Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $24,052
27%  
Woo hoo!! And the first 27% is in!! Thank you all very much!! God bless.

Keyword: privacy

Brevity: Headers | « Text »
  • Police Create 3D Print of Murdered Man’s Fingers to Hack His iPhone

    07/22/2016 6:51:45 PM PDT · by Swordmaker · 10 replies
    News.SoftPedia.com ^ | July 22, 2016 -- 08:07 GMT | By Bogdan Popa
    Authorities might find a way to access a dead man’s phone If you believe that securing your phone with a fingerprint makes it impossible to hack, think again. Michigan police have recently asked the Michigan State University to produce a 3D replica of a dead man’s fingers in order to access his iPhone and collect data that is believed to contain evidence linked to an ongoing murder case.Professor Anil Jain has been tasked with creating the 3D molds, and according to a report by Fusion, the project is advancing well so far, although in-lab testing is still being performed, and it’s...
  • WSJ Reporter: Homeland Security Tried to Take My Phones at the Border

    07/21/2016 12:36:59 PM PDT · by Swordmaker · 38 replies
    MotherBoard ^ | July 21, 2016 | by JOSEPH COX
    On Thursday, a Wall Street Journal (WSJ) reporter claimed that the Department of Homeland Security demanded access to her mobile phones when she was crossing the border at the Los Angeles airport.The case highlights the powers that border agents purport to have, and how vulnerable sensitive information can be when taken through airports in particular.“I wanted to share a troubling experience I had with the Department of Homeland Security (DHS), in the hopes it may help you protect your private information,” Maria Abi-Habib, a WSJ journalist focused on ISIS and Al Qaeda wrote in a post on Facebook. (Abi-Habib...
  • Opera sells open-source Chromium browser for $600m to Chinese bods

    07/19/2016 8:24:53 AM PDT · by snarkpup · 30 replies
    The Register ^ | 18 Jul 2016 at 20:07 | Shaun Nichols
    Opera will sell its web browser technology to Chinese investors for $600m after a larger sale worth $1.2bn fell apart.
  • Maxthon Browser Sends Sensitive Data to China (!)

    07/14/2016 9:33:55 PM PDT · by Utilizer · 9 replies
    SecurityWeek ^ | July 14, 2016 | Eduard Kovacs
    ... Developed by China-based Maxthon International, the browser is available for all major platforms in more than 50 languages. In 2013, after the NSA surveillance scandal broke, the company boasted about its focus on privacy and security, and the use of strong encryption. Researchers at Fidelis Cybersecurity and Poland-based Exatel recently found that Maxthon regularly sends a file named ueipdata.zip to a server in Beijing, China, via HTTP. Further analysis revealed that ueipdata.zip contains an encrypted file named dat.txt. This file stores information on the operating system, CPU, ad blocker status, homepage URL, websites visited by the user (including online...
  • Feinstein encryption bill, opposed by Silicon Valley, likely dead

    07/14/2016 7:18:20 PM PDT · by Swordmaker · 9 replies
    Sacramento Bee ^ | July 13, 2016 | BY SEAN COCKERHAM
    Seven months after 14 people died in the San Bernardino terror attack, the push by California Sen. Dianne Feinstein to give law enforcement access to encrypted cellphone data has fizzled. A draft bill by Feinstein and Sen. Richard Burr, R-North Carolina, was panned by technology companies and never introduced, while a new report from the House Homeland Security Committee declares that the proposal and others floated in Congress “provide little guarantee of successfully addressing the issue.” Susan Hennessey, a former National Security Agency lawyer and now a cybersecurity expert at the Brookings Institution think tank in Washington, said Feinstein’s proposal...
  • McCain Pushes Apple, Google On Encryption Standards in Cyber Hearing

    07/14/2016 1:51:21 PM PDT · by Swordmaker · 41 replies
    USNI.ORG ^ | July 14, 2016 3:13 PM | By: John Grady
    Sen. John McCain warned Google and Apple executives Thursday that the Senate Armed Services Committee “has subpoena power” that could compel them to testify on why their encryption systems on newer smartphones are not accessible to law enforcement operating under court orders.The Arizona Republican, who chairs the panel, said, “There’s an urgency” to finding a solution to the matter of protecting privacy while also not closing out police, prosecutors and intelligence agencies from lawfully pursuing criminals and terrorists.At the start of the hearing, McCain noted that Tim Cook, president of Apple, declined to attend the session. “This is unacceptable,” he...
  • COURT: US GOVERNMENT CAN'T MAKE MICROSOFT REVEAL CLOUD DATA

    07/14/2016 1:41:33 PM PDT · by Swordmaker · 7 replies
    Associated Press ^ | July 14, 2016 | BY LARRY NEUMEISTER
    NEW YORK (AP) -- A federal appeals court delivered a victory to U.S. companies housing customer data overseas, ruling Thursday that prosecutors cannot force Microsoft to reveal content from a customer's email account stored in Ireland. The 2nd U.S. Circuit Court of Appeals in Manhattan overturned a lower court order finding the company in civil contempt for not handing over the data. Microsoft offers storage through its "public cloud," which places data from over 1 billion customers and over 20 million businesses on servers in over 40 countries, the court noted.
  • In Sports Authority bankruptcy, customer e-mail data commands hefty sum

    07/03/2016 7:04:21 AM PDT · by BenLurkin · 6 replies
    latimes.com ^ | 06/30/2016
    As more companies come to understand the value of data, customer information has gone to the auction block during bankruptcy proceedings. Yet as consumers work to safeguard their data in the aftermath of high-profile breaches at companies such as Target and health insurer Anthem Inc., such sales mark another way customers can lose control of their personal information. “Customer emails are stolen every day [but] they lack awareness that this is a possibility,” Nigam said. “The auction is raising awareness of another way customer data can be sold without even thinking about it.” Businesses have the legal right to sell...
  • Judge says the FBI can hack your computer without a warrant

    06/25/2016 9:30:05 AM PDT · by Swordmaker · 58 replies
    Endgadget ^ | June 24, 2016 | By Jessica Conditt
    'Computers accessing the internet can -- and eventually will -- be hacked,' says Judge Henry Coke Morgan, Jr. The FBI did not need a warrant to hack a US citizen's computer, according to a ruling handed down on Tuesday by Senior US District Court Judge Henry Coke Morgan, Jr. If the decision is upheld, it may have ripple effects that essentially allow government agencies to remotely search and seize information from any computer in the US without a warrant, probable cause or suspicion, the EFF argues.The ruling relates to a worldwide FBI sting dubbed Operation Pacifier that targeted child pornography...
  • Porn dog' helping sniff out crime

    06/23/2016 8:35:08 PM PDT · by Swordmaker · 23 replies
    KSTU TV via CNN ^ | 12:48 PM, Jun 23, 2016
    SALT LAKE CITY - (KSTU via CNN) - Police in Utah have recruited an unlikely ally in the fight against child pornography. The pooch named URL (pronounced Earl) is a black Lab trained for detecting electronic storage devices. Affectionately dubbed "porn dog" by the department, URL operates by sniffing out chemicals used in storage media. URL comes from the same trainer as the K-9 that helped arrest former Subway pitchman Jared Fogle. "I think everyone was pretty skeptical. Really? A dog that can detect electronics?" said Lt. Lane Findlay of the Weber County Sheriff’s Office. "He certainly has some...
  • After Orlando, Senate bill seeks to allow FBI web searches without court order

    06/22/2016 6:05:47 PM PDT · by Whenifhow · 39 replies
    washingtonpost. ^ | June 22 2016 | Karoun Demirjian
    The Senate on Wednesday rejected a Republican-led effort to allow the FBI to access a person’s Internet browsing history, email account data and other electronic communications without a court order in terrorism and spy cases. The measure from Senate Armed Services Committee Chairman John McCain (R-Ariz.) and Senate Intelligence Committee Chairman Richard Burr (R-N.C.) would have also extended the government’s authority to conduct surveillance over potential “lone wolf” attackers. [ ] A majority of the Senate backed the proposal in a 58 to 38 vote, but it needed 60 votes to advance. [ ] The measure inspired a fierce backlash...
  • Pressure mounts against Rule 41 – the FBI's power to hack Tor, VPN users on sight (Privacy Alert)

    06/22/2016 10:24:06 AM PDT · by dayglored · 19 replies
    The Register ^ | Jun 21, 2016 | Iain Thomson
    The campaign against Rule 41 – which will give cops and Feds in America the power to hack people's computers around the world – has kicked up a gear. Leaders of the US House of Representatives and Senate got a letter today urging them to block the rule change before it becomes permanent in December. The proposed legislative tweak, quietly passed by an obscure committee and approved by the Supreme Court in April, would allow a US magistrate judge to grant law enforcement access to any stored data on a computer, phone, or any storage device around the world that...
  • FBI Pushes For More Power To Crush Your Privacy

    06/07/2016 7:43:07 AM PDT · by Cyberman · 14 replies
    InfoWorld ^ | 06/03/2016 | Caroline Craig
    The FBI continues its push to greatly expand government surveillance and exempt that spying from constitutional safeguards and privacy rules Like living in a police state much? The FBI is pushing on multiple fronts to greatly expand its surveillance powers and exempt that spying from constitutional safeguards and privacy rules. Many in Congress are only too happy to help. With a treasure trove of digital information tantalizingly within reach, the FBI doesn't want to be slowed down by inconveniences like Fourth Amendment protections.... Comey's campaign against encryption may have stalled, but his push to expand the agency's use of warrantless...
  • Obama Admits The Government Monitors Your Browsing History

