Following up on my post on November 5th
about houses on the highway in New Jersey, John Soma found this
article. After all my stories of growing up in New Jersey, I think
he thought someone had simply stolen the house. Not true. Housing
prices are still down. But the contents?
This sounds wrong. This would have
been considered as a possible intelligence gathering action prior to
an attack. It would (should) not have been ignored.
Secret
Service under investigation over loss of sensitive files on Metro
December 7, 2012 by admin
Jana Winter of Fox News reports
that the Secret Service - the agency that is often involved in
investigations of data breaches – had its own breach back in 2008
that is now (finally?) under investigation:
The Secret Service
is the target of an investigation into an “immense breach”
involving the loss of two backup computer tapes left
on a Washington, D.C., Metro train that contained
sensitive personal information about all agency employees, contacts
and overseas informants, according to multiple law enforcement and
congressional sources.
[...]
Sources said the
tapes were lost on the Red Line of the Metro in
2008 by a young, low-level associate of a private
contracting company that had been hired to transport them from Secret
Service’s Investigative Resources Management division at the
agency’s headquarters in the Penn Quarter section of Washington,
D.C., to a secure vault in Olney, Md., where government agencies
store contingency plans, documents and other backup material. The
employee had volunteered to deliver the tapes because he
lived near the location of the vault, but got off at the Glenmont,
Md., Metro stop without the tapes, according to sources.
Sources said the
“personally identifiable information” — or “PII,” in
government-speak — on the tapes includes combinations of the
following: Social Security Numbers; home addresses; information about
family members; phone numbers; dates of birth; medical information;
bank account numbers; employment information; driver’s license
numbers; passport numbers; and any biometric information on file with
the Secret Service.
Did the Secret Service handle this
breach properly or did it fail to provide adequate disclosure and
notice to those affected? It depends on whom you ask, as Fox
reports, and hopefully the investigation by Department of Homeland
Security Office of Inspector General will get to the bottom of this
one.
Disturbingly, this breach might never
had been made public were it not for the recent Secret Service
scandal involving the conduct of agents. It was that investigation
that led to the investigation of this other matter as part of looking
into the culture of the Secret Service.
Not shocking to those of us who have
been following this topic. I'll have to ask my students to get a
more balanced perspective.
Which
Websites Are Sharing Your Personal Details?
December 7, 2012 by Dissent
For an article coming out Saturday, the
Wall Street Journal tested 71 popular websites that request a login
and found that more than a quarter of the time, the sites passed
along a user’s real name, email address or other personal details,
such as username, to third-party companies.
Read more on The
Wall Street Journal.
[Don't miss the
graphics:
Send in the drones! Any limitation on
drones is likely to impact many groups. Not only manufacturers, but
consider airspace limit impact on helicopters...
Aviation
Industry to FAA: “Ignore Privacy”
December 7, 2012 by Dissent
From EPIC.org:
Aviation groups
have asked
the Federal Aviation Administration to ignore the privacy
implications of increased drone use in the United States. The letter
follows the FAA
statement that domestic drones “raises privacy issues [that]
will need to be addressed.” Earlier this year, EPIC warned
Congress, “there are substantial legal and constitutional
issues involved in the deployment of aerial drones by federal
agencies.” EPIC, joined by over 100 organizations, experts, and
members of the public, has petitioned
the FAA to to establish privacy safeguards. For more information,
see EPIC: Unmanned Aerial
Vehicles (UAVs) and Drones
And no, EPIC isn’t exaggerating. The
letter says, in part:
It is our belief
that for FAA to succeed, the agency must remain focused on safety
rather than privacy issues, where the FAA has no statutory standing
or technical expertise.
And if the FAA were foolishly thinking
of restricting air space because of privacy-related or other
concerns, the industry says fergeddaboutit: [How can
you misspell a simple New Jersey word like “Fuhgeddaboudit?”
