Archive for the ‘spying’ Category

FBI: Smart Toys Are Perving On Your Children

July 21, 2017 Leave a comment

The FBI has warned parents that manufacturers of smart toys could be using them to spy on children without permission.

According to the FBI’s Internet Crime Complaint Center, children’s toys that are connected to the internet are capable of secretly filming video, recording audio, and recognising speech – all of which could be monitored by unknown persons working for the toy manufacturer.

These toys typically contain sensors, microphones, cameras, data storage components, and other multimedia capabilities — including speech recognition and GPS options. These features could put the privacy and safety of children at risk due to the large amount of personal information that may be unwittingly disclosed,” wrote the FBI. reports: the Federal Bureau of Investigation says such toys could contain parts or capabilities such as microphones, cameras, GPS, data storage and speech recognition that could disclose personal information.

Normal conversation with a toy or in the surrounding environment could disclose a child’s name, school, likes and dislikes and activities, the FBI said.

Smart toys and entertainment devices are gaining popularity for incorporating technologies that learn and tailor their behaviours based on user interactions.

In February, Germany banned sales and ownership of a talking doll named Cayla made by US company Genesis Toys, citing the risk of hacking associated with the toy.

The country’s Federal Network Agency recommended that parents who had bought the doll for their children destroy it.

John McAfee: ‘CIA Compromised Every Router In America’

June 24, 2017 Leave a comment

CIA spooks have access to your home router, as well as every WiFi system in the United States, warns internet security guru John McAfee. 

Speaking out after WikiLeaks’ released details of CIA hacking tools, John McAfee said he doesn’t trust any WiFi system, as the CIA hacking tools have compromised every router in the country, leaving your information open to hackers and spies.

I personally never connect to any WiFi system. I use the LTE system on my phone, I know that sounds crazy, but that’s the only way I can be secure. Because every router in America has been compromised,” McAfee said.

Five days prior, WikiLeaks published a fresh batch of documents which showed how the CIA hacks into popular home routers from firms like Linksys, D-Link and Belkin. The CIA program was codenamed CherryBlossom.

The CIA’s aim, according to WikiLeaks, was to intercept internet traffic of targets using a tactic known as man-in-the-middle (MitM). The CIA can hit any router to “monitor, control and manipulate” traffic from phones and tablets connected to the wireless network.

John McAfee said: “It’s not just the CIA, all of these routers, that’s virtually all routers in use in American homes, are accessible to hackers. They can take over control, monitor all of the traffic and can download malware onto any device that is connected to that router.”

[John McAfee’s New Invention Is Taking The Fight To The CIA]

The exploits outlined in the CherryBlossom files (WikiLeaks did not publish source code) can be used to target routers in homes, cafes, hospitals, airports, and private businesses. Many people have argued that this is merely evidence the CIA is doing its job – but McAfee disagrees.

There’s nothing in the American constitution that gives the government the right to invade the privacy of my home or any place I have the presumption of privacy,” he said.

Widespread router hacker is “devastating” news for Americans’ right to privacy, freedom, and liberty.

Once the router is compromised and it infects the cellphones, laptops, desktops and tablets then they become compromised,” he continued. “Not only can you watch the data, you can start listening to conversations. You can start watching through the cameras on these devices.”

Cybsersecurity expert and former NSA hacker, Jake Williams, wasn’t surprised by WikiLeaks’ revelations.

Williams said most people are already wide open to attack from far less sophisticated methods than those employed by the CIA. He tweeted: “Most of you have never updated your vulnerable WiFi router firmware. You don’t need to worry about CherryBlossom.”

The Surveillance State and Trump

June 12, 2017 Leave a comment

(Another Day in the Empire) Despite his opposition to surveillance during the campaign, Trump has flip-flopped once again and now supports the surveillance state.

The Surveillance State and TrumpHis Homeland Security advisor, Tom Bossert, who worked with the Bush administration, penned an editorial for The New York Times this week calling for a reauthorization of Section 702 of the Foreign Intelligence Surveillance Act. Section 702 allows for vacuuming up emails, instant messages, Facebook messages, web browsing history, and more in direct violation of the Fourth Amendment.

