Harvard University The Politics of Personal Data Gov 1430 |
In the News
The politics of sharing personal information is timely. Share links to news items relevant to the course. You should provide a link once a week. |
Post 1
http://www.dutchnews.nl/news/archives/2015/03/court-overturns-
dutch-data-retention-law-privacy-more-important/ Dutch court: "privacy is [more] important" |
Post 2
http://www.newsweek.com/twitter-predict-emergency-room-rush-hours-
323360 Research that will be published in the IEEE Journal of Biomedical and Health Informatics claims that Twitter posts may be used to predict busy emergency room hours based on people's health complaints that they tweet. |
Post 3
http://www.bloomberg.com/news/articles/2015-04-13/u-s-data-talks-must-
get-results-by-end-may-eu-s-jourova-says |
Post 4
http://www.wsj.com/articles/privacy-group-sues-faa-over-drone-rules-
1427845718 Privacy advocates sued the Federal Aviation Administration for not addressing privacy issues in recent proposed rules for commercial drones, the latest dust-up over how to regulate unmanned aircraft as the devices become more prevalent in U.S. skies. |
Post 5
A brief article with an anecdote about the passing of HF3 in the House of
Reps. The bill will make it easier for people to prove the guilt of violators of privacy rights, which the author argues will help future victims of privacy invasion. http://www.desmoinesregister.com/story/opinion/readers/2015/03/24/invasi on-privacy-hard-prove/70354122/ |
Post 6
Samsung's voice-recording smart TVs breach privacy law, campaigners claim
US consumer rights group Epic claims Samsung has breached the privacy of its users, and is demanding an FCC investigation http://www.theguardian.com/technology/2015/feb/27/samsung-voice-recording- smart-tv-breach-privacy-law-campaigners-claim |
Post 7
http://blogs.wsj.com/riskandcompliance/2015/04/15/experiment-shows-
speed-at-which-stolen-data-travels/ This article outlines an experiment that tests how fast stolen data travels around the world. They found that within two weeks over 1000 people had seen and/or downloaded this fictitious stolen data. |
Post 8
airbnb claims that the government in San Francisco is attempting to collect double the
taxes airbnb renters owe the city. Additionally the company claims that the government is trying to get more personal information from renters than is necessary to ensure that the taxes are being properly paid. http://venturebeat.com/2015/04/09/airbnb-says-san-francisco-is-unfairly-trying- to-double-tax-hosts-access-users-personal-data/ |
Post 9
http://www.thesundaily.my/news/1366833
Australia's upper house just passed a law requiring telecommunication firms to retain customers' digital data for two years. This was done in an attempt to tighten counter-terrorism measures. |
Post 10
http://www.lemonde.fr/pixels/article/2015/04/16/les-deputes-approuvent-
un-systeme-de-surveillance-du-trafic-sur-internet_4616652_4408996.html This is in French, so use Google translate if you don't read it, but the French National Assembly approved a measure to install "black boxes" in ISPs to monitor internet metadata. |
Post 11
http://www.sys-con.com/node/3307804
Much the like recent Uber hack. "It’s been revealed that PaymyPCN.net, a private firm which allows drivers to pay fines via its website and has a direct link to the Driver and Vehicle Licensing Agency (DVLA) database, had been affected by a backdoor which gave access to restricted information." This exposes names, addresses, photographs, and other vital information. The company was susceptible to hack due to its encryption process. |
Post 12
ALLAN J. KIMMEL
http://profiles.socialpsychology.org/CV/Kimmel.pdf Joel Jeffrey Sokolsky http://web.mit.edu/ssp/people/sokolsky/SokolskyCVNov2012.pdf MOHAMED FARAG AYAD http://www.kau.edu.sa/Files/165002/Files/48100_MOHAMED%20FARAG%2 0AYAD.pdf Yannis M. Ioannides http://www.aueb.gr/imop/cvs/c.v.ioannidis.pdf Michael R Fox: http://www.thechildandfamily.com/download/cirriculum_vitae.pdf Steven Myers: http://louisville.edu/faculty/srmyer01/about/SRM_CV122008.doc/at_downloa d/file John Martin Page, Jr: http://www.erf.org.eg/CMS/uploads/pdf/1194806906_John_Page_CV_07.pd f Megan Buchanan: http://cdn1.proz.com/profile_resources/1868879_r52d41de94edf1.pdf Bruce David White: http://www.amc.edu/Academic/bioethics/FacultyCV/BDW_CV.pdf Geoffrey L. Cohen: http://www.electionstudies.org/conferences/2006Duke/cvs/Cohen_cv.pdf Eli Katz: http://www.sbbh.net/wp-content/uploads/2013/11/CURRICULUM- VITAE-eli.pdf Sehic M Azra: http://www.pediatrics21.com/docs/DrSehic-CV.pdf Osvaldo Civitarese http://www.fundacionkonex.org/ckfinder/userfiles/files/CV%20Osvaldo%20 Civitarese%20%28english%29.pdf |
Post 13
http://www.nytimes.com/2015/03/26/technology/drones-beaming-web-access-are-
in-the-stars-for-facebook.html?&assetType=nyt_now Facebook is getting in on the drone-based Internet provider game! "Taking to the skies to beam Internet access down from solar-powered drones may seem like a stretch for a tech company that sells ads to make money. The business model at Facebook, which has 1.4 billion users, has more in common with NBC than Boeing. But in a high-stakes competition for domination of the Internet, in which Google wields high-altitude balloons and high-speed fiber networks and Amazon has experimental delivery drones and colossal data centers, Facebook is under pressure to show that it, too, can pursue projects that are more speculative than product." |
Post 14
Why this national data breach notification bill has privacy advocates worried
http://www.washingtonpost.com/blogs/the-switch/wp/2015/04/15/why-this- national-data-breach-notification-bill-has-privacy-advocates-worried/ |
Post 15
"The privacy of students who get care at university clinics is
in doubt after the mental health records of a woman who says she was raped at the University of Oregon were used by the school in the course of defending itself against a lawsuit." "...in court papers, [University if Oregon] officials argued that since the [sexually-assaulted] student went to the school's health clinic, her health records belong to the school and therefore could be accessed. In addition, they argued that because the woman claimed emotional distress — a medical claim — the school was entitled to her medical records under a federal law known as the Family Educational Rights and Privacy Act." "Steve McDonald, an attorney for the Rhode Island School Of Design and a FERPA specialist, says the nation's medical privacy law, known as HIPAA, doesn't apply in this case, and the school is within its rights." http://www.npr.org/blogs/health/2015/03/09/391876192/college- rape-case-shows-a-key-limit-to-medical-privacy-law |
Post 16
http://www.pcworld.com/article/2909772/radioshack-presses-ahead-plan-
for-sale-of-customer-data.html Another source of personal data exposure comes from companies who go bankrupt. In auction, they are trying to sell customer's personal data, including names, addresses, email addresses and possibly other more sensitive information. |
Post 17
UK surveillance under scrutiny
http://www.aljazeera.com/programmes/listeningpost/2015/03/uk- surveillance-scrutiny-150321074632954.html |
Post 18
http://www.nytimes.com/2015/05/08/us/nsa-phone-records-collection-ruled-
illegal-by-appeals-court.html?hp&action=click&pgtype=Homepage&module=first- column-region®ion=top-news&WT.nav=top-news&_r=0 The Federal Appeals Court in New York ruled today that the mass collection of metadata from domestic phone calls is not legal under the Patriot Act. The ruling comes at the time when Congress is deciding whether or not to end or expand the program. |
Post 19
Clear Deletes Dumb Tweets Before You Regret Them
http://techcrunch.com/2015/04/20/sorry-about-that-f-bomb/ Interesting new startup designed to warn you before you post that inappropriate or accidentally offensive tweet. The idea is that people need something to force them to stop and think before they post. I guess my response would be if you don't want people thinking you're a jerk on twitter, don't be a jerk on twitter. |
Post 20
http://www.theverge.com/2015/5/4/8542511/justice-department-stingray-phone-
tracking-review |
Post 21
http://www.forbes.com/sites/sap/2015/04/20/3-ways-big-data-will-
personalize-medicine/ This article describes how big data will make medicine more efficient and improve the monitoring of "population health." Individual patient data will also help create protocol for treating difficult things such as cancer by compiling the successful treatment paths all in one place. |
Post 22
http://www.bloomberg.com/news/articles/2015-04-18/russian-hackers-use-zero-
days-in-attempt-to-get-sanctions-data Timely article in Bloomberg about how hackers linked to the Russian government have tried to infiltrate features in various pieces of Microsoft and Adobe software to get at information about sanctions policy. Especially interesting piece on how a cyberattack is detected and deflected. |
Post 23
Wikipedia to sue NSA over online surveillance!
http://america.aljazeera.com/articles/2015/3/10/wikipedia-eight-other- organizations-file-lawsuit-against-nsa.html |
Post 24
http://www.theverge.com/2015/4/29/8512999/facebook-european-fragmentation |
Post 25
Tech firms and privacy groups press for curbs on NSA surveillance powers
"In a letter to be sent Wednesday to the Obama administration and senior lawmakers, the coalition vowed to oppose any legislation that, among other things, does not ban the “bulk collection” of Americans’ phone records and other data." |
Post 26
There is a new barbie doll that records what kids say to it and responds. It "learns" overtime to deliver more "intelligent" responses. The concern is that this
doll will send data to the toy company as well as third parties for use and storage beyond the bounds of privacy protection. Also, it raises the uncomfortable fact that people may be willing to form human-like bonds with non-human entities. From the article: "Even if Mattel and ToyTalk aren't using this technology to feed data to advertisers, they're still hoping to manufacture deep, emotional bonds between children and their toys. Susan Linn, the director of the CCFC, has said this is unequivocally 'creepy' and creates 'a host of dangers' for children and families. 'Kids using 'Hello Barbie' aren't only talking to a doll," said Linn, "They are talking directly to a toy conglomerate whose only interest in them is financial.'" Two of the more disturbing points from the privacy statement are: "to provide you with news and information about our events, activities, offers, promotions, products, and services we think will be of interest to you (with your consent where prior consent is required by applicable law);" and "for other research and development or data analysis purposes" <-- I think this is unspecific and possible to be abused! Article: http://www.theverge.com/2015/3/16/8223251/hello-barbie-speech-recognition-privacy Privacy policy: https://www.toytalk.com/legal/privacy/#children |
Post 27
These are a few noteworthy technological developments that relate to
privacy and some of the discussions we've had in class so far: The security firm, AVG, is in the prototyping stage of creating "privacy glasses" which make you invisible to facial recognition software http://www.engadget.com/2015/03/01/avg-invisibility-specs/ Qualcomm is launching "Snapdragon Sense" ID 3D Fingerprint Technology, the first 3D fingerprint authentication technology that rests on ultrasonic technology. http://www.delhidailynews.com/news/Qualcomm-announces-next- generation-Biometrics-Solution-1425309730/ Panasonic is delving into surveillance camera technology with the creation of Nubo: a 4G-equipped security camera that can still keep a watchful eye in situations were there's no power or WiFi signal. The camera's motion sensor detects movement, recording clips in 5-, 10-, 30- or 60-second lengths and analyzing the footage to differentiate between humans and your family pets. If your dog or an unwanted guest enters the monitored area, Nubo sends alert to your connected mobile device along with the captured video. http://www.engadget.com/2015/03/02/panasonic-nubo-4g-monitoring- security-camera/ |
Post 28
http://gizmodo.com/dhs-secretary-begs-silicon-valley-to-stop-the-
encryptio-1699273657 The Department of Homeland Security is opening an office in Silicon Valley and trying to work more closely with tech companies. However, they also appear to be calling for less encryption of private data, or more cooperation with companies to hand said data over to the government. |
Post 29
http://www.zdnet.com/article/github-suffers-largest-ddos-attack-in-sites-
history/ Github suffered a massive DDOS attack, early fingers were pointed at the Chinese goverment. |
Post 30
"DARPA Says It Wants to Help Protect Your Online Privacy"
http://www.nbcnews.com/tech/security/darpa-unexpectedly-announces- program-improve-online-piracy-n322601 "The goal of the Brandeis program is to break the tension between maintaining privacy and being able to tap into the huge value of data," explained program manager John Launchbury in a press release. "Rather than having to balance these public goods, Brandeis aims to build a third option, enabling safe and predictable sharing of data while reliably preserving privacy." |
Post 31
http://business.financialpost.com/2015/03/04/microsoft-corp-achieves-iso-cloud-
privacy-certification/?__lsa=4467-f71a#__federated=1 Microsoft became the first major cloud service provider to have an international standard for the privacy of users' information/data. It used to have to comply with different federal governments and sell data depending on which government was asking for a particular nationality's data. Now Microsoft will alert their users when the data will be used by the government, and will show their users more transparent rules about how the customer data is being used. |
Post 32
Breach of payment card data security standard leads to £175,000 ICO fine
for insurer: http://www.out-law.com/en/articles/2015/february/breach-of-payment-card- data-security-standard-leads-to-175000-ico-fine-for-insurer/ |
Post 33
http://techcrunch.com/2015/02/19/the-nsa-reportedly-stole-
millions-of-sim-encryption-keys-to-gather-private-data/? ncid=rss&cps=gravity_1462_6545471995788144651 More attempts from the NSA and GCHQ to break into people's personal data, this time by compromising SIM cards in mobile phones. |
Post 34
Broadband Companies Sue the FCC Over Net Neutrality
Broadband companies began their assault on the U.S. Federal Communications Commission's net neutrality proposal this week, earlier than most analysts expected. http://www.chinatopix.com/articles/43505/20150324/broadband-companies- prepare-legal-battle-against-fcc.htm |
Post 35
I believe that Professor Sweeney mentioned one of these books in
class, but here is a Washington Post article on two books on data privacy: http://www.washingtonpost.com/opinions/beware-not-an-all- powerful-big-brother-but-many-little- brothers/2015/03/20/f9f13178-bd08-11e4-bdfa- b8e8f594e6ee_story.html |
Post 36
http://www.theatlantic.com/politics/archive/2015/03/the-privacy-movements-
constitution-4th-amendment/386474/ Really interesting article about the NSA and the fourth amendment and how they may be at adds. |
Post 37
There's a really interesting article in the Atlantic about Facebook uses by cops for
detecting relationships between people who commit crimes and others, or predicting crime: "The fundamental problem with policing via social-media data is that it misrepresents what social networks actually look like on the ground. Despite what techno-evangelists might wish, not all social relationships can be described using computational logic. The problem is structural and epistemological. Like all computer programs, databases are ultimately based on binary logic. If you want shades of meaning, you have to explicitly build that capability into your system. And building nuance is far harder than it seems." http://www.theatlantic.com/politics/archive/2015/04/when-cops-check- facebook/390882/ |
Post 38
Virginia pushed into debate of teacher privacy vs. transparency for parents
http://www.washingtonpost.com/local/education/parent-suing-state-officials-to- make-teacher-evaluation-data-public/2015/03/15/9b441a58-c98f-11e4-b2a1- bed1aaea2816_story.html "Legislators in many states have recently passed or tightened laws to shield teacher evaluations from public disclosure. Others — including Arkansas and Indiana — require schools or school districts to report on the average performance of teachers in such a way that individual teachers cannot be identified." "Only in a few states do parents have a right to more information. In Florida, a state appeals court ruled in 2013 that value-added model scores should be made public after the Florida Times-Union newspaper sued to obtain the data. New York requires school districts to give parents access to the overall ratings of their children’s teachers, and Michigan requires parents to be notified, starting in the 2015-2016 school year, if their children have a teacher rated ineffective for two years running." |
Post 39
Voice commands being recorded from smartphones:
http://www.reddit.com/r/technology/comments/2wzmmr/everything_youve_e ver_said_to_siricortana_has/ |
Post 40
"House Passes Cybersecurity Bill Despite Privacy Protests"
Despite significant privacy protests against the new Protecting Cyber Networks Act, a significant majority of the House of Representatives voted to pass the bill. People are calling it nothing more than a "backdoor" for general purpose surveillance. Obama has shown to be a stronger privacy advocate than his predecessors, so civil society groups are hopeful he will veto this bill and not do "a complete 180" on his prior commitment to privacy issues. Choice quote: - "'PCNA would significantly increase the National Security Agency’s (NSA’s) access to personal information, and authorize the federal government to use that information for a myriad of purposes unrelated to cybersecurity,' reads a letter signed earlier this week by 55 civil liberties groups and security experts that includes the American Civil Liberties Union, the Electronic Frontier Foundation, the Freedom of the Press Foundation, Human Rights Watch and many others." http://www.wired.com/2015/04/house-passes-cybersecurity-bill- despite-privacy-protests/ |
Post 41
http://blogs.wsj.com/personal-technology/2015/04/07/part-gopro-part-
dropcam-flirs-fx-camera-does-sports-and-surveillance/ Part GoPro, Part Dropcam: Flir’s FX Camera Does Sports, Surveillance A new camera can keep watch over your home or mount to your dashboard or snowboarding helmet to capture action footage. The FX isn’t actually continuously recording. Instead, the camera’s motion sensor tells the device to start recording whenever something in front of it moves, day or night. The app also lets you see a live stream of whatever’s happening in front of your camera in real time as well ^^Possibility of privacy infringement if the app becomes hackable |
Post 42
Facebook 'tracks all visitors, breaching EU law'
Exclusive: People without Facebook accounts, logged out users, and EU users who have explicitly opted out of tracking are all being tracked, report says http://www.theguardian.com/technology/2015/mar/31/facebook-tracks-all- visitors-breaching-eu-law-report Facebook tracks the web browsing of everyone who visits a page on its site even if the user does not have an account or has explicitly opted out of tracking in the EU, extensive research commissioned by the Belgian data protection agency has revealed.The researchers now claim that Facebook tracks computers of users without their consent, whether they are logged in to Facebook or not, and even if they are not registered users of the site or explicitly opt out in Europe. Facebook tracks users in order to target advertising. |
Post 43
Is Privacy Obsolete?
Thanks to the revolution in digital technology, privacy is about to go the way of the eight-track player. http://www.thenation.com/article/198505/privacy-20-surveillance-digital-age |
Post 44
AlienVault Announces More Social Threat Exchange
"AlienVault, a cybersecurity firm aimed at SMBs, announced the Beta of Open Threat Exchange (OTX) 2.0. The company bills it as a threat intelligence sharing platform, and the social component it has added in the latest version enables members to discuss security threats on a social network." http://techcrunch.com/2015/04/14/alienvault-announces-more-social-threat- exchange/ |
Post 45
Title: Facebook data privacy case to be heard before European Union court
Link: http://www.theguardian.com/technology/2015/mar/24/facebook-data- privacy-european-union-court-maximillian-schrems Law student in the EU has taken legal measures to prevent US intelligence agencies gaining access to his personal data through facebook. He was spurred by Snowden incident to take action. He has previously gone to the data regulator in the Irish Republic and had his claim turned down. However, the Judge sent the case to European court of justice, in Luxembourg where his case will be heard on Tuesday |
Post 46
RadioShack Auctions Off Millions of Customers’ Names and
Information, Despite Its Privacy Policy http://www.theblaze.com/stories/2015/03/25/radioshack-auctions- off-millions-of-customers-names-and-information-despite-its- privacy-policy/ |
Post 47
http://www.azcentral.com/story/opinion/editorial/2015/05/11/privacy-cant-
be-collateral-damage-in-war-on-terrorism/27149675/ A look at what we are sacrificing in terms of privacy in the War on Terror. The article was written mostly due to the renewed debate on the Patriot Act and whether Congress should change or get rid of the act that came into effect after 9/11. |
Post 48
http://www.reviewjournal.com/news/las-vegas/federal-judge-declares-fbi-
ruse-violated-gambler-s-privacy-rights Paul Rhua's house was raided by FBI agents posing as workers, seeking to gather evidence to press gambling charges. Is this really the win for the privacy rights of the American public that it is held up to be? A closer look at the difference between how the super-rich and the average American are treated with respect to this 'right' would be a more appropriate look at the gains and losses of American privacy. |
Post 49
"AT&T to Pay $25 Million to Settle FCC Privacy Breach Case"
ATT&T workers leaked confidential info about 280 thousand subscribers to allow re-sellers to unlock used phones. The FCC detailed that the privacy breach revealed: names, parts of SSNs and other data in Mexico, Colombia and the Philippines. AT&T paid $25 million to settle the claims. However, this privacy breach went undetected for months... Choice quotes: - "The market for unlock codes grew out of a unique wrinkle in the U.S. wireless industry, which for years relied on selling devices to subscribers at subsidized prices in exchange for a two-year contract." http://www.wsj.com/articles/at-t-to-pay-25-million-to-settle-fcc- privacy-breach-case-1428519807 |
Post 50
Has the NSA grown too big? It might be time to breakdown the NSA . The
NSA has proven time and again to prioritize intel over security. https://www.schneier.com/essays/archives/2014/02/its_time_to_break_up.ht ml |
Post 51
http://thenextweb.com/twitter/2015/04/18/twitter-updates-privacy-policy-for-non-
us-accounts-and-moves-jurisdiction-to-ireland/ In the wake of lawsuit, Twitter has updated its policy for accounts not registered in the United States. These non-US accounts would now be under the jurisdiction of Twitter's headquarters in Ireland with a new privacy policy and new terms of service. This move would allow twitter to abide by the more stringent privacy rules of the EU. This means that different twitter users will have different privacy settings depending on where in the world they are. |
Post 52
http://www.courier-
journal.com/story/news/local/indiana/2015/05/09/messer-pushing-student- data-privacy-protections/27030435/ In an unprecedented move of bilateral support, a republican congressman is working with the White House to create new laws about student online privacy. The bill essentially gives parents the ability to say whether their students' data is going to be shared or not shared. It would prohibit companies from creating student profiles or advertising to students based on the information collected from their online behavior. Companies could not sell data to a third party and would have to disclose the type of information being collected. Parents could ask for certain information to be deleted or corrected. |
Post 53
"Privacy Is The Real Disruptive Force In Digital Technology"
http://www.science20.com/the_conversation/privacy_is_the_real_disruptive_ force_in_digital_techology-153134 This article explains how technology advances, it is privacy that is being disrupted. But as people become aware of this, they care more about their privacy and start pushing back. |
Post 54
http://www.myfoxal.com/story/28123288/understanding-how-your-
fitness-tracker-uses-your-personal-data "Understanding how your fitness tracker uses your personal data" This article talks about how seemingly trivial data collected by fitness app, like Fitbit or Mapmyrun, can be used to identify you. It's a "privacy nightmare waiting to happen." Choice quotes: - "Simply by looking at the data can find out with pretty good accuracy what your gender is, whether you are tall or short, whether you are heavy or light. But what's really interesting is you can 100 percent be identified by your gait." - "Even more potentially dangerous than the activity trackers are fitness apps like 'mapmyrun,' which log your running routes, even showing how often you run them." CREEPY. |
Post 55
A bipartisan student privacy bill is expected to be introduced into the House.
