Tag Archives: Documents
Facebook knew children were spending money in games without getting parental consent and the company did nothing about it, according to newly unsealed court documents from a 2012 lawsuit.
More than 100 pages of private Facebook documents were released following a request by the Center for Investigative Reporting and shed light on Facebook’s tactics. For years, the company was aware that children were playing games on accounts tied to a credit card and were, in some cases, unknowingly racking up thousands of dollars in bills by simply clicking within a game to get new abilities or upgrades.
The company ignored a plan developed by an employee in 2011 that would curb children from spending money without a parent’s permission.
The more games children played, the more Facebook’s revenue grew. When angry parents saw their credit card bills and in some cases reported not even receiving a receipt, they found it difficult to get their money back from Facebook, so they turned to credit card companies, the Better Business Bureau and finally, a lawsuit.
While the documents are old, they shed light on Facebook’s past business practices as the company continues to be under immense scrutiny for its numerous privacy breaches. Facebook changed its refund policy around games in 2016 and now has a detailed site about how to handle payment disputes with developers. Additionally, a Parents Portal offers tips for parents about how their kids can stay safe online.
“Facebook works with parents and experts to offer tools for families navigating Facebook and the web. As part of that work, we routinely examine our own practices, and in 2016 agreed to update our terms and provide dedicated resources for refund requests related to purchases made by minors on Facebook,” the company said in a statement.
Meng Wanzhou, Executive Board Director of the Chinese technology giant Huawei, attends a session of the VTB Capital Investment Forum “Russia Calling!” in Moscow, Russia October 2, 2014. REUTERS/Alexander Bibik
TORONTO (Reuters) – A top executive of China’s Huawei Technologies Co Ltd [HWT.UL] argued that she should be let out on bail while awaiting an extradition hearing due to severe hypertension and fears for her health while incarcerated in Canada, court documents released on Sunday showed.
Huawei Chief Financial Officer Meng Wanzhou is fighting to be released on bail after she was arrested on Dec. 1 in Canada at the request of the United States.
Meng, 46, faces U.S. accusations that she covered up her company’s links to a firm that tried to sell equipment to Iran despite sanctions, a Canadian prosecutor said on Friday, arguing against giving her bail while she awaits extradition to the United States.
In a sworn affidavit, Meng said she is innocent of the allegations and will contest them at trial in the United States if she is surrendered there.
Meng also said she was taken to a hospital for treatment for hypertension after being detained.
China has strongly criticized her detention and demanded her immediate release. The arrest has roiled global markets amid worries it could torpedo possible thawing of trade tensions between the United States and China.
In a bail application seeking her release pending an extradition hearing, Meng said she has longstanding ties to Vancouver dating back at least 15 years, as well as significant property holdings in the city.
Her family also sought leave to remain in Vancouver if she was granted bail, according to the court documents, with her husband saying he plans to bring the couple’s daughter to Vancouver to attend school during the trial.
Reporting by Denny Thomas; Editing by Lisa Shumaker and David Gregorio
MOSCOW/TORONTO (Reuters) – Moscow-based Kaspersky Lab plans to open a data center in Switzerland to address Western government concerns that Russia exploits its anti-virus software to spy on customers, according to internal documents seen by Reuters.
Kaspersky is setting up the center in response to actions in the United States, Britain and Lithuania last year to stop using the company’s products, according to the documents, which were confirmed by a person with direct knowledge of the matter.
The action is the latest effort by Kaspersky, a global leader in anti-virus software, to parry accusations by the U.S. government and others that the company spies on customers at the behest of Russian intelligence. The U.S. last year ordered civilian government agencies to remove the Kaspersky software from their networks.
Kaspersky has strongly rejected the accusations and filed a lawsuit against the U.S. ban.
The U.S. allegations were the “trigger” for setting up the Swiss data center, said the person familiar with Kapersky’s Switzerland plans, but not the only factor.
“The world is changing,” they said, speaking on condition of anonymity when discussing internal company business. “There is more balkanisation and protectionism.”
The person declined to provide further details on the new project, but added: “This is not just a PR stunt. We are really changing our R&D infrastructure.”
A Kaspersky spokeswoman declined to comment on the documents reviewed by Reuters.
In a statement, Kaspersky Lab said: “To further deliver on the promises of our Global Transparency Initiative, we are finalizing plans for the opening of the company’s first transparency center this year, which will be located in Europe.”
“We understand that during a time of geopolitical tension, mirrored by an increasingly complex cyber-threat landscape, people may have questions and we want to address them.”
Kaspersky Lab launched a campaign in October to dispel concerns about possible collusion with the Russian government by promising to let independent experts scrutinize its software for security vulnerabilities and “back doors” that governments could exploit to spy on its customers.
The company also said at the time that it would open “transparency centers” in Asia, Europe and the United States but did not provide details. The new Swiss facility is dubbed the Swiss Transparency Centre, according to the documents.
Work in Switzerland is due to begin “within weeks” and be completed by early 2020, said the person with knowledge of the matter.
The plans have been approved by Kaspersky Lab CEO and founder Eugene Kaspersky, who owns a majority of the privately held company, and will be announced publicly in the coming months, according to the source.
“Eugene is upset. He would rather spend the money elsewhere. But he knows this is necessary,” the person said.
It is possible the move could be derailed by the Russian security services, who might resist moving the data center outside of their jurisdiction, people familiar with Kaspersky and its relations with the government said.
Western security officials said Russia’s FSB Federal Security Service, successor to the Soviet-era KGB, exerts influence over Kaspersky management decisions, though the company has repeatedly denied those allegations.
The Swiss center will collect and analyze files identified as suspicious on the computers of tens of millions of Kaspersky customers in the United States and European Union, according to the documents reviewed by Reuters. Data from other customers will continue to be sent to a Moscow data center for review and analysis.
Files would only be transmitted from Switzerland to Moscow in cases when anomalies are detected that require manual review, the person said, adding that about 99.6 percent of such samples do not currently undergo this process.
A third party will review the center’s operations to make sure that all requests for such files are properly signed, stored and available for review by outsiders including foreign governments, the person said.
Moving operations to Switzerland will address concerns about laws that enable Russian security services to monitor data transmissions inside Russia and force companies to assist law enforcement agencies, according to the documents describing the plan.
The company will also move the department which builds its anti-virus software using code written in Moscow to Switzerland, the documents showed.
Kaspersky has received “solid support” from the Swiss government, said the source, who did not identify specific officials who have endorsed the plan.
Reporting by Jack Stubbs in Moscow and Jim Finkle in Toronto; Editing by Jonathan Weber
WASHINGTON (Reuters) – The U.S. government has broadened an interpretation of which citizens can be subject to physical or digital surveillance to include “homegrown violent extremists,” according to official documents seen by Reuters.
The change last year to a Department of Defense manual on procedures governing its intelligence activities was made possible by a decades-old presidential executive order, bypassing congressional and court review.
The new manual, released in August 2016, now permits the collection of information about Americans for counterintelligence purposes “when no specific connection to foreign terrorist(s) has been established,” according to training slides created last year by the Air Force Office of Special Investigations (AFOSI).
The slides were obtained by Human Rights Watch through a Freedom of Information Act request about the use of federal surveillance laws for counter-drug or immigration purposes and shared exclusively with Reuters.
The Air Force and the Department of Defense told Reuters that the documents are authentic.
The slides list the shooting attacks in San Bernardino, California, in December 2015 and Orlando, Florida, in June 2016 as examples that would fall under the “homegrown violent extremist” category. The shooters had declared fealty to Islamic State shortly before or during the attacks, but investigators found no actual links to the organization that has carried out shootings and bombings of civilians worldwide.
Michael Mahar, the Department of Defense’s senior intelligence oversight official, said in an interview that AFOSI and other military counterintelligence agencies are allowed to investigate both active duty and U.S. civilian personnel as long as there is a potential case connected to the military. Investigations of civilians are carried out cooperatively with the Federal Bureau of Investigation, Mahar said.
Executive order 12333, signed by former President Ronald Reagan in 1981 and later modified by former President George W. Bush, establishes how U.S. intelligence agencies such as the CIA are allowed to pursue foreign intelligence investigations. The order also allows surveillance of U.S. citizens in certain cases, including for activities defined as counterintelligence.
Under the previous Defense Department manual’s definition of counterintelligence activity, which was published in 1982, the U.S. government was required to demonstrate a target was working on behalf of the goals of a foreign power or terrorist group.
It was not clear what practical effect the expanded definition might have on how the U.S. government gathers intelligence. One of the Air Force slides described the updated interpretation as among several “key changes.”
‘CLOAK OF DARKNESS’
However, some former U.S. national security officials, who generally support giving agents more counterterrorism tools but declined to be quoted, said the change appeared to be a minor adjustment that was unlikely to significantly impact intelligence gathering.
Some privacy and civil liberties advocates who have seen the training slides disagreed, saying they were alarmed by the change because it could increase the number of U.S. citizens who can be monitored under an executive order that lacks sufficient oversight.
“What happens under 12333 takes place under a cloak of darkness,” said Sarah St. Vincent, a surveillance researcher with Human Rights Watch who first obtained the documents. “We have enormous programs potentially affecting people in the United States and abroad, and we would never know about these changes” without the documents, she said.
The National Security Act, a federal law adopted 70 years ago, states that Congress must be kept informed about significant intelligence activities. But the law leaves the interpretation of that to the executive branch.
The updated interpretation was motivated by recognition that some people who may pose a security threat do not have specific ties to a group such as Islamic State or Boko Haram, Mahar at the Defense Department said.
“The internet and social media has made it easier for terrorist groups to radicalize followers without establishing direct contact,” Mahar said.
“We felt that we needed the flexibility to target those individuals,” he said.
In August 2016, during the final months of former President Barack Obama’s administration, a Pentagon press release announced that the department had updated its intelligence collecting procedures but it made no specific reference to “homegrown violent extremists.”
The revision was signed off by the Department of Justice’s senior leadership, including the attorney general, and reviewed by the Privacy and Civil Liberties Oversight Board, a government privacy watchdog.
Mahar said that “homegrown violent extremist,” while listed in the Air Force training slide, is not an official phrase used by the Defense Department. It does not have a specific list of traits or behaviors that would qualify someone for monitoring under the new definition, Mahar said.
Hunches or intuition are not enough to trigger intelligence gathering, Mahar said, adding that a “reasonable belief” that a target may be advancing the goals of an international terrorist group to harm the United States is required.
The updated Defense Department manual refers to any target “reasonably believed to be acting for, or in furtherance of, the goals or objectives of an international terrorist or international terrorist organization, for purposes harmful to the national security of the United States.”
Mahar said that in counterterrorism investigations, federal surveillance laws, including the Foreign Intelligence Surveillance Act, continue to govern electronic surveillance in addition to the limitations detailed in his department’s manual.
Reporting by Dustin Volz; editing by Grant McCool