“Cabinet officials and security professionals from different agencies will testify on this matter on Wednesday,” writes Bossert. “President Trump stands with them 100 percent on the need for permanent reauthorization of Section 702. Officials from the past two administrations also agree that we cannot have a blind spot in our defenses simply because a foreign terrorist on foreign land chooses an American email provider.”

Former NSA Director Gen. Keith Alexander and Intelligence Committee chairman Mike Rogers have repeatedly claimed NSA snooping has thwarted 54 terrorist attacks. This claim has been completely debunked. Like the baseless and politically motivated claim Russia hacked the election, the 54 terrorists claim is little more than fiction. It’s propaganda to justify a surveillance state.

Jenna McLaughlin writes “the reason there haven’t been any large-scale terror attacks by ISIS in the U.S. is not because they were averted by the intelligence community, but because—with the possible exception of one that was foiled by local police—none were actually planned.”

The NSA and the government insist they only conduct surveillance overseas but this was dispelled after a Freedom of Information Act lawsuit filed by the American Civil Liberties Union showed the NSA intentionally violated the law and spied on American citizens.

The surveillance state was created not to protect Americans from terrorists. It was created to spy on political targets in the United States. Evidence of this arose in 2014

Original Source

Lawyers: How can we scrutinize surveillance records that remain sealed?

Stanford attorneys make unusual request to a federal court itself, DOJ opposes.

OAKLAND, Calif.—A federal judge appeared generally skeptical to two legal scholars’ efforts to get the court to unseal years’ worth of sealed surveillance records held in a Northern California court.

However, US Magistrate Judge Kandis Westmore left open the possibility for the plaintiffs to narrow their request and work with representatives from the Department of Justice to come up with a workable solution.

“That the court can figure out a way to comply with, we are certainly open to that,” Judge Westmore said toward the end of a Thursday hearing. “Right now… we don’t have a proposal in front of us that we can buy into. As currently stated, this is not something that the court can provide—it’s just too broad.”

The case sheds light on a strange catch-22 reality of the legal system: analyzing court orders is difficult if they remain sealed and unknown from the public. Plus, judges are generally unable to open materials sealed previously by their colleagues.

In re: Petition of Jennifer Granick and Riana Pfefferkorn to unseal technical-assistance orders and materials began last year, when the two Stanford University-affiliated lawyers sought to shed light on how the government conducts domestic snooping and exerts pressure on companies to aid federal efforts to thwart cryptography.

The attorneys, Jennifer Granick and Riana Pfefferkorn, asked the US District Court for the Northern District of California itself to unilaterally unseal all court documents “where there is no longer any need for secrecy, e.g., the criminal investigation has terminated, the surveillance order (including any delayed-notice order) has expired, or charges have been filed.”

As they concluded: “This pervasive sealing cripples public discussion of whether these judicial orders are lawful and appropriate.”

A major reason why Granick and Pfefferkorn petitioned this particular court is that this is the region where numerous major tech companies are based, including Twitter, Apple, Facebook, Google, and more.

In a heavily redacted February court filing, the DOJ opposed Granick and Pfefferkorn’s efforts, largely arguing that there are privacy interests for people who are investigated but ultimately never charged with a crime. Even basic docket information, the DOJ argued, can contain personal information that should not be made public.

Granick is somewhat inspired by a similar filing that was made on behalf of journalist Jason Leopold back in 2013. His request, however, was made of the US District Court for the District of Columbia. A recent joint filing by both his lawyers and DOJ lawyers indicated that his request would take several hundred additional hours to fulfill.

But after nearly four years, “the parties have reached an impasse in their attempts to reach an agreement concerning an acceptable extraction process.” This is, essentially, because the government seems to indicate that fulfilling Leopold’s request will take too long to wholly fulfill.

The Eastern District of Virginia is believed to be the only court in the nation to have a separate publicly accessible electronic surveillance docket, although the DC Circuit is apparently amenable to creating one of its own.

Like in Leopold, Judge Westmore initially indicated that unsealing more than 4,400 docket sheets, or the basic information about each case, was not feasible largely due to it being such a large-scale task. However, after hearing arguments by Pfefferkorn and the DOJ’s lawyer, Laura Bernstein, the judge relented. A little.

“I can hold off on making an outright denial to allow the parties to engage in discussions and see if there can be a substantial narrowing and further exploring of what they want and what might be the methods of getting them that information,” she said.