The bill, called the Student Digital Privacy and Parental Rights Act, will seek to protect the privacy of K-12 graders. It was created in response to "the era of standardized testing, with education companies collecting a seemingly endless amount of information on public school students, some of it incredibly detailed." "If passed, the bill would ban companies from knowingly using student data to create targeted advertising or individual marketing profiles. The law would apply to third-party companies operating digital school services, like online homework portals, student email programs, or digital teaching aides." This POLITICO article, however argues that the bill does not go far enough: "The bill lets education technology companies continue to collect huge amounts of intimate information on students, compile it into profiles of their aptitudes and attitudes — and then mine that data for commercial gain. It permits the companies to sell personal information about students to colleges and employers, and potentially to military recruiters as well." Read more: http://www.politico.com/story/2015/03/privacy-bill-wouldnt- stop-data-mining-of-kids-116299.html#ixzz3VJT0tzWi, arvues Another interesting analysis which sides with POLITICO's argument can be found in the Washington Post: http://www.washingtonpost.com/blogs/answer-sheet/wp/2015/03/23/new- student-data-privacy-bill-in-congress-does-little-to-protect-privacy- analysis/ |
Post 56
http://co.chalkbeat.org/2015/04/17/house-education-still-has-a-ways-to-go-
on-data-privacy-bill/#.VTLnGq3BzGc The House Education Committee reconvened on Friday, the 17th, to discuss the prospects of a data privacy bill. The bill outlawed the act of mining/sharing student data by online education-based companies. The legislation also limited marketing prospects for these aforementioned companies. Lobbyists have pressured government officials that the bill does not discern between the bevy of technology companies in the field of education. This has stalled the progress of the bill. |
Post 57
China Is Said to Use Powerful New Weapon to Censor Internet
http://www.nytimes.com/2015/04/11/technology/china-is-said-to-use-powerful- new-weapon-to-censor-internet.html "The Great Cannon, the researchers said in a report published on Friday, allows China to intercept foreign web traffic as it flows to Chinese websites, inject malicious code and repurpose the traffic as Beijing sees fit." |
Post 58
http://www.npr.org/2015/04/17/400164221/boston-marathon-surveillance-
raises-privacy-concerns-long-after-bombing Boston police have come under fire once before for using face recognition software in cameras at music festivals in Boston. Now they plan to step up their privacy invading regime at the Boston marathon, putting in more cameras than ever before, and installing software that allows the cameras to position themselves towards the sounds of gunshots. This is of course understandable... but now they want to install the cameras on every street of Boston... |
Post 59
http://www.nbcnews.com/tech/tech-news/retail-tracking-company-violated-
privacy-policy-ftc-complaint-alleges-n349006 FTC has filed a complaint against Nomi Technology, a company that helps retail stores track customers using MAC addresses. Nomi promises to provide a platform for customers to opt out of tracking, yet they do not let people know they are being tracked. The FTC complained that consumers did not know about the tracking and there was no way to opt out in the store. They argue that when companies make privacy promises, they have to keep them. |
Post 60
http://www.npr.org/2015/04/17/400164221/boston-marathon-surveillance-
raises-privacy-concerns-long-after-bombing New surveillance cameras will be in place for the marathon, but some will be permanent, raising privacy concerns for the city of Boston. |
Post 61
http://www.pcworld.com/article/2887392/lenovo-hit-with-lawsuit-over-
superfish-snafu.html |
Post 62
http://www.reddit.com/r/technology/comments/31u84n/how_to_remove
_yourself_from_most_background_check/ Appropriate for what we've been discussing in class - how to remove yourself from those background check sites |
Post 63
Below is a link to Do Not Track, a docu-series on data privacy issues. It is
particularly interesting because the episodes are interactive and informative. I watched an episode and vouch for the intrigue. Directed by Brett Gaylor, coproduced by Upian, Arte, ONF & BR. https://donottrack-doc.com/en/ |
Post 64
Title: Court Hears Challenge to Safe Harbor Data Deal
Link: http://www.wsj.com/articles/court-hears-challenge-to-safe-harbor- data-deal-1427206554 Update on prior article regarding the court case of facebook vs. the law student in Ireland. It reiterates some of the concerns of the student and how the Safe Harbor agreement allows transfer of personal information from Europe to the U.S. along with some of its possible problems in society and in regards to data privacy |
Post 65
http://www.eweek.com/small-business/privacy-concerns-impact-internet-of-
things-technology.html Recent survey results about public perception of privacy. |
Post 66
http://www.washingtonpost.com/world/national-security/security-of-hillary-clintons-
private-e-mail-server-comes-under-scrutiny/2015/03/10/fcccfb78-c737-11e4-aa1a- 86135599fb0f_story.html Questions have arisen regarding the security of the private email server Hillary Clinton used as Secretary of State. Were the safeguards used for her personal system up to the level of government security and encryption? |
Post 67
http://chicagoist.com/2015/04/15/on_april_13_drone_owner.php
Public policy requires that police must obtain a warrant before using drones for law enforcement, however there are currently no laws regulating privately owned drones which are used below a certain ceiling. Concerns occur when drones land on private property, which can happen when a drone goes out of range of the controller, or runs out of fuel for example. It is not exactly clear how to deal with the privacy issues that result. Can the controller be sued for invading private property? Whose property is the drone as a result? |
Post 68
http://www.theguardian.com/technology/2015/apr/10/facebook-admits-it-
tracks-non-users-but-denies-claims-it-breaches-eu-privacy-law Facebook admits to tracking non-users but claims that this does not breach EU privacy laws. Regardless, how is this not highly immoral? |
Post 69
Google, Facebook and Microsoft on Data Privacy
http://www.esecurityplanet.com/network-security/google-facebook-and- microsoft-on-data-privacy.html Some of the largest tech giants like google, facebook, and microsoft have, for the most part, agreed that data privacy should be integrated at the beginning of product development process. This coincides with a lot of government and company regulations. |
Post 70
Ireland in top three EU countries for undermining data privacy:
http://www.irishtimes.com/business/technology/ireland-in-top-three-eu- countries-for-undermining-data-privacy-1.2133393 Thanks to some leaked Brussels documents, some of the top neglectors of data privacy rights have been revealed. Every since the EU has been working to update 1995 data privacy laws, some countries have gone out of their ways to water down legislation to weaken user privacy rights. Germany and UK were among other top offenders. |
Post 71
http://www.slate.com/articles/technology/future_tense/2015/03/doj_stingray
_federal_agencies_admit_to_using_invasive_phone_surveillance.html The FBI essentially has a tool that impersonates a cellphone tower which means they can get information from people's phones and potentially force phones in the surrounding area operated by the same service provider to drop calls. It's a problem not only because of privacy, but also because dropped calls can be particularly heinous when considering emergency calls from the hospital or family. |
Post 72
http://www.forbes.com/sites/sap/2015/04/15/data-security-breaches-ugly-
truths-exposed/ This article summarizes the data security breaches observed in the US last year. The study found that over 675 million records were breached, with a majority of cases focusing on the business sector. |
Post 73
Two debt brokers posted consumers' personal information. The FTC filed lawsuits
against these brokers; the judge ordered the brokers to take down the personal information. http://www.cbsnews.com/news/debt-brokers-settle-charges-they-exposed- consumer-data/ |
Post 74
APT28, a Russian hacking group, finds flaws in widely used computer
software, specifically Adobe Flash and Microsoft Window. The group manipulates these holes in the software to extract information on American governmental and military organizations. Investigations by FireEye, a security firm, displayed that these hackers might be extracting this information for the purpose of the Russian government. |
Post 75
"3D Robotics' New Drone Wants to Bring Moviemaking to the Sky"
http://www.popularmechanics.com/flight/drones/a15042/3d-robotics-solo- drone/ New drone promises to bring hollywood quality film to users, very autonomous |
Post 76
http://www.bbc.co.uk/newsbeat/32202607
Facebook will now create identities for children (though children cannot have their own accounts) for parents to tag pictures of them. Facebook says it will serve as a babybook, but that the kids will inherit the account when they are older. Realistically, now children could have an identity on facebook whether they want it or now. |
Post 77
http://metro.co.uk/2015/03/24/facebook-facing-privacy-lawsuit-over-what-
it-does-with-your-data-5118445/ Facebook is on trial in Europe for how they use (or abuse) users data. |
Post 78
House Passes Cybersecurity Bill Despite Privacy Protests
http://www.wired.com/2015/04/house-passes-cybersecurity-bill-despite- privacy-protests/ |
Post 79
The data protection watchdog in France has outlined plans to work with car
manufacturers and technology companies to ensure people's privacy is respected as 'connected cars' systems become more sophisticated. http://www.out-law.com/en/articles/2015/april/french-data-protection-authority-to- focus-attention-on-connected-cars-and-smart-cities/ |
Post 80
Google Expected to Face Antitrust Charges
Case would be EU’s biggest competition battle since pursuit of Microsoft a decade ago http://www.wsj.com/articles/eu-to-file-antitrust-charges-against-google- 1429039881?mod=e2fb |
Post 81
Flashback to Anthem in light of our recent SSN discussion. Is this the end of SSNs as
authentication? http://www.mercurynews.com/opinion/ci_27620896/anthem-breach- get-set-medical-identity-fraud?source=infinite |
Post 82
http://www.wsj.com/articles/how-much-do-you-know-about-data-privacy-
1429499471 According to this article in the Wall Street Journal, "91% of Americans feel they’ve lost control over their personal data". The article goes into detail about what data consumers feel most strongly about having leaked (this appropriately deals with how often a cell phone is being tracked, encryption, etc). It also goes into what consumers think they know about their privacy and laws protecting it. |
Post 83
"'Tech Can Be a Champion of Privacy,' Edward Snowden Tells Tech
Leaders at SXSW" Edward Snowden had a message for some two dozen technology leaders at the SXSW Interactive festival today: “Tech can be a champion of privacy.” In an hour-long meeting conducted through Google Hangout, the whistleblower and tech leaders discussed the role of the tech community in curtailing mass surveillance and protecting the Internet from forces seeking to weaken it. https://www.aclu.org/blog/national-security/tech-can-be-champion- privacy-edward-snowden-tells-tech-leaders-sxsw |
Post 84
How Much Do You Know About Data Privacy? Test Yourself
http://www.wsj.com/articles/how-much-do-you-know-about-data-privacy- 1429499471 This is a very interesting test that was administered, trying to see how much people know about data privacy. The questions ranged from individual's privacy in regards to health care, shopping habits, and cell phone conversations. Many people listed a lot of information as very sensitive. The results were very interesting, and I would encourage you all to take a look. |
Post 85
http://phys.org/news/2015-03-amazon-late-drone.html
Amazon has moved drone testing to Canada in light of highly stringent FAA regulations on drone testing, specifically the requirement to have a pilot in line-of- sight of the drone at all times |
Post 86
http://www.wsj.com/articles/at-t-to-pay-25-million-to-settle-fcc-privacy-
breach-case-1428519807 At&t was fined 25 million because names, parts of Social Security numbers and other data were provided to resellers so they could unlock used phones. |
Post 87
Facebook, Google, Microsoft ask Congress to pass privacy rights for
Europeans http://thehill.com/policy/technology/240269-facebook-google-microsoft- ask-congress-to-pass-privacy-rights-for-europeans |
Post 88
http://www.wsj.com/articles/at-t-to-pay-25-million-to-settle-fcc-privacy-
breach-case-1428519807 At&t was fined 25 million because names, parts of Social Security numbers and other data were provided to resellers so they could unlock used phones. |
Post 89
"Pentagon Seeking Ways to Protect Personal Data Online" (from USA Today)
The U.S. Government is balancing two competing priorities: the first is to make private personal data accessible to companies and government agencies in order to increase efficiency and responsiveness, and the second is to preserve individual privacy. The Pentagon has proposed a new program under the Defense Advanced Research Projects Agency (DARPA), called "Brandeis," that is intended to protect personal data and shift "the mechanisms for data protection to the data owner rather than the data user." http://www.usatoday.com/story/nation/2015/03/16/data-privacy-darpa- brandeis/70222556/ |
Post 90
Data Security and Breach Notification Act of 2015 -- The article explores
the idea that the new act is in fact less effective and less strict. http://www.philly.com/philly/business/20150416_Jeff_Gelles__Is_Congre ss_taking_wrong_direction_on_data_privacy_.html |
Post 91
http://bits.blogs.nytimes.com/2014/12/02/protecting-data-privacy-at-school-and-
at-play/?_r=0 Interesting problem—how to keep minors/children safe on sites/apps where they may not understand the ramifications of what they post? Many sites have age limits but fail to enforce them. My siblings have instagram, but are too young to understand any terms of use that they may enter into or the danger of accepting follows from people you don't know well. |
Post 92
Our View: The thin line between safety and privacy
http://www.newsherald.com/opinions/editorials/our-view-the-thin-line-between- safety-and-privacy-1.464245 |
Post 93
http://money.cnn.com/2015/03/17/technology/security/premera-hack/index.html
This article is a good illustration of how much more vulnerable personal data will be to hackers as we continue to increase the use of electronic medical records. Not only does this call into question the earlier debate we had in class regarding the extent to which Social Security numbers are used to identify people, but also how much regulation the government should have regarding the safety of people's information in private computer systems. |
Post 94
Great follow-up article on the Pearson social media spying scandal from Forbes.
http://www.forbes.com/sites/maureensullivan/2015/03/18/when-does-parcc-test- security-turn-into-spying-on-kids/ |
Post 95
RadioShack Sale Sparks Data Privacy Concerns
Could selling consumer information become a trend for cash-strapped businesses? http://www.usnews.com/news/articles/2015/03/27/radioshack-sale-sparks-data- privacy-concerns |
Post 96
"‘Open Humans’ platform wants to democratize your DNA for better medical
research" Since secrecy slows down medical research, the site "Open Humans" is attempting to allow universal access to non-de-identified health data that contains names and contact information. This presents potential problems with privacy since there is no attempt made to hide the identity of the site's users and any user will have access to everyone else's personal information. "In order to sign up, participants must pass a test showing they understand the risks of sharing private health information. If hacked, the leaked information could affect a person’s access to life insurance, or long-term care coverage." http://fortune.com/2015/03/24/open-humans-platform-dna/ |
Post 97
http://www.nytimes.com/2015/04/17/business/international/china-suspends-rules-
on-tech-companies-serving-banks.html? hp&action=click&pgtype=Homepage&module=first-column-region®ion=top- news&WT.nav=top-news A policy that would effectively push foreign technology companies out of China’s banking sector has been suspended, according to a note sent by Chinese regulators to banks across the country. Dated Monday, the letter called for banks to “suspend implementation” of the rules, which have been at the center of a brewing trade conflict between the United States and China. Put into effect at the end of last year, the rules called for companies that sell computer equipment to Chinese banks to turn over intellectual property and submit source code, amid other demands. At stake is billions of dollars’ worth of business for major American companies that make the advanced computing hardware and software that crunches numbers for banks across China. Trade groups representing companies like Microsoft, IBM and Apple have complained that such policies are protectionist. The recent trade debate is just one part of a wider clash between China and the United States over online security and technology policy. |
Post 98
http://www.defenseone.com/technology/2015/03/nsa-spying-continues-another-
rubber-stamp/106365/ |
Post 99
In this article, called "the quantified baby" the author considers the meaning of
parenting and pregnancy given the ability to track everything constantly in groups online that post and evaluate each other's pregnancy to devices that monitor her child's behavior and sleep patterns for her. She says: "I wonder whether the relationship between the caregiver and baby suffers with all of this data management in between. A computer keeps what’s entered accurately; there are no cloudy memories about nap times or ounces of milk in bottles. There is less conversation between me and my son’s caregivers at the end of the day, too. But the integrity of my relationship with him feels somehow degraded by the constantly measuring eye. That observation changes the observed isn’t new, but I hadn’t considered it in the context of watching my son. Do I want, at the end of the day, to stare at data, or to hear an imperfect but narrative human account of his day? Always there are options." Link: http://www.theatlantic.com/health/archive/2015/04/the-quantified- baby/389009/ |
Post 100
UN to appoint watchdog to focus on privacy in digital age
The Human Rights Council of the United Nations has voted in favor of a resolution backed by Germany and Brazil to appoint an independent watchdog or 'special rapporteur' to monitor privacy rights in the digital age. http://www.computerworld.com/article/2902925/un-to-appoint-watchdog- to-focus-on-privacy-in-digital-age.html |
Post 101
The U.S. National Telecommunications and Information Administration plans to host a
series of meetings with interested people aimed at developing best practices for protecting privacy in the burgeoning aerial drone industry. http://www.pcworld.com/article/2893056/ntia-to-push-for-drone-privacy- standards.html |
Post 102
For the first time the internet of things has been used in the case of a hacking attack
that compromised and sent out spam to 750000 emails. This is a problem of malware absence: "many of these internet-connected devices don't have malware protection. And it's now been documented that someone is taking advantage. Security company Proofpoint has discovered a botnet attack -- that is, a cyber attack whereby the attacker hijacks devices remotely to send spam -- incorporating over 100,000 devices between 23 December and 6 January, including routers, multimedia centres, televisions and at least one refrigerator." Link: http://www.cnet.com/news/fridge-caught-sending-spam-emails-in-botnet- attack/ |
Post 103
http://www.forbes.com/sites/thomasbrewster/2015/04/13/alleged-nazi-android-fbi-
ransomware-mastermind-arrested-in-russia/ One of the leaders of a ring of hackers was recently caught in Russia. The hackers used ransomware to hack Android devices, and the software would either open other pages in banking apps on the phone to get the user to enter credit card credentials, or hack the apps themselves to get banking numbers. Ransomware is also capable of locking the device until the user sends the hacker a ransom, and these hackers hacked US officials' phones and pretended to lock them on the grounds that the phones had broken a law and been used to access pornography. |
Post 104
http://www.foxnews.com/opinion/2015/03/28/germanwings-disaster-time-
to-stop-protecting-medical-privacy-pilots-others-who/ Does the Germanwings disaster set a precedent that their should be more transparency between employee medical records and employers? |
Post 105
States Consider Awarding Lottery Winners Something Else: Anonymity
http://www.nytimes.com/2015/03/26/us/states-consider-awarding-lottery-winners- something-else-anonymity.html?ref=topics |
Post 106
"Connected cars perfect for harvesting personal data, report warns
Cars generate data extremely valuable to insurers, governments, law enforcement agencies, companies" http://www.cbc.ca/news/technology/connected-cars-perfect-for-harvesting- personal-data-report-warns-1.3008956 "'In the frenzy to take advantage of this new technology … automakers and their corporate partners appear to have ignored Canadian data protection laws.'" |
Post 107
http://www.usnews.com/news/articles/2015/03/23/privacy-bill-may-fail-student-
data-protection A new bill on the house floor seeking to protect student data for K-12 students using online educational services has come under fire for leaving several large gaps in protection that would allow companies to exploit this data. The lack of any sort of clause to indicate parental consent for use of data is among the largest criticisms. |
Post 108
http://money.cnn.com/2015/02/10/technology/samsung-eavesdropping-tv/
Samsung on their new television: "Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition," Samsung had posted in its privacy statement for its SmartTVs |
Post 109
Similar to post 58, AT&T now offers to not mine your internet data for an extra fee.
https://gigaom.com/2015/02/17/att-charges-29-for-privacy-time-for-others-to-do- the-same/ |
Post 110
Bloomberg Is Giving $42 Million To U.S. Cities To Solve Problems In
Smartest Ways Possible Interesting initiative regarding the expansion of open data: "Bloomberg Philanthropies announced the launch of a $42 million initiative on Monday that will help 100 mid-sized U.S. cities better utilize data to serve their communities. The What Works Cities program partners with a handful of supportive organizations -- such as Results for America and the Sunlight Foundation -- to help local governments manage and analyze data to serve residents. The initiative -- which is now accepting applications from cities with populations between 100,000 and 1 million -- will create open data programs that boost government transparency, help cities incorporate data into policy decision-making and fund efforts that best deliver positive results for citizens, among other functions, according to a press release from Bloomberg Philanthropies." http://www.huffingtonpost.com/2015/04/20/michael-bloomberg-what- works-cities_n_7100414.html |
Post 111
http://theconcourse.deadspin.com/whiny-harvard-student-gets-skewered-
in-devastating-emai-1688980749/+Tom_Ley Harvard email posted with redacted information, but commenters are able to figure out the subject by finding his Twitter account. |
Post 112
Jeff Gelles: Is Congress taking wrong direction on data privacy?
This is an opinion article addressing the current legislative bills on data handling. The main point being: '"Moy says Congress is wrong to see data breaches as only a financial threat. At the heart of the FCC's authority is protecting phone and cable networks "as a safe space for free speech and communications." Why backtrack at all on that?"' http://www.philly.com/philly/business/20150416_Jeff_Gelles__Is_Congress_ taking_wrong_direction_on_data_privacy_.html#Dhzo5EDoVB2FepDF.99 |
Post 113
RadioShack Sale Sparks Data Privacy Concerns
http://www.usnews.com/news/articles/2015/03/27/radioshack-sale-sparks- data-privacy-concerns With RadioShack entering bankruptcy, there has been a lot of talk of selling consumer data to help finance the bankruptcy. This includes more than 13 million email addresses and 65 million customer names. |
Post 114
Snowden talks surveillance, privacy with Swedish lawyers in Moscow
http://rt.com/news/244865-snowden-swedish-lawyers-meeting/ |
Post 115
"Europe’s Digital Czar Slams Google, Facebook Over Selling
Personal Data" An article about the how big US tech companies exploit legal loopholes in Europe "to vacuum up and sell individuals’ personal data." Choice quotes: - "Data privacy plays a much bigger role in the public debate in Europe than it does in the U.S., partly due to the legacy of totalitarian regimes in Germany and other European countries during the last century. Those concerns were aggravated by last year’s revelations of widespread Internet surveillance of Europeans by U.S. security services." - “If you use an iPhone, they know all about your creditworthiness, your shopping habits,” he [Günther Oettinger] said. “Take car insurance. They know the last time you were involved in an accident.” http://www.wsj.com/articles/europes-digital-czar-slams-google- facebook-over-selling-personal-data-1424789664 |
Post 116
http://www.eweek.com/cloud/judge-refuses-to-dismiss-google-wallet-data-privacy-
lawsuit.html Judge letting court case against Google Wallet go to trial. This will bring Google practices under scrutiny in a small move in the direction of consumer privacy. |
Post 117
http://www.forbes.com/sites/parmyolson/2014/07/07/why-google-waze-helps-
local-governments-track-its-users/ http://bostinno.streetwise.co/2015/03/06/boston-traffic-apps-data-from-waze- partnership-with-city-of-boston/ The first article is from last summer, but is a relevant introduction to the second article. The first article explains how cities (such as Rio) are using data from Waze (a popular GPS/navigation app on mobile devices) to determine solutions to traffic problems, as well as quantifiably measure the data that traffic generates. The second article is about Boston's recent agreement with Waze to gather the data from the app to see correlations between snowfall and traffic, and other hazards and traffic (ex. Does enforcing the no-double parking laws lead to less traffic on Comm Ave?). The problems about data privacy arrive when the city is able to see the driving history for each user of the app. In some instances, they can see up to three months of driving history for each user, although Waze claims that the names of the users are separated from the data, and that the data is under the names of aliases. |
Post 118
Snuggies! The FTC! Deceptive practices, oh my!
http://www.theatlantic.com/business/archive/2015/03/snuggie-maker-pays-8- million-for-deceiving-customers-ftc/387139/ |
Post 119
"Pakistan’s mobile phone owners told: be fingerprinted or lose your sim
card.......In one of world’s largest efforts to collect biometric information, Pakistan has ordered mobile phone users to verify their identities through fingerprints for a national database being compiled to curb terrorism. If they don’t, their service will be shut off, an unthinkable option for many after a dozen years of explosive growth in mobile phone usage." http://www.theguardian.com/world/2015/mar/03/pakistan-fingerprint- mobile-phone-users |
Post 120
http://www.wsj.com/articles/debate-deepens-over-response-to-
cyberattacks-1423434725? mod=WSJ_hpp_MIDDLENexttoWhatsNewsThird This article discusses conversations in Washington, both in the White House and on Capitol Hill, as to how the United States should respond to increasing numbers of cyberattacks. President Obama will be meeting with leaders in business later this week to encourage them to work more closely with the federal government to improve their defenses from these attacks. Elsewhere in the government, Secretary of Defense nominee Ash Carter has voiced his support for a more aggressive offense by the U.S. in response to recent attacks, including those on Sony Pictures late last year. Others have warned against escalation, citing risks of increasing conflict over time. Lawmakers on the Hill have also voiced various viewpoints, though none have pushed for aggressive retaliation from the U.S. through legislative action. One Congressman, Rep. Mike McCaul, is working on a bill that would encourage businesses to provide information and work closely with the federal government to breaches. |
Post 121
A recent decision by Bell Canada to abide by the federal privacy commissioner’s
recommendation that Bell only track customers who explicitly opt into their advertising program is an about face with what the company originally wanted to do. Bell revealed the Relevant Advertising Program (RAP) in August 2013 and it included location and demographic information, specific websites visited, apps on mobile devices and service usage. http://www.thestar.com/news/world/2015/04/08/canada-way-behind-in-data- privacy-rules.html |
Post 122
http://www.telegraph.co.uk/technology/apple/11441265/Terrorists-should-
be-eliminated-says-Apples-Tim-Cook.html Tim Cook tells us that there is a human right to privacy and that consumers don't realize the extent to which their data is misused. He also makes a claim that all apple products are private and secure. |
Post 123
http://www.huffingtonpost.com/2015/04/13/improve-internet-
privacy_n_6902622.html Some quick and easy tips to help you preserve your privacy! |
Post 124
The NSA spying revelations appear to be scaring away foreign Governments
from US tech companies. China has removed several companies from their approved list including "Cisco, Apple, Intel, and McAfee". http://www.zdnet.com/article/another-reason-to-hate-the-nsa-china-is- backing-away-from-us-tech-brands/ |
Post 125
http://www.slate.com/articles/technology/bitwise/2015/04/twitter_earnings_
and_acquisitions_the_company_s_in_trouble_and_its_options.html In order to raise revenues, Twitter is turning to a new revenue stream - its customers. As new members dwindle away and the facebook model of revenue not working, Twitter has begun to look at customers as content producers. This way of thinking not only changes the way Twitter plans to make money and expand its user base, but also changes the role of the people who use twitter. This model likens users to unpaid employees. This is likely to change how Twitter interacts with its users and importantly how this affects their data. |
Post 126
The proposed Student Digital Privacy and Parental Rights Act is being
criticized for not actually protect students' privacy. http://www.washingtonpost.com/blogs/answer-sheet/wp/2015/03/23/new- student-data-privacy-bill-in-congress-does-little-to-protect-privacy- analysis/ |
Post 127
New tools allow lawyers to gain insights about court cases and their legal work from
big data, just as big companies can gain insights about customers from data as well (i.e. Target predicting pregnancy). Here's the idea: "The idea of Ravel Law is to use a combination of data visualization, natural language processing, and machine learning to make the law significantly easier to understand for lawyers, improving the quality of legal research while also making it more efficient. The team came out of Stanford’s CodeX program, which is an interdisciplinary center of computer science, law, and design." Link: http://techcrunch.com/2015/04/16/who-judges-the-judges/ |
Post 128
Kaspersky releases decryption tool that unlocks ransomware
"The NHTCU shared this information with Kaspersky which used it to build the Noransomware decryption tool. Granted, the program isn't 100 percent effective yet -- it's not like the NHTCU got all of the potential keys off of that one server or anything -- but as police forces around the world continue to investigate the CoinVault ransom campaign, Kaspersky expects to grow the key database and further improve the tool's functionality." http://www.engadget.com/2015/04/14/kaspersky-releases-decryption-tool- that-unlocks-ransomware/?ncid=rss_truncated |
Post 129
http://www.cbc.ca/news/business/ajusto-app-that-watches-your-driving-habits-
leads-to-privacy-concerns-1.3019787 |
Post 130
http://www.washingtonpost.com/cars/tesla-to-introduce-auto-
steering-soonnot-autonomous-driving/2015/03/24/2869d89c-d24f- 11e4-8b1e-274d670aa9c9_story.html Tesla not looking to introduce fully automatic cars for a while, according to Washington Post |
Post 131
"Protecting Personal Data in Argentina is a Work in Progress"
Though the US is a leader in data-processing, its legislation regarding the protection of personal data is inadequate. This is because the evolution of tech has outpaced the legal frameworks intended to govern their use. In fact, surprisingly, Argentina's legislation, National Directorate for Personal Data Protection and the Law of Personal Data, is one of the most advanced. Choice quote: - However, "the Argentinean experience is no different from other countries in the region, who despite having laws protecting the personal data of individuals and corporations still have a long way to go." https://globalvoicesonline.org/2015/04/21/protecting-personal- data-in-argentina-is-a-work-in-progress/ |
Post 132
http://www.wired.com/2015/04/ny-cops-used-stingray-spy-tool-46-times-
without-warrant/ NY Cops Used ‘Stingray’ Spy Tool 46 Times Without Warrant |
Post 133
The state House of Representatives on Thursday approved a bill that will limit the
student data that technology companies will be allowed to collect, use or sell for commercial purposes. http://www.denverpost.com/news/ci_27977134/student-data-privacy-bill-one- step-away-from |
Post 134
http://www.nbcnews.com/meet-the-press/lindsey-graham-ive-never-sent-email-
n319571 Lindsey Graham made public that he has never sent an email before. He has a phone, from which he sends texts and makes calls, but he personally has never sent an email before. In this day and age, that sounds preposterous, but members of his staff confirm that he has an official email account that is monitored by his staff, but he doesn't have a personal email that he checks and maintains. |
Post 135
Obama signs order creating new cyber sanctions program
President Barack Obama on Wednesday created the first-ever sanctions program to penalize overseas hackers who engage in cyber spying and companies that knowingly benefit from the fruits of that espionage http://www.foxnews.com/politics/2015/04/01/obama-signs-order-creating- new-cyber-sanctions-regime/ |
Post 136
This is a couple weeks old but I thought it offered a really interesting look into the
factors that affect legislation on privacy and the Internet. Special interests pose a huge threat. http://www.thedailybeast.com/articles/2015/03/09/the-campaign-cash-that-can- kill-the-open-internet.html |
Post 137
State Dept. will review Clinton emails for possible release
http://www.washingtonpost.com/politics/private-email-questions-emerge-as-clinton- nears-2016-bid/2015/03/05/c7e23fc2-c2ff-11e4-a188-8e4971d37a8d_story.html |
Post 138
Extra-footage from John Oliver's Interview with Edward Snowden
stresses the importance of the use of passphrases instead of passwords. While humans find it challenging to remember a random 8 character string, like "8l4Gh!r#", a computer can test all 8- character combinations for a password in just seconds, according to Snowden. Nonetheless, humans can easily remember a phrase like "FIFAsoccerworldcupFrance98", which references the location of the 1998 FIFA worlds cup. A password like this would be virtually impossible to crack using brute-force algorithms. http://time.com/3815620/edward-snowden-password-john-oliver/ |
Post 139
Privacy commissioner investigated Optus over data-handling practices
Company accepted an enforceable undertaking over its privacy processes from Timothy Pilgrim, the first time the commissioner has used these powers http://www.theguardian.com/business/2015/mar/27/privacy-commissioner- investigated-optus-over-data-handling-practices |
Post 140
http://www.theverge.com/2015/5/1/8530737/787-dreamliner-software-bug-faa |
Post 141
http://www.nytimes.com/roomfordebate/2015/03/02/23andme-and-the-promise-
of-anonymous-genetic-testing-10?hp&action=click&pgtype=Homepage&module=c- column-top-span-region®ion=c-column-top-span-region&WT.nav=c-column- top-span-region NYT Debate on 23andMe and anonymous genetic testing. Authors debate how private the data can actually be, and whether potential privacy vulnerabilities would outweigh the research benefits of having that data in the first place. |
Post 142
"New Facebook Policy Allows Social Media Immortality"
Today, Facebook announced a new policy allowing a previously designated "executor" or "legacy contact" to manage an account once a user has died. Up until now, Facebook only allowed an account to be "memorialized," meaning it could still be viewed, but not edited or managed. The policy attempts to preserve individual online privacy - even after death - while also allowing the loved ones' of the deceased to manage the posthumous profile. Read more here: http://www.usatoday.com/story/tech/2015/02/12/facebook-policy- change-allows-one-final-post-after-death/23184757/?ncid=newsltushpmg00000003 |
Post 143
http://www.multichannel.com/att-pay-25m-settle-fcc-data-privacy-
probe/389562 Calling it the largest data-privacy and security-enforcement action ever, the Federal Communications Commission's Enforcement Bureau on Wednesday said AT&T had agreed to pay $25 million in civil penalties, among other steps, to settle the its investigation into customer-information breaches in call centers located in Mexico, Colombia and the Philippines. - See more at: http://www.multichannel.com/att-pay-25m-settle-fcc-data-privacy- probe/389562#sthash.MxVdwzb7.dpuf |
Post 144
"Do Anonymous Apps Enable Cyberbullying?"
http://www.adweek.com/news/technology/do-anonymous-apps-enable- cyberbullying-160145 "Could controversies over bullying scare off investors and advertisers? Unfortunately, unless there is a long and sustained public outcry, I think investors and advertisers will participate in anonymous apps if they think it is financially advantageous." |
Post 145
http://www.sciencedaily.com/releases/2015/04/150413102314.htm
Researchers are finding that the very same algorithms used to drive social networks can be used to find organized crime rings. By seeing how connected partners are within the network, researchers are able to find the most connected partners and thereby detect the leaders of the gang. |
Post 146
http://www.fastcompany.com/3045337/postal-service-surveillance-privacy-
snail-mail A throwback to the fact that the government is still allowed to check all of our mail. |
Post 147
EU privacy watchdog seeks to future-proof data protection reform package:
http://www.out-law.com/en/articles/2015/march/eu-privacy-watchdog- seeks-to-future-proof-data-protection-reform-package/ In the EU, they are passing “future-proof” new data protection laws that are purposely very vaguely worded to protect against major technological advances. Essentially they are going to try to make the wording of new rules such that new technology will not make the rules "ineffective or obsolete." |
Post 148
http://www.cbc.ca/news/canada/nova-scotia/quebec-resident-alain-philippon-to-
fight-charge-for-not-giving-up-phone-password-at-airport-1.2982236 http://www.theregister.co.uk/2015/03/05/canadian_arrested_for_refusing_to_hand_ov er_phone_password?mt=1425797297911 Above are two articles about a Canadian man who refused to give up his phone password to unlock his device while being searched by airport customs at the Canada Border Services Agency. The consequences of his refusal can be huge, with up to $25,000 dollars and one year in jail as a fine. According to the article: "This is a question that has not been litigated in Canada, whether they can actually demand you to hand over your password to allow them to unlock the device," he said. " [It's] one thing for them to inspect it, another thing for them to compel you to help them." Personally, I find this to be a huge breach of privacy and a violation of human dignity. Just as a government would not – or I hope not, at least – demand to investigate through some psychological method the contents of a person’s mind/memory in a routine customs search, so to should they not access the contents of a phone by force. A phone, in my opinion, is not a “good” to be reviewed, but a kind of extension of man himself, and should be respected as such. |
Post 149
Massive AT&T Consumer Privacy Violation Results in $25 Million FCC Penalty
https://epic.org/2015/04/massive-att-consumer-privacy-v.html |
Post 150
Interesting quiz about knowledge on personal data: Anxiety about data
privacy has reached a fever pitch. According to the Pew Research Center, 91% of Americans feel they’ve lost control over their personal data. http://www.wsj.com/articles/how-much-do-you-know-about-data-privacy- 1429499471 |
Post 151
http://www.wantchinatimes.com/news-subclass-cnt.aspx?
