Monday, September 24, 2012

Just an observation. This is not why my Ethical Hackers study math...
September 23, 2012
Trend Micro Commentary on Global Hackers
Trend Micro Incorporated Opinion Piece, September 2012 - Peter the Great Versus Sun Tzu
  • "Due to the competitive nature of the environment, East European hackers create customized malware, often with all capabilities internally hard-coded with no external third-party tools. Trend Micro threat researchers noted that robust anti-debugging techniques and complex command and control (C&C) are hallmarks of East European design. East European malware are not always innovative but often incorporate several exploits designed by others in creative ways. An East European hacker is only as good as his last successful job. East European malware are so elegantly crafted, they have been dubbed the “Faberge Eggs” of the malware world. This is due in part to the long history of high-quality science and math education in the former Soviet Bloc. With the fall of communism and the free market chaos that ensued, East Europeans with strong math and science backgrounds turned to the skills developed to help fight the Cold War and started using them to put food on the table by selling them to the highest bidder. In addition, computer scientists in the former Soviet Bloc had to make do with simpler, less sophisticated computing resources, which instilled in them a discipline to make every line of code count. These were combined to yield a pool of expert craftsmen able to build high-impact, small-footprint malware. Probably the best recent example of this is in the new Tinba malware—a well-crafted piece of malware that is optimized for size and capability and used in Trojan banker attacks targeting Turkey."


Take that, Copyright lawyers!
September 23, 2012
New Study Affirms Less Copyright Restrictions Benefit the Economy
EFF: "A new study from Australia presents the latest evidence that loosening copyright restrictions not only enables free speech, but can improve an economy as well. The study, published by the Australian Digital Alliance, indicated that if Australia expanded copyright exceptions like fair use, along with strengthening safe harbor provisions, the country could potentially add an extra $600 million to their economy. In addition, the report details how vital copyright exceptions are to the Australian economy as a whole. As ADA’s executive officer and copyright advisor Ellen Broad told EFF, "Australia's sectors relying on copyright exceptions currently contribute 14% of our GDP, around $182 billion and they're growing rapidly. It's essential that Australia's copyright policy framework adequately support innovation and growth of these sectors in the digital environment.”

(Related) On the other hand, an interesting question for students of Copyright law?
"I've created some popular science videos showing how asteroid discoveries have happened over the last few decades. However I've run into a problem with a religious organization which borrowed my video and redubbed it to promote their religious message. Ultimately I filed a DMCA takedown request via YouTube's site, it's as easy as filling in a form and the video was removed. But this organization has since submitted a counterclaim claiming 'under penalty of perjury' that they do in fact have the rights to this work, and YouTube has reinstated the video. It looks like the only way I can pursue this further is to spend the money to take the organization to court and get an injunction, but even if I did so I'd have to pay court costs up front and since they're based in another country I'd have a difficult time actually collecting any money from the other party. It feels like this other group is simply gambling that I won't spend the time and resources to take further legal action, the DMCA is supposed to provide equal protection but the more lawyer you have the more 'equal' you are. So does anyone have any suggestions for how I should proceed here?"


At some point they will realize it would be easier to study the things they did right. (There must have been some...)
"Prime Minister John Key today announced he has requested an inquiry by the Inspector-General of Intelligence and Security into the circumstances of unlawful interception of communications of certain individuals by the Government Communications Security Bureau. Mr Key says the Crown has filed a memorandum in the High Court in the Megaupload case advising the Court and affected parties that the GCSB had acted unlawfully while assisting the Police to locate certain individuals subject to arrest warrants issued in the case. The Bureau had acquired communications in some instances without statutory authority."


Interesting I wonder if other advocacy groups would be willing to sponsor education software? Perhaps Google would sponsor Driver Training? GEICO could sponsor lizzard races?
PETA Foots The Bill For Virtual Frog Dissection Software In India
PETA, People for the Ethical Treatment of Animals, is offering to sponsor software that lets students poke around the innards of frogs — without actually, you know, poking around the innards of frogs. The offer is being made to schools and colleges in India that agree to give students a choice of cutting into real or virtual frog flesh — or indeed replacing traditional dissection with other “humane” alternatives.
The software in question — Frog Dissection — is made by Emantras, the company PETA is tying up with for the Indian initiative, and is priced at between $2.99 and $4.99 in the U.S. but will be offered free to classrooms in India that agree to offer non-animal dissection alternatives.


Perhaps a tool to collect the odds & ends I hand out to my students?
Readlists is a web app that creates eBooks from your chosen articles online. This effectively allows you to curate articles and turn them into your own collection that you can use with your Kindle or favorite e-book reader.
Similar Tools: Readability, and Wikipedia Book Creator

Sunday, September 23, 2012

“Continuing our quest to know everything about everyone, inside and out...”
FBI renews broad Internet surveillance push
The FBI is renewing its request for new Internet surveillance laws, saying technological advances hinder surveillance and warning that companies should be required to build in back doors for police.
"We must ensure that our ability to obtain communications pursuant to court order is not eroded," FBI director Robert Mueller told a U.S. Senate committee this week. Currently, he said, many communications providers "are not required to build or maintain intercept capabilities."
… It's not exactly clear how much of the FBI's problems in conducting surveillance arise from wireless communications, encryption, social networks, or VoIP; the bureau has not been eager to be specific. Microsoft's Skype service has worked with law enforcement to make online chats and other user information available to police, the Washington Post reported in July.

(Related)
Watch Your Tongue: Law Enforcement Speech Recognition System Stores Millions of Voices
September 22, 2012 by Dissent
Ryan Gallagher reports:
Intercepting thousands of phone calls is easy for government agencies. But quickly analyzing the calls and identifying the callers can prove a difficult task.
Now one company believes it has solved the problem—with a countrywide biometric database designed to store millions of people’s “voice-prints.”
Russia’s Speech Technology Center, which operates under the name SpeechPro in the United States, has invented what it calls “VoiceGrid Nation,” a system that uses advanced algorithms to match identities to voices. The idea is that it enables authorities to build up a huge database containing up to several million voices—of known criminals, persons of interest, or people on a watch list. Then, when authorities intercept a call and they’re not sure who is speaking, the recording is entered into the VoiceGrid and it comes up with a match. It takes just five seconds to scan through 10,000 voices, [That way too slow to be really useful Bob] and so long as the recording is decent quality and more than 15 seconds in length, the accuracy, SpeechPro claims, is at least 90 percent.
Read more on Slate.


Traing a generation of tattlers...
Is #Snitchgate much ado about nothing?
September 22, 2012 by Dissent
Back on July 5, Aliette de Bodard tweeted, “WTF, FB greets me with a picture of one of my friends and asks me “is this your friend’s real name”? Like I’m going to denounce them…” Her tweet was re-tweeted by only one person and got only one response. On July 6, however, Heise reported on Facebook’s attempt to get information on whether its users were really using their real names or pseudonyms. Apart from Heise, a handful of other sites also mentioned this latest development, but only one was in English, which may help explain why the story really didn’t get any traction.
Fast-forward a few months, and when “dǝǝɥƆ Deefy” tweeted, “Facebook wants to know if your friends’ names are real. Are you going to be the snitch? pic.twitter.com/CdqGoxvQ” it gets over 800 re-tweets and its own hashtag – #snitchgate.
So Facebook has been doing this since the beginning of July, but it seemingly flew under privacy advocates’ radar until September 19. In a statement to AllFacebook, Facebook explains:
We are always looking to gauge how people use Facebook and represent themselves to better design our product and systems. We are showing people information that their friends have made available to them, and we indicate to the person taking the survey that their response will be anonymous to ensure them that we are not sharing their data with anyone and only looking to understand the results in an aggregate sense. Additionally, it is important to understand that we will not be using this data for enforcement actions.
But there’s no way out of the survey pop-up except to click “I don’t want to answer:”
Of course, Facebook is a company and not the government, so they can decide that their Terms of Service requires real names – even if they don’t attempt to justify it by saying the real names policy is for safety purposes. And they can take steps to find out whether most users are complying with those terms. There’s nothing seemingly illegal or unethical about what Facebook is doing. It’s just plain creepy. And it may create distrust among users who fear they will be “outed.” How social is that?
But more than creepy, it also reminds us that while Facebook offers its users some privacy settings and controls, its business model is based on real names and making as much information about users as public as possible so that advertisers can target advertising. Using a pseudonym on Facebook still permits targeted advertising based on content, but how much richer would the data mining – and advertising revenues for Facebook – be if the Facebook account can be linked to Gmail or other accounts?
So what should a good friend do when confronted by the screen? Do you say “yes?” (even if it’s not the real name) or do you answer “I don’t want to answer?” Hopefully, you won’t answer “no.”
As for me, I’ll never encounter that survey, because I’ve never used Facebook and never understood why anyone who cares about their privacy would use it. But that’s just me. YMMV.


Local and depressing...
"A Colorado county put bar codes on printed ballots in a last minute effort to comply with a rule about eliminating identifying markings. Citizens sued, because the bar codes can still be traced back to individual voters. In a surprise ruling, Denver U.S. District Judge Christine Arguello said the U.S. Constitution did not contain a 'fundamental right' to secret ballots, and that the citizens could not show their voting rights had been violated, nor that they might suffer any specific injury from the bar codes.


Well of course it is.
"In Victoria (Australia), detailed information about electricity customers' power usage, which gives insights into when a house is occupied, is being shared with third parties including mail houses, debt collectors, data processing analysts and government agencies."


My Computer degree says: Solve the problem and give it to anyone who needs it. My MBA says: Would a nominal fee bee so bad?
"A Private User Agent W3C Community Group has been proposed to tackle the privacy of the web browser by developing technical solutions to close the leaks. Current Javascript APIs are capable of leaking a lot of information as we browse the Internet, such as details of our browser that can be used to identify and track our online presence, and the content on the page (including any private customizations and the effects of extensions), and can monitor and leak our usage on the page such a mouse movements and interactions on the page. This problem is compounded by the increased use of the web browser as a platform for delivering software. While the community ignores the issue, solutions are being developed commercially and patented — we run the risk of ending up unable to have privacy because the solutions are patented. The proposed W3C PUA CG proposes to address the problem with technical solutions at the web browser, such as restricting the back channels available to Javascript, and also by proposing HTML extensions to mitigate lost functionality. Note, this work cannot address the privacy of information that we overtly share, and there are other current W3C initiatives working on this, such as DNT."


Online music
Pandora Users: An Explanation Of The Radio Law You’re Asked To Support
Pandora listeners may notice their regularly scheduled commercial breaks of Ford products and tight jeans were interrupted by a call to support a bill called, “The Internet Radio Fairness Act.” The proposed bill would reduce the royalty fees paid by Internet music-streaming services to those paid by other digital and satellite radio stations (the so-called “801(b)” standard). The Hill reports that online radio services shell out more than 55% of their revenue to pay off royalty fees, while satellite and cable companies only pay somewhere between 7 and 16 percent, according to co-sponsor Rep Jason Chaffetz’s office. Like Google and Wikipedia blacking out their websites in opposition to the Stop Online Piracy Act, Pandora has a captive audience of 150+ million users to broadcast their campaign, once again revealing how web giants can transform into powerful media outlets.


A bit geeky. This is a SEO tool...
September 21, 2012
Google Keywords and search queries using metatags
Google News blog: "...today we’re excited to announce a news_keywords metatag. The goal is simple: empower news writers to express their stories freely while helping Google News to properly understand and classify that content so that it’s discoverable by our wide audience of users. Similar in spirit to the plain keywords metatag, the news_keywords metatag lets publishers specify a collection of terms that apply to a news article. These words don’t need to appear anywhere within the headline or body text. Taking the Variety example above, news keywords such as “stocks”, “stock market”, or “crash” would be helpful in allowing Google News to better understand the article content for ranking without forcing the editors to water down the creativity of a great headline. Because the metatag appears only as part of the HTML code of a page, visitors to a site won’t ever see the magic under the hood."


Perspective


For my students, while we are on break...


Handy for illustrating some Math concepts...
… Loopcam is an application for the iOS devices that allow people to make GIF using their iPhone and iOS device cameras.
Similar tools: Gifture and GifBoom.


Are you ignoring me? (Yet another way to freak out my students!)
BananaTag not only allows users to tag and track their emails but it also analyzes them and shows the whole summary using a graph.
This graph shows you a complete detail of the emails you sent, the number of people who clicked it and the ones who opened it. It also shows you how many of the people you sent the emails to be accessing them from their Desktop or Mobile. The location insight gives you an insight to the places where the emails were accessed from – the location of the people.
Honestly, this type of tool is not for the regular email user, but for business organizations and small businesses who communicate with their clients via e-mails. This is also great for people who advertise via e-mails (not SPAM), and would allow them to find how much audience they reach.
Using the BananaTag tool is pretty easy and simple. Just download the tool and have it integrated into your Outlook software or your Google or Google Apps account. There is also a non-integrated browser email tracking for all other email clients and mobile devices.
There is a FREE available version for a person that allows them to track 100 emails per day.
SImilar tool: Unbox,

Saturday, September 22, 2012

One of my least favorite topics: theft of unencrypted laptops. Why can't managers understand that it is the electronic equivalent of carrying one, ten or 500 four-drawer file cabinets fulle of sensitive records? Would they care more if laptop threats got them fired?
By Dissent, September 21, 2012
HHS added 10 incidents to its breach tool in its most recent update. Somewhat depressingly, five of the incidents involved the theft of unencrypted laptops.
In terms of newly revealed details on known incidents, the University of Miami reported that it had notified 64, 846 patients of the insider breach involving theft and possible sale of patient “face sheets.”
The Howard University Hospital breach of January 25th involving theft of a laptop was updated to reflect 66,601 patients notified. Initially, Howard University had reported 34,503 patients affected.
Here are some of the newly disclosed incidents that had not been previously mentioned on this blog:
Central States Southeast and Southwest Areas Health and Welfare Fund in Illinois notified 754 about an incident on July 31st involving “Unauthorized Access/Disclosure,Other” of paper records. There is no notice on their web site at this time and I can find no substitute notice or media coverage. They have not yet responded to a request for a statement explaining the breach.
Liberty Resources, Inc.” in Pennsylvania notified 3,183 of a laptop theft on August 4th. I cannot find any statement on their web site and I can find no media coverage or substitute notice. They have not yet responded to a request for a statement explaining the breach.
Tricounty Behavioral Health Clinic in Acworth, Georgia notified 4,000 patients after a laptop was stolen on August 26th. They do not seem to have a web site, but I was able to locate a brief media report in the Rome News-Tribune under one of their doctor’s names:
An Acworth doctor had a laptop stolen from her office, according to a Cherokee County Sheriff’s Office report.
According to the report:
Someone broke into the office on Dr. Swarnalatha Inderjith, of 4661 Jefferson Township Lane, and stole a laptop that contained patient information on Aug. 27.
A 32-inch television was also stolen.
The doctor has set up a toll free number for patients or former patients to learn additional information. The number is 888-261-6360.
And yes, there seems to be a small discrepancy as to the date of the theft.
Charlotte Clark-Neitzel, MD of Olympia, Washington notified 942 patients following the July 24th theft of a laptop. I was able to locate a cached copy of Sept. 11 substitute notice:
The home office of Charlotte B. Clark-Neitzel, M. D. was broken into on July 24, 2012. In addition to other personal items, the thieves stole both her medical bags and a laptop. The laptop contained access to Dr. Clark-Neitzels electronic medical record (EMR) system [Are they suggesting an automatic signon? Bob] which was used daily to manage patient information. The Olympia Police Department was notified and is conducting their investigations. All affected patient notification letters were mailed on September 7, 2012. A thorough investigation shows that patient name, address, Social Security number, date of birth and medical information was included on the laptop. Patient billing and banking information was not stored on the laptop and therefore not breached. At this time there has been no indication of malicious use of patient information. Dr. Clark-Neitzel has hired ID Experts to aid in notification and provide services to affected patients. Patients with questions regarding this incident or to determine if they were affected can contact ID Experts at 1-800-809-2956. This public notice is in accordance with the Health Information Technology for Economic and Clinical Health (HITECH) Act. Dr. Clark-Neitzel has sent notification letters to the affected patients and the Department of Health and Human Services (HHS).
Lana Medical Care in Florida notified 500 patients after a laptop was stolen on August 18. I can find no web site for the practice, nor any substitute notices under that name or under the names of two physicians associated with the practice.
As additional info becomes available, I’ll update this post.

(Related) After all, failure to encrypt can cost you big time...
By Dissent, September 21, 2012
Kathy Roberton reports:
A hearing is scheduled in Sacramento on Sept. 27 on a class action against Sutter Health over last year’s theft of a personal computer that held data on 4.24 million patients.
Twelve lawsuits filed over the incident have been coordinated in Sacramento County Superior Court.
The Sutter Health breach reportedly affecting 4.2 million after an unencrypted computer was stolen from their offices was disclosed in November 2011. Within two weeks, at least two lawsuits had been filed. Sutter subsequently reported that 943, 434 were affected.


