noworldsystem.com


Spongebob Selling Sex to Kids

Spongebob Selling Sex to Kids

http://www.youtube.com/watch?v=_sVczGElw6k

 



UK: Big Brother recording all calls, texts and e-mails

Big Brother database recording all our calls, texts and e-mails will ’ruin British way of life’

Daily Mail
July 16, 2008

Plans for a massive database snooping on the entire population were condemned yesterday as a ‘step too far for the British way of life’.

In an Orwellian move, the Home Office is proposing to detail every phone call, e-mail, text message, internet search and online purchase in the fight against terrorism and other serious crime.

But the privacy watchdog, Information Commissioner Richard Thomas, warned that the public’s traditional freedoms were under grave threat from creeping state surveillance.

Apart from the Government’s inability to hold data securely, he said the proposals raised ‘grave questions’.

‘Do the risks we face provide justification for such a scheme in the first place? Do we want the state to have details of more and more aspects of our private lives?

‘Whatever the benefits, would such a scheme amount to excessive surveillance? Would this be a step too far for the British way of life?’

It is thought the scheme would allow the police or MI5 to access the exact time when a phone call was made, the number dialled, the length of the call and, in the case of mobile phones, the location of the handset to within an accuracy of a few hundred yards.

Similarly for e-mails, it would provide details of when they were sent and who the recipients were. Police recovering a suspect’s computer would then be able to trawl through hard-drive records and recover particular messages. The content of telephone calls could not be recovered unless they were being intercepted at the time.

Mr Thomas’s warnings were backed by privacy campaigners, who claimed such Big Brother powers would give Government agencies unprecedented abilities to trawl through intimate details of ordinary people’s private lives at will.

He used the launch of his annual report to speak out after ministers signalled their intentions in their programme of legislation earlier this year, describing the new Bill as ‘modifying procedures for acquiring communications data’.

There are fears that the data will be shared with foreign governments – such as the Americans demanding personal details of air passengers – accessed by internet hackers or lost by bungling civil servants.

Opponents pointed out that town halls are already using extraordinary surveillance powers under the controversial Regulation of Investigatory Powers Act to investigate minor issues such as littering, or checking whether parents are abusing school catchment area rules, and they could be given access to almost unthinkable levels of personal data under the new scheme.

Currently police and MI5 can access customer records stored by telephone companies, but only with a warrant to examine individual accounts.

Mr Thomas said: ‘I am absolutely clear that the targeted and duly-authorised interception of the communications of suspects can be invaluable in the fight against terrorism and other serious crime.

‘But there needs to be the fullest public debate about the justification for, and implications of, a specially created database – potentially accessible to a wide range of law enforcement authorities – holding details of everyone’s telephone and internet communications.

’Do we really want the police, security services and other organs of the state to have access to more and more aspects of our private lives?’

Opposition MPs said the Government’s dismal records on safeguarding private data – most notably the loss of the entire child benefit database holding millions of people’s financial details – showed it was incapable of safeguarding such a vast volume of information safely, and the scheme should be dropped immediately.

An estimated 3billion emails are sent in Britain every day and last year 57billion text messages were sent.

The Home Office yesterday defended the need to keep its surveillance powers up to date with changing internet technology, and said full details of the plans would be published this year as part of a new Communications Data Bill.

Officials said the internet was rapidly revolutionising communications and it was vital for surveillance powers to keep up with technology in order to fight serious crime and terrorism.

Read Full Article Here

 

India: NSA to tap data traffic passing through Blackberry devices

Business Line
July 13, 2008

New Delhi, July 12 – In a bid to find a solution to the security concerns around Blackberry services, the National Security Adviser is now supervising a discussion between National Test Research Organisation, under the Home Ministry, Department of Telecom and Canada-based Research In Motion.

The discussions are being held to find a spot on RIM’s network where the data traffic passing through Blackberry could be intercepted by security agencies.

The agencies had earlier rejected any temporary solution to the Blackberry controversy and told the Government that it must make sure that traffic originating and terminating on the device should not travel outside the country without proper monitoring.

DoT was considering deploying certain software that would allow the security agencies to snoop into Blackberry network without having to break into the service codes.

Blackberry handsets are designed by Research In Motion and uses high encryption code, making it impossible for the Indian agencies to monitor data being transmitted by users.

The DoT had earlier asked the company to set up a local server in the country which would allow the security forces to snoop into the network. However, Research In Motion said that it was not possible to give decryption codes or set up a local data centre in the country.

The DoT had earlier asked RIM to give its codes to Indian security agencies that will enable them to monitor the data being transmitted through Blackberry. The key problem was that Indian agencies do not have the required technology to monitor data that has encryption codes higher than 40 bits.

On the issue of setting up a local data centre within the country, RIM had said that Blackberry was designed to perform as a global system independent of geography. “The location of data centres and the customer’s choice of wireless network are irrelevant factors from a security perspective since end-to-end encryption is utilised,” RIM had said.

NY subpoenas blogger id
http://www.nytimes.com/2008/0..er=MYWAY&pagewanted=print

YouTube, Viacom Agree To Anonymize Data
http://news.yahoo.com/s/ap/20..hxV5G7yprV84FDlzM55TmZk24cA

Canadian ISPs Plan Net Censorship
http://www.americanfreepress.net/html/canada_net_censorship.html

Airport scans for illegal downloads on iPods, mobile phones and laptops
http://www.telegraph.co.uk/conn..nected/2008/07/10/nairport110.xml

Army Forms Network Warfare Batallion
http://www.strategypage.com/htmw/htiw/articles/20080712.aspx

 



Internet Police: G8 Ratifies Crackdown on Illegal Downloads

Internet Police State: G8 Ratifies Crackdown on Illegal Downloads

Charles Arthur
London Guardian
July 10, 2008

The heads of the G8 governments, meeting this week, are about to ratify the Anti-Counterfeiting Trade Agreement (ACTA), which – it’s claimed – could let customs agents search your laptop or music player for illegally obtained content. The European Parliament is considering a law that would lead to people who illicitly download copyrighted music or video content being thrown off the internet. Virgin Media is writing to hundreds of its customers at the request of the UK record industry to warn them that their connections seem to have been used for illegal downloading. Viacom gets access to all of the usernames and IP addresses of anyone who has ever used YouTube as part of its billion-dollar lawsuit in which it claims the site has been party to “massive intentional copyright infringement”.

It seems that 20th-century ideas of ownership and control – especially of intellectual property such as copyright and trademarks – are being reasserted, with added legal muscle, after a 10-year period when the internet sparked an explosion of business models and (if we’re honest) casual disregard, especially of copyright, when it came to music and video.

But do those separate events mark a swing of the pendulum back against the inroads that the internet has made on intellectual property?

‘A finger in the dyke’

Saul Klein, a venture capitalist with Index Ventures who has invested in the free database company MySQL, Zend (the basis of the free web-scripting language PHP) and OpenX, an open-source advertising system, is unconvinced. “In a world of abundance – which the internet is quintessentially – that drives the price of everything towards ‘free’,” he says. “People don’t pay for any content online. Not for music, not for video. They get it, either legally or illegally.”

Is that sustainable? “The model of suing your best customers and subpoenaing private information is doomed to failure,” Klein observes. “It’s putting a finger in the dyke. It won’t change the macro trend, which is that there’s an abundance of information. Copyright owners need to find new ways to generate income from their product. The fact is, the music industry is in rude health – more people than ever before are going to concerts, making it, listening to it. It’s the labels that are screwed. The artists and managers are making money. The labels aren’t.

Read Full Article Here

Europe votes on anti-piracy laws

BBC
July 7, 2008

Europeans suspected of putting movies and music on file-sharing networks could be thrown off the web under proposals before Brussels.

The powers are in a raft of laws that aim to harmonise the regulations governing Europe’s telecom markets.

Other amendments added to the packet of laws allow governments to decide which software can be used on the web.

Campaigners say the laws trample on personal privacy and turn net suppliers into copyright enforcers.

Piracy plan

MEPs are due to vote on the so-called Telecom Packet on 7 July. The core proposals in the packet were drawn up to help European telecoms firms cope with the rapid pace of change in the industry.

Technological and industry changes that did not respect borders had highlighted the limitations of Europe’s current approach which sees national governments oversee their telecoms markets.

“The current fragmentation hinders investment and is detrimental to consumers and operators,” says the EU document laying out the proposals.

But, say digital rights campaigners, anti-piracy lobbyists have hijacked the telecoms laws and tabled amendments that turn dry proposals on industry reform into an assault on the freedom of net users.

Among the amendments are calls to enact a Europe-wide “three strikes” law. This would see users banned from the web if they fail to heed three warnings that they are suspected of putting copyrighted works on file-sharing networks.

In addition it bestows powers on governments to decide which programs can be “lawfully” used on the internet.

A coalition of European digital rights groups have banded together to galvanise opposition.

“[The amendments] pave the way for the monitoring and filtering of the internet by private companies, exceptional courts and Orwellian technical measures,” said Christophe Espern, co-founder of French rights group La Quadrature du Net (Squaring the Net) in a statement.

The UK’s Open Rights Group said the laws would be “disproportionate and ineffective”.

The Foundation for a Free Internet Infrastructure (FFII) warned that if the amendments were accepted they would create a “Soviet internet” on which only software and services approved by governments would be allowed to run.

“Tomorrow, popular software applications like Skype or even Firefox might be declared illegal in Europe if they are not certified by an administrative authority,” warned Benjamin Henrion, FFII representative in Brussels, in a statement.

“This is compromising the whole open development of the internet as we know it today,” he said.

Read Full Article Here

U.S. Homeland Security Defends Laptop Searches At Border

Christian Science Monitor
July 11, 2008

Is a laptop searchable in the same way as a piece of luggage? The Department of Homeland Security believes it is.

For the past 18 months, immigration officials at border entries have been searching and seizing some citizens’ laptops, cellphones, and BlackBerry devices when they return from international trips.

In some cases, the officers go through the files while the traveler is standing there. In others, they take the device for several hours and download the hard drive’s content. After that, it’s unclear what happens to the data.

The Department of Homeland Security contends these searches and seizures of electronic files are vital to detecting terrorists and child pornographers. It also says it has the constitutional authority to do them without a warrant or probable cause.

But many people in the business community disagree, saying DHS is overstepping the Fourth Amendment bounds of permissible routine searches. Some are fighting for Congress to put limits on what can be searched and seized and what happens to the information that’s taken. The civil rights community says the laptop seizures are simply unconstitutional. They want DHS to stop the practice unless there’s at least reasonable suspicion.

Legal scholars say the issue raises the compelling and sometimes clashing interests of privacy rights and the need to protect the US from terrorists and child pornographers. The courts have long held that routine searches at the border are permissible, simply because they take place at the border. Opponents of the current policy say a laptop search is far from “routine.”

“A laptop can hold [the equivalent of] a major university’s library: It can contain your full life,” says Peter Swire, a professor of law at Ohio State University in Columbus. “The government’s never gotten to search your entire life, so this is unprecedented in scale what the government can get.”

Read Full Article Here

Digital copyright: it’s all wrong. The ACTA draft is Scary.
http://www.smh.com.au/news/pe..06/09/1212863545123.html

FCC Chairman Seeks to End Comcast’s Delay of File Sharing
http://www.washingtonpost.com/w..08/07/11/AR2008071102917.html

They’re Watching Us: U.S. Army Contract for “Internet Awareness Services”
https://www.fbo.gov/index?tab..218cda1e&cck=1&au=&ck=

Google’s spycar revs up UK privacy fears
http://www.theregister.co.uk/2008/07/07/google_spycar_slammed/

Viacom to Violate YouTube User’s Privacy
http://noworldsystem.com/2008/07/10/..-user%e2%80%99s-privacy/

 



U.S. Military To Patrol Internet

U.S. Military To Patrol Internet

UPI
June 30, 2008

The U.S. military is looking for a contractor to patrol cyberspace, watching for warning signs of forthcoming terrorist attacks or other hostile activity on the Web.

“If someone wants to blow us up, we want to know about it,” Robert Hembrook, the deputy intelligence chief of the U.S. Army’s Fifth Signal Command in Mannheim, Germany, told United Press International.

In a solicitation posted on the Web last week, the command said it was looking for a contractor to provide “Internet awareness services” to support “force protection” — the term of art for the security of U.S. military installations and personnel.

“The purpose of the services will be to identify and assess stated and implied threat, antipathy, unrest and other contextual data relating to selected Internet domains,” says the solicitation.

Hembrook was tight-lipped about the proposal. “The more we talk about it, the less effective it will be,” he said. “If we didn’t have to put it out in public (to make the contract award), we wouldn’t have.”

He would not comment on the kinds of Internet sites the contractor would be directed to look at but acknowledged it would “not (be) far off” to assume violent Islamic extremists would be at the top of the list.

The solicitation says the successful contractor will “analyze various Web pages, chat rooms, blogs and other Internet domains to aggregate and assess data of interest,” adding, “The contractor will prioritize foreign-language domains that relate to specific areas of concern … (and) will also identify new Internet domains” that might relate to “specific local requirements” of the command.

Officials were keen to stress the contract covered only information that could be found by anyone with a computer and Internet connection.

“We’re not interested in being Big Brother,” said LeAnne MacAllister, chief spokeswoman for the command, which runs communications in Europe for the U.S. Army and the military’s joint commands there.

“I would not characterize it as monitoring,” added Hembrook. “This is a research tool gathering information that is already in the public domain.”

Read Full Article Here

 

Google must divulge YouTube user’s logs to Viacom

BBC
July 3, 2008

The ruling comes as part of Google’s legal battle with Viacom over allegations of copyright infringement.

Digital rights group the Electronic Frontier Foundation (EFF) called the ruling a “set-back to privacy rights”.

The viewing log, which will be handed to Viacom, contains the log-in ID of users, the computer IP address (online identifier) and video clip details.

While the legal battle between the two firms is being contested in the US, it is thought the ruling will apply to YouTube users and their viewing habits everywhere.

Viacom, which owns MTV and Paramount Pictures, has alleged that YouTube is guilty of massive copyright infringement.

The UK’s Premier League association is also seeking class action status with Viacom on the issue, alleging YouTube, which was bought by Google in 2006, has been used to watch football highlights.

Google Faces More Privacy Woes After YouTube Ruling
http://www.bloomberg.com/apps/news?pid=..5S5DU&refer=home