Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $22,936
28%  
Woo hoo!! And we're now over 28%!! Thank you all very much!! God bless.

Keyword: privacy

Brevity: Headers | « Text »
  • Obama's Demand For Online Privacy Ends At ObamaCare

    01/21/2015 4:13:54 AM PST · by IBD editorial writer · 4 replies
    Investor's Business Daily ^ | 01/20/2015 | IBD Staff
    Information Leak: President Obama says he wants to improve cybersecurity and privacy. If he actually cared about them, he'd shut down healthcare.gov, which lets dozens of companies collect data on unwitting users. In a speech meant to preview part of his State of the Union address, Obama said: "As Americans, we shouldn't have to forfeit our basic privacy when we go online to do our business." Nice sentiment. But it's not being upheld by his own ObamaCare website. As the AP reported on Tuesday, Healthcare.gov has at least 50 third-party companies that have "embedded connections" to the site, which means...
  • Government health care website quietly sharing personal data (Pelosi knew)

    01/20/2015 7:12:52 PM PST · by Libloather · 7 replies
    AP ^ | 1/20/15 | RICARDO ALONSO-ZALDIVAR, JACK GILLUM
    WASHINGTON (AP) - The government's health insurance website is quietly sending consumers' personal data to private companies that specialize in advertising and analyzing Internet data for performance and marketing, The Associated Press has learned. The scope of what is disclosed or how it might be used was not immediately clear, but it can include age, income, ZIP code, whether a person smokes, and if a person is pregnant. It can include a computer's Internet address, which can identify a person's name or address when combined with other information collected by sophisticated online marketing or advertising firms. The Obama administration says...
  • Poll: 63% now say it’s more important for feds to investigate terror threats than privacy

    01/19/2015 4:53:19 PM PST · by SeekAndFind · 21 replies
    Hotair ^ | 01/19/2015 | AllahPundit
    WaPo’s offering this as evidence that the public’s trending back towards security and away from privacy after Snowden’s heyday in 2013. It’s true, there is more support now for the former than there was 14 months ago; if Rand Paul was thinking of making opposition to the NSA a key piece of his campaign, this might give him pause. I think it’s more interesting, though, to see how strongly pro-security the public remained even after the surveillance bombshells first started bursting. Today, 63 percent say investigating terror is more important versus 32 percent who say it’s more important to...
  • 10 Harmful Ways Gov’t Will Use Your Data

    12/17/2014 8:08:41 PM PST · by TurboZamboni · 23 replies
    HIPAA is why there's a new plan to share your data. A 28-page federal document proposes to share your medical records with 37 federal agencies. (See graphic of the week below). The deadline for public comments on this sweeping intrusion is Friday, February 6, 2015. Go here to tell them what you think. Without privacy, you have no control. He who holds the data makes the rules. The Obama administration is gathering your data to seize control of your doctor. The 2009 mandate for every doctor to have electronic health records (EHRs) was considered foundational to imposing Obamacare. Even though...
  • The Trouble with Tor

    12/17/2014 3:45:46 AM PST · by ShadowAce · 7 replies
    eSecurity Planet ^ | 16 December 2014 | Paul Rubens
    For over a decade, people all over the world have used Tor (formerly known as the Onion Router) to protect their privacy. The U.S. Naval Research Laboratory developed the system using open source technology, to protect U.S. government communications. It is used by people living under restrictive regimes who want to access forbidden information or data on the Internet, whistle-blowers and dissidents who want to communicate with journalists, and anyone who wants to use the Internet without being tracked or to publish information on the Net without compromising their privacy.How Tor Works Tor works by sending traffic from its source...
  • Oprah on Sony email conversations [The RANKEST of Hypocrisy Alert!]

    12/15/2014 12:23:48 PM PST · by SoFloFreeper · 21 replies
    kcci.com ^ | 12/15/14
    Oprah Winfrey says she wishes people wouldn't rush to judge private conversations between Sony executives that were revealed in a recent hack. I would hope that we would not stand in judgement--in such harsh judgement--of a moment in time where somebody was hacked and their private conversations were put before the world. Because if we were to look at your computer and everybody else's computer...I try to write everything as though it's going to show up in the New York Times. But there are things that you say in your private conversations with your friends and your colleagues that you...
  • Judge: Give NSA unlimited access to digital data