    06/06/2016 12:59:12 PM PDT · by Lorianne · 17 replies
    Zero Hedge ^ | 05 June 2016 | Tyler Durden
    During a PBS town hall meeting, president Obama was asked why he and Hillary want to control and restrict guns and ammunition to responsible gun owners. Obama's response was the typical stock answer of rejecting the "notion" that anyone is hell-bent on taking away "folks' guns", yada yada. However, as AllOutdoor notes, if you listen carefully to Obama's full response, there is a comment Obama gives about knowing browser history that should sent everyone into a blind rage. "I just came from a meeting, today, in the situation room, in which I’ve got people who we know have been on...
  • 5 Ways Law Enforcement Will Use Tattoo Recognition Technology - Electronic Frontier Foundation

    06/03/2016 4:18:03 PM PDT · by MarchonDC09122009 · 16 replies
    Electronic Freedom Foundation ^ | 06/02/2016 | Dave Maass and Aaron Mackey and Soraya Okuda
    5 Ways Law Enforcement Will Use Tattoo Recognition Technology - Electronic Frontier Foundation https://www.eff.org/deeplinks/2016/05/5-ways-law-enforcement-will-use-tattoo-recognition-technology?mkt_tok=eyJpIjoiWm1NeU56TmxOelptT0RjNCIsInQiOiI4dk1NRjl2bld2Mk5aRW9weFpod1h4djJxTTZ3Kzg5NEJRc0NjMmFOWmVUc3dsQmlYSmdWajZaUDVMU2ZNcitrclNIa25RVGlZaXVtbG85OHBsNWRld3RadkRRWWMzSlFLTXJvanlxZUdwYz0ifQ%3D%3D June 2, 2016 | By Dave Maass and Aaron Mackey and Soraya Okuda 5 Ways Law Enforcement Will Use Tattoo Recognition Technology There's an action movie cliché in which a cop inspects the body of a felled assassin or foot soldier and discovers a curious tattoo that ultimately leads to a rogue black-ops squadron, a secret religious sect, or an underground drug trafficking ring. The trope isn’t entirely Hollywood fantasy, but the reality of emerging tattoo recognition technology is closer to a dystopian tech thriller. Soon,...
  • Law Would Let FBI Read Everyone's Email [semi-satire]

    05/31/2016 4:15:14 PM PDT · by John Semmens · 13 replies
    Semi-News/Semi-Satire ^ | 29 May 2016 | John Semmens
    The 2017 Intelligence Authorization Act would enable the FBI to obtain anyone's email records without a court order. All the agency would need is a National Security Letter, which would allow the FBI get information from companies without their customers knowing they were being investigated. The bill is co-sponsored by Senate Intelligence Committee Chairman Richard Burr (R-NC) and Vice Chairman Dianne Feinstein (D-Calif). "If we want the government to protect us we must let go of our obsession with personal privacy," Sen. Feinstein urged. "The police are consummate professionals, not nosy busybodies. Unless you're doing something wrong you have nothing...
  • Appeals Court Delivers Devastating Blow to Cellphone-Privacy Advocates

    05/31/2016 4:12:05 PM PDT · by Swordmaker · 25 replies
    The Intercept ^ | May 31, 2016 | By Jenna McLaughlin
    COURTS ACROSS THE COUNTRY are grappling with a key question for the information age: When law enforcement asks a company for cellphone records to track location data in an investigation, is that a search under the Fourth Amendment? By a 12-3 vote, appellate court judges in Richmond, Virginia on Monday ruled that it is not — and therefore does not require a warrant.The 4th Circuit Court of Appeals upheld what is known as the third-party doctrine: a legal theory suggesting that consumers who knowingly and willingly surrender information to third parties therefore have “no reasonable expectation of privacy” in that information...
  • Precision Medicine Initiative and Data Security | whitehouse.gov (05/25/2016 White house decree)

