Listening to you at last: EU plans to tap cell phones

Monday, October 19, 2009

A report accidentally published on the Internet provides insight into a secretive European Union surveillance project designed to monitor its citizens, as reported by Wikileaks earlier this month. Project INDECT aims to mine data from television, internet traffic, cellphone conversations, p2p file sharing and a range of other sources for crime prevention and threat prediction. The €14.68 million project began in January, 2009, and is scheduled to continue for five years under its current mandate.

INDECT produced the accidentally published report as part of their “Extraction of Information for Crime Prevention by Combining Web Derived Knowledge and Unstructured Data” project, but do not enumerate all potential applications of the search and surveillance technology. Police are discussed as a prime example of users, with Polish and British forces detailed as active project participants. INDECT is funded under the European Commission’s Seventh Framework Programme (FP7), and includes participation from Austria, Bulgaria, Czech Republic, France, Germany, Hungary, Poland, Slovakia, Spain, and the United Kingdom.

Indicated in the initial trial’s report, the scope of data collected is particularly broad; days of television news, radio, newspapers, and recorded telephone conversations are included. Several weeks of content from online sources were agglomerated, including mining Wikipedia for users’ and article subjects’ relations with others, organisations, and in-project movements.

Watermarking of published digital works such as film, audio, or other documents is discussed in the Project INDECT remit; its purpose is to integrate and track this information, its movement within the system and across the Internet. An unreleased promotional video for INDECT located on YouTube is shown to the right. The simplified example of the system in operation shows a file of documents with a visible INDECT-titled cover taken from an office and exchanged in a car park. How the police are alerted to the document theft is unclear in the video; as a “threat”, it would be the INDECT system’s job to predict it.

Throughout the video use of CCTV equipment, facial recognition, number plate reading, and aerial surveillance give friend-or-foe information with an overlaid map to authorities. The police proactively use this information to coordinate locating, pursuing, and capturing the document recipient. The file of documents is retrieved, and the recipient roughly detained.

Technology research performed as part of Project INDECT has clear use in countering industrial and international espionage, although the potential use in maintaining any security and predicting leaks is much broader. Quoted in the UK’s Daily Telegraph, Liberty’s director, Shami Chakrabarti, described a possible future implementation of INDECT as a “sinister step” with “positively chilling” repercussions Europe-wide.

“It is inevitable that the project has a sensitive dimension due to the security focussed goals of the project,” Suresh Manandhar, leader of the University of York researchers involved in the “Work Package 4” INDECT component, responded to Wikinews. “However, it is important to bear in mind that the scientific methods are much more general and has wider applications. The project will most likely have lot of commercial potential. The project has an Ethics board to oversee the project activities. As a responsible scientists [sic] it is of utmost importance to us that we conform to ethical guidelines.”

HAVE YOUR SAY
Should the EU carry out this research without a wider public debate?
Add or view comments

Although Wikinews attempted to contact Professor Helen Petrie of York University, the local member of Project INDECT’s Ethics board, no response was forthcoming. The professor’s area of expertise is universal access, and she has authored a variety of papers on web-accessibility for blind and disabled users. A full list of the Ethics board members is unavailable, making their suitability unassessable and distancing them from public accountability.

One potential application of Project INDECT would be implementation and enforcement of the U.K.’s “MoD Manual of Security“. The 2,389-page 2001 version passed to Wikileaks this month — commonly known as JSP-440, and marked “RESTRICTED” — goes into considerable detail on how, as a serious threat, investigative journalists should be monitored, and effectively thwarted; just the scenario the Project INDECT video could be portraying.

When approached by Wikinews about the implications of using INDECT, a representative of the U.K.’s Attorney General declined to comment on legal checks and balances such a system might require. Further U.K. enquiries were eventually referred to the Police Service of Northern Ireland, who have not yet responded.

Wikinews’ Brian McNeil contacted Eddan Katz, the International Affairs Director for the Electronic Frontier Foundation (E.F.F.). Katz last spoke to Wikinews in early 2008 on copyright, not long after taking his current position with the E.F.F. He was back in Brussels to speak to EU officials, Project INDECT was on his agenda too — having learned of it only two weeks earlier. Katz linked Project INDECT with a September report, NeoConopticon — The EU Security-Industrial Complex, authored by Ben Hayes for the Transnational Institute. The report raises serious questions about the heavy involvement of defence and IT companies in “security research”.

On the record, Katz answered a few questions for Wikinews.

((WN)) Is this illegal? Is this an invasion of privacy? Spying on citizens?

