Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

NSA Releases “12333” Report, Fails to Address Bulk Collection

EPIC: “The NSA released a privacy report on its surveillance activities under 12333, an Executive Order that provides broad authority for data collection. But the report only addresses a narrow aspect of the EO 12333 collection – protections for U.S. persons in the context of targeted signal intelligence activities. The report fails to address bulk collection orContinue Reading

Department of Homeland Security Privacy Office 2014 Annual Report to Congress

“The Department of Homeland Security (DHS or Department) Privacy Office is the first statutorily created privacy office in any federal agency, as set forth in Section 222 of the  Homeland Security Act of 2002, as amended. The mission of the Privacy Office is to protect all individuals by embedding and enforcing privacy protections and transparency inContinue Reading

Retired NSA Technical Director Explains Snowden Docs

Hackers’ Attack Cracked 10 Companies in Major Assault – NYT

By MATTHEW GOLDSTEIN, NICOLE PERLROTH and DAVID E. SANGER “The huge cyberattack on JPMorgan Chase that touched more than 83 million households and businesses was one of the most serious computer intrusions into an American corporation. But it could have been much worse. Questions over who the hackers are and the approach of their attack concern government and industry officials.Continue Reading

Biographic Entity Resolution Challenges of managing and sharing

Via Public Intelligence – DOJ/FBI – Unclassified  Presentation – Biographic Entity Resolution – Challenges of managing and sharing. John N. Dvorak – Senior Level IT Architect, September 16, 2014, Global Identity Summit. “Entity Resolution: The process of determining whether two or more references to real-world objects such as people (individuals), places, or  things are referring to the same object or to different objects.Continue Reading

National Cyber Security Awareness Month 2014

DHS: “The Internet is part of everyone’s life, every day. We use the Internet at work, home, for enjoyment, and to connect with those close to us. However, being constantly connected brings increased risk of theft, fraud, and abuse. No country, industry, community, or individual is immune to cyber risks. As a nation, we face constantContinue Reading

At OECD Global Forum, EPIC Urges “Algorithmic Transparency”

EPIC: Speaking to delegates at the OECD Global Forum for the Knowledge Economy in Tokyo, EPIC President Marc Rotenberg urged OECD member countries to endorse “algorithmic transparency,” the principle that data processes that impact individuals be made public. Mr. Rotenberg explained that companies are too secretive about what they collect and how they use personal data. Mr.Continue Reading

JPMorgan Chase Says More Than 76 Million Accounts Compromised in Cyberattack

New York Times: “The breach is among the largest corporate hacks, and the latest revelations vastly dwarf earlier estimates that hackers had gained access to roughly 1 million customer accounts.”

A Review of Security Requirements for Local Number Portability Administration

A Review of Security Requirements for Local Number Portability Administration, The Chertoff Group, September 29, 2014: “For years, Americans have had the legal right to keep their wireless and wireline telephone numbers when switching carriers, and they frequently exercise this right. Carriers must constantly keep track of this switching of carriers in order to route telephone callsContinue Reading

New GAO Reports – Afghanistan Equipment Drawdown, Bureau of Prisons, Elections, Unmanned Aerial Systems

AFGHANISTAN EQUIPMENT DRAWDOWN: Progress Made, but Improved Controls in Decision Making Could Reduce Risk of Unnecessary Expenditures, GAO-14-768: Published: Sep 30, 2014. Publicly Released: Sep 30, 2014. BUREAU OF PRISONS: Information on Efforts and Potential Options to Save Costs, GAO-14-821: Published: Sep 30, 2014. Publicly Released: Sep 30, 2014. ELECTIONS: Observations on Wait Times for Voters on Election Day 2012, GAO-14-850: Published: SepContinue Reading

Appeals Court Limits Military Surveillance of Civilian Internet Use

“The U.S. Court of Appeals for the Ninth Circuit ruled in United States v. Dreyer that an agent for the Naval Criminal Investigative Service violated Defense Department regulations and the Posse Comitatus Act when he conducted a surveillance operation in Washington state to identify civilians who might be sharing illegal files. The 1878 Act prevents the U.S.Continue Reading

Information Sharing Environment: Annual Report to Congress – 2014

“This report is submitted by the Program Manager for the Information Sharing Environment (PM-ISE) on behalf of the President, as required by Section 1016 (h) (2) of the Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004, as amended. Accompanying, but distinct from this report, are substantial performance data and links to best practices, lessons learned,Continue Reading