    05/27/2016 11:59:49 AM PDT · by MarchonDC09122009 · 26 replies
    whitehouse.gov ^ | 05/25/2016 | Obama, HHS Secretary Sylvia Mathews Burwell
    Precision Medicine Initiative and Data Security | whitehouse.gov (05/25/2016 White house decree) https://www.whitehouse.gov/blog/2016/05/25/precision-medicine-initiative-and-data-security?mkt_tok=eyJpIjoiTVRFNE1Ua3laRGRqTlRZMyIsInQiOiJ1R1VHbTk3M2o5NmhHSFQrOHNYdXZKakE4OW1tWTJlSUszSThzbnRnRkNlSGZjK2VCREJGWG5xemdyanpIQUdLU3pJSjBHYTdZd2hPUERUdmliaVBMZjA3SjNUYVY2WUt2Z1pTS0xXdTNqcz0ifQ%3D%3D Precision Medicine Initiative and Data Security May 25, 2016 at 3:00 PM ET by Secretary Sylvia Mathews Burwell, Lisa O. Monaco Twitter Facebook Email Summary: Today, we are pleased to release the final Data Security Policy Principles and Framework (Security Framework) for President Obama’s Precision Medicine Initiative (PMI).     “We’re going to make sure that protecting patient privacy is built into our efforts from day one.”     - President Barack Obama, January 30th 2015 The health care system of the future is taking shape right now, and...
  • New law would let the FBI read your email without a court order

    05/26/2016 9:46:08 AM PDT · by Swordmaker · 30 replies
    BGR ^ | May 26, 2016 at 11:34 AM | By Chris Smith
    Image Source: yournewswire.com A new Senate bill would let the FBI and other law enforcement agencies access the contents of any US citizen’s email without a court order during investigations. Instead, the FBI would need just a National Security Letter, which would force companies to provide email access to the agency without alerting the person who’s being investigated. The FBI can already access phone records without a court order, but that law doesn’t apply to email conversations. The Senate Intelligence Committee approved the 2017 Intelligence Authorization Act on Tuesday, CNET reports. The bill will head to the full Senate now that...
  • Senate Bill Would Let Fbi Read Your EMails Without A Court Order

    05/26/2016 5:06:55 AM PDT · by Cyberman · 53 replies
    CNet ^ | 05/25/2016 | Shara Tibken
    Better watch what you put in email. The Senate Intelligence Committee on Tuesday approved a bill that would make it easier for the government to read what you're writing online.... The bill is the latest move by the federal government to shore up its powers when it comes to surveilling citizens. The government has been battling Apple and other tech companies for more access to data stored on devices. Law enforcement argues it can't fight crimes unless it has access to information on mobile gadgets. Technology companies and rights groups argue that features like strong encryption, which scrambles data so...
  • What's Driving Silicon Valley To Become "Radicalized

    05/25/2016 8:26:18 AM PDT · by Cyberman · 12 replies
    The Washington Post ^ | 05/24/2016 | Elizabeth Dwoskin
    Like many Silicon Valley start-ups, Larry Gadea's company collects heaps of sensitive data from his customers. Recently, he decided to do something with that data trove that was long considered unthinkable: He is getting rid of it. The reason? Gadea fears that one day the FBI might do to him what it did to Apple in their recent legal battle: demand that he give the agency access to his encrypted data. Rather than make what he considers a Faustian bargain, he's building a system that he hopes will avoid the situation entirely. "We have to keep as little [information] as...
  • The FBI’s secret biometrics database they don’t want you to see

    05/23/2016 5:53:56 AM PDT · by upchuck · 34 replies
    Russia Today ^ | May 22, 2016 | not indicated
    The Federal Bureau of Investigation (FBI) wants to prevent information about its creepy biometric database, which contains fingerprint, face, iris, and voice scans of millions of Americans, from getting out to the public. The Department of Justice has come up with a proposal to exempt the biometric database from public disclosure. It states that the Next Generation Identification System (NGI) should not be subject to the Privacy Act, which requires federal agencies to give people access to records that have been collected concerning them, “allowing them to verify and correct them if needed.” The proposal states that allowing individuals to view their...
  • Op-Ed: How Bruce Jenner changed the life of every American

    05/22/2016 4:36:31 PM PDT · by Eleutheria5 · 47 replies
    Arutz Sheva ^ | 22/5/16 | Jack Englehard
    ..... They need a cause. Without a cause, Progressives lose the means to hammer us with guilt and they lose their think tank foundations and all that money. So as I have it figured, one fine day, a slow day, something suitable to ruin the country…a new cause. The old causes were not doing so well. ..... Then, to top it off, Obama’s most trusted advisor, Ben Rhodes, confirmed what we always suspected, that the Iran Nuke Deal was a farce from the word go. Yes we were tricked. So they had to find something else to bamboozle us, something...
  • A Former Transgender Person’s Take on Obama’s Bathroom Directive

    05/20/2016 4:28:35 PM PDT · by SoFloFreeper · 29 replies
    Daily Signal ^ | 5/16/16 | Walt Heyer
    ....Obama, the titular head of the LGBT movement, has added to the firestorm of confusion...by threatening schools with loss of federal funding unless they allow students to join the sex-segregated restroom, locker room, and sports teams of their chosen gender, without regard to biological reality. ....As someone who underwent surgery from male to female and lived as a female for eight years before returning to living as a man, I know firsthand what it’s like to be a transgender person.... What has arisen is a new breed emerging among young people that falls outside the purview of the LGBT: the...
  • Senators Ron Wyden and Rand Paul introduce bill to block expansion of FBI hacking authority