    12/06/2014 10:32:28 AM PST · by RememberRonnie · 42 replies
    PC World ^ | 12-04-2014 | Grant Gross
    The U.S. National Security Agency should have an unlimited ability to collect digital information in the name of protecting the country against terrorism and other threats, an influential federal judge said during a debate on privacy. "I think privacy is actually overvalued," Judge Richard Posner, of the U.S. Court of Appeals for the Seventh Circuit, said during a conference about privacy and cybercrime in Washington, D.C., Thursday. "Much of what passes for the name of privacy is really just trying to conceal the disreputable parts of your conduct," Posner added. "Privacy is mainly about trying to improve your social and...
  • Congress Quietly Decides To Delete Key NSA Reform In CRomnibus Agreement

    12/04/2014 7:54:43 PM PST · by RememberRonnie · 12 replies
    Techdirt ^ | 12-03-2014 | Mike Masnick
    You may recall, back in June, that there was a key House vote that took NSA supporters by surprise. An amendment to the Defense Appropriations bill pushed by a bi-partisan team of Thomas Massie, Jim Sensenbrenner and Zoe Lofgren passed overwhelmingly, with a plan to slam the door shut on questionable NSA "backdoor searches" (as described in detail earlier). The House voted 293 to 123, making it a pretty clear and overwhelming statement that Congress did not, in fact, support such practices by the NSA. But, of course, the NSA gets the last laugh. As part of the big lameduck...
  • AT&T dumps smartphone tracking system; consumers can opt-out

    11/16/2014 12:13:18 PM PST · by BenLurkin · 4 replies
    nhv.us ^ | on 16 Nov 2014 | John DiPietro
    The tracking mechanism - Relevant Advertising - put in place by AT&T essentially added an undetectable identification number to all Internet traffic on the cellphones of the users. Since the identification number helped mark all the sites visited by AT&T customers, advertisers could build up profiles on users by following the website trail he or she would visit. ... Revealing that the use of the controversial technology has been stopped by AT&T, company spokeswoman Emily Edmonds said that AT&T subscribers who do not want to be included in the carrier's new smartphone tracking system have the choice of opting out...
  • Facebook’s New Privacy Policy Means Users Shouldn’t Hide Anything

    11/15/2014 12:39:40 PM PST · by BenLurkin · 26 replies
    thenextdigit.com ^ | November 15, 2014 | Wayne Murphy
    Facebook is again taking a dig at your privacy. With the ever changing privacy policies, the manager of privacy and public policies at Facebook, Mr. Matt Scutari literally mocks the privacy of users to a certain extent. In fact, the manager of privacy and public policies at Facebook even condemn the privacy lovers by stating that Facebook does not even consider the option of privacy of its users for themselves. Facebook considers that there is absolutely no sense in allowing the users to hide stuff from Facebook. ... According to a statement by Mr. Matt Scutari, the manager of privacy...
  • AT&T stops adding Web tracking codes on cellphones

    11/14/2014 4:18:20 PM PST · by aimhigh · 10 replies
    Phys Org ^ | 11/14/2014 | Jack Gillum
    AT&T Mobility, the second-largest U.S. cellular provider, said Friday it is no longer attaching hidden Internet tracking codes to data transmitted from its users' smartphones. The practice made it nearly impossible to shield its subscribers' identities online. The change by AT&T essentially removes a hidden string of letters and numbers that are passed along to websites that a consumer visits. It can be used to track subscribers across the Internet, a lucrative data-mining opportunity for advertisers that could still reveal users' identities based on their browsing habits. Verizon Wireless, the country's largest mobile firm, said Friday it still uses this...
  • HHS Issues Special HIPAA Bulletin on Ebola Privacy

    11/10/2014 3:57:27 PM PST · by wtd · 7 replies
    Law360 ^ | 11/10/2014 | Erica Teichert
    HHS Issues Special HIPAA Bulletin on EbolaPrivacyLaw360, New York (November 10, 2014, 6:24 PM ET) -- The U.S. Department of Health and Human Services on Monday issued a bulletin reminding health care centers and others about what information can and cannot be disclosed about Ebola patients...
  • Judge Rules Police Can Make You Show them the Contents of Your Phone

    11/04/2014 3:41:14 PM PST · by Blood of Tyrants · 31 replies
    Tea Party News Network ^ | 11/3/14 | Jennifer Burke
    People typically view their cell phones as personal property that police would need a search warrant to access, just like their home. But, a circuit court judge has ruled that police can force an individual to divulge the contents of their phone if the phone utilizes a certain growing technology. While many are excited about the fingerprint technology system to unlock your phone that is available on such phones as the iPhone 5s, 6, and 6 Plus, as well as the Samsung Galaxy S5 and others, using that particular feature on the phone could lead you to lose what you...
  • Police can require cellphone fingerprint, not pass code

