Data Privacy Lab  

Harvard University

The Politics of Personal Data

Gov 1430

Home | Schedule | Syllabus

In the News

The politics of sharing personal information is timely. Share links to news items relevant to the course. You should provide a link once a week.

Post 1

Dutch court: "privacy is [more] important"

Post 2

Research that will be published in the IEEE Journal of Biomedical and Health
Informatics claims that Twitter posts may be used to predict busy
emergency room hours based on people's health complaints that they tweet.

Post 3

Post 4

Privacy advocates sued the Federal Aviation Administration for not
addressing privacy issues in recent proposed rules for commercial drones,
the latest dust-up over how to regulate unmanned aircraft as the devices
become more prevalent in U.S. skies.

Post 5
A brief article with an anecdote about the passing of HF3 in the House of
Reps. The bill will make it easier for people to prove the guilt of violators of
privacy rights, which the author argues will help future victims of privacy

Post 6
Samsung's voice-recording smart TVs breach privacy law, campaigners claim
US consumer rights group Epic claims Samsung has breached the privacy of its users,
and is demanding an FCC investigation

Post 7

This article outlines an experiment that tests how fast stolen data travels
around the world. They found that within two weeks over 1000 people had
seen and/or downloaded this fictitious stolen data.

Post 8
airbnb claims that the government in San Francisco is attempting to collect double the
taxes airbnb renters owe the city. Additionally the company claims that the government
is trying to get more personal information from renters than is necessary to ensure that
the taxes are being properly paid.

Post 9

Australia's upper house just passed a law requiring telecommunication firms
to retain customers' digital data for two years. This was done in an attempt
to tighten counter-terrorism measures.

Post 10

This is in French, so use Google translate if you don't read it, but the French
National Assembly approved a measure to install "black boxes" in ISPs to
monitor internet metadata.

Post 11

Much the like recent Uber hack. "It’s been revealed that, a
private firm which allows drivers to pay fines via its website and has a direct
link to the Driver and Vehicle Licensing Agency (DVLA) database, had been
affected by a backdoor which gave access to restricted information." This
exposes names, addresses, photographs, and other vital information. The
company was susceptible to hack due to its encryption process.

Post 12

Joel Jeffrey Sokolsky


Yannis M. Ioannides

Michael R Fox:

Steven Myers:

John Martin Page, Jr:

Megan Buchanan:

Bruce David White:

Geoffrey L. Cohen:

Eli Katz:
Sehic M Azra:

Osvaldo Civitarese

Post 13

Facebook is getting in on the drone-based Internet provider game!

"Taking to the skies to beam Internet access down from solar-powered drones may
seem like a stretch for a tech company that sells ads to make money. The business
model at Facebook, which has 1.4 billion users, has more in common with NBC than
But in a high-stakes competition for domination of the Internet, in which Google wields
high-altitude balloons and high-speed fiber networks and Amazon has experimental
delivery drones and colossal data centers, Facebook is under pressure to show that it,
too, can pursue projects that are more speculative than product."

Post 14
Why this national data breach notification bill has privacy advocates worried

Post 15
"The privacy of students who get care at university clinics is
in doubt after the mental health records of a woman who says
she was raped at the University of Oregon were used by the
school in the course of defending itself against a lawsuit."

" court papers, [University if Oregon] officials argued
that since the [sexually-assaulted] student went to the
school's health clinic, her health records belong to the
school and therefore could be accessed. In addition, they
argued that because the woman claimed emotional distress — a
medical claim — the school was entitled to her medical records
under a federal law known as the Family Educational Rights and
Privacy Act."

"Steve McDonald, an attorney for the Rhode Island School Of
Design and a FERPA specialist, says the nation's medical
privacy law, known as HIPAA, doesn't apply in this case, and
the school is within its rights."

Post 16

Another source of personal data exposure comes from companies who go
bankrupt. In auction, they are trying to sell customer's personal data,
including names, addresses, email addresses and possibly other more
sensitive information.

Post 17
UK surveillance under scrutiny

Post 18

The Federal Appeals Court in New York ruled today that the mass collection of
metadata from domestic phone calls is not legal under the Patriot Act. The ruling
comes at the time when Congress is deciding whether or not to end or expand the

Post 19
Clear Deletes Dumb Tweets Before You Regret Them

Interesting new startup designed to warn you before you post that inappropriate or
accidentally offensive tweet. The idea is that people need something to force them to
stop and think before they post. I guess my response would be if you don't want people
thinking you're a jerk on twitter, don't be a jerk on twitter.

Post 20

Post 21

This article describes how big data will make medicine more efficient and
improve the monitoring of "population health." Individual patient data will
also help create protocol for treating difficult things such as cancer by
compiling the successful treatment paths all in one place.

Post 22

Timely article in Bloomberg about how hackers linked to the Russian government have
tried to infiltrate features in various pieces of Microsoft and Adobe software to get at
information about sanctions policy. Especially interesting piece on how a cyberattack
is detected and deflected.

Post 23
Wikipedia to sue NSA over online surveillance!

Post 24

Post 25
Tech firms and privacy groups press for curbs on NSA surveillance powers

"In a letter to be sent Wednesday to the Obama administration and senior lawmakers,
the coalition vowed to oppose any legislation that, among other things, does not ban
the “bulk collection” of Americans’ phone records and other data."

Post 26
There is a new barbie doll that records what kids say to it and responds. It "learns" overtime to deliver more "intelligent" responses. The concern is that this
doll will send data to the toy company as well as third parties for use and storage beyond the bounds of privacy protection.
Also, it raises the uncomfortable fact that people may be willing to form human-like bonds with non-human entities. From the article:

"Even if Mattel and ToyTalk aren't using this technology to feed data to advertisers, they're still hoping to manufacture deep, emotional bonds between
children and their toys. Susan Linn, the director of the CCFC, has said this is unequivocally 'creepy' and creates 'a host of dangers' for children and families.
'Kids using 'Hello Barbie' aren't only talking to a doll," said Linn, "They are talking directly to a toy conglomerate whose only interest in them is financial.'"

Two of the more disturbing points from the privacy statement are:

"to provide you with news and information about our events, activities, offers, promotions, products, and services we think will be of interest to you (with
your consent where prior consent is required by applicable law);"


"for other research and development or data analysis purposes" <-- I think this is unspecific and possible to be abused!


Privacy policy:

Post 27
These are a few noteworthy technological developments that relate to
privacy and some of the discussions we've had in class so far:

The security firm, AVG, is in the prototyping stage of creating "privacy
glasses" which make you invisible to facial recognition software

Qualcomm is launching "Snapdragon Sense" ID 3D Fingerprint Technology,
the first 3D fingerprint authentication technology that rests on ultrasonic

Panasonic is delving into surveillance camera technology with the creation
of Nubo: a 4G-equipped security camera that can still keep a watchful eye in
situations were there's no power or WiFi signal. The camera's motion sensor
detects movement, recording clips in 5-, 10-, 30- or 60-second lengths and
analyzing the footage to differentiate between humans and your family pets.
If your dog or an unwanted guest enters the monitored area, Nubo sends
alert to your connected mobile device along with the captured video.

Post 28

The Department of Homeland Security is opening an office in Silicon Valley
and trying to work more closely with tech companies. However, they also
appear to be calling for less encryption of private data, or more cooperation
with companies to hand said data over to the government.

Post 29

Github suffered a massive DDOS attack, early fingers were pointed at the
Chinese goverment.

Post 30
"DARPA Says It Wants to Help Protect Your Online Privacy"

"The goal of the Brandeis program is to break the tension between
maintaining privacy and being able to tap into the huge value of data,"
explained program manager John Launchbury in a press release. "Rather
than having to balance these public goods, Brandeis aims to build a third
option, enabling safe and predictable sharing of data while reliably
preserving privacy."

Post 31

Microsoft became the first major cloud service provider to have an international
standard for the privacy of users' information/data. It used to have to comply with
different federal governments and sell data depending on which government was
asking for a particular nationality's data. Now Microsoft will alert their users when
the data will be used by the government, and will show their users more
transparent rules about how the customer data is being used.

Post 32
Breach of payment card data security standard leads to £175,000 ICO fine
for insurer:

Post 33

More attempts from the NSA and GCHQ to break into people's
personal data, this time by compromising SIM cards in mobile

Post 34
Broadband Companies Sue the FCC Over Net Neutrality

Broadband companies began their assault on the U.S. Federal Communications
Commission's net neutrality proposal this week, earlier than most analysts expected.

Post 35
I believe that Professor Sweeney mentioned one of these books in
class, but here is a Washington Post article on two books on
data privacy:

Post 36

Really interesting article about the NSA and the fourth amendment and how they may
be at adds.

Post 37
There's a really interesting article in the Atlantic about Facebook uses by cops for
detecting relationships between people who commit crimes and others, or predicting

"The fundamental problem with policing via social-media data is that it misrepresents
what social networks actually look like on the ground. Despite what techno-evangelists
might wish, not all social relationships can be described using computational logic. The
problem is structural and epistemological. Like all computer programs, databases are
ultimately based on binary logic. If you want shades of meaning, you have to explicitly
build that capability into your system. And building nuance is far harder than it seems."

Post 38
Virginia pushed into debate of teacher privacy vs. transparency for parents

"Legislators in many states have recently passed or tightened laws to shield teacher
evaluations from public disclosure. Others — including Arkansas and Indiana — require
schools or school districts to report on the average performance of teachers in such a
way that individual teachers cannot be identified."

"Only in a few states do parents have a right to more information. In Florida, a state
appeals court ruled in 2013 that value-added model scores should be made public
after the Florida Times-Union newspaper sued to obtain the data. New York requires
school districts to give parents access to the overall ratings of their children’s teachers,
and Michigan requires parents to be notified, starting in the 2015-2016 school year, if
their children have a teacher rated ineffective for two years running."

Post 39
Voice commands being recorded from smartphones:

Post 40
"House Passes Cybersecurity Bill Despite Privacy Protests"

Despite significant privacy protests against the new Protecting
Cyber Networks Act, a significant majority of the House of
Representatives voted to pass the bill. People are calling it
nothing more than a "backdoor" for general purpose surveillance.
Obama has shown to be a stronger privacy advocate than his
predecessors, so civil society groups are hopeful he will veto
this bill and not do "a complete 180" on his prior commitment to
privacy issues.

Choice quote:
- "'PCNA would significantly increase the National Security
Agency’s (NSA’s) access to personal information, and authorize
the federal government to use that information for a myriad of
purposes unrelated to cybersecurity,' reads a letter signed
earlier this week by 55 civil liberties groups and security
experts that includes the American Civil Liberties Union, the
Electronic Frontier Foundation, the Freedom of the Press
Foundation, Human Rights Watch and many others."

Post 41

Part GoPro, Part Dropcam: Flir’s FX Camera Does Sports, Surveillance

A new camera can keep watch over your home or mount to your
dashboard or snowboarding helmet to capture action footage.
The FX isn’t actually continuously recording. Instead, the camera’s
motion sensor tells the device to start recording whenever something in
front of it moves, day or night.
The app also lets you see a live stream of whatever’s happening in front
of your camera in real time as well

^^Possibility of privacy infringement if the app becomes hackable

Post 42
Facebook 'tracks all visitors, breaching EU law'

Exclusive: People without Facebook accounts, logged out users, and EU
users who have explicitly opted out of tracking are all being tracked, report

Facebook tracks the web browsing of everyone who visits a page on its site
even if the user does not have an account or has explicitly opted out of
tracking in the EU, extensive research commissioned by the Belgian data
protection agency has revealed.The researchers now claim that Facebook
tracks computers of users without their consent, whether they are logged in
to Facebook or not, and even if they are not registered users of the site or
explicitly opt out in Europe. Facebook tracks users in order to target

Post 43
Is Privacy Obsolete?
Thanks to the revolution in digital technology, privacy is about to go the way of the
eight-track player.

Post 44
AlienVault Announces More Social Threat Exchange

"AlienVault, a cybersecurity firm aimed at SMBs, announced the Beta of Open Threat
Exchange (OTX) 2.0. The company bills it as a threat intelligence sharing platform, and
the social component it has added in the latest version enables members to discuss
security threats on a social network."

Post 45
Title: Facebook data privacy case to be heard before European Union court


Law student in the EU has taken legal measures to prevent US intelligence
agencies gaining access to his personal data through facebook. He was
spurred by Snowden incident to take action. He has previously gone to the
data regulator in the Irish Republic and had his claim turned down. However,
the Judge sent the case to European court of justice, in Luxembourg where
his case will be heard on Tuesday

Post 46
RadioShack Auctions Off Millions of Customers’ Names and
Information, Despite Its Privacy Policy

Post 47

A look at what we are sacrificing in terms of privacy in the War on Terror.
The article was written mostly due to the renewed debate on the Patriot Act
and whether Congress should change or get rid of the act that came into
effect after 9/11.

Post 48

Paul Rhua's house was raided by FBI agents posing as workers, seeking to
gather evidence to press gambling charges. Is this really the win for the
privacy rights of the American public that it is held up to be? A closer look at
the difference between how the super-rich and the average American are
treated with respect to this 'right' would be a more appropriate look at the
gains and losses of American privacy.

Post 49
"AT&T to Pay $25 Million to Settle FCC Privacy Breach Case"

ATT&T workers leaked confidential info about 280 thousand
subscribers to allow re-sellers to unlock used phones. The FCC
detailed that the privacy breach revealed: names, parts of SSNs
and other data in Mexico, Colombia and the Philippines. AT&T paid $25 million to settle the claims. However, this privacy breach
went undetected for months...

Choice quotes:
- "The market for unlock codes grew out of a unique wrinkle in
the U.S. wireless industry, which for years relied on selling
devices to subscribers at subsidized prices in exchange for a
two-year contract."

Post 50
Has the NSA grown too big? It might be time to breakdown the NSA . The
NSA has proven time and again to prioritize intel over security.

Post 51

In the wake of lawsuit, Twitter has updated its policy for accounts not registered in
the United States. These non-US accounts would now be under the jurisdiction of
Twitter's headquarters in Ireland with a new privacy policy and new terms of
service. This move would allow twitter to abide by the more stringent privacy rules
of the EU. This means that different twitter users will have different privacy settings
depending on where in the world they are.

Post 52

In an unprecedented move of bilateral support, a republican congressman is
working with the White House to create new laws about student online
privacy. The bill essentially gives parents the ability to say whether their
students' data is going to be shared or not shared. It would prohibit
companies from creating student profiles or advertising to students based
on the information collected from their online behavior. Companies could not
sell data to a third party and would have to disclose the type of information
being collected. Parents could ask for certain information to be deleted or

Post 53
"Privacy Is The Real Disruptive Force In Digital Technology"

This article explains how technology advances, it is privacy that is being
disrupted. But as people become aware of this, they care more about their
privacy and start pushing back.

Post 54

"Understanding how your fitness tracker uses your personal data"

This article talks about how seemingly trivial data collected by
fitness app, like Fitbit or Mapmyrun, can be used to identify
you. It's a "privacy nightmare waiting to happen."

Choice quotes:
- "Simply by looking at the data can find out with pretty good
accuracy what your gender is, whether you are tall or short,
whether you are heavy or light. But what's really interesting is
you can 100 percent be identified by your gait."
- "Even more potentially dangerous than the activity trackers are
fitness apps like 'mapmyrun,' which log your running routes, even
showing how often you run them."


Post 55
A bipartisan student privacy bill is expected to be introduced into the House.
The bill, called the Student Digital Privacy and Parental Rights Act, will seek
to protect the privacy of K-12 graders. It was created in response to "the era
of standardized testing, with education companies collecting a seemingly
endless amount of information on public school students, some of it
incredibly detailed."

"If passed, the bill would ban companies from knowingly using student data
to create targeted advertising or individual marketing profiles. The law would
apply to third-party companies operating digital school services, like online
homework portals, student email programs, or digital teaching aides."

This POLITICO article, however argues that the bill does not go far enough:

"The bill lets education technology companies continue to collect huge
amounts of intimate information on students, compile it into profiles of their
aptitudes and attitudes — and then mine that data for commercial gain. It
permits the companies to sell personal information about students to
colleges and employers, and potentially to military recruiters as well."

Read more:
stop-data-mining-of-kids-116299.html#ixzz3VJT0tzWi, arvues

Another interesting analysis which sides with POLITICO's argument can be
found in the Washington Post:

Post 56

The House Education Committee reconvened on Friday, the 17th, to discuss
the prospects of a data privacy bill. The bill outlawed the act of
mining/sharing student data by online education-based companies. The
legislation also limited marketing prospects for these aforementioned
companies. Lobbyists have pressured government officials that the bill does
not discern between the bevy of technology companies in the field of
education. This has stalled the progress of the bill.

Post 57
China Is Said to Use Powerful New Weapon to Censor Internet

"The Great Cannon, the researchers said in a report published on Friday, allows China
to intercept foreign web traffic as it flows to Chinese websites, inject malicious code
and repurpose the traffic as Beijing sees fit."

Post 58

Boston police have come under fire once before for using face recognition
software in cameras at music festivals in Boston. Now they plan to step up
their privacy invading regime at the Boston marathon, putting in more
cameras than ever before, and installing software that allows the cameras to
position themselves towards the sounds of gunshots. This is of course
understandable... but now they want to install the cameras on every street of

Post 59

FTC has filed a complaint against Nomi Technology, a company that helps retail
stores track customers using MAC addresses. Nomi promises to provide a
platform for customers to opt out of tracking, yet they do not let people know they
are being tracked. The FTC complained that consumers did not know about the
tracking and there was no way to opt out in the store. They argue that when
companies make privacy promises, they have to keep them.

Post 60

New surveillance cameras will be in place for the marathon, but some will be
permanent, raising privacy concerns for the city of Boston.

Post 61

Post 62

Appropriate for what we've been discussing in class - how to
remove yourself from those background check sites

Post 63
Below is a link to Do Not Track, a docu-series on data privacy issues. It is
particularly interesting because the episodes are interactive and informative.
I watched an episode and vouch for the intrigue. Directed by Brett Gaylor,
coproduced by Upian, Arte, ONF & BR.

Post 64
Title: Court Hears Challenge to Safe Harbor Data Deal


Update on prior article regarding the court case of facebook vs. the law
student in Ireland. It reiterates some of the concerns of the student and how
the Safe Harbor agreement allows transfer of personal information from
Europe to the U.S. along with some of its possible problems in society and
in regards to data privacy

Post 65

Recent survey results about public perception of privacy.

Post 66

Questions have arisen regarding the security of the private email server Hillary
Clinton used as Secretary of State. Were the safeguards used for her personal
system up to the level of government security and encryption?

Post 67

Public policy requires that police must obtain a warrant before using drones
for law enforcement, however there are currently no laws regulating privately
owned drones which are used below a certain ceiling. Concerns occur when
drones land on private property, which can happen when a drone goes out
of range of the controller, or runs out of fuel for example. It is not exactly
clear how to deal with the privacy issues that result. Can the controller be
sued for invading private property? Whose property is the drone as a result?

Post 68

Facebook admits to tracking non-users but claims that this does not breach
EU privacy laws. Regardless, how is this not highly immoral?

Post 69
Google, Facebook and Microsoft on Data Privacy

Some of the largest tech giants like google, facebook, and microsoft have,
for the most part, agreed that data privacy should be integrated at the
beginning of product development process. This coincides with a lot of
government and company regulations.

Post 70
Ireland in top three EU countries for undermining data privacy:

Thanks to some leaked Brussels documents, some of the top neglectors of
data privacy rights have been revealed. Every since the EU has been
working to update 1995 data privacy laws, some countries have gone out of
their ways to water down legislation to weaken user privacy rights. Germany
and UK were among other top offenders.

Post 71

The FBI essentially has a tool that impersonates a cellphone tower which
means they can get information from people's phones and potentially force
phones in the surrounding area operated by the same service provider to
drop calls. It's a problem not only because of privacy, but also because
dropped calls can be particularly heinous when considering emergency calls
from the hospital or family.

Post 72

This article summarizes the data security breaches observed in the US last
year. The study found that over 675 million records were breached, with a
majority of cases focusing on the business sector.

Post 73
Two debt brokers posted consumers' personal information. The FTC filed lawsuits
against these brokers; the judge ordered the brokers to take down the personal

Post 74
APT28, a Russian hacking group, finds flaws in widely used computer
software, specifically Adobe Flash and Microsoft Window. The group
manipulates these holes in the software to extract information on American
governmental and military organizations. Investigations by FireEye, a
security firm, displayed that these hackers might be extracting this
information for the purpose of the Russian government.

Post 75
"3D Robotics' New Drone Wants to Bring Moviemaking to the Sky"

New drone promises to bring hollywood quality film to users, very

Post 76

Facebook will now create identities for children (though children cannot
have their own accounts) for parents to tag pictures of them. Facebook says
it will serve as a babybook, but that the kids will inherit the account when
they are older. Realistically, now children could have an identity on facebook
whether they want it or now.

Post 77

Facebook is on trial in Europe for how they use (or abuse) users data.

Post 78
House Passes Cybersecurity Bill Despite Privacy Protests

Post 79
The data protection watchdog in France has outlined plans to work with car
manufacturers and technology companies to ensure people's privacy is respected
as 'connected cars' systems become more sophisticated.

Post 80
Google Expected to Face Antitrust Charges
Case would be EU’s biggest competition battle since pursuit of Microsoft a decade ago

Post 81
Flashback to Anthem in light of our recent SSN discussion. Is this the end of SSNs as

Post 82

According to this article in the Wall Street Journal, "91% of Americans feel they’ve lost
control over their personal data". The article goes into detail about what data
consumers feel most strongly about having leaked (this appropriately deals with how
often a cell phone is being tracked, encryption, etc). It also goes into what consumers
think they know about their privacy and laws protecting it.

Post 83
"'Tech Can Be a Champion of Privacy,' Edward Snowden Tells Tech
Leaders at SXSW"

Edward Snowden had a message for some two dozen technology leaders
at the SXSW Interactive festival today: “Tech can be a champion of

In an hour-long meeting conducted through Google Hangout, the
whistleblower and tech leaders discussed the role of the tech community
in curtailing mass surveillance and protecting the Internet from forces
seeking to weaken it.

Post 84
How Much Do You Know About Data Privacy? Test Yourself

This is a very interesting test that was administered, trying to see how much
people know about data privacy. The questions ranged from individual's
privacy in regards to health care, shopping habits, and cell phone
conversations. Many people listed a lot of information as very sensitive. The
results were very interesting, and I would encourage you all to take a look.

Post 85

Amazon has moved drone testing to Canada in light of highly stringent FAA
regulations on drone testing, specifically the requirement to have a pilot in line-of-
sight of the drone at all times

Post 86

At&t was fined 25 million because names, parts of Social Security numbers
and other data were provided to resellers so they could unlock used phones.

Post 87
Facebook, Google, Microsoft ask Congress to pass privacy rights for

Post 88

At&t was fined 25 million because names, parts of Social Security numbers
and other data were provided to resellers so they could unlock used phones.

Post 89
"Pentagon Seeking Ways to Protect Personal Data Online" (from USA Today)

The U.S. Government is balancing two competing priorities: the first is to make private
personal data accessible to companies and government agencies in order to increase
efficiency and responsiveness, and the second is to preserve individual privacy. The
Pentagon has proposed a new program under the Defense Advanced Research Projects
Agency (DARPA), called "Brandeis," that is intended to protect personal data and shift
"the mechanisms for data protection to the data owner rather than the data user."

Post 90
Data Security and Breach Notification Act of 2015 -- The article explores
the idea that the new act is in fact less effective and less strict.

Post 91

Interesting problem—how to keep minors/children safe on sites/apps where they may
not understand the ramifications of what they post? Many sites have age limits but fail
to enforce them. My siblings have instagram, but are too young to understand any
terms of use that they may enter into or the danger of accepting follows from people
you don't know well.

Post 92
Our View: The thin line between safety and privacy

Post 93

This article is a good illustration of how much more vulnerable personal data will be to
hackers as we continue to increase the use of electronic medical records. Not only
does this call into question the earlier debate we had in class regarding the extent to
which Social Security numbers are used to identify people, but also how much
regulation the government should have regarding the safety of people's information in
private computer systems.

Post 94
Great follow-up article on the Pearson social media spying scandal from Forbes.

Post 95
RadioShack Sale Sparks Data Privacy Concerns
Could selling consumer information become a trend for cash-strapped businesses?

Post 96
"‘Open Humans’ platform wants to democratize your DNA for better medical

Since secrecy slows down medical research, the site "Open Humans" is attempting
to allow universal access to non-de-identified health data that contains names and
contact information. This presents potential problems with privacy since there is no
attempt made to hide the identity of the site's users and any user will have access
to everyone else's personal information.

"In order to sign up, participants must pass a test showing they understand the
risks of sharing private health information. If hacked, the leaked information could
affect a person’s access to life insurance, or long-term care coverage."

Post 97

A policy that would effectively push foreign technology companies out of China’s
banking sector has been suspended, according to a note sent by Chinese regulators to
banks across the country.

Dated Monday, the letter called for banks to “suspend implementation” of the rules,
which have been at the center of a brewing trade conflict between the United States and
China. Put into effect at the end of last year, the rules called for companies that sell
computer equipment to Chinese banks to turn over intellectual property and submit
source code, amid other demands.

At stake is billions of dollars’ worth of business for major American companies that
make the advanced computing hardware and software that crunches numbers for banks
across China. Trade groups representing companies like Microsoft, IBM and Apple have
complained that such policies are protectionist.

The recent trade debate is just one part of a wider clash between China and the United
States over online security and technology policy.

Post 98

Post 99
In this article, called "the quantified baby" the author considers the meaning of
parenting and pregnancy given the ability to track everything constantly in groups
online that post and evaluate each other's pregnancy to devices that monitor her child's
behavior and sleep patterns for her. She says:

"I wonder whether the relationship between the caregiver and baby suffers with all of
this data management in between. A computer keeps what’s entered accurately; there
are no cloudy memories about nap times or ounces of milk in bottles. There is less
conversation between me and my son’s caregivers at the end of the day, too. But the
integrity of my relationship with him feels somehow degraded by the constantly
measuring eye. That observation changes the observed isn’t new, but I hadn’t
considered it in the context of watching my son. Do I want, at the end of the day, to
stare at data, or to hear an imperfect but narrative human account of his day? Always
there are options."


Post 100
UN to appoint watchdog to focus on privacy in digital age

The Human Rights Council of the United Nations has voted in favor of a
resolution backed by Germany and Brazil to appoint an independent
watchdog or 'special rapporteur' to monitor privacy rights in the digital age.

Post 101
The U.S. National Telecommunications and Information Administration plans to host a
series of meetings with interested people aimed at developing best practices for
protecting privacy in the burgeoning aerial drone industry.

Post 102
For the first time the internet of things has been used in the case of a hacking attack
that compromised and sent out spam to 750000 emails.

This is a problem of malware absence: "many of these internet-connected devices don't
have malware protection. And it's now been documented that someone is taking
advantage. Security company Proofpoint has discovered a botnet attack -- that is, a
cyber attack whereby the attacker hijacks devices remotely to send spam --
incorporating over 100,000 devices between 23 December and 6 January, including
routers, multimedia centres, televisions and at least one refrigerator."


Post 103

One of the leaders of a ring of hackers was recently caught in Russia. The hackers
used ransomware to hack Android devices, and the software would either open
other pages in banking apps on the phone to get the user to enter credit card
credentials, or hack the apps themselves to get banking numbers. Ransomware is
also capable of locking the device until the user sends the hacker a ransom, and
these hackers hacked US officials' phones and pretended to lock them on the
grounds that the phones had broken a law and been used to access pornography.

Post 104

Does the Germanwings disaster set a precedent that their should be more
transparency between employee medical records and employers?

Post 105
States Consider Awarding Lottery Winners Something Else: Anonymity

Post 106
"Connected cars perfect for harvesting personal data, report warns
Cars generate data extremely valuable to insurers, governments, law
enforcement agencies, companies"

"'In the frenzy to take advantage of this new technology … automakers and
their corporate partners appear to have ignored Canadian data protection

Post 107

A new bill on the house floor seeking to protect student data for K-12 students
using online educational services has come under fire for leaving several large
gaps in protection that would allow companies to exploit this data. The lack of any
sort of clause to indicate parental consent for use of data is among the largest

Post 108

Samsung on their new television:
"Please be aware that if your spoken words include personal or other sensitive
information, that information will be among the data captured and transmitted to a
third party through your use of Voice Recognition," Samsung had posted in its
privacy statement for its SmartTVs

Post 109
Similar to post 58, AT&T now offers to not mine your internet data for an extra fee.

Post 110
Bloomberg Is Giving $42 Million To U.S. Cities To Solve Problems In
Smartest Ways Possible

Interesting initiative regarding the expansion of open data:

"Bloomberg Philanthropies announced the launch of a $42 million initiative
on Monday that will help 100 mid-sized U.S. cities better utilize data to
serve their communities. The What Works Cities program partners with a
handful of supportive organizations -- such as Results for America and the
Sunlight Foundation -- to help local governments manage and analyze data
to serve residents.

The initiative -- which is now accepting applications from cities with
populations between 100,000 and 1 million -- will create open data
programs that boost government transparency, help cities incorporate data
into policy decision-making and fund efforts that best deliver positive results
for citizens, among other functions, according to a press release from
Bloomberg Philanthropies."

Post 111

Harvard email posted with redacted information, but commenters are able to
figure out the subject by finding his Twitter account.

Post 112
Jeff Gelles: Is Congress taking wrong direction on data privacy?

This is an opinion article addressing the current legislative bills on data
handling. The main point being: '"Moy says Congress is wrong to see data
breaches as only a financial threat. At the heart of the FCC's authority is
protecting phone and cable networks "as a safe space for free speech and
communications." Why backtrack at all on that?"'

Post 113
RadioShack Sale Sparks Data Privacy Concerns

With RadioShack entering bankruptcy, there has been a lot of talk of selling
consumer data to help finance the bankruptcy. This includes more than 13
million email addresses and 65 million customer names.

Post 114
Snowden talks surveillance, privacy with Swedish lawyers in Moscow

Post 115
"Europe’s Digital Czar Slams Google, Facebook Over Selling
Personal Data"

An article about the how big US tech companies exploit legal
loopholes in Europe "to vacuum up and sell individuals’ personal

Choice quotes:
- "Data privacy plays a much bigger role in the public debate in
Europe than it does in the U.S., partly due to the legacy of
totalitarian regimes in Germany and other European countries
during the last century. Those concerns were aggravated by last
year’s revelations of widespread Internet surveillance of
Europeans by U.S. security services."
- “If you use an iPhone, they know all about your
creditworthiness, your shopping habits,” he [Günther Oettinger]
said. “Take car insurance. They know the last time you were
involved in an accident.”

Post 116

Judge letting court case against Google Wallet go to trial. This will bring Google
practices under scrutiny in a small move in the direction of consumer privacy.

Post 117

The first article is from last summer, but is a relevant introduction to the second
article. The first article explains how cities (such as Rio) are using data from Waze
(a popular GPS/navigation app on mobile devices) to determine solutions to traffic
problems, as well as quantifiably measure the data that traffic generates. The
second article is about Boston's recent agreement with Waze to gather the data
from the app to see correlations between snowfall and traffic, and other hazards
and traffic (ex. Does enforcing the no-double parking laws lead to less traffic on
Comm Ave?). The problems about data privacy arrive when the city is able to see
the driving history for each user of the app. In some instances, they can see up to
three months of driving history for each user, although Waze claims that the names
of the users are separated from the data, and that the data is under the names of

Post 118
Snuggies! The FTC! Deceptive practices, oh my!

Post 119
"Pakistan’s mobile phone owners told: be fingerprinted or lose your sim
card.......In one of world’s largest efforts to collect biometric information,
Pakistan has ordered mobile phone users to verify their identities through
fingerprints for a national database being compiled to curb terrorism. If they
don’t, their service will be shut off, an unthinkable option for many after a
dozen years of explosive growth in mobile phone usage."

Post 120

This article discusses conversations in Washington, both in the White
House and on Capitol Hill, as to how the United States should respond to
increasing numbers of cyberattacks. President Obama will be meeting
with leaders in business later this week to encourage them to work more
closely with the federal government to improve their defenses from these

Elsewhere in the government, Secretary of Defense nominee Ash Carter
has voiced his support for a more aggressive offense by the U.S. in
response to recent attacks, including those on Sony Pictures late last year.
Others have warned against escalation, citing risks of increasing conflict
over time.

Lawmakers on the Hill have also voiced various viewpoints, though none
have pushed for aggressive retaliation from the U.S. through legislative
action. One Congressman, Rep. Mike McCaul, is working on a bill that
would encourage businesses to provide information and work closely with
the federal government to breaches.

Post 121
A recent decision by Bell Canada to abide by the federal privacy commissioner’s
recommendation that Bell only track customers who explicitly opt into their
advertising program is an about face with what the company originally wanted to
do. Bell revealed the Relevant Advertising Program (RAP) in August 2013 and it
included location and demographic information, specific websites visited, apps on
mobile devices and service usage.

Post 122

Tim Cook tells us that there is a human right to privacy and that consumers
don't realize the extent to which their data is misused. He also makes a
claim that all apple products are private and secure.

Post 123

Some quick and easy tips to help you preserve your privacy!

Post 124
The NSA spying revelations appear to be scaring away foreign Governments
from US tech companies. China has removed several companies from their
approved list including "Cisco, Apple, Intel, and McAfee".

Post 125

In order to raise revenues, Twitter is turning to a new revenue stream - its
customers. As new members dwindle away and the facebook model of
revenue not working, Twitter has begun to look at customers as content
producers. This way of thinking not only changes the way Twitter plans to
make money and expand its user base, but also changes the role of the
people who use twitter. This model likens users to unpaid employees. This is
likely to change how Twitter interacts with its users and importantly how this
affects their data.

Post 126
The proposed Student Digital Privacy and Parental Rights Act is being
criticized for not actually protect students' privacy.

Post 127
New tools allow lawyers to gain insights about court cases and their legal work from
big data, just as big companies can gain insights about customers from data as well
(i.e. Target predicting pregnancy). Here's the idea:

"The idea of Ravel Law is to use a combination of data visualization, natural language
processing, and machine learning to make the law significantly easier to understand for
lawyers, improving the quality of legal research while also making it more efficient. The
team came out of Stanford’s CodeX program, which is an interdisciplinary center of
computer science, law, and design."


Post 128
Kaspersky releases decryption tool that unlocks ransomware

"The NHTCU shared this information with Kaspersky which used it to build
the Noransomware decryption tool. Granted, the program isn't 100 percent
effective yet -- it's not like the NHTCU got all of the potential keys off of that
one server or anything -- but as police forces around the world continue to
investigate the CoinVault ransom campaign, Kaspersky expects to grow the
key database and further improve the tool's functionality."

Post 129

Post 130

Tesla not looking to introduce fully automatic cars for a while,
according to Washington Post

Post 131
"Protecting Personal Data in Argentina is a Work in Progress"

Though the US is a leader in data-processing, its legislation
regarding the protection of personal data is inadequate. This is
because the evolution of tech has outpaced the legal frameworks
intended to govern their use. In fact, surprisingly, Argentina's
legislation, National Directorate for Personal Data Protection
and the Law of Personal Data, is one of the most advanced.

Choice quote:
- However, "the Argentinean experience is no different from other
countries in the region, who despite having laws protecting the
personal data of individuals and corporations still have a long
way to go."

Post 132

NY Cops Used ‘Stingray’ Spy Tool 46 Times Without Warrant

Post 133
The state House of Representatives on Thursday approved a bill that will limit the
student data that technology companies will be allowed to collect, use or sell for
commercial purposes.

Post 134

Lindsey Graham made public that he has never sent an email before. He has a
phone, from which he sends texts and makes calls, but he personally has never
sent an email before. In this day and age, that sounds preposterous, but members
of his staff confirm that he has an official email account that is monitored by his
staff, but he doesn't have a personal email that he checks and maintains.

Post 135
Obama signs order creating new cyber sanctions program

President Barack Obama on Wednesday created the first-ever sanctions
program to penalize overseas hackers who engage in cyber spying and
companies that knowingly benefit from the fruits of that espionage

Post 136
This is a couple weeks old but I thought it offered a really interesting look into the
factors that affect legislation on privacy and the Internet. Special interests pose a huge

Post 137
State Dept. will review Clinton emails for possible release

Post 138
Extra-footage from John Oliver's Interview with Edward Snowden
stresses the importance of the use of passphrases instead of
passwords. While humans find it challenging to remember a random
8 character string, like "8l4Gh!r#", a computer can test all 8-
character combinations for a password in just seconds, according
to Snowden. Nonetheless, humans can easily remember a phrase
like "FIFAsoccerworldcupFrance98", which references the location
of the 1998 FIFA worlds cup. A password like this would be
virtually impossible to crack using brute-force algorithms.

Post 139
Privacy commissioner investigated Optus over data-handling practices
Company accepted an enforceable undertaking over its privacy processes from Timothy
Pilgrim, the first time the commissioner has used these powers

Post 140

Post 141

NYT Debate on 23andMe and anonymous genetic testing. Authors debate how private
the data can actually be, and whether potential privacy vulnerabilities would outweigh
the research benefits of having that data in the first place.

Post 142
"New Facebook Policy Allows Social Media Immortality"

Today, Facebook announced a new policy allowing a previously designated "executor"
or "legacy contact" to manage an account once a user has died. Up until now, Facebook
only allowed an account to be "memorialized," meaning it could still be viewed, but not
edited or managed. The policy attempts to preserve individual online privacy - even
after death - while also allowing the loved ones' of the deceased to manage the
posthumous profile.

Read more here:

Post 143

Calling it the largest data-privacy and security-enforcement action ever, the
Federal Communications Commission's Enforcement Bureau on Wednesday
said AT&T had agreed to pay $25 million in civil penalties, among other
steps, to settle the its investigation into customer-information breaches in
call centers located in Mexico, Colombia and the Philippines. - See more at:

Post 144
"Do Anonymous Apps Enable Cyberbullying?"

"Could controversies over bullying scare off investors and advertisers?
Unfortunately, unless there is a long and sustained public outcry, I think investors
and advertisers will participate in anonymous apps if they think it is financially

Post 145

Researchers are finding that the very same algorithms used to drive social
networks can be used to find organized crime rings. By seeing how
connected partners are within the network, researchers are able to find the
most connected partners and thereby detect the leaders of the gang.

Post 146

A throwback to the fact that the government is still allowed to check all of
our mail.

Post 147
EU privacy watchdog seeks to future-proof data protection reform package:

In the EU, they are passing “future-proof” new data protection laws that are
purposely very vaguely worded to protect against major technological
advances. Essentially they are going to try to make the wording of new rules
such that new technology will not make the rules "ineffective or obsolete."

Post 148

Above are two articles about a Canadian man who refused to give up his phone
password to unlock his device while being searched by airport customs at the Canada
Border Services Agency. The consequences of his refusal can be huge, with up to
$25,000 dollars and one year in jail as a fine.
According to the article:
"This is a question that has not been litigated in Canada, whether they can actually
demand you to hand over your password to allow them to unlock the device," he said. "
[It's] one thing for them to inspect it, another thing for them to compel you to help

Personally, I find this to be a huge breach of privacy and a violation of human dignity.
Just as a government would not – or I hope not, at least – demand to investigate
through some psychological method the contents of a person’s mind/memory in a
routine customs search, so to should they not access the contents of a phone by force.
A phone, in my opinion, is not a “good” to be reviewed, but a kind of extension of man
himself, and should be respected as such.

Post 149
Massive AT&T Consumer Privacy Violation Results in $25 Million FCC Penalty

Post 150
Interesting quiz about knowledge on personal data: Anxiety about data
privacy has reached a fever pitch. According to the Pew Research Center,
91% of Americans feel they’ve lost control over their personal data.

Post 151

Millions have their data leaked in China

As many as 52.79 million people may have had their information leaked from social
security units, others from domicile registration units, disease control departments and
hospitals. The information included people's ID numbers, financial status, income
numbers and housing data.

The cities involved included Chongqing, Shanghai, Shanxi, Shenyang, Guizhou, and
Henan. These cities are reportedly the most seriously affected by the information leak.

Post 152
Link here:

Post 153
"Americans need a champion for privacy rights"

This article criticizes the lack of discussion and debate
surrounding privacy in the 2016 presidential debate. It's a
"testament to the staying power of the US security state." No one
is taking a strong stance against the pervasive assault on
privacy and civil liberties. Clinton, who recently announced her
presidential bid, has not expressed anything meaningful and given
only "half-baked answers."

Choice quote:
- "An invasive NSA surveillance program will expire in June; 2016
hopefuls should see that it stays dead"

Post 154
A Wall Street Journal quiz examining the public's knowledge of data privacy:

Post 155
AT&T and more than 20 states are opposing the potential sale by RadioShack of 13
million email addresses and 65 million customer names and addresses as part of
its bankruptcy proceedings, fearing such a move could set a dangerous precedent
for privacy and proprietary rights in the Internet age.

Post 156
ISIS has released a list of US military members that it has a vendetta against
in the Bay Area that it located in various places online. This has raised online
privacy concerns for a lot of people.

Post 157

A PATENT placed on a way for leveraging personal information published on
social networking sites leverage gleaned psychographic profile information
to produce revenues for both social networking sites and content producers.

Post 158
"Leaked Data From 30,000 Swiss Bank Accounts Reveals Mass Tax Avoidance"

"The leaked files, which you can explore online, reveal the use of Swiss bank accounts
by actors, footballers,politicians, business owners and more to avoid paying tax to the
relevant authorities. The Guardian, which has helped leak the documents along with Le
Monde, BBC Panorama and the International Consortium of Investigative Journalists,
writes that the "Swiss operation actively abetted clients in keeping accounts secret from
tax authorities, at its height hiding $120bn in assets."

Full Article:

Post 159

Many suggest that increasing access to and use of technology in the classroom is
a surefire way to improve the quality of education in our country, but many have
raised concerns about the privacy of students' information as technology use
becomes more and more prevalent. Protecting student privacy is extremely
important, so the question is raised of how much data needs to be shared for
technology interventions to be effective and efficient.

Post 160

New app allows individuals to live stream their surroundings using their
phone. CBS suggests that this may be concerning, as individuals who are
unwillingly caught on camera may have concerns that their privacy is
violated. Such individuals are allowed to contact the website and request
that the footage be removed, but how far would a start-up go to remove
concerning footage for individuals, and how much damage could be done
before individuals manage to remove such concerning footage?

Post 161

Post 162

Post 163
Hackable medical devices - not such a far-off threat:

Post 164
Iran Is Raising Sophistication and Frequency of Cyberattacks, Study Says

Now a new study of Iran’s cyberactivities, to be released by Norse, a
cybersecurity firm, and the American Enterprise Institute, concludes that
Iran has greatly increased the frequency and skill of its cyberattacks, even
while negotiating with world powers over limits on its nuclear capabilities.
The report says that if sanctions against Iran are suspended under the
proposed nuclear accord, Iran may be able to devote the revenue from
improved oil exports to cyberweapons. But it is far from clear that that is
what Iran would do.

Post 165

Post 166
Interesting take on privacy vs. data and view on security confidence

Post 167

John Oliver tried to make sure the public gets on board with reformations to
the Patriot Act

Post 168
The Russian federal agency that oversees communications in Russia, known as the
Roskomnadzor, updated its "personal data" laws to prohibit image/meme or parody
account of a personality. This is in many ways a response to the widespread use of
Putin's likeness in internet memes.

Post 169

Google adheres to "right to be forgotten" only when mandatory, as in Europe.

Post 170
Internet Privacy Is The Wrong Conversation

Post 171
Airmail via Drones Is Vexing for Prisons

"During the graveyard shift at 1:44 a.m., security cameras at the prison here picked
up the blinking lights of an unidentified flying object approaching the facility’s

"It is the high-tech version of smuggling a file into a prison in a birthday cake, and
it underscores the headache that drones are now creating for law enforcement and
national security officials, who acknowledge that they have few, if any, ways of
stopping them."

Post 172

"Late last year, major automakers [in the U.S.] voluntarily
agreed to a set of privacy and data security principles that
will regulate how automakers collect, use, and share
information. These principles are binding public commitments
enforceable through Section 5 of the Federal Trade Commission
Act, requiring companies to fulfill their publicly stated
policies and practices. It is an important step forward for
privacy and the connected car and provides baseline
protections that automakers can build upon."


"Second, the principles provide consumers choices about the
collection, use, and sharing of certain information.
Participating companies have taken an important step by
committing to obtain affirmative consumer consent prior to 1)
using precise location information, biometrics, or information
about driving behavior for marketing purposes; and 2) sharing
such information with unaffiliated third parties for their own
use. Relatedly, the companies agreed not to share geolocation
information data with the government unless pursuant to a
warrant or court order, absent exigent circumstances or
statutory authority."

Post 173
Researchers working with the Central Intelligence Agency have conducted a multi-year,
sustained effort to break the security of Apple’s iPhones and iPads, according to top-
secret documents obtained by The Intercept

Post 174

Fascinating Austrian court case that deals with Facebook and mass surveillance.

Post 175
Iris ID solution selected for Canada—US crossings

Canada Border Services Agency’s NEXUS program will be rolling out iris
scanners as a form of biometric identification for people traveling across the
border. According to the article, "Enrolled travelers can now clear customs
by simply looking into a camera that uses the eye's iris as proof of identity.
The biometric technology is expected to improve security and expedite
border clearance processes between Canada and the U.S."

Post 176

This article talks about what happens to email accounts and social media accounts after
their owners pass away. Specifically, the article considers the problem of next of kin
being locked out of those accounts. The idea of "digital remains" is becoming an
increasingly important legal consideration. Are peoples' online identities and activities
meant to remain private ad infinitum or is there an expiration date on that privacy?
Should it only be opened up to immediate next of kin? Google is one company who
sponsored the idea of a "digital heir" to related individuals' accounts.

Post 177
Google Inc. lost most of a challenge to a German regulator’s
order that limits how it can combine user data that would allow
the company to divine customers’ personal preferences, marital
status and sexual orientation.

Post 178

FCC fines AT&T a record $25 million for customer data thefts, which is
(of course) nothing compared to their profits.

Post 179

Backlash against fake cellphone towers—invasion of right to privacy without a warrant?
Police forced to release information about how device works. "Inhibiting law
enforcement's rights are second to protecting mine!"

Post 180
(Sorry for the repost; forgot the link before.)

This article points out the marked difference in the way that Netflix is treated
by broadband providers abroad versus in the U.S. Providers in Sweden and
Australia, for instance, have woven Netflix into their cable boxes, and even
provided free access to attract customers.

Post 181
Experiment Shows Speed at Which Stolen Data Travels

A data protection company conducted an experiment in which it placed
sensitive personal data on dark web sites where stolen data is bought and
sold to see how quickly cybercriminals would pass it around. The answer:
very quickly.

The data sent around by Bitglass included the names, addresses, phone
numbers, Social Security numbers and credit card numbers of 1,568
fictitious people. Within two weeks, the company said the data were viewed
more than 1,000 times and downloaded 47 times by people in 22 countries
on five continents. Among the people looking at the data were criminal
gangs in Russia and Nigeria. The test shed light on how stolen data are
shared, bought and sold on the black market.

Post 182

Post 183

A new app called Ajusto can track your driving habits and use the data to help
reduce risky behaviors, consequently helping lower your insurance premiums.
Privacy advocates, however, are concerned about the fact that the app can also
track exactly where you've been and where all you've driven your car.

Post 184
Global Commission on Internet Governance (GCIG), citizens-first agenda for
Internet privacy, pushing nations to pledge to uphold global standards of
privacy and security.

Post 185

"It is nearly impossible to participate in modern society without entrusting
your most sensitive personal information to countless Internet-based
systems. At the same time, even the most well-resourced organizations are
being hammered by sophisticated digital attacks, making it difficult to trust
that any of these systems will keep our information safe. So the question is:
How can you keep your personal information secure while continuing to
participate in a society powered by the extensive sharing of personal

Post 186
Here is a fascinating article on how many tech companies are
using privacy preferences for profit:

Post 187
Another interesting article from last year related to privacy
in auto technology:

"Auto loans to borrowers considered subprime, those with
credit scores at or below 640, have spiked in the last five
years. The jump has been driven in large part by the demand
among investors for securities backed by the loans, which
offer high returns at a time of low interest rates. Roughly 25
percent of all new auto loans made last year were subprime,
and the volume of subprime auto loans reached more than $145
billion in the first three months of this year."

"But before they can drive off the lot, many subprime
borrowers like Ms. Bolender must have their car outfitted with
a so-called starter interrupt device, which allows lenders to
remotely disable the ignition. Using the GPS technology on the
devices, the lenders can also track the cars’ location and

"The devices, which have been installed in about two million
vehicles, are helping feed the subprime boom by enabling more
high-risk borrowers to get loans. But there is a big catch. By
simply clicking a mouse or tapping a smartphone, lenders
retain the ultimate control. Borrowers must stay current with
their payments, or lose access to their vehicle."

Post 188
Cybersecurity attack affects Harvard Student Healthcare Plan Subscribers:

Post 189
"Do not Track: an online, interactive documentary about who’s watching you"

"An online interactive documentary, the show aims to reveal how you, yes you, are
being followed online by a host of companies. And it’s personal. Both the narrator’s
identity and language are determined by your location, deduced from your IP address,
while data gleaned by inviting you to log on to Facebook, take a survey or enter the
address of an oft-visited website reveal how trackers deduce not only who you are and
what you like, but use that information to shape your online world."

Post 190
DARPA is considering providing a grant for the development of an airplane technology of a fully autonomous robotic
co pilot. From the New York Times:

"Advances in sensor technology, computing and artificial intelligence are making human pilots less necessary than
ever in the cockpit. Already, government agencies are experimenting with replacing the co-pilot, perhaps even both
pilots on cargo planes, with robots or remote operators."

This news reminded me of the self driving cars discussion, and makes me think that the trajectory of that
development might be similar to planes (perhaps what Musk was thinking of when deciding to name the
autonomous software update "Autopilot" and drawing the comparison with the airplane's development). It seems
only natural that autonomously operating transportation is a natural step in the progression of technology in
society. But it seems that norms have to evolve together with technology, so these technological developments must
be staggered and slowly evolving with those norms.

The link to the article:

Post 191
An interesting piece looking at the political nuances behind computer security policy

"At RSA Conference, Computer Security Done Right and Wrong"

Post 192

Questions arising over Georgia State's data mining and analysis of students - they
are collecting all kinds of data from attendance to financial aid status to guide
students; but the legality and ethics of this are debatable.

Post 193
The FBI is forcing local government agencies to report FOIA requests about
fake "Stingray" towers.

Post 194
"New texting app allows users to ‘un-send’ messages, guarantees

A new app was developed that allows users to delete unwanted
messages while maintaining privacy thanks to elevated encryption
algorithms. A pretty sweet solution to "text regret." It's
available for download for iOS and Android, for FREE!

Choice quotes:
- "Other messaging apps have promised security, but we've all
read the stories about images and messages that have been
unwittingly exposed."
- "With security breaches making headlines almost daily, people
want assurance that their communications are private and
protected. And that, should they have second thoughts about
something they sent, they can delete with confidence from

Post 195
House Passes Cybersecurity Bill Despite Privacy Protests

The White House has recently passed a new cybersecurity bill targeted at
stopping the wave of hacker breaches hitting American corporations. This
does come at the cost of certain individual liberties and privacies.

Post 196

A security firm uncovers a key way the NSA spies on individuals.

Post 197

New NSA spying scandal emerges, highlighting the scale of cyber wars

- Agency can access hard-drives made by major U.S. producers

- Computers in over 30 countries, including NATO allies, were hacked

- Iran and Russia were main targets

- Revelations may impact technology sector in the U.S. as institutions around the
world seek alternatives

Post 198
A news team in Texas found that a lot of documents containing personal information
were left in cars found in Houston-area salvage yards. The people who run the salvage
yards hold that it is the job of the individual to make sure that the documents are not
left in the cars before they go to the salvage yard. Some individuals are upset that the
responsibility falls on them. There is no Texas law requiring the salvage yard
employees to ensure that these documents, which are like gold to identity thieves, are
removed from the cars.

Post 199
More learning is going online, and more analog classrooms are incorporating digital
learning tools. This by default allows student data to be tracked, stored, analyzed, and
acted upon. One huge concern is the security of this data. There is now a voluntary
student privacy pledge that education tech companies are taking, and tomorrow there
will be (!) a congressional hearing on technology and education.

I don't think personally that a voluntary pledge is enough of a safeguard for student
data security, and I also think that this is as much a normative/ethical issue as it is a
technological one, so that any "pledges: should take into consideration the morality of
the ways this data should be used and analyzed. In any case, I'm excited about the
progress. And here's the article discussing this voluntary pledge in the NYT:

"Over the last several months, more than 100 education technology companies and
organizations have signed on to a voluntary student privacy pledge in which they have
committed to a variety of data safeguards, including maintaining “a comprehensive
security program that is reasonably designed to protect the security, privacy,
confidentiality, and integrity of student personal information against risks.”"

Post 200

Mozilla is moving to mark all HTTP insecure, as Netflix is trying to force
HTTPS for all of its streaming traffic.

Post 201

Post 202
Facebook is being sued for amassing the world's largest stash of facial-recognition

"The lawsuit alleges that this facial-recognition program violates the privacy of its
users, citing an Illinois law called the Illinois Biometrics Information Privacy Acts, which
requires companies to get written content from a user if it is collecting biometric data."

Post 203

The FTC has lodged a complaint against Nomi Technologies for their "Listen"
service, which allows companies to monitor their uses as they move through their
store using MAC address, much like our lab in class. Though the program had an
opt-out mechanism, the FTC alleges that Nomi didn't actually inform customers
that they were being tracked, so there was no way for them to to actually opt out
of the program.

Post 204

The Intercept reported earlier this week that the National Security Agency
(NSA) and the British equivalent spy agency GCHQ had allegedly hacked
into and stole information from millions of SIM cards produced by the Dutch
company Gemalto.

Post 205

"Ineffective junk science"

Post 206

The data-driven workplace of the future

Investigates how businesses are using big data and data analytics to track
their customers and employees and maximize efficiency and profit.

Post 207

New bill introduced appears to protect students' data privacy, but protects
companies' interests more. Here is another example of a bill's appearance of
individual protection but actual corporate protection.

Post 208
A lot of Americans check government data online, but few think the
government is good at sharing it

President Obama has made a big deal about making it easier for people to
access data the government collects -- even signing an executive order in
2013 aimed at making so-called "open data" the new default for government
information. 37 percent of American adults found information or data about
the federal government online during the past year. But, just 5 percent of
respondents to the Pew survey said the federal government "shares data
very effectively," while 39 percent said it was "somewhat effective."

Post 209
Some critics of CISA think that the bill's language is vague and does not
actually protect users' privacy.

Post 210

This New York Times article argues that the Department of Health and Human
Services, the NIH, and other medical governing authorities have made it too
difficult to get access to medical data. Especially in regards to addiction treatment
and patient care, having more access to medical data would greatly improve the
quality of the research. Though the government has concerns about private
researchers using the information appropriately, the information could be given
without certain identifiers like name or age or place of residence, though plenty of
our labs have shown that people can be re-identified with only a few pieces of

Post 211

Post 212
Twitter updated their privacy policy last night to finally make it against their policy to
use twitter for revenge porn. Any photo or video that was posted without the consent
of the subject is a violation of Twitter's terms of use. Now how to enforce?

Post 213

Law enforcement is now able to construct an image of an individual's face based solely
on DNA. Used in crime scenes when there are no witnesses in order to literally paint a
picture of a suspect. Implies that even without a general/public database of DNA, there
may be backdoors to linking DNA to identities.

Post 214
"Instagram account @TTCWomen raises privacy concerns"

A new Instagram account featuring photos of “beautiful women” riding the
TTC is raising questions about privacy and consent, but its creator says
there’s nothing offensive about the snaps. Raises questions about people's
daily right to privacy, being justified currently by creator who says that there
is "nothing offensive about the snaps" while some women argue that it's
"violating the privacy of every woman in the city."

Post 215
Here’s What Verizon Communications Inc. Data Breach Report Revealed

Verizon’s annual data breach investigation report released on April 15
proposes cyber-attacks are rather infrequent and that mobile malware is not
really an issue. Hence, for now, the company must consider spending on
non-mobile infrastructure.

Post 216

Google has a youtube channel for kids, but privacy groups are worried
because many of the programs (targeted at children 5 and under) are really
not much more than commercials.

Post 217
General Data Protection Regulation in the EU ... the problem with making data
privacy laws/regulations during a time that technology is changing much faster
than it than it takes to pass legislations.

Post 218
Privacy groups seek investigation of Google's YouTube Kids app

Post 219

"The responses from 16 [auto]manufacturers "reveal there is a clear lack of appropriate
security measures to protect drivers against hackers who may be able to take control of
a vehicle or against those who may wish to collect and use personal driver information,"
a report by [Sen. Edward] Markey's staff concludes."

Post 220

In Germany, a new order by German regulators is limiting how Google can use
consumer browsing and internet data. Google lost almost all of its arguments in its
attempted objection to the order, and the quest to limit the data usage was led by
a joint European group of regulators.

Post 221

Verizon finally lets people opt out of the "stealth cookie" which allowed them
to track users uniquely on any website on the internet.

Post 222

Quickie is an app that allows you to send messages privately. How does it
work? Messages are sent as push notifications, so they're not stored on
servers or even on your phone. As soon as you swipe the lock screen, they
disappear and are gone forever.

Post 223
Retail Tracking Company Violated Privacy Policy, FTC Complaint Alleges

Post 224

Privacy could be meaningless in 10 years in the UK under new plans by Tory
and Labour MPs to increase the number and access of spies to private data
on individuals. I wonder, is privacy already dead?

Post 225
Pakistan cyber bill threatens free speech, privacy: Rights groups

Post 226

Post 227

Relevant examples of security breach in health data!

Post 228
"Jeb Bush Email Release Includes Addresses And Social Security Numbers"

Jeb Bush released email correspondence from his time as governor of Florida in order to
support transparency. Sensitive data, such as Social Security numbers, were not
redacted at the time of the original release.

"'People have to be more careful about what information they put in an email, but the
Department of State should have reviewed those records and redacted all exempt
information,' says First Amendment Foundation President Barbara Petersen. 'Social
security numbers are exempt from public disclosure.'"

Post 229

To protect the privacy of patients some data gathered from medicare and
medicaid will not be provided to hospitals or the V.H.A without express
consent from the patient. The article argues that witholding this data gets rid
of information that could be very important to patient treatment and further
data research on the diseases substance abuse correlates with. Medicare
and Medicade argue:

"Substance-use disorders carry stigma. Some patient advocates have
expressed concerns that medical data could be used by law enforcement to
incarcerate patients or to separate children from their parents. Perhaps the
information could be used to deny employment. Without robust privacy
protections, these concerns could deter some patients from seeking

Post 230
Steven Myers:

Geoffery Cohen:

Bruce David White:

Michael Fox:

Marc Prentki: http://www.montreal-diabetes-research-

Michael Levine:

Mark Klamberg:

Mika Palgram:

William Andrews:

Miguel Angel:

Barbara Mahler:

Megan Buchanan:

Ronald Woody:

Eli Katz:

Steven Joseph Davis:

W. Dean Pond:

Jane Seay:

E. Jane Costello:

Maria T. Pinorini-Godly:

Charles Schulz:

James Brown:

Bruce David White:

Carl Wittwer:

Osvaldo Civitarese:

Charles Schulz

Robert Gabriel:

Jeffrey S. McCombs, Ph.D.

Brenda Chinnery:

Mark Schwartz:

Allan Kimmel:


Andrew Marc Lewis

Fred Tappert

Jonathan Ingersoll

Alexander Ploss

Fred Downey

Post 231
Data Privacy and Security Considerations in M&A Transactions

Global cybercrime costs the economy well over 400 billion dollars annually,
which amounts to a number of jobs lost between 150,000 and 200,000.
These data privacy issues can have an enormous effect on many merger and
acquisition agreements that include several parties and sensitive
information. This has been an issue in the past as well, as is shown by the
passage of numerous legislation like Fair Credit Reporting Act, the Gramm-
Leach-Bliley Act, and the Health Insurance Portability and Accountability Act
of 1996. In the end, more laws are required to make sure M&A's are not

Post 232
"Release of security video violates Ben Affleck's privacy:

The manager of a gas station in Canada released security camera
footage of Ben Affleck. Though the manager saw nothing wrong with
it, a privacy expert said that a commercial establishment does
not have the right to disclose it.

Choice quote:
- "Affleck, like any customer, gave implied consent to be
recorded on video — but not to have that video shared with the

Post 233

Apple’s Health Research Kit Makes IPhone Users Test Subjects

Apple Inc.’s new ResearchKit software platform turns the iPhone into a
diagnostic tool drawing medical data from millions of potential customers,
creating a boon for researchers and a headache for privacy advocates.

Post 234

Post 235

Basically the privacy commissioner of Canada is setting a precedent with
the company, Bell, that "opt-out" approaches to consumer privacy will not
be acceptable.

Post 236
Snowden Does Reddit
Tech Crunch - Feb 23
Snowden on his thoughts on the documentary winning at the Oscars

Post 237

This article notes that Facebook is planning to test a solar-powered drone this
summer, part of its plan to beam internet access to billions without access
today. While it would be a long time before Facebook does actually put such
technology to use int he real world, it marks another major technology
company using drones, and draws more attention to the need for fast-acting
governmental regulations of such technologies.

Post 238
"Under-fire airline Lufthansa faces privacy action in France"

Lufthansa is being criticised not only for its handling of the
Germanwings crash but also for keeping illicit tabs on staff at
Charles de Gaulle airport. They collected their names accompanied
by notes in German regarding their medical condition or political
persuasion, which is illegal under French law.

Post 239

A judge defends the use of stingray phone tracking without a warrant in
urgent cases. Here, it was used to find a phone stolen off of a murder victim
(presumably by the murderer). The Baltimore police also apparently use
stingray a lot more than what has been disclosed by other police teams.

Post 240

"When it comes to violent posts on its social network, Twitter has long held that it
would only seek to ban direct, specific threats made against others on its
microblogging service. Now, the company has decided that simply promoting violence
against others is enough to get a user suspended.

Twitter quietly updated its rules of user conduct following the publication of an opinion
piece by its general counsel, Vijaya Gadde, last week in The Washington Post that
acknowledged that the company needed to “do a better job combating abuse without
chilling or silencing speech.”"

Post 241

The Wall Street Journal has released an article to make consumers more
aware of what kind, and just how much, personal information is being leaked
and contested in regards to the technology we use daily.

Post 242

Article about how Canada is lagging in data privacy regulation and consumer

Post 243

Privacy commissioner calls for prosecution over Rob Ford privacy breach
The Attorney General is considering prosecuting two health professionals who snooped
into former mayor Rob Ford’s medical records. If convicted, they could be fined up to

Post 244
Orbital Images is a company whose goal is to capture global
socioeconomic trends and sell it to hedge funds, real estate
developers and other organizations.

This company has "processed as many as a million images of
parking lots. From that volume of imagery we can actually
learn a great deal," the CEO said. What those parking lots
tell him, for example, is how many cars are outside retail

"We can actually track retail traffic in 60 major retailers
and see whether or not it's up or down compared to past
years," the CEO said. "That's one of the single most important
things for retailers—how many people are coming in the door."

Post 245

Following hacking reports of baby monitors and automobiles, Internet of Things privacy
concerns are growing regarding smarthome devices. These concerns are valid and
should be addressed.

Post 246
"Facebook admits it tracks non-users, but denies claims it breaches EU
privacy law"

Facebook admits to tracking users that do not have an account. “The
researchers did find a bug that may have sent cookies to some people when
they weren’t on Facebook. This was not our intention – a fix for this is
already under way.”

Post 247

The House of Representatives has passed a cyber security bill that would
make companies share data and computer networks with the federal
government. This comes in the wake of many cyber breaches, and this bill is
hopefully one of the first steps to reducing these breaches.

Post 248

Post 249
"Everything We Wish We'd Known About Building Data Products"

Cool article summarizing important aspects of Data Products

“This can be so hard that even a company like Apple sometimes has to apologize
to customers for what was arguably a poor quality data product and recommend
competitor applications,” says Belkin. This issue impacts companies of all sizes
and skill levels.

At LinkedIn, the “People You May Know” feature started with a big python script
on one engineer's laptop. It wasn't until 2008, two years after the feature launched,
that it started to drive reasonable growth on the platform."

Post 250

The House of Representatives passed a the Protecting Cyber Networks Act,
which allows for more fluid sharing of cybersecurity threat data between
corporations and government agencies.

Post 251

Microsoft is taking steps to remove Personally Identifying Information while
storing information in the cloud. They are also working to make sure the
information there stays private property of the individuals.

Post 252
Boston Marathon Surveillance Raises Privacy Concerns Long After Bombing

Post 253

Colleges are using demographic and personal data to identify which students may
need help completing college and obtaining a degree, because graduation rates
across the country are low. This data can be used for helping the students in need
of help, but it can also work against students applying, because their demographic
data might give them a disadvantage when compared to a demographic that has
historically better graduation rates.

Post 254
Get ready: the Internet of Things is the final nail in privacy’s coffin

Post 255
Uber passwords from hacked accounts reportedly selling online
for $1

Vendors on dark net sites such as AlphaBay, which often sell
illegal products like drugs and counterfeit goods, are
offering active Uber username and login details for $1,
according to Motherboard. Other information that comes with
the purchase includes partial credit card data and telephone

Post 256
A host of new hacking opportunities...what happens when our financial information
begins to exist in the clouds?

Post 257

Facebook has created shadow profiles of non-members, thus calling into question
the right to privacy of the people who have not agreed to Facebook's terms of

Post 258
Russian Hackers Read Obama’s Unclassified Emails

Post 259

This article highlights the dangers of failing to change passwords regularly,
and uses psychology to propose several ways to encourage people to
change them more regularly. These include making the threat more personal,
making it easier to make the changes, and and helping consumers
understand the dangers.

Post 260

Post 261
"Chairman Tom Wheeler: This Is How We Will Ensure Net Neutrality"

"Using this authority, I am submitting to my colleagues the strongest open internet
protections ever proposed by the FCC. These enforceable, bright-line rules will ban
paid prioritization, and the blocking and throttling of lawful content and services. I
propose to fully apply—for the first time ever—those bright-line rules to mobile
broadband. My proposal assures the rights of internet users to go where they
want, when they want, and the rights of innovators to introduce new products
without asking anyone’s permission."

Post 262

Thieves are becoming smarter as they find ways to replicate the signal created by
car's key fob to unlock the doors. Thieves have developed systems to confuse
cars into thinking that the driver is nearby, unlocking the doors for anyone to enter
and use. Combined with push to start technology, that's enough for the car to be

Post 263
Obama’s Passport Data Leaked in Australian Email Blunder

Post 264
Jeb Bush, Your Personal Data, and the End of Privacy

GOP Presidential hopeful Jeb Bush recently released a trove of emails in the spirit of
transparency. However, he accidentally also made public the email addresses, home
addresses, and SSNs of thousands of his supporters. Privacy will likely be one of the
hot-button topics of the 2016 election. Ironically, political campaigns themselves that
are increasingly collecting vast amounts of data on voters, such that algorithms now
know "how swing voters are going to vote before the swing voters do."

Post 265
This is a cool public interview that took place on reddit yesterday with Edward
Snowden and Laura Poitras, the director of the Oscar winning documentary.
Snowden keeps a very genuine and casual tone as he responds to public

Snowden: "At this point, I think the reason I get away with it is because of my
public profile. What can they really do to me? If I show up with broken fingers,
everybody will know what happened"

Post 266

After Target had a data breach that compromised 40 million credit card
accounts, they managed to arrange a $19m deal with Mastercard as
compensation. Now small banks and financial institutions are attempting to
void the deal, claiming they were not considered in the deal, and that Target
is trying to avoid fully compensating other institutions for the privacy

Post 267
A recently proposed Californian legislative act attempts to prevent law enforcement
officers from accessing personal data (including metadata and location information
from GPS functions) from smartphones and laptops that is stored on remote servers or
"in the cloud." This article draws comparisons between physical files and digital files,
and includes commentary from a number of legislators who support the proposed act
because they believe it will outlaw warrantless searches of citizens' digital information.
It is interesting to note that the proposal is supported by some of the world's largest
tech firms, including Facebook, Google, Mozilla and Twitter. Personally, I find it
interesting that technology companies have decided to weigh in on a criminal justice
issue concerned with enhancing privacy protections. Facebook and Google, after all,
have been accused of eroding online privacy themselves.

See the news story here:

Post 268
A New Facebook App Wants To Test Your DNA

The scientists behind the project, Genes for Good, hope that Facebook
users will send a tube of their spit to a laboratory at the University of
Michigan and use a free Facebook app to fill out periodic surveys about
their health, habits, and moods.The researchers are planning to share their
findings in large networks outside of Facebook as well. They will strip the
genetic data of all identifiable information and submit it to public resources
such as dbGaP, a large database run by the National Institutes of Health.
These databases are open to any credible scientist, including those who
work for pharmaceutical companies.

Post 269

This article discusses the current investigation of Facebook's practices in light of EU
privacy laws and whether or not Facebook breaks these laws.

Post 270

Office for Civil Rights’ Enforcement of HIPAA’s Privacy and Security

Post 271

Related to the vulnerability in fingerprint scanning we discussed in class,
PayPal's head of developer evangelism is exploring authentication
technologies that use your heartbeat or vein patterns to uniquely identify a

Post 272

Interesting article about how to legislate state-wide drone use when there
are currently no laws in place.

Post 273
Stingray towers are being used not only to track cellphones but also to
disrupt their service.

Post 274

Snowden has done some good. A study suggests that 1/3 of Americans
have taken steps to increase their privacy online.

Post 275
Title: Driver beware: Your new car may be spying on you


Modern vehicles are now equipped with a lot of newer technology that can
be utilized as a data scraper. These cars can collect data like on how fast
you drive to how long your car idles and how suddenly you brake. This can
be very useful for insurance agencies when deciding rates and how much for
customers to pay.

Post 276
Data retention: Netherlands court strikes down law as breach of privacy

Post 277
New Pew Research Study finds that only 15% of Americans have
changed mobile phone habits since Snowden revelations.

Post 278
Debate over Common Core testing people spying on children versus
catching cheaters.

Post 279
DARPA Explores New Ways to Secure Our Lives Online

In this NPR interview, DARPA researcher discusses biometric information
used for authentication processes. He details DARPA research in using
keystrokes to authenticate people. This would be more secure than the
current use of passwords.

Post 280

"Drones can begin flying low over the American skyscape by 2017 under rules
proposed Sunday by the Obama administration that will finally allow their legal use for
business purposes."

Post 281

This article is about a new Audi experiment that illustrates how airborne carbon
dioxide can be broken down to fuel vehicles. This technology is still years away from
being possible, but nonetheless a very cool prospect in the fight against climate

Post 282
"Unindexed was a website that continuously searched Google for itself over
and over. The moment it found itself in the search results it would
irrevocably securely delete itself, making the precise instant of algorithmic
discovery the catalyst of destruction.

Visitors were encouraged to post contributions to the site (which would also
be destroyed when the site was detected). They were then invited to share
the site with others, bearing in mind the impact their method of sharing
would have on the eventual discovery of the URL by Google search bots.

A tension was created between the desire to share and the desire to keep it
to oneself, and the site spread on a small scale via postal mail, word-of-
mouth, etc."

Post 283

This article talks about how the European Commission is unhappy with how
American companies are treating the personal data of European consumers. The
EC intends to enact Union-wide rules about data collection and use, but that has
yet to pass.

Post 284

Post 285

Another fascinating article in the Wall Street Journal about data leaks in a corporate
setting and what corporations can do to protect their data (which includes getting rid
of passwords, vetting vendors, closing potential online leaks etc). Especially relevant
given the massive Sony leak at the beginning of this year.

Post 286
Drone operators would also have to be checked out by the Transportation Safety
Administration to determine whether they pose a security threat before they could
receive an FAA operator certificate. There is no fee for the security check, but one
might be applied in the future, the analysis said.

Last month, a small drone flew over the White House fence and crashed on the lawn.
Although the operator later came forward saying the incident was an accident, the
episode has raised concern that small drones might pose a security threat.


Post 287

The Obama administration has proposed a new consumer data privacy bill
designed to protect consumers. It provides common sense approaches to
fill in the gaps in the federal laws already pertaining to consumer privacy,
such as the fair credit reporting act, the video privacy protection act etc.

Post 288
Facebook data privacy case opens in European court

"In a case with far-reaching consequences for EU-US relations, the European Court of
Justice (ECJ) will hear arguments arising from a complaint filed in Ireland last year with
the High Court, demanding the State’s data-protection commissioner investigate
whether Facebook was in breach of EU law for allegedly passing European user data to
US intelligence services."

Post 289

Government Spies Can Now Eavesdrop On Your Cell Phone And Millions Of Others

Top secret documents leaked by Edward Snowden detail how spy agencies stole SIM
card data, giving them unprecedented access to millions of cell phones.

Post 290

Clinton’s E-Mail Built for Privacy Though Not Security

Post 291
Auburn University's website publicly displayed the personal data of many individuals,
including people who had never attended or applied to the university, between Sept 1,
2014 and March 2, 2015. This was the result of the installation of a new device to fix a
broken server. The data available included name, address, email address, birthdate,
SSN, and academic info.

Post 292
Hacker Implants NFC Chip In His Hand To Bypass Security Scans And
Exploit Android Phones

NFC, Near Field Communication, chips can be used to connect to other
android devices from a certain distance. A hacker can then transmit harmful
material or extract sensitive data. The small size of the chip makes it fairly
undetectable, and that is the challenge. "At a time when airlines and federal
agencies are cracking down anyone even thinking about testing the security
of in-flight communications systems, implantable chips provide a clever way
to sneak electronics past checks at airports or other high-security locations.
Wahle says he put the chip in when he was still employed by the military and
it was never detected despite going through scanners every day. “They
would have to put me through the X-ray [if they were going to detect the

Post 293
The governor of Richmond Virginia proposed some bills to weaken the
limitations of police surveillance using things like drones and license plate
readers. But his bills were shot down like a drone out of the sky.

Post 294

Judge rules that AMC sharing video watching habits with FaceBook is not illegal. Here is
another piece of evidence of the public's obliterated level of privacy, especially on social

Post 295

This article explains that a poll conducted in Minnesota shows that 2/3 of
voters would back an amendment that that would protect electronic data
from warrantless searches. It seems people are taking bigger steps to
protect their privacy and bring the whole realm of data privacy into a state

Post 296

HP has released a software package called the HP Haven Connector
Framework Server that will allow companies to analyze datasets that have
been too large or unorganized to analyze in an efficient manner. This will
possibly make data worth more now that it is possible to analyze it more

Post 297

European legislation is attempting to unify data protection under the General
Data Protection Regulation. This should make companies respond faster to
data breaches and alert their customers sooner. Also fines will be increased
for companies that do not comply with the new data protection rules.

Post 298

Australians to have two years of their phone and internet history stored after
metadata laws pass parliament.

Post 299
There's a massive new leak of confidential spy files from MI6, Mossad and the FSB

Post 300
"The Privacy Revolt: The Growing Demand for Privacy-as-a-Service"

This article claims that consumers have increasingly started to
view privacy as a necessary service they expect from various
providers since they are aware that their growing dependence on
tech comes at cost of their privacy. Even if you try to live off-
the-grid, it's difficult to escape browser fingerprinting,
cookies, authenticated tracking, cross-device tracking and other
methods used by companies and apps. The threat of large-scale
data breaches is a pan-industry problem.

Choice quotes:
- "No matter what market you’re in, no matter what service you
provide or product you sell... from right now until the end of
time, you’re in the privacy game. Welcome."
- Recommendations: 1) "Put security measures in place." 2) "NBE
transparent." 3) "Collect only what you need." 4) "Offer
customers a choice." 5) "Don’t sell customers’ data."

Post 301
Leave Facebook if you don't want to be spied on, warns EU
European Commission admits Safe Harbour framework cannot ensure privacy of EU
citizens’ data when sent to the US by American internet firms

Post 302
Article on TechCrunch about what we can learn about recent cyber attacks from SONY
and ISIS. The ISIS hacker has been able to break into many US websites and put black
ISIS flags on the sites.

Post 303

China investing less in US tech brands because of privacy concerns

Post 304

There is now a "Standard of Conduct" for federal employees on how they can use social
media. Here's an example of that from the above article:

"It says, for example, that there is no violation of the ban on soliciting donations for
parties or partisan candidates if a social media “friend” of a federal employee posts a
link to the contribution page of a partisan candidate on the employee’s page. However,
the employee should not “like,” “share,” or “retweet” the solicitation, “or respond in any
way that would tend to encourage other readers to donate,” it said."

Post 305

Boston Bombing still under questioning
Boston Marathon Surveillance Raises Privacy Concerns Long After Bombing

Post 306

TSA has spent over a billion dollars developing a behavioral screening
program which the ACLU alleges is "junk science".

Post 307
"GranitePhone is designed to keep your personal data secure, and
prevent leaks"

An article about a new smartphone built by a Brazilian "from the
ground up" to guarantee safety and security for clients' data.
They initially designed and became known for their secure
messaging technology and now expanded the the same secure
communication concept to an entire phone. However, it is
EXPENSIVE - $800. Bummed to see that privacy and personal data
protection have such a high price tag...

Post 308

Post 309
To protect its 100 million users, the live-stream video service for gamers says it has
reset all passwords and disconnected user accounts from Twitter and YouTube.

Post 310
On the Road In Mercedes Sci-Fi Self-Driving Car of 2030

Mercedes Benz recently unveiled the F 015 concept car, a luxury self-driving
vehicle. This article analyzes components of the vehicle, projected to release
around year 2030. The car as of right now is in prototype phase, so it hasn’t
been driven in public roads like the Google car has. The interior has been
completed, however. The car will include features like smartphone
activation, which means an app can signal your car to come to you. The
question is then posed, are we so wrapped up I our own worlds that we
don’t want to interact with the outside world anymore through driving
ourselves? I think it is safe to say most automaker companies think so.
German, American or Japanese automakers are making moves in the
driverless space.

Post 311
"EU Formally Accuses Google of Antitrust Violations"

"On Wednesday the EU’s executive branch, the European Commission, announced
it had served the company with a formal complaint known as a Statement of
Objections. If Google is ultimately found guilty of violating the law, the EU could
reportedly level fines as large as $6.4 billion—roughly 10 percent of Google’s
operating revenue."

Post 312
Uber Launches Auto Rickshaw Service In India, Allows Cash Payments For First Time

Uber is expanding! What's next? How are cash payments being managed and protected?

Post 313

This article describes the lengths that Google goes to to lobby the federal government.
in 2014 Google spend 16.8 million dollars lobbying.

Post 314

YouTube is making a subscription-based service, which could mean good
things for allowing people to not be tracked.

Post 315

I only stumbled upon this, but it seems like a really interesting way for a
company to monetize privacy. Blur is a plugin and software that allows you
to mask passwords, block trackers, etc. But what I found cool was that Blur
will generate momentary email addresses for you when you need to enter
something into a company's website for instance to then verify that you are

Post 316

Google now plans on not banning bloggers for posting sexually explicit material
online. This statement comes a few days after Google decided to take harsher
measures against bloggers who posted sexually explicit materials on its blog

Post 317

It's no secret that Republicans want to replace the Federal Communications
Commission's new net neutrality regulations with legislation. But they need
Democrats to do it — and at least one prominent liberal is signaling that he
won't go along with the plan unless the GOP substantially changes the deal
on the table.

Sen. Bill Nelson (Fla.) is the top Democrat on the Senate Commerce
Committee. On Wednesday, he reiterated what he's been saying for weeks:
That he's open to working with Republicans on a "truly bipartisan" bill aimed
at preventing Internet providers from speeding up, slowing down or blocking
Web sites. But he'll only cooperate, he said, "provided such action fully
protects consumers, does not undercut the FCC's role and leaves the
agency with flexible, forward-looking authority to respond to the changes in
this dynamic broadband marketplace."

Post 318
RadioShack Sale Sparks Data Privacy Concerns

"Consumer electronics retailer RadioShack, which filed for bankruptcy in February, is
considering selling consumer information as part of its bankruptcy proceedings."

Post 319

Many European data protection authorities have joined the effort in
investigating Facebook's privacy controls.

Post 320
ShotSpotter: NYC technology that claims to help police reduce gun violence
also records background conversations

Post 321
"Your Embarrassing Online Searches About Health Problems Aren’t Private"

91% of health-related webpages leak the information searched for to third parties
like data brokers, social networks, and advertisers. These third parties can
personally identify people and target specific ads based on websites visited, even
if incognito mode is being used.

Post 322
"How the U.S. thinks Russians hacked the White House"

"While the White House has said the breach only affected an unclassified system,
that description belies the seriousness of the intrusion. The hackers had access to
sensitive information such as real-time non-public details of the president's
schedule. While such information is not classified, it is still highly sensitive and
prized by foreign intelligence agencies, U.S. officials say."

Post 323

Article on a company that is guaranteeing data protection no matter how long the data
has already been online. Seems like a stretch to me.

Post 324
Even the most secure systems are vulnerable

Post 325
David Brooks ruminates about the meaning of privacy in the context of cop body
cameras. He says that "Society will be more open and transparent, but less humane and
trusting" and he thinks this is so because having the monitoring of police will make the
relationships they have with citizens less personal. He is worried that even though it
will help keep police more accountable and less likely to abuse their power and hurt
people, "less than 1 percent of police-citizen contacts involve police use of force" and
this is harmful to the overall relationship between law enforcement and the rest of
society that doesn't include that use of force component.

Post 326
Tim Cook speaks out against government attempts to weaken encryption:

Post 327
"Scientists To Investigate Government Climate Data ‘Tampering’"

Government agencies such as the NOAA and NASA make adjustments to data on
climate change to attempt to remove biases in the data. However, some scientists
argue that the adjustments "pretty much always increase the warming trend in the
data to reinforce the theory that human activities are the main cause of warming in
the past few decades."

Even though the original data may have biases in it, by adjusting the data,
suspicion is created around the adjustments and questions about the
government's role in scientific data collection are brought to light. This issue of
creating new trends in data by tampering with it is concerning, especially when it
deals with an important issue like climate change.

Post 328
New Privacy Glasses to avoid facial detection by photos

Post 329
Gogo in-flight Wi-Fi serving spoofed SSL certificates

Post 330
Virtual Reality?

Post 331
Artists in NYC installed an art installation as an ode to Edward Snowden in a
Brooklyn, NYC park. Because it was unauthorized, it was taken down.

Post 332

Possibility - A new twitter reading "robot" computer program has made
millions in the stock market. Several days ago, someone from the Wall
Street Journal posted about a stock about to rise. Faster than any human
could, a lot of that stock was snapped up. It was theorized, but not
confirmed, that a new computer program allowed a robot to find, interpret,
and buy stock based on the tweet. This has happened several times and
documented by several traders, but no one has stepped forward to claim the
bot. If true, there are huge consequences. First, the possibility for huge
mistakes made by robots that cost millions. On the other hand, by reading
someone's public tweets, a computer program could change the industry

Post 333

National Security can now inform Americans if they're on the no-
fly list.

Post 334
The current debate over ALPR's going on in Washington:

Post 335
"Location Is Your Most Critical Data, and Everyone’s Watching"

This article was basically a summary of one of our class's main themes: with
growth in technology and data collection comes growth in privacy concerns. Apps
rely on tracking locations to improve the quality of the user's experience on
devices. Location is key to allowing Google, Apple, and other companies
determine what you need when you are in a specific location and time, and deliver
it to you instantly. However, with these benefits come harms to privacy.
Advertisers, credit agencies, and the government can all get access to our data
without notifying us that they have it or allowing us to have any control over who
gets access to our data.

"Location-tracking lets developers build fast, useful, personalized apps. They’re
enticing, but they come with tradeoffs: your gadgets and apps maintain a log of
where you’ve been and what you’re doing, and more of them than you think are
sharing that data with others."

Post 336
In September, German data protection authorities told Google the company
had illegal access to private data with proper consent. Particular sensitive
data that was addressed included: “travel plans using its location data,
users' interests by evaluating search engine use, financial status by
analyzing collected data, and even infer sexual orientation and relationship
status.” Google appealed the accusation made by German officials, only to
find out yesterday the chancellor ruled the company appeal unworthy. Like
in other countries, Google might face significant fines unless certain
changes are made.

Post 337
Some more information on the Kaspersky Lab findings

Post 338

This article poses the question about surveillance versus privacy in relation to the
Boston Marathon. Cameras on the street were helpful in identifying the bombers
two years ago. Since then, even more cameras have been put into place along the
streets of Boston. However, people are concerned about their privacy since
cameras have become even more high tech and have better resolution than in the
past. Whether Boston will be able to find a "sweet spot" has yet to be seen.

Post 339

Health data breaches sow confusion, frustration

Post 340
Microsoft Adopts International Standard For Personal Data, Privacy Protection In Public

Microsoft has adopted an international standard (ISO/IEC 27018) for certifying the
security of its cloud offerings, making it the first major cloud services provider to do

"Customers will only use services that they trust," said Brian Smith, general counsel and
executive vice president of legal and corporate affairs at Microsoft. "The validation that
we've adopted this standard is further evidence of our commitment to protect the
privacy of our customers online."

"The adoption of this standard reaffirms our longstanding commitment not to use
enterprise customer data for advertising purposes," Smith added.

Post 341
Ryan Pate, 30, has been charged in the UAE with cyber slander against his

Post 342
"Today In Creepy Privacy Policies, Samsung’s Eavesdropping TV" - Feb 8

Tech Crunch had a really funny/spooky article on Samsung's new tv. The concern is
that the TV can eavesdrop on conversations that you are having in the room. Be sure to
check out how closely the privacy policy mirrors the text of 1984!

Post 343

This article is about something we talked about in class briefly - Facebook's tracking of
individuals who do not actually have Facebook accounts. According to the article,
Facebook has admitted recording information about individuals who do not have
accounts, but has argued that that data was only being recorded as a result of a bug.
Whereas in the United States Facebook has been able to avoid much legal trouble, in
the EU they are being called in violation of privacy rights. This article reflects not just a
potential cultural difference in the way that the US and EU think about privacy rights,
but also the idea that as our understanding of Facebook's (and other huge tech
companies) methods gets better, the more reasons we may have to be suspicious of
their practices.

Post 344
"‘Just Follow the Damn Constitution’ – Congressman Lashes Out at Security
Officials Who Want More Surveillance"

The District Attorney for Suffolk, MA, Daniel Conley, testified before the
Congressional Subcommittee on Information Technology in support of expanding
the power law enforcement has to access data during investigations:
"When unaccountable corporate interests place crucial evidence beyond the
legitimate reach of our courts, they are in fact placing those who rape, defraud,
assault and even kill in a position of profound advantage over victims and society."

In response, Congressman Ted Lieu from California described the importance for
tech companies to prioritize privacy over security for the benefit of the American
"Why do you think Apple and Google are doing this? It’s because the public is
demanding it. People like me: privacy advocates. A public does not want an out-
of-control surveillance state. It is the public that is asking for this."

Post 345

Privacy bill wouldn't stop data mining of kids

Post 346

72% of Britons care about privacy. This is a very high proportion compared
to Americans that care about privacy. Does this reflect a prevailing
difference between how much Europeans care about privacy compared to

Post 347
Nepal bans drones for fear of sensitive data leak Read more at:

Following the devastating earthquake on April 25, some foreign media and aid
organisations used drones to track the scale of devastation and broadcast information.

The civil aviation agency claimed that it has learnt that some used drones to take
pictures and videos of valuable heritages of Nepal which could be misused later, IANS

Post 348

"Someone hacked into several U.S. and European websites over the weekend,
claiming to be affiliated with ISIS."

Post 349

People are concerned that new EU data-protection reform proposals will
undermine civil liberties. Privacy protections may even be weaker than they
are now.

Post 350
The Pew Research Center finds that individuals are more likely to alter their internet
and social media use post-Snowden revelations, and that the great majority of them
have heard of these revelations. The survey finds that "the revelations of the mass
government surveillance programs has definitely impacted the way certain segments of
the American population now view their privacy — but that hasn’t yet translated into
behavior changes."

What was really interesting was that rather than impelling people to adopt privacy
enhancing tools, like Tor, knowledge of government spying made them less likely to do
so for fear it would make them stand out. Is this an early adoption issue with encrypted
and anonymity tools, where if more people joined it would be less likely that anyone
would feel as though they stood out?

Here's the relevant quote on that: "Other respondents viewed activities such as the use
of encryption or anonymity software like Tor as something that might raise suspicion
and make them a target for monitoring..."


Post 351

Post 352

AT&T is changing their plan so you can buy your privacy. An opt in, if you
want superfast internet you can either pay $139 a month, or let them use the
information they gather from your phone. The option is yours. Unless you
know, $139 a month is something you can't afford in which case the lower
classes are forced to give up their privacy.

Post 353

"Fraud alerts are free, protected under the federal Fair Credit Reporting Act,
and attach notes to credit reports stating that lenders must call or take other
special precautions before granting credit in someone's name. It's not a
catch-all remedy against identity theft but it's a great place to start. The
three major credit bureaus, however, have made it more difficult to set up
fraud alerts."

Post 354

Post 355

The House passed a cybersecurity bill that would allow for greater cooperation
between corporations and government agencies in the event of a security breach
or hacker attack. This would allow corporations and government agencies to warn
one another about the tools and techniques that are being used by malicious
entities. Privacy advocates worry that it'll open a back channel for surveillance,
granting companies legal immunity to share their users' data with government
agencies like the NSA.

Post 356

Auburn University data breach: Answers wanted after information about 364,012
people was leaked

Hundreds maybe even thousands of people who didn't attend and didn't even apply to
Auburn University were a part of the data leak where personal information, including
name, address, email address, birth date, Social Security number and academic
information, was inadvertently exposed on the university's website.

Post 357

Uber's database of drivers was broken into by a hacker, who stole information from
the drivers. If it is possible to steal driver info, one would assume that passenger
info is not far behind? Everyone who has an Uber has their credit card linked to
their Uber account.

Post 358
You Can Now Serve Divorce Papers on Facebook

Maybe not directly related to the course, but kind of entertaining article about
social media spreading into legal sector

"He has, however, kept in touch from time to time with his wife on Facebook. And
so, the social networking site has been deemed an appropriate place to serve
Blood-Dzraku with a summons for a divorce proceeding"

Post 359
Patraeus avoiding jail time for leaking material to mistress

Post 360

Money smuggled into Iran ($1B)

Post 361
Google is facing an antitrust lawsuit in the EU that could have big consequences:

"The E.U.’s current accusations are focused on its assertion that Google unduly favored
its own comparison-shopping tool called Google Shopping over those from
competitors. Vestager said the inquiries into other areas — Google Maps and Google
Travel, among them — were ongoing. The E.U. also announced that it was opening an
investigation into potential anti-competitive practices with Google’s Android mobile
operating system."

Post 362
Really nice comprehensive article about the FCC Net Neutrality Vote

Post 363

"Consumer advocates had concerns when Tom Wheeler, a former lobbyist
for both the cable and wireless industries, became chairman of the Federal
Communications Commission.

But on the issue of net neutrality, the FCC chief shares common ground with
them. He's recommending to the full commission the strongest regulations
the agency has ever considered to protect an open Internet."

Post 364

This robot chef could soon be the next addition to the internet of things
within your home - its smart technologies should help the robot learn to
cook like a human, but the wealth of data it collects and its online
capabilities require attention to privacy and security in order to protect the

Post 365

"Uber Suffers Data Breach Affecting 50,000"

"In a blog post from Uber’s website they state that the data which was
accessed, by an unknown third party, only contained names and drivers

Post 366
"The Lost Language of Privacy"

An article that discusses the benefits and disadvantages of
police body-worn cameras, particularly in terms of privacy. The
author says that on balance, cop-cams are a good idea, but they
create distance between police officers and the community,
inhibiting the formation of relationships and community policing.

Choice quote:
- "Cop-cams strike a blow for truth, but they strike a blow
against relationships. Society will be more open and transparent,
but less humane and trusting."

Post 367

Post 368

European companies lag the rapid expansion and dominance of American
technology companies (i.e. Google, Facebook). In order the level the playing
field, European officials have proposed “new rule book for the Web.” This
rule book will set standards that even American companies would have to
follow. The ultimate goal is to make this new privacy regime global. EU
officials are conducting meetings in D.C. and Silicon Valley right now.

Post 369

We might be deliberately misled by Telcos regarding net-

Post 370
Wikipedia is Suing the NSA

Sounds like the Supreme court might also get involved: "The NSA is in the
throes of battling litigation challenging its surveillance programs. Three
cases currently at the Appeals Court level challenge the agency's bulk
collection of U.S. call metadata—the first program exposed by Snowden—
and any split in those cases could ultimately portend a Supreme Court

"Eight other organizations, including Human Rights Watch and Amnesty
International, are joining Wikipedia's challenge, which is being represented
by the American Civil Liberties Union."

Post 371
China halts the implementation of their banking tech guidelines this morning. Should
ease the tension somewhat between Washington and Beijing. The ambassador said that
the decision came after getting feedback from the banks. Seems likely that the US put
some pressure there as well.

Post 372

Really interesting article in a local newspaper about how lawmakers want to restrict
access to certain information on birth certificates. Definitely relevant to the
conversations we were having earlier this semester about who should have our data, if
they can be trusted, and the multitude of places this data could potentially circulate.

Post 373
Linkedin agrees to a $1.25 million settlement with users who have passwords stolen.
An example that even if the economic costs of privacy breaches are low for the
individual, they can cause class action cases against these firms.

Post 374

This opinion piece is about why pilots still matter on plane flights and why pilotless
planes are not necessarily a good thing.

Post 375

A bill was introduced in the California State Senate but Congressman Mark Leno
about the use of location data from mobile apps. Most apps on an iPhone already
ask for express consent about using a consumer's location for the app to work,
but this bill would add the stipulation that the app would have to tell the consumer
how the data is being used, which is especially important if it is being used for
more than simply mapping and directions.

Post 376

Five security questions you should be asking about the Apple Watch

1. How can we ensure that the Apple Watch isn't used as a spying
2. Can attackers eavesdrop on watch-to-phone communications?
3. Can we trust the third-party apps?
4. Will corporate applications create privacy issues?
5. Will the Apple Watch make the iPhone more vulnerable?

Post 377

Hi Ed! (We could try asking him some questions on behalf of the

Post 378

Google, along with other tech giants like Microsoft, Apple, Facebook and
Twitter, is calling on Congress to end the bulk collection of communications
metadata by US government agencies like the NSA.

Post 379

Security cameras around Yale's campus prompt privacy concerns.

Post 380

We might be deliberately misled by Telcos regarding net-

Post 381
Safari users win right to sue Google over privacy

Post 382

This article addresses the concern of European citizens about online privacy
and security, highlighting Austrian Max Schrems’ lawsuit against Facebook
over the storage, security and treatment of European users’ data.

Post 383

The company with the slogan, "don't be evil," has hired a new security chief
this year, who is looking to brand google as the company that protects
users' privacy from encroachment by government spies and hackers. Only
65% of government requests for information are currently accepted by
google. At what point is google the one shaping policy and calling the

Post 384

Some really impractical glasses meant to thwart facial recognition software.

Post 385

A new fingerprint sensor can read prints through glass, metal, and plastic. It
also doesnt matter if you have sweaty hands or hand lotion on. It should
make fingerprint scanners more accurate.

Post 386
This addresses how institution may store the vast amounts of data being

Post 387
Sony Xperia Z4 Leaked in Images; Xperia C4 Tipped for July Launch

Post 388

A startup called Interana is making big data queries more accessible to
people who do not have experience with SQL queries and making it a lot
faster and cheaper for the people who don't have the time or resources to
explore big data. This is especially beneficial for small companies who rely
heavily on data analytics.

Post 389
White House Takes Cybersecurity Pitch to Silicon Valley

Post 390
The CIA embarked on a sweeping restructuring Friday that will bring an end
to divisions that have been in place for decades, create 10 new centers that
team analysts with operators, and significantly expand the agency’s focus
on digital espionage.

Post 391

Key players in the telecommunications industry, in an effort to challenge recent
net neutrality regulations, are expected to file a lawsuit against the FCC. The
particular claim discussed in this article is whether the FCC provided enough
warning before adopting those regulations.

Post 392

Article explaining the new article 11 that aims to further protect its citizens data
protection rights.

Post 393

A great article to read after having conducted the cell phone lab! Nomi Technology
apparently was using techniques to track mobile cellphones. Although it claimed to
offer an "opt-out" policy, the FTC claims that this wasn't a legitimate option and its
not bringing them to court. Good to know that there are organizations out there
protecting the customers from things they aren't even aware of!

Post 394

Obama is endorsing a bill that would apparently prevent companies from taking
advantage of using student data, but instead, the draft of the bill has loopholes
that would still allow companies to sell the data to colleges/universities and other
companies who could benefit from it. In short, it is inadequate to protect students
in a time when classrooms are becoming increasingly filled with online content and
electronic technology.

Post 395

The US Federal Trade Commission took action against MelApp, an app that
says it can help diagnose or assess melanoma risks in users, barring it from
making “deceptive or unsupported claims”.

Post 396

As more and more concerns have been raised about police procedures and
unnecessary force, many police forces have been using body cameras in order to
more effectively document incidents when they occur. Halifax Police Department is
one of those forces, though they maintain that it isn't as simple an intervention as
one thinks, as questions of when to turn on the technology and when to leave it off
in order to respect the privacy of both criminals and victims.

Post 397
Twitter accounts outside of the US now fall under EU data protection rules

Thanks to some concerns of consumers, Twitter has been urged and has
recently just changed some key components of its privacy policy over the
weekend. A lot of concern has been made about the security and privacy of
account information, so this is now going to be more secure.

Post 398

Drones, drones, and drones!

Post 399

A lawyer representing whistleblowers on police receives a hard drive from
the police at his request for evidence. That hard drive had three separate
types of surveillance malware meant to intercept his passwords and

Post 400
TESLA April Fools: TESLA Model S introduces Ticket Avoidance Mode

Post 401
How Children View Online Privacy Differently from Adults

There is a generation gap among digital users. Adults are growing increasing
uncomfortable sharing their information and protecting their security.
Children, on the other hand, are posting that much more. Pew Research
studied American children and "found that 91% of 12-to-17-year-olds
posted selfies online, 24% posted videos of themselves. Another 91% were
happy posting their real name, 82% their birthday, 71% where they live and
the school they attend, 53% their email address and 20% their mobile
phone number." The numbers are hugely smaller when the study looked into
higher age groups. The question is how do you shift their attitudes so that
children take the necessary steps to contain their personal data.

Post 402
NSA authorization to collect bulk phone data extended to June 1

"The government said it had asked for reauthorization of the program as
reform legislation, called the USA Freedom Act, was stalled in Congress.
The bill would require telecommunications companies rather than the
NSA to hold the bulk data, besides placing restrictions on the search
terms used to retrieve the records."

Post 403

$750 class action lawsuit against bell Canada for illegally tracking customer
browsing and then selling the information on to advertisers. Given how
frequently we see these cases, the amounts are too puny for companies to

Post 404
Once a field of self-taught hackers, cybersecurity education shifts to

Over the past year, colleges and universities across the country have
received millions in funding from the government and foundations to launch
cybersecurity initiatives. The result is a stark change for an industry made
up of programmers who have often learned by trial and error. Cybersecurity
taught in a school setting can decrease the financial burden on individuals
wanting to learn about cybersecurity, can minimize the trial-and-error
problem, and can have access to other key resources to aid learning.

