From the New Yorker, a bit of history
that it seems we are doomed to repeat?
Read more on Jill Lepore’s article in
The
New Yorker.
So between 22 and 28 per day.
Apple has joined Google, Microsoft, and
Facebook in saying it has obtained permission to disclose a bit more
about requests it receives. In a statement
issued yesterday, they write:
Two weeks ago,
when technology companies were accused of indiscriminately sharing
customer data with government agencies, Apple issued a clear
response: We first heard of the government’s “Prism” program
when news organizations asked us about it on June 6. We do not
provide any government agency with direct access to our servers, and
any government agency requesting customer content must get a court
order.
… From
December 1, 2012 to May 31, 2013, Apple received between 4,000 and
5,000 requests from U.S. law enforcement for customer data. Between
9,000 and 10,000 accounts or devices were specified in those
requests, which came from federal, state and local authorities and
included both criminal investigations and national security matters.
The most common form of request comes from police investigating
robberies and other crimes, searching for missing children, trying to
locate a patient with Alzheimer’s disease, or hoping to prevent a
suicide.
… There are
certain categories of information which we do not provide to law
enforcement or any other group because we choose not to retain it.
For example,
conversations which take place over iMessage and FaceTime are
protected by end-to-end encryption so no one but the sender and
receiver can see or read them. Apple cannot decrypt that data.
But lumping national security requests
in with other requests to provide an aggregate number is really not
useful to us in understanding how often government is requesting
customer information under surveillance programs, as both
Google and Twitter pointed out this weekend.
What would the
government do if all of the companies got together and informed the
government that dammit, they’re all gonna disclose the real numbers
and that’s it? Businesses need government, but
government also needs businesses. What would they do?
For my Computer Security students A
high level overview, but better than nothing.
Army
Releases Cybersecurity Handbook to Public
News
release: “The Army published a new handbook this month to
provide leaders of all levels with the information and tools needed
to address today’s cybersecurity challenges, and to ensure
organizations adopt the necessary practices to protect their
information and the Army network. Currently, all Army commands are
developing Information Assurance/Cybersecurity awareness training to
address areas of weakness identified by the Army Information
Assurance Self-Assessment Tool. During the Army Cybersecurity
Awareness Week, Oct. 15-18, 2013commanders will train personnel based
on command plans and highlight the importance of individual
responsibilities.”
This Handbook is
designed to provide leaders the information and tools to address
today’s complex security challenges. It is also a quick reference
for managing Cybersecurity issues that will help ensure that
Soldiers, Civilians and contractors know their responsibilities for
daily practices that will protect information and our IT
capabilities.
Unfortunately, this will be useful for
my Math students.
If you, or someone in your family is
working on their multiplication tables, Tables Test is a great
website for practicing.
The website turns practicing into a
game. It comes with five levels, and it keeps score based on the
amount of correct answers you are able to give.
Summer. Time to forget school and
learn something.
… Most
of these courses offer “certificates” or “statements of
completion,” though typically not
university credit.
(See the key below to understand the credentials offered by each
course.)
No comments:
Post a Comment