How now, Darth Drone?
Army
Works to Ensure Homemade Bombs Don’t Escape the Gaze of ‘Vader’
Three years ago, the U.S. military
began testing a new drone-mounted sensor designed to auto-spot and
track people from 25,000 feet, perfect for
searching out insurgents planting improvised bombs in Afghanistan.
It gave the sensor the most ominous of names: Vader. And now it looks
like the Army has Vader poised to strike.
… It’s unclear if Vader has
actually made his way to Afghanistan: The Army didn’t return
Danger Room’s inquiry by deadline.
… It’s also interesting that the
Army wants three years of maintenance and support for a man-hunting
sensor explicitly designed for Afghanistan. If the sensor really is
operating in Afghanistan right now, while the Army is looking at
extending support for it, that’s not surprising. The Army is
relying on its drones and their sensors — and weapons — more and
more. The U.S. hit a record
447 drone strikes in 2012, even as the total number of air
strikes declined.
(Related) “Common Civilians”
Clearly that doesn't include us “Second Class” citizens.
Alameda
County Sheriff promises no use of aerial drones for surveillance on
common civilians
December 7, 2012 by Dissent
Associated Press reports:
A Northern
California sheriff has vowed that his department won’t use an
aerial drone to spy on ordinary people, but civil liberties groups
say there still needs to be some guidelines to ensure privacy.
Alameda County
Sheriff Greg Ahern said Tuesday that a drone his department is
pursuing would be used for search and rescue missions, responding to
wildfires and to capture fugitives, not for surveillance and
intelligence gathering on civilians.
Read more on The
Republic.
Sure, sure. How long before the
mission creep starts?
(Related) I don't call them endangeres
species, I call them “targets” – Oh, wait, you're not talking
about al-Qaeda?
Warfare isn’t the only use for drones
these days. It turns out that Google is giving the World Wildlife
Fund $5 million to put drones in the sky to watch over endangered
species in Africa and Asia, mostly to save them from poachers. Plus,
the money will also cover software that will be able to map out where
poachers strike most.
The latest flap, disinformation style?
"The European Commission has
proposed a "right to be forgotten" online, which would
allow users to remove personal data they had shared. The idea has
had a lot of criticism, and now Facebook
claims it would actually harm privacy. Facebook says the
proposal would require social media sites to perform extra tracking
to remove data which has been copied to other sites — but privacy
advocates say Facebook has misunderstood what the proposal is all
about."
I drive a car so old it still has the
hitch for the horses. Maybe I'll keep it a while longer.
Concerns
over privacy as NHTSA prepares to push for black boxes in cars
December 7, 2012 by Dissent
It’s a topic I’ve covered here
before, but worth noting again. Associated Press reports:
Many
motorists don’t know it, but it’s likely that every
time they get behind the wheel, there’s a snitch along for the
ride.
In the next few
days, the National Highway Traffic Safety Administration is expected
to propose long-delayed regulations requiring auto manufacturers to
include event data recorders — better known as “black boxes” —
in all new cars and light trucks. But the agency is
behind the curve. [Nothing new there... Bob] Automakers
have been quietly tucking the devices, which automatically record the
actions of drivers and the responses of their vehicles in a
continuous information loop, into most new cars for years.
Read more on Fox
News.
As an Auditor, releasing the questions
we would ask is familiar ground. Would a US version be very
different?
AU:
OAIC releases guide to protect personal information
December 7, 2012 by Dissent
Michael Lee reports:
The Office of the
Australian Information Commissioner (OAIC) has released a draft of
its guide to secure personal information.
Titled “Guide
to Information Security: ‘Reasonable steps’ to protect personal
information,” the consultation draft attempts to outlines what
organisations should consider when moving to protect the personal
information they are responsible for under the Privacy Act.
Read more on ZDNet.
[From the guide:
The OAIC has also published a Data
breach notification guide, which outlines steps that entities
should consider in preparing for and responding to information
security breaches, including notifying affected individuals.
Another guide, but a different intended
audience? My Criminal Justice majors will find this amusing...
Interesting, but it could be much more detailed...
December 06, 2012
ProPublica
Guide to Warrantless Access to Digital Data
"The U.S. government isn’t
allowed to wiretap American citizens without a warrant from a judge.
But there are plenty of legal ways for law enforcement, from the
local sheriff to the FBI, to snoop on the digital trails you create
every day. Authorities can often obtain your emails and texts by
going to Google or AT&T with a simple subpoena. Usually you
won’t even be notified. The Senate last week took
a step toward updating privacy protection for emails, but it's
likely the issue will be kicked to the next Congress. Meantime,
here’s
how police can track you without a warrant now..."
Someone is keeping score...
By Dissent,
December 6, 2012 11:45 am
The Third
Annual Benchmark Study on Patient Privacy & Data Security by
Ponemon Institute, sponsored by ID
Experts® was released today. Their findings are what we would
expect, i.e., fairly discouraging, with entities reporting even more
multiple breaches than previously. From their executive summary:
… healthcare
organizations face an uphill battle in their efforts to stop data
breaches. Ninety-four percent of healthcare
organizations surveyed suffered at least one data breach;
45 percent of organizations experienced more than five data breaches
during the past two years. Data breaches are an ongoing operational
risk that could be costing the U.S. healthcare industry an average of
$7 billion annually. A new finding indicates that 69
percent of organizations surveyed do not secure medical devices—such
as mammogram imaging and insulin pumps—which hold patients’
protected health information (PHI). Overall, the research indicates
that patients and their PHI are at increased risk for medical
identity theft. Risks to patient privacy are expected to increase,
as mobile and cloud technology become pervasive.
For the 80 organizations that
participated in the survey, the results indicated that the top three
causes for a data breach were lost or stolen computing devices,
employee mistakes and third-party snafus:
Insider
negligence continues to be at the root of the data breach.
The primary cause of breaches in this study is a lost or
stolen computing device (46 percent), which can be attributed in many
cases to employee carelessness. This is followed by employee
mistakes or unintentional actions (42 percent), and third-party
snafus (42 percent). A major challenge for IT security is the
increase in criminal attacks, which has seen an increase from 20
percent in 2010 to 33 percent this year.
Malicious
insider breaches, which have been an increasing
concern of mine, accounted for 14% of the breaches, a number that is
comparable to their figures for 2011 and 2010 but is significantly
lower than the 23% figure reported by HITRUST based on analysis of
breaches in HHS’s breach tool for the past few years.
I really need to find some time to sit
down with multiple reports and studies and see where they agree and
where they don’t.
For my Ethical Hackers...
Tor
and the Deepnet: What price does society pay for anonymity?
December 7, 2012 by Dissent
Julian Bhardwaj writes:
There is a lot
more to the web than that which immediately meets the eye.
In fact, the
“visible” layer of the web that you and I can easily access via
popular search engines is only part of the story.
Hidden on the net
is online content which is not so easily accessed, known as the
Deepnet (also sometimes called Darknet, the Deep Web or Hidden Web).
Whilst a lot of
this content consists merely of websites not indexed by search
engines and only accessed by a handful of people, some parts of it
are hidden a lot deeper.
Read more on Naked
Security.
[From the article:
Deepnet pages such as "The Hidden
Wiki" provide listings of these URLs to facilitate use of the
Deepnet.
This is interesting. Can you always
predict what information investors will find useful?
… The SEC sent Reed Hastings a
Wells notice. A Wells notice is something the SEC sends to give a
company notification that it’s likely to bring some sort of action
against the firm.
The hubbub stems from a Facebook post
that Hastings made in July when he posted the Netflix users had
streamed 1 billion hours of content in June for the first time ever.
Not only was that an interesting milestone for the company, but it
was big news for shareholders and Netflix’s stock price jumped 6%
after the post.
The SEC believes that the number of
streaming hours was material information that should have been more
formally announced. Hastings has 200,000 subscribers to his Facebook
page and says that since he told all 200,000 people, it was a formal
announcement and a press release wasn’t required. Hastings also
notes that the company had already disclosed in investor letters that
it was closing in on 1 billion hours of streaming so the Facebook
post wasn’t news.
Potential for significant misuse of
theachnology. “OMG Just drove by accident Send ambu...” Signal
Lost
FCC
fast tracks text-to-911 service
No comments:
Post a Comment