Tuesday, September 02, 2008

There will certainly be more. And it will be on video and (if amusing) bloggers will spread the word Every incident has at least the potential to trigger a Streisand effect.
http://www.pogowasright.org/article.php?story=20080902062547886
RNC convention: trampling of civil liberties
Tuesday, September 02 2008 @ 06:25 AM EDT Contributed by: PrivacyNews
Over the weekend, a site reader emailed me to ask about coverage of the RNC convention and the no-knock raids, "pre-emptive" actions, arrests, and violence going on. Since it is all I can do to keep up with other privacy news, I have, indeed, been remiss in not providing coverage of acts that often trample on our Fourth Amendment and First Amendment rights, etc.
For PogoWasRight.org readers who want to know more about what is going on in this regard, here are two links that will help bring you up to speed:
The Uptake Democracy Now!
And if you missed the privacy-related news from the DNC convention:
AT&T thanks the Blue Dog Democrats with a lavish party


The “benefits” of ubiquitous surveillance?
http://news.cnet.com/8301-17852_3-10029985-71.html?part=rss&subj=news&tag=2547-1_3-0-5
Is technology making it harder to be unfaithful?
Posted by Chris Matyszczyk September 1, 2008 10:05 PM PDT
According to Nick Harding of London's Independent newspaper, the United Kingdom's divorce rate is going down, and one of the reasons, he posits, is that it is far too easy for your spouse to catch you cheating, if not in flagrante delicto, then certainly communicanto.


Tools & Techniques
http://news.cnet.com/8301-13580_3-10026577-39.html?part=rss&subj=news&tag=2547-1_3-0-5
Revamped Google Picasa site identifies photo faces
Posted by Stephen Shankland September 2, 2008 4:00 AM PDT
... "Once you've started naming people, we'll start suggesting names for you based on similarity," said Mike Horowitz, Google's Picasa product manager. "The process of naming people is really addictive and tremendously fun."


Tools & Techniques: Another tool that allows you to be rude and not get caught?
http://www.killerstartups.com/Comm/destructingmessage-com-send-anonymous-messages
DestructingMessage.com - Send Anonymous Messages
Have you ever wanted to send messages anonymously?
... Using this site, you’ll be able to send anonymous messages through your browser. The messages will delete themselves after a certain amount of time, allowing you to make sure that no one else reads them but the person who it was meant for.
http://www.destructingmessage.com/


Imagine a security environment where this is no problem. (It can be done, but only if you start with the assumption that passwords alone are not adequate security.)
http://www.pogowasright.org/article.php?story=20080901160506999
"Hacker" gains access to Kansas Health Policy Authority data
Monday, September 01 2008 @ 04:05 PM EDT Contributed by: PrivacyNews
A consultant hired by the state to try and break into the computers at the Kansas Health Policy Authority had no luck using a password cracker.
However, he did much better by setting up an e-mail account, impersonating a state computer technician and sending messages to 30 employees asking for their passwords.
Fourteen gave them to him, no questions asked.
Source - KTKA.com
Comment: kudos to the state for checking its security. Hopefully it will do a good job retraining employees. -- Dissent


Major ethical issues? Certainly some privacy issues.
http://www.bespacific.com/mt/archives/019201.html
September 01, 2008
New on LLRX.com: Why and What Lawyers Should Consider Outsourcing
Why and What Lawyers Should Consider Outsourcing: This article by Ron Friedmann reviews the history of and logic behind legal outsourcing. It then outlines some of the current legal outsourcing options. A detailed discussion of each option is not possible in one article. Instead, the final section takes a close look at one, outsourcing secretarial and word processing tasks.


Perhaps an article on legal argument via instant messaging? “OMG! My clnt b inocnt! :)”
http://www.bespacific.com/mt/archives/019202.html
September 01, 2008
New on LLRX.com - The Art of Written Persuasion: The Problem with the Case Method and the Case for the Problem Method
The Art of Written Persuasion: The Problem with the Case Method and the Case for the Problem Method: In this second article in the series, Troy Simpson suggests that the ‘case method’ of teaching law may help to explain why lawyers write badly. He then outlines some of the advantages of the ‘problem method’ of teaching law.


No such thing as “open” secrets? “It's a secret, therefore we need to keep it secret.”
http://www.securityfocus.com/brief/809?ref=rss
FISA court denies access to wiretap documents
Published: 2008-09-01
... "Although it is possible to identify some benefits which might flow from public access to Government briefs and FISC orders ... the 'logic' test is not satisfied because any such benefits would be outweighed by the risks to national security created by the potential exposure of the Government's targeting and minimization procedures," the court stated in its ruling (pdf).


Useful PDF?
http://enisa.europa.eu/doc/pdf/publications/Secure%20USB%20drives_180608.pdf
Secure USB Flash Drives


Tools & Techniques
http://www.labnol.org/internet/tutorial-create-bot-for-gtalk-yahoo-messenger/4354/
How to Write Your Own IM Bot in Less Than 5 Minutes
Written by Amit Agarwal on September 1, 2008

No comments: