Patriot Act Haunts Google Service 277
The Globe and Mail has an interesting piece taking a look at Google's latest headache, the US Government. Many people are suddenly deciding to spurn Google's services and applications because it opens up potential avenues of surveillance. "Some other organizations are banning Google's innovative tools outright to avoid the prospect of U.S. spooks combing through their data. Security experts say many firms are only just starting to realize the risks they assume by embracing Web-based collaborative tools hosted by a U.S. company, a problem even more acute in Canada where federal privacy rules are at odds with U.S. security measures."
Time for google.ca? (Score:4, Interesting)
Don't keep logs (Score:4, Interesting)
PGP (Score:5, Interesting)
http://firegpg.tuxfamily.org/ [tuxfamily.org]
"Patriot" act (Score:5, Interesting)
Here is What is Coming : (Score:1, Interesting)
Sure, there will be 'Free' services, but be prepared to pay for those in exchange for giving up marketing data.
Think about it, on-line services eliminate piracy, people pay for the services they use.
It works for cellphones, and people accept it.
It works for on-line games, and people accept it.
The Microsoft X-Box , and X-Box 360, and basically test-cases for super-locked down PC's.
Get ready to slowly relinquish control over your PC.
Re:PGP (Score:4, Interesting)
That would be when nasty laws that allow law enforcement to demand cryptographic keys come into play.
These days encryption just makes you a target. Clearly the way forward is steganography :)
Corporate Espionage? (Score:5, Interesting)
Many people are suddenly deciding to spurn Google's services and applications because it opens up potential avenues of surveillance.
Um, how about corporate espionage? Nothing, absolutely nothing, stops Google from harvesting everything they can get their hands on- and they have the storage systems and human expertise to do it.
Case and point: I emailed a link to a wiki I had just set up to 3 people, two of whom had Gmail accounts. A spider from Google hit the page hours before anyone else did, hitting the wiki just after I emailed the link out. There were no public links to the site, and no referral URL.
So, let's see: processing your email to show you relevant ads? Check. Processing email to feed URLs to their spider? Check. What else does Google do with your email? Wouldn't it be the greatest tool in their quivver- the "God Google"? Sit down with HipWebShit.com, then an hour after the meeting and see a)How many people search/click on links for HipWebShit b)Who from HipWebShit.com has sent gmail users email (and what it says...), c)Who is talking about HipWebShit from/to a Gmail account period (ie general "valley buz"?
Hint: why do you think Google has so many PhDs? It starts getting creepy when you realize that Google seems to work very hard to keep their employees inside the google campus as much as possible, how secretive their operations are (seriously, nobody can compete with them anymore- it's not like they're guarding the henhouse for competition reasons) and how cult-like the atmosphere is...
Re:Time for google.ca? (Score:5, Interesting)
I'm not one that usually gets paranoid and I hate conspiracy theories.. but google worries me. Even if they never do anything wrong as a company, it just takes one person with bad intentions to make all that information public.
There is something wrong with a company that wants to be everything to everyone. (look at Microsoft)
Comment removed (Score:4, Interesting)
POP/SMTP Lets Anyone Read Your E-Mail (Score:2, Interesting)
"Mr. Puk says teachers want an in-house system that doesn't let third parties see their e-mails."
Then screw GMail, they better be using encryption anyway! I know most here know this, but someone needs to hit the author and this school's faculty with the clue stick. If you are just using a plain old POP/SMTP client without encryption anyone with access to a packet sniffer can read your email at any point along the route, whether it be in the US or Canada. Its is amazing (read: scary) the number of folks in IT and computer science who don't know this. While we are at it maybe the Canadians better stop using all other unencrypted protocols too...
Re:Corporate Espionage? (Score:5, Interesting)
Re:Don't be evil? (Score:5, Interesting)
Every politician who crossed them would have every possible scandal associated with them come up on the front search page whenever somebody was looking for info about them. Politicians who did what Google told them to would have all their scandals banished to the 300th page.
Muck-raking reporters would be mysteriously signed up for Google Alerts on Google-hostile politicians, and might "mysteriously" receive private documents from the hard drives of those politicians & their interns who happen to be running the "Google Desktop" toolbar.
Or some hacker might "discover" how to get the search histories of selected politicians, and suddenly the politician has to explain why he keeps searching for child porn photos.
Re:I Propose (Score:5, Interesting)
The snooping would be greatly curtailed if there was no anonymity for a snooping govt. If every request was made naked in front of the teeming millions only the most vital info requests would occur.
Request for serches from machine No 000.000.000.0000 in relation to ongoing criminal investigation associated with charges of
Request for all machines that searched for "TSA" , "Liquid" , and "explosive" for ongoing terrorist investigation would suddenly seem quite dubious without better specifics.
Re:Time for google.ca? (Score:3, Interesting)
Only a small step away from goatse..
Re:Time for google.ca? (Score:5, Interesting)
As for other information (such as who is searching for what), well they're probably not storing significantly more than Yahoo or MSN. Google's just one of the more popular targets because they're pretty highly visible.
The Patriot act says that, under certain circumstances, a service provider may not notify its customers that they've released their records. That's one of the biggest issues here--companies want to know if their documents are being viewed.
