You are here: Fairness.com > Resources > Law & Justice > Civil Rights / Equal Protection > Privacy: Other > Anonymity/Surveillance/Identity Theft/Confidentiality

Anonymity/Surveillance/Identity Theft/Confidentiality

Search only Anonymity/Surveillance/Identity Theft/Confidentiality, and everything underneath:

Articles and Resources

560 Articles and Resources. Go to:  [Next 50]   [End]

Date Fairness.com Resource Read it at:
May 26, 2016 Billionaire Peter Thiel’s attack on Gawker is called “champerty,” and it used to be illegal

QUOTE: Billionaire Peter Thiel appears to be helping to fund Hulk Hogan’s lawsuit against Gawker Media. But the lawsuit and its outcome are a mere sideshow to the main story, which is that this case is a terrifying development for those of us who value a free, democratic media.

Quartz
Jan 17, 2014 Connected TVs, fridge help launch global cyberattack

QUOTE: a global cyberattack launched from more than 100,000 everyday consumer gadgets such as home-networking routers, televisions and at least one "smart" refrigerator. It's being called possibly the first proven cyberattack to originate from connected appliances -- the so-called "Internet of Things."

CNN (Cable News Network)
Jan 17, 2014 Obama Outlines Calibrated Curbs on Phone Spying

QUOTE: in a speech at the Justice Department that seemed more calculated to reassure audiences at home and abroad than to force radical change, Mr. Obama defended the need for the broad surveillance net assembled by the N.S.A. And he turned to Congress and the intelligence agencies themselves to work out the details of any changes.

New York Times
Dec 16, 2013 Judge Questions Legality of N.S.A. Phone Records

QUOTE: A federal district judge ruled on Monday that the National Security Agency program that is systematically keeping records of all Americans’ phone calls most likely violates the Constitution, describing its technology as “almost Orwellian” and suggesting that James Madison would be “aghast” to learn that the government was encroaching on liberty in such a way.

New York Times
Oct 29, 2013 Lawmakers propose USA Freedom Act to curb NSA’s powers

QUOTE: Dozens of lawmakers from both parties introduced legislation Tuesday to rein in the National Security Agency's spying powers. The USA Freedom Act, which has 16 co-sponsors in the Senate and more than 70 in the House, would end the agency's massive phone record collection program — one of the most controversial revelations from the leaks by Edward Snowden.

The Hill
Oct 28, 2013 Mozilla sheds a light(beam) on Web privacy: Lightbeam plug-in for Firefox shows who's watching when you log into your favorite sites, encourages users to anonymously submit tracking data

QUOTE: [Lightbeam for Firefox] add-on shows, graphically, how the sites you visit interact with other sites -- and how tracking information may be gathered in the process, often from multiple sites at once without your knowledge.

InfoWorld
Oct 01, 2013 Google Accused of Wiretapping in Gmail Scans

QUOTE: Google, must defend itself against accusations that it is illegally wiretapping in the course of its everyday business — gathering data about Internet users and showing them related ads. The accusations, made over several years in various lawsuits that have been merged into two separate cases, ask whether Google went too far in collecting user data in Gmail and Street View, its mapping project.

New York Times
Sep 30, 2013 Snowden says his “sole intention” was to prompt national security debate: Whistleblower advocate reads statement on Snowden's behalf before EU committee.

QUOTE: “I thank the European Parliament and the LIBE [Civil Liberties, Justice, and Home Affairs] Committee for taking up the challenge of mass surveillance,” said Jesselyn Radack, who read the statement for Snowden.

Ars Technica
Sep 27, 2013 NSA: Some used spying power to snoop on lovers

QUOTE: The National Security Agency's internal watchdog detailed a dozen instances in the past decade in which its employees intentionally misused the agency's surveillance power, in some cases to snoop on their love interests...there are two additional incidents now under investigation and another allegation pending that may require an investigation.

CNN (Cable News Network)
Sep 26, 2013 Is Yahoo Doing Enough To Protect Sensitive Emails?

QUOTE: ...Yahoo announced that it would give away inactive email addresses and Yahoo IDs. They would only do so if the address had been inactive for at least a year. The idea was that Yahoo’s loyal users would be able to get more desirable email addresses....People began criticizing Yahoo’s move pretty much right after it was announced in early summer. Security experts warned of privacy and cybersafety issues that could arise from the initiative.

WebProNews
Aug 02, 2013 A Cheap Spying Tool With a High Creepy Factor

QUOTE: You could spy on your ex-lover, by placing the sensor boxes near the places the person frequents, or your teenage child, or the residents of a particular neighborhood....“I haven’t done a full deployment of this because the United States government has made a practice of prosecuting security researchers,”...

