Scanners let Oklahoma cops seize funds from prepaid debit cards without criminal charges

Department of Homeland Security image for ERAD

The Oklahoma Department of Public Safety has purchased several 'Electronic Recovery and Access to Data' devices to install in police cruisers for seizing funds from prepaid debit cards during roadside arrests.

Read the rest

UK Parliament votes in Snoopers Charter, now it goes to the House of Lords

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1106

The Members of Parliament voted in favour of the far-ranging, massively invasive spying bill after the Tories agreed to minor improvements, like dropping the requirement for mandatory crypto backdoors if they would be infeasible or expensive to implement. Read the rest

Watch: Fascinating panel on legal and privacy concerns for Big Data and the Internet of Things

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1104

In "It's a brave new world: Avoiding legal, privacy, and security snafus with big data and the IoT" -- a panel from last week's Strata+Hadoop World conference in San Jose, Alysa Z. Hutnik, a lawyer who specializes in consumer protection in privacy, data security, and advertising and Kristi Wolff, whose legal practice is on liability in food, dietary supplements, medical devices, and emerging health/wearable technology and privacy issues, present an extremely digestable and fascinating look into the lay of the regulatory land for data-collection and user privacy. Read the rest

NSA dumps docs about its Snowden response, reveals that Snowden repeatedly raised alarms about spying

edward-snowden-leaks-tried-to-tell-nsa-about-surveillance-concerns-body-image-1465060915

Since the earliest days of the Snowden revelations, apologists for the NSA's criminal spying program have said that Snowden should have gone "through channels" to report his concerns, rather than giving evidence to journalists and going public. Read the rest

Britons! The Snoopers Charter is being debated today! Tweet your MP!

animation

Today, Parliament is debating the Snoopers Charter, a wide-ranging mass-scale domestic surveillance law that allows government agencies to peer into the most intimate details of your life, conscripting internet and technology companies as participants in surveillance, with only the thinnest veneer of checks and balances and accountability for the inevitable abuse. Read the rest

Elon Musk Says Humans Will Go To Mars by 2024

Elon Musk (Reuters / Stephen Lam)

In my weekly segment on KCRW's “Press Play” news program with host Madeleine Brand, we listen to Elon Musk wax poetic about artificial intelligence and whether life might be a dream--and his plans to send humans to Mars by 2025.

Read the rest

No warrant is needed to get your phone's location data, U.S. appeals court rules

REUTERS/Zoran Milich
In a major blow to security and privacy advocates, a U.S. appeals court on Tuesday ruled that police don't have to have a warrant to obtain your cellphone location data. The ruling means that in America, you have zero expectation of privacy over the historical location data generated by your cell phone.

Read the rest

EFF: FBI & NIST's tattoo recognition program exploited prisoners, profiled based on religion, gave sensitive info to private contractors

why_tattoos_slide

Dave Maass from EFF says, "Right now, NIST researchers are working with the FBI to develop tattoo recognition technology that police can use to learn as much as possible about people through their tattoos. But an EFF investigation has found that these experiments exploit inmates, with little regard for the research's implications for privacy, free expression, religious freedom, and the right to associate. And so far, researchers have avoided ethical oversight while doing it." Read the rest

Cable One used customers' credit scores to decide how good their Internet would be

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1087

Cable One CEO Thomas Might boasted to investors that his company pulled down prospective customers' FICO scores and used them to determine the kind of service they'd extend to them, with "hollow value" customers (those with poor credit) getting less service. Read the rest

To do in Austin: Privacy Settings: A Promethean Tale on stage (and streaming!)

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1085

Jon writes, "Austin, Texas theater maven Heather Barfield energizes the discussion of personal privacy with her highly interactive play 'Privacy Settings: A Promethean Tale,' running through June 18 at the Vortex Theatre in Austin (and streaming June 10)." Read the rest

How security and privacy pros can help save the web from legal threats over vulnerability disclosure

drm-og-1

I have a new op-ed in today's Privacy Tech, the in-house organ of the International Association of Privacy Professionals, about the risks to security and privacy from the World Wide Web Consortium's DRM project, and how privacy and security pros can help protect people who discover vulnerabilities in browsers from legal aggression. Read the rest

Security researcher discovers glaring problem with patient data system, FBI stages armed dawn raid

20160525_082708b

Justin Shafer was roused from his bed this week by thunderous knocking at his North Richland Hills, Texas home, and when he opened the door, found himself staring down the barrel of a 'big green' assault weapon, wielded by one of the 12-15 armed FBI agents on his lawn. Read the rest

Someone just snuck warrantless email access into the Senate's secret intelligence bill

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x1069

Every year, the Senate passes a secret bill (that is, a bill whose text is a secret during its debate) that re-authorizes intelligence agencies' surveillance powers; this year, someone (possibly chairman Richard Burr, R-NC and/or Tom Cotton, R-AR) has snuck in an amendment that would give the FBI the power to demand warrantless access to Americans' email and browsing history, using National Security Letters, a controversial, widely used secret police order. Read the rest

Study shows detailed, compromising inferences can be readily made with metadata

1223787629_e67ae9c054_o

In Evaluating the privacy properties of telephone metadata, a paper by researchers from Stanford's departments of Law and Computer Science published in Proceedings of the National Academy of Sciences, the authors analyzed metadata from six months' worth of volunteers' phone logs to see what kind of compromising information they could extract from them. Read the rest

Edward Snowden performs radical surgery on a phone to make it "go black"

animation (1)

If you think that your phone may have been hacked so that your adversaries can watch you through the cameras and listen through the mics, one way to solve the problem is to remove the cameras and microphones, and only use the phone with a headset that you unplug when it's not in use. Read the rest

Tor Project is working on a web-wide random number generator

hs_montreal_4

Random number generators are the foundation of cryptography -- that's why the NSA secretly sabotaged the RNG standard that the National Institute for Standards and Technology developed. Read the rest

Programmers' stress levels can accurately predict the quality of their code

security-1163108_960_720

In Using (bio)metrics to predict code quality online, presented at the ACM's 38th International Conference on Software Engineering, two Swiss researchers presented their work on monitoring programmers' biometrics to predict the quality of the code they were writing.

Read the rest

More posts