Privacy

New Illinois Law Limits Police Use Of Cellphone-Tracking Stingray

Your rights online - Sun, 07/24/2016 - 21:35
An anonymous Slashdot reader quotes a report from ABC News: A new Illinois law limits how police can use devices that cast a wide net in gathering cellphone data... [Stingray] gathers phone-usage data on targets of criminal investigations, but it also gathers data on other cellphones -- hundreds or even thousands of them -- in the area. The new law requires police to delete the phone information of anyone who wasn't an investigation target within 24 hours. It also prohibits police from accessing data for use in an investigation not authorized by a judge. A dozen other states have adopted such regulations, and Congress is considering legislation that would strengthen federal guidelines already in place... Privacy advocates worry that without limits on how much data can be gathered or how long it can be stored, law enforcement could use the technology to build databases that track the behavior and movement of people who are not part of criminal investigations. Earlier this month a U.S. judge threw out evidence gathered with Stingray for the first time, saying that without a search warrant, "the government may not turn a citizen's cell phone into a tracking device." The ACLU has identified 66 agencies in 24 states using Stingray technology, "but because many agencies continue to shroud their purchase and use of stingrays in secrecy, this map dramatically underrepresents the actual use of stingrays by law enforcement agencies nationwide."

Read more of this story at Slashdot.

Categories: Privacy

Glassdoor Exposes 600,000 Email Addresses

Your rights online - Sun, 07/24/2016 - 19:35
A web site where users anonymously review their employer has exposed the e-mail addresses -- and in some cases the names -- of hundreds of thousands of users. An anonymous reader quotes an article from Silicon Beat: On Friday, the company sent out an email announcing that it had changed its terms of service. Instead of blindly copying email recipients on the message, the company pasted their addresses in the clear. Each message recipient was able to see the email addresses of 999 other Glassdoor users... Ultimately, the messages exposed the addresses of more than 2 percent of the company's users... Last month, the company said it had some 30 million monthly active users, meaning that more than 600,000 were affected by the exposure... Although the company didnâ(TM)t directly disclose the names of its users, many of their names could be intuited from their email addresses. Some appeared to be in the format of "first name.last name" or "first initial plus last name." A Glassdoor spokesperson said "We are extremely sorry for this error. We take the privacy of our users very seriously and we know this is not what is expected of us. It certainly isn't how we intend to operate."

Read more of this story at Slashdot.

Categories: Privacy

Clinton Campaign: Russia Leaked Emails to Help Trump

Your rights online - Sun, 07/24/2016 - 18:35
An anonymous Slashdot reader quotes the Washington Post: A top official with Hillary Clinton's campaign on Sunday accused the Russian government of orchestrating the release of damaging Democratic Party records in order to help the campaign of Republican Donald Trump -- and some cyber security experts in the U.S. and overseas agree. The extraordinary charge came as some national security officials have been growing increasingly concerned about possible efforts by Russia to meddle in the election, according to several individuals familiar with the situation. Late last week, hours before the records were released by the website Wikileaks, the White House convened a high-level security meeting to discuss reports that Russia had hacked into systems at the Democratic National Committee... Officials from various intelligence and defense agencies, including the National Security Council, the Department of Defense, the FBI and the Department of Homeland Security, attended the White House meeting Thursday, on the eve of the email release. Clinton's campaign manager told ABC News "some experts are now telling us that this was done by the Russians for the purpose of helping Donald Trump." Donald Trump's son later responded, "They'll say anything to be able to win this."

Read more of this story at Slashdot.

