Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

JPMorgan Chase Says More Than 76 Million Accounts Compromised in Cyberattack

New York Times: “The breach is among the largest corporate hacks, and the latest revelations vastly dwarf earlier estimates that hackers had gained access to roughly 1 million customer accounts.”

A Review of Security Requirements for Local Number Portability Administration

A Review of Security Requirements for Local Number Portability Administration, The Chertoff Group, September 29, 2014: “For years, Americans have had the legal right to keep their wireless and wireline telephone numbers when switching carriers, and they frequently exercise this right. Carriers must constantly keep track of this switching of carriers in order to route telephone callsContinue Reading

New GAO Reports – Afghanistan Equipment Drawdown, Bureau of Prisons, Elections, Unmanned Aerial Systems

AFGHANISTAN EQUIPMENT DRAWDOWN: Progress Made, but Improved Controls in Decision Making Could Reduce Risk of Unnecessary Expenditures, GAO-14-768: Published: Sep 30, 2014. Publicly Released: Sep 30, 2014. BUREAU OF PRISONS: Information on Efforts and Potential Options to Save Costs, GAO-14-821: Published: Sep 30, 2014. Publicly Released: Sep 30, 2014. ELECTIONS: Observations on Wait Times for Voters on Election Day 2012, GAO-14-850: Published: SepContinue Reading

Appeals Court Limits Military Surveillance of Civilian Internet Use

“The U.S. Court of Appeals for the Ninth Circuit ruled in United States v. Dreyer that an agent for the Naval Criminal Investigative Service violated Defense Department regulations and the Posse Comitatus Act when he conducted a surveillance operation in Washington state to identify civilians who might be sharing illegal files. The 1878 Act prevents the U.S.Continue Reading

Information Sharing Environment: Annual Report to Congress – 2014

“This report is submitted by the Program Manager for the Information Sharing Environment (PM-ISE) on behalf of the President, as required by Section 1016 (h) (2) of the Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004, as amended. Accompanying, but distinct from this report, are substantial performance data and links to best practices, lessons learned,Continue Reading

Results of the 2014 Global Privacy Enforcement Network Sweep

“The second Global Privacy Enforcement Network (GPEN) Privacy Sweep demonstrates the ongoing commitment of privacy enforcement authorities to work together to promote privacy protection around the world. Some 26 privacy enforcement authorities in 19 countries participated in the 2014 Sweep, which took place May 12-18. Over the course of the week, participants downloaded 1,211 popular mobile appsContinue Reading

New GAO Reports – Army Corps of Engineers, Bureau of Prisons, CFPB, ID Theft, Oil and Gas Transportation, Affordable Care Act

ARMY CORPS OF ENGINEERS: The Corps Needs to Take Steps to Identify All Projects and Studies Eligible for Deauthorization, GAO-14-699: Published: Aug 21, 2014. Publicly Released: Sep 22, 2014. BUREAU OF PRISONS: Management of New Prison Activations Can Be Improved, GAO-14-709: Published: Aug 22, 2014. Publicly Released: Sep 22, 2014. CONSUMER FINANCIAL PROTECTION BUREAU:Some Privacy and Security Procedures for Data CollectionsContinue Reading

The Evolution of US Government Restrictions on Using and Exporting Encryption Technologies

CIA approved for release 9/12/2014 – redacted: The Evolution of US Government Restrictions on Using and Exporting Encryption Technologies, Michael Schwartzbeck. “In the last year, several academic, commercial, and free speech advocates have seriously jeopardized the US government’s legal right to control encryption.”

Using Copyright to Combat Revenge Porn

Using Copyright to Combat Revenge Porn, Amanda Levendowski: “Over the past several years, the phenomenon of “revenge porn” – defined as sexually explicit images that are publicly shared online, without the consent of the pictured individual – has attracted national attention. Victims of revenge porn often suffer devastating consequences, including losing their jobs, but have hadContinue Reading

FBI Says Biometric Database has Reached “Full Operational Capability”

“The FBI announced that the Next Generation Identification system, one of the largest biometric databases in the world, has reached “full operational capability.” In 2013, EPIC filed a Freedom of Information Act lawsuit about the NGI program. EPIC obtained documents that revealed an acceptance of a 20% error rate in facial recognition searches. Earlier this year, EPIC joined a coalition ofContinue Reading

A day in the life of a data mined kid – report

Adrienne Hill: “Education, like pretty much everything else in our lives these days, is driven by data. Our childrens’ data. A whole lot of it. Nearly everything they do at school can be — and often is — recorded and tracked, and parents don’t always know what information is being collected, where it’s going, or how it’sContinue Reading

Treasure Map: The NSA Breach of Telekom and Other German Firms

Spiegel Online – Andy Müller-Maguhn, Laura Poitras, Marcel Rosenbach and Michael Sontheimer:  [Treaure Map] “is the mandate for a massive raid on the digital world. It aims to map the Internet, and not just the large traffic channels, such as telecommunications cables. It also seeks to identify the devices across which our data flows, so-called routers. Furthermore, every single endContinue Reading