For my Computer
Security and Ethical Hacking students. You can see that keeping our
“academic efforts” below a couple of million BPS won't even make
their list.
Digital
Attack Map displays global DDoS activity on any given day
by Sabrina
I. Pacifici on December 25, 2013
“The Digital
Attack Map is a live data visualization of DDoS attacks around
the globe, built through a collaboration between Google
Ideas and Arbor
Networks. The tool surfaces anonymous attack traffic data to let
users explore historic trends and find reports of outages happening
on a given day.”
Another fine nit to
pick. Sic 'em, lawyers!
Orin Kerr discusses an
interesting question and ruling:
A
recent case, United
States v. Young (D. Utah, December 17, 2013) (Campbell, J.),
touches on a novel, interesting, and quite important question of
Fourth Amendment law: Assuming that e-mail account-holders generally
have Fourth Amendment rights in the contents of their e-mails, as
courts have so far held, when does a person’s
Fourth Amendment rights in copies of sent e-mails lose Fourth
Amendment protection?
To
understand the question, consider Fourth Amendment rights in postal
letters. Before a letter is sent, only the sender has rights in the
letter; during transmission, both the sender and recipient have
rights in the letter; and once the letter is delivered at its
destination, the recipient maintains Fourth Amendment rights but the
sender’s rights expires. But how do you apply this to an e-mail?
By analogy, a sender loses Fourth Amendment rights in the copy of the
e-mail that the recipient has downloaded to his personal computer or
cell phone. But does the sender have Fourth Amendment rights in the
copy of the e-mail stored on the recipient’s server after the
recipient has accessed the copy? And does the sender have Fourth
Amendment rights in the copy of the e-mail stored on the recipient’s
server before the recipient has accessed the copy? At what
point does the sender’s Fourth Amendment rights in the sent copy
expire?
Read more on The
Volokh Conspiracy.
Hotels don't have to,
but they can. All that suggests is that hotels could sell the data
to anyone who wanted it. (Police, paparazzi, divorce lawyers)
Perhaps asking police to pay for records would limit the gathering?
Joe Palazzola reports:
While
federal courts in New York and Washington mull
the constitutionality of the National Security Agency’s bulk
collection of phone records, a panel of judges in California has
answered another weighty Fourth Amendment question: Do we have an
expectation of privacy in our hotel guest records?
No,
we do not, the Ninth U.S. Circuit Court of Appeals ruled Tuesday.
But
hotels do have an interest in keeping their records private, and so,
in a gift to privacy advocates, the
appeals court struck down a Los Angeles ordinance that required
operators to produce information about their guests to police
officers, upon request, without a warrant. The information included
a guest’s name and address, the number of people in the party,
vehicle information, arrival and checkout dates, rooms number and
method of payment.
Read more on WSJ.
I’m glad we got
something, but I still detest the third party doctrine that says we
lose our expectation of privacy by turning over our information to a
business. The business has a property
interest/privacy expectation, but we don’t. That needs
to change.
(Related) Not sure I
agree that gathering “suspicious activity reports” is ever a bad
idea. It's what happes after the tip that could be a waste of time.
New
Report: Police Intelligence Gathering Lacks Standards, Threatens
National Security and Civil Liberties
by Sabrina
I. Pacifici on December 25, 2013
“Gaps in
local-federal intelligence sharing systems jeopardize national
security investigations and threaten Americans’ civil liberties,
according to a new Brennan Center report. National
Security and Local Police, the most comprehensive survey of
counterterrorism policing since 9/11, finds that police are operating
without adequate standards and oversight mechanisms, routinely
amassing mountains of data – including personal information about
law-abiding Americans – with little
or no counterterrorism value. The Brennan Center’s
findings are based on dozens of freedom of information requests, in
addition to surveys and interviews with police departments, Joint
Terrorism Task Forces, and data sharing centers nationwide. The
Brennan Center’s new report shows how the lack of consistency and
oversight in local counterterrorism programs directs resources
away from traditional police work, violates individual liberties,
undermines community-police relations, and causes important
counterterrorism information to fall through the cracks. The Boston
Marathon bombing exemplifies how critical information can get lost in
a din of irrelevant data.”
My interest in how
poorly the “Music Industry” (actually music labels) has
incorporated technology is matched by how smart individual bands seem
to be... Note that this makes no money for the music label, only for
the band itself.
How
Iron Maiden found its worst music pirates -- then went and played for
them
… A U.K. company
called Growth
Intelligence aggregates data on U.K. companies to offer them a
real time snapshot of how their company is performing. They capture
everything from real-world data, like hiring of employees, to online
indicators like email to online discussion.
Its stats were compiled
for the London Stock Exchange "1000
Companies That Inspire Britain" list. On that list were six
music firms that outperformed the music sector, one of them being
Iron Maiden LLP, the holding company for the venerable heavy metal
band.
… Enter another
U.K. company called Musicmetric,
which specializes in analytics for the music industry by capturing
everything from social media discussion to traffic on the BitTorrent
network. It then offers this aggregated information to artists to
decide how they want to react. Musicmetric noticed Iron Maiden's
placement and ran its own analytics for the band.
… In the case of
Iron Maiden, still a top-drawing band in the U.S. and Europe after
thirty years, it noted a surge in traffic in South America. Also, it
saw that Brazil, Venezuela, Mexico, Colombia, and Chile were among
the top 10 countries with the most Iron Maiden Twitter followers.
There was also a huge amount of BitTorrent traffic in South America,
particularly in Brazil.
Rather than send in the
lawyers, Maiden sent itself in. The band has focused extensively on
South American tours in recent years, one of which was filmed for the
documentary "Flight 666." After all, fans can't download a
concert or t-shirts. The result was massive sellouts. The São
Paolo show alone grossed £1.58 million (US$2.58 million).
And in a positive
cycle, Maiden's online fanbase grew. According to Musicmetric, in
the 12 months ending May 31, 2012, the band attracted more than 3.1
million social media fans. After its Maiden England world tour,
which ran from June 2012 to October 2013, Maiden's fan base grew by
five million online fans, with a significant increase in popularity
in South America.
A real exercise for my
Computer Security students. If you really want to understand your
“Internet footprint” this will help.
How
To Make Yourself Disappear Online Completely
If you’re looking to
drop from the Webosphere completely in an attempt to remain
anonymous, we can help. The process is arduous
and there are several key steps you’ll need to take along the way.
I need more time!
The
Best Free Education Web Tools Of 2013
… Thankfully, the
folks over at Edublogs have put together this
great List.ly that is filled to the brim with the best education
tools, and the best part is that they’re all free!
No comments:
Post a Comment