New York Times
Jul 28, 2013 Momentum Builds Against N.S.A. Surveillance

QUOTE: a plan to defund the National Security Agency’s telephone data collection program fell just seven votes short of passage. Now, after initially signaling that they were comfortable with the scope of the N.S.A.’s collection of Americans’ phone and Internet activities, but not their content, revealed last month by Edward J. Snowden, lawmakers are showing an increasing willingness to use legislation to curb those actions.

New York Times
Jul 11, 2013 Internet trolls: What to do about the scourge of the Web?

QUOTE: "You can't easily taxonomize trolling behavior," she said. "A lot of trolling is about mischief and harmless, silly pranks. But really extreme behavior -- attacking friends and families of kids who have died, for example -- that seems to be a behavior with a different motivation."

CNN (Cable News Network)
Jun 27, 2013 NSA collected US email records in bulk for more than two years under Obama

QUOTE: The Obama administration for more than two years permitted the National Security Agency to continue collecting vast amounts of records detailing the email and internet usage of Americans...under the program, launched in 2001, a federal judge sitting on the secret surveillance panel called the Fisa court would approve a bulk collection order for internet metadata "every 90 days"... The collection of these records began under the Bush administration's wide-ranging warrantless surveillance program, collectively known by the NSA codename Stellar Wind.

Guardian Unlimited
Jun 23, 2013 Anger mounts after Facebook's 'shadow profiles' leak in bug

QUOTE: Facebook said Friday it fixed a bug that exposed contact info for over six million accounts. The admission revealed its 'shadow profile' data collection activities, and users are furious.

ZDnet
May 31, 2013 Hunch About Bloomberg Brought Rivals Together (Dealbook)

QUOTE: Goldman Sachs and JPMorgan Chase are usually bitter rivals, competing for lucrative banking and trading business. But one day in April, the Wall Street titans found common ground: frustration with the Bloomberg news and financial data empire....they believed that Bloomberg reporters were using the company’s data terminals to monitor Wall Street sources — the executives at the banks that were spending thousands of dollars a year to use the data-rich machines.

New York Times
May 01, 2013 Google Glass, the beginning of wearable surveillance

QUOTE: imagine that millions of Americans walk around each day wearing the equivalent of a drone on their head: a device capable of capturing video and audio recordings of everything that happens around them. And imagine that these devices upload the data to large-scale commercial enterprises that are able to collect the recordings from each and every American and integrate them together to form a minute-by-minute tracking of the activities of millions....default mode is for all data to be automatically uploaded to cloud servers, where aggregation and back-end analytic capacity resides. So, who owns and what happens to the user's data?

CNN (Cable News Network)
Mar 16, 2013 The Internet is a surveillance state

QUOTE: ...we're being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads....Increasingly, what we do on the Internet is being combined with other data about us. Unmasking Broadwell's identity involved correlating her Internet activity with her hotel stays.

CNN (Cable News Network)
Mar 08, 2013 Skype's Been Hijacked in China, and Microsoft Is O.K. With It

QUOTE: a conflict between Microsoft’s advocacy of privacy rights and its role in surveillance....When Internet users in China try to access Skype.com, they’re diverted to the TOM-Skype site. While the Chinese version bears the blue Skype logo—and provides services for online phone calls and text chats—it’s a modified version of the program found elsewhere in the world. The surveillance feature in TOM-Skype conducts the monitoring directly on a user’s computer...

BusinessWeek
Feb 21, 2013 Steps to Guard Against Identity Fraud

QUOTE: The annual report found that the incidence of identity theft overall was about 5.3 percent of consumers, compared with 4.9 percent the year before. Much of the increase was driven by so-called “new account” fraud, involving the unauthorized opening of general use or store brand credit cards, as well as “account takeover” fraud, in which the identity thieves may change consumers’ contact information — like their mailing addresses — to gain illegal access to their accounts

New York Times
Nov 15, 2012 The Real Reason You Should Care About the Petraeus Affair: Privacy

QUOTE: Once you've opened an email or your Facebook account, you've provided your personal information to a third party. The government can then ask that third party—Google, Yahoo, Facebook, Friendster, or whatever—for your information, and they don't necessarily need a warrant. The Constitution protects you from unreasonable search and seizure by the government. It doesn't stop third parties from sharing personal information you willingly give them.

Mother Jones
Jul 13, 2012 That’s No Phone. That’s My Tracker.

QUOTE: Thanks to the explosion of GPS technology and smartphone apps, these devices are also taking note of what we buy, where and when we buy it, how much money we have in the bank, whom we text and e-mail, what Web sites we visit, how and where we travel, what time we go to sleep and wake up — and more. Much of that data is shared with companies that use it to offer us services they think we want.

New York Times
Mar 31, 2012 Police Are Using Phone Tracking as a Routine Tool

QUOTE: Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show. The practice has become big business for cellphone companies, too...

New York Times
Mar 15, 2012 For Apple, Pressure Builds Over App Store Fraud

QUOTE: as reflected by hundreds of online complaints saying that Apple’s iTunes Store, and in particular its App Store, which the company portrays as the safest of shopping environments, is not so secure....It’s a change for Apple, which was once criticized for its micromanaging of the App Store. Now the problem is not too much control, but too little.

New York Times
Feb 29, 2012 Stop the ‘Do Not Track’ Madness

QUOTE: There are certainly aspects of our lives where genuinely intrusive practices can have serious detrimental impacts. But with so much in our world that needs attention, a misguided focus on web advertising personalization is not only irrational, but could ultimately undermine the “free services” basis of the web in ways that we could very soon come to severely regret.

Wired
Feb 17, 2012 Drones Set Sights on U.S. Skies

QUOTE: A new federal law, signed by the president on Tuesday, compels the Federal Aviation Administration to allow drones to be used for all sorts of commercial endeavors... Local police and emergency services will also be freer to send up their own drones. But while businesses, and drone manufacturers especially, are celebrating the opening of the skies to these unmanned aerial vehicles, the law raises new worries about how much detail the drones will capture about lives down below — and what will be done with that information.

New York Times
Jan 26, 2012 How does Google's new privacy policy compare?

QUOTE: Much ado has been made about Google's new overarching privacy policy, but the company's not doing anything much different than Facebook, Microsoft, Apple, or Yahoo

InfoWorld
Jan 23, 2012 Justices Say GPS Tracker Violated Privacy Rights

QUOTE: The Supreme Court on Monday ruled unanimously that the police violated the Constitution when they placed a Global Positioning System tracking device on a suspect’s car and monitored its movements for 28 days. A set of overlapping opinions in the case collectively suggested that a majority of the justices are prepared to apply broad privacy principles to bring the Fourth Amendment’s ban on unreasonable searches into the digital age...

New York Times
Dec 23, 2011 CIA report: No issue with spy agency's partnership with N.Y. police

QUOTE: the agency helped police conduct covert surveillance on Muslims living in New York, raising broader civil liberty questions about the legality of the methods and scope of federal efforts to counter terrorism.

CNN (Cable News Network)
Nov 29, 2011 British Inquiry Is Told Hacking Is Worthy Tool

QUOTE: After Paul McMullan, a former deputy features editor at Rupert Murdoch’s now-defunct News of the World tabloid, had finished his jaw-droppingly brazen remarks at a judicial inquiry on Tuesday, it was hard to think of any dubious news-gathering technique he had not confessed to...

New York Times
Nov 23, 2011 Police Tracking Your Every Move With License Plate Readers: Is a law enforcement aid worth sacrificing personal liberties?

QUOTE: These plate readers in D.C. take 1,800 images per minute, every one of which is stored in a database. Basically, these plate readers have made it possible for police to track everyone's movements as they move across the city. These plate readers and the subsequent database of image captures has tipped the privacy concerns of some -- notably the American Civil Liberties Union.

WebProNews
Nov 19, 2011 Document Trove Exposes Surveillance Methods (Censorship Inc.)

QUOTE: a retail market for surveillance tools has sprung up from "nearly zero" in 2001 to about $5 billion a year, said Jerry Lucas, president of TeleStrategies Inc., the show's operator. Critics say the market represents a new sort of arms trade supplying Western governments and repressive nations alike. "The Arab Spring countries all had more sophisticated surveillance capabilities than I would have guessed..."

Wall Street Journal, The (WSJ)
Nov 08, 2011 Which Way Privacy? The Supreme Court asks whether the government can put a GPS device on your car without a warrant.

QUOTE: The warrant expired after 10 days, but the police nevertheless used the GPS to monitor everywhere he drove, every 10 seconds, for 28 days....Jones tried to have his conviction set aside, arguing that warrantless GPS surveillance violated his Fourth Amendment right to be free of unreasonable government searches and seizures. The government replied that GPS tracking is no different from police observing activity in public spaces and roadways, which is not protected under the Constitution.

Slate
Aug 01, 2011 Death & Taxes & Identity Theft

QUOTE: National Taxpayer Advocate, Nina Olson testified before the House Ways and Means subcommittee on Oversight, suggesting the [Death Master File (DMF)] provides significant opportunities for identity thieves to commit tax fraud and should be limited.

Forbes
Jun 20, 2011 Upending Anonymity, These Days the Web Unmasks Everyone

QUOTE: The collective intelligence of the Internet’s two billion users, and the digital fingerprints that so many users leave on Web sites, combine to make it more and more likely that every embarrassing video, every intimate photo, and every indelicate e-mail is attributed to its source, whether that source wants it to be or not. This intelligence makes the public sphere more public than ever before and sometimes forces personal lives into public view.

New York Times
Jun 12, 2011 F.B.I. Agents Get Leeway to Push Privacy Bounds

QUOTE: The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household trash or use surveillance teams to scrutinize the lives of people who have attracted their attention.

New York Times
Jun 10, 2011 U.S. Senators Want to Shut Down Bitcoins, Currency of Internet Drug Trade

QUOTE: The tone of the senators' letter comes off as though they themselves don't know what entity they want to destroy or how to go about it. Bitcoins, by nature and general practice, are harmless; they're merely an Internet-based alternative to traditional federal banks. Silk Road is what the U.S. government is really after.

PC World
Jun 07, 2011 Companies Offer Free Versions of Identity Theft Services

QUOTE: We here at Bucks typically advocate creating your own free monitoring system....But the idea of a service that is free and automatic piqued our interest.

New York Times
May 16, 2011 Questions Raised About a Code of Silence

QUOTE: the arrest of Dominique Strauss-Kahn is once again challenging the assumption that the private lives of the rich, famous and powerful are off limits to public scrutiny. That the most serious accusation against Mr. Strauss-Kahn is attempted rape, and not just an indiscretion involving a consensual sexual relationship, only adds to a sense on the part of some people in France that the curtain of privacy needs to be lifted.

New York Times
May 06, 2011 ID Theft Tool That Sony Isn’t Using

QUOTE: A surveillance service is reactive. By the time you get an alert from one, thieves may have already done a lot of damage. A security freeze, also known as a credit freeze, is proactive.

New York Times
Apr 26, 2011 Sony Says PlayStation Hacker Got Personal Data

QUOTE: An “unauthorized person” had obtained personal information about account holders, including their names, addresses, e-mail addresses, and PlayStation user names and passwords. Sony warned that other confidential information, including credit card numbers, could have been compromised.

New York Times
Mar 31, 2011 Google making app that would identify people's faces

QUOTE: Google plans to introduce a mobile application that would allow users to snap pictures of people's faces in order to access their personal information... As Google's size and clout grow, so does the chorus of critics who say the company frequently encroaches on people's privacy... North said she believes Google has a tendency to push boundaries in order to outdo competitors. The service could push too far by, say, aggregating every photo of a user it finds on the internet without giving that user an easy way to erase certain images.

CNN (Cable News Network)
Mar 27, 2011 Ethical Quandary for Social Sites

QUOTE: The photos had been removed because he did not take the images himself, a violation of the site’s community rules… “That is totally ludicrous,” he said. “Flickr is full of accounts with photos that people did not take themselves.” Human rights advocates have also criticized Facebook for not being more flexible with some of its policies, specifically its rule requiring users to create accounts with their real names.

New York Times
Mar 04, 2011 Hacked e-mails show Web is increasingly useful tool in dirty-tricks campaigns

QUOTE: But many experts say the shadowy political intelligence business has become larger and more sophisticated as corporations, trade groups and political parties increasingly turn to computer sleuths to monitor and, in some cases, harass their detractors. The work almost always goes undetected and has been made easier with the rise of computer networks and social media sites with relatively lax safeguards.

Washington Post
Jan 28, 2011 Republican Congressman Proposes Tracking Freedom of Information Act Requests

QUOTE: Mr. Issa, a California Republican and the new chairman of the House Committee on Oversight and Government Reform, says he wants to make sure agencies respond in a timely fashion to Freedom of Information Act requests and do not delay them out of political considerations. But his extraordinary request worries some civil libertarians.

New York Times
Dec 20, 2010 Monitoring America (Top Secret America)

QUOTE: Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators. The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing.

Washington Post
Oct 27, 2010 Satisfied with Google's promise to restrain Street View, FTC drops privacy-breach probe

QUOTE: The federal government has ended an inquiry into a privacy breach involving Google's Street View service, satisfied with the company's pledge to stop gathering e-mail, passwords and other information from residential WiFi networks as it rolls through neighborhoods.

Washington Post
Jun 18, 2010 Supreme Court rules on employer monitoring of cellphone, computer conversations

QUOTE: A hesitant Supreme Court waded cautiously into a question that arises daily in workplaces and offices across the country: whether employers have the right to look over the shoulders of workers who use company computers and cellphones for personal communication. In the first ruling of its kind, the justices said they do, as long as there is a "legitimate work-related purpose" to monitor them.

Washington Post
May 21, 2010 Social networks may be sharing your info with advertisers

QUOTE: several social networking sites are sharing, with advertisers, information that can be used to identify individuals....In the case of social networking sites, the information on the last page viewed often reveals user names or profile ID numbers that could potentially be used to look up the individuals.

InfoWorld
May 20, 2010 The Identity Theft Threat From Copiers

QUOTE: Why in the world would Congress provide some consumers with free access to credit scores, but not others? This could happen under a measure being considered by lawmakers that would grant free access to people whose credit scores were used to deny them credit or a job.

New York Times

560 Articles and Resources. Go to:  [Next 50]   [End]