id=20150423000110&cid=1103 Millions have their data leaked in China As many as 52.79 million people may have had their information leaked from social security units, others from domicile registration units, disease control departments and hospitals. The information included people's ID numbers, financial status, income numbers and housing data. The cities involved included Chongqing, Shanghai, Shanxi, Shenyang, Guizhou, and Henan. These cities are reportedly the most seriously affected by the information leak. |
Post 152
Link here:
http://www.computerworld.com/article/2913872/cyberwarfare/house-okays- cyberthreat-sharing-bill-despite-privacy-concerns.html |
Post 153
"Americans need a champion for privacy rights"
This article criticizes the lack of discussion and debate surrounding privacy in the 2016 presidential debate. It's a "testament to the staying power of the US security state." No one is taking a strong stance against the pervasive assault on privacy and civil liberties. Clinton, who recently announced her presidential bid, has not expressed anything meaningful and given only "half-baked answers." Choice quote: - "An invasive NSA surveillance program will expire in June; 2016 hopefuls should see that it stays dead" http://america.aljazeera.com/opinions/2015/4/americans-need-a- champion-for-privacy-rights.html |
Post 154
A Wall Street Journal quiz examining the public's knowledge of data privacy:
http://www.wsj.com/articles/how-much-do-you-know-about-data-privacy- 1429499471 |
Post 155
AT&T and more than 20 states are opposing the potential sale by RadioShack of 13
million email addresses and 65 million customer names and addresses as part of its bankruptcy proceedings, fearing such a move could set a dangerous precedent for privacy and proprietary rights in the Internet age. http://www.usnews.com/news/articles/2015/03/27/radioshack-sale-sparks-data- privacy-concerns |
Post 156
ISIS has released a list of US military members that it has a vendetta against
in the Bay Area that it located in various places online. This has raised online privacy concerns for a lot of people. http://www.wtsp.com/story/news/2015/03/23/isis-hit-list-raises-online- privacy-concerns/70337476/ |
Post 157
https://www.google.com/patents/US20090006206
A PATENT placed on a way for leveraging personal information published on social networking sites leverage gleaned psychographic profile information to produce revenues for both social networking sites and content producers. |
Post 158
"Leaked Data From 30,000 Swiss Bank Accounts Reveals Mass Tax Avoidance"
"The leaked files, which you can explore online, reveal the use of Swiss bank accounts by actors, footballers,politicians, business owners and more to avoid paying tax to the relevant authorities. The Guardian, which has helped leak the documents along with Le Monde, BBC Panorama and the International Consortium of Investigative Journalists, writes that the "Swiss operation actively abetted clients in keeping accounts secret from tax authorities, at its height hiding $120bn in assets." Full Article: http://gizmodo.com/leaked-data-from-30-000-swiss-bank-accounts- reveal-mass-1684629495? utm_campaign=socialflow_gizmodo_facebook&utm_source=gizmodo_facebook&utm_ medium=socialflow |
Post 159
http://thehill.com/blogs/congress-blog/education/240026-balancing-student-
privacy-with-the-benefits-of-ed-tech Many suggest that increasing access to and use of technology in the classroom is a surefire way to improve the quality of education in our country, but many have raised concerns about the privacy of students' information as technology use becomes more and more prevalent. Protecting student privacy is extremely important, so the question is raised of how much data needs to be shared for technology interventions to be effective and efficient. |
Post 160
http://www.cbsnews.com/news/new-live-streaming-app-meerkat-prompts-
big-privacy-concerns/ New app allows individuals to live stream their surroundings using their phone. CBS suggests that this may be concerning, as individuals who are unwillingly caught on camera may have concerns that their privacy is violated. Such individuals are allowed to contact the website and request that the footage be removed, but how far would a start-up go to remove concerning footage for individuals, and how much damage could be done before individuals manage to remove such concerning footage? |
Post 161
http://louisville.edu/faculty/srmyer01/about/SRM_CV122008.doc/at_downloa
d/file http://www.coachina.org/2013/faculty_en/photo/cv/EN_faculty_46622_cv.do c https://www.google.com/url? sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEwQFjAH&url=http%3A %2F%2Fwww.bioethics.uniongraduatecollege.edu%2Fuploads%2Fcv_4831 4e85_cv%2520%25282%2529.doc&ei=jMLTVO3UHarksATxx4GgCA&usg=A FQjCNHKNqFwi5r_412M6wfPWisjlHJu6Q https://gigijordan.files.wordpress.com/2011/06/ann-maurine-packard.pdf http://behavioraltech.org/training/trainerinfo/cv_cfoetsch0299.pdf http://www.electionstudies.org/conferences/2006Duke/cvs/Cohen_cv.pdf http://www.fundacionkonex.org/ckfinder/userfiles/files/CV%20Osvaldo%20 Civitarese%20%28english%29.pdf http://kimmel.socialpsychology.org/cv/CV-Current-2.doc http://www.sbbh.net/wp-content/uploads/2013/11/CURRICULUM-VITAE- eli.pdf http://www.dri.edu/images/stories/divisions/das/dasfaculty/Fink_webcv_Ma y2012.pdf http://www.thebrainproject.org/advisoryBoard/Michael_Levine/CV.pdf http://cdn1.proz.com/profile_resources/1868879_r52d41de94edf1.pdf http://www.erf.org.eg/CMS/uploads/pdf/1194806906_John_Page_CV_07.pd f http://bcdr.inegi.up.pt/cv/miguel_angel_cv.pdf http://www.thechildandfamily.com/download/cirriculum_vitae.pdf http://www.circare.org/dw/schulz_ex1.pdf http://www.iclklamberg.com/files/CV-English.pdf |
Post 162
http://www.theverge.com/2015/4/28/8511993/ipad-issue-grounds-american-
airlines-737s |
Post 163
Hackable medical devices - not such a far-off threat:
http://news.sciencemag.org/health/2015/02/could-wireless-pacemaker-let- hackers-take-control-your-heart |
Post 164
Iran Is Raising Sophistication and Frequency of Cyberattacks, Study Says
Now a new study of Iran’s cyberactivities, to be released by Norse, a cybersecurity firm, and the American Enterprise Institute, concludes that Iran has greatly increased the frequency and skill of its cyberattacks, even while negotiating with world powers over limits on its nuclear capabilities. The report says that if sanctions against Iran are suspended under the proposed nuclear accord, Iran may be able to devote the revenue from improved oil exports to cyberweapons. But it is far from clear that that is what Iran would do. http://www.nytimes.com/2015/04/16/world/middleeast/iran-is-raising- sophistication-and-frequency-of-cyberattacks-study-says.html |
Post 165
http://www.theverge.com/2015/5/7/8564795/facebook-online-opinion-filter-
bubble-news-feed-study |
Post 166
Interesting take on privacy vs. data and view on security confidence
http://www.druva.com/blog/security-worry-data-privacy/ |
Post 167
http://washington.cbslocal.com/2015/04/06/snowden-to-oliver-nsa-has-the-
greatest-surveillance-capabilities-weve-ever-seen-in-history/ John Oliver tried to make sure the public gets on board with reformations to the Patriot Act |
Post 168
The Russian federal agency that oversees communications in Russia, known as the
Roskomnadzor, updated its "personal data" laws to prohibit image/meme or parody account of a personality. This is in many ways a response to the widespread use of Putin's likeness in internet memes. https://ca.news.yahoo.com/blogs/daily-buzz/memes-in-russia-are-now-illegal- 173222056.html |
Post 169
http://www.theguardian.com/technology/2015/feb/18/the-right-be-forgotten-
google-search Google adheres to "right to be forgotten" only when mandatory, as in Europe. |
Post 170
Internet Privacy Is The Wrong Conversation
http://techcrunch.com/2015/04/26/internet-privacy-is-the-wrong- conversation/ |
Post 171
Airmail via Drones Is Vexing for Prisons
http://www.nytimes.com/2015/04/23/us/drones-smuggle-contraband-over-prison- walls.html?ref=technology&_r=0 "During the graveyard shift at 1:44 a.m., security cameras at the prison here picked up the blinking lights of an unidentified flying object approaching the facility’s fence." "It is the high-tech version of smuggling a file into a prison in a birthday cake, and it underscores the headache that drones are now creating for law enforcement and national security officials, who acknowledge that they have few, if any, ways of stopping them." |
Post 172
http://thehill.com/blogs/congress-blog/technology/234593-the-
auto-industry-is-serious-about-connected-car-privacy "Late last year, major automakers [in the U.S.] voluntarily agreed to a set of privacy and data security principles that will regulate how automakers collect, use, and share information. These principles are binding public commitments enforceable through Section 5 of the Federal Trade Commission Act, requiring companies to fulfill their publicly stated policies and practices. It is an important step forward for privacy and the connected car and provides baseline protections that automakers can build upon." ... "Second, the principles provide consumers choices about the collection, use, and sharing of certain information. Participating companies have taken an important step by committing to obtain affirmative consumer consent prior to 1) using precise location information, biometrics, or information about driving behavior for marketing purposes; and 2) sharing such information with unaffiliated third parties for their own use. Relatedly, the companies agreed not to share geolocation information data with the government unless pursuant to a warrant or court order, absent exigent circumstances or statutory authority." |
Post 173
Researchers working with the Central Intelligence Agency have conducted a multi-year,
sustained effort to break the security of Apple’s iPhones and iPads, according to top- secret documents obtained by The Intercept https://firstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples- secrets/ |
Post 174
http://www.bbc.com/news/technology-32229285
Fascinating Austrian court case that deals with Facebook and mass surveillance. |
Post 175
Iris ID solution selected for Canada—US crossings
http://www.planetbiometrics.com/article-details/i/2745/ Canada Border Services Agency’s NEXUS program will be rolling out iris scanners as a form of biometric identification for people traveling across the border. According to the article, "Enrolled travelers can now clear customs by simply looking into a camera that uses the eye's iris as proof of identity. The biometric technology is expected to improve security and expedite border clearance processes between Canada and the U.S." |
Post 176
http://www.irishtimes.com/business/technology/facebook-and-gmail-what-happens-
to-data-after-your-death-1.2177011 This article talks about what happens to email accounts and social media accounts after their owners pass away. Specifically, the article considers the problem of next of kin being locked out of those accounts. The idea of "digital remains" is becoming an increasingly important legal consideration. Are peoples' online identities and activities meant to remain private ad infinitum or is there an expiration date on that privacy? Should it only be opened up to immediate next of kin? Google is one company who sponsored the idea of a "digital heir" to related individuals' accounts. |
Post 177
Google Inc. lost most of a challenge to a German regulator’s
order that limits how it can combine user data that would allow the company to divine customers’ personal preferences, marital status and sexual orientation. http://www.bloomberg.com/news/articles/2015-04-08/google-loses- challenge-to-german-regulator-s-data-privacy-order |
Post 178
http://www.theverge.com/2015/4/8/8370515/att-fcc-settlement-data-
thefts-25-million-fine FCC fines AT&T a record $25 million for customer data thefts, which is (of course) nothing compared to their profits. |
Post 179
http://www.washingtonpost.com/world/national-security/secrecy-around-police-
surveillance-equipment-proves-a-cases-undoing/2015/02/22/ce72308a-b7ac-11e4- aa05-1ce812b3fdd2_story.html Backlash against fake cellphone towers—invasion of right to privacy without a warrant? Police forced to release information about how device works. "Inhibiting law enforcement's rights are second to protecting mine!" |
Post 180
(Sorry for the repost; forgot the link before.)
http://www.wsj.com/articles/netflix-gets-star-treatment-from-broadband- firms-abroad-1429222400?mod=WSJ_TechWSJD_NeedToKnow This article points out the marked difference in the way that Netflix is treated by broadband providers abroad versus in the U.S. Providers in Sweden and Australia, for instance, have woven Netflix into their cable boxes, and even provided free access to attract customers. |
Post 181
Experiment Shows Speed at Which Stolen Data Travels
A data protection company conducted an experiment in which it placed sensitive personal data on dark web sites where stolen data is bought and sold to see how quickly cybercriminals would pass it around. The answer: very quickly. The data sent around by Bitglass included the names, addresses, phone numbers, Social Security numbers and credit card numbers of 1,568 fictitious people. Within two weeks, the company said the data were viewed more than 1,000 times and downloaded 47 times by people in 22 countries on five continents. Among the people looking at the data were criminal gangs in Russia and Nigeria. The test shed light on how stolen data are shared, bought and sold on the black market. http://blogs.wsj.com/riskandcompliance/2015/04/15/experiment-shows- speed-at-which-stolen-data-travels/ |
Post 182
http://www.theverge.com/2015/4/28/8505011/the-us-government-wants-you-for-
its-virtual-e-cyber-mission |
Post 183
http://www.cbc.ca/news/business/ajusto-app-that-watches-your-driving-habits-
leads-to-privacy-concerns-1.3019787 A new app called Ajusto can track your driving habits and use the data to help reduce risky behaviors, consequently helping lower your insurance premiums. Privacy advocates, however, are concerned about the fact that the app can also track exactly where you've been and where all you've driven your car. |
Post 184
Global Commission on Internet Governance (GCIG), citizens-first agenda for
Internet privacy, pushing nations to pledge to uphold global standards of privacy and security. https://www.cigionline.org/articles/global-commission-internet-governance- calls-new-global-social-compact-protect-digital-priva |
Post 185
http://www.slate.com/articles/technology/safety_net/2015/03/how_to_make
_it_harder_for_hackers_to_assemble_your_personal_information.html "It is nearly impossible to participate in modern society without entrusting your most sensitive personal information to countless Internet-based systems. At the same time, even the most well-resourced organizations are being hammered by sophisticated digital attacks, making it difficult to trust that any of these systems will keep our information safe. So the question is: How can you keep your personal information secure while continuing to participate in a society powered by the extensive sharing of personal information?" |
Post 186
Here is a fascinating article on how many tech companies are
using privacy preferences for profit: http://qz.com/350812/people-are-finally-worrying-about-online- privacy-and-tech-firms-are-already-cashing-in/ |
Post 187
Another interesting article from last year related to privacy
in auto technology: http://dealbook.nytimes.com/2014/09/24/miss-a-payment-good- luck-moving-that-car/?_r=0 "Auto loans to borrowers considered subprime, those with credit scores at or below 640, have spiked in the last five years. The jump has been driven in large part by the demand among investors for securities backed by the loans, which offer high returns at a time of low interest rates. Roughly 25 percent of all new auto loans made last year were subprime, and the volume of subprime auto loans reached more than $145 billion in the first three months of this year." "But before they can drive off the lot, many subprime borrowers like Ms. Bolender must have their car outfitted with a so-called starter interrupt device, which allows lenders to remotely disable the ignition. Using the GPS technology on the devices, the lenders can also track the cars’ location and movements." "The devices, which have been installed in about two million vehicles, are helping feed the subprime boom by enabling more high-risk borrowers to get loans. But there is a big catch. By simply clicking a mouse or tapping a smartphone, lenders retain the ultimate control. Borrowers must stay current with their payments, or lose access to their vehicle." |
Post 188
Cybersecurity attack affects Harvard Student Healthcare Plan Subscribers:
http://kcur.org/post/more-2-million-missourians-and-kansans-affected- anthem-cyberattack |
Post 189
"Do not Track: an online, interactive documentary about who’s watching you"
http://www.theguardian.com/world/2015/apr/14/brett-gaylor-do-not-track- interactive-documentary-privacy "An online interactive documentary, the show aims to reveal how you, yes you, are being followed online by a host of companies. And it’s personal. Both the narrator’s identity and language are determined by your location, deduced from your IP address, while data gleaned by inviting you to log on to Facebook, take a survey or enter the address of an oft-visited website reveal how trackers deduce not only who you are and what you like, but use that information to shape your online world." |
Post 190
DARPA is considering providing a grant for the development of an airplane technology of a fully autonomous robotic
co pilot. From the New York Times: "Advances in sensor technology, computing and artificial intelligence are making human pilots less necessary than ever in the cockpit. Already, government agencies are experimenting with replacing the co-pilot, perhaps even both pilots on cargo planes, with robots or remote operators." This news reminded me of the self driving cars discussion, and makes me think that the trajectory of that development might be similar to planes (perhaps what Musk was thinking of when deciding to name the autonomous software update "Autopilot" and drawing the comparison with the airplane's development). It seems only natural that autonomously operating transportation is a natural step in the progression of technology in society. But it seems that norms have to evolve together with technology, so these technological developments must be staggered and slowly evolving with those norms. The link to the article: http://www.nytimes.com/2015/04/07/science/planes-without-pilots.html?ref=technology |
Post 191
An interesting piece looking at the political nuances behind computer security policy
standards: "At RSA Conference, Computer Security Done Right and Wrong" http://bits.blogs.nytimes.com/2015/04/22/at-rsa-conference-computer-security- done-right-and-wrong/ |
Post 192
http://www.theatlantic.com/education/archive/2015/04/is-big-brothers-eye-on-
campus/389643/ Questions arising over Georgia State's data mining and analysis of students - they are collecting all kinds of data from attendance to financial aid status to guide students; but the legality and ethics of this are debatable. |
Post 193
The FBI is forcing local government agencies to report FOIA requests about
fake "Stingray" towers. http://arstechnica.com/tech-policy/2015/02/fbi-really-doesnt-want-anyone- to-know-about-stingray-use-by-local-cops/ |
Post 194
"New texting app allows users to ‘un-send’ messages, guarantees
privacy" A new app was developed that allows users to delete unwanted messages while maintaining privacy thanks to elevated encryption algorithms. A pretty sweet solution to "text regret." It's available for download for iOS and Android, for FREE! Choice quotes: - "Other messaging apps have promised security, but we've all read the stories about images and messages that have been unwittingly exposed." - "With security breaches making headlines almost daily, people want assurance that their communications are private and protected. And that, should they have second thoughts about something they sent, they can delete with confidence from devices." http://rt.com/news/244089-messaging-app-text-regret/ |
Post 195
House Passes Cybersecurity Bill Despite Privacy Protests
http://www.wired.com/2015/04/house-passes-cybersecurity-bill-despite- privacy-protests/ The White House has recently passed a new cybersecurity bill targeted at stopping the wave of hacker breaches hitting American corporations. This does come at the cost of certain individual liberties and privacies. |
Post 196
http://www.huffingtonpost.com/2015/02/16/nsa-computer-
spying_n_6694736.html?utm_hp_ref=technology A security firm uncovers a key way the NSA spies on individuals. |
Post 197
http://www.maxkeiser.com/2015/02/nsa-trojan-firmware-widespread-u-s-
international-tech-reputation-may-suffer-tech-privacy-has-been-a-myth/ New NSA spying scandal emerges, highlighting the scale of cyber wars - Agency can access hard-drives made by major U.S. producers - Computers in over 30 countries, including NATO allies, were hacked - Iran and Russia were main targets - Revelations may impact technology sector in the U.S. as institutions around the world seek alternatives |
Post 198
A news team in Texas found that a lot of documents containing personal information
were left in cars found in Houston-area salvage yards. The people who run the salvage yards hold that it is the job of the individual to make sure that the documents are not left in the cars before they go to the salvage yard. Some individuals are upset that the responsibility falls on them. There is no Texas law requiring the salvage yard employees to ensure that these documents, which are like gold to identity thieves, are removed from the cars. http://www.khou.com/story/news/investigations/2015/04/23/i-team-scrapped-cars- storing-mountains-of-personal-data/26256679/ |
Post 199
More learning is going online, and more analog classrooms are incorporating digital
learning tools. This by default allows student data to be tracked, stored, analyzed, and acted upon. One huge concern is the security of this data. There is now a voluntary student privacy pledge that education tech companies are taking, and tomorrow there will be (!) a congressional hearing on technology and education. I don't think personally that a voluntary pledge is enough of a safeguard for student data security, and I also think that this is as much a normative/ethical issue as it is a technological one, so that any "pledges: should take into consideration the morality of the ways this data should be used and analyzed. In any case, I'm excited about the progress. And here's the article discussing this voluntary pledge in the NYT: http://bits.blogs.nytimes.com/2015/02/11/data-security-gaps-in-an-industry- student-privacy-pledge/ "Over the last several months, more than 100 education technology companies and organizations have signed on to a voluntary student privacy pledge in which they have committed to a variety of data safeguards, including maintaining “a comprehensive security program that is reasonably designed to protect the security, privacy, confidentiality, and integrity of student personal information against risks.”" |
Post 200
https://www.techdirt.com/articles/20150415/16181530668/netflix-moving-
to-encrypted-streams-as-mozilla-moves-to-deprecate-unencrypted-web- pages-as-insecure.shtml Mozilla is moving to mark all HTTP insecure, as Netflix is trying to force HTTPS for all of its streaming traffic. |
Post 201
http://imgur.com/gallery/UyQKv8D/new |
Post 202
Facebook is being sued for amassing the world's largest stash of facial-recognition
data http://www.businessinsider.com/facebook-biometric-program-2015- 4#ixzz3Wa0ueUJn "The lawsuit alleges that this facial-recognition program violates the privacy of its users, citing an Illinois law called the Illinois Biometrics Information Privacy Acts, which requires companies to get written content from a user if it is collecting biometric data." |
Post 203
http://www.nbcnews.com/tech/tech-news/retail-tracking-company-violated-
privacy-policy-ftc-complaint-alleges-n349006 The FTC has lodged a complaint against Nomi Technologies for their "Listen" service, which allows companies to monitor their uses as they move through their store using MAC address, much like our lab in class. Though the program had an opt-out mechanism, the FTC alleges that Nomi didn't actually inform customers that they were being tracked, so there was no way for them to to actually opt out of the program. |
Post 204
http://techcrunch.com/2015/02/21/protect-your-smartphone-from-
government-spies-with-these-apps/ The Intercept reported earlier this week that the National Security Agency (NSA) and the British equivalent spy agency GCHQ had allegedly hacked into and stole information from millions of SIM cards produced by the Dutch company Gemalto. |
Post 205
http://www.allgov.com/news/where-is-the-money-going/1-billion-
dollar-tsa-behavioral-screening-program-slammed-as-ineffective- junk-science-150323?news=856031 "Ineffective junk science" |
Post 206
http://www.marketplace.org/topics/business/data-driven-workplace-future
The data-driven workplace of the future Investigates how businesses are using big data and data analytics to track their customers and employees and maximize efficiency and profit. |
Post 207
http://www.usnews.com/news/articles/2015/03/23/privacy-bill-may-fail-student-
data-protection New bill introduced appears to protect students' data privacy, but protects companies' interests more. Here is another example of a bill's appearance of individual protection but actual corporate protection. |
Post 208
A lot of Americans check government data online, but few think the
government is good at sharing it President Obama has made a big deal about making it easier for people to access data the government collects -- even signing an executive order in 2013 aimed at making so-called "open data" the new default for government information. 37 percent of American adults found information or data about the federal government online during the past year. But, just 5 percent of respondents to the Pew survey said the federal government "shares data very effectively," while 39 percent said it was "somewhat effective." http://www.washingtonpost.com/blogs/the-switch/wp/2015/04/21/a-lot-of- americans-check-government-data-online-but-few-think-the-government-is- good-at-sharing-it/ |
Post 209
Some critics of CISA think that the bill's language is vague and does not
actually protect users' privacy. http://ivn.us/2015/03/23/cisa-threatens-consumer-privacy-online-critics- say/ |
Post 210
http://www.nytimes.com/2015/04/28/upshot/federal-push-for-privacy-hampers-
addiction-research-and-care.html?_r=0&abt=0002&abg=1 This New York Times article argues that the Department of Health and Human Services, the NIH, and other medical governing authorities have made it too difficult to get access to medical data. Especially in regards to addiction treatment and patient care, having more access to medical data would greatly improve the quality of the research. Though the government has concerns about private researchers using the information appropriately, the information could be given without certain identifiers like name or age or place of residence, though plenty of our labs have shown that people can be re-identified with only a few pieces of data. |
Post 211
http://engagedscholarship.csuohio.edu/cgi/viewcontent.cgi?
article=1009&context=sheppard_dna |
Post 212
Twitter updated their privacy policy last night to finally make it against their policy to
use twitter for revenge porn. Any photo or video that was posted without the consent of the subject is a violation of Twitter's terms of use. Now how to enforce? http://www.wired.com/2015/03/twitter-bans-revenge-porn/ |
Post 213
http://www.nytimes.com/2015/02/24/science/building-face-and-a-case-on-
dna.html Law enforcement is now able to construct an image of an individual's face based solely on DNA. Used in crime scenes when there are no witnesses in order to literally paint a picture of a suspect. Implies that even without a general/public database of DNA, there may be backdoors to linking DNA to identities. |
Post 214
"Instagram account @TTCWomen raises privacy concerns"
http://www.thestar.com/news/gta/2015/04/09/instagram-account- ttcwomen-raises-privacy-concerns.html A new Instagram account featuring photos of “beautiful women” riding the TTC is raising questions about privacy and consent, but its creator says there’s nothing offensive about the snaps. Raises questions about people's daily right to privacy, being justified currently by creator who says that there is "nothing offensive about the snaps" while some women argue that it's "violating the privacy of every woman in the city." |
Post 215
Here’s What Verizon Communications Inc. Data Breach Report Revealed
Verizon’s annual data breach investigation report released on April 15 proposes cyber-attacks are rather infrequent and that mobile malware is not really an issue. Hence, for now, the company must consider spending on non-mobile infrastructure. http://www.bidnessetc.com/40013-heres-what-verizon-communications-inc- data-breach-report-revealed/ |
Post 216
http://www.post-gazette.com/business/tech-news/2015/04/07/Privacy-
groups-seek-investigation-of-Google-s-YouTube-Kids-app- pittsburgh/stories/201504070139 Google has a youtube channel for kids, but privacy groups are worried because many of the programs (targeted at children 5 and under) are really not much more than commercials. |
Post 217
General Data Protection Regulation in the EU ... the problem with making data
privacy laws/regulations during a time that technology is changing much faster than it than it takes to pass legislations. http://www.out-law.com/en/articles/2015/march/eu-privacy-watchdog- seeks-to-future-proof-data-protection-reform-package/ |
Post 218
Privacy groups seek investigation of Google's YouTube Kids app
http://www.post-gazette.com/business/tech-news/2015/04/07/Privacy- groups-seek-investigation-of-Google-s-YouTube-Kids-app- pittsburgh/stories/201504070139 |
Post 219
http://www.ctvnews.ca/business/automakers-fail-to-adequately-protect-cars-
against-hacking-theft-of-personal-data-report-1.2226392 "The responses from 16 [auto]manufacturers "reveal there is a clear lack of appropriate security measures to protect drivers against hackers who may be able to take control of a vehicle or against those who may wish to collect and use personal driver information," a report by [Sen. Edward] Markey's staff concludes." |
Post 220
http://www.bloomberg.com/news/articles/2015-04-08/google-loses-challenge-to-
german-regulator-s-data-privacy-order In Germany, a new order by German regulators is limiting how Google can use consumer browsing and internet data. Google lost almost all of its arguments in its attempted objection to the order, and the quest to limit the data usage was led by a joint European group of regulators. |
Post 221
https://www.techdirt.com/blog/wireless/articles/20150402/06110930520/tw
o-half-years-later-verizon-finally-lets-people-opt-out-stealth-zombie- cookie.shtml Verizon finally lets people opt out of the "stealth cookie" which allowed them to track users uniquely on any website on the internet. |
Post 222
http://tech.co/concerned-privacy-send-messages-quickie-2015-03
Quickie is an app that allows you to send messages privately. How does it work? Messages are sent as push notifications, so they're not stored on servers or even on your phone. As soon as you swipe the lock screen, they disappear and are gone forever. |
Post 223
Retail Tracking Company Violated Privacy Policy, FTC Complaint Alleges
http://www.nbcnews.com/tech/tech-news/retail-tracking-company-violated- privacy-policy-ftc-complaint-alleges-n349006 |
Post 224
http://www.theguardian.com/politics/2015/apr/22/right-to-privacy-could-be-
meaningless-in-10-years-under-tory-and-labour-plans Privacy could be meaningless in 10 years in the UK under new plans by Tory and Labour MPs to increase the number and access of spies to private data on individuals. I wonder, is privacy already dead? |
Post 225
Pakistan cyber bill threatens free speech, privacy: Rights groups
http://english.alarabiya.net/en/News/world/2015/04/20/Pakistan-cyber-bill- threatens-free-speech-privacy-Rights-groups.html |
Post 226
https://cap.stanford.edu/profiles/viewCV?