Categories: Privacy

Yahoo Ordered to Show How It Recovered 'Deleted' Emails

Your rights online - Sun, 07/24/2016 - 16:35
An anonymous reader quotes a report from PC Magazine: Just what kind of email retentions powers does Yahoo have? According to a policy guide from the company, Yahoo cannot recover emails that have been deleted from a user's account -- simple as that. If the email is in a user's account, it's fair game, and Yahoo can even give law enforcement the IP address of whatever computer is being used to send said email. Or, at least, that's what Yahoo has said. A magistrate judge from the Northern District of California has ordered Yahoo to produce documents, as well as a witness for deposition, related to the company's ability to recover seemingly deleted emails in a UK drug case... a UK defendant was convicted -- and is currently serving an extra 20-year prison sentence -- as part of a conspiracy to import drugs into the United Kingdom. He's currently appealing the conviction, in part because the means by which Yahoo recovered the emails in question allegedly violate British law. The drug smugglers apparently communicated by creating a draft of an email, which was then available to others who logged into that same account.

Read more of this story at Slashdot.

Categories: Privacy

EU To Give Free Security Audits To Apache HTTP Server and Keepass

Your rights online - Sun, 07/24/2016 - 12:35
An anonymous reader writes: The European Commission announced on Wednesday that its IT engineers would provide a free security audit for the Apache HTTP Server and KeePass projects. The two projects were selected following a public survey that included several open-source projects deemed important for both the EU agencies and the wide public. The actual security audit will be carried out by employees of the IT departments at the European Commission and the European Parliament. This is only a test pilot program that's funded until the end of the year, but the EU said it would be looking for funding to continue it past its expiration date in December 2016.

Read more of this story at Slashdot.

Categories: Privacy

Homeland Security Border Agents Can Seize Your Phone

Your rights online - Sun, 07/24/2016 - 10:36
Slashdot reader v3rgEz writes: A Wall Street Journal reporter has shared her experienced of having her phones forcefully taken at the border -- and how the Department of Homeland Security insists that your right to privacy does not exist when re-entering the United States. Indeed, she's not alone: Documents previously released under FOIA show that the DHS has a long-standing policy of warrantless (and even motiveless) seizures at the border, essentially removing any traveler's right to privacy. "The female officer returned 30 minutes later and said I was free to go," according to the Journal's reporter, adding. "I have no idea why they wanted my phones..."

Read more of this story at Slashdot.

Categories: Privacy

UK Cybersecurity Executives Plead Guilty To Hacking A Rival Firm

Your rights online - Sun, 07/24/2016 - 09:35
An anonymous reader writes: "Five employees from cybersecurity firm Quadsys have admitted to hacking into a rival company's servers to allegedly steal customer data and pricing information," ZDNet is reporting. After a series of hearings, five top-ranking employees "admitted to obtaining unauthorised access to computer materials to facilitate the commission of an offence," including the company's owner, managing director, and account manager. Now they're facing 12 months in prison or fines, as well as additional charges, at their sentencing hearing in September. The headline at ZDNet gloats, "Not only did the Quadsys staff reportedly break into servers, they were caught doing it."

Read more of this story at Slashdot.

Categories: Privacy

Almost Half Of All TSA Employees Have Been Cited For Misconduct

Your rights online - Sat, 07/23/2016 - 14:35
Slashdot reader schwit1 writes: Almost half of all TSA employees have been cited for misconduct, and the citations have increased by almost 30 percent since 2013... It also appears that the TSA has been reducing the sanctions it has been giving out for this bad behavior. Throughout the U.S., the airport security group "has instead sought to treat the misconduct with 'more counseling and letters that explain why certain behaviors were not acceptable'," according to a report from the House Homeland Security Commission, titled "Misconduct at TSA Threatens the Security of the Flying Public". It found 1,206 instances of "neglect of duty", and also cited the case of an Oakland TSA officer who for two years helped smugglers slip more than 220 pounds of marijuana through airport security checkpoints, according to the San Jose Mercury News. The newspaper adds that "The misconduct ranges from salacious (federal air marshals spending government money on hotel rooms for romps with prostitutes) to downright dangerous (an officer in Orlando taking bribes to smuggle Brazilian nationals through a checkpoint without questioning)." Their conclusion? "The TSA's job is to make airline passengers feel safer and, not incidentally, actually make us safer. It's failing on both."