Bob]
Additionally, as a
goal the FAA should ensure that the introduction of UAS into the NAS
not limit access to airspace or require modifications to the existing
fleet of aircraft flying in the NAS beyond what is already currently
anticipated to accommodate NextGen. The importance of airspace
access cannot be overstated and FAA must aggressively protect its
preeminent role as manager of the national airspace system.
I might work this into a Compouter
Security or Homeland Security class...
Warrantless
Surveillance 101: Introducing EFF’s New NSA Domestic Spying Guide
December 7, 2012 by Dissent
Mark M. Jaycox and Trevor Timm write:
On December 14th,
EFF is back in federal court challenging the NSA’s domestic spying
program in our long-running case Jewel
v. NSA. In anticipation of our court appearance, we’ve
launched a new section of our website to give everyone a clear
understanding how the NSA warrantless wiretapping program works and
why we’re challenging it as unconstitutional.
While the
government claims the NSA’s infamous program is too secret to be
litigated, it isn’t a secret—and we’ve catalogued the trove of
information that has become public since it was first revealed by the
New York Times in 2005. This including declarations under
oath by an AT&T whistleblower and three NSA whistleblowers, sworn
testimony before Congress, investigations by government Inspectors
General and stories by major media organizations based on highly
placed sources, along with public admissions by government officials.
You can now view
our NSA
domestic spying timeline, an explanation
of how the NSA conducts the spying, a history of the controversial
‘state
secrets’ privilege (which the government is invoking in an
attempt to have our lawsuit dismissed), and a breakdown of how the
government uses word
games when talking about the program to hide what they’re
doing.
Read more on EFF.
...and I'll need to check back every
few months.
Deep
Dive: ECPA and the Future of Electronic Privacy
December 7, 2012 by Dissent
From EFF:
In most issues
of EFFector, we give an overview of all the work we’re doing at EFF
right now. Today, we’re trying something new: doing a deep dive
into a single issue. If our readers find this valuable, we’ll try
to give you an EFFector Deep Dive every few months.
Yesterday was a
watershed moment in the fight for electronic privacy: the Senate
Judiciary Committee overwhelmingly passed an amendment that mandates
the government get a probable cause warrant before reading our
emails. The battle isn’t over — the reform, championed by
Senator Patrick Leahy (D-VT), still needs to pass the rest of the
Senate and the House, and be signed by the President to become a law.
But yesterday, thanks to thousands of people speaking out, we were
able to begin the process of overhauling our archaic privacy laws
into alignment with modern technology.
It was a big win
for us, even if it was only the first step in the process of
reforming privacy law to keep the government out of our inboxes. So
we’re dedicating this EFFector to the battle to reform outdated
privacy law: what the government can get, what the law ought to be,
and what we’re doing to fix the gaping loopholes that leave users
vulnerable to government snooping.
The Fourth
Amendment and Electronic Privacy
The Fourth
Amendment protects us from unreasonable government searches and
seizures. In practical terms, this means that law enforcement has to
get a warrant — demonstrating to a judge that it has probable cause
to believe it will find evidence of a crime — in order to search a
place or seize an item. In deciding whether the Fourth Amendment
applies, courts always look to see whether people have both a
subjective expectation of privacy in the place to be searched, and
whether society would recognize that expectation of privacy as
reasonable. The Supreme Court made this point clear in a landmark
1967 case, Katz v. United States, when it ruled that a warrantless
wiretap of a public payphone violated the Fourth Amendment.
The Third
Party Doctrine, or How the Supreme Court Got Us Into This Mess
In 1979, the
Supreme Court created a crack in our Fourth Amendment protections.
In Smith v. Maryland, the Court ruled that the Fourth Amendment
didn’t protect the privacy of the numbers we dialed on our phones
because we had voluntarily shared those numbers with the phone
company when we dialed them. This principle — known as the Third
Party Doctrine — basically suggests that when we share data with a
communications service provider like a telephone company or an email
provider, we know our data is being handed to someone else and so we
can’t reasonably expect it to be private anymore.
