Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

GAO Reports – Adaptive Sports, DOD Financial Management, Medicare, Food Assistance, Biosurveillance, Public Transit

  • Adaptive Sports Grant Program: VA Has Taken Steps toward Better Grantee Selection and Oversight, but Additional Actions Needed, GAO-15-791: Published: Sep 28, 2015. Publicly Released: Sep 28, 2015.
  • DOD Financial Management: Continued Actions Needed to Address Congressional Committee Panel Recommendations, GAO-15-463: Published: Sep 28, 2015. Publicly Released: Sep 28, 2015.
  • Drug Compounding for Animals: FDA Could Improve Oversight with Better Information and Guidance, GAO-15-671: Published: Sep 28, 2015. Publicly Released: Sep 28, 2015.
  • Medicare Advantage: Actions Needed to Enhance CMS Oversight of Provider Network Adequacy, GAO-15-710: Published: Aug 31, 2015. Publicly Released: Sep 28, 2015.
  • International Food Assistance: Cargo Preference Increases Food Aid Shipping Costs, and Benefits Are Unclear, GAO-15-666: Published: Aug 26, 2015. Publicly Released: Sep 25, 2015.
  • Biosurveillance: Challenges and Options for the National Biosurveillance Integration Center, GAO-15-793: Published: Sep 24, 2015. Publicly Released: Sep 24, 2015.
  • Defense Cybersecurity: Opportunities Exist for DOD to Share Cybersecurity Resources with Small Businesses, GAO-15-777: Published: Sep 24, 2015. Publicly Released: Sep 24, 2015.
  • Public Transit: Updated Guidance and Expanded Federal Authority Could Facilitate Bus Procurement, GAO-15-676: Published: Sep 10, 2015. Publicly Released: Sep 24, 2015.

UK surveillance program collected billions of records from persons in multiple countries

Ryan Gallagher, The Intercept: “…The mass surveillance operation — code-named KARMA POLICE — was launched by British spies about seven years ago without any public debate or scrutiny. It was just one part of a giant global Internet spying apparatus built by the United Kingdom’s electronic eavesdropping agency, Government Communications Headquarters, or GCHQ…The surveillance is underpinned byContinue Reading

HHS OIG Audit of MIDAS – central system managing citizen health care insurance data

Public Summary Report: The Centers for Medicare & Medicaid Services’ Implementation of Security Controls Over the Multidimensional Insurance Data Analytics System Needs Improvement (A-06-14-00067). September 21, 2015. “This summary report provides an overview of the results of the Office of Inspector General’s (OIG) review of the Multidimensional Insurance Data Analytics System (MIDAS). It does notContinue Reading

Creating a 21st-Century Medical Device Surveillance System

“The Food and Drug Administration has scheduled a hearing in response to public concerns about Essure, a nonsurgical, permanent female sterilization device. Since FDA approved the product in 2002, the agency has received reports on 5,093 adverse events, including six deaths. The hearing coincides with a landmark event for medical device safety: the compliance dateContinue Reading

Google Research – Comparing Expert and Non-Expert Security Practices

“…no one can hack my mind”: Comparing Expert and Non-Expert Security Practices – USENIX Association, 2015 Symposium on Usable Privacy and Security. “The state of advice given to people today on how to stay safe online has plenty of room for improvement. Too many things are asked of them, which may be unrealistic, time consuming,Continue Reading

New on LLRX – Wearable tech data as evidence in the courtroom

Via – Wearable tech data as evidence in the courtroom – Nicole Black discusses how data downloaded from wearable technology has entered into the discovery phase of personal injury cases. A wealth of data can be collected about the direct activities of individuals who are using wearable devices while exercising, as well as conductingContinue Reading

ACLU – Capitol Hill staffers should be able to make encrypted calls, send secure text messages

“Today, the ACLU sent a letter to both the House and Senate, urging them to provide secure voice and text messaging capabilities to Members and their staff. (The Washington Post writes about our letter today. In recent years, computer security researchers have warned about the poor security of cellular networks, which in many cases useContinue Reading

Adblock Browser, Do Not Track and Acceptable Ads

“Adblock Plus has launched the Adblock Browser, and we’re excited to announce that DuckDuckGo is the default search engine in Adblock Browser on iOS and Android! We’ve been working with the EFF to promote a new “Do Not Track” (DNT) standard for web browsing. We hope this new DNT policy will better protect people fromContinue Reading

DOJ Policy Guidance – Use of Cell-Sites Simulator Technology

Department of Justice Guidance – Use of Cell-Sites Simulator Technology, September 3, 2015 “Cell-site simulator technology provides valuable assistance in support of important public safety objectives.Whether deployed as part  of a fugitive apprehension effort , a complex narcotics investigation, or to locate or rescue a kidnapped child, cell-site simulators fulfill critical operational needs. As withContinue Reading

The Deep Web and The Darknet

The Deep Web and The Darknet A Look Inside the Internet’s Massive Black Box. Woodrow Wilson International Center for Scholars, August 2015. “Many believe a Google search can identify most of the information available on the Internet on a given subject. But there is an entire online world – a massive one – beyond theContinue Reading

ANONIZE: A Large-Scale Anonymous Survey System

ANONIZE: A Large-Scale Anonymous Survey System – Susan Hohenberger Johns Hopkins University; Steven Myers Indiana University; abhi shelat University of Virginia; Rafael Pass Cornell University. “A secure ad-hoc survey scheme enables a survey authority to independently (with- out any interaction) select an ad-hoc group of registered users based only on their identities (e.g., their emailContinue Reading

A Guide to Cyber Risk

“Cyber risk is now a major threat to clients’ businesses. Companies increasingly face new exposures including first-and third-party damage, business interruption (BI) and regulatory consequences.  A Guide to Cyber Risk examines global trends and developments in cyber, while also identifying the emerging risks that will significantly impact the industry in the near future. > DownloadContinue Reading