facultyId=4111&name=Norbert_Pelc |
Post 227
http://www.usatoday.com/story/money/2015/04/14/hacking-health-data-
privacy/25597337/ Relevant examples of security breach in health data! |
Post 228
"Jeb Bush Email Release Includes Addresses And Social Security Numbers"
http://wlrn.org/post/jeb-bush-email-release-includes-addresses-and-social-security- numbers Jeb Bush released email correspondence from his time as governor of Florida in order to support transparency. Sensitive data, such as Social Security numbers, were not redacted at the time of the original release. "'People have to be more careful about what information they put in an email, but the Department of State should have reviewed those records and redacted all exempt information,' says First Amendment Foundation President Barbara Petersen. 'Social security numbers are exempt from public disclosure.'" |
Post 229
http://www.nytimes.com/2015/04/28/upshot/federal-push-for-privacy-
hampers-addiction-research-and-care.html?abt=0002&abg=1 To protect the privacy of patients some data gathered from medicare and medicaid will not be provided to hospitals or the V.H.A without express consent from the patient. The article argues that witholding this data gets rid of information that could be very important to patient treatment and further data research on the diseases substance abuse correlates with. Medicare and Medicade argue: "Substance-use disorders carry stigma. Some patient advocates have expressed concerns that medical data could be used by law enforcement to incarcerate patients or to separate children from their parents. Perhaps the information could be used to deny employment. Without robust privacy protections, these concerns could deter some patients from seeking treatment." |
Post 230
Steven Myers: https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0CC4QFjAC&url=http%3A %2F%2Flouisville.edu%2Ffaculty%2Fsrmyer01%2Fabout%2FSRM_CV1220 08.doc%2Fat_download%2Ffile&ei=uMLTVKmnKKbnsASemYLQDw&usg=A FQjCNGvge2lVwnynYKxzrEdAOjvsI57oA&bvm=bv.85464276,d.aWw Geoffery Cohen: http://www.electionstudies.org/conferences/2006Duke/cvs/Cohen_cv.pdf Bruce David White: http://www.amc.edu/Academic/bioethics/FacultyCV/BDW_CV.pdf Michael Fox: http://www.thechildandfamily.com/download/cirriculum_vitae.pdf Marc Prentki: http://www.montreal-diabetes-research- center.org/en/prentki/CCV_prentki_2014.pdf Michael Levine: http://www.thebrainproject.org/advisoryBoard/Michael_Levine/CV.pdf Mark Klamberg: http://www.iclklamberg.com/files/CV-English.pdf Mika Palgram: http://www.tas-cas.org/uploads/tx_tascas/396.pdf William Andrews: http://reverseaginginstitute.com/wp- content/uploads/2013/10/Bill-Andrews-Curriculum-Vitae.pdf bv Miguel Angel: http://bcdr.inegi.up.pt/cv/miguel_angel_cv.pdf Barbara Mahler: http://www.sfei.org/sites/default/files/Item1a_MahlerCVJune05.pdf Megan Buchanan: http://cdn1.proz.com/profile_resources/1868879_r52d41de94edf1.pdf Ronald Woody: http://cmud.cmu.edu.tw/doc/faculty/Woody.pdf Eli Katz: http://www.sbbh.net/wp-content/uploads/2013/11/CURRICULUM- VITAE-eli.pdf Steven Joseph Davis: http://www.nber.org/vitae/vita152.pdf W. Dean Pond: http://www.urbana.edu/documents/contentdocuments/document_23_5_632. Jane Seay: louisville.edu/faculty/srmyer01/about/.../file E. Jane Costello: https://fds.duke.edu/db/Sanford/ccfp/faculty/.../CV.pdf Maria T. Pinorini-Godly: louisville.edu/faculty/srmyer01/about/.../file Charles Schulz: http://www.circare.org/dw/schulz_ex1.pdf James Brown: http://www.hsc.wvu.edu/eastern/UHP/PDFs/Candidate- CVs/CV_BROWN-J_2012.pdf Bruce David White: http://www.amc.edu/Academic/bioethics/FacultyCV/BDW_CV.pdf Carl Wittwer: http://www.math.utah.edu/~palais/pcr/CW_Vitae_2004.doc Osvaldo Civitarese: http://www.fundacionkonex.org/ckfinder/userfiles/files/CV%20Osvaldo%20 Civitarese%20%28english%29.pdf Charles Schulz http://www.circare.org/dw/schulz_ex1.pdf Robert Gabriel: http://www.uc.pt/ge3s/event_05/event_05/CV_Robert_Gabriel.pdf Jeffrey S. McCombs, Ph.D. http://web-app.usc.edu/web/pharmacy/faculty/img/376CV.McCombs- CV.doc Brenda Chinnery: https://utdirect.utexas.edu/apps/student/coursedocs/nlogon/download/6972 19/ Mark Schwartz: http://www.bishop-accountability.org/ia- davenport/archives/filings/JohnDoeIA-2004-08-23- PlaintStatementOfDisputedFactsEx7-Attac.pdf Allan Kimmel: kimmel.socialpsychology.org/cv/CV-Current-2.doc JOHN MARTIN PAGE, JR. http://www.erf.org.eg/CMS/uploads/pdf/1194806906_John_Page_CV_07.pd f Andrew Marc Lewis http://wp.vcu.edu/math/wp-content/uploads/sites/4453/2014/05/Lewis-CV- 2013.pdf Fred Tappert http://binturong.us/tappert/fred/cv00.pdf Jonathan Ingersoll http://faculty.som.yale.edu/jonathaningersoll/cv.pdf Alexander Ploss http://molbio.princeton.edu/labs/images/Alexander_Ploss_CV_AP20141028. Fred Downey http://www.the-aps.org/mm/Membership/Living-History/H-Fred- Downey/CV-Downey.pdf |
Post 231
Data Privacy and Security Considerations in M&A Transactions
http://www.mcguirewoods.com/Client-Resources/Alerts/2015/4/Data- Privacy-Security-Considerations-MA-Transactions.aspx? utm_source=Mondaq&utm_medium=syndication&utm_campaign=View- Original Global cybercrime costs the economy well over 400 billion dollars annually, which amounts to a number of jobs lost between 150,000 and 200,000. These data privacy issues can have an enormous effect on many merger and acquisition agreements that include several parties and sensitive information. This has been an issue in the past as well, as is shown by the passage of numerous legislation like Fair Credit Reporting Act, the Gramm- Leach-Bliley Act, and the Health Insurance Portability and Accountability Act of 1996. In the end, more laws are required to make sure M&A's are not effected. |
Post 232
"Release of security video violates Ben Affleck's privacy:
lawyer" The manager of a gas station in Canada released security camera footage of Ben Affleck. Though the manager saw nothing wrong with it, a privacy expert said that a commercial establishment does not have the right to disclose it. Choice quote: - "Affleck, like any customer, gave implied consent to be recorded on video — but not to have that video shared with the public." http://globalnews.ca/news/1954155/release-of-security-video- violates-ben-afflecks-privacy-lawyer/ |
Post 233
http://www.bloomberg.com/news/articles/2015-03-09/apple-s-health-
research-kit-makes-iphone-users-test-subjects Apple’s Health Research Kit Makes IPhone Users Test Subjects Apple Inc.’s new ResearchKit software platform turns the iPhone into a diagnostic tool drawing medical data from millions of potential customers, creating a boon for researchers and a headache for privacy advocates. |
Post 234
http://www.theverge.com/2015/5/6/8557881/security-researchers-found-another-
massive-security-risk-in-lenovo |
Post 235
http://thetyee.ca/Mediacheck/2015/04/14/Bell-Targeted-Ads/
Basically the privacy commissioner of Canada is setting a precedent with the company, Bell, that "opt-out" approaches to consumer privacy will not be acceptable. |
Post 236
Snowden Does Reddit
Tech Crunch - Feb 23 Snowden on his thoughts on the documentary winning at the Oscars http://techcrunch.com/2015/02/23/snowden-does-reddit/ |
Post 237
http://blogs.wsj.com/digits/2015/03/26/facebook-moving-ahead-with-drone-
plans-test-this-summer/?mod=ST1 This article notes that Facebook is planning to test a solar-powered drone this summer, part of its plan to beam internet access to billions without access today. While it would be a long time before Facebook does actually put such technology to use int he real world, it marks another major technology company using drones, and draws more attention to the need for fast-acting governmental regulations of such technologies. |
Post 238
"Under-fire airline Lufthansa faces privacy action in France"
Lufthansa is being criticised not only for its handling of the Germanwings crash but also for keeping illicit tabs on staff at Charles de Gaulle airport. They collected their names accompanied by notes in German regarding their medical condition or political persuasion, which is illegal under French law. http://www.telegraph.co.uk/news/worldnews/europe/france/11540269/ Under-fire-airline-Lufthansa-faces-privacy-action-in-France.html |
Post 239
http://www.baltimoresun.com/news/maryland/crime/blog/bs-md-ci-stingray-
new-disclosures-20150420-story.html A judge defends the use of stingray phone tracking without a warrant in urgent cases. Here, it was used to find a phone stolen off of a murder victim (presumably by the murderer). The Baltimore police also apparently use stingray a lot more than what has been disclosed by other police teams. |
Post 240
http://bits.blogs.nytimes.com/2015/04/21/twitter-broadens-ban-on-violent-
threats/?ref=technology "When it comes to violent posts on its social network, Twitter has long held that it would only seek to ban direct, specific threats made against others on its microblogging service. Now, the company has decided that simply promoting violence against others is enough to get a user suspended. Twitter quietly updated its rules of user conduct following the publication of an opinion piece by its general counsel, Vijaya Gadde, last week in The Washington Post that acknowledged that the company needed to “do a better job combating abuse without chilling or silencing speech.”" |
Post 241
http://www.wsj.com/articles/how-much-do-you-know-about-data-privacy-
1429499471 The Wall Street Journal has released an article to make consumers more aware of what kind, and just how much, personal information is being leaked and contested in regards to the technology we use daily. |
Post 242
http://www.thestar.com/news/world/2015/04/08/canada-way-behind-in-data-
privacy-rules.html Article about how Canada is lagging in data privacy regulation and consumer protection. |
Post 243
http://www.thestar.com/life/health_wellness/2015/03/25/privacy-commissioner-
calls-for-prosecution-over-rob-ford-privacy-breach.html Privacy commissioner calls for prosecution over Rob Ford privacy breach The Attorney General is considering prosecuting two health professionals who snooped into former mayor Rob Ford’s medical records. If convicted, they could be fined up to $50,000. |
Post 244
Orbital Images is a company whose goal is to capture global
socioeconomic trends and sell it to hedge funds, real estate developers and other organizations. This company has "processed as many as a million images of parking lots. From that volume of imagery we can actually learn a great deal," the CEO said. What those parking lots tell him, for example, is how many cars are outside retail shops. "We can actually track retail traffic in 60 major retailers and see whether or not it's up or down compared to past years," the CEO said. "That's one of the single most important things for retailers—how many people are coming in the door." http://www.cnbc.com/id/102519682 |
Post 245
http://www.mediapost.com/publications/article/247957/consumers-concerned-
about-iot-data-privacy.html Following hacking reports of baby monitors and automobiles, Internet of Things privacy concerns are growing regarding smarthome devices. These concerns are valid and should be addressed. |
Post 246
"Facebook admits it tracks non-users, but denies claims it breaches EU
privacy law" http://www.theguardian.com/technology/2015/apr/10/facebook-admits-it- tracks-non-users-but-denies-claims-it-breaches-eu-privacy-law Facebook admits to tracking users that do not have an account. “The researchers did find a bug that may have sent cookies to some people when they weren’t on Facebook. This was not our intention – a fix for this is already under way.” |
Post 247
http://www.nytimes.com/2015/04/23/us/politics/computer-attacks-spur-
congress-to-act-on-cybersecurity-bill-years-in-making.html?_r=0 The House of Representatives has passed a cyber security bill that would make companies share data and computer networks with the federal government. This comes in the wake of many cyber breaches, and this bill is hopefully one of the first steps to reducing these breaches. |
Post 248
http://works.bepress.com/john_brigham/cv.pdf
|
Post 249
"Everything We Wish We'd Known About Building Data Products"
Cool article summarizing important aspects of Data Products http://firstround.com/review/everything-we-wish-wed-known-about-building-data- products/ “This can be so hard that even a company like Apple sometimes has to apologize to customers for what was arguably a poor quality data product and recommend competitor applications,” says Belkin. This issue impacts companies of all sizes and skill levels. At LinkedIn, the “People You May Know” feature started with a big python script on one engineer's laptop. It wasn't until 2008, two years after the feature launched, that it started to drive reasonable growth on the platform." |
Post 250
http://www.wired.com/2015/04/house-passes-cybersecurity-bill-despite-
privacy-protests/ The House of Representatives passed a the Protecting Cyber Networks Act, which allows for more fluid sharing of cybersecurity threat data between corporations and government agencies. |
Post 251
http://business.financialpost.com/2015/03/04/microsoft-corp-achieves-iso-
cloud-privacy-certification/?__lsa=a11a-5d05 Microsoft is taking steps to remove Personally Identifying Information while storing information in the cloud. They are also working to make sure the information there stays private property of the individuals. |
Post 252
Boston Marathon Surveillance Raises Privacy Concerns Long After Bombing
http://www.npr.org/2015/04/17/400164221/boston-marathon-surveillance- raises-privacy-concerns-long-after-bombing |
Post 253
http://www.nationaljournal.com/next-america/education/why-colleges-want-your-
personal-data-20150303 Colleges are using demographic and personal data to identify which students may need help completing college and obtaining a degree, because graduation rates across the country are low. This data can be used for helping the students in need of help, but it can also work against students applying, because their demographic data might give them a disadvantage when compared to a demographic that has historically better graduation rates. |
Post 254
Get ready: the Internet of Things is the final nail in privacy’s coffin
http://www.information-age.com/industry/services/123459271/get-ready-internet- things-final-nail-privacys-coffin |
Post 255
Uber passwords from hacked accounts reportedly selling online
for $1 http://mashable.com/2015/03/29/hacked-uber-passwords-selling/ Vendors on dark net sites such as AlphaBay, which often sell illegal products like drugs and counterfeit goods, are offering active Uber username and login details for $1, according to Motherboard. Other information that comes with the purchase includes partial credit card data and telephone numbers. |
Post 256
A host of new hacking opportunities...what happens when our financial information
begins to exist in the clouds? http://bits.blogs.nytimes.com/2015/02/23/google-guns-for-apple-in-mobile- payments-race/?ref=technology |
Post 257
http://www.huffingtonpost.com/mark-weinstein/creepy-remarkable-reveal-
_b_7056918.html?utm_hp_ref=technology&ir=Technology Facebook has created shadow profiles of non-members, thus calling into question the right to privacy of the people who have not agreed to Facebook's terms of service. |
Post 258
Russian Hackers Read Obama’s Unclassified Emails
http://www.nytimes.com/2015/04/26/us/russian-hackers-read- obamas-unclassified-emails-officials-say.html?_r=0 |
Post 259
http://www.wsj.com/articles/make-me-change-my-password-please-
1429499482?mod=WSJ_TechWSJD_moreTopStories' This article highlights the dangers of failing to change passwords regularly, and uses psychology to propose several ways to encourage people to change them more regularly. These include making the threat more personal, making it easier to make the changes, and and helping consumers understand the dangers. |
Post 260
http://www.vanityfair.com/news/2015/03/privacy-technology-60-minutes-poll |
Post 261
"Chairman Tom Wheeler: This Is How We Will Ensure Net Neutrality"
"Using this authority, I am submitting to my colleagues the strongest open internet protections ever proposed by the FCC. These enforceable, bright-line rules will ban paid prioritization, and the blocking and throttling of lawful content and services. I propose to fully apply—for the first time ever—those bright-line rules to mobile broadband. My proposal assures the rights of internet users to go where they want, when they want, and the rights of innovators to introduce new products without asking anyone’s permission." http://www.wired.com/2015/02/fcc-chairman-wheeler-net-neutrality/ |
Post 262
http://www.cbsnews.com/news/high-tech-car-thieves-may-be-breaking-in-by-
amplifying-key-fob-signal/ Thieves are becoming smarter as they find ways to replicate the signal created by car's key fob to unlock the doors. Thieves have developed systems to confuse cars into thinking that the driver is nearby, unlocking the doors for anyone to enter and use. Combined with push to start technology, that's enough for the car to be stolen. |
Post 263
Obama’s Passport Data Leaked in Australian Email Blunder
http://www.nytimes.com/2015/03/31/us/politics/obamas-passport-data-leaked-in- australian-email-blunder.html?ref=topics&_r=0 |
Post 264
Jeb Bush, Your Personal Data, and the End of Privacy
http://www.fastcompany.com/3042497/jeb-bush-your-personal-data-and-the-end- of-privacy GOP Presidential hopeful Jeb Bush recently released a trove of emails in the spirit of transparency. However, he accidentally also made public the email addresses, home addresses, and SSNs of thousands of his supporters. Privacy will likely be one of the hot-button topics of the 2016 election. Ironically, political campaigns themselves that are increasingly collecting vast amounts of data on voters, such that algorithms now know "how swing voters are going to vote before the swing voters do." |
Post 265
This is a cool public interview that took place on reddit yesterday with Edward
Snowden and Laura Poitras, the director of the Oscar winning documentary. Snowden keeps a very genuine and casual tone as he responds to public questions Snowden: "At this point, I think the reason I get away with it is because of my public profile. What can they really do to me? If I show up with broken fingers, everybody will know what happened" http://www.reddit.com/r/IAmA/comments/2wwdep/we_are_edward_snowden_laura _poitras_and_glenn/ |
Post 266
http://thehill.com/policy/cybersecurity/239824-banks-challenge-19m-target-
breach-settlement After Target had a data breach that compromised 40 million credit card accounts, they managed to arrange a $19m deal with Mastercard as compensation. Now small banks and financial institutions are attempting to void the deal, claiming they were not considered in the deal, and that Target is trying to avoid fully compensating other institutions for the privacy violations. |
Post 267
A recently proposed Californian legislative act attempts to prevent law enforcement
officers from accessing personal data (including metadata and location information from GPS functions) from smartphones and laptops that is stored on remote servers or "in the cloud." This article draws comparisons between physical files and digital files, and includes commentary from a number of legislators who support the proposed act because they believe it will outlaw warrantless searches of citizens' digital information. It is interesting to note that the proposal is supported by some of the world's largest tech firms, including Facebook, Google, Mozilla and Twitter. Personally, I find it interesting that technology companies have decided to weigh in on a criminal justice issue concerned with enhancing privacy protections. Facebook and Google, after all, have been accused of eroding online privacy themselves. See the news story here: https://www.techwire.net/tech-firms-back-california-bill- limit-warrantless-searches-phones-laptops/ |
Post 268
A New Facebook App Wants To Test Your DNA
The scientists behind the project, Genes for Good, hope that Facebook users will send a tube of their spit to a laboratory at the University of Michigan and use a free Facebook app to fill out periodic surveys about their health, habits, and moods.The researchers are planning to share their findings in large networks outside of Facebook as well. They will strip the genetic data of all identifiable information and submit it to public resources such as dbGaP, a large database run by the National Institutes of Health. These databases are open to any credible scientist, including those who work for pharmaceutical companies. http://www.buzzfeed.com/virginiahughes/a-new-facebook-app-wants-to- test-your-dna#.bu06P5d69 |
Post 269
http://www.theguardian.com/technology/2015/apr/10/facebook-admits-it-tracks-
non-users-but-denies-claims-it-breaches-eu-privacy-law This article discusses the current investigation of Facebook's practices in light of EU privacy laws and whether or not Facebook breaks these laws. |
Post 270
http://www.mondaq.com/unitedstates/x/383210/Data+Protection+Privac
y/OCRs+Enforcement+of+HIPAAs+Privacy+and+Security+Rules+Contin ues+with+Robust+2014 Office for Civil Rights’ Enforcement of HIPAA’s Privacy and Security Rules |
Post 271
https://www.yahoo.com/tech/in-the-future-your-veins-could-replace-your-
116644086459.html Related to the vulnerability in fingerprint scanning we discussed in class, PayPal's head of developer evangelism is exploring authentication technologies that use your heartbeat or vein patterns to uniquely identify a user. |
Post 272
http://www.seattletimes.com/opinion/legislate-on-drone-use-balancing-
privacy-and-safety/ Interesting article about how to legislate state-wide drone use when there are currently no laws in place. |
Post 273
Stingray towers are being used not only to track cellphones but also to
disrupt their service. http://www.wired.com/2015/03/feds-admit-stingrays-can-disrupt-cell- service-bystanders/ |
Post 274
http://techcrunch.com/2015/03/16/pew-privacy-chilling-
effects/#J02Htv:5ZPJ Snowden has done some good. A study suggests that 1/3 of Americans have taken steps to increase their privacy online. |
Post 275
Title: Driver beware: Your new car may be spying on you
Link: http://www.ctvnews.ca/sci-tech/driver-beware-your-new-car-may-be- spying-on-you-1.2296165 Modern vehicles are now equipped with a lot of newer technology that can be utilized as a data scraper. These cars can collect data like on how fast you drive to how long your car idles and how suddenly you brake. This can be very useful for insurance agencies when deciding rates and how much for customers to pay. |
Post 276
Data retention: Netherlands court strikes down law as breach of privacy
http://www.theguardian.com/technology/2015/mar/12/data-retention-netherlands- court-strikes-down-law-as-breach-of-privacy |
Post 277
New Pew Research Study finds that only 15% of Americans have
changed mobile phone habits since Snowden revelations. http://www.pewinternet.org/2015/03/16/americans-views-on- government-surveillance-programs/ |
Post 278
Debate over Common Core testing people spying on children versus
catching cheaters. http://www.washingtonpost.com/local/education/debate-over-test-security- vs-student-privacy-rages-in-the-age-of-social-media/2015/03/23/bbac030a- cf0c-11e4-a2a7-9517a3a70506_story.html |
Post 279
DARPA Explores New Ways to Secure Our Lives Online
http://www.npr.org/2015/03/08/391619540/darpa-explores-new-ways-to- secure-our-lives-online In this NPR interview, DARPA researcher discusses biometric information used for authentication processes. He details DARPA research in using keystrokes to authenticate people. This would be more secure than the current use of passwords. |
Post 280
http://www.politico.com/story/2015/02/faa-small-drone-rules-115207.html
"Drones can begin flying low over the American skyscape by 2017 under rules proposed Sunday by the Obama administration that will finally allow their legal use for business purposes." |
Post 281
http://money.cnn.com/2015/04/28/technology/audi-diesel-air-
water/index.htmlhttp://money.cnn.com/2015/04/28/technology/audi-diesel-air- water/index.html This article is about a new Audi experiment that illustrates how airborne carbon dioxide can be broken down to fuel vehicles. This technology is still years away from being possible, but nonetheless a very cool prospect in the fight against climate change. |
Post 282
"Unindexed was a website that continuously searched Google for itself over
and over. The moment it found itself in the search results it would irrevocably securely delete itself, making the precise instant of algorithmic discovery the catalyst of destruction. Visitors were encouraged to post contributions to the site (which would also be destroyed when the site was detected). They were then invited to share the site with others, bearing in mind the impact their method of sharing would have on the eventual discovery of the URL by Google search bots. A tension was created between the desire to share and the desire to keep it to oneself, and the site spread on a small scale via postal mail, word-of- mouth, etc." https://github.com/mroth/unindexed/blob/master/README.md |
Post 283
http://www.wsj.com/articles/europes-digital-czar-slams-google-facebook-over-
selling-personal-data-1424789664 This article talks about how the European Commission is unhappy with how American companies are treating the personal data of European consumers. The EC intends to enact Union-wide rules about data collection and use, but that has yet to pass. |
Post 284
http://thinkprogress.org/justice/2015/04/13/3646209/new-nsa-proposal-
aims-less-sneaky-asking-data/ |
Post 285
http://www.wsj.com/articles/five-simple-steps-to-protect-corporate-data-
1429499477 Another fascinating article in the Wall Street Journal about data leaks in a corporate setting and what corporations can do to protect their data (which includes getting rid of passwords, vetting vendors, closing potential online leaks etc). Especially relevant given the massive Sony leak at the beginning of this year. |
Post 286
Drone operators would also have to be checked out by the Transportation Safety
Administration to determine whether they pose a security threat before they could receive an FAA operator certificate. There is no fee for the security check, but one might be applied in the future, the analysis said. Last month, a small drone flew over the White House fence and crashed on the lawn. Although the operator later came forward saying the incident was an accident, the episode has raised concern that small drones might pose a security threat. URL: http://www.nytimes.com/aponline/2015/02/14/business/ap-us-faa- drones.html?_r=0 |
Post 287
http://www.staradvertiser.com/news/nyt/19040101_White_House_proposes_
broad_consumerdata_privacy_bill.html?id=294482961 The Obama administration has proposed a new consumer data privacy bill designed to protect consumers. It provides common sense approaches to fill in the gaps in the federal laws already pertaining to consumer privacy, such as the fair credit reporting act, the video privacy protection act etc. |
Post 288
Facebook data privacy case opens in European court
http://www.irishtimes.com/business/technology/facebook-data-privacy-case-opens- in-european-court-1.2150363 "In a case with far-reaching consequences for EU-US relations, the European Court of Justice (ECJ) will hear arguments arising from a complaint filed in Ireland last year with the High Court, demanding the State’s data-protection commissioner investigate whether Facebook was in breach of EU law for allegedly passing European user data to US intelligence services." |
Post 289
http://www.buzzfeed.com/jimdalrympleii/how-us-british-spies-can-now-eavesdrop-
on-millions-of-cell-p#.giE4Gm9qN Government Spies Can Now Eavesdrop On Your Cell Phone And Millions Of Others Top secret documents leaked by Edward Snowden detail how spy agencies stole SIM card data, giving them unprecedented access to millions of cell phones. |
Post 290
http://www.bloomberg.com/news/articles/2015-03-04/clinton-s-e-mail-
system-built-for-privacy-though-not-security Clinton’s E-Mail Built for Privacy Though Not Security |
Post 291
Auburn University's website publicly displayed the personal data of many individuals,
including people who had never attended or applied to the university, between Sept 1, 2014 and March 2, 2015. This was the result of the installation of a new device to fix a broken server. The data available included name, address, email address, birthdate, SSN, and academic info. http://www.al.com/news/index.ssf/2015/04/auburn_confirms_students_who_d.html |
Post 292
Hacker Implants NFC Chip In His Hand To Bypass Security Scans And
Exploit Android Phones NFC, Near Field Communication, chips can be used to connect to other android devices from a certain distance. A hacker can then transmit harmful material or extract sensitive data. The small size of the chip makes it fairly undetectable, and that is the challenge. "At a time when airlines and federal agencies are cracking down anyone even thinking about testing the security of in-flight communications systems, implantable chips provide a clever way to sneak electronics past checks at airports or other high-security locations. Wahle says he put the chip in when he was still employed by the military and it was never detected despite going through scanners every day. “They would have to put me through the X-ray [if they were going to detect the chip].”" http://www.forbes.com/sites/thomasbrewster/2015/04/27/implant-android- attack/ |
Post 293
The governor of Richmond Virginia proposed some bills to weaken the
limitations of police surveillance using things like drones and license plate readers. But his bills were shot down like a drone out of the sky. http://www.13newsnow.com/story/news/local/virginia/2015/04/15/lawmaker s-reject-legislation-related-to-police-surveillance-technology/25838621/ |
Post 294
http://blogs.wsj.com/law/2015/04/10/judge-browsing-data-shared-with-facebook-
doesnt-violate-privacy-law/ Judge rules that AMC sharing video watching habits with FaceBook is not illegal. Here is another piece of evidence of the public's obliterated level of privacy, especially on social networks. |
Post 295
http://www.startribune.com/politics/statelocal/294261551.html
This article explains that a poll conducted in Minnesota shows that 2/3 of voters would back an amendment that that would protect electronic data from warrantless searches. It seems people are taking bigger steps to protect their privacy and bring the whole realm of data privacy into a state constitution. |
Post 296
http://www.pcworld.com/article/2903812/hp-links-vertica-and-idol-seeking-
better-unstructured-data-analysis.html HP has released a software package called the HP Haven Connector Framework Server that will allow companies to analyze datasets that have been too large or unorganized to analyze in an efficient manner. This will possibly make data worth more now that it is possible to analyze it more successfully. |
Post 297
http://www.euractiv.com/sections/infosociety/companies-should-prepare-
eus-forthcoming-data-protection-regulation-312487 European legislation is attempting to unify data protection under the General Data Protection Regulation. This should make companies respond faster to data breaches and alert their customers sooner. Also fines will be increased for companies that do not comply with the new data protection rules. |
Post 298
http://www.smh.com.au/federal-politics/political-news/senate-passes-
