Saturday, February 11, 2012


Local illogical? Doesn't encrypting my data create an expectation of privacy? What would they be looking for on the computer and why would it be there and no where else? (Some interesting comments follow the article...)
Woman who pleaded Fifth in password case now citing Fourth
… The 10th Circuit Court of Appeals in Denver ruled on Jan. 23 that the Fifth Amendment had nothing to do with the case and gave Fricosu until Feb.21 to provide the password.
On Tuesday, Fricosu’s lawyer, Philip Dubois filed a petition to appeal. A ruling should come in the next 10 days. Dubois, however, did succeed in getting Fricosu’s password deadline pushed back to Feb. 28.
… “I think it is simply wrong to force people to assist the government in searching for evidence with which they intend to use to prosecute that person,” said Dubois. “I think that is unreasonable. I think it amounts to an unreasonable search.”
… Fricosu’s case drew interest from civil rights groups who argued that current law needs to evolve to meet the nuances of the digital age. The prosecution, however, argued that hiding behind a password and encrypted data would make prosecution impossible in the future. [Really? Impossible? How did you get an indictment? Bob]
… Dubois, who once defended PGP creator Phil Zimmermann, says he is unsure if Fricosu can decrypt the hard drive of the laptop police seized from her home.


For my Ethical Hackers... Better, make it look like random noise – not a signal at all.
"Ahead of the anniversary of Iran's revolution, the country's government has locked down its already-censored Internet, blocking access to many services and in some cases cutting off all encrypted traffic on the Web of the kind used by secure email, social networking and banking sites. In response, the information-freedom-focused Tor Project is testing a new tool it's calling 'obfsproxy,' or obfuscated proxy, which aims to make SSL or TLS traffic appear to be unencrypted traffic like HTTP or instant messaging data. While the tool currently only disguises SSL as the SOCKS protocol, in future versions it will aim to disguise encrypted traffic as any protocol the user chooses. Tor executive director Andrew Lewman says the idea is to 'make your Ferrari look like a Toyota by putting an actual Toyota shell over the Ferrari.'"
Reader bonch adds: "A thread on Hacker News provides first-hand accounts as well as workarounds."


It all depends on what your definition of “is” is...
"In the Stanford Law Review Online, authors Frankel, Brookover & Satterfield discuss an ongoing lawsuit against Facebook where plaintiffs claimed the social network's 'Sponsored Stories,' displaying advertisements on Facebook including 'the names and pictures of users who have "Liked" a product,' violated the law. Facebook responded by asserting that
(1) Plaintiffs are "public figures" to their friends, and
(2) "expressions of consumer opinion" are generally newsworthy.'
The authors discuss the substantial impact this case might have on online privacy going forward: 'The implications are significant and potentially far-reaching. The notion that every person is famous to his or her "friends" would effectively convert recognizable figures within any community or sphere, however small, into individuals whose lives may be fair game for the ever-expanding (social) media. If courts are willing to find that nontraditional subjects (such as Facebook users) are public figures in novel contexts (such as social media websites), First Amendment and newsworthiness protections likely will become more vigorous as individual privacy rights weaken. Warren and Brandeis's model of privacy rights, intended to prevent media attention to all but the most public figures, will have little application to all but the most private individuals.'"


Could be an interesting hearing, but I doubt it. No intelligence gathering body should fail to monitor any open source. Nor should they stop looking for “weaknesses” or :”failures” that are reported in the press – terrorists won't. So what kind of rules can you specify?
A privacy advocacy group has swayed Congress to hold a hearing next week into the Department of Homeland Security’s practice of monitoring social networks such as Twitter and Facebook, as well as media reports and organizations, including The Drudge Report.
The Electronic Privacy Information Center (EPIC) recently obtained close to 300 pages of documents, as a result of a Freedom of Information Act lawsuit, detailing the federal agency’s “intelligence gathering” practices on the web.
Among the documents were guidelines from DHS instructing outside contractors to monitor the web for media reports and comments that “reflect adversely” on the agency or the federal government.
… EPIC director Ginger McCall notes that monitoring what people are saying about government policies goes too far and has a chilling effect on free speech.
“The Department of Homeland Security’s monitoring of political dissent has no legal basis and is contrary to core First Amendment principles,” she said.
… DHS officials have admitted that monitoring of social networks for negative opinion was undertaken by the agency, but claim that the operation was a one off test and was quickly dropped as it did not meet “operational requirements or privacy standards,” which “expressly prohibit reporting on individuals’ First Amendment activities.”
… The Congressional hearing, DHS Monitoring of Social Networking and Media: Enhancing Intelligence Gathering and Ensuring Privacy, will be held Thursday February 16th.
However, it is already apparent where the House subcommittee for intelligence and counter-terrorism stands on the matter. As reported by Reuters, the top two members of the subcommittee, Rep. Patrick Meehan (R-PA) and Rep. Jackie Speier (D-CA), wrote to DHS Intelligence Chief Caryn Wagner last month, pressing her to more carefully monitor users’ posts on sites such as Facebook and Twitter, in order to help detect “current or emerging threats.”
As we have also previously reported, The DHS has openly announced that it is actively monitoring social media for signs of “social unrest”, in a bid to pre-empt any sign of social dislocation within the United States.


This is just the tool to add to my drone. Now I can search neighborhood backyards looking for “gardens of interest.”
"A new smart camera technology not only takes a picture but also assays chemical composition, allowing photographers to tell whether that hand-rolled cigarette contains tobacco or marijuana. Designed to speed industrial inspection systems — such as detecting whether food is spoiled — the new smart camera includes spectral filters that make images of corn fields appear differently from hemp. Spectral cameras have been available for decades, but this microchip version should be cheap enough for almost any application."


May not work well on bombs that are triggered by electrical signals...
The Government Wants To Build An App Store For Real-Life Jack Bauers
The US Department of Defense Explosive Ordinance Disposal unit is look for a few good coders to help build apps and an entire app store for bomb technicians and soldiers involved in ordnance handling.
… The request for proposals is as dull as dirt (you can read it here) but the requirements are clear: they’re looking for apps that will replace paper pocket guides and references used by the folks that blow up the big badda booms.


Pick one: 1) Make me money 2) Save me money 3) Get out of my way (Remember, this is still “Invitation Only!”)
How Pinterest Is Becoming the Next Big Thing in Social Media for Business
Pinterest, an online bulletin board for your favorite images, launched in 2010 and is already experiencing wild growth. The site registered more than 7 million unique visitors in December, up from 1.6 million in September. And it's driving more traffic to company websites and blogs than YouTube, Google+ and LinkedIn combined, according to a recent report from Cambridge, Mass.-based content-sharing site Shareaholic.
… Perhaps the most powerful business application is the ability to post images of your company's products on your Pinterest board and link them back to your website. It works as a sort of virtual store catalog.
… Pinterest already is driving buyers to some websites. In the last six months, the retail deal site ideeli.com has seen a 446 percent increase in web traffic from Pinterest and sales resulting from those visits have increased five-fold.


Remember, even frequent computer users don't know everything...
The Secret Technology Club: If you think that technology power-users have a whole bunch of “secret” tricks and shortcut, you might be right. We’ve been immersed in computer-use for decades now, but very few of us have had much formal training. We learn through trial and error, but it’s difficult to learn what you don’t know exists! If you suspect you’ve fallen behind and would like to fill some of those silly technology gaps, this is for you. This will be a random assortment of tips and tricks for a variety of programs and web applications. You can become a member of the “Secret Technology Club” by learning the secret technology handshakes.
You might be surprised by what you don’t know. I learn something new every time I prepare for this presentation.
Here are the slides for The Secret Technology Club.

No comments: