USGovernment

Latest

  • US government declassifies documents concerning telephonic data collection

    by 
    Melissa Grey
    Melissa Grey
    07.31.2013

    Today brings another victory for transparency as the US government has just declassified three documents pursuant to the collection of telephonic metadata authorized by section 215 of the PATRIOT Act. The documents, released by the Office of the Director of National Intelligence, include the 2009 and 2011 reports concerning the reauthorization of the PATRIOT Act as well as the order for business record collection. During a Senate Judiciary Committee hearing on the subject, NSA Deputy Director John Inglis made public for the first time the mechanism for accessing the metadata at the government's disposal. According to Inglis, telephonic information -- which does not include names, addresses, or social security numbers -- exists in databases but cannot be accessed without reasonable suspicion of association with terrorists. Deputy Attorney General James Cole went on to say, "Nobody is listening to anybody's conversations." This revelation might be cold comfort to those concerned about the government's ownership of this data to begin with, but it does pull back the curtain somewhat on the NSA's policies and procedures. To read these declassified -- and heavily redacted -- documents in full, head on over to the source link below.

  • US government will declassify Yahoo documents and court decision by September

    by 
    Melissa Grey
    Melissa Grey
    07.30.2013

    Earlier this month, the US government was put in the hot seat with regards to the Justice Department's 2008 battle with Yahoo over its request for user data. Yahoo fought the PRISM demand and ultimately lost; five years later, we're finally going to be able to see the court decision that's been kept under lock and key since then. The clock is ticking for the federal government, as the Foreign Intelligence Surveillance Court has set a September deadline for unveiling those classified documents. While this might be a victory for transparency, it's important to remember that declassification doesn't necessarily mean full disclosure. The government will still have the option to redact certain portions of text that it feels must remain classified. Considering its reticence to share the information in the first place, we can probably expect to see a liberal distribution of those pesky black rectangles.

  • White House telecom advisor brings together privacy code of conduct for apps

    by 
    Steve Dent
    Steve Dent
    07.26.2013

    The White House's main telecom adviser, the National Telecommunications and Information Administration (NTIA), has issued a first draft of a mobile apps code of contact, with the goal of giving consumers more control of their privacy. It facilitated its creation over several years by stakeholders like privacy advocates, app developers and gatekeepers like Apple, Google and Blackberry. If adopted, publishers will be required to provide "short form notices" telling consumers whether or not their data is being collected and how it's being used. Such data would include biometrics, browser history, phone or SMS logs, contact info, financial data, health, medical or therapy info, user files and location data. The document was backed by the American Civil Liberties Union, though it wasn't crazy about the amount of time the process took, saying that "comprehensive privacy legislation" was also needed. It's worth noting that major app store operators already agreed recently to put new privacy policy standards in place that conform with California's Online Privacy Protection Act. There's also the irony of the US government pushing for more consumer privacy, while perhaps being the largest abuser via PRISM. Dig into the source for the full read.

  • Google Drive reportedly encrypting files, keeping prying eyes off of your cloud

    by 
    Timothy J. Seppala
    Timothy J. Seppala
    07.17.2013

    CNET has learned that Google may be implementing measures to keep the government (or anyone else) out of your Google Drive-stored data. Should this be true, folks concerned about their privacy -- everyone, we would hope -- might rest easier in a post-PRISM world. According to one of CNET's anonymous sources, this isn't some flight of fancy, either: A small percentage of Drive files are already protected. Of course, even such digital protection is not guaranteed to keep your files private, but it would force those who would like a peek to obtain your login credentials first. Not that Uncle Sam would ever do such a thing without legal permission, right?

  • Apple releases statement on customer privacy, received over 4,000 government information requests in six months

    by 
    Mat Smith
    Mat Smith
    06.17.2013

    Following the likes of Microsoft and Facebook, Apple has publicly responded to the explosion of interest in the NSA's PRISM program, and has been authorized to reveal some of the data on what it's shared with the US government in the past. It apparently first heard of the program when the media started to ask about it earlier this month and has reiterated that it provides no government agency with direct access to its servers. It does, however, get its fair share of requests for customer data from US law enforcement, receiving between 4,000 and 5,000 of them between December 1 2012 and May 31 2013. These requests covered over 9,000 accounts or devices, and come from federal, state and local authorities. Apple elaborated a little on these information requests too, saying that the majority of these requests have involved searching for missing children, preventing suicides and robberies. The company says it has "always placed a priority on protecting our customers' personal data," and its legal team evaluates each request. Apparently, Apple can't decrypt (and thus share) iMessage and FaceTime data, which is encrypted end-to-end. We've added its full statement after the break.

  • US officials say less than 300 phone numbers were investigated in 2012, data thwarted terrorist plots

    by 
    Sean Buckley
    Sean Buckley
    06.16.2013

    With all the coverage of PRSIM and the NSA's data collection have been getting recently, it's no surprise that the US government is eager to rationalize its actions. The crux of the latest defense seems to be that the government isn't using its treasure trove of data very often: according to recently declassified documents, the NSA used the database to investigate less than 300 phone numbers last year. These efforts reportedly prevented terrorist actions in more than 20 countries. It's a small assurance, but a vague one, and the NSA knows it -- according to the Associated Press, the organization is trying to get the records of these thwarted plots declassified to demonstrate the program's value to concerned citizens. The reveal of such data might be a convincing argument, but disquieting revelations continue to roll out: members of congress are now reporting that the NSA has acknowledged that it does not need court authorization to listen to domestic phone calls. Either way, we're certainly open to more government transparency.

  • Apple denies involvement in US government communication surveillance

    by 
    Megan Lavey-Heaton
    Megan Lavey-Heaton
    06.06.2013

    Apple has told CNBC that it does not provide the US government with direct access to its servers, contradicting a Washington Post report that the company, among others, is knowingly participating in a secret program that is allowing the government to monitor the activity of US residents. The program, codenamed PRISM, was created in 2007 and is used by the National Security Agency and the FBI to provide information on everything from emails to photo and videos and connection logs to monitor a person's online movements -- all without having a warrant issued. The companies the Washington Post say have openly complied with PRISM include Apple, Google, Microsoft, Yahoo, Facebook, PalTalk, Skype and YouTube with Dropbox appearing to jump on board soon. PRISM can "quite literally can watch your ideas form as you type," a government official told the Washington Post. Google has issued a similar denial to Apple, saying that no "back door" into Google's servers exist.

  • US government funds five-year tech research 'hub' to make substantially cheaper, more powerful batteries

    by 
    Mat Smith
    Mat Smith
    12.03.2012

    Want substantially better battery tech? Sometimes, you just have draw together the greatest heroes scientists and engineers and just hammer these things out -- and it helps when there's some money to splash around, too. The US government's awarding $120 million over five years to a new research hub that will draw together a handful of progressive independent research programs, coordinating five national labs, five universities and four private firms to push the humble power pack to new heights. These future advances may not be precisely geared toward making your phone go (even) further however, with energy storage improvements likely to feed into improved vehicle battery storage and charging and better ways to hold onto renewable energy sources. The hub management is being compared to the likes of AT&T Bell's transistor development, the Manhattan project and MIT's Lincoln lab that was responsible for the radar. So no pressure there then.

  • Reuters: White House finds no evidence of spying by Huawei, feels unsafe anyway (update: White House denies)

    by 
    Sean Buckley
    Sean Buckley
    10.17.2012

    Just last week, a Congress committee associated Huawei with "credible allegations" of "bribery, corruption, discriminatory behavior and copyright infringement." The report, of course, was part of the Legislative branch's ongoing concern of the company's alleged threat to national security. Today Huawei may have finally caught a break from the US government, albeit a somewhat backhanded one: according to Reuters, a White House ordered review says that there is no evidence of spying on the Chinese company's part. The other side of the hand lands when the report cites exploitable vulnerabilities in Huawei hardware -- one person familiar with the White House review said it found the company's equipment "riddled with holes," and susceptible to hacking. Security complaints aside, the government's old spying concerns are still there. "China has the means, opportunity and motive to use telecommunications companies for malicious purposes," said the House Intelligence Committee's Dutch Ruppersberger, explaining to Reuters that both Huawei and ZTE has pinned their limited cooperation on restrictions from the local government. Even if Huawei hasn't been caught spying, it's still something it could do -- and that's reason enough, it seems, for the US government to avoid doing business with the firm. Update: White House spokesperson Caitlin Hayden told The Hill that no such investigation has been made, stating: "The White House has not conducted any classified inquiry that resulted in clearing any telecom equipment buyer as reported in Reuters," recalling the US government's exclusion of Huawei in the planning for America's interoperable wireless emergency network.