controversial-metadata-laws-20150326-1m8q3v.html Australians to have two years of their phone and internet history stored after metadata laws pass parliament. |
Post 299
There's a massive new leak of confidential spy files from MI6, Mossad and the FSB
http://www.businessinsider.in/Theres-a-massive-new-leak-of-confidential-spy-files- from-MI6-Mossad-and-the-FSB/articleshow/46343705.cms |
Post 300
"The Privacy Revolt: The Growing Demand for Privacy-as-a-Service"
This article claims that consumers have increasingly started to view privacy as a necessary service they expect from various providers since they are aware that their growing dependence on tech comes at cost of their privacy. Even if you try to live off- the-grid, it's difficult to escape browser fingerprinting, cookies, authenticated tracking, cross-device tracking and other methods used by companies and apps. The threat of large-scale data breaches is a pan-industry problem. Choice quotes: - "No matter what market you’re in, no matter what service you provide or product you sell... from right now until the end of time, you’re in the privacy game. Welcome." - Recommendations: 1) "Put security measures in place." 2) "NBE transparent." 3) "Collect only what you need." 4) "Offer customers a choice." 5) "Don’t sell customers’ data." http://www.wired.com/2015/03/privacy-revolt-growing-demand- privacy-service/ |
Post 301
Leave Facebook if you don't want to be spied on, warns EU
European Commission admits Safe Harbour framework cannot ensure privacy of EU citizens’ data when sent to the US by American internet firms http://www.theguardian.com/technology/2015/mar/26/leave-facebook-snooped-on- warns-eu-safe-harbour-privacy-us |
Post 302
Article on TechCrunch about what we can learn about recent cyber attacks from SONY
and ISIS. The ISIS hacker has been able to break into many US websites and put black ISIS flags on the sites. http://techcrunch.com/2015/03/24/the-new-threat-environment/ |
Post 303
http://www.zdnet.com/article/another-reason-to-hate-the-nsa-china-is-
backing-away-from-us-tech-brands/ China investing less in US tech brands because of privacy concerns |
Post 304
Link: http://www.washingtonpost.com/blogs/federal-eye/wp/2015/04/16/think-
before-you-post-heres-the-new-federal-workforce-guidance-on-social-media/? tid=pm_politics_pop_b There is now a "Standard of Conduct" for federal employees on how they can use social media. Here's an example of that from the above article: "It says, for example, that there is no violation of the ban on soliciting donations for parties or partisan candidates if a social media “friend” of a federal employee posts a link to the contribution page of a partisan candidate on the employee’s page. However, the employee should not “like,” “share,” or “retweet” the solicitation, “or respond in any way that would tend to encourage other readers to donate,” it said." |
Post 305
Boston Bombing still under questioning Boston Marathon Surveillance Raises Privacy Concerns Long After Bombing http://www.npr.org/2015/04/17/400164221/boston-marathon-surveillance-raises- privacy-concerns-long-after-bombing |
Post 306
http://www.allgov.com/news/where-is-the-money-going/1-billion-dollar-tsa-
behavioral-screening-program-slammed-as-ineffective-junk-science- 150323?news=856031 TSA has spent over a billion dollars developing a behavioral screening program which the ACLU alleges is "junk science". |
Post 307
"GranitePhone is designed to keep your personal data secure, and
prevent leaks" An article about a new smartphone built by a Brazilian "from the ground up" to guarantee safety and security for clients' data. They initially designed and became known for their secure messaging technology and now expanded the the same secure communication concept to an entire phone. However, it is EXPENSIVE - $800. Bummed to see that privacy and personal data protection have such a high price tag... http://www.digitaltrends.com/mobile/sikurs-granitephone-secure/ |
Post 308
http://www.bloomberg.com/news/articles/2015-02-24/brazil-s-untappable-
phone-seen-buoyed-after-rousseff-spy-scandal |
Post 309
To protect its 100 million users, the live-stream video service for gamers says it has
reset all passwords and disconnected user accounts from Twitter and YouTube. http://www.valuewalk.com/2015/03/twitter-foursquares-location-tagging/ |
Post 310
On the Road In Mercedes Sci-Fi Self-Driving Car of 2030
Mercedes Benz recently unveiled the F 015 concept car, a luxury self-driving vehicle. This article analyzes components of the vehicle, projected to release around year 2030. The car as of right now is in prototype phase, so it hasn’t been driven in public roads like the Google car has. The interior has been completed, however. The car will include features like smartphone activation, which means an app can signal your car to come to you. The question is then posed, are we so wrapped up I our own worlds that we don’t want to interact with the outside world anymore through driving ourselves? I think it is safe to say most automaker companies think so. German, American or Japanese automakers are making moves in the driverless space. https://www.yahoo.com/autos/bp/on-the-road-in-mercedes-sci-fi-self- driving-car-of-2030-154837903.html |
Post 311
"EU Formally Accuses Google of Antitrust Violations"
http://www.wired.com/2015/04/eu-google/ "On Wednesday the EU’s executive branch, the European Commission, announced it had served the company with a formal complaint known as a Statement of Objections. If Google is ultimately found guilty of violating the law, the EU could reportedly level fines as large as $6.4 billion—roughly 10 percent of Google’s operating revenue." |
Post 312
Uber Launches Auto Rickshaw Service In India, Allows Cash Payments For First Time
http://techcrunch.com/2015/04/09/uber-autorickshaw-india/ Uber is expanding! What's next? How are cash payments being managed and protected? |
Post 313
http://www.wsj.com/articles/google-makes-most-of-close-ties-to-white-house-
1427242076?mod=WSJ_hp_RightTopStories This article describes the lengths that Google goes to to lobby the federal government. in 2014 Google spend 16.8 million dollars lobbying. |
Post 314
http://techcrunch.com/2015/04/08/youtube-confirms-plans-for-an-ad-free-
subscription-based-service/ YouTube is making a subscription-based service, which could mean good things for allowing people to not be tracked. |
Post 315
http://www.cnet.com/news/get-blur-lifetime-privacy-protection-for-43-99/
I only stumbled upon this, but it seems like a really interesting way for a company to monetize privacy. Blur is a plugin and software that allows you to mask passwords, block trackers, etc. But what I found cool was that Blur will generate momentary email addresses for you when you need to enter something into a company's website for instance to then verify that you are real. |
Post 316
http://blogs.wsj.com/digits/2015/02/27/google-reverses-ban-on-explicit-material-
on-blogger/?mod=ST1 Google now plans on not banning bloggers for posting sexually explicit material online. This statement comes a few days after Google decided to take harsher measures against bloggers who posted sexually explicit materials on its blog platform. |
Post 317
http://www.washingtonpost.com/blogs/the-
switch/wp/2015/03/19/republicans-cant-overturn-the-fccs-new-net- neutrality-rules-without-this-democrat-and-hes-not-playing-along/? tid=rssfeed It's no secret that Republicans want to replace the Federal Communications Commission's new net neutrality regulations with legislation. But they need Democrats to do it — and at least one prominent liberal is signaling that he won't go along with the plan unless the GOP substantially changes the deal on the table. Sen. Bill Nelson (Fla.) is the top Democrat on the Senate Commerce Committee. On Wednesday, he reiterated what he's been saying for weeks: That he's open to working with Republicans on a "truly bipartisan" bill aimed at preventing Internet providers from speeding up, slowing down or blocking Web sites. But he'll only cooperate, he said, "provided such action fully protects consumers, does not undercut the FCC's role and leaves the agency with flexible, forward-looking authority to respond to the changes in this dynamic broadband marketplace." |
Post 318
RadioShack Sale Sparks Data Privacy Concerns
http://www.usnews.com/news/articles/2015/03/27/radioshack-sale-sparks-data- privacy-concerns "Consumer electronics retailer RadioShack, which filed for bankruptcy in February, is considering selling consumer information as part of its bankruptcy proceedings." |
Post 319
http://www.businesstimes.com.sg/technology/european-privacy-
watchdogs-join-forces-to-probe-facebook Many European data protection authorities have joined the effort in investigating Facebook's privacy controls. |
Post 320
ShotSpotter: NYC technology that claims to help police reduce gun violence
also records background conversations |
Post 321
"Your Embarrassing Online Searches About Health Problems Aren’t Private"
91% of health-related webpages leak the information searched for to third parties like data brokers, social networks, and advertisers. These third parties can personally identify people and target specific ads based on websites visited, even if incognito mode is being used. http://time.com/money/3721200/health-privacy-online/ |
Post 322
"How the U.S. thinks Russians hacked the White House"
http://www.cnn.com/2015/04/07/politics/how-russians-hacked-the-wh/index.html "While the White House has said the breach only affected an unclassified system, that description belies the seriousness of the intrusion. The hackers had access to sensitive information such as real-time non-public details of the president's schedule. While such information is not classified, it is still highly sensitive and prized by foreign intelligence agencies, U.S. officials say." |
Post 323
http://www.cio-today.com/article/index.php?story_id=020000OU7QTO
Article on a company that is guaranteeing data protection no matter how long the data has already been online. Seems like a stretch to me. |
Post 324
Even the most secure systems are vulnerable
http://www.businessinsider.com/hackers-found-a-way-to-get-into-nearly- every-computer-2015-3 |
Post 325
David Brooks ruminates about the meaning of privacy in the context of cop body
cameras. He says that "Society will be more open and transparent, but less humane and trusting" and he thinks this is so because having the monitoring of police will make the relationships they have with citizens less personal. He is worried that even though it will help keep police more accountable and less likely to abuse their power and hurt people, "less than 1 percent of police-citizen contacts involve police use of force" and this is harmful to the overall relationship between law enforcement and the rest of society that doesn't include that use of force component. http://www.nytimes.com/2015/04/14/opinion/david-brooks-the-lost-language-of- privacy.html |
Post 326
Tim Cook speaks out against government attempts to weaken encryption:
http://www.theguardian.com/technology/video/2015/feb/13/tim-cook-white- house-summit-video |
Post 327
"Scientists To Investigate Government Climate Data ‘Tampering’"
Government agencies such as the NOAA and NASA make adjustments to data on climate change to attempt to remove biases in the data. However, some scientists argue that the adjustments "pretty much always increase the warming trend in the data to reinforce the theory that human activities are the main cause of warming in the past few decades." Even though the original data may have biases in it, by adjusting the data, suspicion is created around the adjustments and questions about the government's role in scientific data collection are brought to light. This issue of creating new trends in data by tampering with it is concerning, especially when it deals with an important issue like climate change. http://dailycaller.com/2015/04/27/scientists-to-investigate-govt-climate-data- tampering/ |
Post 328
New Privacy Glasses to avoid facial detection by photos
http://www.dailymail.co.uk/news/article-2976772/Privacy-glasses-debut-make- invisible-facial-recognition.html |
Post 329
Gogo in-flight Wi-Fi serving spoofed SSL certificates
http://www.zdnet.com/article/gogo-in-flight-wi-fi-serving-spoofed-ssl- certificates/ |
Post 330
Virtual Reality?
http://www.reuters.com/article/2015/03/26/us-facebook-conference- idUSKBN0MM2Z020150326 |
Post 331
Artists in NYC installed an art installation as an ode to Edward Snowden in a
Brooklyn, NYC park. Because it was unauthorized, it was taken down. http://mashable.com/2015/04/06/snowden-sculpture-fort-greene-brooklyn/ |
Post 332
http://www.slate.com/articles/business/moneybox/2015/04/bot_makes_2_4_
million_reading_twitter_meet_the_guy_it_cost_a_fortune.html Possibility - A new twitter reading "robot" computer program has made millions in the stock market. Several days ago, someone from the Wall Street Journal posted about a stock about to rise. Faster than any human could, a lot of that stock was snapped up. It was theorized, but not confirmed, that a new computer program allowed a robot to find, interpret, and buy stock based on the tweet. This has happened several times and documented by several traders, but no one has stepped forward to claim the bot. If true, there are huge consequences. First, the possibility for huge mistakes made by robots that cost millions. On the other hand, by reading someone's public tweets, a computer program could change the industry forever. |
Post 333
http://www.washingtonpost.com/world/national-security/us-to-
inform-americans-whether-they-are-on-no-fly-list-and-possibly- why/2015/04/14/beeefae2-e2ba-11e4-905f-cc896d379a32_story.html National Security can now inform Americans if they're on the no- fly list. |
Post 334
The current debate over ALPR's going on in Washington:
https://www.minnpost.com/politics-policy/2015/04/how-politics- data-privacy-defy-party-labels-minnesota |
Post 335
"Location Is Your Most Critical Data, and Everyone’s Watching"
This article was basically a summary of one of our class's main themes: with growth in technology and data collection comes growth in privacy concerns. Apps rely on tracking locations to improve the quality of the user's experience on devices. Location is key to allowing Google, Apple, and other companies determine what you need when you are in a specific location and time, and deliver it to you instantly. However, with these benefits come harms to privacy. Advertisers, credit agencies, and the government can all get access to our data without notifying us that they have it or allowing us to have any control over who gets access to our data. "Location-tracking lets developers build fast, useful, personalized apps. They’re enticing, but they come with tradeoffs: your gadgets and apps maintain a log of where you’ve been and what you’re doing, and more of them than you think are sharing that data with others." http://www.wired.com/2015/04/location/ |
Post 336
In September, German data protection authorities told Google the company
had illegal access to private data with proper consent. Particular sensitive data that was addressed included: “travel plans using its location data, users' interests by evaluating search engine use, financial status by analyzing collected data, and even infer sexual orientation and relationship status.” Google appealed the accusation made by German officials, only to find out yesterday the chancellor ruled the company appeal unworthy. Like in other countries, Google might face significant fines unless certain changes are made. http://www.zdnet.com/article/germany-throws-out-googles-objections-to- data-privacy-rules/ |
Post 337
Some more information on the Kaspersky Lab findings
http://www.reuters.com/article/2015/02/16/us-usa-cyberspying- idUSKBN0LK1QV20150216 |
Post 338
http://www.npr.org/2015/04/17/400164221/boston-marathon-surveillance-raises-
privacy-concerns-long-after-bombing This article poses the question about surveillance versus privacy in relation to the Boston Marathon. Cameras on the street were helpful in identifying the bombers two years ago. Since then, even more cameras have been put into place along the streets of Boston. However, people are concerned about their privacy since cameras have become even more high tech and have better resolution than in the past. Whether Boston will be able to find a "sweet spot" has yet to be seen. |
Post 339
http://www.usatoday.com/story/money/2015/04/14/hacking-health-data-
privacy/25597337/ Health data breaches sow confusion, frustration |
Post 340
Microsoft Adopts International Standard For Personal Data, Privacy Protection In Public
Cloud http://www.techtimes.com/articles/33342/20150218/microsoft-adopts-iso-iec- 27018-for-personal-data-privacy-protection-in-public-cloud.htm Microsoft has adopted an international standard (ISO/IEC 27018) for certifying the security of its cloud offerings, making it the first major cloud services provider to do so. "Customers will only use services that they trust," said Brian Smith, general counsel and executive vice president of legal and corporate affairs at Microsoft. "The validation that we've adopted this standard is further evidence of our commitment to protect the privacy of our customers online." "The adoption of this standard reaffirms our longstanding commitment not to use enterprise customer data for advertising purposes," Smith added. |
Post 341
Ryan Pate, 30, has been charged in the UAE with cyber slander against his
employer http://www.businessinsider.com/ryan-pate-jailed-in-the-united-arab- emirates-for-facebook-posts-made-in-the-us-2015-3#ixzz3TrUo7GHj |
Post 342
"Today In Creepy Privacy Policies, Samsung’s Eavesdropping TV" - Feb 8
Tech Crunch had a really funny/spooky article on Samsung's new tv. The concern is that the TV can eavesdrop on conversations that you are having in the room. Be sure to check out how closely the privacy policy mirrors the text of 1984! http://techcrunch.com/2015/02/08/telescreen/ |
Post 343
http://www.theguardian.com/technology/2015/apr/10/facebook-admits-it-tracks-
non-users-but-denies-claims-it-breaches-eu-privacy-law?CMP=share_btn_tw This article is about something we talked about in class briefly - Facebook's tracking of individuals who do not actually have Facebook accounts. According to the article, Facebook has admitted recording information about individuals who do not have accounts, but has argued that that data was only being recorded as a result of a bug. Whereas in the United States Facebook has been able to avoid much legal trouble, in the EU they are being called in violation of privacy rights. This article reflects not just a potential cultural difference in the way that the US and EU think about privacy rights, but also the idea that as our understanding of Facebook's (and other huge tech companies) methods gets better, the more reasons we may have to be suspicious of their practices. |
Post 344
"‘Just Follow the Damn Constitution’ – Congressman Lashes Out at Security
Officials Who Want More Surveillance" The District Attorney for Suffolk, MA, Daniel Conley, testified before the Congressional Subcommittee on Information Technology in support of expanding the power law enforcement has to access data during investigations: "When unaccountable corporate interests place crucial evidence beyond the legitimate reach of our courts, they are in fact placing those who rape, defraud, assault and even kill in a position of profound advantage over victims and society." In response, Congressman Ted Lieu from California described the importance for tech companies to prioritize privacy over security for the benefit of the American public: "Why do you think Apple and Google are doing this? It’s because the public is demanding it. People like me: privacy advocates. A public does not want an out- of-control surveillance state. It is the public that is asking for this." http://www.ijreview.com/2015/05/310767-rep-ted-lieu-lashes-congress- cybersecurity-just-follow-damn-constitution/? utm_source=facebook&utm_medium=organic&utm_content=conservativedaily&utm _campaign=Politics |
Post 345
http://www.politico.com/story/2015/03/privacy-bill-wouldnt-stop-data-mining-of-
kids-116299.html Privacy bill wouldn't stop data mining of kids |
Post 346
http://www.theguardian.com/technology/2015/apr/09/data-protection-
concerns-72-of-britons-in-post-snowden-world-research-shows 72% of Britons care about privacy. This is a very high proportion compared to Americans that care about privacy. Does this reflect a prevailing difference between how much Europeans care about privacy compared to Americans? |
Post 347
Nepal bans drones for fear of sensitive data leak Read more at:
http://indiatoday.intoday.in/story/nepal-bans-drones-sensitive-information- leak/1/433933.html Following the devastating earthquake on April 25, some foreign media and aid organisations used drones to track the scale of devastation and broadcast information. The civil aviation agency claimed that it has learnt that some used drones to take pictures and videos of valuable heritages of Nepal which could be misused later, IANS reported. |
Post 348
http://www.huffingtonpost.com/2015/03/09/isis-hacks-websites_n_6828770.html?
ir=Technology "Someone hacked into several U.S. and European websites over the weekend, claiming to be affiliated with ISIS." |
Post 349
http://www.computerworld.com/article/2912622/data-privacy/eu-data-
protection-reform-triggers-privacy-warning.html People are concerned that new EU data-protection reform proposals will undermine civil liberties. Privacy protections may even be weaker than they are now. |
Post 350
The Pew Research Center finds that individuals are more likely to alter their internet
and social media use post-Snowden revelations, and that the great majority of them have heard of these revelations. The survey finds that "the revelations of the mass government surveillance programs has definitely impacted the way certain segments of the American population now view their privacy — but that hasn’t yet translated into behavior changes." What was really interesting was that rather than impelling people to adopt privacy enhancing tools, like Tor, knowledge of government spying made them less likely to do so for fear it would make them stand out. Is this an early adoption issue with encrypted and anonymity tools, where if more people joined it would be less likely that anyone would feel as though they stood out? Here's the relevant quote on that: "Other respondents viewed activities such as the use of encryption or anonymity software like Tor as something that might raise suspicion and make them a target for monitoring..." Link: http://www.pbs.org/mediashift/2015/03/pew-survey-snowden-leaks-are- affecting-the-way-americans-view-privacy |
Post 351
http://wvpublic.org/post/who-keeps-track-if-your-surgery-goes-
well-or-fails |
Post 352
http://www.sfgate.com/bayarea/article/AT-T-wants-139-a-month-or-your-
privacy-for-6168986.php AT&T is changing their plan so you can buy your privacy. An opt in, if you want superfast internet you can either pay $139 a month, or let them use the information they gather from your phone. The option is yours. Unless you know, $139 a month is something you can't afford in which case the lower classes are forced to give up their privacy. |
Post 353
http://www.bloomberg.com/news/articles/2015-02-06/how-credit-agencies-
make-it-harder-to-know-you-ve-been-hacked "Fraud alerts are free, protected under the federal Fair Credit Reporting Act, and attach notes to credit reports stating that lenders must call or take other special precautions before granting credit in someone's name. It's not a catch-all remedy against identity theft but it's a great place to start. The three major credit bureaus, however, have made it more difficult to set up fraud alerts." |
Post 354
http://www.theverge.com/2015/5/1/8530865/step-two-of-redacted-surveillance-
guide-raises-questions-about-step |
Post 355
http://www.wired.com/2015/04/house-passes-cybersecurity-bill-despite-privacy-
protests/ The House passed a cybersecurity bill that would allow for greater cooperation between corporations and government agencies in the event of a security breach or hacker attack. This would allow corporations and government agencies to warn one another about the tools and techniques that are being used by malicious entities. Privacy advocates worry that it'll open a back channel for surveillance, granting companies legal immunity to share their users' data with government agencies like the NSA. |
Post 356
http://www.al.com/news/index.ssf/2015/04/auburn_university_could_have_s.html
Auburn University data breach: Answers wanted after information about 364,012 people was leaked Hundreds maybe even thousands of people who didn't attend and didn't even apply to Auburn University were a part of the data leak where personal information, including name, address, email address, birth date, Social Security number and academic information, was inadvertently exposed on the university's website. |
Post 357
http://bits.blogs.nytimes.com/2015/02/27/uber-driver-database-breached-by-
someone-outside-company/? rref=technology&module=Ribbon&version=context®ion=Header&action=click&c ontentCollection=Technology&pgtype=article Uber's database of drivers was broken into by a hacker, who stole information from the drivers. If it is possible to steal driver info, one would assume that passenger info is not far behind? Everyone who has an Uber has their credit card linked to their Uber account. |
Post 358
You Can Now Serve Divorce Papers on Facebook
http://time.com/3772614/facebook-divorce-summons-blood-dzraku/ Maybe not directly related to the course, but kind of entertaining article about social media spreading into legal sector "He has, however, kept in touch from time to time with his wife on Facebook. And so, the social networking site has been deemed an appropriate place to serve Blood-Dzraku with a summons for a divorce proceeding" |
Post 359
Patraeus avoiding jail time for leaking material to mistress
http://readersupportednews.org/news-section2/318-66/28876-ex- cia-chief-petraeus-pleads-guilty-to-leaking-classified-info-to- mistress-gets-misdemeanor |
Post 360
http://news.yahoo.com/exclusive-iran-smuggles-1-billion-bank-
notes-skirt-145801586.html Money smuggled into Iran ($1B) |
Post 361
Google is facing an antitrust lawsuit in the EU that could have big consequences:
"The E.U.’s current accusations are focused on its assertion that Google unduly favored its own comparison-shopping tool called Google Shopping over those from competitors. Vestager said the inquiries into other areas — Google Maps and Google Travel, among them — were ongoing. The E.U. also announced that it was opening an investigation into potential anti-competitive practices with Google’s Android mobile operating system." http://www.washingtonpost.com/business/economy/google-faces-antitrust-charges- by-european-regulators/2015/04/15/c3845b46-e31a-11e4-81ea- 0649268f729e_story.html |
Post 362
Really nice comprehensive article about the FCC Net Neutrality Vote
http://www.npr.org/blogs/thetwo-way/2015/02/26/389089145/the-fccs-net- neutrality-vote-heres-what-you-need-to-know |
Post 363
http://www.usatoday.com/story/tech/2015/02/04/fcc-tom-wheeler-net-
neutrality/22872753/ "Consumer advocates had concerns when Tom Wheeler, a former lobbyist for both the cable and wireless industries, became chairman of the Federal Communications Commission. But on the issue of net neutrality, the FCC chief shares common ground with them. He's recommending to the full commission the strongest regulations the agency has ever considered to protect an open Internet." |
Post 364
http://www.bbc.com/news/science-environment-32282131
This robot chef could soon be the next addition to the internet of things within your home - its smart technologies should help the robot learn to cook like a human, but the wealth of data it collects and its online capabilities require attention to privacy and security in order to protect the user. |
Post 365
http://www.forbes.com/sites/davelewis/2015/02/28/uber-suffers-data-
breach-affecting-50000/?ss=Security "Uber Suffers Data Breach Affecting 50,000" "In a blog post from Uber’s website they state that the data which was accessed, by an unknown third party, only contained names and drivers licenses." |
Post 366
"The Lost Language of Privacy"
An article that discusses the benefits and disadvantages of police body-worn cameras, particularly in terms of privacy. The author says that on balance, cop-cams are a good idea, but they create distance between police officers and the community, inhibiting the formation of relationships and community policing. Choice quote: - "Cop-cams strike a blow for truth, but they strike a blow against relationships. Society will be more open and transparent, but less humane and trusting." http://www.nytimes.com/2015/04/14/opinion/david-brooks-the-lost- language-of-privacy.html?_r=0 |
Post 367
http://www.pcworld.com/article/2894392/privacy-advocates-worry-ahead-of-eu-
data-protection-talks.html |
Post 368
http://www.wsj.com/articles/europe-wants-the-world-to-embrace-its-data-
privacy-rules-1424821453 European companies lag the rapid expansion and dominance of American technology companies (i.e. Google, Facebook). In order the level the playing field, European officials have proposed “new rule book for the Web.” This rule book will set standards that even American companies would have to follow. The ultimate goal is to make this new privacy regime global. EU officials are conducting meetings in D.C. and Silicon Valley right now. |
Post 369
http://www.firstpost.com/business/net-neutrality-telcos-
misleading-us-calling-apples-oranges-issue-2195984.html We might be deliberately misled by Telcos regarding net- neutrality. |
Post 370
Wikipedia is Suing the NSA
http://www.nationaljournal.com/tech/wikipedia-is-suing-the-nsa-20150310 Sounds like the Supreme court might also get involved: "The NSA is in the throes of battling litigation challenging its surveillance programs. Three cases currently at the Appeals Court level challenge the agency's bulk collection of U.S. call metadata—the first program exposed by Snowden— and any split in those cases could ultimately portend a Supreme Court review." "Eight other organizations, including Human Rights Watch and Amnesty International, are joining Wikipedia's challenge, which is being represented by the American Civil Liberties Union." |
Post 371
China halts the implementation of their banking tech guidelines this morning. Should
ease the tension somewhat between Washington and Beijing. The ambassador said that the decision came after getting feedback from the banks. Seems likely that the US put some pressure there as well. http://www.wsj.com/articles/china-halts-implementation-of-banking-tech- guidelines-1429181094 |
Post 372
http://www.marshallindependent.com/page/content.detail/id/832242/Lawmaker-
wants-to-restrict-access-to-birth-certificate-data.html?isap=1&nav=5028 Really interesting article in a local newspaper about how lawmakers want to restrict access to certain information on birth certificates. Definitely relevant to the conversations we were having earlier this semester about who should have our data, if they can be trusted, and the multitude of places this data could potentially circulate. |
Post 373
Linkedin agrees to a $1.25 million settlement with users who have passwords stolen.
