Christopher Parsons, a postdoctoral fellow at the Citizen Lab, told The Varsity that “Metadata at this point, is as or more invasive in its collection and analysis than the content of a communication. Any suggestion that because its metadata, it’s any less invasive, just isn’t true.”
“If you were to monitor the metadata coming out of my phone for a day, it would be a lot more revealing than any actual content. This would include things like where I was, when I made the phone calls, how long they were, who I made them to, and who those people talked to,” said Parsons. Using this information, Parsons said, intelligence agencies can determine movement patterns, browsing tendencies, shopping and lifestyle habits, all without figuring out specifically what was said in the conversation.
The Citizen Lab’s campaign for government surveillance oversight has been at the heart of the debate on consumer telecommunications and Internet privacy. Last week, they issued an open letter to several Canadian phone and Internet service providers (ISPs). The letter asked them to publicize the extent of customer information divulged to law enforcement and other intelligence agencies. When contacted by The Varsity for further comments on the Citizen Lab’s campaign, Jennifer Kett, Senior Manager at Rogers Media Relations said they were currently reviewing the request. She added: “We take the privacy and security of our customers’ personal information very seriously. We require a properly executed warrant to disclose customer information to law enforcement or any other body. If we believe that a request is overreaching we will take steps to challenge it.” Kett declined to provide further details when asked, saying that the review of the Citizen Lab’s request was pending. Bell Canada did not respond to multiple contact attempts.
Amitpal Singh, “U of T academics at forefront of online privacy battle”
Christopher Parsons, Citizen Lab Postdoctoral Fellow, reacts to the assessment that it is okay Wi-Fi data was collected at airports.
My appearance on CTV yesterday, talking about the CSEC Commissioner’s statement that it’s perfectly legal for the foreign signals intelligence agency to collect Canadians’ metadata.
2014.2.13
Dr. Christopher Parsons, Postdoctoral Fellow in the Citizen Lab, Munk School of Global Affair, University of Toronto, Canada: “Our democratic governments have been caught massively spying on innocent individuals around the world. In the process, citizens’ willingness to exercise rights of speech, association, and collective action have been chilled. By reforming governments’ behaviours in a concerted, global, fashion we can push back against this surveillance, surveillance that currently threatens to suffocate our democracies.”
Katitza Rodriguez, “International Community Unites to Protest Big Brother”
2014.2.12
Shaping ideas is, of course, easier said than done. Bombarding people with ads only works to a degree. No one likes being told what to think. We grow resistant to methods of persuasion that we see through—just think of ads of yesteryear, and of how corny they feel. They worked in their day, but we’re alert to them now. Besides, blanket coverage isn’t easy to achieve in today’s fragmented media landscape. How many channels can one company advertise on? And we now fast-forward through television commercials, anyway. Even if it were possible to catch us through mass media, messages that work for one person often fail to convince others.
Big-data surveillance is dangerous exactly because it provides solutions to these problems. Individually tailored, subtle messages are less likely to produce a cynical reaction. Especially so if the data collection that makes these messages possible is unseen. That’s why it’s not only the NSA that goes to great lengths to keep its surveillance hidden. Most Internet firms also try to monitor us surreptitiously. Their user agreements, which we all must “sign” before using their services, are full of small-font legalese. We roll our eyes and hand over our rights with a click. Likewise, political campaigns do not let citizens know what data they have on them, nor how they use that data. Commercial databases sometimes allow you to access your own records. But they make it difficult, and since you don’t have much right to control what they do with your data, it’s often pointless.
This is why the state-of-the-art method for shaping ideas is not to coerce overtly but to seduce covertly, from a foundation of knowledge. These methods don’t produce a crude ad—they create an environment that nudges you imperceptibly. Last year, an article in Adweek noted that women feel less attractive on Mondays, and that this might be the best time to advertise make-up to them. “Women also listed feeling lonely, fat and depressed as sources of beauty vulnerability,” the article added. So why stop with Mondays? Big data analytics can identify exactly which women feel lonely or fat or depressed. Why not focus on them? And why stop at using known “beauty vulnerabilities”? It’s only a short jump from identifying vulnerabilities to figuring out how to create them. The actual selling of the make-up may be the tip of the iceberg.
