"Sometimes, society gets it wrong... When that happens, strong privacy protections—including collection controls that let people pick who gets their data, and when—allow the persecuted and unpopular to survive."
What happens when we let industry and government collect all the data they want.
What happens when we let industry and government collect all the data they want.
Free Money for Everyone - "A wacky-sounding idea with surprisingly conservative roots may be our best hope for escaping endless, grinding economic stagnation." (via) [more inside]
During their Freedom Hosting investigation and malware attack last year, the FBI unintentionally obtained the entire e-mail database of popular anonymous webmail service Tor Mail. And now, they've used it in an unrelated investigation to bust a Florida man accused of stealing credit card numbers. [more inside]
Washington Post: NSA and FBI are mining data from nine major tech companies in formerly secret program. Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, Apple are being monitored, with Dropbox "coming soon". The program, called PRISM, is reportedly the most prolific contributor to the President's Daily Brief.
Glenn Greenwald has produced a secret court order requiring Verizon to hand over to the NSA "telephony metadata" of all local and international calls either originating or terminating in the United States on an "ongoing, daily basis," and further barring Verizon from disclosing to the public the fulfillment of this request or the existence of the court order itself. The ACLU refers to the practice as "beyond Orwellian." Direct link to the court order available here. [more inside]
EFF's Who Has Your Back? for 2013. The Electronic Frontier Foundation has published the 2013 edition of their analysis of how well your private data is protected from the government by about a dozen big internet companies. Also available as pdf. Focused on the US, but may apply elsewhere, too.
The ACLU reports that the IRS claims in an internal document that it has the authority to access citizens' online communications without a warrant. The IRS claimed in a 2009 document that "the Fourth Amendment does not protect communications held in electronic storage, such as email messages stored on a server, because internet users do not have a reasonable expectation of privacy in such communications." It still retains that position even after the 2010 case of US v Warshak which determined that citizens have a reasonable expectation of privacy in such communications. [more inside]
Welcome to a world where Google knows exactly what sort of porn you all like, and more about your interests than your spouse does.
It is June 2, 2010 and Mark Zuckerberg is sweating. He’s wearing his hoodie—he’s always wearing his hoodie—and he’s on stage and either the lights or the questions are too hot. … “Do you want to take off the hoodie?” asks Kara Swisher.The varied cultural resonances of an unassuming garment.
“I never take off the hoodie.”
Surveillance Camera Man (SL Vimeo) is a man who acts like a surveillance camera. However, he is not ceiling-mounted like most surveillance cameras. He takes video of people in public and private places. Most people have a problem with him, creating conflict. One person actually likes him.
Earlier this year, six scientists and doctors filed a lawsuit against the US Food and Drug Administration alleging that the FDA had secretly monitored their personal e-mail accounts after they (legally) warned Congress that the "agency was approving medical devices that they believed posed unacceptable risks to patients." The agency said it had done so to "investigate allegations that the employees had leaked confidential information to the public." At the time, the FDA indicated their computer monitoring was limited to five scientists. But now, the New York Times is reporting that "what began as a narrow investigation" "quickly grew in mid-2010 into a much broader campaign to counter outside critics of the agency’s medical review process.". [more inside]
Murdoch's Scandal - Lowell Bergman (the journalist portrayed by Al Pacino in The Insider) has investigated News Corporation for PBS Frontline [transcript]. He depicts Rupert Murdoch's British operation as a criminal enterprise, routinely hacking the voicemail and computers of innocent people, and using bribery and coercion to infiltrate police and government over decades. Enemies are ruthlessly "monstered" by the tabloids. Bergman also spoke to NPR's Fresh Air [transcript]. But the hits keep coming: in recent days News Corp has been accused of hacking rival pay TV services and promoting pirated receiver cards in both the UK and Australia. With the looming possibility of prosecution under America's Foreign Corrupt Practices Act, how long will shareholders consider Rupert Murdoch irreplaceable? [Previous 1 2 3 4]
"The Obama Administration today unveiled a Consumer Privacy Bill of Rights as part of a comprehensive blueprint to protect individual privacy rights and give users more control over how their information is handled." Full 62-page PDF - Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy. "In addition, advertising networks announced that leading Internet companies and online advertising networks are committing to act on Do Not Track technology in most major web browsers to make it easier for users to control online tracking. Companies that represent the delivery of nearly 90 percent of online behavioral advertisements, including Google, Yahoo!, Microsoft, and AOL have agreed to comply when consumers choose to control online tracking. Companies that make this commitment will be subject to FTC enforcement." [more inside]
The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household trash or use surveillance teams to scrutinize the lives of people who have attracted their attention.