Post 405

The patchwork of privacy laws that surround email in the workplace is a
swamp of different legislation. Interestingly, employee protection when
posting potentially damaging notes on social media about the company they
work for is protected in different ways for public and private employees.
Public employees are protected by the first amendment, whilst private
employees are only protected in instances where your comment can be
defined as “concerted activity” for the purpose of “mutual aid or protection.”

Post 406

Post 407
Twitter changing the way it sells its user data.

Post 408

Post 409

Post 410

Microsoft releases a feature called Lockbox that gives more control to
companies (and people?) over what information Microsoft can access in the
cloud and when. Microsoft will also be offering stronger encryptions to

Post 411
Dominika Sarnecka

A slew of 30,000 leaked Swiss HSBC bank account details—what the Guardian calls the
"biggest banking leak in history"—lays bare the practices of the organization and its

Post 412
Hilary Clinton explains that she used the personal account for her emails for the sake of

Post 413

This article discusses privacy concerns surrounding body cams worn by
police officers. While such cams give insight and accountability to officers
who commit police brutality, they can also potentially raise privacy concerns
for those who are filmed.

Post 414
California bill aims to protect ride-sharing passengers' privacy
The bill would limit the personal information that services such as Uber and Lyft can
request or require from their customers.

Post 415
Europe’s Data Privacy Draft Likely to Irk U.S. Technology Companies

Post 416

While Americans have an increased concern of who is using or storing their
personal data, a majority of people support open government data on
teacher performance and criminal records, because these things are less
personal and affect others.

Post 417

Post 418

Data privacy: the tide is turning in Europe – but is it too little, too late?

Post 419
TRAI’S Website Hacked After It Makes Emails of a Million Public

The Telecom Regulatory A​uthority of India, TRAI, was hacked. "Thanks to
TRAI's honesty policy, which made e-mail IDs and names of around a million
people who wrote to on the issue of net neutrality public, the hackers found
a reason to rejoice. As the social media exploded with netizens blaming
TRAI for failing to preserve their secrecy, Hacker group Anonymous India
moved a step further and brought down the TRAI website."

Post 420

The recent scandal related to MIT's professor Walter Lewin opens a
whole new debate in the realm of Online Courseware: Do online
students/professors have the same rights and responsibilities as
students/professors on-campus or should we develop a new set of
rules or guidelines for the digital class frame?

Post 421

Heard of Recorded Future? No? It's probably heard of you. This company is
funded by both Google Ventures and the CIA, and it reads all Facebook chat
messages. What's not clear is whether they're working alongside Facebook,
or just taking advantage of the Facebook chat to record... everything.

Post 422
-White House Proposes Broad Consumer Data Privacy Bill:
-Obama finally carries through on a promise he made a few years ago
proposing a bill intended to provide Americans with more control over the
personal information with more checks and regulations on companies that
collect and use the data. It applies common-sense protections to personal
data by calling on industries to develop their own codes of conduct when
handling consumer information. The FTC is in charge of making sure those
codes are up to par with other standards. It is meant to fill in the gaps
between preexisting data privacy laws .

Post 423

Basically ways to protect your privacy,whether it be your emails, personal
information, or location are being sold as a sort of luxury item for the privacy

Post 424
Ajusto app that watches your driving habits leads to privacy concerns

Post 425
Obama administration fights for right to use cellphone kill switch

Adopted without public notice or debate, Standard Operating Procedure
(SOP) 303, often referred to as the cellphone kill switch, has been shrouded
in secrecy from its inception and has outraged some civil liberties groups
battling to make the policy public.

Post 426
Snapchat shares more data with the government than any other social
media app

Post 427

AT&T leaked confidential information on over 280,000 subscribers so that
resellers could unlock used phones —the FCC consequently launched an
investigation in 2014. AT&T just settled this claim for $25 million.

Post 428

"Privacy advocates find Obama proposal lacking"

Even though the "consumer privacy bill of rights" appears to give consumers
control over their data, through codes of conduct, companies will be allowed to
freely collect personal data without strong restrictions and privacy/consumer
protection groups believe the protections it offers are too weak to help consumers.

"The proposal appears to allow companies holding personal data to limit consumer
control over it based on the companies’ assessment of risk to personal privacy or
their decision that they hold the data in a manner that is “reasonable in light of
context,” according to its text."

Post 429

In Germany, a new order by German regulators is limiting how Google can use
consumer browsing and internet data. Google lost almost all of its arguments in its
attempted objection to the order, and the quest to limit the data usage was led by
a joint European group of regulators.

Post 430

Interesting and relevant article about the difference between retina and iris scan.

"Retinal scanning, on the other hand, requires a very close encounter with a scanning
device that sends a beam of light deep inside the eye to capture an image of the
retina. Since the retina is located at the back of the eye, retinal scanning is not widely
accepted due to the intrusive process required to capture an image."

Post 431

Essentially says that tracking is here to stay, the internet simply is not a
private place and we kind of know that. The article argues that instead we
should be demanding transparency from the companies about their
practices. They should always know who is tracking them, how, when where
and why.

Post 432
My best friend wrote this!

Post 433

Why An Open Salary Policy Always Beats Secrecy

I think this is an interesting extension to the "Open Social Security
Number" concept -- if everyone has access to this information, no one
can exploit it

Post 434

"Prohibition on Transfer of Personal Data from Hong Kong Soon to Come Into Force"

Section s.33 of Hong Kong’s Personal (Data) Privacy Ordinance (“PDPO”) finally
implemented. This general prohibition of international exportation of Hong Kong
data, with some exceptions, raises concerns about ripple effects in Hong Kong
commerce. I believe this policy's effects will be watched internationally for
repercussions and implications.

Post 435

Consequences of a potential Homeland Security Department shutdown

Post 436
"When Keeping A Secret Trumps The Need For Care"

This article tackles the intersection between privacy and health
insurance, addressing an increasingly prevalent situation
involving young adults that stay on their family insurance plans
under the provision of the Affordable Care Act. Studies
demonstrate that young people often hesitate to get certain types
of medical care, such as mental and behavioral health care, birth
control and sexual health screenings, because they don't want
their parents to find out through insurance statements.

However, insurance companies are legally obligated to honor
privacy requests in cases where sharing medical information with
the parents would endanger the patient, thought it's unclear what
needs to be done to prove they're in "danger." This process can
also be complicated and daunting.

Choice quote:
- "'A number of states are struggling with this,' she says.
'Because it's extremely difficult to balance the privacy needs of
dependants and the needs of policy holders.'"

Post 437
There is a new idea featured in the Guardian for giving users control over their own
data. It's being called the Databox:

"The underlying philosophy underpinning all attempts to level the online playing field is
a belief that an individual’s data belongs to him or herself and that no one should have
access to it except on terms that are controlled by the data owner. The hunt is on,
therefore, for technologies (software and/or hardware) that would make this both
possible and be easy to use. An interesting idea of how to do that surfaced last week in
a paper by computer scientists from Queen Mary University of London and Cambridge

The basic concept is a Databox, a piece of software that collects personal data and then
manages how that information is made available to third parties. In essence, it’s “a
networked service that collates personal information from all of your devices and can
also make that data available to organisations that the owner allows"."

Full Article:

Post 438

"The case for strong government rules to protect an open Internet rests in large
part on a perceived market failure — the lack of competition for high-speed
Internet service into American homes."

Post 439
Google Glass isn't dead yet! Eric Schmidt just confirmed that while Glass has been taken
off the market, it's currently being revamped and rumors suggest another release later
in 2015.
Will the news Glass address the privacy issues revealed in the test run, both for
individual users and society? (i.e. movie theaters concerned about Glass users illegally
recording films).

Post 440
New Pentagon Strategy Warns of Cyberwar Capabilities

A new Pentagon cybersecurity strategy lays out for the first time publicly
that the U.S. military plans to use cyberwarfare as an option in conflicts with
enemies. The strategy says the Defense Department "should be able to use
cyber operations to disrupt an adversary's command and control networks,
military-related critical infrastructure and weapons capabilities."

Post 441

Relating to our last lab, a retail tracking company has been alleged by the
FTC for violating privacy policy with their MAC address tracking.

Post 442
FTC Upgrades IT to Protect Consumer Privacy, Data Security

Post 443

There has been some criticism around the small scandal that is Carly
Fiorina's website. As a candidate for the republican nomination for the
presidency, lots of talk has centered on the fact that she was unable to
secure the domain name carlyfiorina. This is especially humorous, as she
has billed herself as the tech candidate. Then, it was found that redirects to Fiorina's website. These acts highlight the rising
importance of domain names as a form of personal data.

Post 444
E-ZPass tags monitored away from toll booths, NYCLU finds

It has come to light that drivers using the E-ZPass to pay for tolls have been
tracked without their consent and without an option to opt out.
Transportation officials have been using this information to obtain data for
traffic congestion studies for the past four years. According to
transportation officials these probes are anonymous.

Post 445
The link for post 488, sorry!

Here it is:

Post 446
How Much Do You Know About Data Privacy? Test Yourself

Post 447

Post 448

The White House hired its first Chief Data Scientist, indicating its commitment
to using big data for public purposes. This provides some hope that the
government may be embracing technology in policy and governance, and it
will be interesting to see exactly what this role will entail.

Post 449
You can now set up a "no fly drone zone" over your house., which
launched Tuesday, allows you to register your address in a database so that it becomes
"geofenced" and drones will avoid flying over it.

Says the founder of the company, "On the one hand we are trying to give people a
choice, trying to give property owners a choice in terms of what happens above their
property. And that may limit to some extent where devices can fly. But on the other
hand, most of the [drone manufacturers] we’re talking to recognize that this is an
opportunity for them to sort of seamlessly and easily take a leadership position on
these privacy issues and not let it be regulated for them."

Post 450

This New York Times article (see below), entitled “Bringing Big Data to the Fight Against Benefits Fraud,” sheds light on
new, data and predictive analytics-based practices of the New York City Human Resources Administration in detecting
fraud among people receiving government benefits. The agency now analyzes data in a computerized pattern-
recognition system to detect “anomalies” in recipients’ records of public benefits for which they applied, or other
information about their overall property holdings, income, etc. The government then follows up on such anomalies,
relying on LexisNexis Risk Solutions, to account for these unusual patterns.

This seems to provide a framework for surveillance which diverges from the Panopticon model. In that view, the power of
surveillance is in the watched person being aware of the possibility of surveillance and modifying his or her actions
accordingly. If it is possible to track each detail of a person’s life and intervene – as in the case outlined above – without
their even being aware of it, it seems unclear that the linchpin of surveillance’s power over people will continue to be its
visibility and conscious presence in their lives.

Quote from article:

“A few years ago, the New York City Human Resources Administration decided to try a new way to root out fraud among
people receiving government benefits. Data detectives began running benefit recipients through a computerized pattern-
recognition system.

They discovered that the behavior of a small percentage of people stood out. The anomalies in themselves didn’t
constitute fraud, but they pointed the agency’s data scientists in potentially fruitful directions.”


Post 451
"How Netflix is turning viewers into puppets"

Interesting article about the use of Big Data to target consumers. It could be
controversial to think that the production of TV shows and movies will be based on
the data collected from user behavior rather than the artistic merit or quality of the
work. It raises questions not only of privacy but of negative interference with
another important sphere of society (art) simply to favor consumerism.

"Netflix doesn’t just know that you are more likely to be watching a thriller on
Saturday night than on Monday afternoon, but it also knows what you are more
likely to be watching on your tablet as compared to your phone or laptop; or what
people in a particular ZIP code like to watch on their tablets on a Sunday
afternoon. Netflix even tracks how many people start tuning out when the credits
start to roll."

Post 452
This is a great article discussing the future of self driving cars and how they
are actually much closer to becoming a reality than most people think. Great
highlight of Unit 4

Post 453
Title: Proposed student data privacy bill does little to protect privacy


Politicians in the White House are in the process of introducing a bill to
hinder the ways that education technology companies can use data that
they collect about students through the grades of kindergarten to the end of
high school

Post 454

Apple agrees to give Chinese government access to source code, other
benefits to spy on users in China despite President Obama urging American
companies to not give in.

Post 455
The New York Times article that broke the news about Hillary
Clinton's ise of a private email address during her time as
Secretary of State:

Post 456
Why some Americans have not changed their privacy and security behaviors

A string of revelations over the past two years about the National Security
Agency’s domestic and international surveillance efforts have brought new
awareness to many Americans about online privacy and security concerns.
Yet most American adults have not made significant changes to their digital
behavior, and 54% say that it would be “somewhat” or “very” difficult to find
the tools and strategies that would enhance their privacy online and when
using cellphones, according to a Pew Research Center report.

The most common reasons: I have nothing to hide, I do not have the time or
expertise, It won’t prevent monitoring anyway, I don’t want to raise
suspicions or invite scrutiny, I am comfortable with the monitoring because
it makes us safer.

Post 457
Are Colleges Invading Their Students' Privacy?

"...colleges in theory could data-mine almost every aspect of a student's life.
Institutions can track what students say in online class forums, who downloads the
lecture notes, and how long they spend reviewing online material. Institutions can
record when and where students swipe their ID cards to follow their physical
movements, from the dining hall to the health center."

Post 458

A new iOS bug has trouble dealing with https, making it easy for someone to
spy on you data. Upwards of 25000 apps may be affected, including several
popular banking apps.

Post 459
Reality of Re-Identification

Post 460
Pearson has been monitoring students social media posts to see who has been
leaking information about tests they offer. Is this considered corporate due
diligence or spying?

Post 461

Has mass surveillance helped fight terrorism?

Post 462

House passes bill allowing corporations to share your data..

Post 463
See who's watching you online in new 'Do Not Track' doc series

Post 464
The letter I received at my real house:

So basically they want to install a router and make you download apps
to track all your internet/media/electronic data.

The website:

Terms & Conditions (look at privacy sections):

They claim to give data to "trusted" partners and adhere to privacy
standards, but how is this monitored and how can we trust them?

Post 465

Post 466
"Feds Update HIPAA Privacy, Security Guidance"

HIPAA is the federal Health Insurance Portability and Accountability Act of
1996. The primary goal of the law is to make it easier for people to keep
health insurance, protect the confidentiality and security of healthcare
information and help the healthcare industry control administrative costs.
"The federal government has issued updated HIPAA privacy and security
guidance to reflect an accelerated move to interoperable exchange of
protected health information."

Post 467
Privacy Legislation Proposed To Balance New Technology

Post 468

Ireland's data privacy regime is as important as its tax regime for attracting
investment from Google, one of the search engine's most senior
international executives warned Michael Noonan at a private meeting late
last year.

Post 469
The Big Data Initiative And What The White House Can Learn From Lewis And

- Interesting analogy between big data and Lewis and Clark

"First, we need to define our goals. For Lewis and Clark, their goals were 1)
survival, and 2) bringing back relevant and practical information in areas such as
botany, medicine, geography, anthropology, geology, zoology, etc.

Our goals may be to improve security, science, education, economic growth, and
so on. But, that being said, what do those things actually mean? Given the amount
of big data we have available, we should drill down to specifics within each larger
category; in essence, drive the Big Data Initiative from a myriad of smaller, local
data initiatives. "

Post 470

Wikimedia is suing NSA for mass surveillance, claiming that it violates
freedom of speech. The lawsuit is specifically targeting communication with
non-US people.

Post 471

This article notes that Facebook's European division has responded to
claims that it invaded privacy rights of citizens. While the tech company did
admit to having had a bug that tracked individuals who were not Facebook
users but who visited sites that integrated Facebook, it says that the claims
by the Belgian government were overstated.

Post 472

Post 473

"In less than 60 days, Congress will be forced to decide if the
NSA’s most notorious mass surveillance program lives or dies. And
today, over 30 civil liberties organizations launched a nationwide
call-in campaign urging them to kill it."

This is Section 215 of the Patriot Act, the one that allows the NSA
to take any tangible thing in the name of security.

Post 474

RadioShack is filing for bankruptcy, and they are asking a bankruptcy court to sell
personally identifiable information (PII) as they action the company's assets. The
state of Texas is opposing the sale of PII, and RadioShack has a tentative
agreement to sell the data of only 67 million customers, as opposed to the initial
number of 117 million people.

Post 475

More Democrats are signaling they will try to amend a major cybersecurity
bill when it hits the Senate floor in the coming weeks.

In a Senate Intelligence Committee report released over the weekend, Sens.
Martin Heinrich (D-N.M.) and Mazie Hirono (D-Hawaii) said they “continue to
harbor concerns” about several privacy provisions in the bill.

Post 476
"Periscope raises privacy concerns"

New app called Periscope raising some privacy concerns. The app allows
you to broadcast live video easily to the internet.

"If they're taking a photo or making a movie without your permission, you
can at least ask them not to post it on social media, or to delete it entirely.

But if they're using Periscope - tough luck. It's out there, and anything
unguarded you might have said could have been seen, and anything silly
you did could come back to bite you."

Post 477

This article discusses the rise of Vasco Data Security, a company that
addresses the security needs of banks and other firms in the service

Post 478
"Amazon And Microsoft Will Tell Us A Lot About The Cloud's Size"

For the first time, Amazon will disclose the segment results for its Amazon Web
Services, aka AWS, Amazon’s cloud computing business. Don’t be surprised if the
business generates several billion dollars in revenue and proves to be the fastest-
growing piece of Amazon’s business. At the same time, Microsoft will be touting the
growth of its own cloud-related businesses. And they’re growing rapidly, too.

Post 479

Some app helps let you know what companies are tracking you as you
browse the web and you can block some of the things they are seeing.

Post 480

Legalities of drones for personal use

Post 481

Clinton aims for presidency, riding the waves of consumer desires for
privacy, It seems that Clinton is not necessarily the answer though. She
claims that the NSA must become more transparent, but doesn't explain
exactly how this might be achieved for example.

Post 482

Article on how companies are being fined for releasing information on clients they were
not permitted to.

Post 483

Interesting take on online spying (China-Asia)

Post 484
Article on DARPA's "Brandeis program" (named after the late U.S.
Supreme Court associate justice and privacy advocate Louis
Brandeis) which seeks to build “information systems that can
ensure private data can only be used for its intended purpose
and no other.”

Post 485
Title: Get off Facebook if you value your privacy, EU commish tells court


Like I talked about last week, a verdict/decision regarding the facebook
privacy issue case in Ireland. The group claimed facebook was infringing on
their personal privacy rights by transferring their personal data to the US
National Security Agency. Previously, the Irish data protection commissioner
refused to investigate due to Safe Harbour rules, and now the EU higher
court of justice said that they won’t take action and if you don’t want your
privacy infringed upon to not use facebook.

Post 486

The German government on Wednesday proposed new guidelines on data
retention aimed at balancing privacy protection with the needs of law
enforcement in setting strict time limits on how long telecommunications
providers store data.

Post 487

Data Breach At Uber May Affect Up To 50,000 Drivers
Driver’s license numbers and names were accessed by a third-party last year, the
company announced Friday. But so far, Uber says it knows of no misuses of the data.

Post 488

This article highlights New York City's recent use of "big data" to
address fraud in benefit receipts. By running rolls of beneficiaries
through a pattern recognition system and cross-referencing
abnormalities against other records, such as asset ownership, the
government has been able to reduce fraudulent payments by $17 million,

Post 489

Regarding the G20 breach

Post 490
UN sets up privacy rapporteur role in wake of Snowden leaks
Landmark decision in response to US and UK monitoring is attempt to establish idea
that freedom from excessive surveillance is a basic right

Post 491

Blackberry might be partnering up with Apple in the future to provide more
advanced security settings for phones.

Post 492

Florida teacher is fired after a student used her cellphone to record a
teacher bullying another student—expectation of privacy law questioned.

Post 493
New data world order: government can read every Australian like an open book
The story of your life in metadata relates where you went, who you spoke with, how
long you were there for. And now that story will be kept on file

Post 494
"Skimmers Are Now Grabbing Your Credit Card Data at the Door" (from TechCrunch)

Hackers have taken to installing data readers inside the swipe locks into which debit
cards are inserted in order to enter ATM vestibules. Hackers have also installed tiny
cameras above ATM machines in order to glean PIN numbers and match them with
debit card data. This is yet another example of how technology is being used to filch
personal data from unsuspecting private citizens. While it is very difficult to tell whether
a swipe lock has been corrupted, one easy way to prevent the matching up of debit card
data and PIN numbers is to shield the keypad with one's hand as the PIN number is
punched in. Smart, small, simple solutions can frequently make the compromise of
personal data much more difficult, as we've seen countless times in this class.

Post 495

Post 496

Post 497
California bill would protect the privacy of ride sharers (Uber,
Lyft, etc.)

Post 498
"Speaking just before Barack Obama at a conference on computer security, the
iPhone maker’s Tim Cook gave perhaps one of the most impassioned defenses of
digital privacy from a corporate executive—in this case the CEO of the world’s
most valuable company.

It was a pointed welcome for Mr. Obama, and a reminder that technology giants
remain distrustful of government efforts to collect their users’ data."

Post 499

An article in newsweek that describes how Big Data companies (especially Twitter, in
this article), may have the power to predict very important health-related conditions.A
fascinating quote in the article says that a research firm "combines Twitter posts and
air quality and hospital data to form a model that researchers believe can predict
emergency room trends more effectively and immediately than existing disease
surveillance models". Could be a good jumping-off point for a project!

Post 500
Basically questioning who owns data and people in the U.K. being wary of
the NSA looking through facebook accounts of non-U.S. citizens.

Post 501

Post 502

Concerns are being raised over the use of license-plate readers in Georgia. Privacy
advocates worry that police keep license plate information for longer than
necessary, as that information can be used to determine the location of vehicles
and their travel history. Questions about ethical use of that information have also
been raised.

Post 503

Interesting study on data security in M&A transactions

Post 504
This article points out the marked difference in the way that Netflix is treated
by broadband providers abroad versus in the U.S. Providers in Sweden and
Australia, for instance, have woven Netflix into their cable boxes, and even
provided free access to attract customers.

Post 505
Microsoft has gotten the ball rolling with privacy standards in cloud computing! Will
other companies and even other industries (e.g. cars) begrudgingly follow suit until it
becomes an economic imperative?

Post 506
Tinder was recently hacked and user data was manipulated to
simulate matches. If Tinder, one of the most influential dating
apps, gets hacked and its data is manipulated, what can we expect
from smaller apps that store user data?

Post 507
Researchers at ScrapeSentry found that the use of the Google Chrome Webpage
Screenshot extension leaves its users at high risk for personal data theft.

Post 508
Dominika Sarnecka

Russian researchers expose breakthrough U.S. spying program.

Post 509
An employee of the Wisconsin Department of Veterans Affairs "erroneously" disclosed
personally identifiable information about 637 veterans to an unauthorized recipient.
The WDVA is now offering one year of free credit monitoring to those 637 vets.

Post 510

U.S. Commerce Secretary Penny Pritzker is trying to convince China that an
open internet is absolutely necessary for entrepreneurship and developing
the economy. I am doubtful of her success because I would argue that the
one/only thing The Party cares about more than developing the economy is
quelling any chance of civil unrest.

Post 511

This article is proof that privacy from the government and privacy from private sector
companies are often two edges of the same sword. This article describes how,
throughout the world, governments are more likely going to Facebook to obtain
information on individuals. This information is usually obtained to identify people
wanted for crimes. But the US government is using Facebook less for such purposes
than it used to!

Post 512

"The South Korean company’s privacy policy for its Smart TV came under
criticism as it cautioned customers to “please be aware that if your spoken
words include personal or other sensitive information, that information will
be among the data captured and transmitted to a third party through your
use of Voice Recognition.” "

Post 513
"Only 20% of businesses passed their most recent PCI compliance assessments"

Post 514

Interesting article about how industry is increasingly making data privacy a luxury
good (i.e. AT&T's supposedly un-hackable fiber optic internet cables)

Post 515

F.C.C. Net Neutrality Rules Clear Hurdle as Republicans Concede to Obama

" Senior Republicans conceded on Tuesday that the grueling fight with
President Obama over the regulation of Internet service appears over, with
the president and an army of Internet activists victorious."

Post 516

Amazon does not release their data-request numbers (such as how often it is
asked to release consumer data, and who is allowed to see the consumer data) to
the public. This is not obligatory under law, but it is commonplace because other
companies in the industry, such as Microsoft and Google, do provide consumers
transparent guidelines as to how the consumer data is being used.

Post 517
The NYPD headquarters have been editing Wikipedia articles containing details of
"alleged police brutality." This fact was discovered by tracing the edits back to IP
addresses' location and network connection. In one case of editing regarding the Eric
Garner case, the edits were as follows:

The edits, all concerning the actions of Eric Garner and the police officers involved in
the confrontation, are as follows:

● “Garner raised both his arms in the air” was changed to “Garner flailed his arms about
as he spoke.”

● “[P]ush Garner's face into the sidewalk” was changed to “push Garner's head down
into the sidewalk.”