Read more of this story at Slashdot.

Categories: Privacy

Maximizing Economic Output With Linear Programming...and Communism

Your rights online - Sat, 07/23/2016 - 13:35
Slashdot reader mkwan writes: Economies are just a collection of processes that convert raw materials and labour into useful goods and services. By representing these processes as a series of equations and solving a humongous linear programming problem, it should be possible to maximize an economy's GDP. The catch? The economy needs to go communist. "[P]oorest members would receive a basic income that gradually increases as the economy becomes more efficient, plateauing at a level where they can afford everything they want to consume," argues the article, while "The middle classes wouldn't see much change. They would continue to work in a regular job for a regular -- but steadily increasing -- wage... Without the ability to own real-estate, companies, or intellectual property, it would be almost impossible to become rich, especially since the only legal source of income would be from a government job."

Read more of this story at Slashdot.

Categories: Privacy

Avast Suckers GOP Delegates Into Connecting To Insecure Wi-Fi Hotspots

Your rights online - Sat, 07/23/2016 - 12:35
Avast conned more than 1,200 people into connecting to fake wi-fi hotspots set up near the Republican convention and the Cleveland airport, using common network names like "Google Starbucks" and "Xfinitywifi" as well as "I vote Trump! free Internet". An anonymous reader quotes this report from The Register: With mobile devices often set to connect to known SSIDs automatically, users can overlook the networks to which they are connecting... Some 68.3 percent of users' identities were exposed when they connected, and 44.5 per cent of Wi-Fi users checked their emails or chatted via messenger apps... In its day-long experiment Avast saw more than 1.6Gbps transferred from more than 1,200 users. Avast didn't store the data they collected, but they did report statistics on which sites were accessed most frequently. "5.1 percent played Pokemon Go, while 0.7 percent used dating apps like Tinder, Grindr, OKCupid, Match and Meetup, and 0.24 percent visited pornography sites like Pornhub."

Read more of this story at Slashdot.

Categories: Privacy

Microsoft Rewrites Wassenaar Arms Control Pact To Protect The Infosec Industry

Your rights online - Sat, 07/23/2016 - 11:35
The Wassenaar Arrangement "is threatening to choke the cyber-security industry, according to a consortium of cyber-security companies...supported by Microsoft among others," reports SC Magazine. "'Because the regulation is so overly broad, it would require cyber responders and security researchers to obtain an export license prior to exchanging essential information to remediate a newly identified network vulnerability, even when that vulnerability is capable of being exploited for purposes of surveillance,' wrote Alan Cohn from the CRC on a Microsoft blog." Reporter Darren Pauli contacted Slashdot with this report: If the Wassenaar Arrangement carries through under its current state, it will force Microsoft to submit some 3800 applications for arms export every year, company assistant general counsel Cristin Goodwin says... The Wassenaar Arrangement caught all corners of the security industry off guard, but its full potentially-devastating effects will only be realised in coming months and years... Goodwin and [Symantec director of government affairs] Fletcher are calling on the industry to lobby their agencies to overhaul the dual-use software definition of the Arrangement ahead of a closed-door meeting in September where changes can be proposed.

Read more of this story at Slashdot.

Categories: Privacy

Top Posts for Privacy

Full Disclosure Bulletin Board - Sun, 04/28/2013 - 08:10
The top weekly posts for Privacy
Categories: Privacy

Security Video: CCTV TRANING ACCESS CONTROL TRANING FIRE ALARM SYSTEM

Full Disclosure Bulletin Board - Sat, 04/27/2013 - 14:59
Security: ; Security; Video: CCTV TRANING ACCESS CONTROL TRANING FIRE ALARM SYSTEM. By Mcgready from Bel Air, Maryland "cctv video" Learn CCTV, Fire Alarm, Access Control, 100% Practical Traning Great Demand in Europe, Gulf and Asia Learn to design High Rise Projects contact: 800 800 4600.[1] .[2] . ...
Categories: Privacy

