Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Privacy

Snowden interviewed by Yahoo News in Russia

“In an exclusive interview in Russia with Yahoo Global News Anchor Katie Couric, Edward Snowden, the fugitive whistleblower who leaked information about U.S. surveillance activities, says he is “kind of encouraged” by the idea that Russian President Vladimir Putin might return him to the U.S. to stand trial because that would show the world he’s… Continue Reading

The Terrorist Screening Database and Preventing Terrorist Travel

CRS – The Terrorist Screening Database and Preventing Terrorist Travel. Jerome P. Bjelopera, Specialist in Organized Crime and Terrorism; Bart Elias, Specialist in Aviation Policy; Alison Siskin, Specialist in Immigration Policy. November 7, 2016. “After the terrorist attacks of September 11, 2001, the federal government developed a unified regimen to identify and list known or… Continue Reading

The New Era of Secret Law

Brennan Center for Justice – New Report: “Secret Law” Governs Key Aspects of National Security Policy – “At least 74 opinions, memoranda, and letters issued by the Justice Department’s Office of Legal Counsel (OLC) between 2002 and 2009 on core post-9/11 national security topics, including intelligence activities and the detention and interrogation of terrorist suspects,… Continue Reading

EFF Fighting NSL Gag Orders With Help From CREDO and Internet Archive

News release: “…EFF has been litigating the constitutionality of NSLs on behalf of unnamed clients in a total of three related court cases beginning in 2011. This week, telecom provider CREDO confirmed that it was the company involved in one of these long-running cases, and published the letters it received three years ago. CREDO, represented… Continue Reading

IRS IG – Improvements Are Needed to Ensure the Protection of Data the IRS Transfers to External Partners

“When the Internal Revenue Service (IRS) has shared data, including Personally Identifiable Information, taxpayer information, and other sensitive data, with external entities, it has not always adequately protected the data through secure file transfer technology, according to an audit report that the Treasury Inspector General for Tax Administration (TIGTA) released today. The IRS shares data… Continue Reading

Internet Archive requests donations for a backup to be housed in Canada

This posting today by the Internet Archive’s Brewster Kahle – Help Us Keep the Archive Free, Accessible, and Private, is significant for all of us who use this resource, be it as as educators, librarians, attorneys, advocates for civil liberties, students, or as citizens or residents of the United States.  Brewster states: “We are building… Continue Reading

Wiley Becomes First Major Publisher to Require ORCID IDs for Submitting Authors

News release: “Hoboken, NJ– November 28, 2016—John Wiley & Sons Inc.  announced today plans to require ORCID iDs as part of the manuscript submission process for a large number of journals. Beginning in winter 2016, more than 500 Wiley journals using ScholarOne Manuscripts will require the submitting author (only) to provide an ORCID identifier (iD)… Continue Reading

The Secret Ballot At Risk: Recommendations for Protecting Democracy

“The right to cast a secret ballot in a public election is a core value in the United States’ system of self-governance. Secrecy and privacy in elections guard against coercion and are essential to integrity in the electoral process. Secrecy of the ballot is guaranteed in state constitutions and statutes nationwide. However, as states permit… Continue Reading

European Commission target of DDoS attack

Via Politico: “This afternoon, the European Commission was subject to a cyberattack (denial of service) which resulted in the saturation of our Internet connection.” Continue Reading

UK bill opens government sweeping access to citizen browsing history

Belfast Telegraph – “The Investigatory Powers Bill…forces internet providers to keep a full list of Internet Connection Records (ICRs) for a year, and make them available to the government if it asks….Those include expected law enforcement organisations like the police, the military and the secret service – but also contain bodies like the Food Standards… Continue Reading

Audit of OPM Security Systems Shows Continued Material Weakness

OPM IG Federal Information Security Modernization Act Audit – FY 2016: “This audit report again communicates a material weakness related to OPM’s Security Assessment and Authorization (Authorization) program. In April 2015, the then Chief Information Officer issued a memorandum that granted an extension of the previous Authorizations for all systems whose Authorization had already expired,… Continue Reading

The Intercept – NSA’s Spy Hub in New York, Hidden in Plain Sight

“…33 Thomas Street is different: An investigation by The Intercept indicates that the skyscraper is more than a mere nerve center for long-distance phone calls. It also appears to be one of the most important National Security Agency surveillance sites on U.S. soil — a covert monitoring hub that is used to tap into phone… Continue Reading