Eddan Katz When the European Parliament issued the September 5, 2001 report on the American ECHELON system they knew such an infrastructure is in violation of data protection law, undermines the values of privacy and is the first step towards a totalitarian surveillance information society.

((WN)) Who is making the decisions based on this information, about what?

E.K. What’s concerning to such a large extent is the fact that the projects seem to be agnostic to that question. These are the searching systems and those people that are working on it in these research labs do search technology anyway. […] but its inclusion in a database and its availability to law enforcement and its simultaneity of application that’s so concerning, […] because the people who built it aren’t thinking about those questions, and the social questions, and the political questions, and all this kind of stuff. [… It] seems like it’s intransparent, unaccountable.

The E.U. report Katz refers to was ratified just six days before the September 11 attacks that brought down the twin towers of the World Trade Center. In their analysis of the never-officially-recognised U.S. Echelon spy system it states, “[i]n principle, activities and measures undertaken for the purposes of state security or law enforcement do not fall within the scope of the EC Treaty.” On privacy and data-protection legislation enacted at E.U. level it comments, “[such does] not apply to ‘the processing of data/activities concerning public security, defence, state security (including the economic well-being of the state when the activities relate to state security matters) and the activities of the state in areas of criminal law'”.

Part of the remit in their analysis of Echelon was rumours of ‘commercial abuse’ of intelligence; “[i]f a Member State were to promote the use of an interception system, which was also used for industrial espionage, by allowing its own intelligence service to operate such a system or by giving foreign intelligence services access to its territory for this purpose, it would undoubtedly constitute a breach of EC law […] activities of this kind would be fundamentally at odds with the concept of a common market underpinning the EC Treaty, as it would amount to a distortion of competition”.

Ben Hayes’ NeoConoptiocon report, in a concluding section, “Following the money“, states, “[w]hat is happening in practice is that multinational corporations are using the ESRP [European Seventh Research Programme] to promote their own profit-driven agendas, while the EU is using the programme to further its own security and defence policy objectives. As suggested from the outset of this report, the kind of security described above represents a marriage of unchecked police powers and unbridled capitalism, at the expense of the democratic system.”

Retrieved from “https://en.wikinews.org/w/index.php?title=Listening_to_you_at_last:_EU_plans_to_tap_cell_phones&oldid=2611950”

Wikinews interviews Joe Schriner, Independent U.S. presidential candidate

Saturday, April 17, 2010

Journalist, counselor, painter, and US 2012 Presidential candidate Joe Schriner of Cleveland, Ohio took some time to discuss his campaign with Wikinews in an interview.

Schriner previously ran for president in 2000, 2004, and 2008, but failed to gain much traction in the races. He announced his candidacy for the 2012 race immediately following the 2008 election. Schriner refers to himself as the “Average Joe” candidate, and advocates a pro-life and pro-environmentalist platform. He has been the subject of numerous newspaper articles, and has published public policy papers exploring solutions to American issues.

Wikinews reporter William Saturn? talks with Schriner and discusses his campaign.

Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews_interviews_Joe_Schriner,_Independent_U.S._presidential_candidate&oldid=4497624”

Ontario Votes 2007: Interview with Green candidate Bruce Haines, Bramalea-Gore-Malton

Monday, September 24, 2007

Bruce Haines is running for the Green Party of Ontario in the Ontario provincial election, in the Bramalea-Gore-Malton riding. Wikinews’ Nick Moreau interviewed him regarding his values, his experience, and his campaign.

Stay tuned for further interviews; every candidate from every party is eligible, and will be contacted. Expect interviews from Liberals, Progressive Conservatives, New Democratic Party members, Ontario Greens, as well as members from the Family Coalition, Freedom, Communist, Libertarian, and Confederation of Regions parties, as well as independents.

Retrieved from “https://en.wikinews.org/w/index.php?title=Ontario_Votes_2007:_Interview_with_Green_candidate_Bruce_Haines,_Bramalea-Gore-Malton&oldid=518270”

U.S. superbug expected to emerge in Canada

Wednesday, January 3, 2007

An infectious superbug spreading in the United States is to “emerge in force” in Canada, doctors fear. The bacteria have been reported popping up in day care centers and locker rooms across the U.S. Usually elderly or very ill hospital patients get the disease.

More than 2 million U.S. residents are infected every year, the Centers for Disease Control estimates.

An article in the Canadian Medical Association Journal (CMAJ) on Tuesday said that Methicillin-resistant Staphylococcus aureus (MRSA) are “spreading with alarming rapidity.” The bacteria can cause boils, pimples, or in extreme cases, flesh-eating disease, and more.

