The Oklahoma Department of Public Safety has purchased several 'Electronic Recovery and Access to Data' devices to install in police cruisers for seizing funds from prepaid debit cards during roadside arrests.
In "It's a brave new world: Avoiding legal, privacy, and security snafus with big data and the IoT" -- a panel from last week's Strata+Hadoop World conference in San Jose, Alysa Z. Hutnik, a lawyer who specializes in consumer protection in privacy, data security, and advertising and Kristi Wolff, whose legal practice is on liability in food, dietary supplements, medical devices, and emerging health/wearable technology and privacy issues, present an extremely digestable and fascinating look into the lay of the regulatory land for data-collection and user privacy. Read the rest
Since the earliest days of the Snowden revelations, apologists for the NSA's criminal spying program have said that Snowden should have gone "through channels" to report his concerns, rather than giving evidence to journalists and going public. Read the rest
Today, Parliament is debating the Snoopers Charter, a wide-ranging mass-scale domestic surveillance law that allows government agencies to peer into the most intimate details of your life, conscripting internet and technology companies as participants in surveillance, with only the thinnest veneer of checks and balances and accountability for the inevitable abuse. Read the rest
In my weekly segment on KCRW's “Press Play” news program with host Madeleine Brand, we listen to Elon Musk wax poetic about artificial intelligence and whether life might be a dream--and his plans to send humans to Mars by 2025.
Dave Maass from EFF says, "Right now, NIST researchers are working with the FBI to develop tattoo recognition technology that police can use to learn as much as possible about people through their tattoos. But an EFF investigation has found that these experiments exploit inmates, with little regard for the research's implications for privacy, free expression, religious freedom, and the right to associate. And so far, researchers have avoided ethical oversight while doing it." Read the rest
Cable One CEO Thomas Might boasted to investors that his company pulled down prospective customers' FICO scores and used them to determine the kind of service they'd extend to them, with "hollow value" customers (those with poor credit) getting less service. Read the rest
I have a new op-ed in today's Privacy Tech, the in-house organ of the International Association of Privacy Professionals, about the risks to security and privacy from the World Wide Web Consortium's DRM project, and how privacy and security pros can help protect people who discover vulnerabilities in browsers from legal aggression. Read the rest
Justin Shafer was roused from his bed this week by thunderous knocking at his North Richland Hills, Texas home, and when he opened the door, found himself staring down the barrel of a 'big green' assault weapon, wielded by one of the 12-15 armed FBI agents on his lawn. Read the rest
Every year, the Senate passes a secret bill (that is, a bill whose text is a secret during its debate) that re-authorizes intelligence agencies' surveillance powers; this year, someone (possibly chairman Richard Burr, R-NC and/or Tom Cotton, R-AR) has snuck in an amendment that would give the FBI the power to demand warrantless access to Americans' email and browsing history, using National Security Letters, a controversial, widely used secret police order. Read the rest
In Evaluating the privacy properties of telephone metadata, a paper by researchers from Stanford's departments of Law and Computer Science published in Proceedings of the National Academy of Sciences, the authors analyzed metadata from six months' worth of volunteers' phone logs to see what kind of compromising information they could extract from them. Read the rest
If you think that your phone may have been hacked so that your adversaries can watch you through the cameras and listen through the mics, one way to solve the problem is to remove the cameras and microphones, and only use the phone with a headset that you unplug when it's not in use. Read the rest