    10/31/2014 10:15:10 PM PDT · by Reno89519 · 16 replies
    The Virginian-Pilot ^ | October 30, 2014 | Elisabeth Hulette
    A Circuit Court judge has ruled that a criminal defendant can be compelled to give up his fingerprint, but not his pass code, to allow police to open and search his cellphone. The question of whether a phone's pass code is constitutionally protected surfaced in the case of David Baust, an Emergency Medical Services captain charged in February with trying to strangle his girlfriend. Prosecutors had said video equipment in Baust's bedroom may have recorded the couple's fight and, if so, the video could be on his cellphone. They wanted a judge to force Baust to unlock his phone, but...
  • Drones posing global security issues

    10/28/2014 9:09:50 PM PDT · by 2ndDivisionVet · 3 replies
    The Straits Times ^ | October 29, 2014 | Jonathan Eyal
    Unmanned aerial vehicles (UAV), or drones as they are often called, have had a good press recently: from humanitarian rescues to the promotion of free trade, these remote-controlled, pilotless robots are the heroes of the moment. Still, their biggest use continues to be for military purposes. And although the deployment of drones in military operations is nowhere near as morally objectionable as some critics allege, the inevitable proliferation of UAVs does raise some serious security questions. The real challenge is not to prevent nations or corporations from acquiring them but, rather, to adopt international safeguards on how independent such drones...
  • Report Reveals Wider Tracking of Mail in U.S.

    10/28/2014 9:12:14 AM PDT · by Brother Cracker · 13 replies
    times ^ | OCT. 27, 2014 | RON NIXON
    WASHINGTON — In a rare public accounting of its mass surveillance program, the United States Postal Service reported that it approved nearly 50,000 requests last year from law enforcement agencies and its own internal inspection unit to secretly monitor the mail of Americans for use in criminal and national security investigations. The number of requests, contained in a 2014 audit of the surveillance program by the Postal Service’s inspector general, shows that the surveillance program is more extensive than previously disclosed and that oversight protecting Americans from potential abuses is lax. The audit, along with interviews and documents obtained by...
  • Parent says school assignment to take inventory of medicine cabinet invaded privacy

    10/25/2014 8:30:24 AM PDT · by lowbridge · 43 replies
    http://fox13now.com ^ | october 23, 2014 | max roth
    Students at a Mapleton Junior High School in Utah County were asked to take inventory of the things inside their family medicine cabinet and then turn that list into their health teacher. A parent, Onika Nugent, was not pleased with the assignment, so she posted the assignment on Facebook and sent a note to the teacher and the principal. She shared a portion of the letter she sent school officials: “I said, ‘Although it may be a good idea for parents to do an inventory of their medicine cabinet, I believe it is inappropriate for students to counsel their parents,...
  • LAWMAKERS SKEPTICAL OF FBI’S PUSH FOR ENCRYPTION BACK DOORS

    10/20/2014 11:39:03 AM PDT · by e-gadfly · 6 replies
    NextGov ^ | 2014-10-17 | Brendan Sasso
    Tech companies like Apple and Google want to make the data customers carry on their smartphones and computers more secure, safe from the prying eyes of spies and identity thieves alike. But law-enforcement officials--from the FBI to local police--see those same devices as treasure troves of evidence.... "I'd be surprised if more than a handful of members would support the idea of backdooring Americans' personal property," Sen. Ron Wyden, an Oregon Democrat and vocal privacy advocate, said.... And a House Democratic aide said that staffers have been in touch with the FBI on the issue but that Congress is unlikely...
  • FBI Director Warns Google and Apple "If You Don't Decrypt Phones, We'll Do It For You"

    10/19/2014 12:42:34 PM PDT · by Kaslin · 111 replies
    Townhall.com ^ | October 19 | Mike Shedlock
    The Fourth Amendment to the US Constitution is crystal clear in meaning. The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. FBI Director, James Comey, an Obama appointment, does not give a damn what the Constitution says. In a recent speech, Comey warns If Apple and Google Won't Decrypt Phones, We'll Force Them To Everyone...
  • FBI Head: Apple, Google Encryption Leads to 'Dark Place'

    10/17/2014 4:17:20 PM PDT · by e-gadfly · 22 replies
    Tom's Guide ^ | 2014-10-16 | Paul Wagenseil
    FBI Director James Comey gave a strong speech today (Oct. 16) explaining why law enforcement should have access to data on encrypted smartphones. But he failed to cite any examples in which such law-enforcement access could have made the difference between life and death.... The Communications Assistance for Law Enforcement Act (CALEA) of 1994 mandates that telecommunications companies must give police the ability to listen in on telephone conversations. CALEA covers landlines and cellular carriers, and was expanded in 2004 to cover Voice over Internet Protocol (VoIP) providers and broadband Internet service providers. For the past few years, the FBI...