    05/20/2016 4:04:00 PM PDT · by Swordmaker · 6 replies
    Mac Daily News ^ | May 10, 2016
    U.S. Senators Ron Wyden, D-Ore., and Rand Paul, R-Ky., yesterday introduced the Stopping Mass Hacking (SMH) Act to protect millions of law-abiding Americans from government hacking. The Stopping Mass Hacking (SMH) Act prevents recently approved changes to Rule 41 from going into effect. The changes would allow the government to get a single warrant to hack an unlimited number of Americans’ computers if their computers had been affected by criminals, possibly without notifying the victims. Sens. Tammy Baldwin, D-Wis., Steve Daines, R-Mont., and Jon Tester, D-Mont., are original co-sponsors of the Senate bill.“This is a dramatic expansion of the government’s...
  • IPhone, iPad Owners Must Enter Their Passwords More Often (FLASH video at source)

    05/20/2016 2:37:13 PM PDT · by Swordmaker · 37 replies
    FORTUNE ^ | May 19, 2016 | by Don Reisinger
    Apple has quietly changed a policy that has resulted in iPhone and iPad owners having to more frequently enter passwords to unlock their devices.Users must now enter a passcode anytime the device’s Touch ID fingerprint sensor hasn’t been used in the past eight hours or when the device hasn’t been unlocked with a passcode in the last six days. In such cases, Touch ID is turned off until users enter passcodes.Apple-tracking site Macworld noted the little-noticed change and investigated the reason behind it. It found users who claimed that Apple’s passcode requests had become increasingly frequent.Apple has long required that...
  • District Attorney Arguing Against Encryption Handed Out Insecure Keylogging "Monitoring" Software

    05/18/2016 7:12:56 AM PDT · by Cyberman · 17 replies
    Techdirt ^ | 05/18/2016 | Tim Cushing
    Beyond James Comey, there are still a few law enforcement officials beating the anti-encryption drum. Manhattan DA Cyrus Vance is one of those. He's been joined in this fight by some like-minded district attorneys from the other coast, seeing as New York and California both have anti-encryption bills currently working their way through local legislatures. Vance, along with Los Angeles County DA Jackie Lacey and San Diego County DA Bonnie Dumanis, penned an op-ed against encryption for the LA Times. In it, they argue that tech companies have set them up as "gatekeepers" of communications and data, which they believe...
  • 'Come and get it': Marine Le Pen dares fraud inspectors to retrieve mobile phone from cleavage

    05/18/2016 7:01:18 AM PDT · by SoFloFreeper · 14 replies
    UK telegraph ^ | 5/18/16
    French Far-Right leader Marine Le Pen thrust her mobile phone down her cleavage to keep it out of the hands of fraud inspectors who raided Front National headquarters, daring them to “come and get it”, say French reports. ....when inspectors arrived, Ms Le Pen started filming the scene with her mobile. After repeated requests to stop filming, fraud officers lunged for the phone only to see it disappear down Ms Le Pen’s ample cleavage.
  • FBI Director Says Legal War On Encryption Far From Over

    05/12/2016 3:20:20 PM PDT · by Cyberman · 19 replies
    Apple Insider ^ | 05/13/2016 | Mikey Campbell
    FBI Director James Comey on Wednesday said the U.S. government will continue to wage legal war with tech companies to gain access to encrypted devices, intimating that such measures are weakening terror organizations like ISIL. At an FBI briefing, Comey said gaining privileged access to passcode locked — or otherwise protected — devices is an important national security concern as encryption is now "essential tradecraft" of terror groups, reports Reuters....
  • FBI wasn't able to unlock iPhone, even with a 'fingerprint unlock warrant' (video at Link)

    05/12/2016 1:58:44 PM PDT · by Swordmaker · 40 replies
    CNN Money ^ | May 12, 2016: 10:24 AM ET | by Jose Pagliery
    A judge recently took the controversial step of letting the FBI force a woman to unlock an iPhone with her fingerprints. But it didn't work. CNNMoney has learned that the FBI was unable to open an iPhone in Los Angeles. It's an important detail when debating how new technology -- and new police methods -- affect Americans' Fifth Amendment right to avoid self-incrimination. And it shows that while the FBI unlocked the San Bernardino terrorist's iPhone 5C, law enforcement still has trouble getting into most iPhones. The present case sparked nationwide attention when it was highlighted by the Los Angeles...
  • Should you disable Touch ID for your own security?