● “Use of the chokehold has been prohibited” was changed to “Use of the chokehold is
legal, but has been prohibited.”

● The sentence, “Garner, who was considerably larger than any of the officers,
continued to struggle with them,” was added to the description of the incident.

● Instances of the word “chokehold” were replaced twice, once to “chokehold or
headlock,” and once to “respiratory distress.”

What's interesting to me about this how much these edits were a matter of change in
tone rather than blatant lies. The way that Wikipedia is governed and edited would
make it likely that a blatant lie would be quickly changed (thanks to wisdom of the
crowd concept) on such a high profile article topic but a more subtle and nuanced
manipulation might slip by. In terms of the topic of our class, this has broad
implications for the kind of incriminating or otherwise unwanted information that can
go online. While we've talked about objective breach of personal privacy/data in the
case of SSNs or education data this type of strategy could be applied to personal
information that is online in much more insidious and illusive ways.

Post 518
Berlin Strikes Compromise on Privacy, Security With New Data Guidelines

The German government has recently proposed new guidelines on data
retention aimed at balancing privacy protection with the needs of law
enforcement in setting strict time limits on how long telecommunications
providers store data. This comes on the EU wave of data privacy legislation

Post 519

Article on how fast stolen data travels once it is placed on the dark web.
This goes to show how important it is to maintain security for personal data
like SSNs.

Post 520

New california bill aims to protect users from Uber and other companies that
can track their locations in order to provide driving / ride sharing services.

Post 521
A leaked report from the "Federal Trade Commission investigators
had concluded that Google had unlawfully “used anti-competitive
tactics and abused its monopoly power.”

"The FTC’s main charge against Google was that it was abusing
its power by unfairly promoting its own vertical offerings at
the expense of competitors."

Post 522
sharing-customer-dna-data-with-police-with-no-warrant/ sharing DNA data without their users knowing.

Post 523

Zuckerburg protects his privacy, even as he erodes everyone else's. This
article argues that we should fight back to recapture our own privacy, and
ensure that we have the same benefits of a private life that Zuckerburg
ensures for his own family. Any and every contractor who enters
Zuckerburg's private space is required to sign a Non-Disclosure Agreement.

Post 524

America Requests More User Data Than Almost Every Other Country

Post 525
"This week, the Florida state legislature is considering a bill that would make
it illegal to run any website or service anonymously, if the site fits a vague
category of “disseminat[ing]” “commercial” recordings or videos—even the
site owner’s own work. Outlawing anonymous speech raises a serious First
Amendment problem, and laws like this one have been abused by police and
the entertainment industry."

Post 526

Box acquires Subspace, a startup that specializes in data security.

Post 527
Facebook data privacy case to be heard before European Union court
Maximilian Schrems battling existing EU laws, which allow companies to transfer
information to US intelligence agencies

Post 528
"Is ad blocking theft?"

Even though they may increase personal privacy, ad blockers are harmful to the
success of websites and may result in the creation of poor content since sites are
not able to make money when ad blockers are used. Some sites have been
successful at using alternative means of monetization, but there does not seem to
be a universal alternative to ads at the time being.

"Creating great content and finding an innovative way to monetize content are two
different disciplines. Because of this, we’re stuck with display advertising until an
equally universal approach presents itself. For the time being, ad blockers are

Post 529

"White House introduces bill to protect consumer data privacy"

White House gives lip service to the public's online privacy concerns, in attempt to
placate public. The bill actually sidesteps FTC and some states' more strict authority.
I believe more effective legislation should be passed.

Post 530
Royal Bank of Scotland uses Apple fingerprint authentication for mobile banking

"Through Apple's Touch ID fingerprint sensor, the banks' customers can log into the
app in seconds. The technology recognises the customer's unique fingerprint, meaning
they dont have to remember a tricky passcode – making it easier and more convenient
to access their finances."

Post 531

Self-driving cars could be serious job-killers

A look into the cons of self-driving cars. In the world that Google envisions, robotic
cars will be concentrated into fleets. Maintenance, repair, insurance, and fueling would
likewise be centralized. Untold thousands of small businesses, and the jobs associated
with them, would evaporate. To get a sense of just how many jobs might be at risk,
consider that, in Los Angeles alone, about 10,000 people work in car washes.

Post 532

Post 533

A report commissioned by the Belgian privacy commission has found that
Facebook is acting in violation of European law, despite updating its privacy policy.

Post 534

"The British Columbia Freedom of Information and Privacy Association
(FIPA) published a 123-page report Wednesday, detailing what your vehicle
might know about you and who can access that information."

Post 535

Post 536
"The FBI has a secret device to locate criminal suspects, but they would
apparently rather let suspects go free than reveal in court the details of the
high tech tracker

Judge Patrick H. NeMoyer in Buffalo, New York, described a 2012 deal
between the FBI and the Erie County Sheriff's Office in his court order
Tuesday. The judge, who reviewed the deal, said the FBI instructed the
police to drop criminal charges instead of revealing "any information
concerning the cell site simulator or its use."

Erie police had long tried to keep that contract secret, but the judge rejected
that idea and ordered that details of the Stingrays be made public.

"If that is not an instruction that affects the public, nothing is," NeMoyer

Post 537
"Government wonders: What’s in your old emails?"

WASHINGTON — If you’ve been remiss in cleaning out your email in-box, here’s some
incentive: The federal government can read any emails that are more than six months
old without a warrant.

Little known to most Americans, ambiguous language in a communications law passed
in 1986 extends Fourth Amendment protections against unreasonable search and
seizure only to electronic communications sent or received fewer than 180 days ago.

The language, known as the “180-day rule,” allows government officials to treat any
emails, text messages or documents stored on remote servers – popularly known as the
cloud – as “abandoned” and therefore accessible using administrative subpoena power,
a tactic that critics say circumvents due process.

Read more here:

Post 538
Twitter’s New “Quality Filter” Starts Rolling Out To Verified iOS Users

"The latest is a new “quality filter” that lets verified users weed out problematic
tweets from their notifications."

"As TechCrunch’s Sarah Perez noted last week, until recently Twitter has been
more reactive than proactive in terms of dealing with bullying, but several high
profile incidents (including #gamergate, the harassment of Robin William’s
daughter after his death, and Ashley Judd’s decision to press charges against
trolls) have thrown the issue into the spotlight and forced the company to take new
steps to ensure the safety of its users."

Post 539
"The company is calling it an “on-demand password” system where, every time
you want to login, you get a new code texted to your phone. For a company that
has been pulling in user data — and fielding “change password” requests — for
years this seems to make a lot of sense."

Post 540
An eight grade student hacked into a teacher's computer and changed the
teacher's desktop background. Despite the relative harmlessness of his
crime, the teenager was charged with a hacking felony. This computer did
have sensitive standardized test material, but that was not accessed by the
student. There has been a lot of debate about the grounds of this legal
charge. The grounds of this conviction rest on the Computer Fraud and
Abuse Act (CFAA). "However, this instance highlights that many states have
their own version of the federal statute, with their own overbroad and
insensible language, including Florida."I believe this article highlights the
inevitability of increased hacker crime, even among adolescents. The federal
government along with state governments need to further discuss the legal
grounds of possible computer hacking scenarios, so that there are some
common grounds across the nation.

Post 541

Car hacking might become more prevalent

Post 542
Big tech companies are "giving back" so to speak by serving the Bay Area residents who
are most in need. Twitter is building a multimillion dollar computer lab for low income
residents for instance.

The sentiment is captured by one of the low income people interviewed:

"Tensions between tech companies and Bay Area residents seem to have lowered to a
simmer in recent months. Ms. Leonard said the companies were not to blame for the
income inequality in the Bay Area.

I wish I could work for Google and make six figures, but I have to be happy with what I
have,” she said. “I just feel like a lot of these companies are helping those that are less


Post 543

Two different approaches to dealing with privacy. 1 which involves a
databreach where someone's PII is accidentally leaked.
Another which involves the data of the G-20 world leaders.

Post 544
Hollywood is asking itself, ‘What’s our modern strategy for managing our

After hackers from North Korea revealed embarrassing and personal
messages from Sony last year, Hollywood has turned to a new class of
technology companies that for the last few years have been offering ways to
manage the data slipping into employees’ personal smartphones and
Internet storage services. They wrap individual files with encryption,
passwords and monitoring systems that can track who is doing what with
sensitive files.

Post 545

Barbie could get talking barbies? Maybe. Should we get barbies that can
listen to our kids? mmmm... maybe not. New barbie doll listens to its
surroundings and says stuff based on program located on the company's
servers. Creepy...

Post 546
Auburn University is investigating a data security incident that could have exposed
the personal information of about 370,000 current, former and prospective

Post 547

AT&T has been found guilty of accessing hundreds of thousands of people's
call register information and is now fined $25m. Interestingly, AT&T then
distributed the information they found to stolen cell-phone traffickers.

Post 548
US Government requesting more user data than almost every other country combined

Post 549

Post 550

Cyber bills are going to the house to encourage tech companies to share
information relevant to cyber threats.

Post 551
From Big Data to Big Bets on Food Science

"The idea is to create new food sources for an expanding global population—
sources that are cheaper, safer, and healthier than what we have today. That may
appear to have nothing in common with YouTube and Google Maps, but the same
data science applies.

Together with a small team of other scientists, I’m building a massive database of
all known plant proteins—one day, it could span 18 billion of them. "

Post 552

NSA are blindly targeting users of privacy services for surveillance, such as
tor and others. They are also targeting individuals who follow news reports
about privacy and new privacy technologies, which means us! Congrats :)

Post 553

Interesting take on having Congress pass a bill about security
when they themselves are no experts.

Post 554
A modest gain for electronic privacy
The cause of electronic privacy gained a bit in the Supreme Court on Monday as the
Justices ruled that it is a search, subject to constitutional challenge, when police install
a monitoring device on an individual’s body to track movements after being convicted
of a crime. The Court did not itself settle, at this point, when such monitoring does
violate the Fourth Amendment, leaving that to lower courts to decide first.

Post 555

Google loses battle in the UK to stop claimants from suing it for bypassing
settings in safari in order to track users. A win for privacy.

Post 556
"A federal court has again renewed an order allowing the National Security
Agency to continue its bulk collection of Americans' phone records, a
decision that comes more than a year after President Obama pledged to end
the controversial program."

Post 557

This article discusses the EU's Digital Commissioner's recent announcement
that the EU should more actively promote EU technology firms in the global
technology sphere. He stated that this could best be done through

Post 558
Proposed CA Bill Would Create GPS Data Privacy Protections For
Mobile Device Users

Post 559
White House to take new Outlook on Obama privacy after G20 summit leak

Post 560

The internet has exacerbated the problems of asymmetric information.
People are "drowning in the data;" there is simply too much for people to
know what is correct. All the while, companies and data collectors are
getting more than ever from people online.

Post 561
"RadioShack still plans to sell customer personal data despite state objections"

The consumer electronics retailer RadioShack declared bankruptcy in February, but it
has just recently begun auctioning off its assets, including vast troves of its customers'
personally identifiable data. Currently, it is unclear whether the data at issue - which
may appertain to between 67 and 117 million customers - includes vulnerable
information, like credit card numbers or account history, alongside contact information
such as name, address, phone number, and email address.

RadioShack's actions set a dangerous precedent; in the future, other tech companies
could similarly hold onto consumer data so that, if bankrupt, they could sell the data to
the highest bidder in order to recoup losses. Customers, in other words, may in the
future unknowingly shoulder the costs of bankruptcy for poorly managed and insolvent
mega-retailers and software companies.

Post 562

Los Angeles phone maker FreedomPop has made a super-secure phone called
Privacy Phone, dubbed the "Snowden Phone," which features 128-bit encryption
and VPN services on the phone. FreedomPop also has a software package
available for sale that can make other phones more secure. The customers of the
new company have now topped 1 million, essentially proving the market for
privacy technology.

Post 563
Drones Beaming Web Access Are in the Stars for Facebook

Post 564
Austria court considers Facebook privacy case

Post 565
New app that will help users scrub potentially damaging social
media posts:

Post 566
A Facebook user is bringing his case against the company to the highest
court in the EU to prevent US intelligence agencies from gaining access to
online information.

Post 567
How Much Do You Know About Data Privacy? Test Yourself

This Wall Street Journal quiz helps the test taker gauge whether or not they
understand current data privacy concerns. Multiple choice, and the answers
are provided.

Post 568

The rise in Electronic Health Records leads to more vulnerable protected
health information.

Post 569
Download Your Entire Google Search History

"Users can now download their entire saved search history "to see a list of
the terms you've searched for," the company said. "This gives you access to
your data when and where you want," Google wrote on its support page.",2817,2482293,00.asp

Post 570

Post 571
"RadioShack still plans to sell customer personal data despite
state objections"

RadioShack, which filed for bankruptcy, was allowed to auction
off its assets, which includes consumer data, despite opposition
from states.

Choice quote:
- "The case could have privacy implications for the tech industry
as it could set a precedent, for example, for large Internet
companies holding consumer data, if they happen to go bankrupt."

Post 572
"Why Data Breaches Don’t Hurt Stock Prices"

Shareholders do not tend to react strongly to high-profile data breaches and stock
prices tend to recover quickly if they do fall as was true for Target, JP Morgan
Chase, Sears, Sony, and other companies after their security breaches. The
authors cite poor access to data and tools to correctly valuate these breaches as a
major reason for the lack of change in stock prices. Since the effects of the
breaches are difficult to quantify, many shareholders do not react to them unless
they result in an immediate change in expected productivity.

"A widely accepted notion goes that there are only two types of companies: those
that have been breached and those that don’t know they have."

"Companies whose assets are primarily non-digital have less incentive to invest in
prevention if they know their stock price will survive — and that takes a toll on the
overall economy and consumer privacy."

Post 573

Post 574
After coder Partap Davis was hacked, he spent weeks tracking down exactly
how it had happened, piecing together information from access logs and
customer service reps. Though he doesn't know who did it, he investigated
how it happened and created a map that sketches out the points of failure of
the most glaring vulnerabilities of our digital lives.

Post 575

The Samsung S5 is a smartphone that can be unlocked using your
fingerprint. Although the information for the fingerprint is stored in a
"Trusted Zone" within the phone that cannot be accessed by apps, the
fingerprint is still available in the memory of the phone at various times, such
as when you've just unlocked the phone and your information is being

As a result, apps are able to access the fingerprint, and use it to hack into
other accounts owned by the user, such as paypal accounts to make

Post 576
Twitter Takes Foursquare’s Help To Add Location Tagging
Twitter aims to partner with Foursquare in making tweets more location-specific to
allow users tag their exact locations in tweets

Post 577

Post 578
Twitter takes non-US data to Ireland in cloud privacy move

Post 579

Post 580
Since class today is on the topic of Tesla...interesting to note that Tesla will soon be
unveiling new technology not in the form of cars. Elon Musk announced this morning
over Twitter

Post 581
Title: Data protection concerns 72% of Britons in post-Snowden world,
research shows


Data privacy is becoming a much larger and more present issue, especially
in the UK. To give some important stats, 72% of British adults are
concerned about their private information online, 32% of respondents would
be willing to pay to protect their information online, and 29% felt it was their
own responsibility to protect their data. This is very interesting because it is
quite a shift from several years back

Post 582
Interesting video with drones:

(Not necessarily news, just sort of cool)

Post 583

Apple has added a handful of health apps to the new Apple watch, including those
that track food intake, when you sleep, how you exercise. However, people are
concerned that Apple is not doing a good enough job of protecting the privacy of
the very personal information that these apps are going to collect. Some even
claim that these third-party apps will sell the data without consent, which could
lead to a variety of problems.

Post 584
Fascinating article on how a privacy executive's medical data
was compromised through a breach of an insurance company that
she wasn't even insured by! Shows the interconnectedness of
health care data, as we learned in the 're-identification'
chapter of this course.

Post 585

This article reviews a popular new comic that imagines life after the internet.
About 50 years before the time of the story, everything in the cloud became
public knowledge. People now despise computers and phones and use
secret identities to preserve what little anonymity they have left. This story is
an interesting experiment and reaction to the data privacy conundrum.

Post 586
Another article on RadioShack's liquidating their consumer data
which points out the perils if companies like Google or Facebook
go bankrupt in the future:

Post 587

Germany double-dealing over data legislation, say negotiators

Post 588

Post 589

Despite privacy policy, RadioShack customer data up for sale in auction
RadioShack is trying to auction off its customer data on some 117 million customers as
part of its court-supervised bankruptcy. Data includes names, phone numbers, mailing
and e-mail addresses, and purchases.

Post 590
ATT to charge for keeping data private

Post 591
The Aftermath Of A Leak: What's Next in the HSBC Suisse Tax Evasion Saga?

The implications of the Falciani leak are still reverberating and there are many unknown
details, including the exact nature and scope of the charges and other legal
consequences in both France and other countries. Also unknown at this point is what
will happen to Falciani, who was indicted in Switzerland on December 11, 2014, and
may be tried there in absentia. What is clear, however, is that the Falciani leak has
triggered collateral consequences on an international scale. France has shared the data
with the tax authorities of other countries, including reportedly the United States, and
some of these countries are investigating HSBC Suisse. The aftermath of the initial leak
has been a series of international controversies extending well beyond simply tax

Post 592
Google Project Fi Wireless Service Undercuts Phone Plans

Summary from The Skimm:

"Google wants to be your new wireless service. Meet “Project Fi.” It’s more flexible
and cheaper than other mobile service providers. But like all good things — it’s
invite only.

While the Big G isn’t taking over wireless just yet, it has taken over a lot of other
things (think: web browser, TV, the fact that it’s a verb, and potentially a car). For
now, it’s teaming up with other service providers. But fee fi fo fum — Google’s kind
of a giant, and Fi’s low costs could force some other major providers like Verizon
to reconsider their pricing."

Post 593
AT&T Wants $139 a month, or your privacy, for super fast Internet

"On Monday, Cupertino became the first West Coast city to offer AT&T’s GigaPower,
which promises Internet speeds so fast customers can download 25 songs in less than
a second. But that speed comes at a price: $139 a month, or $110 for those who allow
AT&T to monitor their browsing habits."

Post 594

All non US accounts on twitter will be subject to a new privacy directive,
effective 18th May. The new privacy directive will be compliant with EU law.
Presumably it is more costly for Twitter to have two distinct privacy
protocols that it abides by - that of the US and that of the rest of the world -
which means that it must profit from the information that they retain in

Post 595
Privacy Pitfalls as Education Apps Spread Haphazardly

Post 596
eBay will be the first American internet company to shift its storage of Russian
consumer personal data to Russia in compliance with a law Putin signed into existence
in 2014. This will also occur for the personal data of Russian PayPal users, as PayPal is
owned by eBay.

Post 597
New Arkansas Bill could prevent street photographers from taking photos of their
subjects without consent if the faces are recognizable. This will place a large
burden on photographers who wish to publicize their pictures.

Post 598

Reddit holds users accountable for posting explicit photos of people without
their consent

Post 599
Data Privacy Challenges & Considerations for Cross-Border Ethics &
Compliance Investigations

Investigations of potential misconduct can be taxing for any organization.
But for organizations operating in multiple countries, the variability of data
privacy laws around the globe present a special challenge. Indeed, in a 2013
survey conducted by KPMG, multinational organizations ranked data privacy
and data protection related challenges as the single biggest challenge
presented by cross-border investigations—ahead of lack of resources,
cultural differences and the legal and regulatory environment.

Post 600

Post 601

"FAA Clarifies That Amazon Drones Are Illegal"

Post 602

NYT Debate on 23andMe and anonymous genetic testing. Authors debate how private
the data can actually be, and whether potential privacy vulnerabilities would outweigh
the research benefits of having that data in the first place.

Post 603
The house has passed a cyberthreat sharing bill, upping the ease with which
companies can share data. The Protecting Cyber Networks Act (PCNA)
essentially protects companies from consumers suing them if they share
information with the government.

Post 604

Mike Rogers elaborately defends proposed plans by the Obama
administration to continue to enforce backdoors into technologies.
Interestingly he cites the Sony attack as a reason for the necessity of such
backdoors. FIghting cybersecurity issues by giving hackers more ways into
technology.... brilliant,

Post 605

In Mumbai, a fake housing website created in the Maharashtra Housing Area
Development Authority's name has been stealing users' personal data and
selling it.

Post 606

Lufthansa is facing privacy action as a result of keeping tallies on staff of
medical records etc. This comes soon after they faced criticism for failing to
act against GermanWings pilot Andreas Liblitz who killed 149 people and
was known to suffer from depression. It's interesting to note that Lufthansa
is being criticised both for infringing privacy by keeping notes of medical
records, and also for not taking action when pilots have medical issues that
restrict them from flying. It seems unfair to argue both sides. I think that we
need more clear legislation about what employers for high risk jobs are
allowed to know about their employees, and that that is where the issue
really lies.

Post 607

Apple is not just collecting data now, it is allowing health researchers to do
it themselves with their platform researchkit. Researchers can recruit
subjects, build apps, and gather info all from the iphone.

Post 608
Fascinating Pew Research Poll shows that even though recent
events have brought new awareness to many Americans about
online privacy and security concerns, most American adults
have not made significant changes to their digital behavior,
and 54% say that it would be “somewhat” or “very” difficult to
find the tools and strategies that would enhance their privacy
online and when using cellphones, according to a Pew Research
Center report.

Common responses were:
- I have nothing to hide
- I do not have the time or expertise
- It won’t prevent monitoring anyway
- I don’t want to raise suspicions or invite scrutiny
- I am comfortable with the monitoring because it makes us

Post 609
Steven Myers:

Geoffery Cohen:

Bruce David White:
Michael Fox:
Marc Prentki: http://www.montreal-diabetes-research-
Michael Levine:
Mark Klamberg:
Mika Palgram:
William Andrews:

Miguel Angel:

Barbara Mahler:

Megan Buchanan:

Ronald Woody:

Eli Katz:

Steven Joseph Davis:

W. Dean Pond:

Jane Seay:

E. Jane Costello:

Maria T. Pinorini-Godly:

Charles Schulz:

James Brown:

Bruce David White:

Carl Wittwer:

Osvaldo Civitarese:

Charles Schulz

Robert Gabriel:

Jeffrey S. McCombs, Ph.D.

Brenda Chinnery:

Mark Schwartz:

Allan Kimmel:


Andrew Marc Lewis

Post 610

Post 611

FTC has settled with Nomi, a retail tracking technology company. Nomi
promised opt-out choices in retail stores, but didn't deliver, instead tracking
9 million devices since 2012.

Post 612

Several small drones flying around Los Angeles have been determining
mobile devices’ locations from Wi-Fi and cellular transmission signals.
They are part of an experiment by Singapore-based location marketing firm
Adnear, which is employing the drones to collect wireless data. They do not
collect conversations or personally identifiable information but uses signal
strength, cell tower triangulation and other indicators to determine where the
device is and track user's travel patterns.

Post 613

Awesome article about how DNA could be used for identification in the future. Ties in
really well with the presentations on Tuesday about the use of SSN's versus
fingerprinting for identification purposes. DNA seems to solve many of the problems
that exist with both SSNs and fingerprints.

Post 614

Executive Order promoting sharing of cyber information ("online threat data") between
private sector companies/organizations and the US Government. Will private companies
be willing to share?

Post 615

Post 616
A new study reported by the Atlantic has found that Google image searches not only
reflect the world that exists in reality but also changes our perception of it:

"Here's the thing, though: Google image searches don't just reflect the sad state of
diversity in corporate leadership; they actually influence the ways in which people think
about what it means to be a CEO. "

The article gives the example of the gendered search results that appear when google
images bring up female and male ceos images. It also reminds me of Professor
Sweeney's example of names that Google images associates with certain races. and how
that affects Google image search results.

The article concludes with the following question: "All this raises a question about what
a search-engine algorithm ought to do. Should it challenge reality, or simply reflect it?"

The concern I have is that in attempting to reflect reality, algorithms will end up
enforcing the status quo so that it will be harder to advance the development of social
norms and societal views in positive directions (or any direction at all).

Post 617
In honor of our recent class segment on biometrics, including facial recognition, I am
posting this fascinating article about a new facial recognition detection algorithm called
the Deep Dense Face Detector.

From the article:
“When an AI based on a convolutional neural net looks at the same images, it doesn't
just file them as "cat" or "lizard"; it breaks them down. It spots common features within
the images—things like scales, legs, noses, eyes, ears. When you show it an image it
hasn't seen before it doesn't just try to classify the whole thing as "cat" or "lizard"; it
scours the image for features, picking up clues—a tail, a patch of fur, the shape of a
paw—and puts those together before making a decision as to what it's seeing. It has a
deeper understanding of the world, and that's what people are talking about when you
hear reports on "deep learning" in the news.”
The implications of this are huge. While “the old system had a pretty rigid idea of what
a face looks like,” per the article, this new system can get around potential blocks, face
coverings, or partial viewing.
One solution the article proposes to this much enhanced facial recognition technology
is to use extreme makeup. The article points out that while we’re currently worried
about what we say on Twitter being permanent, there will soon no longer be a division
between when we are being watched (online) and when we aren’t (offline), thanks to
such technologies as this Deep Dense Face Detector.
Link to full article:

Post 618
A news team in Texas found that a lot of documents containing personal information
were left in cars found in Houston-area salvage yards. The people who run the salvage
yards hold that it is the job of the individual to make sure that the documents are not
left in the cars before they go to the salvage yard. Some individuals are upset that the
responsibility falls on them. There is no Texas law requiring the salvage yard
employees to ensure that these documents, which are like gold to identity thieves, are
removed from the cars.