  • Alt-week 7.21.12: Outer space, flying hotels and federal trolls

    by 
    James Trew
    James Trew
    07.21.2012

    Alt-week peels back the covers on some of the more curious sci-tech stories from the last seven days. Whether you've got your head in the clouds, or your feet firmly locked on terra firma (or is that terrorist firma?) the last seven days in Alt have something for you. We look at a massive aircraft, that could revolutionize air travel as we know it, as well as look back at a real-world project that heralded a significant shift even further up in the sky. There's the NASA logo that never came to be, and lastly, for those less fond of heights, we hear how a US government department is heading in the other direction -- albeit culturally -- all in the fight against terror. This is alt-week.

  • White House aims to make internet '90 percent cheaper' to build, teams up with Mozilla for $500k competition

    by 
    Mat Smith
    Mat Smith
    06.14.2012

    The government's US Ignite partnership aims to push the growth of next-generation broadband networks, teaming up with over 100 start-ups, universities and existing tech companies like HP, Comcast and Verizon for the project. The President is set to sign an executive order today that aims to cut the cost of broadband construction across federal roadways and properties by up to 90 percent. The White House is also is looking to improve "next-generation applications and (the) digital experience," running on networks that are a heady 100 times faster than what's in use today. The National Science Foundation has thrown in $250 million to assist the partnership's creation of a national 1-gigabit network that would connect together academic and developer hubs. Mozilla has decided to team up with the foundation to offer up a $500,000 prize pot for developers looking to help create the "internet of the future". The challenge aims on education, healthcare, public safety and other (admittedly broad) topics, with the top ideas capable of grabbing $15,000 from the prize fund. And if Google reckons gigabit networks are the way to go, who's the White House to argue?

  • Precise Biometrics' Tactivo for iPhone, iPad locks data by fingerprint and smart card, is overkill for your diary (video)

    by 
    Jon Fingas
    Jon Fingas
    05.28.2012

    iOS device security has regularly been a concern of the government, but locking down one of Apple's devices for the government is still fresh. Precise Biometrics hopes to have the problem licked through the Tactivo, a combo fingerprint and smart card reader for the iPhone 4 / 4S (and the iPad, in the summer). Either method keeps data inside an app away from prying eyes, and while they won't tighten the security around the built-in apps, they do make sure a third-party app's data meets US and international government privacy specs without having to use a BlackBerry. We're not surprised that the Tactivo needs to engulf the iPhone in a full case to work its magic, although there's a micro-USB port to keep it powered and synced up. It's all a bit much if you're just trying to make sure your list of high school crushes stays a secret, and the price reflects that -- at $249 a pop, the Tactivo is really meant for agencies and companies for whom losing the data on an iPhone would cost a lot more. Still, if you're running an outfit encouraging BYOD phone use or just really, really want your secret passions to stay private, both the iPhone case and a BioSecrets app are ready today.

  • US government sticking with BlackBerry, appreciates RIM's focus on security

    by 
    Edgar Alvarez
    Edgar Alvarez
    04.05.2012

    Just when you thought RIM couldn't catch a break, The Washington Post is reporting the US government doesn't plan to jump smartphone ships anytime soon. According to the publication, Casey Coleman (chief information officer at the General Services Administration) says that while the agency may have handed out iPhone and Android phones to the staff, a big chunk of the 12,000 agency-issued handsets are BlackBerry devices. The main reason behind the choice of Berries is RIM's focus on security, which Coleman notes "is paramount for government use." Still, the GSA officer isn't ruling out switching to a different OS in the distant future, as platforms like iOS and Android start to become "equally secure." For RIM's sake, we hope the refocusing on enterprise pays off.