An example that even if the economic costs of privacy breaches are low for the individual, they can cause class action cases against these firms. http://www.v3.co.uk/v3-uk/news/2396632/linkedin-agrees-usd125m-user-privacy- case-settlement |
Post 374
http://www.nytimes.com/2015/04/10/opinion/why-pilots-still-matter.html?
hp&action=click&pgtype=Homepage&module=c-column-top-span- region®ion=c-column-top-span-region&WT.nav=c-column-top-span-region This opinion piece is about why pilots still matter on plane flights and why pilotless planes are not necessarily a good thing. |
Post 375
http://thejournal.com/articles/2015/03/02/california-senator-introduces-bill-to-
protect-privacy-of-mobile-device-users-gps-data.aspx A bill was introduced in the California State Senate but Congressman Mark Leno about the use of location data from mobile apps. Most apps on an iPhone already ask for express consent about using a consumer's location for the app to work, but this bill would add the stipulation that the app would have to tell the consumer how the data is being used, which is especially important if it is being used for more than simply mapping and directions. |
Post 376
http://www.csoonline.com/article/2909653/mobile-security/five-security-
questions-you-should-be-asking-about-the-apple-watch.html Five security questions you should be asking about the Apple Watch 1. How can we ensure that the Apple Watch isn't used as a spying device? 2. Can attackers eavesdrop on watch-to-phone communications? 3. Can we trust the third-party apps? 4. Will corporate applications create privacy issues? 5. Will the Apple Watch make the iPhone more vulnerable? |
Post 377
http://techcrunch.com/2015/02/23/snowden-does-reddit/
Hi Ed! (We could try asking him some questions on behalf of the course) |
Post 378
http://thenextweb.com/insider/2015/03/26/google-joins-apple-microsoft-
and-others-to-call-for-mass-surveillance-reform/? utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+The NextWeb+%28The+Next+Web+All+Stories%29 Google, along with other tech giants like Microsoft, Apple, Facebook and Twitter, is calling on Congress to end the bulk collection of communications metadata by US government agencies like the NSA. |
Post 379
http://yaledailynews.com/blog/2015/04/06/campus-cameras-prompt-privacy-
concerns/ Security cameras around Yale's campus prompt privacy concerns. |
Post 380
http://www.firstpost.com/business/net-neutrality-telcos-
misleading-us-calling-apples-oranges-issue-2195984.html We might be deliberately misled by Telcos regarding net- neutrality. |
Post 381
Safari users win right to sue Google over privacy
http://www.bbc.com/news/technology-32083188 |
Post 382
http://www.theguardian.com/technology/2015/apr/06/data-privacy-europe-
This article addresses the concern of European citizens about online privacy and security, highlighting Austrian Max Schrems’ lawsuit against Facebook over the storage, security and treatment of European users’ data. |
Post 383
http://www.businessinsider.com/afp-new-google-security-chief-looks-for-
balance-with-privacy-2015-4 The company with the slogan, "don't be evil," has hired a new security chief this year, who is looking to brand google as the company that protects users' privacy from encroachment by government spies and hackers. Only 65% of government requests for information are currently accepted by google. At what point is google the one shaping policy and calling the shots? |
Post 384
http://www.engadget.com/2015/03/01/avg-invisibility-specs/
Some really impractical glasses meant to thwart facial recognition software. |
Post 385
http://www.bbc.com/news/technology-31692988
A new fingerprint sensor can read prints through glass, metal, and plastic. It also doesnt matter if you have sweaty hands or hand lotion on. It should make fingerprint scanners more accurate. |
Post 386
This addresses how institution may store the vast amounts of data being
collected. http://www.extremetech.com/extreme/134672-harvard-cracks-dna-storage- crams-700-terabytes-of-data-into-a-single-gram |
Post 387
Sony Xperia Z4 Leaked in Images; Xperia C4 Tipped for July Launch
http://gadgets.ndtv.com/mobiles/news/sony-xperia-z4-leaked-in-images-xperia-c4- tipped-for-july-launch-678802 |
Post 388
http://www.techrepublic.com/article/interana-one-startups-revolt-against-
the-high-priests-of-big-data/ A startup called Interana is making big data queries more accessible to people who do not have experience with SQL queries and making it a lot faster and cheaper for the people who don't have the time or resources to explore big data. This is especially beneficial for small companies who rely heavily on data analytics. |
Post 389
White House Takes Cybersecurity Pitch to Silicon Valley
http://www.nytimes.com/2015/04/27/us/white-house-takes-cybersecurity- pitch-to-silicon-valley.html |
Post 390
The CIA embarked on a sweeping restructuring Friday that will bring an end
to divisions that have been in place for decades, create 10 new centers that team analysts with operators, and significantly expand the agency’s focus on digital espionage. http://www.washingtonpost.com/world/national-security/cia-plans-major- reorganization-and-a-focus-on-digital-espionage/2015/03/06/87e94a1e- c2aa-11e4-9ec2-b418f57a4a99_story.html |
Post 391
http://www.wsj.com/articles/telecoms-are-readying-their-fight-against-net-
neutrality-1428017027?mod=WSJ_TechWSJD_NeedToKnow Key players in the telecommunications industry, in an effort to challenge recent net neutrality regulations, are expected to file a lawsuit against the FCC. The particular claim discussed in this article is whether the FCC provided enough warning before adopting those regulations. |
Post 392
http://thehill.com/blogs/congress-blog/technology/234160-the-case-for-strong-
data-protection-in-the-trans-pacific Article explaining the new article 11 that aims to further protect its citizens data protection rights. |
Post 393
http://www.pcworld.com/article/2914292/ftc-complains-retail-tracking-firm-didnt-
notify-customers.html A great article to read after having conducted the cell phone lab! Nomi Technology apparently was using techniques to track mobile cellphones. Although it claimed to offer an "opt-out" policy, the FTC claims that this wasn't a legitimate option and its not bringing them to court. Good to know that there are organizations out there protecting the customers from things they aren't even aware of! |
Post 394
http://www.politico.com/story/2015/03/privacy-bill-wouldnt-stop-data-mining-of-
kids-116299.html Obama is endorsing a bill that would apparently prevent companies from taking advantage of using student data, but instead, the draft of the bill has loopholes that would still allow companies to sell the data to colleges/universities and other companies who could benefit from it. In short, it is inadequate to protect students in a time when classrooms are becoming increasingly filled with online content and electronic technology. |
Post 395
http://www.mobileworldlive.com/melanoma-diagnostic-app-barred-making-
deceptive-claims The US Federal Trade Commission took action against MelApp, an app that says it can help diagnose or assess melanoma risks in users, barring it from making “deceptive or unsupported claims”. |
Post 396
http://www.cbc.ca/news/canada/new-brunswick/police-body-camera-use-leaves-
many-privacy-questions-1.3050272 As more and more concerns have been raised about police procedures and unnecessary force, many police forces have been using body cameras in order to more effectively document incidents when they occur. Halifax Police Department is one of those forces, though they maintain that it isn't as simple an intervention as one thinks, as questions of when to turn on the technology and when to leave it off in order to respect the privacy of both criminals and victims. |
Post 397
Twitter accounts outside of the US now fall under EU data protection rules
http://www.cio.com/article/2911954/twitter-accounts-outside-of-the-us- now-fall-under-eu-data-protection-rules.html Thanks to some concerns of consumers, Twitter has been urged and has recently just changed some key components of its privacy policy over the weekend. A lot of concern has been made about the security and privacy of account information, so this is now going to be more secure. |
Post 398
http://www.bbc.com/news/world-us-canada-31523207
Drones, drones, and drones! |
Post 399
http://rt.com/usa/249749-lawyer-hard-drive-police-malware/
A lawyer representing whistleblowers on police receives a hard drive from the police at his request for evidence. That hard drive had three separate types of surveillance malware meant to intercept his passwords and correspondence. |
Post 400
TESLA April Fools: TESLA Model S introduces Ticket Avoidance Mode
https://www.youtube.com/watch?v=bn1uzAJk-6o |
Post 401
How Children View Online Privacy Differently from Adults
There is a generation gap among digital users. Adults are growing increasing uncomfortable sharing their information and protecting their security. Children, on the other hand, are posting that much more. Pew Research studied American children and "found that 91% of 12-to-17-year-olds posted selfies online, 24% posted videos of themselves. Another 91% were happy posting their real name, 82% their birthday, 71% where they live and the school they attend, 53% their email address and 20% their mobile phone number." The numbers are hugely smaller when the study looked into higher age groups. The question is how do you shift their attitudes so that children take the necessary steps to contain their personal data. http://mybroadband.co.za/news/security/124148-how-children-view-online- privacy-differently-from-adults.html |
Post 402
NSA authorization to collect bulk phone data extended to June 1
"The government said it had asked for reauthorization of the program as reform legislation, called the USA Freedom Act, was stalled in Congress. The bill would require telecommunications companies rather than the NSA to hold the bulk data, besides placing restrictions on the search terms used to retrieve the records." http://www.pcworld.com/article/2890952/nsa-authorization-to-collect- bulk-phone-data-extended-to-june-1.html |
Post 403
http://www.torontosun.com/2015/04/17/750m-class-action-lawsuit-filed-
against-bell-canada-for-alleged-privacy-breach $750 class action lawsuit against bell Canada for illegally tracking customer browsing and then selling the information on to advertisers. Given how frequently we see these cases, the amounts are too puny for companies to care. |
Post 404
Once a field of self-taught hackers, cybersecurity education shifts to
universities Over the past year, colleges and universities across the country have received millions in funding from the government and foundations to launch cybersecurity initiatives. The result is a stark change for an industry made up of programmers who have often learned by trial and error. Cybersecurity taught in a school setting can decrease the financial burden on individuals wanting to learn about cybersecurity, can minimize the trial-and-error problem, and can have access to other key resources to aid learning. http://www.csmonitor.com/World/Passcode/2015/0422/Once-a-field-of-self- taught-hackers-cybersecurity-education-shifts-to-universities |
Post 405
http://today.uconn.edu/blog/2015/04/patchwork-of-privacy-laws-surround-
office-email/ The patchwork of privacy laws that surround email in the workplace is a swamp of different legislation. Interestingly, employee protection when posting potentially damaging notes on social media about the company they work for is protected in different ways for public and private employees. Public employees are protected by the first amendment, whilst private employees are only protected in instances where your comment can be defined as “concerted activity” for the purpose of “mutual aid or protection.” |
Post 406
http://www.circare.org/dw/schulz_ex1.pdf |
Post 407
Twitter changing the way it sells its user data.
http://bits.blogs.nytimes.com/2015/04/11/twitters-evolving- plans-to-make-money-from-its-data-stream/ |
Post 408
Amazing
http://www.ted.com/talks/raffaello_d_andrea_the_astounding_athletic_powe r_of_quadcopters#t-25555 |
Post 409
http://www.theverge.com/2015/4/30/8520051/eu-probe-us-tech-giants-single-
digital-market |
Post 410
http://blogs.wsj.com/cio/2015/04/22/the-morning-download-microsoft-
announces-stronger-privacy-encryption-for-cloud-software-email/ Microsoft releases a feature called Lockbox that gives more control to companies (and people?) over what information Microsoft can access in the cloud and when. Microsoft will also be offering stronger encryptions to customers. |
Post 411
Dominika Sarnecka
A slew of 30,000 leaked Swiss HSBC bank account details—what the Guardian calls the "biggest banking leak in history"—lays bare the practices of the organization and its customers. http://gizmodo.com/leaked-data-from-30-000-swiss-bank-accounts-reveal-mass- 1684629495? utm_campaign=socialflow_gizmodo_facebook&utm_source=gizmodo_facebook&utm_ medium=socialflow |
Post 412
Hilary Clinton explains that she used the personal account for her emails for the sake of
"convenience". http://www.bbc.com/news/world-us-canada-31819843 |
Post 413
http://thinkprogress.org/justice/2015/04/20/3648809/fight-body-cams-
trump-privacy-concerns/ This article discusses privacy concerns surrounding body cams worn by police officers. While such cams give insight and accountability to officers who commit police brutality, they can also potentially raise privacy concerns for those who are filmed. |
Post 414
California bill aims to protect ride-sharing passengers' privacy
The bill would limit the personal information that services such as Uber and Lyft can request or require from their customers. http://www.cnet.com/news/california-bill-aims-to-protect-ride-sharing-passengers- privacy/ |
Post 415
Europe’s Data Privacy Draft Likely to Irk U.S. Technology Companies
http://www.wsj.com/articles/europes-data-privacy-draft-likely-to-irk-u-s- technology-companies-1426259123 |
Post 416
http://www.theverge.com/2015/4/21/8460837/open-data-attitudes-america-
pew-report While Americans have an increased concern of who is using or storing their personal data, a majority of people support open government data on teacher performance and criminal records, because these things are less personal and affect others. |
Post 417
http://molbio.princeton.edu/labs/images/ploss/documents/Alexander_Ploss
_CV_2013b.pdf |
Post 418
http://www.theguardian.com/technology/2015/apr/06/data-privacy-europe-
Data privacy: the tide is turning in Europe – but is it too little, too late? |
Post 419
TRAI’S Website Hacked After It Makes Emails of a Million Public
The Telecom Regulatory Authority of India, TRAI, was hacked. "Thanks to TRAI's honesty policy, which made e-mail IDs and names of around a million people who wrote to on the issue of net neutrality public, the hackers found a reason to rejoice. As the social media exploded with netizens blaming TRAI for failing to preserve their secrecy, Hacker group Anonymous India moved a step further and brought down the TRAI website." http://www.businessinsider.in/Hack-Alert-TRAIS-website-hacked-after-it- makes-emails-of-a-million-public/articleshow/47079748.cms |
Post 420
https://www.insidehighered.com/news/2015/01/23/complainant-
unprecedented-walter-lewin-sexual-harassment-case-comes-forward The recent scandal related to MIT's professor Walter Lewin opens a whole new debate in the realm of Online Courseware: Do online students/professors have the same rights and responsibilities as students/professors on-campus or should we develop a new set of rules or guidelines for the digital class frame? |
Post 421
http://bgr.com/2015/04/14/facebook-chat-privacy-and-scans/
Heard of Recorded Future? No? It's probably heard of you. This company is funded by both Google Ventures and the CIA, and it reads all Facebook chat messages. What's not clear is whether they're working alongside Facebook, or just taking advantage of the Facebook chat to record... everything. |
Post 422
-White House Proposes Broad Consumer Data Privacy Bill:
http://www.nytimes.com/2015/02/28/business/white-house-proposes- broad-consumer-data-privacy-bill.html -Obama finally carries through on a promise he made a few years ago proposing a bill intended to provide Americans with more control over the personal information with more checks and regulations on companies that collect and use the data. It applies common-sense protections to personal data by calling on industries to develop their own codes of conduct when handling consumer information. The FTC is in charge of making sure those codes are up to par with other standards. It is meant to fill in the gaps between preexisting data privacy laws . |
Post 423
http://www.csmonitor.com/World/Passcode/2015/0216/Web-privacy-is-the-
newest-luxury-item-in-era-of-pervasive-tracking Basically ways to protect your privacy,whether it be your emails, personal information, or location are being sold as a sort of luxury item for the privacy conscious. |
Post 424
Ajusto app that watches your driving habits leads to privacy concerns
http://www.cbc.ca/news/business/ajusto-app-that-watches-your-driving-habits- leads-to-privacy-concerns-1.3019787 |
Post 425
Obama administration fights for right to use cellphone kill switch
Adopted without public notice or debate, Standard Operating Procedure (SOP) 303, often referred to as the cellphone kill switch, has been shrouded in secrecy from its inception and has outraged some civil liberties groups battling to make the policy public. http://america.aljazeera.com/articles/2015/4/26/obama-fights-for-secrecy- cellphone-kill-switch.html |
Post 426
Snapchat shares more data with the government than any other social
media app http://fortune.com/2015/04/02/snapchat-transparency-report/ |
Post 427
http://www.wsj.com/articles/at-t-to-pay-25-million-to-settle-fcc-privacy-
breach-case-1428519807 AT&T leaked confidential information on over 280,000 subscribers so that resellers could unlock used phones —the FCC consequently launched an investigation in 2014. AT&T just settled this claim for $25 million. |
Post 428
http://www.pcworld.com/article/2892472/privacy-advocates-find-obama-proposal-
lacking.html "Privacy advocates find Obama proposal lacking" Even though the "consumer privacy bill of rights" appears to give consumers control over their data, through codes of conduct, companies will be allowed to freely collect personal data without strong restrictions and privacy/consumer protection groups believe the protections it offers are too weak to help consumers. "The proposal appears to allow companies holding personal data to limit consumer control over it based on the companies’ assessment of risk to personal privacy or their decision that they hold the data in a manner that is “reasonable in light of context,” according to its text." |
Post 429
http://www.bloomberg.com/news/articles/2015-04-08/google-loses-challenge-to-
german-regulator-s-data-privacy-order In Germany, a new order by German regulators is limiting how Google can use consumer browsing and internet data. Google lost almost all of its arguments in its attempted objection to the order, and the quest to limit the data usage was led by a joint European group of regulators. |
Post 430
http://www.secureidnews.com/news-item/iris-vs-retina-biometrics-yes-they-really-
are-different/ Interesting and relevant article about the difference between retina and iris scan. "Retinal scanning, on the other hand, requires a very close encounter with a scanning device that sends a beam of light deep inside the eye to capture an image of the retina. Since the retina is located at the back of the eye, retinal scanning is not widely accepted due to the intrusive process required to capture an image." |
Post 431
http://techcrunch.com/2015/04/26/internet-privacy-is-the-wrong-
conversation/#.dtmnie:TrnH Essentially says that tracking is here to stay, the internet simply is not a private place and we kind of know that. The article argues that instead we should be demanding transparency from the companies about their practices. They should always know who is tracking them, how, when where and why. |
Post 432
My best friend wrote this!
http://harvardpolitics.com/united-states/net-neutrality-dead-yet/ |
Post 433
http://techcrunch.com/2015/03/21/why-an-open-salary-policy-always-
beats-secrecy/ Why An Open Salary Policy Always Beats Secrecy I think this is an interesting extension to the "Open Social Security Number" concept -- if everyone has access to this information, no one can exploit it |
Post 434
http://www.legalbusinessonline.com/features/prohibition-transfer-personal-data-
hong-kong-soon-come-force/68217 "Prohibition on Transfer of Personal Data from Hong Kong Soon to Come Into Force" Section s.33 of Hong Kong’s Personal (Data) Privacy Ordinance (“PDPO”) finally implemented. This general prohibition of international exportation of Hong Kong data, with some exceptions, raises concerns about ripple effects in Hong Kong commerce. I believe this policy's effects will be watched internationally for repercussions and implications. |
Post 435
http://www.usnews.com/news/politics/articles/2015/02/24/some-details-
about-a-homeland-security-shutdown Consequences of a potential Homeland Security Department shutdown |
Post 436
"When Keeping A Secret Trumps The Need For Care"
This article tackles the intersection between privacy and health insurance, addressing an increasingly prevalent situation involving young adults that stay on their family insurance plans under the provision of the Affordable Care Act. Studies demonstrate that young people often hesitate to get certain types of medical care, such as mental and behavioral health care, birth control and sexual health screenings, because they don't want their parents to find out through insurance statements. However, insurance companies are legally obligated to honor privacy requests in cases where sharing medical information with the parents would endanger the patient, thought it's unclear what needs to be done to prove they're in "danger." This process can also be complicated and daunting. Choice quote: - "'A number of states are struggling with this,' she says. 'Because it's extremely difficult to balance the privacy needs of dependants and the needs of policy holders.'" http://www.npr.org/blogs/health/2015/04/15/399573934/when- keeping-a-secret-trumps-the-need-for-care |
Post 437
There is a new idea featured in the Guardian for giving users control over their own
data. It's being called the Databox: "The underlying philosophy underpinning all attempts to level the online playing field is a belief that an individual’s data belongs to him or herself and that no one should have access to it except on terms that are controlled by the data owner. The hunt is on, therefore, for technologies (software and/or hardware) that would make this both possible and be easy to use. An interesting idea of how to do that surfaced last week in a paper by computer scientists from Queen Mary University of London and Cambridge University. The basic concept is a Databox, a piece of software that collects personal data and then manages how that information is made available to third parties. In essence, it’s “a networked service that collates personal information from all of your devices and can also make that data available to organisations that the owner allows"." Full Article: http://www.theguardian.com/technology/2015/feb/01/control-personal- data-databox-end-user-agreement |
Post 438
http://www.nytimes.com/2015/02/26/technology/limited-high-speed-internet-
choices-underlie-net-neutrality-rules.html?ref=technology&_r=0 "The case for strong government rules to protect an open Internet rests in large part on a perceived market failure — the lack of competition for high-speed Internet service into American homes." |
Post 439
Google Glass isn't dead yet! Eric Schmidt just confirmed that while Glass has been taken
off the market, it's currently being revamped and rumors suggest another release later in 2015. Will the news Glass address the privacy issues revealed in the test run, both for individual users and society? (i.e. movie theaters concerned about Glass users illegally recording films). http://www.cnet.com/news/google-glass-eyewear-isnt-dead-eric-schmidt-confirms/ |
Post 440
New Pentagon Strategy Warns of Cyberwar Capabilities
A new Pentagon cybersecurity strategy lays out for the first time publicly that the U.S. military plans to use cyberwarfare as an option in conflicts with enemies. The strategy says the Defense Department "should be able to use cyber operations to disrupt an adversary's command and control networks, military-related critical infrastructure and weapons capabilities." http://www.nytimes.com/aponline/2015/04/23/us/ap-us-military- cybersecurity.html |
Post 441
http://www.nbcnews.com/tech/tech-news/retail-tracking-company-violated-
privacy-policy-ftc-complaint-alleges-n349006 Relating to our last lab, a retail tracking company has been alleged by the FTC for violating privacy policy with their MAC address tracking. |
Post 442
FTC Upgrades IT to Protect Consumer Privacy, Data Security
http://www.ecommercetimes.com/story/FTC-Upgrades-IT-to-Protect-Consumer- Privacy-Data-Security-81916.html |
Post 443
http://www.slate.com/blogs/future_tense/2015/05/11/carly_fiorina_needs_to
_stop_talking_about_domaingate.html There has been some criticism around the small scandal that is Carly Fiorina's website. As a candidate for the republican nomination for the presidency, lots of talk has centered on the fact that she was unable to secure the domain name carlyfiorina. This is especially humorous, as she has billed herself as the tech candidate. Then, it was found that hilaryclinton.net redirects to Fiorina's website. These acts highlight the rising importance of domain names as a form of personal data. |
Post 444
E-ZPass tags monitored away from toll booths, NYCLU finds
http://www.digitaltrends.com/cars/e-zpass-tags-monitored-away-from-toll- booths-nyclu-finds/ It has come to light that drivers using the E-ZPass to pay for tolls have been tracked without their consent and without an option to opt out. Transportation officials have been using this information to obtain data for traffic congestion studies for the past four years. According to transportation officials these probes are anonymous. |
Post 445
The link for post 488, sorry!
Here it is: http://www.theatlantic.com/technology/archive/2015/04/be-careful-what- you-google/390207/ |
Post 446
How Much Do You Know About Data Privacy? Test Yourself
http://www.wsj.com/articles/how-much-do-you-know-about-data-privacy- 1429499471 |
Post 447
http://works.bepress.com/john_brigham/cv.pdf |
Post 448
http://blogs.wsj.com/digits/2015/02/19/white-house-names-nations-first-chief-
data-scientist/?mod=WSJ_TechWSJD_NeedToKnow The White House hired its first Chief Data Scientist, indicating its commitment to using big data for public purposes. This provides some hope that the government may be embracing technology in policy and governance, and it will be interesting to see exactly what this role will entail. |
Post 449
You can now set up a "no fly drone zone" over your house. NoFlyZone.org, which
launched Tuesday, allows you to register your address in a database so that it becomes "geofenced" and drones will avoid flying over it. Says the founder of the company, "On the one hand we are trying to give people a choice, trying to give property owners a choice in terms of what happens above their property. And that may limit to some extent where devices can fly. But on the other hand, most of the [drone manufacturers] we’re talking to recognize that this is an opportunity for them to sort of seamlessly and easily take a leadership position on these privacy issues and not let it be regulated for them." http://www.slate.com/blogs/future_tense/2015/02/10/noflyzone_org_lets_you_geofe nce_the_area_over_your_house_for_drones_to_avoid.html?wpisrc=obnetwork |
Post 450
This New York Times article (see below), entitled “Bringing Big Data to the Fight Against Benefits Fraud,” sheds light on new, data and predictive analytics-based practices of the New York City Human Resources Administration in detecting fraud among people receiving government benefits. The agency now analyzes data in a computerized pattern- recognition system to detect “anomalies” in recipients’ records of public benefits for which they applied, or other information about their overall property holdings, income, etc. The government then follows up on such anomalies, relying on LexisNexis Risk Solutions, to account for these unusual patterns. This seems to provide a framework for surveillance which diverges from the Panopticon model. In that view, the power of surveillance is in the watched person being aware of the possibility of surveillance and modifying his or her actions accordingly. If it is possible to track each detail of a person’s life and intervene – as in the case outlined above – without their even being aware of it, it seems unclear that the linchpin of surveillance’s power over people will continue to be its visibility and conscious presence in their lives. Quote from article: “A few years ago, the New York City Human Resources Administration decided to try a new way to root out fraud among people receiving government benefits. Data detectives began running benefit recipients through a computerized pattern- recognition system. They discovered that the behavior of a small percentage of people stood out. The anomalies in themselves didn’t constitute fraud, but they pointed the agency’s data scientists in potentially fruitful directions.” Link: http://www.nytimes.com/2015/02/22/technology/bringing-big-data-to-the-fight-against-benefits-fraud.html |
Post 451
"How Netflix is turning viewers into puppets"
http://www.salon.com/2013/02/01/how_netflix_is_turning_viewers_into_puppets/? 123 Interesting article about the use of Big Data to target consumers. It could be controversial to think that the production of TV shows and movies will be based on the data collected from user behavior rather than the artistic merit or quality of the work. It raises questions not only of privacy but of negative interference with another important sphere of society (art) simply to favor consumerism. "Netflix doesn’t just know that you are more likely to be watching a thriller on Saturday night than on Monday afternoon, but it also knows what you are more likely to be watching on your tablet as compared to your phone or laptop; or what people in a particular ZIP code like to watch on their tablets on a Sunday afternoon. Netflix even tracks how many people start tuning out when the credits start to roll." |
Post 452
This is a great article discussing the future of self driving cars and how they
are actually much closer to becoming a reality than most people think. Great highlight of Unit 4 http://www.bloomberg.com/news/articles/2015-05-07/scared-of-self- driving-cars-they-re-a-lot-closer-than-you-think |
Post 453
Title: Proposed student data privacy bill does little to protect privacy
(update) Link: http://www.washingtonpost.com/blogs/answer- sheet/wp/2015/03/23/new-student-data-privacy-bill-in-congress-does-little- to-protect-privacy-analysis/ Politicians in the White House are in the process of introducing a bill to hinder the ways that education technology companies can use data that they collect about students through the grades of kindergarten to the end of high school |
Post 454
http://qz.com/356233/apples-capitulation-to-china-undermines-obamas-
tough-talk-on-snooping/ Apple agrees to give Chinese government access to source code, other benefits to spy on users in China despite President Obama urging American companies to not give in. |
Post 455
The New York Times article that broke the news about Hillary
Clinton's ise of a private email address during her time as Secretary of State: http://www.nytimes.com/2015/03/03/us/politics/hillary-clintons- use-of-private-email-at-state-department-raises-flags.html |
Post 456
Why some Americans have not changed their privacy and security behaviors
A string of revelations over the past two years about the National Security Agency’s domestic and international surveillance efforts have brought new awareness to many Americans about online privacy and security concerns. Yet most American adults have not made significant changes to their digital behavior, and 54% say that it would be “somewhat” or “very” difficult to find the tools and strategies that would enhance their privacy online and when using cellphones, according to a Pew Research Center report. The most common reasons: I have nothing to hide, I do not have the time or expertise, It won’t prevent monitoring anyway, I don’t want to raise suspicions or invite scrutiny, I am comfortable with the monitoring because it makes us safer. http://www.pewresearch.org/fact-tank/2015/04/14/why-some-americans- have-not-changed-their-privacy-and-security-behaviors/ |
Post 457
Are Colleges Invading Their Students' Privacy?
http://www.theatlantic.com/education/archive/2015/04/is-big-brothers-eye-on- campus/389643/ "...colleges in theory could data-mine almost every aspect of a student's life. Institutions can track what students say in online class forums, who downloads the lecture notes, and how long they spend reviewing online material. Institutions can record when and where students swipe their ID cards to follow their physical movements, from the dining hall to the health center." |
Post 458
http://arstechnica.com/security/2015/04/24/critical-https-bug-may-open-
25000-ios-apps-to-eavesdropping-attacks/ A new iOS bug has trouble dealing with https, making it easy for someone to spy on you data. Upwards of 25000 apps may be affected, including several popular banking apps. |
Post 459
Reality of Re-Identification
http://www.csmonitor.com/World/Passcode/Passcode-Voices/2015/0311/In- our-modern-surveillance-state-everyone-can-be-exposed |
Post 460
Pearson has been monitoring students social media posts to see who has been
leaking information about tests they offer. Is this considered corporate due diligence or spying? http://bits.blogs.nytimes.com/2015/03/17/pearson-under-fire-for-monitoring- students-twitter-posts/ |
Post 461
http://techcrunch.com/2015/04/22/european-rights-body-again-
rejects-mass-surveillance/#.1awpzn:jdwS Has mass surveillance helped fight terrorism? |
Post 462
http://www.engadget.com/2015/04/23/house-passes-protecting-
cyber-networks-act/ House passes bill allowing corporations to share your data.. |
Post 463
See who's watching you online in new 'Do Not Track' doc series
http://www.ctvnews.ca/sci-tech/see-who-s-watching-you-online-in-new-do-not- track-doc-series-1.2326015 |
Post 464
The letter I received at my real house:
http://i.imgur.com/TTfcCWF.jpg So basically they want to install a router and make you download apps to track all your internet/media/electronic data. The website: https://www.screenwisetrends.com/ Terms & Conditions (look at privacy sections): https://www.screenwisetrends.com/custom/screenwise/terms.php They claim to give data to "trusted" partners and adhere to privacy standards, but how is this monitored and how can we trust them? |
Post 465
http://www.thedrum.com/news/2015/03/01/uber-admits-data-breach-exposed-
personal-details-50000-drivers |
Post 466
"Feds Update HIPAA Privacy, Security Guidance"
http://www.healthdatamanagement.com/news/Feds-Update-HIPAA-Privacy- Security-Guidance-50257-1.html HIPAA is the federal Health Insurance Portability and Accountability Act of 1996. The primary goal of the law is to make it easier for people to keep health insurance, protect the confidentiality and security of healthcare information and help the healthcare industry control administrative costs. "The federal government has issued updated HIPAA privacy and security guidance to reflect an accelerated move to interoperable exchange of protected health information." |
Post 467
Privacy Legislation Proposed To Balance New Technology
http://www.capradio.org/articles/2015/02/25/privacy-legislation-proposed-to- balance-new-technology/ |
Post 468
http://www.independent.ie/business/irish/data-privacy-is-as-important-as-
tax-google-exec-warns-noonan-31134213.html Ireland's data privacy regime is as important as its tax regime for attracting investment from Google, one of the search engine's most senior international executives warned Michael Noonan at a private meeting late last year. |
Post 469
The Big Data Initiative And What The White House Can Learn From Lewis And
Clark http://www.forbes.com/sites/sungardas/2015/04/23/the-big-data-initiative-and- what-the-white-house-can-learn-from-lewis-and-clark/ - Interesting analogy between big data and Lewis and Clark "First, we need to define our goals. For Lewis and Clark, their goals were 1) survival, and 2) bringing back relevant and practical information in areas such as botany, medicine, geography, anthropology, geology, zoology, etc. Our goals may be to improve security, science, education, economic growth, and so on. But, that being said, what do those things actually mean? Given the amount of big data we have available, we should drill down to specifics within each larger category; in essence, drive the Big Data Initiative from a myriad of smaller, local data initiatives. " |
Post 470
http://www.bbc.com/news/technology-31813289
Wikimedia is suing NSA for mass surveillance, claiming that it violates freedom of speech. The lawsuit is specifically targeting communication with non-US people. |
Post 471
http://blogs.wsj.com/digits/2015/04/09/admitting-tracking-bug-facebook-
defends-european-privacy-practices/?mod=WSJ_TechWSJD_NeedToKnow This article notes that Facebook's European division has responded to claims that it invaded privacy rights of citizens. While the tech company did admit to having had a bug that tracked individuals who were not Facebook users but who visited sites that integrated Facebook, it says that the claims by the Belgian government were overstated. |
Post 472
http://www.scmp.com/news/china/article/1727145/chinese-surveillance-camera-
supplier-confirms-hacking-loophole |
Post 473
http://www.theguardian.com/commentisfree/2015/apr/08/congress-must-
end-mass-nsa-surveillance-with-next-patriot-act-vote "In less than 60 days, Congress will be forced to decide if the NSA’s most notorious mass surveillance program lives or dies. And today, over 30 civil liberties organizations launched a nationwide call-in campaign urging them to kill it." This is Section 215 of the Patriot Act, the one that allows the NSA to take any tangible thing in the name of security. |
Post 474
http://www.computerworld.com/article/2909678/radioshack-presses-ahead-with-
plan-to-sell-customer-data.html RadioShack is filing for bankruptcy, and they are asking a bankruptcy court to sell personally identifiable information (PII) as they action the company's assets. The state of Texas is opposing the sale of PII, and RadioShack has a tentative agreement to sell the data of only 67 million customers, as opposed to the initial number of 117 million people. |
Post 475
http://thehill.com/policy/cybersecurity/239458-more-senate-dems-have-
cyber-bill-privacy-concerns More Democrats are signaling they will try to amend a major cybersecurity bill when it hits the Senate floor in the coming weeks. In a Senate Intelligence Committee report released over the weekend, Sens. Martin Heinrich (D-N.M.) and Mazie Hirono (D-Hawaii) said they “continue to harbor concerns” about several privacy provisions in the bill. |
Post 476
"Periscope raises privacy concerns"
https://grahamcluley.com/2015/03/periscope-privacy-concerns/ New app called Periscope raising some privacy concerns. The app allows you to broadcast live video easily to the internet. "If they're taking a photo or making a movie without your permission, you can at least ask them not to post it on social media, or to delete it entirely. But if they're using Periscope - tough luck. It's out there, and anything unguarded you might have said could have been seen, and anything silly you did could come back to bite you." |
Post 477
http://seekingalpha.com/article/2967836-vasco-data-security-at-the-
forefront-of-cyber-security-for-the-digital-era This article discusses the rise of Vasco Data Security, a company that addresses the security needs of banks and other firms in the service industry. |
Post 478
"Amazon And Microsoft Will Tell Us A Lot About The Cloud's Size"
http://www.forbes.com/sites/charleyblaine/2015/04/17/amazon-and-microsoft-will- tell-us-a-lot-about-the-clouds-size/ For the first time, Amazon will disclose the segment results for its Amazon Web Services, aka AWS, Amazon’s cloud computing business. Don’t be surprised if the business generates several billion dollars in revenue and proves to be the fastest- growing piece of Amazon’s business. At the same time, Microsoft will be touting the growth of its own cloud-related businesses. And they’re growing rapidly, too. |
Post 479
http://www.turnto10.com/story/28617198/tech-this-out-privacy-apps
Some app helps let you know what companies are tracking you as you browse the web and you can block some of the things they are seeing. |
Post 480
http://thenextweb.com/gadgets/2014/07/04/use-personal-drones-legally-
beginners-guide/ Legalities of drones for personal use |
Post 481
http://america.aljazeera.com/opinions/2015/4/americans-need-a-champion-
for-privacy-rights.html Clinton aims for presidency, riding the waves of consumer desires for privacy, It seems that Clinton is not necessarily the answer though. She claims that the NSA must become more transparent, but doesn't explain exactly how this might be achieved for example. |
Post 482
http://www.theguardian.com/money/2015/mar/30/firms-selling-pension-details-
fine-breaching-data-protection Article on how companies are being fined for releasing information on clients they were not permitted to. |
Post 483
http://www.wsj.com/articles/chinas-hackers-run-10-year-spy-campaign-in-
asia-report-finds-1428854482?mod=e2fb Interesting take on online spying (China-Asia) |
Post 484
Article on DARPA's "Brandeis program" (named after the late U.S.