“The resistant bacteria is an old foe with new fangs: a pathogen combining virulence, resistance and an ability to disseminate at large,” wrote Dr. John Conly, medical professor and an infectious disease specialist at the University of Calgary.

British Columbia, Alberta, Saskatchewan, Manitoba, and Ontario are the provinces which already have had MRSA in hospitals.

A 30-year-old Calgary, Alberta man died last year of lung abscesses associated with the infection, as well as a three-month old toddler in Toronto, Ontario.

Toronto Blue Jays outfielder Alex Rios, last summer, suffered from an infection caused by Staphylococcus aureus in his leg. Pitcher Ty Taubenheim had a similar infection on his foot.

Doctors are currently investigating some Calgary residents, who could be one of the first Canadian reports of MRSA outside of a hospital setting.

Retrieved from “https://en.wikinews.org/w/index.php?title=U.S._superbug_expected_to_emerge_in_Canada&oldid=4276347”

Fourth U.S. state governor orders net neutrality in government contracts

Sunday, February 18, 2018

On Thursday, Phil Scott of Vermont became the fourth governor in the United States to sign an executive order requiring all companies providing Internet access to state agencies to abide by net neutrality for all customers in his state. He said he did this because Vermonters rely on Internet access without blocking, throttling and paid prioritization, threatened by the December 14 decision of the US Federal Communications Commission (FCC) in the matter of “Restoring Internet freedom”. The first state governor to challenge the FCC in this way was Steve Bulllock of Montana, who did so on January 22. Andrew Cuomo of New York followed two days later. Philip Murphy of New Jersey signed a similar executive order on February 5. These four executive orders differ in details, but all require that state agencies purchase Internet access services only from companies with an enforceable commitment to net neutrality for all customers in their state.

This is part of a flurry of state-level net neutrality actions. The New York State Assembly introduced bill A01958 on January 17, 2017, three days before the inauguration of Donald Trump as President of the United States, anticipating action by him to overturn the 2015 “Title II Order” that made net neutrality enforceable in the US. Two other bills were introduced into the Washington House of Representatives in the ten days before the official decision of Trump’s FCC on this issue. In addition to these, 63 other state-level responses by net neutrality supporters were documented by Fight for the Future (FFTF) by February 16, 2018, including at least 27 bills introduced into the legislatures of 17 states with others reportedly under consideration.

These bills are in addition to the lawsuit filed on January 16 by the Attorney General of New York on behalf of 21 states and the District of Columbia claiming this FCC decision was “arbitrary, capricious, and an abuse of discretion within the meaning of the Administrative Procedure Act” (APA) of 1946 and other grounds. These states were New York, California, Connecticut, Delaware, Hawaii, Illinois, Iowa, Kentucky, Maine, Maryland, Massachusetts, Minnesota, Mississippi, New Mexico, North Carolina, Oregon, Pennsylvania, Rhode Island, Vermont, Virginia, and Washington state. New Jersey reportedly later committed to join the suit.

These four executive orders are the only actions on FFTF’s list of actions by net neutrality supporters that seem immediately enforceable. All others require approval by democratic bodies. The four executive orders might be challenged in courts as conflicting with “Preemption authority” claimed by the US Federal Communications Commission’s “Declaratory ruling, report and order” adopted December 14 and released January 4. The FCC order was described by dissenting Commissioner Clyburn as “Destroying Internet Freedom” rather than “Restoring Internet Freedom” as the order is titled. She wrote that this order “will put profits and shareholder returns above what is best for” consumers.

Retrieved from “https://en.wikinews.org/w/index.php?title=Fourth_U.S._state_governor_orders_net_neutrality_in_government_contracts&oldid=4539328”

Gastric bypass surgery performed by remote control

Sunday, August 21, 2005

A robotic system at Stanford Medical Center was used to perform a laparoscopic gastric bypass surgery successfully with a theoretically similar rate of complications to that seen in standard operations. However, as there were only 10 people in the experimental group (and another 10 in the control group), this is not a statistically significant sample.

If this surgical procedure is as successful in large-scale studies, it may lead the way for the use of robotic surgery in even more delicate procedures, such as heart surgery. Note that this is not a fully automated system, as a human doctor controls the operation via remote control. Laparoscopic gastric bypass surgery is a treatment for obesity.

There were concerns that doctors, in the future, might only be trained in the remote control procedure. Ronald G. Latimer, M.D., of Santa Barbara, CA, warned “The fact that surgeons may have to open the patient or might actually need to revert to standard laparoscopic techniques demands that this basic training be a requirement before a robot is purchased. Robots do malfunction, so a backup system is imperative. We should not be seduced to buy this instrument to train surgeons if they are not able to do the primary operations themselves.”

There are precedents for just such a problem occurring. A previous “new technology”, the electrocardiogram (ECG), has lead to a lack of basic education on the older technology, the stethoscope. As a result, many heart conditions now go undiagnosed, especially in children and others who rarely undergo an ECG procedure.

Retrieved from “https://en.wikinews.org/w/index.php?title=Gastric_bypass_surgery_performed_by_remote_control&oldid=4331525”

Wikinews interviews biologist Chris Simon about periodical cicadas

Wednesday, June 12, 2013

In May, periodical cicadas with 17 years life cycle emerged on the East Coast of the USA after underground development as juveniles since 1996. Researchers and scientists worked to map and study the rare wave, and the locals prepared for the noisy event. First recorded in 1666, the Magicicada septendecim species recently emerged in 1979, 1996, this year, with a next wave due in 2030.

This week, Wikinews interviewed Chris Simon, an ecology and evolutionary biologist at University of Connecticut, about the cicadas.

((Wikinews)) What caused your initial interest in periodical cicadas?

Chris Simon: As an undergraduate student, I was interested in the formation of species so when I went to graduate school I looked for a study organism that was likely to be in the process of forming new species. I chose periodical cicadas because they are broken up into reproductively isolated broods (or year classes). Reproductive isolation leads to speciation so I planned to study biochemical differences among the broods.

((WN)) You study the emergence of the periodical cicadas. What do you study? What observations are you making?

CS: We record exactly where each cicada population emerges (using GPS automated mapping and crowd sourcing). We record the presence or absence of each of the three morphologically distinct species groups of periodical cicadas (Decim group, Cassini group, and Decula group). We collect specimens for DNA analysis. We look for cicadas coming up one and four years early and late. We dig up cicada nymphs and monitor their growth rates.

((WN)) What equipment do you use?

CS: Nets, shovels, automated GPS recorders, cameras, laptop computers, automated DNA sequencers.

((WN)) Do you study the periodical cicadas with anyone else? What is their role?

CS: Yes, there are a large number of people studying periodical cicadas in my lab and in other labs. My lab is made up of Research Scientists, Postdoctoral Researchers, a technician, graduate students, and undergraduates. Research Scientist John Cooley is the leader of the GPS mapping project; he invented the automated GPS recorder; he built our crowd-sourcing website, and he is instrumental in public outreach. Postdoctoral research David Marshall also participates in the mapping project and leads the part of the research related to the mapping of stragglers. John and Dave and Technician Kathy Hill all study periodical cicada mating behavior and conduct mating and hybridization experiments. One of my graduate students Beth Wade has participated in the nymph collections and will soon start genetic work involving genome wide association mapping designed to locate genes related to life cycle. My graduate student Russ Meister is studying the genes of the bacterial endosymbionts of cicadas. My current undergraduate honors student Erin Dwyer is also studying the development of Magicicada nymphs and is helping to design a lab exercise for college students around the eastern US to do the same. Many of my past undergraduate students have studied the biochemical genetics and development of periodical cicadas. See the Simon Lab website.
CS: We are collaborating with Teiji Sota at the University Kyoto and Jin Yoshimura at Shizuoka University in Japan. They are studying the phylogeography of Magicicada. We are collaborating with John McCutcheon of the University of Montana who is studying the endosymbiont genomes.
CS: We are also collaborating with ecologists Rick Karban and Louie Yang, both professors at UC Davis who have an interest in cicada population dynamics and nutrient cycling in the ecosystem.

((WN)) You studied the periodical cicadas in 1979 and 1996 too. What changes with time?

CS: I have studied periodical cicadas since I was a student back in 1974. What changes with time is increased human development constantly shrinking the patch size of cicada populations.

((WN)) What are your thoughts on the long life span of the periodical cicadas? Why could it be so? What advantages and what disadvantages does it have?

CS: Most or all cicadas have long life cycles compared to your typical annual insect. Examples have been found of two-year to 9-year cycles in different species. Periodical cicadas evolved an even-longer life cycle and I think that part of this relates to the evolution of their synchronized life cycles and peculiar safety-in-numbers strategy for survival. To become synchronized, periodical cicadas had to evolve an exact length life cycle and all adults would have to appear in the same year. Because the nymphs grow at different rates underground, a longer life cycle and a way of counting years must have evolved so that the individuals that get to the last nymphal (underground juvenile) stage first would wait long enough for all other individuals in the population to become ready to emerge.

