UK: Go to prison – for a joke?

“Scottish comedian and YouTuber Markus Meechan, better known as Count Dankula, is facing a year in prison for recording and uploading a video where he taught his girlfriend’s pet dog how to “seig heil” on command. As Heat Street reported earlier this year the viral video did not amuse Scottish police, prompting his arrest.” (…)

“On Wednesday, Meechan posted an update about his case. “Legal aid application was rejected,” he posted on Twitter. ‘I’m fucked.'”

Heatstreet: Scottish YouTuber Who Faces Prison Over a Joke Can’t Get a Lawyer »

One wiretap order – 3.29 million calls intercepted

US authorities intercepted and recorded millions of phone calls last year under a single wiretap order, authorized as part of a narcotics investigation.

The wiretap order authorized an unknown government agency to carry out real-time intercepts of 3.29 million cell phone conversations over a two-month period at some point during 2016, after the order was applied for in late 2015.

ZDnet: With a single wiretap order, US authorities listened in on 3.3 million phone calls »

Australia leading new »Five Eyes« attack on encryption

Ars Technica: Australia advocates weakening strong crypto at upcoming “Five Eyes” meeting »

Two top Australian government officials said Sunday that they will push for “thwarting the encryption of terrorist messaging” during an upcoming meeting next week of the so-called “Five Eyes” group of English-speaking nations that routinely share intelligence.

Techcrunch: Australia wants Five Eyes to squeeze tech firms on encryption »

“I will raise the need to address ongoing challenges posed by terrorists and criminals using encryption,” Australian Attorney General Senator Brandis is quoted as saying, ahead of the meeting of the group next week.

“These discussions will focus on the need to cooperate with service providers to ensure reasonable assistance is provided to law enforcement and security agencies.”

The Five Eyes countries are: the US, the UK, Canada, Australia and New Zealand.

Techdirt: Australia To Push For Encryption Backdoors At Next ‘Five Eyes’ Meeting »

So far, there’s very little real evidence criminals and terrorists are using encrypted services at a higher rate than non-criminals/terrorists. There have been several statements made to that effect and backed by public displays of devices law enforcement officials claim can’t be unlocked, but most post-attack investigations show terrorists are still mostly using unencrypted communications platforms. Available evidence also shows investigations of normal criminal activity is rarely thwarted by device encryption. At this point, backdoors are a “solution” in need of a problem.

»All your data are belong to US«

The Justice Department on Friday petitioned the US Supreme Court to step into an international legal thicket, one that asks whether US search warrants extend to data stored on foreign servers. The US government says it has the legal right, with a valid court warrant, to reach into the world’s servers with the assistance of the tech sector, no matter where the data is stored.

Ars Technica: Does US have right to data on overseas servers? We’re about to find out »

The German »Staatstrojaner« mission creep

A new law allowing the German police to hack into mobile phones for even minor crimes, is expected to be passed by the German parliament this week [update: the law has now been passed]. Currently, the use of a “Staatstrojaner” – government trojan – is only permitted in order to prevent future terrorist attacks. Under the new law, the authorities will be allowed to implant surveillance malware to help secure convictions for over 70 types of crime. These include serious ones such as genocide, treason and murder, but also less serious crimes such as money counterfeiting, vehicle theft, computer fraud, rigged sports betting and tax evasion. Two kinds of trojans will be available. The first allows the authorities to eavesdrop on calls made with the mobile phone, whether using standard telephony or VoIP, while the second gives access to all information held on the device.

Glyn Moody on PNI: Police use of trojans to hack into mobile phones will become routine under new German law »

US: Republican Party voter data base found on a publicly accessible server

Sensitive personal details relating to almost 200 million US citizens have been accidentally exposed by a marketing firm contracted by the Republican National Committee.

The 1.1 terabytes of data includes birthdates, home addresses, telephone numbers and political views of nearly 62% of the entire US population.

The data was available on a publicly accessible Amazon cloud server.

BBC: Personal details of nearly 200 million US citizens exposed »

Vault7: How the CIA could hack your router

On Thursday, WikiLeaks published a detailed a set of descriptions and documentation for the CIA’s router-hacking toolkit. It’s the latest drip in the months-long trickle of secret CIA files it’s called Vault7, and it hints at how the agency leverages vulnerabilities in common routers sold by companies including D-Link and Linksys. The techniques range from hacking network passwords to rewriting device firmware to remotely monitor the traffic that flows across a target’s network. After reading up on them, you may find yourself itching to update your own long-neglected access point.

Wired: Wikileaks reveals how the CIA could hack your router »