Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

Records Reveal Extensive Monitoring of E-ZPass Tags Throughout NY

ACLU – “New documents obtained by the New York Civil Liberties Union reveal that wireless E-ZPass tollbooth transponders are being read routinely throughout New York City to systematically collect location data about drivers. At the NYCLU, we were surprised when we first heard this might be happening. In late 2013, NYCLU staff went on a car ride with a privacy activist who designed a cow-shaped device that mooed every time it detected signals on the same frequency that E-ZPass readers use. We listened as the cow mooed its way through Midtown and Lower Manhattan — though we weren’t at any toll plazas, something was reading the E-ZPass tag in our car. This prompted us to file New York Freedom of Information Law (FOIL) requests to find out why E-ZPass readers had been installed far from any toll booths for some purpose unrelated to their intended use, and what privacy protections, if any, were in place. Earlier this week, the NYCLU released the result of that investigation (part of a new webpage that hosts records obtained through FOIL requests on how government agencies are collect information on New Yorkers). The systematic placement of the E-Zpass readers can be clearly seen in these maps.”

TIME – Here’s how to find your search history and delete it

Victor Luckerson: “Some of your deepest, darkest secrets have probably passed through the Google search bar. Now, you can download every last query you’ve ever typed into the search engine and see them all together in their raw glory (or shame). The feature was first rolled out as an experiment last year but is nowContinue Reading

The Spy in the Sandbox – Practical Cache Attacks in Javascript

The Spy in the Sandbox — Practical Cache Attacks in Javascript. Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis (Submitted on 25 Feb 2015 (v1), last revised 1 Mar 2015 (this version, v2)) “We present the first micro-architectural side-channel attack which runs entirely in the browser. In contrast to other works in thisContinue Reading

NGOs Urge European Commission to Uphold Privacy

“EPIC has joined a coalition of over sixty NGOs from around the world in a letter to President Juncker of the European Commission, urging him to uphold robust data protection standards. The institutions of the European Union are currently negotiating the new General Data Protection Regulation. The European Commission previously promised that the Data ProtectionContinue Reading

DHS Data Framework – Interim Process to Address Emergent Threat

Privacy Impact Assessment for the DHS Data Framework – Interim Process to Address an Emergent Threat. DHS/ALL/PIA-051 April 15 , 2015. “The Department of Homeland Security (DHS) is publishing this Privacy Impact Assessment (PIA) to explain its plan to expedite DHS’s ability to meet a critical mission need through the use of an interim manualContinue Reading

NIST Seeks Comments on De-identification Report

EPIC – “The National Institute of Standards and Technology has released a draft report on “De-Identification of Personally Identifiable Information.” The agency is requesting comments by May 15. The NIST report reviews de-identification techniques and research, including work by EPIC Advisory Board members Cynthia Dwork and Latanya Sweeney. Last year, in response to a similarContinue Reading

Toward a Social Compact for Digital Privacy and Security

Global Commission on Internet Governance -“The Global Commission on Internet Governance (GCIG) was established in January 2014 to articulate and advance a strategic vision for the future of Internet governance. In recent deliberations, the Commission discussed the potential for a damaging erosion of trust in the absence of a broad social agreement on norms forContinue Reading

House Reconsiders Data Breach Bill

EPIC – “Members of the Energy and Commerce Committee have convened to rework the Data Security and Breach Notification Act. The Act, introduced by Reps. Blackburn and Welch, would require businesses to notify consumers of a data breach “unless there is no reasonable risk of identity theft or financial harm.” The bill would also preemptContinue Reading

DHS Privacy Office FOIA Report March 2015

Department of Homeland Security Privacy Office 2015 Chief Freedom of Information Act Officer Report to the Attorney General of the United States March 2015. “The Report summarizes the Department’s accomplishments in achieving its strategic goals related to transparency, openness, and implementing FOIA from March 2014 through March 2015…a word about the backlog: As has beenContinue Reading

Verizon 2015 Data Breach Investigations Report

“Verizon’s “2015 Data Breach Investigations Report,” released today, reveals that cyberattacks are becoming increasingly sophisticated, but that many criminals still rely on decades-old techniques such as phishing and hacking. According to this year’s report, the bulk of the cyberattacks (70 percent) use a combination of these techniques and involve a secondary victim, adding complexity toContinue Reading

Report – Metadata collection of Americans’ international calls began in 1992

Brad Health – USAToday: “The U.S. government started keeping secret records of Americans’ international telephone calls nearly a decade before the Sept. 11 terrorist attacks, harvesting billions of calls in a program that provided a blueprint for the far broader National Security Agency surveillance that followed. For more than two decades, the Justice Department andContinue Reading

A critical analysis of Facebook’s Revised Policies and Terms

From social media service to advertising network – A critical analysis of Facebook’s Revised Policies and Terms DRAFT 31 March 2015. The authors are part of the Interdisciplinary Centre for Law and ICT/Centre for Intellectual Property Rights(ICRI/CIR) of KU Leuven (www.icri.be), the department of Studies on Media, Information and Telecommunication (SMIT) of the Vrije UniversiteitContinue Reading