So much for their “We want you to be secure” lip flapping... (“It's not a failure, it's a feature!”) That means my password “Icanneverremembermypassworddammit!” has to be changed?
"Microsoft doesn't like long passwords. In fact, the software giant not only won't let you use a really long one in Hotmail, but the company recently started prompting users to only enter the first 16 characters of their password. Let me rephrase that: if you have a password that has more than 16 characters, it will no longer work. Microsoft is making your life easier! You no longer have to input your whole password! Just put in the first 16 characters!"
At least they warn you; I've run into some sites over the years that silently drop characters after an arbitrary limit.

(Related) “We left all those decisions to our entry-level programmers...”
"'If you are one of the six million Virgin subscribers, you are at the whim of anyone who doesn't like you.' The Hacker News describes how the username and password system used by Virgin Mobile to let users access their account information is inherently weak and open to abuse."
Computerworld also describes the problem: essentially, hard-coded, brute-force guessable passwords, coupled with an inadequate mechanism for reacting to failed attempts to log on.


“Well, you started it with the attack on our nuclear facilities.”
“Did not!”
“Did too!”
At what point do we reach the electronic equivalent of war?
"Evidence suggests the Iranian government is behind cyberattacks this week that have targeted the websites of JPMorgan Chase and Bank of America. The attacks are described by one source, a former U.S. official, as being 'significant and ongoing,' and looking to cause 'functional and significant damage.' Another source suggested the attacks were in response to U.S. sanctions on Iranian banks."


“Contrary to what I say in public, this is my real agenda, don't tell anyone...”
Recording Romney, Part One
September 21, 2012 by Dissent
Earlier this week, I pointed to some coverage questioning the legality of recording presidential candidate Mitt Romney’s comments at a private fund-raising event. Now there’s a more in-depth legal analysis of the issue by Jeffrey P. Hermes of Citizen Media Law Project that is well worth reading:
As will be discussed below, there are a patchwork of laws on this topic, but the ultimate determination will largely turn on two issues: (1) whether there was consent to the recording that would protect the individual who made the video against liability; and (2) whether there was a reasonable expectation of privacy in Romney’s remarks. Part One of this post will discuss the laws that might apply, and the question of consent. Part Two, which will be posted tomorrow, will discuss whether Romney (or anyone else) had a reasonable expectation of privacy in the remarks, and certain other relevant legal issues (such as protection that Mother Jones enjoys in such situations under the First Amendment).
Read Part One on CMLP.

(Related)
Recording Romney, Part Two
September 21, 2012 by Dissent
The second part of Jeffrey P. Hermes’ analysis of the legality of recording Mitt Romney at a private fundraiser is now up on Citizen Media Law Project (Part One here).
What a great example of information being freely available on the Internet. Kudos to Jeff Hermes and CMLP for informing those of us who want to understand the nuances of laws involving recording as they apply in this case.


Interesting. Who (if anyone) inherits the rights to her Facebook account?
Facebook fights for deceased beauty queen’s privacy
September 21, 2012 by Dissent
Sometimes even when you’re right, you’re perceived as wrong. For those of us who criticize Facebook’s lack of sufficient regard for user’s privacy, here’s a case where by attempting to protect user privacy, they will undoubtedly leave many understandably upset with them. Declan McCullagh reports:
Facebook has successfully fought a subpoena trying to seek access to the account of a beauty queen who died after falling from the 12th floor of her ex-lover’s apartment, CNET has learned.
A federal judge in California yesterday rejected a attempt from representatives of the estate of Sahar Daftary to gain access to her Facebook account.
Her mother is hoping to show a Manchester, U.K., coroner’s inquest that Daftary, a onetime Face of Asia beauty contest winner, did not commit suicide when falling from the apartment of property developer Rashid Jamil in 2008.
But U.S. Magistrate Judge Paul Grewal said that a federal law called the Stored Communications Act does not require Facebook to comply with such a subpoena in a civil case.
Read more about the case on CNET.

(Related) “We had to do it over there, we don't have as many lobbyists in Europe... Yet.”
"Facebook has disabled face recognition features on its site for all new European users. The move follows privacy recommendations made by the Irish Data Protection Commissioner. Tag Suggest information has been turned off for new users, and Facebook plans to delete the information for existing EU users by October 15th. 'The DPC says today’s report (PDF) is the result of evaluations it made through the first half of 2012 and on-site at Facebook’s HQ in Dublin over the course of two days in May and four in July. The DPC says FB has made just about all of the improvements it requested in five key areas: better transparency for the user in how their data is handled; user control over settings; more clarity on the retention periods for the deletion of personal data, and users getting more control over deleting things; an improvement in how users can access their personal data; and the ability of Facebook to be able to better track how they are complying with data protection requirements.'"

(Related) “We may not be able to use facial recognition...”
"Freedom to go under a pseudonym is, miraculously, one freedom to survive the security lock-down of the previous decade. Now Facebook wants to change this. James Firth shows Facebook is clamping down on pseudonyms, with an interesting screenshot of being asked whether a friend is using their real name."

(Related) Are some of these changes just cost savings to boost the stock price?
Facebook’s About-Face on Sharing Gives News Sites Whiplash
Facebook giveth and Facebook taketh away. App startups have known this for a long time; now The Washington Post and other news publishers are learning the same lesson as Facebook makes it harder for articles to go viral.
Facebook’s manager of media partnerships was quoted at a journalism conference saying the social network is moving away from so-called “passive sharing,” in which reader apps from the likes of the Post and The Wall Street Journal are able to broadcast activity without any prompting.


My Ethical Hackers would never do this (probably)
"At the EUSecWest security conference in Amsterdam, researchers showed how their 'UltraReset' Android app can read the data from a subway fare card, store that information, and reset the card to its original fare balance. The researchers said that the application takes advantage of a flaw found in particular NFC-based fare cards that are used in New Jersey and San Francisco, although systems in other cities, including Boston, Seattle, Salt Lake City, Chicago and Philadelphia, could also be vulnerable."


This is interesting. A library of free tools (some assembly required)
"The Public Laboratory for Open Technology and Science is putting together an open hardware spectrometer kit on Kickstarter. The kits are built using an HD webcam, discarded DVD, and a couple other odd bits. They've also put together a kit for your smart phone and open-source software for desktop, Android, and iOS. Need to analyze the contents of your coffee, the output of your new grow lights, or a distant star on a budget? Just build your own spectrometer, or pick up the limited edition steampunk version."
Besides making cool hardware, they'd like to "build a Wikipedia-style library of open source spectra, and to refine and improve sample collection and analysis techniques. We imagine a kind of 'SHAZAM for materials' which can help to investigate chemical spills, diagnose crop diseases, identify contaminants in household products, and even analyze olive oil, coffee, and homebrew beer."


Global Warming! Global Warming! ...and would the capture of that much carbon cause global cooling?
Canada's far north could be forested by century's end
… "According to the data model, climate conditions on Bylot Island will be able to support the kinds of trees we find in the fossilized forest that currently exist there, such as willow, pine and spruce," says Alexandre Guertin-Pasquier of the University of Montreal.

(Related) Short answer: It sure doesn't look like it. Probably the reporter could find nothing informative to write about.
Does the expanding Antarctic sea ice disprove global warming?


Just another reason why I am FROM New Jersey...
Reader Presto Vivace blesses us with news that the state of New Jersey "has banned motorists from making big smiles [for their license pictures] because such expressions don't work with facial recognition software." Now that passports are by decree grim and glasses-free, I'm expecting the next phase to involve the banning of facial hair, lips, and any hair that blocks the ears.


Show your students (children, whatever) what cell phones looked like back in Ye Olde Days


Odd & Ends I find interesting...
Degreed, a startup that seeks to “jailbreak the degree” — that is, to help people get “credit” for all their learning, whether it happens at a 4 year college or not — opened its doors this week. It’s still in beta, and there are definitely kinks to work out. But the site lets you translate your degrees, transcripts, and badges into a score that recognizes what you know, not just what your diploma says.
The Saylor Foundation says that it plans to take advantage of the newly released Google Course Builder to create open enrollment online classes. The Saylor Foundation has created some 200 courses which it will now start offering via the new Google platform.

Friday, September 21, 2012

How much is encryption worth?
By Dissent, September 20, 2012
Michelle McNickle reports:
The recent data breach at Massachusetts Eye and Ear Infirmary (MEEI) and Massachusetts Eye and Ear Associates once again screams the message: Encryption, encryption, encryption! The provider has agreed to pay a $1.5 million fine to theDepartment of Health and Human Services (HHS), after allegations were made that Mass. Eye and Ear failed to comply with certain requirements of the Health Insurance Portability and Accountability Act (HIPAA) standards that govern the security of individually identifiable health information.
Read more on InformationWeek.


We've been trying to reduce paperwork, like warrants...
LAPD Joins Feds In Skirting Fourth Amendment With Cell Phone Tracking Devices
September 21, 2012 by Dissent
Tim Cushing reports that the use of software such as StingRay to triangulate and determine cell phone location is on the rise:
local law enforcement members have been availing themselves of them. LA Weekly, using recently obtained FOIA documents, discovered that the Los Angeles Police Department (along with police in Miami, Ft. Worth and Gilbert, AZ) has obtained and deployed the questionable StingRay.
Read more on TechDirt, keeping in mind that Congress failed again to update ECPA and the Governor of California has had a bill sitting on his desk for almost a month that would require a warrant for cell phone location data. He has neither signed the bill into law nor vetoed it.

(Related) From almost a year ago...
DoJ: Stingray cellphone tracking device falls under Fourth Amendment, but don't ask about it


This allows “Traffic Analysis” (to determine who the terrorists are talking to) but won't be able to tell if they are ordering an attack or a pizza...
AU: ASIO, Roxon defend data-retention proposal
September 21, 2012 by Dissent
Shipping data overseas is not the only Australian proposal generating controversy these days. Josh Taylor reports:
Following widespread criticism of the government’s proposal to require internet service providers (ISPs) to retain unspecified customer data for up to two years, the Australian Security Intelligence Organisation (ASIO) and Attorney-General Nicola Roxon have taken the unusual step of releasing public submissions on the proposal, defending the need to retain the data.
Read more on ZDNet.
[From the article:
In the submission, published yesterday, Roxon said that she didn't have a "specific data-retention model" planned at this stage, but that the government does not intend for the content of communications data, such as emails, SMS messages, or phone calls, to be included in the scheme.
Roxon pointed to the controversial EU Directive on Data Retention that was created in 2004, which requires companies to keep a log of the source, destination, date, time, duration, type, and the equipment used in making the communication for between 6 and 24 months.

(Related) “If you don't know how to control it, ban it!”
AU: Coalition joins fight against privacy law reform
September 21, 2012 by Dissent
One argument I often hear against privacy reform is that it will stifle innovation or commerce. In Australia, proposed reform would almost certainly do that. Jane Lee and Georgia Wilkins report:
The Coalition has joined big banks and telcos in their fight against proposed laws that aim to prevent them from sharing personal information about customers with companies overseas.
Government amendments to the Privacy Act would restrict companies from sending valuable information about customers’ credit-worthiness offshore – unless the receiver was formed in, or controlled from, Australia.
This would affect companies that outsource information to international call centres, data-processing centres and data stored in the cloud.
Read more on The Age.


“Holy Mackerel, Batman!” OR TSA strikes again! (Because we heard Al Queida is developing a bait fish bomb.)
Would-be terrorists hoping to sneak weapons and other contraband through U.S. ports on and in the hulls of ships may be thwarted by a robotic tuna fish under development for the government.


Insight! How to game the cy pres decision make sure you are fairly considered for a share of cy pres funds.
Settlement in Facebook Beacon case upheld
September 21, 2012 by Dissent
A challenge to the Ninth Circuit’s approval of the settlement in the Facebook Beacon class action lawsuit has failed. The Ninth Circuit Court of Appeals writes:
The question presented is whether the district court abused its discretion in approving the parties’ $9.5 million settlement agreement as “fair, reasonable, and adequate,” either because a Facebook employee sits on the board of the organization distributing cy pres funds or because the settlement amount was too low. We hold that it did not.
Read the opinion in Ginger McCall v. Facebook here. It sheds light on how the court views cy pres awards when there are a number of organizations that are relevant to the nexus of the complaint.
Wendy Davis of MediaPost covers the decision and reports that McCall is deciding whether to appeal.

Thursday, September 20, 2012

Someone looked for weak security. (Note that this may not be a new breach)
Hackers steal info on 200,000 Navy personnel (updated)
September 19, 2012 by admin
Navy Times reports:
The private information of more than 200,000 current and former Navy personnel was compromised in June when hackers broke into the Navy’s Smart Web Move Internet site, an application used to arrange household moves on official orders that was subsequently suspended, Naval Supply Systems Command confirmed Wednesday.
The compromised database stored 11 years of private information, but officials said there is only evidence that the personal data for 20 people was posted online.
The rest of their story is behind a paywall on Navy Times.
The Hacker News reports that the hack was by “digital-corruption” and a partial data dump revealed usernames, email addresses, and “Security Questions – Answers of all users.” The paste has been removed from Pastebin, so I could not confirm that.
Update: see comment from Adam, below, indicating that this claimed hack had been claimed and disclosed previously by other hackers.


A target for my Ethical Hackers?
"Currently — as most of us know — TSA agents briefly examine government ID and boarding passes as each passenger presents their documents at a checkpoint at the end of a security line but Thom Patterson writes at CNN that under a 2008 Apple patent application that was approved in July and filed under the working title "iTravel," a traveler's phone would automatically send electronic identification to a TSA agent as soon as the traveler got in line and as each traveler waits in line, TSA agents would examine the electronic ID at an electronic viewing station. Next, at the X-ray stations, a traveler's phone would confirm to security agents that the traveler's ID had already been checked. Apple's patent calls for the placement of special kiosks (PDF) around the airport which will automatically exchange data with your phone via a close range wireless technology called near field communication (NFC). Throughout the process, the phone photo could be displayed on a screen for comparison with the traveler. Facial recognition software could be included in the process. Several experts say a key question that must be answered is: How would you prove that the phone is yours? To get around this problem, future phones or electronic ID may require some form of biometric security function including photo, fingerprint and photo retinal scan comparisons. Of course, there is still a ways to go. If consumers, airlines, airports and the TSA don't embrace the NFC kiosks, experts say it's unlikely Apple's vision would become reality. 'First you would have to sell industry on Apple's idea. Then you'd have to sell it to travel consumers,' says Neil Hughes of Apple Insider. 'It's a chicken-and-egg problem.'"


Training our children...
"In a cool yet creepy marketing campaign, Nestle plans to stalk UK consumers. The company kicked off a unique promotion called 'We will find you' that involves GPS trackers embedded in chocolate bars. When a winning consumer opens the wrapper, it activates and notifies the prize team who promises to track them down within 24 hours to deliver a check for £10,000. A Nestle spokesman added that 'inside their wrappers, the GPS-enabled bars looked just like normal chocolate bars.'" [But don't throw your wrapper away! Bob]


Too much “Wow, I didn't think of that...” going around.
When Privacy Gets Personal For Policymakers
September 19, 2012 by Dissent
Jay Stanley of the ACLU writes:
Data from license plate readers in Minnesota was obtained by a St. Paul car dealer using open-records laws, and used to repossess at least one car, according to a recent article in the Minneapolis Star Tribune. The article included this amusing tidbit:
When the Star Tribune published data tracking Mayor R.T. Rybak’s city-owned car over the past year, the mayor asked police Chief Tim Dolan to make a recommendation for a new policy about data retention.
To those of us who think about privacy a lot, it’s not just funny but also amazing how, when public officials discover that they can be at the receiving end of bad privacy policies, it tends to produce an immediate, electric effect on policy.
Read more on ACLU.


For my Data Mining and Data Analytics students.
Big Data for All
September 20, 2012 by Dissent
Omer Tene writes:
Much has been written over the past couple of years about “big data” (See, for example, here and here and here). In a new article, Big Data for All: Privacy and User Control in the Age of Analytics, which will be published in the Northwestern Journal of Technology and Intellectual Property, Jules Polonetsky and I try to reconcile the inherent tension between big data business models and individual privacy rights. We argue that going forward, organizations should provide individuals with practical, easy to use access to their information, so they can become active participants in the data economy. In addition, organizations should be required to be transparent about the decisional criteria underlying their data processing activities.
Read more on Concurring Opinions. I’ll withhold commenting on their proposal until I’ve had time to read through their article.


“When the politics get rough it's time to change the subject!” Was this “a conversation” as defined by this law? Can any candidate give an “off the record” speech?
Lawyers Ponder Whether ‘Secret Video’ of Romney Violated Privacy Laws
September 19, 2012 by Dissent
Bruce Carton writes:
Politicos want to know whether the “secret video” of Mitt Romney speaking at a private fundraising event will hurt his chances in the upcoming presidential election, but some lawyers are pondering a different question: Did the person who made the tape violate state law?
CNBC reports that in Florida, both parties to a conversation must give their consent before it can be recorded legally.
Read more on Law.com. Some of the quotes obtained from legal experts in the related Politico piece are certainly intriguing.


If the pen is mighter than the sword, is tweeting just overkill? How simple it is to make a state cower in fear...
Magazine Cartoon Prompts French Embassy Closures
France plans to close its embassies, consulates, cultural centers and schools in 20 countries Friday as a precautionary measure after a French satirical magazine published cartoons featuring the Prophet Muhammad.

(Related) What should we call this? “Actor rights?” Do they get to veto any post production changes? Is this just fear of retaliation?
YouTube slapped with lawsuit by 'Innocence of Muslims' actress
… Cindy Lee Garcia, who has a role in "Innocence of Muslims," said that she did not know about the movie's anti-Muslim content while filming and her script did not mention the prophet Muhammad, religion, or sexual content, according to The Huffington Post.


A most interesting question. If Google could do this, should they charge for it?
Should the Duchess of Cambridge call upon Google to assist in restoring her privacy?
September 19, 2012 by Dissent
When I read the headline of the blog entry by Tim Lowles on Inforrm’s Blog, ”Should the Duchess of Cambridge call upon Google to assist in restoring her privacy?” my first thought was, “Why bother asking?”
For the longer version and explanation of why asking Google is generally a waste of time, read Tim’s commentary.


Another way for my Ethical Hackers to “Vote early, vote often!” (In the Chicago style)
California joins other states in allowing online voter registration
… "Today, the Internet replaces the mailbox for thousands of Californians wishing to register to vote," she said, according to the Los Angeles Times. "Today we are taking the next step in the never-ending evolution of democracy and reaching every Californian."
Within the first 12 hours of the launch of California's new system, 3,000 people had already used it to register to vote. [and 2,000 of them are in my class! Bob]


Another example of bad journalism, or poor editing, or a case of the “who cares?”
Pasco teacher fired over Facebook snooping
September 19, 2012 by Dissent
There was a small item on Bay News 9 that caught my eye:
The Pasco County School Board has fired a high school Spanish teacher who was accused of snooping on her students’ Facebook accounts.
Angelica Cruikshank, who taught Spanish at Land O’ Lakes High School, was let go Tuesday.
Attorneys said Cruikshank wanted to see if students were talking bad about her.
She said she was trying to protect a student from being fired. [That's what the article says... Bob]
So how was she snooping? Was she just reading their public posts? If so, does that violate District policy? Or was she snooping via other means? And how did the high school become aware of the snooping? Did the teacher comment on post to a student?
It would be nice to have more details on this case.
[After some (12 seconds) research:
… Students said Angelica Cruikshank told them she was withholding permission in January for some of them to attend a field trip because of suspected negative comments about her on a private Facebook page. They said she then intimidated the students into letting her look at the Facebook page through their accounts to determine who, if anyone, had made disparaging remarks.
… In her testimony during the July hearing, Cruikshank said she was trying to root out whether one of her own students was being bullied on the Facebook page in question. She said a school assistant principal told her she needed proof, so she set about getting that proof.

(Related)
September 19, 2012
Bullying in a Networked Era: A Literature Review
"The Berkman Center for Internet & Society at Harvard University is pleased to share a new literature review by the Youth and Media team, contributing to The Kinder & Braver World Project led by danah boyd and John Palfrey - Bullying in a Networked Era: A Literature Review, by Nathaniel Levy, Sandra Cortesi, Urs Gasser, Edward Crowley, Meredith Beaton, June Casey, and Caroline Nolan, presents an aggregation and summary of recent academic literature on youth bullying and seeks to make scholarly work on this important topic more broadly accessible to a concerned public audience, including parents, caregivers, educators, and practitioners. The document is guided by two questions: “What is bullying?” and “What can be done about bullying?” and focuses on the online and offline contexts in which bullying occurs. Although the medium or means through which bullying takes place influence bullying dynamics, as previous research demonstrates, online and offline bullying are more similar than different. This dynamic is especially true as a result of the increasing convergence of technologies. Looking broadly at the commonalities as well as the differences between offline and online phenomena fosters greater understanding of the overall system of which each is a part and highlights both the off- and online experiences of young people – whose involvement is not typically limited to one end of the spectrum."


Another consequence of Social Networking?
SternisheFan writes with an AP story as carried by Yahoo that illustrates one of the boundaries of free speech online:
"A California man accused of posting comments on ESPN's website saying he was watching kids and wouldn't mind killing them was in jail Tuesday on $1 million bail after he was arrested for investigation of making terrorist threats, authorities said. Several guns were found Monday at the home of former Yale University student Eric Yee, said Los Angeles County sheriff's Lt. Steve Low. Yee was arrested after the sports network ESPN reported threatening posts were made in a reader response section to an online ESPN story on Thursday about new Nike sneakers named after LeBron James that cost $270 a pair. Some of the nearly 3,000 reader comments on the story talked about children possibly getting killed over the sneakers because of how expensive they are, said ESPN spokesman Mike Soltys. 'What he was posting had nothing to do with sports," Soltys said Tuesday. "We closely monitor the message boards and anytime we get a threat, we're alerting law enforcement officials.' An employee at ESPN headquarters in Bristol, Conn., notified local police the same day and they linked the posting to Yee's home in Santa Clarita in northern Los Angeles County."