    05/09/2016 12:39:28 PM PDT · by Swordmaker · 47 replies
    MacWorld ^ | May 2, 2016 | by Glenn Fleishman
    Judges in the U.S. have ordered people to unlock their fingerprint-locked phones. Coercion by others remains an issue. Should you be able to plead the Fifth when a judge forces you to use your fingerprints to unlock an iPhone?That’s the latest ongoing debate in a Los Angeles courtroom after a judge compelled a woman in custody to use Touch ID to unlock an iPhone. Legal experts are arguing that this goes against the Fifth Amendment’s protection against self-incrimination because the authorities would then have access to potentially-incriminating personal data stored on the device. The debate started after authorities obtained a...
  • Pennsylvania Making Millions by Selling Your Driver's Record.

    05/06/2016 5:29:07 AM PDT · by carriage_hill · 28 replies
    NBC10 Philadelphia ^ | Friday, May 6, 2016 | NBC10.com
    The information on your driver’s license is a gold mine and Pennsylvania is cashing in. The NBC10 Investigators found the state has earned more than $157 million since 2010 selling driver records. An NBC10 analysis of the more than 32,000 private companies and government agencies to which PennDOT sold driver information, traced it to every state in the country. The companies include credit agencies, insurance companies and car dealerships. The information PennDOT sold includes names, addresses, and driving histories.
  • Some Thoughts on Privacy - God Is Watching (And so Are Many Others)

    05/06/2016 7:29:35 AM PDT · by Salvation · 3 replies
    Archdiocese of Washington ^ | 05-05-16 | Msgr. Charles Pope
    Some Thoughts on Privacy - God Is Watching (And so Are Many Others) Msgr. Charles Pope • May 5, 2016 • 0 Comments At the bottom of this post is a 2010 CBS news story reporting hat anything you’ve copied on a digital copier going back years is stored on a hard drive inside the copier. These drives are evidently so large that they can store more than 20,000 documents and hundreds of thousands of pages.Hence if you have ever photocopied personal materials (e.g., social security numbers, checking info, personal data) it is likely on that hard drive. The...
  • The Lawmakers Who Control Your Digital Future Are Clueless About Technology

    05/03/2016 9:32:58 AM PDT · by Cyberman · 13 replies
    Gizmondo ^ | 04/28/2016 | William Turton
    It is becoming increasingly clear that Senators Dianne Feinstein and Richard Burr, co-chairs of the Senate Intelligence Committee, don’t have the slightest clue about how encryption works. Good thing they’re currently pushing disastrous legislation that would force tech companies to decrypt things for law enforcement! Today Feinstein and Burr co-authored an op-ed in the Wall Street Journal entitled “Encryption Without Tears,” and wow, it is bad. They have yet again demonstrated a failure to grasp even the most basic principles of technology.... Feinstein and Burr’s bill is not based in any technical reality. Companies like Apple, Microsoft and Google would...
  • Apple Will Analyze iPhone of Teen Missing at Sea (Video at source)

    05/01/2016 10:55:05 AM PDT · by Swordmaker · 24 replies
    ABC News ^ | Apr 29, 2016, 5:18 PM ET | By EMILY SHAPIRO
    Apple will analyze the recovered iPhone that may hold the key to what happened last summer when two Florida teens disappeared on a boating trip, according to an agreement reached by the teens' parents in court today. The recovered iPhone belonged to 14-year-old Austin Stephanos, who went missing while on a boat trip with Perry Cohen, also 14, in July. The Coast Guard led an eight-day search in the Atlantic, covering 50,000 nautical miles. The boys' bodies were never found. But Austin's iPhone was on board when the boys' boat was recovered last month about 100 miles off the coast...
  • US Supreme Court approves expanded hacking powers

    05/01/2016 10:15:00 AM PDT · by Swordmaker · 19 replies
    BBC ^ | April 29, 2016 | BBC Staff
    Snooping on a tablet computerImage copyrightThinkstock The US Supreme Court has approved a rule change that could allow law enforcement to remotely search computers around the world. Previously, magistrate judges could order searches only within the jurisdiction of their court, often limited to a few counties. The US Department of Justice (DoJ) said the change was necessary to modernise the law for the digital age. But digital rights groups say the move expands the FBI's hacking authority. The DoJ wants judges to be able to issue remote search warrants for computers located anywhere that the United States claims jurisdiction, which...
  • FBI paid less than $1M for iPhone hack -- and doesn't know how it works