Re:Time for google.ca? (Score:3, Interesting)
banninated (Score:2, Interesting)
Re:Time for google.ca? (Score:4, Interesting)
Yup. Last time we invaded Canada, they kicked out asses back across the border. Although we did manage to burn down the Parliament in York (now Toronto) before leaving. :)
It's interesting, what they do and don't teach you about the War of 1812 in American schools. Like the fact that, oh, you know, we lost? Sure, we won a few nifty battles, but overall we lost the war. They didn't stop impressing our sailors or interfering with our trade because we fought a war over it, they stopped because they'd only been doing it as part of their war against Napoleon, and that war ended. In the treaty that ended the war, we agreed to a return to status quo ante bellum -- basically a big undo button: things were to return to exactly the state they were in before the war. But the British had been fine with the state of things before the war, we're the ones that had a list of demands for things to change. In the end, we agreed to no change. We did that because the alternative being argued by the other side was for the US to make territorial concessions to Britain. We were lucky we managed to get everyone to agree to just forget the whole thing, and doubly-lucky that the changing circumstances of the world basically obsoleted our original demands.
Re:Don't keep logs (Score:4, Interesting)
With enough 'anonymous' data you can unmask the identity. A few cases have already shown this.
While they can get some information from the IP address, it's not nearly as useful as information from the Google Cookie.
That's true in theory. In practice its very nearly as good in a great deal of cases. If you sign into gmail from home, they'll be able to link the ip address to the account. So even when you aren't logged in they can attach data to the profile, with a 'liklihood' of being the same, or at least an affiliated person. (affiliated people are likely in similiar demographics...)
Once they have a list of ip addresses you use your account from, you might as well be logged in. Sure it won't be 100% accurate, but the link is strong enough to be useful. And if your dynamic ip address changes, they'll pick you up again next time you log-in.
Proxy servers etc can also help, but even the proxy is useful... if your proxying in from webgate5.marketing.ibm.com that's useful information too. And they still have session cookies.
Even the combination of NAT address + browser + windows size + java version + etc can make a usable session variable. Its more than enough to track a session from page to page, especially on smaller sites, even if they are behind a proxy and have cookies disabled. If that session is at any pointed linked back to a 'authenticated' connection -- e.g. logging into a google app, all your 'supposedly' anonymous surfing can be linked.
Sure if you go to a web cafe and surf around they might not be able to make any useful inferences if you don't login to your gmail, but that's the exception not the rule.
Consider a scenario where two PCs are behind a NAT/Proxy - person X accesses gmail then continues along to a number of other sites: A, B, C, and D. Later on someone else, person Y, behind the same proxy accesses sites E,F,G,H and then logs into gmail. In both cases google can reliably link the history to the correct account.
Over time, someone from behind the proxy visits sites A,B,C on a regular basis. Google can with high probability link all that data to person X, even if its an isolated session that never visited gmail. If someone later visits E,F,H, that data can be linked to profile Y.
Sure it -might- be wrong, but odds are its not. And its right often enough to be worth making these inferences for the purposes of placing targeted ads.
Re:Are they just NOW figuring that out? (Score:4, Interesting)
The Iraq war is showing everyone what the limits of the US military really are (they can't handle a geurilla war in a country that they'd previously bombed the snot out of for twelve years, despite the best-equipped military in the world), and China and India -- that's 2B potential consumers, kids -- are set to outpace American consumption levels, probably in the next decade or two, less if we're all really unlucky.
You know, it doesn't even matter what the rest of the world does, the US government is well on the way to making your country a backwater anyway. Too bad you're going to take us down with you.
Google - the Ultimate Trojan Horse ;) (Score:1, Interesting)
Um, no. That's architecture 101, not sure what your experience is, but beg to differ. I mean, consider the headlines when a laptop is stolen or misplaced, or a web site is hacked. Trust me, you may not know the difference, but forward thinking organizations do, sometimes as in the case of this college, a little too late. Well, they can still ditch Google. It's not clear from the article, but what do they need? Google Office? Search capability? Spreadsheet? How hard is that - pick up a copy of OpenOffice for goodness sake. We're not talking Oracle/SAP here are we?
I don't know why people are getting their knickers in a knot over Google, when the main problem lies with the US backbone carriers, who - with only one known exception - have opened their networks to constant and widespread monitoring by US security agencies.
Yes, that's surely a concern also, but that shouldn't minimize this, which is close to providing the same capability, on a company's data that is inside the firewall (or so they thought).
Google at very least had the guts to fight a public legal battle with the Feds over release of even sanitised data.
See maybe it's just me, but handing over the reigns to Google, and depending on their "do no evil" is not a position most organizations want to be in. This strikes me as a Faustian bargain.
The story here may be the danger to companies when they bring these companies inside the firewall, but again, refusing to trust Google is a funny place to start enforcing data integrity. The plain and simple fact is that the greatest threat of corporate data leaks is from staff who, whether through sins of omission or commission, carry sensitive data on laptops, thumb drives, CDs without any protections whatsoever.
Excellent point, as I pointed out above. And I don't know about you, but I do know organizations are working very hard to minimize the impact of lost laptops, such as encryption, etc. But why do you want to compound the error?
I have to conclude, therefore that this is nothing more than a tiny kernel of truth wrapped in chocolatey FUD-ness that PHBs and corporate counsel love so much.
See that seems a bit naive to me. Like the folks that posted all their personal info on MySpace and then are shocked to find it's not that private at all. So I disagree, I think this is a big issue people are a bit clueless about - for now.