Local illogical? Doesn't encrypting my
data create an expectation of privacy? What would they be looking
for on the computer and why would it be there and no where else?
(Some interesting comments follow the article...)
Woman
who pleaded Fifth in password case now citing Fourth
… The 10th Circuit Court
of Appeals in Denver ruled
on Jan. 23 that the Fifth Amendment had nothing to do with the
case and gave Fricosu until Feb.21 to provide the password.
On Tuesday, Fricosu’s lawyer, Philip
Dubois filed a petition to appeal. A ruling should come in
the next 10 days. Dubois, however, did succeed in getting Fricosu’s
password deadline pushed back to Feb. 28.
… “I think it is simply wrong to
force people to assist the government in searching for evidence with
which they intend to use to prosecute that person,” said Dubois.
“I think that is unreasonable. I think it amounts to an
unreasonable search.”
… Fricosu’s case drew interest
from civil rights groups who argued that current law needs to evolve
to meet the nuances of the digital age. The prosecution, however,
argued that hiding behind a password and encrypted data would make
prosecution impossible in the future. [Really?
Impossible? How did you get an indictment? Bob]
… Dubois, who
once defended PGP creator Phil Zimmermann, says he is unsure if
Fricosu can decrypt the hard drive of the laptop police seized from
her home.
For my Ethical Hackers... Better, make
it look like random noise – not a signal at all.
"Ahead of
the anniversary of Iran's revolution, the country's government has
locked down its already-censored Internet, blocking access to many
services and in some cases cutting off all encrypted traffic on the
Web of the kind used by secure email, social networking and banking
sites. In response, the information-freedom-focused Tor Project is
testing a new tool it's calling 'obfsproxy,' or obfuscated proxy,
which aims to
make SSL or TLS traffic appear to be unencrypted traffic like
HTTP or instant messaging data. While the tool currently only
disguises SSL as the SOCKS protocol, in future versions it will aim
to disguise encrypted traffic as any protocol the user chooses. Tor
executive director Andrew Lewman says the idea is to 'make your
Ferrari look like a Toyota by putting an actual Toyota shell over the
Ferrari.'"
Reader bonch adds: "A
thread on Hacker News provides first-hand accounts as well as
workarounds."
It all depends on what your definition
of “is” is...
"In the Stanford Law Review
Online, authors Frankel, Brookover & Satterfield discuss an
ongoing lawsuit against Facebook where plaintiffs claimed the social
network's 'Sponsored Stories,' displaying advertisements on Facebook
including 'the
names and pictures of users who have "Liked" a product,'
violated the law. Facebook responded by asserting that
(1) Plaintiffs
are "public figures" to their friends,
and
(2)
"expressions of consumer opinion" are generally
newsworthy.'
The authors discuss the substantial
impact this case might have on online privacy going forward: 'The
implications are significant and potentially far-reaching. The
notion that every person is famous to his or her "friends"
would effectively convert recognizable figures within any community
or sphere, however small, into individuals whose lives may be fair
game for the ever-expanding (social) media. If courts are willing to
find that nontraditional subjects (such as Facebook users) are public
figures in novel contexts (such as social media websites), First
Amendment and newsworthiness protections likely will become more
vigorous as individual privacy rights weaken. Warren and Brandeis's
model of privacy rights, intended to prevent media attention to all
but the most public figures, will have little application to all but
the most private individuals.'"
Could be an interesting hearing, but I
doubt it. No intelligence gathering body should fail to monitor any
open source. Nor should they stop looking for “weaknesses” or
:”failures” that are reported in the press – terrorists won't.
So what kind of rules can you specify?
A privacy advocacy group has swayed
Congress to hold a hearing next week into the Department of Homeland
Security’s practice of monitoring social networks such as Twitter
and Facebook, as well as media reports and organizations, including
The Drudge Report.
The
Electronic Privacy Information Center (EPIC) recently
obtained close to 300
pages of documents, as a result of a Freedom of
Information Act lawsuit, detailing the federal agency’s
“intelligence gathering” practices on the web.
Among the documents were guidelines
from DHS instructing outside contractors to monitor the web for media
reports and comments that “reflect adversely” on the agency or
the federal government.
… EPIC director Ginger McCall notes
that monitoring what people are saying about government policies goes
too far and has a chilling effect on free speech.
“The Department of Homeland
Security’s monitoring of political dissent has no legal basis and
is contrary to core First Amendment principles,” she said.
… DHS officials have admitted that
monitoring of social networks for negative opinion was undertaken by
the agency, but claim that the operation was a one off test and was
quickly dropped as it did not meet “operational requirements or
privacy standards,” which “expressly prohibit reporting on
individuals’ First Amendment activities.”
… The Congressional hearing, DHS
Monitoring of Social Networking and Media: Enhancing Intelligence
Gathering and Ensuring Privacy, will be held Thursday
February 16th.
However, it is already apparent where
the House subcommittee for intelligence and counter-terrorism stands
on the matter. As
reported by Reuters, the top two members of the
subcommittee, Rep. Patrick Meehan (R-PA) and Rep. Jackie Speier
(D-CA), wrote to DHS Intelligence Chief Caryn Wagner last month,
pressing her to more carefully monitor users’ posts on sites such
as Facebook and Twitter, in order to help detect “current or
emerging threats.”
As we have also previously reported,
The DHS has openly announced that it is actively
monitoring social media for signs of “social unrest”,
in a bid to pre-empt any sign of social dislocation within the United
States.
This is just the tool to add to my
drone. Now I can search neighborhood backyards looking for “gardens
of interest.”
"A new smart camera technology
not
only takes a picture but also assays chemical composition,
allowing photographers to tell whether that hand-rolled cigarette
contains tobacco or marijuana. Designed to speed industrial
inspection systems — such as detecting whether food is spoiled —
the new smart camera includes spectral filters that make images of
corn fields appear differently from hemp. Spectral cameras have been
available for decades, but this microchip version should be cheap
enough for almost any application."
May not work well on bombs that are
triggered by electrical signals...
The
Government Wants To Build An App Store For Real-Life Jack Bauers
The US Department of Defense Explosive
Ordinance Disposal unit is look for a few good coders to help build
apps and an entire app store for bomb technicians and soldiers
involved in ordnance handling.
… The request for proposals is as
dull as dirt (you can read
it here) but the requirements are clear: they’re looking for
apps that will replace paper pocket guides and references used by the
folks that blow up the big badda booms.
Pick one: 1) Make me money 2) Save me
money 3) Get out of my way (Remember, this is still “Invitation
Only!”)
How
Pinterest Is Becoming the Next Big Thing in Social Media for Business
… Pinterest,
an online bulletin board for your favorite images, launched in 2010
and is already experiencing wild growth. The site registered
more than 7 million unique visitors in December, up from 1.6 million
in September. And it's driving more traffic to company websites and
blogs than YouTube, Google+ and LinkedIn combined, according to a
recent
report from Cambridge, Mass.-based content-sharing site
Shareaholic.
… Perhaps the most powerful
business application is the ability to post images of your company's
products on your Pinterest board and link them back to your website.
It works as a sort of virtual store catalog.
… Pinterest already is driving
buyers to some websites. In the last six months, the retail deal site
ideeli.com
has seen a 446 percent increase in web traffic from Pinterest and
sales resulting from those visits have increased five-fold.
Remember, even frequent computer users
don't know everything...
The Secret Technology Club:
If you think that technology power-users have a whole bunch of
“secret” tricks and shortcut, you might be right. We’ve been
immersed in computer-use for decades now, but very few of us have had
much formal training. We learn through trial and error, but it’s
difficult to learn what you don’t know exists! If you suspect
you’ve fallen behind and would like to fill some of those silly
technology gaps, this is for you. This will be a random assortment
of tips and tricks for a variety of programs and web applications.
You can become a member of the “Secret Technology Club” by
learning the secret technology handshakes.
You might be surprised by what you
don’t know. I learn something new every time I prepare for this
presentation.
Here are the slides for The
Secret Technology Club.
No comments:
Post a Comment