Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

Translating Research for Action: Ideas and Examples for Informing Digital Policy

“The Berkman Klein Center for Internet & Society is pleased to release this series of papers, which aims to build a bridge between academic research and policymaking in the networked world by helping to identify opportunities in key areas related to digital technology and innovation. The series builds on the Center’s commitment to exploring new ways… Continue Reading

Federal Information Security: Actions Needed to Address Challenges

Federal Information Security: Actions Needed to Address Challenges, GAO-16-885T: Published: Sep 19, 2016. Publicly Released: Sep 20, 2016. “Cyber incidents affecting federal agencies have continued to grow, increasing about 1,300 percent from fiscal year 2006 to fiscal year 2015. Several laws and policies establish a framework for the federal government’s information security and assign implementation… Continue Reading

Vanity Fair – Welcome to the Dark Net

Welcome to the Dark Net, A Wilderness Where Invisible World Wars Are Fought and Hackers Roam Free “…Definitions. A vulnerability is a weakness in a network’s defenses. An exploit is a piece of software that takes advantage of a vulnerability. A zero-day exploit is a piece of software that takes advantage of a vulnerability that… Continue Reading

The Intercept – Leaked Catalogue Reveals a Vast Array of Military Spy Gear Offered to US Police

Sam Biddle – The Intercept – “A confidential, 120-page catalogue of spy equipment, originating from British defense firm Cobham and circulated to U.S. law enforcement, touts gear that can intercept wireless calls and text messages, locate people via their mobile phones, and jam cellular communications in a particular area. The catalogue was obtained by The Intercept as part… Continue Reading

Article excerpt from new book – “Rise of the Machines: A Cybernetic History”

This article is published via the Passcode – Modern field guide to security and privacy from The Christian Science Monitor”: The cypherpunk revolution-How the tech vanguard turned public-key cryptography into one of the most potent political ideas of the 21st century, by Thomas Rid, July 20, 2016. “…But amid the hype [in the 1990s with… Continue Reading

NextGov – Who’s in Charge of Regulating the Internet of Things?

Via NextGov – “The “internet of things” refers to a group of technology so vast the term is beginning to lose meaning. The internet of things hints at a vision of a ubiquitous network of electronics: refrigerators pinging their owners’ smartphones if they’ve run out of eggs, wearable devices that can detect the tell-tale vibrations of… Continue Reading

New devices allow any vehicle to transmit alerts for help after accidents – “…Devices like the Automatic Pro can bring almost any vehicle—even a jalopy you bought when *NSYNC was popular—into the smartphone age. They look like USB thumb drives and plug into the On-Board Diagnostics (OBD-II) port found in almost every almost every car sold in America since 1996. These ports are often hidden under… Continue Reading

NYS DMV employs enhanced facial recognition technology to catch ID thieves

Ars Technica: “In January, the New York State DMV enhanced its facial recognition technology by doubling the number of measurement points on a driver’s photograph, a move the state’s governor says has led to the arrest of 100 suspected identity thieves and opened 900 unsolved cases. In all, since New York implemented facial recognition technology… Continue Reading

EFF – What Facebook and WhatsApp’s Data Sharing Plans Really Mean for User Privacy

EFF – “WhatsApp is establishing data-sharing practices that signal a significant shift in its attitude toward privacy—though you wouldn’t know it from the privacy policy update that popped up on users’ screens last week. The new policy lays the groundwork for alarming data sharing between WhatsApp and its parent company Facebook. The update screen that… Continue Reading

ACRL – Keeping Up With Cybersecurity, Usability, and Privacy

Snipped – via Bohyun Kim. Associate Director, Library Applications and Knowledge Systems, at the University of Maryland-Baltimore, Health Sciences and Human Services Library – Keeping Up With Cybersecurity, Usability, and Privacy What is Cybersecurity? Cybersecurity is a broad term. It refers to the activities, practices, and technology that keep computers, networks, programs, and data secure… Continue Reading

Paper – Human identification using WiFi signal

Full text only available to subscribers, but the abstract alone will illuminate the extensive power of Wi-Fi sensing technology: “WiFi devices are now pervasive in our environment. Recent research has demonstrated that it is possible to sense the perturbations created by human motion in the WiFi spectrum to identify basic activities, gestures and even keystrokes.… Continue Reading

Bloomberg – Secret Cameras Record Baltimore’s Every Move from Above

Since January, police have been testing an aerial surveillance system adapted from the surge in Iraq. And they neglected to tell the public. By Monte Reel, August 23, 2016 – “The sky over the Circuit Court for Baltimore City on June 23 was the color of a dull nickel, and a broad deck of lowering… Continue Reading