((WN)) News reports mention this is ‘Brood II’ of the periodical cicadas. What are the distinctive features of this specific species and what is its full scientific name?

CS: The same species exist in multiple broods. No species is restricted to Brood II. The three species present in Brood II are: Magicicada septendecim, M. cassini, and M. septendecula. These same three species are found in every 17-year brood (except the farthest north which only has M. septendecim).

((WN)) At what depth do the cicadas juveniles live underground?

CS: Most live within the top foot of soil but some have been found deeper. We do not know if they go deeper in winter. We need to do much more digging to understand the nymphs.

((WN)) How do people prepare for the cicada emergence?

CS: Of course various people prepare in different ways. Ideally, everyone prepares by studying information available on the web (especially on our websites Magicicada Central and Magicicada.org).

((WN)) Do cicadas affect transport in the local area?

CS: No, not really. Occasionally individuals can be seeing flying across highways and sometimes they smash into cars.

((WN)) Do cicadas usually stay outside or do they also invade houses too?

CS: They stay outside. One might accidentally fly in through an open window but that would be rare.

((WN)) What do the cicadas eat?

CS: Cicadas suck xylem fluid (the watery fluid coming up from the roots of plants) in deciduous forest trees and herbs. Essential amino acids in the cicada diet are supplied by their bacterial endosymbionts. There are two species of endosymbionts. One makes 8 essential amino acids and one makes two essential amino acids.

((WN)) Do cicadas damage crops or city vegetation? What damage?

CS: Cicadas do not chew leave so they do not damage crops like other insects. They can inflict some damage by their egg laying. Cicadas lay eggs in pencil-sized tree branches. If there are not enough branches available, too many female cicadas may lay eggs in a single branch weakening it and making it susceptible to breakage by wind. This can sometimes cause damage in fruit orchards. If the branches break, the eggs die so this behavior is selected against by natural selection.

((WN)) Thank you.

CS: You’re welcome. I am happy to have this opportunity to communicate with your readers!
Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews_interviews_biologist_Chris_Simon_about_periodical_cicadas&oldid=2283939”

Ottawa plans tax windfall to deal with budget surplus

Sunday, October 9, 2005

Canada’s federal government has announced a new program that plans to share unexpected budget surpluses with ordinary citizens. It should be introduced in Ottawa as early as Friday.

The Surplus Allocation Act would share any surplus equally between tax cuts, new spending and debt relief. It would not replace Canada’s $3 billion emergency fund. Under existing law any surplus is funneled completely into debt relief.

The benefit would come as an amount added on to the income tax returns of that year. It would then be added on to the amount a person can earn tax-free for each subsequent year.

Along with the new home heating oil rebate program are considered to be pre-election maneuvering from the liberals. Paul Martin has promised an election within 30 days of the Gomery Commission Report’s release. The report is expected in February.

Retrieved from “https://en.wikinews.org/w/index.php?title=Ottawa_plans_tax_windfall_to_deal_with_budget_surplus&oldid=1093904”

Wikinews interviews Mario J. Lucero and Isabel Ruiz of Heaven Sent Gaming

Friday, November 7, 2014Albuquerque, New Mexico —Online entertainment is a booming market, and plenty of players are making their play; back in March of this year The Walt Disney Company bought the multi-channel network Maker Studios. What is web entertainment, and the arts therein? And, who are the people venturing into this field? Wikinews interviewed Mario Lucero and Isabel Ruiz, the founders of Heaven Sent Gaming, a small entertainment team. This group has been responsible for several publications, within several different media formats; one successful example was aywv, a gaming news website, which was #1 in Gaming on YouTube in 2009, from September to November; Heaven Sent Gaming was also the subject of a referential book, released in 2014, entitled Internet Legends – Heaven Sent Gaming.

Retrieved from “https://en.wikinews.org/w/index.php?title=Wikinews_interviews_Mario_J._Lucero_and_Isabel_Ruiz_of_Heaven_Sent_Gaming&oldid=3060362”

Author of My Billion Year Contract reflects on life in elite Scientology group

Thursday, January 14, 2010

Wikinews interviewed author Nancy Many about her book My Billion Year Contract, and asked her about life working in the elite Scientology group known as the “Sea Org“. Many joined Scientology in the early 1970s, and after leaving in 1996 she later testified against the organization. Published in October, Many’s book has gone on to become one of the top selling new books on Scientology at Amazon.com.

Retrieved from “https://en.wikinews.org/w/index.php?title=Author_of_My_Billion_Year_Contract_reflects_on_life_in_elite_Scientology_group&oldid=1659356”
Shopping Basket