  • U.S. Department of Defense preps cyber rules of engagement, plans to work more closely with ISPs

    by 
    Sean Buckley
    Sean Buckley
    03.22.2012

    The Pentagon left no room for argument last year when it declared cyber attacks a potential act of war. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," a military official reportedly remarked. Yikes. Before we start bombing chimneys, however, the Department of Defense plans to draft up some relevant guidelines, noting in a recent House Armed Services Committee hearing that it will be delivering a set of cyberspace-specific rules of engagement in the coming months. "We are working closely with the joint staff on the implementation of a transitional command and control model for cyberspace operations," said Madelyn Creedon, assistant secretary of defense for Global Strategic Affairs. In addition to setting ground rules for cyber-engagements, the DOD also plans to expand efforts to share classified information on possible threats with internet service providers and defense contractors.

  • US government wants schools to embrace digital textbooks

    by 
    Steve Sande
    Steve Sande
    02.02.2012

    Although they haven't exactly explained how school systems or parents are going to pay for iPads or other tablets for every student, the US government is pushing a new initiative to move from standard printed textbooks to digital textbooks within the next five years. While it's good to see that a focus on digital textbooks is finally at hand, it's going to take more than a press release, five years and a "playbook" to make the transition happen. According to an AP news release, "Education Secretary Arne Duncan and Federal Communications Commission chairman Julius Genachowski on Wednesday challenged schools and companies to get digital textbooks in students' hands within five years." In an interview, Duncan asked, "Do we want kids walking around with 50-pound backpacks and every book in those backpacks costing 50, 60, 70 dollars and many of them being out of date? Or, do we want students walking around with a mobile device that has much more content than was even imaginable a couple years ago and can be constantly updated? I think it's a very simple choice." To school systems that are battling drastically decreased budgets and trying to replace or repair crumbling infrastructure, it might not be such a "simple choice." Likewise, there doesn't appear to have been much (if any) thought on how parents or schools systems are going to replace equipment that is broken or lost by students, or how to pay for digital devices to be refreshed every three to five years. Wednesday's announcement comes just two weeks after Apple's education event and the launch of iBooks textbooks. The company is perfectly placed, both in terms of the iPad hardware platform and iBooks Author creation tool, to benefit from a move to interactive and easily updated electronic textbooks. The government released a 67-page "playbook" promoting the use of digital textbooks and offering guidance to school systems who want to make the move. At the current time, about US$8 billion is spent each year on traditional textbooks for K-12 school kids. With an Apple educational discount, that could pay for more than 17 million iPads each year. If Apple, as rumored, brings down the price of entry into the iPad market by selling the iPad 2 alongside a future model, more devices could make it into the hands of students across the nation. On the other hand, switching to digital textbooks means more than just acquiring hardware and buying textbook apps. In many cases, the curriculum provided by a school district and even the methods used by instructors to teach students must change as well. The educational five-year plan is a noble goal; it's just not very realistic.

  • Chinese hackers target U.S. Chamber of Commerce, sensitive data stolen

    by 
    Lydia Leavitt
    Lydia Leavitt
    12.24.2011

    According to sources close to The Wall Street Journal, Chinese hackers are at it again, this time hitting the U.S. Chamber of Commerce and capturing information from three million members. Those familiar with the matter told the WSJ that hackers stole around six weeks worth of emails regarding Asian policy, but may have had access to sensitive correspondences for as long as a year. The Chamber only learned it was under attack when the FBI sent an alert that servers in China were stealing information, although the exact amount of data stolen is unknown. After confirming the breach, the Chamber shut down and destroyed parts of its computer network, proceeding to revamp its security system over a 36-hour period. Unfortunately, this isn't the first time the U.S. of A has fallen victim to Chinese hackers, as both Google and NASA have experienced breaches over the past few years. The Chamber is currently investigating the attack, hoping to find some digital clues that might reveal the details of who done it and why.