Useful?
September 19, 2012
Congress.gov: The New Home for Legislative Information
"Congress.gov makes federal United States legislative information freely available to the public. Launched Sept. 19, 2012, this version of the site is an initial beta release of Congress.gov, created as a successor to THOMAS.gov, the current public site for legislative information. The Congress.gov beta site contains legislation from the 107th Congress (2001) to the present, member of Congress profiles from the 93rd Congress (1973) to the present, and selected member profiles from the 80th through the 92nd Congresses (1947 to 1972). Over the next two years, Congress.gov will be adding information and features, eventually incorporating all of the information currently available on THOMAS.gov. (To compare the scope of legislative information available on THOMAS.gov and the scope of legislative information on the beta site, see Coverage Dates for Legislative Information.)"


Do lawyers actually use this?
September 18, 2012
New on LLRX - Bluebook Technologies
Via LLRX.com: Bluebook Technologies - The Bluebook is the standard citation guide for legal materials. There are now three format choices for the Bluebook: paper, online subscription (since 2008), and as of August 10, 2012 - iPad app. Law Librarian, author, research instructor and blogger Mary Whisner's guide discusses and illustrates the features and pricing of each.


Al Gore gave us the Internet, what do these clowns offer?
September 19, 2012
Comparing the 2012 Presidential Candidates’ Technology and Innovation Policies
Comparing the 2012 Presidential Candidates’ Technology and Innovation Policies, September 12, 2012. Stephen Ezell, Robert D. Atkinson, Daniel Castro, Matthew Stepp and Richard Bennett. Information Technology & Innovation Foundation
  • "Despite the obligatory acknowledgment of innovation’s central role in U.S. economic growth, the 2012 campaign has not yet seen a serious conversation emerge regarding the policies sorely needed to revitalize U.S. innovation-based economic competitiveness. Moreover, rather than adopt an “all of the above” approach to innovation policy that includes corporate tax and regulatory reform as well as increased federal investment in research and development (R&D), digital infrastructure, and skills, the candidates stress policies from “each column,” with Governor Romney focusing more on the former and President Obama more on the latter. This is unfortunate. For, as we write in the book Innovation Economics: The Race for Global Advantage, U.S. policymakers need to recognize that the United States is engaged in a fierce race for innovation-based economic growth. To win this race, the United States will need to adopt a new, bipartisan Washington Innovation Consensus that places science, technology, innovation, and entrepreneurship at the center of economic policy-making and recognizes that both parties bring good ideas to the table in this regard. This report highlights the candidates' technology and innovation policies with the aim of amplifying the national dialogue around bolstering innovation-based economic growth. The report begins with an overview of each candidate’s general philosophy on technology, innovation, and trade policy, and then compares the candidates’ specific policy positions across 10 policy areas."


Is this the future?
"Students at Ontario College of Art and Design were forced to buy a $180 textbook filled with blank squares. Instead of images of paintings and sculpture throughout history (that presumably would fall under fair-use) the textbook for 'Global Visual and Material Culture: Prehistory to 1800' features placeholders with a link to an online image. A letter from the school's dean stated that had they decided to clear all the images for copyright to print, the book would have cost a whopping $800. The screengrabs are pretty hilarious, or depressing, depending on your point of view."

(Related) Perhaps this is the future...
New School: A Tumblr for Making Your Own Textbooks
… The Hasbroucks are working on a start-up called GinkgoTree, which Scott says "will enable professors to divorce textbooks entirely."
… Ginkgo Tree presents an intuitive, visual interface, not unlike Tumblr's dashboard. For each course and subject, professors can upload links and images, embed video, post comments, and--significantly--import a chunk of scanned pages from print books. All of those resources get bundled into modules and arrayed in a navigable grid.
When all is said and done, the use of Ginkgo Tree will cost professors nothing, says Scott, and cost students far less than they would pay for the typical boatload of textbooks--he estimates between $50-100 total per school term. Through an agreement with Copyright Clearance Center, scanned text costs around $0.15 per page (though it varies by book). So, as Lida points out, even a 100-page excerpt costs a fraction of a textbook's sale price.
Ginkgo Tree is set to launch in two weeks, with the goal of getting a critical mass of professors to adopt the technology for spring semester. "We just want it to be very simple, easy to use, and we're going to start small and build based on user feedback," says Scott, "Basically, it turns making your own textbook into a Tumblr blog."


This sounds like a perfect project to fund via KickStarter! (The Comments point to existing Apps)
"I am a musician/IT guy whose hearing has suffered from VERY LOUD guitar players, (yes I do use earplugs now, but too late), and am faced with the outrageously priced hearing aids $4.5K+/pair and was appalled at their lack of integration with smart phones. It seems obvious to me that I should be able to control the hearing aids via a smart phone interface so I can shape the profile for different environments, and also control features like 'hearing loops' and Bluetooth connections. I have done some research, but my guess is that the hearing aid companies want proprietary systems and don't want a smartphone interface since they would loose control and it would allow for competition for cheaper & better programs. I am not convinced that a combination of good ear-buds, good microphone(s), and a smartphone interface couldn't totally replace these overpriced solutions."


More on the e-University...
Education Site Expands Slate of Universities and Courses
Coursera, a start-up online education company that has enrolled 1.35 million students in its free online courses since it began just five months ago, is now more than doubling, to 33, its partners, universities that will offer classes on its platform. All together, Coursera will provide more than 200 free “massive open online courses,” known as MOOCs.
…  The caliber of Coursera’s partners — Princeton, Stanford and the University of Pennsylvania were among the original partners — has given it credibility and cachet in higher education circles, so much so that some university presidents have begun to fret that it will reflect badly on them if they fail to sign on.
…  A report from Moody’s Investors Service last week predicted that the rise of MOOCs might help leading universities reach more students, bolster their reputation and eventually generate revenue from distributing content or issuing certificates. The report warned, however, that the growing popularity of free online courses could be a problem for small local colleges and for-profit institutions.
…  A revenue stream may not be long in the making. Mr. Mitchell said he could imagine licensing courses, with other colleges paying a fee to use the material, just as they would for a textbook.