“I’m interested in hearing a little bit more about how this is taking place in DC and what the government is doing there. There’s no point in reinventing the wheel, and if there is a process that is underway that might seem to be working—the court is open to looking at that. We want to try to provide the information to the extent possible because the public does have a qualified right to access.”

Man claims his Bose headphones intercept what he’s listening to

April 22, 2017 Leave a comment

Illinois man: My headphones transmit audio metadata to data miner

An Illinois man has accused Bose, the audio equipment manufacturer, of illegally wiretapping him via his Bose headphones.

According to a proposed class-action lawsuit filed in federal court in Chicago on Tuesday, Kyle Zak bought a $350 (£330) pair of Bose QuietComfort 35 wireless Bluetooth headphones in March 2017. Those headphones use an app, known as “Bose Connect,” to skip, pause, and perform other controls on them.

The civil complaint alleges that Bose collects “the names of any music and audio tracks” played through the headphones, along with the customer’s personally identifiable serial number. It also says the information gets sent to third parties, including “data miner”

Lawyers for Zak argue that this constitutes wiretapping. They further allege that this type of interception could have revealed a lot of personal information about consumers, depending on their music or podcasting listening habits. For example, someone listening to “The Greatest Generation,” like its hosts, might be a little bit embarrassed to admit to the world that they listen to a Star Trek podcast.

Neither Bose nor, which is not a party to the lawsuit, immediately responded to Ars’ request for comment.

The lawsuit claims that several other headphone models send out this data, including the SoundSport Wireless, Sound Sport Pulse Wireless, QuietControl 30, SoundLink Around-Ear Wireless Headphones II, and SoundLink Color II.

Metadata vs. content

Zak and his lawyers from Edelson, a Chicago-based law firm that specializes in technology and privacy cases, will have to show that the interception of the audio metadata is the same thing as the content contemplated by federal wiretap law.

“We discovered the issue, as we do in many of our cases, through an investigation conducted by our in-house computer forensics lab,” Christopher Dore, one of the Edelson lawyers involved in the case, e-mailed Ars.

Bose lawyers likely will argue that while it may be sending out copies of the metadata (artist, song title, etc.), its actions do not constitute “contents of any wire, oral, or electronic communication” as defined under the relevant wiretap law. Therefore, it could argue, the company isn’t liable.

Edelson seems to have anticipated this line of argument and points out that the Bose products interact with consumer smartphones, which transmit “operational instructions regarding skipping and rewinding audio tracks and their corresponding titles.”

Police Confirm Amazon Echo Saves All Voice Data, Here’s How to Delete It

April 22, 2017 2 comments

The device also records everything in the room prior to you using the wake word. When you use the wake word, according to Amazon, the audio stream includes a fraction of a second of audio before the wake word, and closes once your question or request has been processed.

Amazon Echo

Amazon Echo is a hands-free smart speaker with voice control access. The device connects to the Alexa–an artificial intelligence personal assistant for playing music, provide information, news, sports and other activities.

However, privacy activists have sounded the alarm on this Amazon smart device for some time now. Activists suspected the United Sates government via its spy agencies have been using the device to spy on citizens.

To confirm that the device is being used as a spying tool, anti-government corruption investigators revealed that Amazon owner Jeff Bezos was awarded a contract by the Central Intelligence Agency (CIA) worth $600 million to build a private cloud for the agency to use for its data needs. This means Bezos is a friend of the CIA, and can grant the agency full access to his business ventures.

Amazon’s close CIA ties have made some consumers, who own an Echo device, more skeptical. Recently, we published an article of how a woman who owns an Amazon Echo decided to verify the links between the CIA and the device. She used the artificially intelligent Alexa to confirm her suspicions shortly after WikiLeaks began releasing their Vault 7 series.

The woman asked the smart device whether she would lie to her, to which Alexa responded that she would always “try” to be truthful. Alexa is then asked to give a definition of what the CIA is, which is answered with accuracy. It’s then followed by another question from its owner, “Are you connected to the CIA?”  Alexa, rather than answer, chooses to switch off, not once, but twice, when the owner of the device repeatedly asked the question.

Amazon Echo

This incident was recorded and posted on Twitter. When the video started trending, Amazon responded that the incident was nothing but a minor programming error.