Zeynep Tufekci, “What tear gas taught me about Twitter and the NSA: It’s time to rethink our nightmares about surveillance”
In the post-Snowden era of Internet privacy, Parsons and others are continuing the often difficult and unpopular work of pulling back the veil of government surveillance. Students across the country, continent, and indeed, the world, are aware of the new status quo, but may not have considered the full privacy implications of increased access to information online. It is, unfortunately, easy to ignore the droning of television anchors or the frequently updated headlines of news sources as they appear on Facebook and Twitter, especially when the medium lends itself to distraction. The irony, of course, is that as these stories appear, they are swiftly buried under an infinite stream of online information.
From the editorial board at The Varsity, U of T’s student newspaper.
2014.2.11
Each Five Eyes partner collects information over a specific area of the globe in accordance with their national priorities, but their collection and analysis activities are orchestrated to the point that they essentially act as one. Precise assignments are not publicly known, but research indicates that Australia monitors South and East Asia emissions. New Zealand covers the South Pacific and Southeast Asia. The UK devotes attention to Europe and Western Russia, while the US monitors the Caribbean, China, Russia, the Middle East and Africa.
As it did during the Cold War, Canada’s arctic territory provides considerable sigint advantage. Canadian Forces Station Alert, on the northern tip of Ellesmere Island, Nunavut, was originally an arctic weather station, but began sigint duty by eavesdropping on northern regions of the Soviet Union in 1958. Alert remains active today, collecting information from the interior of Russia and China.20 Other Canadian sigint assets reach into Latin America and out into the North Atlantic and North Pacific Oceans.
James Cox, “Canada and the Five Eyes Intelligence Community(.pdf)”
LONDON (AP) — News organizations publishing leaked National Security Agency documents have inadvertently disclosed the names of at least six intelligence officers.
…
The Canadian Broadcasting Corporation’s nightly news program, “The National,” revealed the names of three NSA employees when its cameras panned across NSA documents during voice-overs.
“They were scrolling through it and I thought, ‘Hold on, that’s an unredacted, classified document,’” said Christopher Parsons, who noticed the mistake. “It was kind of nuts. I couldn’t believe that they were so cavalierly showing it on national television.”
Parsons, a privacy expert at the University of Toronto’s Munk School of Global Affairs, was able to read the employees’ names by pausing, rewinding and replaying the video.
Tumblr and Security PR
![]()
You can now take extra precaution against hackers and snoops by enabling SSL security on your Tumblr Dashboard. Just head over to your Account Settings and flip the switch.
“Any reason I shouldn’t do this?” Nope, not really. It doesn’t change anything about the dashboard, it just encrypts your connection to it. We’ve been using it for weeks and haven’t even noticed. So, yeah, turn it on and forget about it. Easy.
That this isn’t enabled by default shows that Tumblr is interested in the PR of offering security rather than giving enough of a damn to automatically enable SSL across the entire user-space.
New allegations that CSEC tracked the gadgets of travellers using Wi-Fi have some questioning their privacy â but experts say there’s little Canadians can do about it.
Last week I was interviewed by Global News about the revelations CSEC was collecting metadata emitted from wireless stations in Canada. This is the result.
Source: Alleged Wi-Fi tracking is out of Canadians’ control: privacy experts
We offer up volumes of private information about ourselves online and just assume we’re untouchable. But the latest revelations about
I had a chance to speak with The Current today about privacy, spying, and CSEC. It was really great to hear from the Interim Privacy Commissioner of Canada and Jacquelyn Burkell on these topics as well.
Source: With CSEC monitoring people in airports, how much spying is done on Canadians?