Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

Text of European Commission Adequacy Decision on Privacy Shield

“European Commission Implementing Decision of 12.7.2016 pursuant to Directive 95/46/EC of the European Parliament and of the Council on the adequacy of the protection provided by the EU-U.S. Privacy Shield (Text with EEA relevance) THE EUROPEAN COMMISSION, Having regard to the Treaty on the Functioning of the European Union, Having regard to Directive 95/46/EC of… Continue Reading

Internet of Things, transportation and privacy – or not?

Via Bloomberg: “As you may have suspected, your car is spying on you. Fire up a new model and it updates more than 100,000 data points, including rather personal details like the front-seat passenger’s weight. The navigation system tracks every mile and remembers your route to work. The vehicular brain is smart enough to help… Continue Reading

EFF – Senate Still Considering Giving FBI More Power to Spy on Browser History

Via EFF – “Despite strong opposition in Congress and from the grassroots, the FBI is still pushing to expand its National Security Letter (NSL) authority. The proposed amendments would allow the FBI to serve companies with NSLs and obtain a wide range of Internet records, known as Electronic Communication Transactional Records (ECTRs), including browsing history. … Continue Reading

EFF – FBI Must Not Sidestep Privacy Protections For Massive Collection of Biometric Data

Iris Scans, Palm Prints, Face Recognition Data, and More Collected From Millions of Innocent Citizens – “The FBI, which has created a massive database of biometric information on millions of Americans never involved in a crime, mustn’t be allowed to shield this trove of personal information from Privacy Act rules that let people learn what… Continue Reading

FCC – New limits on telemarketers

“Scammers want your money, but they don’t want to get caught taking it. That’s why fraudulent telemarketers ask people to pay with systems that deliver a quick, anonymous cash payout like cash-to-cash transfers or cash reload card PINs. However, it’s now illegal for telemarketers to ask for payment by: cash-to-cash money transfers — like those… Continue Reading

House Homeland Security Report – Going Dark, Going Forward: A Primer on the Encryption Debate

June 29, 2016: “Terrorist attacks in Paris and San Bernardino have sparked a public debate on the use of encryption in our society because the attackers used encrypted communications to evade detection, a phenomenon known as “going dark.” Today, the Majority Staff of the House Homeland Security Committee released a new report entitled, Going Dark,… Continue Reading

LocationSafe: Granular Location Privacy for IoT Devices

LocationSafe: Granular Location Privacy for IoT Devices – Joshua Joy, Minh Le, Mario Gerlaar;  Xiv:1606.09605v1 [cs.CR] for this version), submitted 30 June 2016. “Today, mobile data owners lack consent and control over the release and utilization of their location data. Third party applications continuously process and access location data without data owners granular control and… Continue Reading

Leakedsource collects hacked data from across the globe

Follow up to previous posting on this database – Leakedsource – “There are currently 1,933,304,758 accounts in our database” – users may search by term or type. Via ET Tech – “If you have an account online regardless of the country you reside in, chances are you have been hacked or will be hacked at… Continue Reading

2015 Wiretap Report: Intercept Orders Rise 17 Percent

United States Courts, June 30, 2016: “The number of federal and state wiretaps terminated in 2015 increased nearly 17 percent over 2014, according to an annual report submitted to Congress by the Administrative Office of the U.S. Courts. As in previous years, drug investigations and telephone wiretaps accounted for the large majority of cases. The… Continue Reading

GAO Reports – 2020 Census, Defense Headquarters, Registering Voters, FOIA, ID Fraud

2020 Census: Census Bureau Needs to Improve Its Life-Cycle Cost Estimating Process, GAO-16-628: Published: Jun 30, 2016. Publicly Released: Jun 30, 2016. Defense Headquarters: Geographic Combatant Commands Rely on Subordinate Commands for Mission Management and Execution, GAO-16-652R: Published: Jun 30, 2016. Publicly Released: Jun 30, 2016. Defense Headquarters: Improved Data Needed to Better Identify Streamlining… Continue Reading

Motherboard – Terrorism Database Used by Governments and Banks Leaked Online

“…Thomson Reuters’ database, called World-Check, is used by over 300 government and intelligence agencies, as well as 49 of the world’s top 50 banks, according to a company fact sheet. World-Check is designed to give insight into financial crime and the people potentially behind it “We monitor over 530 sanction, watch, and regulatory law and… Continue Reading

New Google tool tracks user behavior across applications

The Guardian: “Google has rolled out new tools to let users see what its ad-tracking service has learned about them, and to let users opt in or out of a new personalised ads service. The addition to Google’s account settings, called My Activity, allows users to review everything that Google has tracked about their behaviour… Continue Reading