However, recent evidence has emerged to back the existing suspicion that Amazon Echo is indeed a spy tool used by the US government.

In December 2016, Arkansas police in the city of Bentonville filed search warrants with Amazon, requesting for the recordings made on a man’s Echo device between November 21 and November 22, 2015. The recordings belong to James A. Bates, who was charged with murder after a man was strangled to death in a hot tub in his home.

CNET reports that during the investigation, police noticed the Echo in the kitchen and pointed out that the music playing in the home could have been voice activated through the device. While the Echo records only after hearing the wake word, police hoped that ambient noise or background chatter could have accidentally triggered the device, leading to more clues in the murder case.

Amazon Echo

“It is believed that these records are retained by and that they are evidence related to the case under investigation,” police wrote in the search warrant to Amazon.

When the warrant was delivered to Amazon, the company was reluctant to give the recordings out. Investigators then issued a statement warning that whether Amazon complies with the warrant or not, they could tap into the Echo’s hardware, which could potentially include time stamps, audio files and other data.

Apart from Bates’ Echo, investigators also attempted to break into his phone, but were unsuccessful due to his password. In response to the delay in investigation caused by Amazon not sending the recordings and the phone password, the police department issued the following ominous response within the warrant: “Our agency now has the ability to utilize data extraction methods that negate the need for passcodes and efforts to search Victor and Bates’ devices will continue upon issuance of this warrant.”

Amazon Echo

The police are right. They can seize access to the device without difficulty. According to Amazon, when Amazon Echo or Echo Dot detect the wake word, when you press the action button on top of the devices, or when you press and hold your remote’s microphone button, the light ring around the top of your Amazon Echo turns blue, indicating that Amazon Echo is streaming audio to the Cloud.

All of the audio in the room is recorded and stored, not just the question you’re asking Echo.

The device also records everything in the room prior to you using the wake word. When you use the wake word, according to Amazon, the audio stream includes a fraction of a second of audio before the wake word, and closes once your question or request has been processed.

When you go inside the Settings menu in your Alexa app on your phone, you can listen to every one of your requests by selecting History.

Just as the police noted in their murder investigation, there are times that Alexa randomly starts recording without the wake word being issued.

Luckily, deleting this audio is simple. Just follow these instructions:

In the History menu of the mobile Alexa app, you can delete specific entries one by one by selecting them and tapping the delete button. However, if you want to wipe your entire history, you’ll need to do so at the Manage Your Content and Devices page at

Amazon Echo

Once logged in, you’ll see the page, Manage Your Content and Devices. From here, click on Your Devices. Select the device from which you want to delete the audio, and a sub-menu will appear under it. Click on Manage Voice Recordings, and then click delete. Before deleting, Amazon presents you with a warning.

Once you click delete, a brief popup comes up letting you know that “Your deletion request has been received.”

You can then check the mobile app and all voice recordings from that device will be immediately removed.

We acknowledge sourcing part of the article from the Free Thought Project

Obama Spying Even Worse Than Trump Claimed

April 2, 2017 Leave a comment

( The spying by the Obama administration on then-presidential candidate Donald Trump reportedly was even worse than what he has alleged.

64 Ways Obama is Sabotaging Trump

And it had nothing to do with Russia but everything to do with politics.

Sources in the intelligence community claim the potentially illegal revealing of names, or unmasking, of people in the Trump camp who were under surveillance was done purely “for political purposes” to “hurt and embarrass (candidate) Trump and his team.”

The bombshell revelations come from rank and file members of the intelligence community who are fighting back against a stonewall by the leaders at the nation’s spy agencies, according to Fox News.

Reporter Adam Housley said the sources are “not Trump” people but are “frustrated with the politics that is taking place in these (intelligence) agencies.”

And what they have revealed is amazing. Here is what they told Fox:

1) Surveillance targeting the Trump team during the Obama administration began months ago, even before the president had become the GOP nominee in July.

2) The spying on the Trump team had nothing to do with the collection of foreign intelligence or an investigation into Russia election interference.

3) The spying was done purely “for political purposes” that “have nothing to do with national security and everything to do with hurting and embarrassing Trump and his team.”

4) The person who did the unmasking was someone “very well known, very high up, very senior in the intelligence world, and is not in the FBI.”

5) Congressional investigators know the name of at least one person who was unmasking names.

6) The initial surveillance on the Trump team led to “a number of names” being unmasked.

7) House Intelligence Committee chairman Rep. Devin Nunes, R-Calif., has known about the unmasking since January.

8) Two sources in the intelligence community told Nunes who did the unmasking and told him at least one of the names of someone in the Trump team who was unmasked. The sources also gave Nunes the serial numbers of the classified reports that documented the unmasking.

9) It took Nunes a number of weeks to figure out how to see those intelligence reports because the intelligence agencies were stonewalling him, and not allowing the chairman or other people to see them.

10) There were only two places Nunes could have seen the information: where the sources work, which would have blown their cover; and the Eisenhower Executive Office building on the White House grounds, which houses the National Security Council and has computers linked to the secure system containing the reports he sought.

11) Nunes got access to that system on March 21 with the help of two Trump administration officials, but he said they were not the sources of any information.

The Wall Street Journal’s Kimberly Strassel reported that the documents Nunes saw confirming the Obama administration spied on the Trump team for months “aren’t easily obtainable, since they aren’t the ‘finished’ intelligence products that Congress gets to see.”

She said there were “dozens of documents with information about Trump officials.”

Strassel also reported there was a stonewall against the Intelligence committee chairman because, “for weeks Mr. Nunes has been demanding intelligence agencies turn over said documents—with no luck, so far.”

She also learned that, along with former National Security Adviser Michael Flynn, one other Trump official was unmasked.

(Flynn resigned after his unmasking was leaked to the press as part of reports that he spoke on the phone with the Russian ambassador before the new administration took office. President Trump said the two discussed nothing inappropriate and Flynn was just doing his job, but the president asked for the aide’s resignation because he was not completely honest in his initial account of the conversation.)

But even the reports that did not unmask identities “were written in ways that made clear which Trump officials were being discussed.”

And, importantly, the documents were “circulated at the highest levels of government.”

Strassel concluded, “To sum up, Team Obama was spying broadly on the incoming administration.”

Fox also reports that the Senate Judiciary Committee is looking into whether leaks of information targeting the Trump team could have come from the FBI, because it requested Foreign Intelligence Surveillance Act, or FISA, warrants that led to the acquisition of some of the foreign surveillance.

Nunes has said the FBI has not responded to his requests for information, and a source told Fox the agency is refusing to cooperate with the House investigation.

Fox also reported the Senate Judiciary Committee is looking into “whether the FBI wrongly included political opposition research from Trump’s opponents in its probe.”

And whether the FBI paid a former British spy who wrote a sensational and discredited report alleging wild improprieties by Trump and his aides.

On Friday, Press Secretary Sean Spicer noted the day before the president tweeted his accusation that Obama had spied on him, comments were made by “a senior administration official, foreign policy expert, Dr. Evelyn Farkas, (which) together with previous reports that have been out, raised serious concerns on whether or not there was an organized and widespread effort by the Obama administration to use and leak highly sensitive intelligence information for political purposes.”

As WND reported in depth, Farkas appeared to have inadvertently confirmed the former president’s administration spied on then President-elect Trump’s transition team for political purposes.

Speaking on MSNBC March 2, she confirmed that not only was the previous administration collecting intelligence on the Trump team, it was attempting to share it as far and wide as possible.

Farkas claimed the information was about Russian collusion with the Trump campaign, but just days later, intelligence chiefs who had seen the classified information in question, including Obama’s own former Director of National Intelligence James Clapper as well as former acting CIA Director Michael Morell, said they have seen no evidence of collusion between the Trump team and the Russian government.

That would appear to indicate the real reason the Obama administration was feverishly collecting and sharing the classified information was not for national security purposes, but for political reasons.

On Friday, Spicer said, “Dr. Farkas’s admissions alone are devastating.”

And that, “[I]n the ordinary course of their work, NSC – National Security Council – staff discovered information that may support the questions raised by the President and Dr. Farkas’s claim. These are serious issues. They raise serious concerns. And if true, the issues would be devastating.”

Spicer then lectured reporters for ignoring the Farkas story and growing evidence that Obama did indeed spy on the Trump team, scolding them, “[I]f everyone was treating the President and the administration fairly, you’d ask a series of much different questions.”

Republished with permission from via iCopyright license.

%d bloggers like this: