-
New technology uses encrypted CCTV to protect the innocent
San Francisco-based 3VR developed a technology that uses face-recognition algorithms to home in on known faces in crowds — but an image-scrambling algorithm then blurs the faces and bodies of those who are not of interest to the authorities
-
-
DHS's Einstein 3 plans raise questions
DHS wants to use Einstein 3 to bolster cybersecurity; the deployment of this powerful program has its critics, though
-
-
Criminals can figure out an individual's Social Security number
Researchers show that statistical techniques can be used to determine an individual’s Social Security number, based on the person’s birth date and birth location
-
-
Method discovered to process encrypted data without knowing its content
IBM researcher solves thorny mathematical problem that has confounded scientists since the invention of public-key encryption several decades ago; the breakthrough makes possible the analysis of encrypted information — data that has been intentionally scrambled — without sacrificing confidentiality
-
-
U.K. government to give up on massive Internet snoop scheme
The Home Office admits that its IMP (Interception Modernization Program) — the cost of which was to be £2 billion over ten years — cannot be realized because the technology does not yet exist
-
-
China uses stolen software in its new Internet censorship scheme
The Chinese government will impose strict Internet censorship beginning 1 July; the software the Chinese will use for filtering Web sites was stolen from California-based Solid Oak Software; the Chinese piracy was exceedingly clumsy: a file containing a 2004 Solid Oak news bulletin has been accidentally included in the Chinese filtering coding
-
-
NYCLU sues DHS over mid-Manhattan surveillance scheme
DHS wants to build a $92 million surveillance system in Lower Manhattan; civil liberties organizations sues DHS over plans to expand plan to mid-Manhattan
-
-
Identity fundamentals. pt. 1: Who cares who you are anyway?
Identity can be defined as a combination of the uniqueness of an individual (or device) and the attributes which are associated with that uniqueness; in the absence of a standard unique personal identification number, personal names are often used to build a single view across different unconnected applications
-
-
House limits whole body imaging
Worries about privacy lead Congress to vote, 310-118, to ban whole body imaging at airports; the bill would ban TSA from using whole-body imaging instead of metal detectors as the first-screening device at airports
-
-
Court: use of GPS to track criminals requires warrant
The New York State’s supreme court ruled that the police cannot use GPS to track a criminal suspect without a warrant; majority decision said: “the use of these powerful devices presents a significant and, to our minds, unacceptable risk of abuse”
-
-
U.K. information commissioner: data collection trend will be reversed
Richard Thomas, the outgoing U.K. information commissioner: “If you are looking for a needle in a haystack, it does not make sense to make the haystack bigger”
-
-
Hackers break into UC Berkeley health-services databases
Hackers began breaking into the databases back in October, and continued to steal information until breach was discovered on 9 April; about 160,000 individuals believed to be affected by breach
-
-
European Court: Scottish DNA database system is "fairer and proportionate"
the European Court of Human Rights ruled the DNA databases in Britain, Wales, and Northern Ireland “could not be regarded as necessary in a democratic society”; the European Court considered the system in Scotland “fair and proportionate”
-
-
Britain to remove some DNA profiles from database
About 5.2 percent of the U.K. population is on the national DNA database, compared with just 0.5 percent in the United States; the European Court of Human Rights rules that Britain’s DNA database is incompatible with the requirements of democracy, and the Home Office says it will begin to remove the DNA of innocent citizens
-
-
Growing problem: Private security companies pose risk to privacy
Government mandates in the U.K. now require more and more businesses to collect more and more information about individuals who use these businesses’ services; private contractors are hired to handled the collection and handling of the personal information collected; these contractors are not bound by the tight rules governing the government handling of such information (not that the U.K. government is doing a very good job following these rules)
-