    04/29/2016 10:57:08 AM PDT · by Swordmaker · 13 replies
    CNet ^ | April 29, 20166:39 AM PDT | by Katie Collins
    Earlier reports suggested the iPhone-unlocking mechanism cost as much as $1.3 million. How much does it cost to hack into an iPhone? Not as much as we thought. The FBI paid less the $1 million to hack into the iPhone 5C of one of the San Bernardino shooters, Reuters reported Friday, a figure lower than some observers had previously estimated. FBI Director James Comey said last week the government had spent more money than he was set to make over the remainder of his tenure running the bureau. This was calculated to be $1.3 million. The software mechanism purchased...
  • Snowden Leaks Accelerated Encryption Technology by 7 Years, U.S. Intelligence Chief Says

    04/25/2016 6:56:57 PM PDT · by nickcarraway · 49 replies
    UPI ^ | April 25, 2016 | Doug G. Ware
    "From our standpoint, it’s not a good thing," Clapper said of accelerated advancements in encryption technology. Whistle-blower Edward Snowden, by leaking classified data two years ago, contributed to the acceleration of sophisticated encryption methods that militants are using to hide their communications, National Intelligence Director James Clapper said Monday. The rapid advancement of commercially available encryption software is proving to be a difficult obstacle in detecting potential threats, he said at a breakfast hosted by the Christian Science Monitor. "From our standpoint, it's not a good thing," he said of the rapidly advancing encryption, adding that the software has had...
  • Ted Cruz knows where you live – if you downloaded his app (his official app leaks personal data)

    04/26/2016 8:12:12 AM PDT · by dayglored · 32 replies
    The Register ^ | Apr 26, 2016 | John Leyden
    US presidential primary apps leak supporters' phone data "...nearly 25 per cent were found to be exposing sensitive data... account details (email address and social media profile names), device phone number, GPS coordinates, and more..." Many US presidential primary apps gather users’ personal information and leave their sensitive data vulnerable to attackers, security researchers at Symantec warn. Data exchanged through many of the apps can be intercepted by attackers and shared with third parties because of weak security practices. Symantec analysed the official mobile app behaviours of top primary candidates, as well as popular unaffiliated apps, using its Norton Mobile...
  • Second U.S. Bid to Force Apple to Unlock Phone Ends in a Whimper (Link only due to Copyright)

    04/23/2016 11:01:39 AM PDT · by Swordmaker · 48 replies
    Bloomberg | April 22, 2016 | By Christie Smyth
    Second U.S. Bid to Force Apple to Unlock Phone Ends in a Whimper . . . a source came forward and provided the passcode. It appears to me that the FBI/DOJ doesn't want to get a precedent from an Appellate Court that does not support their position. Link only due to Bloomberg Copyright; Second U.S. Bid to Force Apple to Unlock Phone Ends in a Whimper
  • Panama Papers: Obama and Globalists Kill Right to Privacy

    04/20/2016 3:04:18 PM PDT · by HomerBohn · 8 replies
    The New American ^ | 4/18/2016 | Alex Newman
    Seizing on the media- and government-manufactured “Panama Papers” brouhaha, governments and globalist organizations announced a wave of new edicts and agreements last week in a plot to kill what remains of financial privacy rights and impose a radical global tax regime on humanity. The Obama administration, the United Nations, the World Bank, the International Monetary Fund, Socialist International, the European Union, and more are fully behind the effort. Of course, as this magazine has documented, those establishment forces, socialist groups, international organizations, tax-funded shills, and bloated governments have been pushing the same dangerous agenda for years without much success. Now...
  • Apple, Google, Microsoft, and others express ‘deep concerns’ over controversial encryption bill

    04/20/2016 10:14:22 AM PDT · by Swordmaker · 18 replies
    The Verge ^ | April 20, 2016 04:37 am | By Amar Toor
    Coalitions representing major tech companies warn of 'unintended consequences' in letter to US senators Four coalitions representing Apple, Microsoft, Google, Amazon, and other major tech companies have published an open letter expressing their concerns over a controversial US bill that would require smartphone makers to decrypt data on demand. The letter, published this week, is addressed to the bill's sponsors, Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA), and signed by four industry groups: Reform Government Surveillance, the Computer and Communications Industry Association, the Internet Infrastructure Coalition, and the Entertainment Software Association. In addition to Apple, Microsoft, Google, and Amazon,...
  • Microsoft sues US over privacy

    04/15/2016 2:25:08 AM PDT · by John W · 3 replies
    AP via Journal Gazette ^ | April 15, 2016 | Brandon Bailey
    SAN FRANCISCO – In the latest clash over privacy rights in the digital age, Microsoft is suing the U.S. government over a federal law that allows authorities to examine customer emails or online files without the individual’s knowledge. The lawsuit comes as the tech industry is increasingly butting heads with U.S. officials over the right to view a wide range of information – including emails, photos and financial records – that customers are storing on smartphones and in so-called “cloud” computing centers. Microsoft says the U.S. Justice Department is abusing a decades-old law, the Electronic Communications Privacy Act, to obtain...
  • Apple iPhone unlocking maneuver likely to remain secret

    04/14/2016 11:06:38 PM PDT · by Swordmaker · 9 replies
    Reuters | April 13, 2016 | BY JOSEPH MENN AND MARK HOSENBALL
    <p>The company that helped the FBI unlock a San Bernardino shooter's iPhone to get data has sole legal ownership of the method, making it highly unlikely the technique will be disclosed by the government to Apple or any other entity, Obama administration sources said this week.</p>
  • California phone decryption bill defeated

    04/14/2016 1:50:05 PM PDT · by Swordmaker · 9 replies
    The Sacramento Bee (AP) ^ | April 13th, 2016 | BY JEREMY B. WHITE
    A Sacramento woman uses her phone on Thursday, Sept. 11, 2014. Hector Amezcua hamezcua@sacbee.com A national debate over smartphone encryption arrived in Sacramento on Tuesday as legislators defeated a bill penalizing companies that don’t work with courts to break into phones, siding with technology industry representatives who called the bill a dangerous affront to privacy. The bill did not receive a vote, with members of the Assembly Committee on Privacy and Consumer Protection worrying the measure would undermine data security and impose a logistically untenable requirement on California companies. Disagreement over the balance between privacy and public safety exploded into...
  • Line By Line, How The US Anti-Encryption Bill Will Kill Our Privacy, Security

    04/14/2016 7:59:33 AM PDT · by Cyberman · 9 replies
    The Register ^ | 04/13/2016 | Iain Thomson
    Analysis In the wake of the FBI's failed fight against Apple, Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA) have introduced a draft bill that would effectively ban strong crypto. The bill would require tech and communications companies to allow law enforcement with a court order to decrypt their customers' data. Last week a draft copy of the bill, dubbed the Compliance with Court Orders Act of 2016, was leaked, but the new version is even worse than the discussion draft.... The senators want to have their cake--by requiring tech companies to protect their customers' data--and eat it too--by insisting...
  • Uber says gave U.S. agencies data on more than 12 million users

    04/12/2016 1:22:16 PM PDT · by Oldeconomybuyer · 8 replies
    Reuters ^ | April 12, 2016 | By Narottam Medhora
    Uber Technologies Inc on Tuesday released its first ever transparency report detailing the information requested by not only U.S. law enforcement agencies, but also by regulators. The ride-sharing company said that between July and December 2015, it had provided information on more than 12 million riders and drivers to various U.S. regulators and on 469 users to state and federal law agencies. A large number of the law enforcement requests were related to fraud investigations or the use of stolen credit cards, according to the report. Uber said it had not received any national security letters or orders under the...
  • HHS Says Health Records Should Communicate With Each Other. What Does That Mean?

    04/11/2016 4:37:24 AM PDT · by markomalley · 20 replies
    Nextgov ^ | 4/8/16 | Mohana Ravindranath
    When a patient moves from one health system to another, there’s no guarantee his or her electronic medical records are compatible with the new system’s. The Department of Health and Human Services wants to change that, with a number of efforts aimed at making electronic health record technology more “interoperable.” But how does a health system measure “interoperability,” and how does the department know if it’s successful? HHS doesn’t know the answer -- and it’s looking to the public for help. In a new request for information, HHS is asking for input on metrics that could measure interoperability. The eventual...
  • Gangs, drugs, and guns keep the pressure on Apple

    04/10/2016 2:15:26 PM PDT · by Swordmaker · 6 replies
    Digital Trends ^ | April 9, 2016 | By Bruce Brown
    p>Apple’s issues with the Department of Justice and U.S. courts haven’t ended. The FBI was able to crack the San Bernadino, CA terrorist’s iPhone 5c with outside help and subsequently withdrew its legal action. U.S. District Courts in Boston and New York have ongoing investigations with gangs, guns, and drugs and the DoJ wants Apple’s help, as reported by  Yahoo! UK Finance. Court papers were released Friday from a February 1 filing in Boston, during which a judge ordered Apple to unlock a phone seized from an alleged gang member.  This order took place before February 16, when Apple was...
  • FBI Director Explains Why He Puts Tape Over His Webcam

    04/10/2016 5:44:33 AM PDT · by JACKRUSSELL · 48 replies
    The Daily Caller ^ | April 9, 2016 | Jonah Bennett
    During a Wednesday speech on privacy at Kenyon College, FBI Director James Comey said he’s anxious enough about the prospect of covert surveillance that he places tape over his computer’s webcam. [...] “I saw something in the news, so I copied it. I put a piece of tape — I have obviously a laptop, personal laptop — I put a piece of tape over the camera,” Comey said. “Because I saw somebody smarter than I am had a piece of tape over their camera.” [...]