in fact, require a warrant, according to a new federal court ruling.
Government Monitoring Those with "Negative" Views of Health Insurance Companies (kenklippenstein.com)
If you expressed “negative sentiment” toward insurance companies on social media following the murder of UnitedHealthcare’s CEO last month, the government was watching.
Hackers Claim Breach of Location Data Giant, Threaten to Leak Data (404media.co)
Hackers claim to have compromised Gravy Analytics, the parent company of Venntel which has sold masses of smartphone location data to the U.S. government.  The hackers said they have stolen a massive amount of data, including customer lists, information on the broader industry, and even location data harvested from smartphones which show peoples’ precise movements, and they are threatening to publish the data publicly.
Return to NSA's Menwith Hill with 60 Minutes (2000) (cryptome.org)
The trip to Menwith Hill was on the spur of the moment. I mentioned to 60 Minutes producer Peter Klein: have passport will travel, I just do not have the funds. Next thing I knew Trisha Sorrels from 60 Minutes was e-mailing me asking if I would go and that they would pay for the trip, wow.
Was the US Telecom Breach Inevitable, Proving Backdoors Can't Be Secure? (theintercept.com)
Hackers have gained sweeping access to U.S. text messages and phone calls — and in response, the FBI is falling back on the same warmed-over, bad advice about encryption that it has trotted out for years.
FBI Official Reluctantly Touts Encryption Due to Chinese Hack of US Telecoms (techdirt.com)
Thanks to government-mandated backdoors in US telecom/broadband services, the FBI — at least in the form of an official who refused to identify themself — has had to recommend (albeit extremely half-heartedly) that encrypted communications are perhaps the only thing keeping phone owners from being actively surveilled by Chinese hackers.
Trump DOJ obtained phone, text logs of 43 staff, 2 members of Congress (nbcnews.com)
Seeking to investigate leaks of classified information, the Trump Justice Department in 2017 and 2018 secretly obtained phone and text message logs of 43 congressional staffers and two members of Congress in a far broader probe than previously known, according to a new report by the department’s internal watchdog.
Chinese insiders steal data scooped by President Xi's national surveillance sys (theregister.com)
Feature Chinese tech company employees and government workers are siphoning off user data and selling it online - and even high-ranking Chinese Communist Party officials and FBI-wanted hackers' sensitive information is being peddled by the Middle Kingdom's thriving illegal data ecosystem.
The CIA, NSA, and Pokémon Go (locals.com)
With Pokémon Go currently enjoying, what I would call, a wee-bit-o-success, now seems like a good time to talk about a few things people may not know about the world's favorite new smartphone game.
Senators say TSA's facial recognition program is out of control (gizmodo.com)
A bipartisan group of 12 senators has urged the Transportation Security Administration’s inspector general to investigate the agency’s use of facial recognition, saying it poses a significant threat to privacy and civil liberties.
Australia increasingly hostile toward secure messaging apps (theguardian.com)
The founder of an encrypted messaging app who left Australia for Switzerland after police unexpectedly visited an employee’s home says he had left because of Australia’s “hostile” stance against developers building privacy-focused apps.
Online Age Verification as Trojan Horse for the Mass Rollout of Digital IDs? (nakedcapitalism.com)
Online age verification threatens to trap everyone, not just minors, in its web, as the Australian government recently admitted.
Salt Typhoon Shows There's No Security Backdoor That's Only for the "Good Guys" (eff.org)
At EFF we’ve long noted that you cannot build a backdoor that only lets in good guys and not bad guys. Over the weekend, we saw another example of this: The Wall Street Journal reported on a major breach of U.S. telecom systems attributed to a sophisticated Chinese-government backed hacking group dubbed Salt Typhoon.
India shuts down the internet far more than any other country (restofworld.org)
India has been a leader in internet shutdowns, by a huge margin, for nearly a decade, according to data shared by digital rights watchdog Access Now.
Chinese hack shows why Apple is right about backdoors for law enforcement (9to5mac.com)
It was revealed this weekend that Chinese hackers managed to access systems run by three of the largest internet service providers (ISPs) in the US.
Reports: China hacked Verizon and AT&T, may have accessed US wiretap systems (arstechnica.com)
Chinese government hackers penetrated the networks of several large US-based Internet service providers and may have gained access to systems used for court-authorized wiretaps of communications networks, The Wall Street Journal reported Saturday.
Salt Typhoon hacked US broadband providers and breached wiretap systems (securityaffairs.com)
Reports: China hacked Verizon and AT&T, may have accessed US wiretap systems (arstechnica.com)
Chinese government hackers penetrated the networks of several large US-based Internet service providers and may have gained access to systems used for court-authorized wiretaps of communications networks, The Wall Street Journal reported Saturday.
China hacked Verizon, AT&T and Lumen using the FBI's backdoor (pluralistic.net)
State-affiliated Chinese hackers penetrated AT&T, Verizon, Lumen and others; they entered their networks and spent months intercepting US traffic – from individuals, firms, government officials, etc – and they did it all without having to exploit any code vulnerabilities. Instead, they used the back door that the FBI requires every carrier to furnish:
Government Wiretaps in U.S. Internet Providers Infiltrated by Chinese Hackers (vulnu.com)
U.S. spying on it's citizens and China taking advantage of that backdoor for months before anyone realizing.