Post 619

Teenagers are more privacy aware, "dirtying" their online data and "vaguebooking." I
think this is a positive development is public self-protection.

Post 620

In order to surveil a casino penthouse, the FBI cut the internet to the suites
and posed as repairmen to install cameras - a federal judge ruled their
actions illegal. The judge ruled that if they could do this, then they
essentially had the power to search any property they desired regardless of

Post 621
Local educators talk student data privacy with Rep. Jared Polis

Bruce Messinger, a Boulder Valley Superintendent, has been talking about
data privacy for students. This came out from privacy concerns from a
parent who didn't want their child to take standardized tests because of
privacy concerns.

Post 622
Ajusto app that watches your driving habits leads to privacy concerns

This new insurance app monitors speed, acceleration, braking, hard turns,
but critics worry about Big Brother watching. This new usage-based
insurance (UBI) technology provides an interesting supplemental
consideration to our discussion of autonomous cars and the risks of
decreased personal privacy

How it works: "It runs an algorithm and knows by the movement of the
phone whether you're driving or whether you're in a bus or whether you're in
a train or on a plane or whether you're a passenger."Minutes after the trip is
over, the app rates the driver (in stars, out of five) on speed and driving
smoothness. It notes the time of day, distance travelled and issues a score
out of 100. The average score for all trips is used to determine the amount
of the discount, if any.

Post 623

I sure know I wouldn't want this in my car! Looks like the real Ford has been
developing automated features other than the "self park feature" that the pseudo Ford
group in class discussed. This should be an important point of debate as society
moves forward with automated cars.

Post 624

Basically a bunch of data on how people would like more privacy and how
tech companies are reacting or perceive the problem.

Post 625
Barack Obama's Passport Details Shared in Privacy Mix-Up: Report

Post 626
Scientists are gathering data from sewer waste to determine the health of a
population. Researchers laid out the case for sewage as a public-health tool,
arguing that human waste may be a more efficient way of measuring obesity
at the population level.

Interesting to think about the weird places people are searching for data that
is very, very personal.

Post 627

AVG creates glasses that can fool facial recognition algorithms like we
studied in class

Post 628
Monica Lewinsky gave a TED talk about personal data (indirectly) that has been widely watched. Here's the relevant excerpt to our class, and my
brief thoughts below the quotation:

"Let me paint a picture for you. It is September of 1998. I'm sitting in a windowless office room inside the Office of the Independent Counsel
underneath humming fluorescent lights. I'm listening to the sound of my voice, my voice on surreptitiously taped phone calls that a supposed
friend had made the year before. I'm here because I've been legally required to personally authenticate all 20 hours of taped conversation. For the
past eight months, the mysterious content of these tapes has hung like the Sword of Damocles over my head...

This was not something that happened with regularity back then in 1998, and by this, I mean the stealing of people's private words, actions,
conversations or photos, and then making them public -- public without consent, public without context, and public without compassion.

Fast forward 12 years to 2010, and now social media has been born. The landscape has sadly become much more populated with instances like
mine, whether or not someone actually make a mistake, and now it's for both public and private people. The consequences for some have become
dire, very dire."

I think it is interesting to realize that everyone is part of the same system of personal information that is stored, passed on, and reflected back on
an individual -- whether an "ordinary" person such as Amanda Todd, who was bullied using her personal data, or Monica Lewinsky, involved in an
inherently high-profile ordeal. A way in which technology of the internet can be humiliatingly and shamefully equalizing in the predicament it
poses for all users (at least in this moment in time in 2015): it both allows for great publicity and great vulnerability on a relatively equal basis.


Post 629
Ajusto app that watches your driving habits leads to privacy concerns

Post 630
House intel leaders unveil cyber-security bill

Leaders of the House Intelligence Committee unveiled a bipartisan bill
Tuesday that would make it easier for private companies to share cyber-
threat information with the government to thwart attacks by hackers. It aims
to give government agencies the ability to see how a hack occurred and
take action to prevent more attacks. Companies would report cyber threats
to civilian agencies rather than to the NSA or the Defense Department.

The proposed bill specifically states that it does not authorize the
Department of Defense, the National Security Agency nor any other part of
the intelligence community to target a person for surveillance.

Post 631
Bud1%  @ @ @ @ E%DSDB` @ @ @

Post 632

A good overview of the prevalence of location service on smartphones. It
also mentions the flipside to the privacy invasion aspect, noting that many
people give this data in exchange for services.

Post 633
Following the post above, this link has the video of the entire Summit on
Cybersecurity, speech included if anyone is interested. It's definitely worth
listening to. It starts at 2:24.

Post 634
Uber got hacked! Despite Uber's secure encryption systems, someone
stored the encrypted database's key in publicly accessible GitHub
page. Driver names and license plates were leaked.

Post 635
"Watch Out Google, DARPA Just Open Sourced All This Swish 'Dark Web' Search Tech"

DARPA’s Memex search technologies have garnered much interest due to their initial
mainstream application: to uncover human trafficking operations taking place on the
“dark web”, the catch-all term for the various internet networks the majority of people
never use, such as Tor, Freenet and I2P. And a significant number of law enforcement
agencies have inquired about using the technology. But Memex promises to be
disruptive across both criminal and business worlds.

Post 636

Post 637
So I really want to believe that there are not security or privacy implications to this
product because I really want it. Silvair has launched a smart home automation system
where at the click of the button it controls your lights, shades, room temperature, door
locks etc. Anything that you designate and it can all be handled remotely from your
smartphone. I am wondering if it learns your preferences. That could be the only creepy

Post 638
According to a recent report from Alcatel-Lucent's Motive Security Labs, 16 million
mobile devices worldwide have been infected with malware.

Post 639

This is not exactly a news article, but rather from the news/humor site
Cracked, but it is applicable to our last unit. A man tells the story of how he,
a meth addict, was easily able to steal and forge identities. His conclusion-
how unsafe the current system is.

Post 640

California pushing for tougher privacy protections

Post 641
The link for the above summary. Apologies!

Post 642
The struggle over Automatic License Plate Readers continues--
now in Virginia where Gov. Terry McAuliffe (D) just vetoed a
bill that would limit data storage time to seven days.

Post 643

Ireland's data protection agency, which is relatively small for an EU country, is
adding to its staff and budget in order to shed the reputation that it goes "easy" on
tech corps like Facebook and LinkedIn. Because the Irish agency doesn't have as
much power as agencies in other EU countries, many tech companies have located
their headquarters in Ireland, while claiming that, when other EU countries want to
investigate the company's use of consumer data, the companies only have to
answer to the country in which they are based.

Post 644
GPS kills family as maps were not updated

Post 645

Post 646
"Apps’ Info-Sharing Can Imperil Privacy – Hundreds of Times"

An article about the eerily high # of times free apps share
private info with 3rd parties. A psych study conducted at
Carnegie Mellon showed that when users receive a "privacy nudge"
telling them how many times info like location or contact lists
had been shared, they limit sharing significantly. Some also
suggest personalized privacy assistants, "software that learns an
individual’s privacy preferences and selectively engages in
dialogues with users to help semi-automatically configure many of
their settings."

Choice quotes:
- “Your location has been shared 5,398 times with Facebook,
Groupon, GO Launcher EX, and seven other apps in the last 14
days.” (SCARY)
- "App permission managers are better than nothing, but by
themselves they aren’t sufficient. Privacy nudges can play an
important role in increasing awareness and in motivating people
to review and adjust their privacy settings."

Post 647

Post 648

This article is very applicable to the cell phone data lab we completed towards the end
of the semester. Now that Radio Shack has filed for bankruptcy, it's hoping to sell off
all its assets, which include lots of personally identifiable information. With several
states taking legal action, it just reveals just how much regulation and legislation is
still being formed about the protection of personal data.

Post 649
Data privacy in a wearables world.

Post 650
Computer Attacks Spur Congress to Act on Cybersecurity Bill Years in the

Responding to a series of computer security breaches, the House is
expected on Wednesday to pass a bill, years in the making, that would push
private companies to share access to their computer networks and records
with federal investigators. The cybersecurity bill would be Congress’s most
aggressive response yet to a burst of computer attacks that helped sink a
major motion picture release by Sony Pictures Entertainment, exposed the
credit card numbers of tens of thousands of customers of Target stores, etc.

Post 651

California moves to enact a bill that would restrict the amount of information
that ride sharing apps such as uber can collect from customers. This comes
in the wake of privacy allegations that have caused Uber to be banned in
several US cities. How effective will this bill be? Supposedly, it will prohibit
ride-sharing companies from requesting or requiring that passengers
provide personal information such as names, email addresses, phone
numbers, location and trip data, and credit card information. It is unclear
how ride sharing apps will be able to make money without any of these
basic identifiers.

Post 652

The Surveillance State Repeal Act would overhaul American spying
powers unlike any other effort to reform the National Security Agency.

Post 653

Researchers in Iceland have gathered genetic data on many of Iceland's citizens and are
now functionally able to to map out genetic family trees. With the "touch of a button"
researchers can identify, for example, individuals who have the BRCA2 mutation which
is linked with breast cancer. Do researchers have an obligation to identify and inform
these individuals?

Post 654
"Stealing Data from Computers Using Heat"

Security researchers at Ben Gurion University in Israel have discovered a way to retrieve
data from an "air-gapped" computers using only heat emissions and a computer’s
built-in thermal sensors. Because "air-gapped" computers are not connected to the
Internet and can only be compromised through physical access (like a USB flash drive or
fireware cable), they are frequently used by governments, corporations, and individuals
to prevent intruders from remotely accessing sensitive data. This new research,
however, proves that it is possible to siphon and transmit passwords or security keys
from a protected system to an internet-connected system, and to send commands to
the air-gapped system using the same heat and sensor technique. Although this
technique is in its infancy, it poses a grave threat to current data security systems.

Post 655

"China will establish a national population database linked to ID information
and credit records, state media reported late on Monday, as part of a larger
push to beef up surveillance and security in response to violent unrest.

Read more:

Post 656

Post 657

Post 658
"Apple’s ResearchKit Will Turn Your Phone Into A Medical Diagnostic

Apple recently unveiled its new Apple Watch technology. What is
newsworthy and relevant to our studies, however, is the fact that the Apple
Watch "ResearchKit" will be collecting personal medical data on individuals
and sending them to research institutions all over the country. This raises
data privacy concerns. More details:

"ResearchKit is an open-source tool that will enable researchers to create
apps that diagnose or track diseases by using the iPhone’s sensors in real
time. The first five apps, available starting today, will facilitate studies for
diabetes, breast cancer, asthma, cardiovascular disease, and Parkinson’s
disease. They’ll link to participating research institutions that include
Stanford University, the University of Oxford, Weill Cornell Medical College,
Mt. Sinai School of Medicine, the University of Pennsylvania, UCLA, and the
Dana-Farber Cancer Institute."

Post 659
"California Legislators Pushing Warrant Requirement For All Access To
Electronic Information, Including That Obtained By Stingrays"

Post 660
"The Morning Download" in the WSJ gathers the important business tech news of the
last week all in one place on Monday mornings. Great for skimming for general
knowledge and going deeper into particular areas of interest!

Post 661
"Corporate espionage case: Companies turn to IT security firms like
Mahindra Special Services Group, Topsgroup to protect data"

It was very interesting to note that corporate espionage, defined as
companies indulging in illegal and unethical activities to gather information
from competitors with the aim to get an undue advantage, is quite common
and widespread in society. About 35% of Indian companies indulge in
corporate espionage, and even with all the new technologies like closed-
circuit cameras, audio recorders and global positioning system devices only
around 15% of corporate espionage cases are actually detected. Most
companies in India still use very outdated security systems to protect their
data, so they have begun to outsource their data protection services to
security firms like Mahindra Special Services Group, Topsgroup to protect

Post 662

Google's April Fools prank (where they projected a mirror image of all search queries)
actually opened up the site to potential security breaches. Specifically, some oversights
and omissions in Google's reworking of the site made it more vulnerable to click-
jacking attacks, whereby hackers could manipulate the settings of other peoples
accounts remotely.

Post 663
More news on the Radio Shack deal:

Post 664
"Jay Edelson, the Class-Action Lawyer Who May Be Tech’s Least
Friended Man"

Jay Edelson's law firm specializes in suing tech companies by
claiming privacy violations. His cases accuse them of logging
data about people's searches, friends and bodies. He has sued
every major tech company that comes to mind, such as Google,
Apple, Amazon and Spokeo. He acts as a "private attorney general,
forcing companies to change their worst behaviors," while
simultaneously earning heaps of cash. Selfless or self-

Choice quotes:
- "When technology executives imagine the boogeyman, they see a
baby-face guy in wire-rim glasses."
- "But Mr. Edelson says the biggest lift to the kind of data
privacy litigation he does came from Edward J. Snowden, the
former National Security Agency contractor who leaked documents
about government spying. Those revelations have, in his opinion,
made judges much more sympathetic to privacy plaintiffs."

Post 665
New York Times piece on the new privacy challenges that
wearable tech poses:

"Add to this concerns about privacy: that the watch is a
tracking device, which sends all your personal information to
a central database — a corporate control center that already
knows far too much about the preferences and habits of
smartphone users."

Post 666
Defense Secretary Strives to Work With Silicon Valley to Thwart Security

"President Obama’s newly installed defense secretary, Ashton B. Carter,
toured Silicon Valley last week to announce a new military strategy for
computer conflict, starting the latest Pentagon effort to invest in promising
start-ups and to meet with engineers whose talent he declared the Pentagon
desperately needed in fending off the nation’s adversaries."

Post 667
"Everything Marketers Need To Know About Engagement-Based Spam Filtering"

This article gave advice to marketers regarding ways to avoid having the emails
they send end up in spam folders. Email providers use subscriber behavior to
separate graymail (promotions that have been opted into) and spam.

"For most permission-based senders, engagement means personalized
deliverability. Since the definition of spam is in the eye of the beholder, email
providers started filtering emails from brands or businesses based on how a user
interacted with them, meaning if a person read every email sent from a brand
religiously, future emails would be delivered to the inbox. If another person
received the same emails, but interacted with them in what is considered a
negative way, those same emails for would go to that recipient’s spam folder."

From this article, I have learned some of the signals email providers look at to
determine whether or not an email is wanted, such as messages read, messages
responded to, messages forwarded, and messages marked as "not spam" after
being placed into spam. I am interested in learning more about how the email
providers determine and personalize which emails filter into spam folders.

Post 668
The Stratos Card Aims To Unify Credit Cards, And Can Be In Your Pocket Next Month

Stratos has created a credit card that can sync up to three of your other credit cards
so they can all be used on one card. Security is backed by linking the card to your
phone so if the card is not in proximity to your phone for an extended period of
time the company is notified. On the other hand, this means that card info is
encrypted on the phone. It will be available for purchase next month!

Post 669
Twitter provides greater privacy protection to users in Europe, but not the

To add on to the previous article about Twitter's new protection of account
information, an update is that that this new policy will be implemented in the
next month or so, and will also not directly affect the user base in the United
States; it will be geared towards the European users.

Post 670

Privacy breaches put personal info in wrong hands
177 incidents reported to province over period of nearly 4 years; many minor, some

Post 671

An interesting analysis of what information iPhone apps can access on your
phone. Many of the biggest companies, Amazon, eBay, etc, can access a
seemingly unnecessary and alarming quantity of data. Why exactly does
Amazon India need to be able to see what videos you've taken? Of course,
the biggest concerns are that they can access your contacts list. Why
should companies be able to infringe the privacy of individuals who are not
even customers of said company?

Post 672

Facebook may start hosting news stories from news organizations like the New York
Times, BuzzFeed, and National Geographic. One issue at play in this discussion is the
ownership of user data. Currently news stories displayed on Facebook are links that
direct users away from Facebook to the actual news sites. This gives the news
organizations ownership over the user data. It is unclear who would own the user data
if Facebook were to host news articles directly on their site.

Post 673
Retail Tracking Company Violated Privacy Policy, FTC Complaint Alleges

An NBC article describing how MAC addresses work. It claims that the
Federal Trade Commission has filed a complaint against Nomi Technologies.
While the company's privacy policy specifies that it will allow customers the
to opt out of being tracked, it seems that many customers are unaware of
the technology altogether. Around 9 million mobile phones were tracked
within months of the Nomi feature launch.

Post 674
An op ed talking about the recent Germanwings plane crash argues that less
strict European privacy laws could have prevented the crash by showing
airlines the knowledge that the pilot was mentally ill

Post 675
A Northern Virginia cyber security firm says it has uncovered links between
Chinese government-sponsored researchers and the hack of health insurance giant

Post 676
This article provides more detail about the surveillance program started in 1992 that
logged American's phone calls regardless of whether or not those individuals were
suspected criminals.

Post 677

Really interesting opinion piece from the Nation about how privacy may be obsolete.

Post 678
Uber got hacked! Despite Uber's secure encryption systems, someone
stored the encrypted database's key in publicly accessible GitHub
page. Driver names and license plates were leaked.

Post 679
Facebook’s privacy policy breaches European law, report finds
Belgian privacy commission study concludes company’s use of user data violates privacy
and data protection laws, despite January update

Post 680

The 4th circuit court is weeks away from determining whether the fourth
amendment applies to user's data, including location data. This will be a
crucial ruling for data privacy.

Post 681

Privacy bill to allow "more fluid sharing of cybersecurity threat data between
corporations and government agencies." AKA screw your privacy citizens,
but we will make it seem like this is bill only concerns security and doesn't
actually affect you.

Post 682
Jeff Gelles: Is Congress taking wrong direction on data privacy?

Congress currently sees data breaches as primarily a financial threat, and
whenever there is a violation, the company is fined but not much other legal
action is taken. For example, Target has itself proposed to pay $10 million to
settle a class-action lawsuit brought against it following a massive data
breach in 2013. These fines are really a slap on the wrist, and need to be
changed to actually affect change.

Post 683
"ISIS Urges Sympathizers to Kill U.S. Service Members It Identifies on Website"

Summary on the Skimm: "Over the weekend, ISIS posted to a website the names,
photos, and alleged addresses of 100 members of the military. The militant group
urged its US supporters to attack these people, because of their alleged
involvement in the US-led campaign against ISIS. The group says it got the info by
hacking into military servers. But US officials said ‘don’t think so, it’s called
searching the Internet’."

Post 684

Post 685

Would love to talk more about the impending phenomenon of the "Internet of all
Things" and how it will potentially change the complexion of data privacy.

Post 686

This article explains how when people travel they use many different sites to
find the best deals and do research and all of this browsing leaves a data
trail. This data is then used by tourism organizations to analyze trends in
travel and market to viable consumers.

Post 687

An excerpt on how to avoid tech surveillance. The article admits this is a
david and goliath fight, with the individual not standing much of a chance.

Post 688
Patrick Tucker – and Austin Choi-Fitzpatrick, whom he quotes – is interested in ways
that citizens can use UAVs to empower and document social movement and civil
resistance activity. As we consider the politics of webcams in our lab and unit for this
course, we can think of a stationary, rigid technology, relatively speaking. I think it is
worth thinking about UAVs as an innovation building on webcams in the history of
recording the world through technology. In this view, unlike webcams, UAVs are driven
by human discrepancy, curiosity, and probing, and imbalance power and the line
between private and public in different and more intentional ways.

Here’s an excerpt, and link, to Tucker’s musings on UAVs:

“The most disruptive aspect of today’s small, personal UAVs, “is the fundamental break
between the camera and the street level. […] The most memorable photographs of
violent conflict, social protest and natural disasters have almost all been taken by a
person present on the ground. […] UAVs relocate the boundary between what is public
and what is private, because camera-equipped UAVs more the line of sight from the
street to the air. This simple shift effectively pushes public space from the sidewalk to
the stairwell, courtyard, rooftop, and so forth.” As Austin rightly concludes, “‘Open air’
and ‘free space’ are no longer as ‘open’ or ‘free’ as they once were. They are instead
now occupied or vulnerable to occupation.” The use of the words “occupied” and
“occupation” here is indeed intentional. Austin also makes another crucial point: UAVs
represent a type of innovation that is a “hallmark of asymmetrical warfare.””

Post 689

Twitter sets up shop in Ireland to accommodate Europe's tougher privacy laws, while
taking advantage of Ireland tax and leniency benefits. Facebook and LinkedIn do the
same. Very logical corporate move!

Post 690
Privacy fears over 'smart' Barbie that can listen to your kids

Post 691

Two related bills, one apiece in the upper and lower chambers of
Congress, were introduced today aimed at reforming email privacy. They
mark another attempt by the nation’s legislative body at reforming the
requirements that the government must meet to read your digital


Reforming the rules regarding email privacy is a mere step in the walk
towards correcting the mass surveillance that the United States
government executes, but it is an important piece of progress all the

Post 692

As the Apple Watch becomes increasingly popular, more and more people are
developing new, innovative apps that will improve the user experience. A number
of these apps are in the health field, and would use data that the user inputs to
track behavior and suggest lifestyle changes. Privacy advocates have voiced
concerns over the use of this information, as well as the potential for that
information to be distributed to parties one may not want having access to such

Post 693

"Networks Look to Sell Ads With a Personal Touch"

We've talked a lot in this class about online advertisements and the anonymous data
collection that occurs online to fuel increasingly personalized ad placement. However,
individualized advertising is also becoming more common in a more traditional
medium: television. Variety Magazine reports that both Viacom and Time Warner are
now encouraging advertisers to target their advertisements to distinct clusters of
audience. This is largely in response to the splintering of television viewership, due to
the many news ways to consume video content. Advertising agencies are scrambling for
new ways to identify video consumers and their interests, such that they can present
them with increasingly relevant ads. The metrics and analysis enabled vast data
collection mechanisms can indeed to applied to more "old school" forms of

Post 694

Have we lost the battle for privacy? Salon believes so, and Eric Schmidt
certainly agrees:

“Despite the expense, everything a regime would need to build an incredibly
intimidating digital police state—including software that facilitates data
mining and real-time monitoring of citizens—is commercially available right
now. . . . It’s the digital analog to arms sales.”

Post 695
Really interesting article from Wired today about the SIlk Road. Silk Road is a massively
open online enterprise that has become somewhat of a clandestine version of ebay, the
place to go for all your illegal online marketplace needs.

Post 696
"Si​gnal, a cross-platform app that now lets you send encrypted text, picture
and video messages to virtually anyone with a smartphone.

The free app is made by Open Whisper Systems, makers of TextSecure and
Redphone, which allow Android users to send end-to-end encrypted texts
and calls, respectively. That means that short of someone hacking your
phone and stealing your encryption keys, no one—not even the app's
creators—can eavesdrop on your calls and texts."

Post 697
Two congressmen are planning to introduce a bill that would place limits on
how education technology companies can use information about
kindergarten through 12th-grade students. This bill follows news last week
that Pearson, the education publisher, had been covertly monitoring social
media sites to identify students who might have disclosed questions from its
assessment tests, raising concerns among many parent and teacher groups.

Post 698
"Zuckerberg should absolutely protect his privacy, even as Facebook erodes
it for everyone else"

Interesting article about the attitudes of those who have hit it big in the tech
industry towards privacy.

Post 699
Evgeny Morozov has an interesting article in the Financial Times from a few days ago.
He observes that Google, Facebook, and other companies build services around the
data about your preferences, tastes, and social identity as it is constructed through the
playing out of your social life on their platforms. And then he presents a policy idea I
found striking, arguing that we should have communal data stores rather than allowing
our data to be accessed and used by big technology companies who have a monopoly
in this regard. In short, he argues for a "radically decentralised and secure" data
economy that would make possible innovation by smaller entrepreneurs and start ups.

It is interesting to compare this concept to an American idea about the politics of
personal data that I have encountered. The latter leans toward the view that people
should have control of their own data as individuals, and be able to sell it to whomever
(if) they choose.

An excerpt from the article:

"We need a data system that is radically decentralised and secure; no one should be
able to obtain your data without permission, and no one but you should own it.
Stripped of privacy-compromising identifiers, however, they should be pooled into a
common resource. Any aspiring innovator or entrepreneur — not just Google and
Facebook — should be able to gain ac­cess to that data pool to build their own app. This
would bring an abundance of unanticipated features and services.

What Europe needs is not an Airbus to Google’s Boeing but thousands of nimble
enterprises that operate on a level playing field with big American companies. This will
not happen until we treat certain types of data as part of a common infrastructure,
open to all. Imagine the outrage if a large company bought every copy of a particular
book, leaving none for the libraries. Why would we accept such a deal with our data?"

Link to full article:

Post 700
Developments in the car industry will revolutionize our homes. Improving
technology, falling prices and backing from electric-car giant Tesla could
soon make the battery-powered home cheaper and easier than ever,
challenging the long-held utility model of dependence on outside energy.