CCTV Footage Video: CCTV Shows Shop Owner Fighting Off Gunman FULL VIDEO

Full Disclosure Bulletin Board - Fri, 04/26/2013 - 15:03
CCTV Footage: ; CCTV Footage; Video: CCTV Shows Shop Owner Fighting Off Gunman FULL VIDEO . By Mcgready from Bel Air, Maryland "cctv video" The 62-year-old swings a baseball bat at the armed robber, who fires at least ten times during the raid on the Chicago store.A Chicago shop owner has fought ....[1] .[2] . ...
Categories: Privacy

Surveillance Video: HOW the BOSTON BOMBER was ARRESTED: the video showing TSARNAEV S HIDEOUT

Full Disclosure Bulletin Board - Thu, 04/25/2013 - 15:31
Surveillance: ; Surveillance; Video: HOW the BOSTON BOMBER was ARRESTED: the video showing TSARNAEV'S HIDEOUT. By Camelia from Fair Lawn, New Jersey "Massachusetts police car" HOW the BOSTON BOMBER was CAUGHT This IR Helicopter showing TSARNAEV'S HIDEOUT Boston bomber arrested: how David Henneberry found Dzhokhar Tsarnaev in his g....[1] . ...
Categories: Privacy

CCTV Footage Video: Ring Swallowed By Robber Is Recovered

Full Disclosure Bulletin Board - Mon, 04/22/2013 - 07:07
CCTV Footage: ; CCTV Footage; Video: Ring 'Swallowed' By Robber Is Recovered. By Mcgready from Bel Air, Maryland "New Hampshire tour" Ring 'Swallowed' By Robber Is Recovered Police say Ronald Perley grabbed a diamond ring and then swallowed it during a bungled robbery in New Hampshire.[1] Poli....[2] . ...
Categories: Privacy

Privacy Video:

Full Disclosure Bulletin Board - Sun, 04/21/2013 - 07:58
Privacy: ; Privacy; Video: . By Simon 1 from Bessie, Oklahoma "craft project" Posted on Hobby Lobby's front window, the sign informs customers that at any point during your visit, it could be open season on you, your belongings or even....[1] .[2] . ...
Categories: Privacy

CCTV Footage Video: CCTV: Robbers smash man around head,steal his van and leave him for dead[

Full Disclosure Bulletin Board - Sat, 04/20/2013 - 07:33
CCTV Footage: ; CCTV Footage; Video: CCTV: Robbers smash man around head,steal his van and leave him for dead[. By Mcgready from Bel Air, Maryland "cctv video" Pictured: Moment robbers smashed businessman around head with a crowbar before stealing his van and leaving him for dead Ali Jawaid died after being ambushed....[1] .[2] . ...
Categories: Privacy

CCTV Surveillance Video: Art Attack - Secret security camera

Full Disclosure Bulletin Board - Thu, 04/18/2013 - 08:13
CCTV Surveillance: ; CCTV Surveillance; Video: Art Attack - Secret security camera. By Kelderman from Luck, Wisconsin "home security" Art attack with neil buchanan - learn how to make a secret security camera with a hidden stash .[1] .[2] . ...
Categories: Privacy

CCTV Surveillance Video: NO CCTV - MY WEBCAM MY SECURITY

Full Disclosure Bulletin Board - Wed, 04/17/2013 - 07:48
CCTV Surveillance: ; CCTV Surveillance; Video: NO CCTV - MY WEBCAM MY SECURITY. By Vida from Paterson, New Jersey "home security" "Watchman" software is the platform which helps you utilize your web cameras as your security tools.[1] It makes your web cameras acting like CCTV cameras and h....[2] . ...
Categories: Privacy
Syndicate content