The government
took this small opening created by Smith v. Maryland and blew it wide
open. It argued that this narrow 1979 decision about phone dialing
applied to the vast amount of data we now share with online service
providers — everything from email to cell phone location records to
social media. This is bogus and dangerous. When we hand an email
message to Gmail to deliver on our behalf, we do so with an intention
that our private communications will be respected and kept in strict
confidence, and that no human being or computer will review the
message other than the intended recipient. But the government argues
that because we handed our communications to a service provider, the
Fourth Amendment doesn’t require them to get a warrant before
snooping around our inbox.
Luckily, the
courts are beginning to agree with us. In a leading case where EFF
participated as amicus, United
States v. Warshak, the Sixth Circuit Court of Appeals agreed with
us that people had a reasonable expectation of privacy in their
email, even if it is stored with a service provider, and therefore
the government needed a search warrant to access it. And in the
recent Supreme Court case, United
States v. Jones, Justice Sotomayor said that she thought the
Third Party Doctrine was outdated, while she and four other Justices
— including Justice Alito — raised concerns about the information
gathered by our cellphones.
Read more on EFF.
It's like yelling “Failure” in a
crowded Internet? Will courts have to stay current on the impact of
each technology?
Yelp
Reviewer Gets SLAPPed With 750K Lawsuit And Order To Alter Comments
A woman is facing a $750,000 defamation
lawsuit and has
been ordered to alter a negative Yelp review of a home contractor
after police found that her claims didn’t add up.
Dietz Development is claiming that Jane
Perez’s scathing review has cost them new customers and, on
Wednesday, a judge ordered a preliminary injunction for her to edit
the post. Yelp and legal critics are worried that Strategic
Lawsuits Against Public Participation (SLAPP)-related lawsuits
could chill free speech, but business owners say that legal
intervention is necessary in an age when online reviews can make
or break a company. As the Internet gives the
average citizen a greater voice, courts appear to be willing to hold
their exercise of free speech to higher standards.
… Yelp itself is protected by
section 230 of the Communications Decency Act and cannot be held
liable for any inane, slanderous, or downright mean things people say
on the site.
Yet, all that could change as recent
large-scale research finds that Yelp reviews can
significantly impact businesses: A meager half-star
increase on Yelp’s 5-star rating makes it 30 to 49 percent more
likely that restaurants will sell out their evening seats.
For my Statistics (and Contingency
Planning) students. Is the “Normal Curve” moving, flatening, or
in need of replacement? What will be the impact on the Insurance
industry?
2/3
of Sandy-Damaged Homes in N.Y. Were Outside the 100-Year Flood Zone
… Today, the Wall Street Journal
reports that fully two-thirds of the houses damaged by Sandy were
outside
the 100-year flood zone. As their headline put it, "Sandy
Alters 'Reality."
Which is a fascinating way to look at
it: reality, for some intents and purposes, is a bureaucratic fiction
based on the way things were, institutional necessity, and accepted
statistical practices. That reality influences housing prices,
guides maintenance spending, and sets the boundaries for emergency
planning.
Freebies for my students.
BitDefender launched a new weapon for
fighting viruses and malware on Wednesday with the release of their
60-second virus scanner for PCs. The software which comes in the
form of a tiny 160KB Windows executable aims to scan your Windows
machine for problems in record time while providing real-time cloud
protection and alerts. According to the company the software can be
run alongside users’ existing anti-virus software for added
security.
… Download BitDefender 60-Second
Scanner @ BitDefender.com
Ditto Also for my website students,
since it can be integrated to fill fields on web pages... Chrome
only, so far.
Online Dictation is a free to use web
tool that converts your speech into text. All you have to do is
visit the site and click on the microphone icon on the homepage, next
to the page’s title. Next you speak a sentence into your
microphone; the speech is processed, converted to text, and
displayed. Any errors can be manually removed by clicking on the
text and making it editable. You can also copy the text and use it
somewhere else by pasting it.
- Also read related article: How
To Dictate Writing On Your Mac: Apple’s Dictation vs
DragonDictate.
No comments:
Post a Comment