Supreme Court associate justice and privacy advocate Louis Brandeis) which seeks to build “information systems that can ensure private data can only be used for its intended purpose and no other.” http://www.defenseone.com/technology/2015/03/military- scientists-fix-your-online-privacy-problem/107448/ |
Post 485
Title: Get off Facebook if you value your privacy, EU commish tells court
Link: http://www.theregister.co.uk/2015/03/26/close_your_facebook_account_if_y ou_want_data_privacy_eu_commish_tells_court/ Like I talked about last week, a verdict/decision regarding the facebook privacy issue case in Ireland. The group claimed facebook was infringing on their personal privacy rights by transferring their personal data to the US National Security Agency. Previously, the Irish data protection commissioner refused to investigate due to Safe Harbour rules, and now the EU higher court of justice said that they won’t take action and if you don’t want your privacy infringed upon to not use facebook. |
Post 486
http://blogs.wsj.com/digits/2015/04/15/berlin-strikes-compromise-on-
privacy-security-with-new-data-guidelines/ The German government on Wednesday proposed new guidelines on data retention aimed at balancing privacy protection with the needs of law enforcement in setting strict time limits on how long telecommunications providers store data. |
Post 487
http://www.buzzfeed.com/salvadorhernandez/data-breach-at-uber-may-affect-up-
to-50000-drivers#.btVwvyQ7R Data Breach At Uber May Affect Up To 50,000 Drivers Driver’s license numbers and names were accessed by a third-party last year, the company announced Friday. But so far, Uber says it knows of no misuses of the data. |
Post 488
http://www.nytimes.com/2015/02/22/technology/bringing-big-data-to-
the-fight-against-benefits-fraud.html?ref=technology&_r=0 This article highlights New York City's recent use of "big data" to address fraud in benefit receipts. By running rolls of beneficiaries through a pattern recognition system and cross-referencing abnormalities against other records, such as asset ownership, the government has been able to reduce fraudulent payments by $17 million, |
Post 489
http://www.theguardian.com/australia-news/2015/apr/01/g20-data-
email-leak-ombudsman-asked-to-investigate-systemic-problem Regarding the G20 breach |
Post 490
UN sets up privacy rapporteur role in wake of Snowden leaks
Landmark decision in response to US and UK monitoring is attempt to establish idea that freedom from excessive surveillance is a basic right http://www.theguardian.com/world/2015/mar/27/un-sets-up-privacy-rapporteur- role-snowden-leaks |
Post 491
http://money.cnn.com/2015/04/27/technology/apple-blackberry-iphone-
partnership/ Blackberry might be partnering up with Apple in the future to provide more advanced security settings for phones. |
Post 492
http://www.wptv.com/news/region-st-lucie-county/fort-pierce/expectation-
of-privacy-law-questioned-following-students-suspension-for-recording- audio-of-bullying Florida teacher is fired after a student used her cellphone to record a teacher bullying another student—expectation of privacy law questioned. |
Post 493
New data world order: government can read every Australian like an open book
The story of your life in metadata relates where you went, who you spoke with, how long you were there for. And now that story will be kept on file http://www.theguardian.com/australia-news/2015/mar/26/new-data-world-order- government-can-read-every-australian-like-an-open-book |
Post 494
"Skimmers Are Now Grabbing Your Credit Card Data at the Door" (from TechCrunch)
Hackers have taken to installing data readers inside the swipe locks into which debit cards are inserted in order to enter ATM vestibules. Hackers have also installed tiny cameras above ATM machines in order to glean PIN numbers and match them with debit card data. This is yet another example of how technology is being used to filch personal data from unsuspecting private citizens. While it is very difficult to tell whether a swipe lock has been corrupted, one easy way to prevent the matching up of debit card data and PIN numbers is to shield the keypad with one's hand as the PIN number is punched in. Smart, small, simple solutions can frequently make the compromise of personal data much more difficult, as we've seen countless times in this class. http://techcrunch.com/2015/03/18/skimmers-now-are-now-grabbing-your-credit- card-data-at-the-door/?ncid=tcdaily |
Post 495
http://www.reconnect-umc.eu/wp-content/uploads/2014/07/Doevendans.pdf |
Post 496
http://www.bishop-accountability.org/ia-
davenport/archives/filings/JohnDoeIA-2004-08-23- PlaintStatementOfDisputedFactsEx7-Attac.pdf |
Post 497
California bill would protect the privacy of ride sharers (Uber,
Lyft, etc.) http://www.cnet.com/news/california-bill-aims-to-protect-ride- sharing-passengers-privacy/ |
Post 498
"Speaking just before Barack Obama at a conference on computer security, the
iPhone maker’s Tim Cook gave perhaps one of the most impassioned defenses of digital privacy from a corporate executive—in this case the CEO of the world’s most valuable company. It was a pointed welcome for Mr. Obama, and a reminder that technology giants remain distrustful of government efforts to collect their users’ data." http://www.wsj.com/articles/cybersecurity-summit-exposes-silicon-valleys- privacy-fears-1423862917?mod=WSJ_TechWSJD_moreTopStories |
Post 499
http://www.newsweek.com/twitter-predict-emergency-room-rush-hours-323360
An article in newsweek that describes how Big Data companies (especially Twitter, in this article), may have the power to predict very important health-related conditions.A fascinating quote in the article says that a research firm "combines Twitter posts and air quality and hospital data to form a model that researchers believe can predict emergency room trends more effectively and immediately than existing disease surveillance models". Could be a good jumping-off point for a project! |
Post 500
Basically questioning who owns data and people in the U.K. being wary of
the NSA looking through facebook accounts of non-U.S. citizens. http://www.theguardian.com/technology/2015/mar/24/facebook-data- privacy-european-union-court-maximillian-schrems |
Post 501
http://www.businessinsider.com/r-russian-researchers-expose-
breakthrough-us-spying-program-2015-2? utm_content=bufferc0d4b&utm_medium=social&utm_source=facebook.com &utm_campaign=buffer |
Post 502
http://www.daltondailycitizen.com/news/privacy-fears-follow-crime-fighting-
license-plate-readers/article_8f75224c-ec87-11e4-8653-b74a57435da1.html Concerns are being raised over the use of license-plate readers in Georgia. Privacy advocates worry that police keep license plate information for longer than necessary, as that information can be used to determine the location of vehicles and their travel history. Questions about ethical use of that information have also been raised. |
Post 503
http://www.mondaq.com/unitedstates/x/390980/data+protection/Data+Priva
cy+and+Security+Considerations+in+MA+Transactions Interesting study on data security in M&A transactions |
Post 504
This article points out the marked difference in the way that Netflix is treated
by broadband providers abroad versus in the U.S. Providers in Sweden and Australia, for instance, have woven Netflix into their cable boxes, and even provided free access to attract customers. |
Post 505
Microsoft has gotten the ball rolling with privacy standards in cloud computing! Will
other companies and even other industries (e.g. cars) begrudgingly follow suit until it becomes an economic imperative? http://blogs.microsoft.com/on-the-issues/2015/02/16/microsoft-adopts-first- international-cloud-privacy-standard/ |
Post 506
Tinder was recently hacked and user data was manipulated to
simulate matches. If Tinder, one of the most influential dating apps, gets hacked and its data is manipulated, what can we expect from smaller apps that store user data? http://techcrunch.com/2015/03/25/tinder-hack-matches-unaware- straight-men-odd-conversations-ensue/ |
Post 507
Researchers at ScrapeSentry found that the use of the Google Chrome Webpage
Screenshot extension leaves its users at high risk for personal data theft. http://www.sourcewire.com/news/86782/personal-data-theft-risk-in-chrome- extension-found-by-scrapesentry#.VTxXoJTF-kc |
Post 508
Dominika Sarnecka
Russian researchers expose breakthrough U.S. spying program. http://news.yahoo.com/russian-researchers-expose-breakthrough-u-spying- program-194217480--sector.html |
Post 509
An employee of the Wisconsin Department of Veterans Affairs "erroneously" disclosed
personally identifiable information about 637 veterans to an unauthorized recipient. The WDVA is now offering one year of free credit monitoring to those 637 vets. http://www.channel3000.com/news/637-veterans-personal-data-released-by-state- employee/32366446 |
Post 510
http://www.businessinsider.com/r-free-open-internet-essential-us-
commerce-secretary-tells-china-2015-4 U.S. Commerce Secretary Penny Pritzker is trying to convince China that an open internet is absolutely necessary for entrepreneurship and developing the economy. I am doubtful of her success because I would argue that the one/only thing The Party cares about more than developing the economy is quelling any chance of civil unrest. |
Post 511
http://www.pcworld.com/article/2897212/government-requests-for-facebook-data-
continue-to-grow.html This article is proof that privacy from the government and privacy from private sector companies are often two edges of the same sword. This article describes how, throughout the world, governments are more likely going to Facebook to obtain information on individuals. This information is usually obtained to identify people wanted for crimes. But the US government is using Facebook less for such purposes than it used to! |
Post 512
http://www.pcworld.com/article/2889472/samsung-faces-complaint-in-us-
ftc-over-smart-tv-surveillance.html "The South Korean company’s privacy policy for its Smart TV came under criticism as it cautioned customers to “please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.” " |
Post 513
"Only 20% of businesses passed their most recent PCI compliance assessments"
http://www.paymentssource.com/news/interchange/mercant-data-protection-is- dangerously-inadequate-3020943-1.html |
Post 514
http://blogs.wsj.com/digits/2015/02/18/att-offers-data-privacy-for-a-price/
Interesting article about how industry is increasingly making data privacy a luxury good (i.e. AT&T's supposedly un-hackable fiber optic internet cables) |
Post 515
http://www.nytimes.com/2015/02/25/technology/path-clears-for-net-
neutrality-ahead-of-fcc-vote.html?_r=1 F.C.C. Net Neutrality Rules Clear Hurdle as Republicans Concede to Obama " Senior Republicans conceded on Tuesday that the grueling fight with President Obama over the regulation of Internet service appears over, with the president and an army of Internet activists victorious." |
Post 516
http://www.zdnet.com/article/amazon-dot-com-the-tech-master-of-secrecy/
Amazon does not release their data-request numbers (such as how often it is asked to release consumer data, and who is allowed to see the consumer data) to the public. This is not obligatory under law, but it is commonplace because other companies in the industry, such as Microsoft and Google, do provide consumers transparent guidelines as to how the consumer data is being used. |
Post 517
The NYPD headquarters have been editing Wikipedia articles containing details of
"alleged police brutality." This fact was discovered by tracing the edits back to IP addresses' location and network connection. In one case of editing regarding the Eric Garner case, the edits were as follows: The edits, all concerning the actions of Eric Garner and the police officers involved in the confrontation, are as follows: ● “Garner raised both his arms in the air” was changed to “Garner flailed his arms about as he spoke.” ● “[P]ush Garner's face into the sidewalk” was changed to “push Garner's head down into the sidewalk.” ● “Use of the chokehold has been prohibited” was changed to “Use of the chokehold is legal, but has been prohibited.” ● The sentence, “Garner, who was considerably larger than any of the officers, continued to struggle with them,” was added to the description of the incident. ● Instances of the word “chokehold” were replaced twice, once to “chokehold or headlock,” and once to “respiratory distress.” What's interesting to me about this how much these edits were a matter of change in tone rather than blatant lies. The way that Wikipedia is governed and edited would make it likely that a blatant lie would be quickly changed (thanks to wisdom of the crowd concept) on such a high profile article topic but a more subtle and nuanced manipulation might slip by. In terms of the topic of our class, this has broad implications for the kind of incriminating or otherwise unwanted information that can go online. While we've talked about objective breach of personal privacy/data in the case of SSNs or education data this type of strategy could be applied to personal information that is online in much more insidious and illusive ways. |
Post 518
Berlin Strikes Compromise on Privacy, Security With New Data Guidelines
http://blogs.wsj.com/digits/2015/04/15/berlin-strikes-compromise-on- privacy-security-with-new-data-guidelines/ The German government has recently proposed new guidelines on data retention aimed at balancing privacy protection with the needs of law enforcement in setting strict time limits on how long telecommunications providers store data. This comes on the EU wave of data privacy legislation |
Post 519
http://blogs.wsj.com/riskandcompliance/2015/04/15/experiment-shows-
speed-at-which-stolen-data-travels/ Article on how fast stolen data travels once it is placed on the dark web. This goes to show how important it is to maintain security for personal data like SSNs. |
Post 520
http://www.cnet.com/news/california-bill-aims-to-protect-ride-sharing-
passengers-privacy/ New california bill aims to protect users from Uber and other companies that can track their locations in order to provide driving / ride sharing services. |
Post 521
A leaked report from the "Federal Trade Commission investigators
had concluded that Google had unlawfully “used anti-competitive tactics and abused its monopoly power.” "The FTC’s main charge against Google was that it was abusing its power by unfairly promoting its own vertical offerings at the expense of competitors." http://www.slate.com/articles/technology/technology/2015/03/goog le_ftc_report_here_s_why_the_government_and_the_company_agreed_t o_a.html |
Post 522
http://www.policezero.com/2015/05/05/ancestry-com-caught-
sharing-customer-dna-data-with-police-with-no-warrant/ Ancestry.com sharing DNA data without their users knowing. |
Post 523
http://qz.com/380348/zuckerberg-should-absolutely-protect-his-privacy-
even-as-facebook-erodes-it-for-everyone-else/ Zuckerburg protects his privacy, even as he erodes everyone else's. This article argues that we should fight back to recapture our own privacy, and ensure that we have the same benefits of a private life that Zuckerburg ensures for his own family. Any and every contractor who enters Zuckerburg's private space is required to sign a Non-Disclosure Agreement. |
Post 524
http://dadaviz.com/i/3206
America Requests More User Data Than Almost Every Other Country Combined |
Post 525
"This week, the Florida state legislature is considering a bill that would make
it illegal to run any website or service anonymously, if the site fits a vague category of “disseminat[ing]” “commercial” recordings or videos—even the site owner’s own work. Outlawing anonymous speech raises a serious First Amendment problem, and laws like this one have been abused by police and the entertainment industry." https://www.eff.org/florida-outlawing-anonymous-speech |
Post 526
http://www.zacks.com/stock/news/166568/box-acquires-startup-subspace-
to-bolster-data-security Box acquires Subspace, a startup that specializes in data security. |
Post 527
Facebook data privacy case to be heard before European Union court
Maximilian Schrems battling existing EU laws, which allow companies to transfer information to US intelligence agencies http://www.theguardian.com/technology/2015/mar/24/facebook-data-privacy- european-union-court-maximillian-schrems |
Post 528
"Is ad blocking theft?"
Even though they may increase personal privacy, ad blockers are harmful to the success of websites and may result in the creation of poor content since sites are not able to make money when ad blockers are used. Some sites have been successful at using alternative means of monetization, but there does not seem to be a universal alternative to ads at the time being. "Creating great content and finding an innovative way to monetize content are two different disciplines. Because of this, we’re stuck with display advertising until an equally universal approach presents itself. For the time being, ad blockers are dangerous." http://venturebeat.com/2015/04/04/is-ad-blocking-theft/ |
Post 529
http://www.pbs.org/newshour/rundown/white-house-introduces-bill-protect-
consumer-data-privacy/ "White House introduces bill to protect consumer data privacy" White House gives lip service to the public's online privacy concerns, in attempt to placate public. The bill actually sidesteps FTC and some states' more strict authority. I believe more effective legislation should be passed. |
Post 530
Royal Bank of Scotland uses Apple fingerprint authentication for mobile banking
"Through Apple's Touch ID fingerprint sensor, the banks' customers can log into the app in seconds. The technology recognises the customer's unique fingerprint, meaning they dont have to remember a tricky passcode – making it easier and more convenient to access their finances." http://www.computerweekly.com/news/2240240587/RBS-uses-Apple-fingerprint- authentication-for-mobile-banking |
Post 531
http://www.treehugger.com/cars/self-driving-cars-could-be-serious-job-killers.html
Self-driving cars could be serious job-killers A look into the cons of self-driving cars. In the world that Google envisions, robotic cars will be concentrated into fleets. Maintenance, repair, insurance, and fueling would likewise be centralized. Untold thousands of small businesses, and the jobs associated with them, would evaporate. To get a sense of just how many jobs might be at risk, consider that, in Los Angeles alone, about 10,000 people work in car washes. |
Post 532
http://www.misco.co.uk/blog/news/02868/german-data-protection-
authority-orders-google-to-comply-over-users-profiles |
Post 533
http://hereisthecity.com/en-gb/2015/02/24/facebooks-privacy-policy-breaches-
european-law-report-finds/ A report commissioned by the Belgian privacy commission has found that Facebook is acting in violation of European law, despite updating its privacy policy. |
Post 534
http://www.ctvnews.ca/sci-tech/driver-beware-your-new-car-may-be-
spying-on-you-1.2296165 "The British Columbia Freedom of Information and Privacy Association (FIPA) published a 123-page report Wednesday, detailing what your vehicle might know about you and who can access that information." |
Post 535
http://money.cnn.com/2015/02/20/technology/hack-gemalto-sim-spies/index.html |
Post 536
"The FBI has a secret device to locate criminal suspects, but they would
apparently rather let suspects go free than reveal in court the details of the high tech tracker Judge Patrick H. NeMoyer in Buffalo, New York, described a 2012 deal between the FBI and the Erie County Sheriff's Office in his court order Tuesday. The judge, who reviewed the deal, said the FBI instructed the police to drop criminal charges instead of revealing "any information concerning the cell site simulator or its use." Erie police had long tried to keep that contract secret, but the judge rejected that idea and ordered that details of the Stingrays be made public. "If that is not an instruction that affects the public, nothing is," NeMoyer wrote. http://www.ksl.com/?nid=157&sid=33878539 |
Post 537
"Government wonders: What’s in your old emails?"
WASHINGTON — If you’ve been remiss in cleaning out your email in-box, here’s some incentive: The federal government can read any emails that are more than six months old without a warrant. Little known to most Americans, ambiguous language in a communications law passed in 1986 extends Fourth Amendment protections against unreasonable search and seizure only to electronic communications sent or received fewer than 180 days ago. The language, known as the “180-day rule,” allows government officials to treat any emails, text messages or documents stored on remote servers – popularly known as the cloud – as “abandoned” and therefore accessible using administrative subpoena power, a tactic that critics say circumvents due process. Read more here: http://www.mcclatchydc.com/2015/02/11/256304/government- wonders-whats-in-your.html#storylink=cpy |
Post 538
Twitter’s New “Quality Filter” Starts Rolling Out To Verified iOS Users
http://techcrunch.com/2015/03/23/twitter-quality-filter/ "The latest is a new “quality filter” that lets verified users weed out problematic tweets from their notifications." "As TechCrunch’s Sarah Perez noted last week, until recently Twitter has been more reactive than proactive in terms of dealing with bullying, but several high profile incidents (including #gamergate, the harassment of Robin William’s daughter after his death, and Ashley Judd’s decision to press charges against trolls) have thrown the issue into the spotlight and forced the company to take new steps to ensure the safety of its users." |
Post 539
"The company is calling it an “on-demand password” system where, every time
you want to login, you get a new code texted to your phone. For a company that has been pulling in user data — and fielding “change password” requests — for years this seems to make a lot of sense." http://www.marketplace.org/topics/tech/marketplace-sxsw/yik-yak-privacy- settings-and-anonymous-economy |
Post 540
An eight grade student hacked into a teacher's computer and changed the
teacher's desktop background. Despite the relative harmlessness of his crime, the teenager was charged with a hacking felony. This computer did have sensitive standardized test material, but that was not accessed by the student. There has been a lot of debate about the grounds of this legal charge. The grounds of this conviction rest on the Computer Fraud and Abuse Act (CFAA). "However, this instance highlights that many states have their own version of the federal statute, with their own overbroad and insensible language, including Florida."I believe this article highlights the inevitability of increased hacker crime, even among adolescents. The federal government along with state governments need to further discuss the legal grounds of possible computer hacking scenarios, so that there are some common grounds across the nation. https://www.eff.org/deeplinks/2015/04/justice-charging-eight-grader-felony- hacking |
Post 541
http://www.forbes.com/sites/thomasbrewster/2015/01/15/researcher
-says-progressive-insurance-dongle-totally-insecure/ Car hacking might become more prevalent |
Post 542
Big tech companies are "giving back" so to speak by serving the Bay Area residents who
are most in need. Twitter is building a multimillion dollar computer lab for low income residents for instance. The sentiment is captured by one of the low income people interviewed: "Tensions between tech companies and Bay Area residents seem to have lowered to a simmer in recent months. Ms. Leonard said the companies were not to blame for the income inequality in the Bay Area. I wish I could work for Google and make six figures, but I have to be happy with what I have,” she said. “I just feel like a lot of these companies are helping those that are less fortunate.” Link: http://www.nytimes.com/2015/04/15/upshot/fighting-homelessness-one- smartphone-at-a-time.html?ref=technology&_r=0&abt=0002&abg=1 |
Post 543
http://www.theguardian.com/technology/2015/apr/01/visa-applicants-
details-emailed-to-wrong-person-in-near-identical-case-to-g20-leak http://www.theguardian.com/world/2015/apr/01/g20-leaders-details-leak- new-privacy-taskforce-announced Two different approaches to dealing with privacy. 1 which involves a databreach where someone's PII is accidentally leaked. Another which involves the data of the G-20 world leaders. |
Post 544
Hollywood is asking itself, ‘What’s our modern strategy for managing our
information?' After hackers from North Korea revealed embarrassing and personal messages from Sony last year, Hollywood has turned to a new class of technology companies that for the last few years have been offering ways to manage the data slipping into employees’ personal smartphones and Internet storage services. They wrap individual files with encryption, passwords and monitoring systems that can track who is doing what with sensitive files. http://www.nytimes.com/2015/03/30/technology/secrecy-on-the-set- hollywood-embraces-digital-security.html? emc=edit_th_20150330&nl=todaysheadlines&nlid=68283546 |
Post 545
http://www.technewsworld.com/story/81837.html
Barbie could get talking barbies? Maybe. Should we get barbies that can listen to our kids? mmmm... maybe not. New barbie doll listens to its surroundings and says stuff based on program located on the company's servers. Creepy... |
Post 546
Auburn University is investigating a data security incident that could have exposed
the personal information of about 370,000 current, former and prospective students. http://www.al.com/news/index.ssf/2015/04/370000_current_former_students.html |
Post 547
https://epic.org/2015/04/massive-att-consumer-privacy-v.html
AT&T has been found guilty of accessing hundreds of thousands of people's call register information and is now fined $25m. Interestingly, AT&T then distributed the information they found to stolen cell-phone traffickers. |
Post 548
US Government requesting more user data than almost every other country combined
http://dadaviz.com/i/3206 |
Post 549
http://works.bepress.com/john_brigham/cv.pdf |
Post 550
http://thehill.com/policy/cybersecurity/239503-privacy-amendments-flood-
in-ahead-of-house-cyber-vote Cyber bills are going to the house to encourage tech companies to share information relevant to cyber threats. |
Post 551
From Big Data to Big Bets on Food Science
http://www.wired.com/2015/04/dan-zigmond/ "The idea is to create new food sources for an expanding global population— sources that are cheaper, safer, and healthier than what we have today. That may appear to have nothing in common with YouTube and Google Maps, but the same data science applies. Together with a small team of other scientists, I’m building a massive database of all known plant proteins—one day, it could span 18 billion of them. " |
Post 552
http://www.wired.com/2014/07/nsa-targets-users-of-privacy-services/
NSA are blindly targeting users of privacy services for surveillance, such as tor and others. They are also targeting individuals who follow news reports about privacy and new privacy technologies, which means us! Congrats :) |
Post 553
http://www.theguardian.com/commentisfree/2015/apr/18/congress-
cannot-be-taken-seriously-on-cybersecurity Interesting take on having Congress pass a bill about security when they themselves are no experts. |
Post 554
A modest gain for electronic privacy
The cause of electronic privacy gained a bit in the Supreme Court on Monday as the Justices ruled that it is a search, subject to constitutional challenge, when police install a monitoring device on an individual’s body to track movements after being convicted of a crime. The Court did not itself settle, at this point, when such monitoring does violate the Fourth Amendment, leaving that to lower courts to decide first. http://www.scotusblog.com/2015/03/a-modest-gain-for-electronic-privacy/ |
Post 555
http://www.bbc.com/news/technology-32083188
Google loses battle in the UK to stop claimants from suing it for bypassing settings in safari in order to track users. A win for privacy. |
Post 556
"A federal court has again renewed an order allowing the National Security
Agency to continue its bulk collection of Americans' phone records, a decision that comes more than a year after President Obama pledged to end the controversial program." http://www.nationaljournal.com/tech/nsa-spying-wins-another-rubber- stamp-20150227 |
Post 557
http://www.wsj.com/articles/eu-digital-chief-urges-regulation-to-nurture-
european-internet-platforms-1429009201? mod=WSJ_TechWSJD_NeedToKnow This article discusses the EU's Digital Commissioner's recent announcement that the EU should more actively promote EU technology firms in the global technology sphere. He stated that this could best be done through regulation. |
Post 558
Proposed CA Bill Would Create GPS Data Privacy Protections For
Mobile Device Users http://www.bsminfo.com/doc/proposed-would-create-data-privacy- protections-mobile-device-users-0001 |
Post 559
White House to take new Outlook on Obama privacy after G20 summit leak
http://www.theguardian.com/us-news/2015/mar/30/white-house-examining-leak- obama-passport-details-2014-g20-summit |
Post 560
http://www.slate.com/articles/technology/bitwise/2015/04/end_of_asymmetr
ic_information_why_tyler_cowen_and_alex_tabarrok_are_wrong.html The internet has exacerbated the problems of asymmetric information. People are "drowning in the data;" there is simply too much for people to know what is correct. All the while, companies and data collectors are getting more than ever from people online. |
Post 561
"RadioShack still plans to sell customer personal data despite state objections"
http://www.pcworld.com/article/2909772/radioshack-presses-ahead-plan-for-sale- of-customer-data.html The consumer electronics retailer RadioShack declared bankruptcy in February, but it has just recently begun auctioning off its assets, including vast troves of its customers' personally identifiable data. Currently, it is unclear whether the data at issue - which may appertain to between 67 and 117 million customers - includes vulnerable information, like credit card numbers or account history, alongside contact information such as name, address, phone number, and email address. RadioShack's actions set a dangerous precedent; in the future, other tech companies could similarly hold onto consumer data so that, if bankrupt, they could sell the data to the highest bidder in order to recoup losses. Customers, in other words, may in the future unknowingly shoulder the costs of bankruptcy for poorly managed and insolvent mega-retailers and software companies. |
Post 562
http://www.usnews.com/news/articles/2015/03/09/snowden-phone-maker-nears-
1-million-customers Los Angeles phone maker FreedomPop has made a super-secure phone called Privacy Phone, dubbed the "Snowden Phone," which features 128-bit encryption and VPN services on the phone. FreedomPop also has a software package available for sale that can make other phones more secure. The customers of the new company have now topped 1 million, essentially proving the market for privacy technology. |
Post 563
Drones Beaming Web Access Are in the Stars for Facebook
http://www.nytimes.com/2015/03/26/technology/drones-beaming-web-access-are- in-the-stars-for-facebook.html?ref=technology&_r=0 |
Post 564
Austria court considers Facebook privacy case
http://www.bbc.com/news/technology-32229285 |
Post 565
New app that will help users scrub potentially damaging social
media posts: http://time.com/3828270/ethan-czahor-clear-twitter/ |
Post 566
A Facebook user is bringing his case against the company to the highest
court in the EU to prevent US intelligence agencies from gaining access to online information. |
Post 567
How Much Do You Know About Data Privacy? Test Yourself
This Wall Street Journal quiz helps the test taker gauge whether or not they understand current data privacy concerns. Multiple choice, and the answers are provided. http://www.wsj.com/articles/how-much-do-you-know-about-data-privacy- 1429499471 |
Post 568
http://www.fiercehealthit.com/story/phi-breaches-25-percent-2014/2015-
02-25 The rise in Electronic Health Records leads to more vulnerable protected health information. |
Post 569
Download Your Entire Google Search History
"Users can now download their entire saved search history "to see a list of the terms you've searched for," the company said. "This gives you access to your data when and where you want," Google wrote on its support page." http://www.pcmag.com/article2/0,2817,2482293,00.asp |
Post 570
www.coachina.org/2013/faculty_en/.../cv/EN_faculty_46622_cv.doc |
Post 571
"RadioShack still plans to sell customer personal data despite
state objections" RadioShack, which filed for bankruptcy, was allowed to auction off its assets, which includes consumer data, despite opposition from states. Choice quote: - "The case could have privacy implications for the tech industry as it could set a precedent, for example, for large Internet companies holding consumer data, if they happen to go bankrupt." http://www.pcworld.com/article/2909772/radioshack-presses-ahead- plan-for-sale-of-customer-data.html |
Post 572
"Why Data Breaches Don’t Hurt Stock Prices"
Shareholders do not tend to react strongly to high-profile data breaches and stock prices tend to recover quickly if they do fall as was true for Target, JP Morgan Chase, Sears, Sony, and other companies after their security breaches. The authors cite poor access to data and tools to correctly valuate these breaches as a major reason for the lack of change in stock prices. Since the effects of the breaches are difficult to quantify, many shareholders do not react to them unless they result in an immediate change in expected productivity. "A widely accepted notion goes that there are only two types of companies: those that have been breached and those that don’t know they have." "Companies whose assets are primarily non-digital have less incentive to invest in prevention if they know their stock price will survive — and that takes a toll on the overall economy and consumer privacy." https://hbr.org/2015/03/why-data-breaches-dont-hurt-stock-prices |
Post 573
http://louisville.edu/faculty/srmyer01/about/SRM_CV122008.doc/at_download/file
http://www.coachina.org/2013/faculty_en/photo/cv/EN_faculty_46622_cv.doc http://www.bishop-accountability.org/ia-davenport/archives/filings/JohnDoeIA- 2004-08-23-PlaintStatementOfDisputedFactsEx7-Attac.pdf http://www.nsdrcchina.org/userfiles/file/CV%20of%20All%20Members/Fl2010021 71517537015.pdf https://utdirect.utexas.edu/apps/student/coursedocs/nlogon/download/697219/ http://www.sbbh.net/wp-content/uploads/2013/11/CURRICULUM-VITAE-eli.pdf |
Post 574
After coder Partap Davis was hacked, he spent weeks tracking down exactly
how it had happened, piecing together information from access logs and customer service reps. Though he doesn't know who did it, he investigated how it happened and created a map that sketches out the points of failure of the most glaring vulnerabilities of our digital lives. http://www.theverge.com/a/anatomy-of-a-hack |
Post 575
http://www.bbc.com/news/technology-32429477
The Samsung S5 is a smartphone that can be unlocked using your fingerprint. Although the information for the fingerprint is stored in a "Trusted Zone" within the phone that cannot be accessed by apps, the fingerprint is still available in the memory of the phone at various times, such as when you've just unlocked the phone and your information is being verified. As a result, apps are able to access the fingerprint, and use it to hack into other accounts owned by the user, such as paypal accounts to make payments. |
Post 576
Twitter Takes Foursquare’s Help To Add Location Tagging
Twitter aims to partner with Foursquare in making tweets more location-specific to allow users tag their exact locations in tweets http://www.valuewalk.com/2015/03/twitter-foursquares-location-tagging/ |
Post 577
http://www.theverge.com/2015/5/5/8556349/apple-dna-researchkit-genetic-testing |
Post 578
Twitter takes non-US data to Ireland in cloud privacy move
http://www.v3.co.uk/v3-uk/news/2404585/twitter-takes-non-us-data-to- ireland-in-cloud-privacy-move |
Post 579
http://www.wsj.com/articles/facebook-policies-taken-to-task-in-report-for-
data-privacy-issues-1424725902 |
Post 580
Since class today is on the topic of Tesla...interesting to note that Tesla will soon be
unveiling new technology not in the form of cars. Elon Musk announced this morning over Twitter http://abcnews.go.com/Technology/tesla-technology-produce-cars/story? id=30025690 |
Post 581
Title: Data protection concerns 72% of Britons in post-Snowden world,
research shows URL: http://www.theguardian.com/technology/2015/apr/09/data-protection- concerns-72-of-britons-in-post-snowden-world-research-shows Data privacy is becoming a much larger and more present issue, especially in the UK. To give some important stats, 72% of British adults are concerned about their private information online, 32% of respondents would be willing to pay to protect their information online, and 29% felt it was their own responsibility to protect their data. This is very interesting because it is quite a shift from several years back |
Post 582
Interesting video with drones: http://i.imgur.com/ozzF2s1.gifv
(Not necessarily news, just sort of cool) |
Post 583
http://www.npr.org/blogs/alltechconsidered/2015/04/25/402039156/as-health-
apps-hop-on-the-apple-watch-privacy-will-be-key Apple has added a handful of health apps to the new Apple watch, including those that track food intake, when you sleep, how you exercise. However, people are concerned that Apple is not doing a good enough job of protecting the privacy of the very personal information that these apps are going to collect. Some even claim that these third-party apps will sell the data without consent, which could lead to a variety of problems. |
Post 584
Fascinating article on how a privacy executive's medical data
was compromised through a breach of an insurance company that she wasn't even insured by! Shows the interconnectedness of health care data, as we learned in the 're-identification' chapter of this course. http://www.usatoday.com/story/money/2015/04/14/hacking-health- data-privacy/25597337/ |
Post 585
http://www.slate.com/blogs/browbeat/2015/04/01/brian_k_vaughan_s_the_p
rivate_eye_reviewed_panel_syndicate_comic_imagines.html This article reviews a popular new comic that imagines life after the internet. About 50 years before the time of the story, everything in the cloud became public knowledge. People now despise computers and phones and use secret identities to preserve what little anonymity they have left. This story is an interesting experiment and reaction to the data privacy conundrum. |
Post 586
Another article on RadioShack's liquidating their consumer data
which points out the perils if companies like Google or Facebook go bankrupt in the future: http://www.washingtonpost.com/blogs/the- switch/wp/2015/03/26/bankrupt-radioshack-wants-to-sell-off-user- data-but-the-bigger-risk-is-if-a-facebook-or-google-goes-bust/ |
Post 587
http://www.irishtimes.com/business/technology/germany-double-dealing-
over-data-legislation-say-negotiators-1.2129889 Germany double-dealing over data legislation, say negotiators |
Post 588
http://www.pymnts.com/news/2015/how-100-banks-got-hacked-and-lost-
900-million/#.VOHpMlXF9UM http://www.cbronline.com/news/tech/hardware/desktops/canon-to-buy- video-surveillance-company-axis-for-283bn-110215-4509869 http://www.theguardian.com/uk-news/2015/feb/06/uk-security-services- capable-bypassing-encryption-draft-code |
Post 589
http://arstechnica.com/tech-policy/2015/03/despite-privacy-policy-radioshack-
customer-data-up-for-sale-in-auction/ Despite privacy policy, RadioShack customer data up for sale in auction RadioShack is trying to auction off its customer data on some 117 million customers as part of its court-supervised bankruptcy. Data includes names, phone numbers, mailing and e-mail addresses, and purchases. |
Post 590
ATT to charge for keeping data private
http://www.businessinsider.com/att-will-charge-customers-to-keep-their- browsing-data-private-2015-4? utm_content=bufferd9d18&utm_medium=social&utm_source=facebook.com &utm_campaign=buffer |
Post 591
The Aftermath Of A Leak: What's Next in the HSBC Suisse Tax Evasion Saga?
The implications of the Falciani leak are still reverberating and there are many unknown details, including the exact nature and scope of the charges and other legal consequences in both France and other countries. Also unknown at this point is what will happen to Falciani, who was indicted in Switzerland on December 11, 2014, and may be tried there in absentia. What is clear, however, is that the Falciani leak has triggered collateral consequences on an international scale. France has shared the data with the tax authorities of other countries, including reportedly the United States, and some of these countries are investigating HSBC Suisse. The aftermath of the initial leak has been a series of international controversies extending well beyond simply tax evasion. http://jurist.org/forum/2015/05/shu-yi-oei-tax-evasion.php |
Post 592
Google Project Fi Wireless Service Undercuts Phone Plans
http://www.wsj.com/articles/google-unveils-wireless-service-called-project-fi- 1429725928 Summary from The Skimm: "Google wants to be your new wireless service. Meet “Project Fi.” It’s more flexible and cheaper than other mobile service providers. But like all good things — it’s invite only. While the Big G isn’t taking over wireless just yet, it has taken over a lot of other things (think: web browser, TV, the fact that it’s a verb, and potentially a car). For now, it’s teaming up with other service providers. But fee fi fo fum — Google’s kind of a giant, and Fi’s low costs could force some other major providers like Verizon to reconsider their pricing." |
Post 593
AT&T Wants $139 a month, or your privacy, for super fast Internet
http://www.sfgate.com/bayarea/article/AT-T-wants-139-a-month-or-your-privacy- for-6168986.php "On Monday, Cupertino became the first West Coast city to offer AT&T’s GigaPower, which promises Internet speeds so fast customers can download 25 songs in less than a second. But that speed comes at a price: $139 a month, or $110 for those who allow AT&T to monitor their browsing habits." |
Post 594
http://thenextweb.com/twitter/2015/04/18/twitter-updates-privacy-policy-
for-non-us-accounts-and-moves-jurisdiction-to-ireland/ All non US accounts on twitter will be subject to a new privacy directive, effective 18th May. The new privacy directive will be compliant with EU law. Presumably it is more costly for Twitter to have two distinct privacy protocols that it abides by - that of the US and that of the rest of the world - which means that it must profit from the information that they retain in America. |
Post 595
Privacy Pitfalls as Education Apps Spread Haphazardly
http://www.nytimes.com/2015/03/12/technology/learning-apps-outstrip-school- oversight-and-student-privacy-is-among-the-risks.html?_r=0 |
Post 596
eBay will be the first American internet company to shift its storage of Russian
consumer personal data to Russia in compliance with a law Putin signed into existence in 2014. This will also occur for the personal data of Russian PayPal users, as PayPal is owned by eBay. http://sputniknews.com/business/20150407/1020553905.html |
Post 597
New Arkansas Bill could prevent street photographers from taking photos of their
subjects without consent if the faces are recognizable. This will place a large burden on photographers who wish to publicize their pictures. http://petapixel.com/2015/03/29/arkansas-passes-privacy-bill-that-could-kill- street-photography/ |
Post 598
http://www.cnet.com/news/reddit-clamps-down-on-involuntary-
pornography/ Reddit holds users accountable for posting explicit photos of people without their consent |
Post 599
Data Privacy Challenges & Considerations for Cross-Border Ethics &
Compliance Investigations Investigations of potential misconduct can be taxing for any organization. But for organizations operating in multiple countries, the variability of data privacy laws around the globe present a special challenge. Indeed, in a 2013 survey conducted by KPMG, multinational organizations ranked data privacy and data protection related challenges as the single biggest challenge presented by cross-border investigations—ahead of lack of resources, cultural differences and the legal and regulatory environment. http://www.jdsupra.com/legalnews/data-privacy-challenges-considerations- 85329/ |
Post 600
http://www.computing.co.uk/ctg/analysis/2398603/nhs-caredata-a-horribly-
botched-operation |
Post 601
http://mashable.com/2014/06/24/faa-amazon-drones-2/
"FAA Clarifies That Amazon Drones Are Illegal" |
Post 602
http://www.nytimes.com/roomfordebate/2015/03/02/23andme-and-the-promise-
of-anonymous-genetic-testing-10?hp&action=click&pgtype=Homepage&module=c- column-top-span-region®ion=c-column-top-span-region&WT.nav=c-column- top-span-region NYT Debate on 23andMe and anonymous genetic testing. Authors debate how private the data can actually be, and whether potential privacy vulnerabilities would outweigh the research benefits of having that data in the first place. |
Post 603
The house has passed a cyberthreat sharing bill, upping the ease with which
companies can share data. The Protecting Cyber Networks Act (PCNA) essentially protects companies from consumers suing them if they share information with the government. |
Post 604
http://www.theguardian.com/us-news/2015/feb/23/nsa-director-defends-
backdoors-into-technology-companies Mike Rogers elaborately defends proposed plans by the Obama administration to continue to enforce backdoors into technologies. Interestingly he cites the Sony attack as a reason for the necessity of such backdoors. FIghting cybersecurity issues by giving hackers more ways into technology.... brilliant, |
Post 605
http://www.hindustantimes.com/mumbai/mumbai-fake-mhada-website-
created-users-personal-data-at-risk/article1-1339320.aspx In Mumbai, a fake housing website created in the Maharashtra Housing Area Development Authority's name has been stealing users' personal data and selling it. |
Post 606
http://www.telegraph.co.uk/news/worldnews/europe/france/11540269/Unde
r-fire-airline-Lufthansa-faces-privacy-action-in-France.html Lufthansa is facing privacy action as a result of keeping tallies on staff of medical records etc. This comes soon after they faced criticism for failing to act against GermanWings pilot Andreas Liblitz who killed 149 people and was known to suffer from depression. It's interesting to note that Lufthansa is being criticised both for infringing privacy by keeping notes of medical records, and also for not taking action when pilots have medical issues that restrict them from flying. It seems unfair to argue both sides. I think that we need more clear legislation about what employers for high risk jobs are allowed to know about their employees, and that that is where the issue really lies. |
Post 607
http://techcrunch.com/2015/04/14/apple-opens-researchkit-to-medical-
research-app-developers/#.onz5mj:vI6X Apple is not just collecting data now, it is allowing health researchers to do it themselves with their platform researchkit. Researchers can recruit subjects, build apps, and gather info all from the iphone. |
Post 608
Fascinating Pew Research Poll shows that even though recent
events have brought new awareness to many Americans about online privacy and security concerns, most American adults have not made significant changes to their digital behavior, and 54% say that it would be “somewhat” or “very” difficult to find the tools and strategies that would enhance their privacy online and when using cellphones, according to a Pew Research Center report. Common responses were: - I have nothing to hide - I do not have the time or expertise - It won’t prevent monitoring anyway - I don’t want to raise suspicions or invite scrutiny - I am comfortable with the monitoring because it makes us safer http://www.pewresearch.org/fact-tank/2015/04/14/why-some- americans-have-not-changed-their-privacy-and-security- behaviors/ |
Post 609
Steven Myers: https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=3&ved=0CC4QFjAC&url=http%3A %2F%2Flouisville.edu%2Ffaculty%2Fsrmyer01%2Fabout%2FSRM_CV1220 08.doc%2Fat_download%2Ffile&ei=uMLTVKmnKKbnsASemYLQDw&usg=A FQjCNGvge2lVwnynYKxzrEdAOjvsI57oA&bvm=bv.85464276,d.aWw Geoffery Cohen: http://www.electionstudies.org/conferences/2006Duke/cvs/Cohen_cv.pdf Bruce David White: http://www.amc.edu/Academic/bioethics/FacultyCV/BDW_CV.pdf Michael Fox: http://www.thechildandfamily.com/download/cirriculum_vitae.pdf Marc Prentki: http://www.montreal-diabetes-research- center.org/en/prentki/CCV_prentki_2014.pdf Michael Levine: http://www.thebrainproject.org/advisoryBoard/Michael_Levine/CV.pdf Mark Klamberg: http://www.iclklamberg.com/files/CV-English.pdf Mika Palgram: http://www.tas-cas.org/uploads/tx_tascas/396.pdf William Andrews: http://reverseaginginstitute.com/wp- content/uploads/2013/10/Bill-Andrews-Curriculum-Vitae.pdf bv Miguel Angel: http://bcdr.inegi.up.pt/cv/miguel_angel_cv.pdf Barbara Mahler: http://www.sfei.org/sites/default/files/Item1a_MahlerCVJune05.pdf Megan Buchanan: http://cdn1.proz.com/profile_resources/1868879_r52d41de94edf1.pdf Ronald Woody: http://cmud.cmu.edu.tw/doc/faculty/Woody.pdf Eli Katz: http://www.sbbh.net/wp-content/uploads/2013/11/CURRICULUM- VITAE-eli.pdf Steven Joseph Davis: http://www.nber.org/vitae/vita152.pdf W. Dean Pond: http://www.urbana.edu/documents/contentdocuments/document_23_5_632. Jane Seay: louisville.edu/faculty/srmyer01/about/.../file E. Jane Costello: https://fds.duke.edu/db/Sanford/ccfp/faculty/.../CV.pdf Maria T. Pinorini-Godly: louisville.edu/faculty/srmyer01/about/.../file Charles Schulz: http://www.circare.org/dw/schulz_ex1.pdf James Brown: http://www.hsc.wvu.edu/eastern/UHP/PDFs/Candidate- CVs/CV_BROWN-J_2012.pdf Bruce David White: http://www.amc.edu/Academic/bioethics/FacultyCV/BDW_CV.pdf Carl Wittwer: http://www.math.utah.edu/~palais/pcr/CW_Vitae_2004.doc Osvaldo Civitarese: http://www.fundacionkonex.org/ckfinder/userfiles/files/CV%20Osvaldo%20 Civitarese%20%28english%29.pdf Charles Schulz http://www.circare.org/dw/schulz_ex1.pdf Robert Gabriel: http://www.uc.pt/ge3s/event_05/event_05/CV_Robert_Gabriel.pdf Jeffrey S. McCombs, Ph.D. http://web-app.usc.edu/web/pharmacy/faculty/img/376CV.McCombs- CV.doc Brenda Chinnery: https://utdirect.utexas.edu/apps/student/coursedocs/nlogon/download/6972 19/ Mark Schwartz: http://www.bishop-accountability.org/ia- davenport/archives/filings/JohnDoeIA-2004-08-23- PlaintStatementOfDisputedFactsEx7-Attac.pdf Allan Kimmel: kimmel.socialpsychology.org/cv/CV-Current-2.doc JOHN MARTIN PAGE, JR. http://www.erf.org.eg/CMS/uploads/pdf/1194806906_John_Page_CV_07.pd f Andrew Marc Lewis http://wp.vcu.edu/math/wp-content/uploads/sites/4453/2014/05/Lewis-CV- 2013.pdf |
Post 610
http://www.computing.co.uk/ctg/opinion/2403739/why-amazons-new-eu-
data-centres-are-just-as-vulnerable-to-nsa-surveillance-as-their-us-ones |
Post 611
https://privacyassociation.org/news/a/ftc-settles-with-retail-tracking-
technology-company/ FTC has settled with Nomi, a retail tracking technology company. Nomi promised opt-out choices in retail stores, but didn't deliver, instead tracking 9 million devices since 2012. |
Post 612
http://venturebeat.com/2015/02/23/drones-over-head-in-las-valley-are-
tracking-mobile-devices-locations/ Several small drones flying around Los Angeles have been determining mobile devices’ locations from Wi-Fi and cellular transmission signals. They are part of an experiment by Singapore-based location marketing firm Adnear, which is employing the drones to collect wireless data. They do not collect conversations or personally identifiable information but uses signal strength, cell tower triangulation and other indicators to determine where the device is and track user's travel patterns. |
Post 613
http://www.cnn.com/2015/02/25/tech/make-create-innovate-fossil-dna-data-
storage/index.html Awesome article about how DNA could be used for identification in the future. Ties in really well with the presentations on Tuesday about the use of SSN's versus fingerprinting for identification purposes. DNA seems to solve many of the problems that exist with both SSNs and fingerprints. |
Post 614
http://www.whitehouse.gov/the-press-office/2015/02/13/executive-order-
promoting-private-sector-cybersecurity-information-shari Executive Order promoting sharing of cyber information ("online threat data") between private sector companies/organizations and the US Government. Will private companies be willing to share? |
Post 615
http://www.theverge.com/2015/4/28/8507629/protecting-cyber-networks-act-info-
sharing-bills-privacy |
Post 616
A new study reported by the Atlantic has found that Google image searches not only
reflect the world that exists in reality but also changes our perception of it: "Here's the thing, though: Google image searches don't just reflect the sad state of diversity in corporate leadership; they actually influence the ways in which people think about what it means to be a CEO. " The article gives the example of the gendered search results that appear when google images bring up female and male ceos images. It also reminds me of Professor Sweeney's example of names that Google images associates with certain races. and how that affects Google image search results. The article concludes with the following question: "All this raises a question about what a search-engine algorithm ought to do. Should it challenge reality, or simply reflect it?" The concern I have is that in attempting to reflect reality, algorithms will end up enforcing the status quo so that it will be harder to advance the development of social norms and societal views in positive directions (or any direction at all). |
Post 617
In honor of our recent class segment on biometrics, including facial recognition, I am
posting this fascinating article about a new facial recognition detection algorithm called the Deep Dense Face Detector. From the article: “When an AI based on a convolutional neural net looks at the same images, it doesn't just file them as "cat" or "lizard"; it breaks them down. It spots common features within the images—things like scales, legs, noses, eyes, ears. When you show it an image it hasn't seen before it doesn't just try to classify the whole thing as "cat" or "lizard"; it scours the image for features, picking up clues—a tail, a patch of fur, the shape of a paw—and puts those together before making a decision as to what it's seeing. It has a deeper understanding of the world, and that's what people are talking about when you hear reports on "deep learning" in the news.” The implications of this are huge. While “the old system had a pretty rigid idea of what a face looks like,” per the article, this new system can get around potential blocks, face coverings, or partial viewing. One solution the article proposes to this much enhanced facial recognition technology is to use extreme makeup. The article points out that while we’re currently worried about what we say on Twitter being permanent, there will soon no longer be a division between when we are being watched (online) and when we aren’t (offline), thanks to such technologies as this Deep Dense Face Detector. Link to full article: http://www.vice.com/read/terrifying-face-detection-tech-272 |
Post 618
A news team in Texas found that a lot of documents containing personal information
were left in cars found in Houston-area salvage yards. The people who run the salvage yards hold that it is the job of the individual to make sure that the documents are not left in the cars before they go to the salvage yard. Some individuals are upset that the responsibility falls on them. There is no Texas law requiring the salvage yard employees to ensure that these documents, which are like gold to identity thieves, are removed from the cars. |
Post 619
http://www.itproportal.com/2015/03/17/teenagers-data-privacy-savvy-think/
Teenagers are more privacy aware, "dirtying" their online data and "vaguebooking." I think this is a positive development is public self-protection. |
Post 620
http://arstechnica.com/tech-policy/2015/04/fbi-cant-cut-internet-and-pose-
as-cable-guy-to-search-property-judge-says/ In order to surveil a casino penthouse, the FBI cut the internet to the suites and posed as repairmen to install cameras - a federal judge ruled their actions illegal. The judge ruled that if they could do this, then they essentially had the power to search any property they desired regardless of warrants. |
Post 621
Local educators talk student data privacy with Rep. Jared Polis
http://www.dailycamera.com/boulder-county-schools/ci_27861230/local- educators-talk-student-data-privacy-rep-jared Bruce Messinger, a Boulder Valley Superintendent, has been talking about data privacy for students. This came out from privacy concerns from a parent who didn't want their child to take standardized tests because of privacy concerns. |
Post 622
Ajusto app that watches your driving habits leads to privacy concerns
This new insurance app monitors speed, acceleration, braking, hard turns, but critics worry about Big Brother watching. This new usage-based insurance (UBI) technology provides an interesting supplemental consideration to our discussion of autonomous cars and the risks of decreased personal privacy How it works: "It runs an algorithm and knows by the movement of the phone whether you're driving or whether you're in a bus or whether you're in a train or on a plane or whether you're a passenger."Minutes after the trip is over, the app rates the driver (in stars, out of five) on speed and driving smoothness. It notes the time of day, distance travelled and issues a score out of 100. The average score for all trips is used to determine the amount of the discount, if any. http://www.cbc.ca/news/business/ajusto-app-that-watches-your-driving- habits-leads-to-privacy-concerns-1.3019787 |
Post 623
http://money.cnn.com/2015/03/25/technology/ford-speed-limit/index.html
I sure know I wouldn't want this in my car! Looks like the real Ford has been developing automated features other than the "self park feature" that the pseudo Ford group in class discussed. This should be an important point of debate as society moves forward with automated cars. |
Post 624
http://qz.com/350812/people-are-finally-worrying-about-online-privacy-and-
tech-firms-are-already-cashing-in/ Basically a bunch of data on how people would like more privacy and how tech companies are reacting or perceive the problem. |
Post 625
Barack Obama's Passport Details Shared in Privacy Mix-Up: Report
http://www.nbcnews.com/news/us-news/obamas-personal-details-shared-privacy- mix-report-n332401 |
Post 626
Scientists are gathering data from sewer waste to determine the health of a
population. Researchers laid out the case for sewage as a public-health tool, arguing that human waste may be a more efficient way of measuring obesity at the population level. Interesting to think about the weird places people are searching for data that is very, very personal. http://www.theatlantic.com/health/archive/2015/03/the-secrets-in- sewage/386794/ |
Post 627
http://www.geek.com/news/avg-is-developing-invisibility-glasses-1616863/
AVG creates glasses that can fool facial recognition algorithms like we studied in class |
Post 628
Monica Lewinsky gave a TED talk about personal data (indirectly) that has been widely watched. Here's the relevant excerpt to our class, and my
brief thoughts below the quotation: "Let me paint a picture for you. It is September of 1998. I'm sitting in a windowless office room inside the Office of the Independent Counsel underneath humming fluorescent lights. I'm listening to the sound of my voice, my voice on surreptitiously taped phone calls that a supposed friend had made the year before. I'm here because I've been legally required to personally authenticate all 20 hours of taped conversation. For the past eight months, the mysterious content of these tapes has hung like the Sword of Damocles over my head... This was not something that happened with regularity back then in 1998, and by this, I mean the stealing of people's private words, actions, conversations or photos, and then making them public -- public without consent, public without context, and public without compassion. Fast forward 12 years to 2010, and now social media has been born. The landscape has sadly become much more populated with instances like mine, whether or not someone actually make a mistake, and now it's for both public and private people. The consequences for some have become dire, very dire." I think it is interesting to realize that everyone is part of the same system of personal information that is stored, passed on, and reflected back on an individual -- whether an "ordinary" person such as Amanda Todd, who was bullied using her personal data, or Monica Lewinsky, involved in an inherently high-profile ordeal. A way in which technology of the internet can be humiliatingly and shamefully equalizing in the predicament it poses for all users (at least in this moment in time in 2015): it both allows for great publicity and great vulnerability on a relatively equal basis. Source: http://www.ted.com/talks/monica_lewinsky_the_price_of_shame/transcript?language=en |
Post 629
Ajusto app that watches your driving habits leads to privacy concerns
http://www.cbc.ca/news/business/ajusto-app-that-watches-your-driving- habits-leads-to-privacy-concerns-1.3019787 |
Post 630
House intel leaders unveil cyber-security bill
Leaders of the House Intelligence Committee unveiled a bipartisan bill Tuesday that would make it easier for private companies to share cyber- threat information with the government to thwart attacks by hackers. It aims to give government agencies the ability to see how a hack occurred and take action to prevent more attacks. Companies would report cyber threats to civilian agencies rather than to the NSA or the Defense Department. The proposed bill specifically states that it does not authorize the Department of Defense, the National Security Agency nor any other part of the intelligence community to target a person for surveillance. http://www.usatoday.com/story/news/politics/2015/03/24/house- intelligence-committee-cybersecurity-information-sharing-bill/70375004/ |
Post 631