Armen Keteyian of CBS News bought four copiers for $300 a piece (video link). He found a great deal of personal data on the copiers' hard drives, easily accessible using free software one could find on the Internet. [more inside]
Big Brother 101 -- Could your social networks brand you an enemy of the state? (Popular Science Mag) And one staffer finds out it might--due to a connection to the Buffalo Six. Think 6 degrees of Kevin Bacon, but with tapping and surveillance and worse at the other end.
NSA,FISA, and Privacy It is of course the president who finally approves of actions that may or may not be deemed legal but before 9/11, this is what he had been advised to consider "The largest U.S. spy agency warned the incoming Bush administration in its "Transition 2001" report that the Information Age required rethinking the policies and authorities that kept the National Security Agency in compliance with the Constitution's 4th Amendment prohibition on "unreasonable searches and seizures" without warrant and "probable cause," according to an updated briefing book of declassified NSA documents posted today on the World Wide Web. If this is the sort of reading you enjoy, then by all means dig about here: But then Windows allowed NSA to have a sure access to your machine . And by now we all know that Google will fight the government on making its search data base available in order to protect your privacy.(Reality: to protect Google stuff). And if you worry about search engines tracking you and making data available, then here is a workaround
Feds want Google search records according to Mercury News. John Batelle has some analysis as well. This isn't looking too good. Google promises to fight it, but even if they do, does a loss still hurt them the same amount?
National Information Exchange Model (NIEM) Sometimes, its the unheralded steps, that take you most quickly to your destination. On October 7, 2005, the U.S. Department of Homeland Security (DHS), the U.S. Department of Justice (DOJ), and their associated domains announced the first release of the National Information Exchange Model (NIEM) Version 0.1. NIEM "establishes a single standard XML foundation for exchanging information between DHS, DOJ, and supporting domains, such as Justice, Emergency Management, and Intelligence." The release of this specification, and the development of the systems that utilize it may actually be the cataylst for more 'progress' in information mining on the individual than most other, well publicized efforts. NIEM Mission: "To assist in developing a unified strategy, partnerships, and technical implementations for national information sharing — laying the foundation for local, state, tribal, and federal interoperability by joining together communities of interest." When you say it like that, it sounds sort of cool!
we have talked about darknets before. The motivation exists. Some solutions exist, speculation is prevalent. What would it take for you to become faceless.
Government Will Ease Limits on Domestic Spying by F.B.I. (NY Times link) As part of a sweeping effort to transform the F.B.I. into a domestic terrorism prevention agency, Attorney General John Ashcroft has decided to relax restrictions on the bureau's ability to conduct domestic spying in counterterrorism operations, senior government officials said today. Here's the Wash. Post's take on the story.
Does privacy have a place in society anymore? Or is it incompatible with a crowded and technologically-advanced world? If we must submit to constant surveillance, who should we trust to watch?
While it's good to know that the courts seem to be behind consumer privacy, I wonder about the executive branch's stance on privacy.
It's uncertain how important online privacy is to President-elect George W. Bush. He indicated a general support for online privacy laws during the presidential campaign without indicating whether he leaned more toward industry self-regulation, technological solutions, legislative solutions, or some combination. A working document drafted by the Bush transition team on "technology proposals" echoes the same undefined support for online privacy. One analyst thinks his transition-appointments indicate a reference for industry self-regulation.