“We don't need no stinking security!”
(update) Computer heist puts voter IDs in danger
The names, addresses and complete Social Security numbers of more than 337,000 Davidson County voters may be in the hands of thieves, Metro election officials said Friday.
... Election officials had said earlier in the week that the computers stolen over the Christmas holiday from the Metro Election Commission offices at Howard School Building, 800 Second Ave. S., contained voters' partial Social Security numbers, along with other personal information.
"As we looked deeper … we now know that full Social Security numbers were included on the voter files contained on one or more of the stolen computers," county Election Administrator Ray Barrett said.
Source - Tennessean.com
[From the article:
It wasn't the only break-in of a public building over the holiday. Several laptop computers and a desktop computer were stolen from the state Safety Department's information technology building in south Nashville on Christmas Eve or Christmas Day.
The agency issues Tennesseans handgun-carry permits, and in the past it has overseen the unit that issues drivers' licenses. However, Safety Department officials said they believe personal information was not compromised, because nearly all of the computers were taken from a repair office and their memories are believed to be blank. [How about their hard drives? Bob]
Data “Dysprotection:” breaches reported last week
A recap of incidents or privacy breaches reported last week for those who enjoy shaking their head and muttering to themselves with their morning coffee.
Source - Chronicles of Dissent
Anyone who would like this protection can apply for Ordination in the Church of the Suppressed Evidence for a mere $19.95
FL: Pastor had a reasonable expectation of privacy in his church office computer
Search of a church office computer of the pastor was unconstitutional. The operational realities of the workplace are to be considered. And, the defendant had a subjective expectation of privacy in his office computer. The fact that his superiors in the church could enter the office did not mean that the police could, too. State v. Young, 2007 Fla. App. LEXIS 20515 (Fla. App. 1DCA December 26, 2007)
Source - FourthAmendment.com
[From the case:
The events leading to the search of Young’s office and computer began when the church administrator received a call from the church’s internet service provider.
A representative from that company informed the church administrator that spam had been linked to the church’s internet protocol address. In response to this call, the church administrator ran a “spybot” program on the church’s computers. [Holy Hacking, Batman! Bob] She testified that when she ran the program on Young’s computer, she saw “some very questionable web site addresses.” The church administrator then contacted a member of the staff parish and an information technology (IT) person to set up a time to have the computer examined.
... When a computer is involved, relevant factors include whether the office has a policy regarding the employer’s ability to inspect the computer, whether the computer is networked to other computers, and whether the employer (or a department within the agency) regularly monitors computer use.
Nice simple overview of Data Mining...
December 30, 2007
Recent CRS Reports: Tanzania, Data Mining and Homeland Security, Egypt, China and WMD
Worth looking at... (Includes a pointer to the complete list)
Google Products You Forgot All About
Posted by Zonk on Monday December 31, @02:27AM from the hiding-in-plain-sight dept. Google The Internet
Googling Yourself writes "Lifehacker has an interesting blog post on the "Top 10 Google Products You Forgot All About" that includes stalwarts like Google Trends and Google Alerts and a few others that may not be quite so familiar like Google Personals, Google's WYSIWYG web site creation tool, and Flight Simulator for Google Earth."