  • Federal domain seizure raises new concerns over online censorship

    by 
    Amar Toor
    Amar Toor
    12.09.2011

    It's been a little more than a year since the US government began seizing domains of music blogs, torrent meta-trackers and sports streaming sites. The copyright infringement investigation, led by US Immigrations and Customs Enforcement (ICE) authorities, quickly raised eyebrows among many free speech and civil rights advocates, fueling a handful of legal challenges. Few are more compelling, or frightening than a case involving Dajaz1.com. As TechDirt reports, the popular hip-hop blog has been at the epicenter of a sinuous and seemingly dystopian dispute with the feds -- one that underscores the heightening controversy surrounding federal web regulation, and blurs the constitutional divide between free speech and intellectual property protection. Dajaz1 was initially seized under the 2008 Pro IP Act, on the strength of an affidavit that cited several published songs as evidence of copyright infringement. As it turns out, ,any of these songs were actually provided by their copyright holders themselves, but that didn't stop the government from seizing the URL anyway, and plastering a warning all over its homepage. Typically, this kind of action would be the first phase of a two-step process. Once a property is seized, US law dictates that the government has 60 days to notify its owner, who can then choose to file a request for its return. If the suspect chooses to file this request within a 35-day window, the feds must then undertake a so-called forfeiture process within 90 days. Failure to do so would require the government to return the property to its rightful owner. But that's not exactly how things played out in the case of Dajaz1. For more details on the saga, head past the break.

  • White House releases early test code for Data.gov platform, moves closer to open source reality

    by 
    Amar Toor
    Amar Toor
    12.06.2011

    The White House's Open Government Partnership inched closer to maturity last week, with the release of a new open data platform, designed to help other governments set up their own Data.gov portals. On Wednesday, Data.gov developer Chris Musialek posted the first pieces of early test code for the unfortunately named "Data.gov-in-a-box" -- an open source version of the US and Indian governments' respective data portals. Both countries, in fact, have been working on the platform since August, with the Obama administration pledging some $1 million to the effort. The idea, according to federal CIO Steve VanRoekel and federal CTO Aneesh Chopra, is to encourage "governments around the word to stand up open data sites that promote transparency, improve citizen engagement, and engage application developers," using Data.gov (and its 400,000 datasets) as a blueprint. Wednesday's release is just the first step in that plan, with the finalized Open Government Platform (OGPL) slated for launch by early next year.

  • US Cyber Command completes major cyber attack simulation, seems pleased with the results

    by 
    Amar Toor
    Amar Toor
    12.02.2011

    The US Cyber Command is barely out of its infancy, but it's already crossed one milestone off its to-do list, with the successful completion of its first major test run. The exercise, known as Cyber Flag, was carried out over the course of a single week at Nellis Air Force Base in Nevada, where some 300 experts put their defense skills to the test. According to Col. Rivers J. Johnson, the participants were divided into two teams: "good guys," and "bad guys." The latter were delegated with the task of infiltrating the Cyber Command's networks, while the former were charged with defending the mock cyberattack and keeping the government's VPN free of malware. The idea, according to the agency, was to simulate a real-world attack on the Department of Defense, in order to better evaluate the Command's acumen. "There were a variety of scenarios based on what we think an adversary would do in real world events and real world time," Johnson explained. "It was a great exercise." The Colonel acknowledged that the good guys weren't able to defend against all of the attacks, but pointed out that the vast majority were recognized and mitigated "in a timely manner." All told, Cyber Flag was deemed a success, with NSA Director and Cyber Command chief Gen. Keith Alexander adding that it "exceeded" his own expectations.

  • Google drops cloud computing lawsuit against US Department of the Interior

    by 
    Amar Toor
    Amar Toor
    09.28.2011

    Last year, Google filed a lawsuit against the US Department of the Interior, on allegations that the government unfairly awarded a $59 million cloud computing contract to Microsoft without conducting a sufficiently competitive auction. Big G won an injunction against the department in January, effectively putting the contract on hold, and it looked as if the company would prevail, with Judge Susan Braden recently declaring that there was a "justifiable basis" for dispute. Last week, however, Google decided to drop the suit altogether, after filing a motion in the US Court of Federal Claims. "Based on the defendant's agreement to update its market research and then conduct a procurement in a manner that will not preclude plaintiffs from fairly competing, plaintiffs respectfully move for dismissal of this action without prejudice," the company's attorney wrote in the motion, filed on Thursday. Federal lawyers, however, responded by claiming that the two sides have not reached an agreement, while confirming that it had no problem with Google's decision to cease litigation. It remains to be seen whether the two sides have truly reached an agreement, or whether the litigation may wear on, but we'll keep you abreast of any future developments.