Post 701

Locate tindr users. This one doesn't need any explanation.

Post 702
"Pearson defends monitoring of social media for PARCC test items"

The Pearson test company is under fire for monitoring social media posts regarding
test questions. They hold that they are doing so in order to ensure test security, but
parents and others are concerned that the test company is improperly using student
data to figure out which students are divulging test information.

Post 703
World's Largest Drone Manufacturer DJI Seeking To Raise at $10
Billion Valuation

Post 704
Planes Without Pilots

This article in the New York Times considers the possibility of pilotless
planes in light of the recent Germanwings crash. The article discusses the
advancements of the technology, its benefits to societal adoption, and some
potential risks. This article is particularly interesting because there are many
similarities to our in-class risk-assessment of the introduction of driverless

Post 705
RadioShack is hoping to sell its database of consumer personal data as a way to gain
back some of the company's money because of the company's current state of
bankruptcy. The database includes information about an estimated 67 million people.

Post 706

New search engine finds anonymized information.

Post 707
Very interesting article about how hackers are really the only thing that can
save people from malicious hackers

Post 708
Steven Myers:

Geoffery Cohen:

Bruce David White:
Michael Fox:
Marc Prentki: http://www.montreal-diabetes-research-
Michael Levine:
Mark Klamberg:
Mika Palgram:
William Andrews:

Miguel Angel:

Barbara Mahler:

Megan Buchanan:

Ronald Woody:

Eli Katz:

Steven Joseph Davis:

W. Dean Pond:

Jane Seay:

E. Jane Costello:

Maria T. Pinorini-Godly:

Charles Schulz:

James Brown:

Bruce David White:

Carl Wittwer:

Osvaldo Civitarese:

Charles Schulz

Robert Gabriel:

Jeffrey S. McCombs, Ph.D.

Brenda Chinnery:

Mark Schwartz:

Allan Kimmel:


Andrew Marc Lewis

Post 709

I know we are past the automated cars discussion, but research from
University of Michigan's Transportation Research Institute has found that
you are more likely to get motion sickness in a self-driving car because you
are not controlling and probably reading or texting. This is a big negative to
consider when moving forward with the technology.

Post 710
"Welcome to privacy hell, also known as the Internet of Things"

The "Internet of Things"—a loosely defined term encompassing anything
with a sensor, connectivity and some kind of processor—has officially hit
peak hype.

But on the consumer side, data privacy and security has been largely left
behind, and government officials are starting to bring IoT concerns into the
mainstream. A January report from the Federal Trade Commission on IoT
security and privacy shortfalls, called for manufacturers to take a more pro-
active role in embedding security in their products. And Massachusetts
senator Ed Markey released the results of his inquiry into the cybersecurity
practices of major car manufacturers in February, calling security measures
"alarmingly inconsistent and incomplete."

The IoT at present is one massive upward curve—of devices, dollars and
especially data. With IoT manufacturers far outweighing cybersecurity
researchers, how will privacy and safety safeguards keep up?

Post 711

Congressmen and women are fighting for social security. This is not exactly
data related, unless you think of the implications. Democrats widely support
expanding social security. This means more opportunities and possibilities
for use of the social security number uses and data collection.

Post 712
Hackers Used a Surprisingly Simple Method to Access Tesla's Website and
Twitter Account

Here are the steps that were taken:
1) "A hacker called AT&T customer support and posed as an employee of
Tesla. This person then demanded all phone calls to the company be
forwarded to a new fake phone number."
2) "Next, this malicious hacker got in touch with Tesla’s domain registrar
Network Solutions. Since all the phone calls were being forwarded to the
hacker, this person was able to easily add a new email address to Tesla’s
domain administrator account."
3) "With this new email on the account, the hacker then reset passwords for
the website and wreaked hours of havoc."

Post 713

An Audi Q5 just drove itself from San Francisco to New York City without a driver

Post 714
This is a multifaceted article in that it addresses many aspects of the
technology privacy battle in Europe. This is illuminated by the subtitles:
-Privacy is a right for all – not just the filthy rich
-No safe harbors: Schemers and the emboldened Court of Justice
-Opening the gates: Vidal-Hall and UK compensation claims
-Report kings: The UN and the new special rapporteur on
-Where do we go from here?

Post 715

Center for Medicare and Medicaid services proposal:

This Stage 3 proposed rule would specify the meaningful use criteria that
eligible professionals (EPs), eligible hospitals, and critical access hospitals
(CAHs) must meet in order to qualify for Medicare and Medicaid electronic
health record (EHR) incentive payments and avoid downward payment
adjustments under Medicare for Stage 3 of the EHR Incentive Programs.

Post 716

Post 717

Facebook is claimed to have breached EU privacy law by illegally tracking
individuals who do not have facebook accounts. This is mostly being
spearheaded by Austrians, and individuals participating in the class action
lawsuit are claiming $500 each:

Post 718

"Police body-camera bill stirs debate over privacy, power"

This article covers a bill proposed in the Seattle legislature regarding policy
body-cameras. It goes on to discuss such a bill's implications for personal

Post 719

cellphone trackers.

Post 720

Facebook is being sued for collecting facial biometric data on its users.

Post 721
Global panel urges ‘new social compact’ on Internet privacy

A global commission on Internet privacy is urging governments to rebuild
users’ trust online by endorsing a set of guiding principles, including
personal data protection as a “fundamental human right.” the Global
Commission on Internet Governance panel, created to investigate Internet
freedom, said It is essential that governments, collaborating with all other
stakeholders, take steps to build confidence that the right to privacy of all
people is respected on the Internet.

Post 722

This article is a great example of how international technology regulation is a key
issue that diplomats have to deal with (this article deals with US and China). Since
such negotiations would require both experience in diplomacy as well as technical
expertise, it really illustrates how individuals with both skills with be of great
importance in the 21st century.

Post 723

Bell getting sued for tracking customers' internet usage

Post 724

More info on AT&T's "buy your privacy" plan. It's more expensive than

Post 725

This article discusses Microsoft's new face-detection software, which
estimates your age based on an uploaded photo. This points to a future
where cameras can instantly ascertain a person's age and gender, and
link the face to other times and places the face has been seen. This has
some unsettling implications for privacy.

Post 726
"McAuliffe: There is ‘no personal data’ in a license plate"

Governor of Virginia, Terry McAuliffe, must decide whether or not he will sign
proposed bills to restrict the police's use of license plate surveillance technology,
like automatic license plate readers. One version of the bill would prohibit the use
of this technology without a warrant while another version of the bill would allow
for the collection of data as long as it is deleted in seven days.

The governor does not agree that the collection of license plate data is a privacy
concern. He describes, “These license plate readers just capture the license plate
numbers,” McAuliffe said Wednesday to a handful of reporters. “There is no
personal data. There is no name. Remember, these license plates are leased from
the state here. So there is no expectation of privacy when you drive down the

Post 727

Michelle Obama, Reese Witherspoon and other celebs are leaking location
information on Instagram--when you turn on your map setting on Instagram,
it's easy for anyone (granted your account is public) to see the location at
which you uploaded the photo. Celebrities, including the First Lady, have
had this location setting on and unknowingly compromised their location
information when using the popular social media app.

Post 728
During the panel discussion before break, we discussed the
opacity of privacy policies that most users do not read (and
if they did, could not understand) and therefore accept by

Here is one online news outlet's attempt to elucidate Apple's
Privacy Policy:

Post 729

A California bill under consideration would severely curtail the amount of
personal information collected by ride-sharing companies like Uber and Lyft
and require them to destroy any identifiable information upon account
cancellation. The concern centers on the fact that travel and contact
information held by these companies has the potential to greatly
compromise someone's personal privacy.

Post 730
A pair of debt brokers posted personal and financial information of tens of
thousands of people to an unsecured website. And that has led both
companies and their owners to agree to settle charges brought by the
Federal Trade Commission over their failure to keep the information
protected, the FTC said on Monday.

Post 731

This article discusses a new startup's efforts to bring an easy-to-use device
that can measure an individual's vitals to homes across the nation. As it
relates to this class, there are interesting implications for how this data will
be used and transmitted to doctors, who will use the data, and for the
privacy of consumer health information.

Post 732

Microsoft adopts an international standard for cloud security/privacy (the
first to do so)

Post 733
An excerpt from Schneier's book, "Data and Goliath: The Hidden Battles to Collect Your
Data and Control Your World," which was officially released today (March 2, 2015).

Schneier offers a wide range of solutions that can help everyday people to avoid, block,
distort and break online surveillance technologies.

Writes Schneier, "Surveillance is both a technological and a legal problem... Politics can
undermine technology, and technology can undermine politics. Neither trumps the
other. If we are going to fix things, we need to fight on both the technological and
political fronts. And it’s not just up to governments and corporations. We the people
have a lot of work to do here."

Post 734

This article describes a new technology by Ford that will automatically slow
down drivers that are going faster than the posted speed limit. This is
relevant to last lecture as Professor Sweeney was talking about the
development of new technologies and how sometimes they can an
unforeseen consequence or flaw. This technology seems like it has potential
for that to happen.

Post 735

Twitter wants to close off its free API firehose to outside vendors, effectively
stifling much of the innovation that has grown up around this outlet. Clearly
this is Twitter acting in the interests of its own shareholders, but how much
will it affect the companies and services that feed off it?

Post 736
Ontario’s sole health privacy prosecution quietly dismissed
In a "mind-boggling" privacy breach, a North Bay nurse allegedly snooped into 5,804
patient records. She was the first to ever face charges under health privacy laws, but the
case was dismissed.

Post 737
see page 2

Post 738
YouGov surveyed more than 2,000 adults on the issue of privacy post-
Snowden. The Snowden leaks revealed the the US and UK governments
were collecting citizen data without permission/awareness. The data shows
UK residents are certainly more worried about privacy relative to years past.
Key data:
-72% are concerned about online privacy and hacking
-32% would pay to protect their online privacy
-29% thought maintaining their privacy was their own responsibility

Post 739

Interesting look at encryption

Post 740
There is a risk in driving more technologically proficient cars as these cars
collect an incredible amount of data on their drivers through wireless
transfer of data (that could possibly be intercepted).

Post 741

Post 742

John Oliver interviews Snowden about surveillance in a hilarious
and accessible to all interview.

Post 743

Despite illegality, 5 drones spotted above Paris sensitive areas.

Post 744

Drones being used for good! Perhaps similar socially-responsible uses for drones
will begin to reshape how the public is perceiving this new technology.

Post 745

Post 746

Amazon notes that while the FAA recently approved testing of some of its
older drones, it has since moved onto more advanced technology, making that
approval obsolete. This points to the challenge of government to remain
current in its regulations and approvals, and the ways that inability to do so
can slow technological innovation.

Post 747

Germany rules that Google must limit data collection. The trend is definitely greater
privatization of private data in Europe. Will the US follow?

Post 748
Cheering on Islamic State can get you jailed in United Kingdom.
Interesting take on "free" speech on the internet.

Post 749

Adding to the self-driving car lab, this article provides an example of how the privacy
of drivers could be jeopardized by more autonomously driving cars. This driver error
monitor could be the very tool that insurance companies insist upon using to to
determine who is at fault- something that will certainly become a national
conversation to be had.

Post 750

Americans don't think their information is secure, but that doesn't stop them
from giving it up for coupons and other online gambits.

Post 751

Barbie is recording conversations in order to talk back to children a la
cleverbot. Could violate a 2 party law of acknowledgement if the doll is
picking up background noise like parents. Parents additionally concerned
because kids confide to their dolls.

Post 752
Why the Social Security Number Should Be Dead

Post 753
"AT&T wants customers to pay the company not to spy on them"

With premium plans that might cost anything between $29 and $66,
AT&T plans to stop tracking their customers. Customers who do not
adhere to these plans will be subject to targeted advertising and
lack of internet privacy.

Post 754

This article notes that the CIA and Justice Department worked together to
develop technology that scans data from thousands of U.S. cellphones. The
technology locates specific cellphones in the U.S. through an airborne device
that mimics a cellphone tower, and has been used to hunt criminal suspects.

Post 755
More on the Clinton scandal

Post 756
Facebook will find itself in court later this year defending itself against a lawsuit over
children spending their parents' money.

Could we put in additional security/identification measures on accounts? When parents
get accounts, should there be a space to mention that they have children preemptively?
How do we identify children on the internet?

Post 757

New revelations have shown that a program at USPS, the Postal Inspection
Service, has been photographing the front and back of all packages,
ostensibly for sorting purposes. The revelations show that these inspections
have in fact also been used to track packages between suspected criminals.
In light of the new revelations, the National Association of Criminal Defense
Lawyers (NACDL) is calling for greater oversight of the program.

Post 758

This article discusses how the FCC's recent move to free up new airwaves
could give rise to a set of new, cheap wireless networks. The FCC plans to
allow users to either share the airwaves for free or pay for priority access via
an auction system.

Post 759
New tools allow lawyers to gain insights about court cases and their legal work from
big data, just as big companies can gain insights about customers from data as well
(i.e. Target predicting pregnancy). Here's the idea:

"The idea of Ravel Law is to use a combination of data visualization, natural language
processing, and machine learning to make the law significantly easier to understand for
lawyers, improving the quality of legal research while also making it more efficient. The
team came out of Stanford’s CodeX program, which is an interdisciplinary center of
computer science, law, and design."


Post 760

This article suggests that a "sizable minority" of Americans have take steps to protect
their online data and personal information in the wake of the Snowden revelations. This
means anything from updating social network privacy settings to being "more discreet"
with search queries. 57% of Americans in a survey responded that they though that
government accessing personal/private information was unacceptable. 30% have
reportedly changed their practices since the Snowden revelations.

Post 761

Reps. Mark Pocan (D-Wis.) and Thomas Massie (R-Ky.) on Tuesday unveiled
their Surveillance State Repeal Act, which would overhaul American spying
powers unlike any other effort to reform the National Security Agency.

Post 762

A federal appeals court ruled that the Telephone Metadata Collection Program, under
which the NSA gathers million of phone records, is illegal. NSA officials defended
their action through the Patriot Act, which expires next June. This is the first major
court ruling that has been aligned with what many see as a movement of privacy that
was launched by leaks from the likes of Edward Snowden and Julian Assange.
Interesting to think how movements to protect personal data are only launched when
people realize their personal data is at risk- something that is not obvious with NSA
phone tracking.

Post 763

Post 764

For $70 a month, you can enjoy AT&T's ultrafast fiber-optic Internet access. For an
additional $29 a month, you can avoid being tracked while doing it.

Post 765
Why Firmware is so Vulnerable to Hacking

Post 766
According to Rami Essaid, CEO and co-founder of Distil Networks,
a bot detection and mitigation company, the current technology
can track people down without even using cookies. Thus, there is
no way to completely protect privacy or guarantee anonymity.
Instead, he argues that the key topic that should be discussed
is transparency.

"The fight should be about bringing tracking out of the murky
shadows and into the sunshine of full disclosure. The Internet
public has a right to know the “Five W’s” of tracking at every
site they visit: Who is tracking me, what are they doing with
the information, where, when and why?"

Post 767
Why this national data breach notification bill has privacy advocates worried

There is a new reform bill regarding data privacy that can be quite
problematic. It can make consumers worse off by undercutting stronger
state laws and eliminating some national level protections they now enjoy

Post 768

This article talks about a new type of technology that can be installed in some cars
called Brain4Cars that can be used to predict automobile accidents before they occur.
This technology was developed by researchers at Cornell and Stanford (!!!) universities.
The system is used to predictive driver action, and thus does not take control over the
car in the same way that self-driving car technology does, but can nevertheless be used
to encourage certain behavior or warn drivers of obstacles or imminent danger.

Post 769
Seems that there are extensive implications for the temporary
cameras put in place at the Boston Marathon this week, which
were programmed to automatically turn toward the sound of

Post 770
"British Court Says Spying on Data Was Illegal"

Article came out Friday in the New York Times.

"LONDON — The court that oversees intelligence agencies in Britain ruled on Friday
that the electronic mass surveillance of cellphone and other online communications
data had been conducted unlawfully."

Full article here:

Post 771

Reddit is getting rid of nude images/sexual acts posted without consent
from the people in the images.
"“I really want to believe that as we enter the next 10 years of Reddit life,
essentially the most trafficked media site on the Internet, the opportunity
here to set a standard for respecting the privacy of our users,” Alexis
Ohanian, Reddit’s co-founder and executive chairman, said in an interview."
Doesn't really explain how this will be enforced/preempted though. You can
ask to have an image taken down now though.

Post 772

Scotland's proposed plan for a national ID-database is at risk of infringing on
individual personal privacy and civil liberties, according to several Scottish
Ministers. Special safeguards are needed to ensure the safety of information on the
database. Many also insist that more public debate is needed in order to get the
consent of the people.

Post 773

Website Ars Technica runs an experiment using public license plate data to track
vehicle movement

Post 774

An interesting take on privacy - we only become concerned when it
becomes personal.

Post 775
An European lawyer, part of the privacy group Europe vs. Facebook,
filed a lawsuit against Facebook addressing Facebook's cooperation
with NSA's PRISM Surveillance program.

Post 776
Republican Leaders Need to Upgrade Their Tech Agenda

Interesting article on what the Republic party will need to do to be competitive in 2016
when it comes to digital campaigning. In previous elections the Republicans have relied
upon more standard campaigning methods but with Obama's social media success
Republicans are jumping on the tech bandwagon.

Post 777

Post 778
Privacy concerns as 'blended learning' models that capture data
about children are being adopted by individual school teachers
rather than at school district levels:

Post 779

A discussion on the divide between the privacy interests of children and
adults. Children will share things with the world that adults would never
dream of sharing. This is a global phenomenon and it's not clear what will
happen when this generation grows up. The big question is: "in the next
generation, will privacy be dead?"

Post 780

Northeastern professors are designing software to do the jobs of TSA
agents. Several airports have already implemented their program that
detects people walking in through the exit. The Northeastern researchers are
developing additional uses for the video surveillance systems, including
detection of suspicious packages left unattended and software that would
recognize “coordinated activities” among individuals. Many people are
raising concerns about the technology though with regards to privacy - for
example, will the cameras have face recognition capabilities?

Post 781

There is technology for planes to drive themselves. Is this a good thing or should
there be pilots?

Post 782
Google warns of US government "hacking any facility" in the world

Google submitted a strongly worded critique of a proposed policy change that would
allow the FBI to “remotely” search computers that have concealed their location – either
through encryption or by obscuring their IP addresses using anonymity services such as
Tor. Those government searches, Google says, “may take place anywhere in the world.
The nature of today’s technology is such that warrants issued under the proposed
amendment will in many cases end up authorizing the government to conduct searches
outside the United States.”

Post 783


Post 784

Post 785
From Harvard Crimson: "Students Voice Privacy Concerns in Advance of
BSC's Move

"Currently, as part of UHS, the Bureau is subject to the federal Health
Insurance Portability and Accountability Act which “protects the privacy of
individually identifiable health information,” according to the U.S.
Department of Health and Human Services website. When the BSC rejoins
the College, students’ records and other private information will again fall
under the Family Educational Rights and Privacy Act, a different kind of
protection that previously applied to the Bureau before the move to UHS 11
years ago, administrators said at the meeting."

Post 786

Samsung owns conversations in front of smart TVs.

Post 787

Machines are becoming better than humans at marketing, using data to
create the best marketing statements, rather than "expertise." Changing the
emotions that advertisements are based on increased click-throughs of
anywhere from 70 to 110 percent, the company found.

Post 788

I had read a while back that some children were unknowingly spending
hundreds of their parents' dollars through in-game app purchases. This
article is a look at how Canada hopes to address child privacy online and on
phones/apps. Canada is looking at the most popular websites among
children to see how privacy stands and what if anything should be changed.

Post 789

The Department of Homeland Security plans to set up shop in Silicon Valley,
in an attempt to both steal and talent and to smooth over relations with
companies after revelations that they have been tracking users

Post 790
Internet carriers may be breaching Canadian privacy laws
In privacy and transparency report, Teksavvy scores highest, Videotron and Shaw score

Post 791
As Health Apps Hop On The Apple Watch, Privacy Will Be Key

Post 792

corporate privacy policies are not able to keep up with the changing pace of

Post 793
Linkedin agrees to a $1.25 million settlement with users who have passwords stolen.
An example that even if the economic costs of privacy breaches are low for the
individual, they can cause class action cases against these firms.

Post 794

Facebook claims that it tracked non-Facebook users with cookies because of a bug,
not deliberate tracking methods.

Post 795
"ACLU: Plan to Expand FBI Search Powers May Compromise Cybersecurity"

The government is working on increasing its power to monitor and search
computers to solve crimes.

"Last year, the Justice Department requested that the Advisory Committee on
Criminal Rules (a committee tasked with updating federal rules of court procedure,
such as when to file briefs) pass an amendment that would allow the FBI to obtain
a warrant to hack computers, even if their location or the identity of their owners
are unknown.

In practice, the ACLU says, the proposal risks violating the Constitution....federal
criminal rules require the government to notify someone if they’ve been searched.
While it’s difficult to do so when you don’t know where a computer is located or
the identity of its owner, the proposal only requires that a reasonable effort be
made to notify someone that the bureau has conducted a search."

Post 796

Google wants to monitor disease with nanoparticles from a pill.

Post 797,d.cWc,d.cWc


Post 798
iOS bug sends iPhones into endless crash cycle when exposed to rogue Wi-

Post 799

The White House has released the first details of a bill that would give
consumers more control over how their online data is used.

Post 800
Link for Post 314

Post 801
Facebook is planning to shut down their Friends Data API.
Currently, Facebook lets you hand over your facebook friends'
data, such as location, check-ins, and interests, to third
party. This is a useful tools for developers and marketing.
However, Facebook 8 is planning cancel this feature in campaign
to protect their users personal data.

Post 802
European data protection authorities have joined forces to probe Facebook's privacy
controls, a French watchdog said Thursday, putting the popular US social media giant
under fresh pressure.

Post 803
After a number of delays, the U.S. Federal Aviation Administration (FAA)
today officially announced its proposed rules for small commercial
drones. Most of the proposed rules already leaked earlier this weekend.
Overall, the proposed rules are pretty straightforward and more lenient
than expected, but while they open up a number of use cases, they are
still strict enough to make it impractical to operate the kind of delivery
drones Amazon and others have envisioned.

Here are the basics of the rules, which will apply to drones weighing
fewer than 55 pounds: pilots will have to pass a knowledge test (but not a
practical test) to get a newly developed drone operator license and will
have to be vetted by the TSA. They will have to take a recurrent test
every 24 months and be at least 17 years old. Pilots will only be allowed
to fly during daytime hours and must be able to see the drone at all times
(though they can also use a second operator as an observer). Once an
operator has this license, it will apply to all small drones.

Post 804

Data Scientists are able to connect credit card purchases to instagram
posts. with just 4 data points, they can identify roughly 90% of consumers.

Post 805

Google has unveiled a new wireless service it calls "Project FI," which will
provide users with talk/text service for $20, plus an additional $10 for each
GB of data. It will use existing T-Mobile and Sprint cell towers and Google
wifi-hot spots. This illustrates a new market that the tech giant is entering,
and could lead to lower prices for existing wireless customers.

Post 806
"Banks Trusted More with Personal Data than Government, Charities, and Supermarkets"
(from City A.M.)

Frequently, it can be useful to consult public opinion polls from other Western
countries in order to gauge how this consensus either reflects or differs from American
popular sentiment. A poll was recently run in the United Kingdom, for example, that
concluded that the UK public trusts banks more than the government, charities,
schools, and supermarkets. Banks continue to be one of the most trusted institutions,
in large part because the necessary services they offer are contingent upon the
relinquishing of significant swaths of one's personal data. It is important to note that
public opinion concerning data security thus is not consistent across all sectors. Some
industries inspire greater trust or distrust than others. What cues prompt us to share or
withhold our personal data from large institutions? This is a question that has not yet
been satisfyingly answered.

Post 807

Now that de Blasio has removed the ban on mobile phones in New York
schools, perhaps we need to update the privacy laws to ensure that
students phones are not "searched" by teachers.

Post 808
Mozilla pushes Congress on personal privacy and surveillance

Post 809

This article discusses the threat that technology could pose in the future.
While there does not seem to be a grave threat with present technology,
future innovations could change this.

Post 810

How the Department of Homeland Security is fighting cybercrime

Post 811

Post 812

This article spells how President Obama continues to push for "Net Neutrality".
Furthermore, it discusses how the US wants to prohibit countries that sign on to the
Trade in Services Agreement from rejecting policies that require that data held by
Internet companies be held within a member country's border. These efforts have
been launched by other nations to prevent being spied on by world powers, such as
the United States and its NSA.

Post 813

Starting from May 18, 300 million Twitter users (non-US) will be serviced
through Twitter International Company, its Irish subsidiary.

Post an entry. Enter your link and text below and submit. Provide your name or email address but it will not display.

Submitted by

Access Code

Copyright © 2013 President and Fellows Harvard University | Data Privacy Lab