Contents Pages by Subject

Privacy Rights

Subject Photo
Article Image

Insider Media Group

Whether you like it or not, Facebook knows exactly who you are. But who else does? If you're a member of Facebook, chances are you've stalked and been stalked. But what if Facebook stalked back? Facebook is a veritable trove

Article Image

Facebook

You can use Facebook to: Share information with people you know, See what's going on with your friends, Look up people around you.

Entered By:
Article Image

USA Today

There's rising concern among privacy experts and legislators about the frenetic business of assembling and distributing personal data. Everyone, it seems, wants Social Security numbers, birth dates, maiden names, criminal records, civil judgments

Article Image

St. Petersburg Times OpEd

A scathing report by the Justice Department's inspector general has found that the FBI has been seriously abusing its powers to gather confidential information. Congressional hearings on the report's conclusions have further demonstrated that

Article Image

telegraph.co.uk

Checks will be made on all children to identify potential criminals under an extension of the "surveillance state" announced by Tony Blair. A Downing Street review of law and order also foreshadowed greater use of sophisticated CCTV, an exp

Article Image

raidersnewsnetwork.com

Colleges have been using campus card ID systems for years. But with increasing security concerns, similar products are moving into public schools. "We have 56,000 high school students and we wanted a better handle on (them)," said Patricia

Article Image

Washington Post

FBI counterterrorism officials continued to use flawed procedures to obtain thousands of U.S. telephone records during a two-year period when bureau lawyers and managers were expressing escalating concerns about the practice, according to senior FBI

Article Image

ACLU

On March 9, 2007, as mandated by law, the Department of Justice’s Office of Inspector General issued a report on the FBI’s use of National Security Letters (NSLs). The FBI used these NSLs to obtain phone and financial records without a court order.

Article Image

AP

The nation's top two law enforcement officials acknowledged the FBI broke the law to secretly pry out personal information about Americans. They apologized and vowed to prevent further illegal intrusions. [we won't do it, snicker, again]

Article Image

Computer World

A security expert has cracked one of the UK's new biometric passports, which the British government hopes will cut down on cross-border crime and illegal immigration. The attack, which uses a common RFID reader and customised code,

Article Image

AP

The Census Bureau inadvertently posted personal information from 302 households on a public site multiple times over a five-month period, the bureau said Wednesday. The information included names, addresses, phone numbers, birth dates

Article Image

AP

A White House privacy board is giving its stamp of approval to two of the Bush administration's controversial surveillance programs — electronic eavesdropping and financial tracking — and says they do not violate citizens' civil liberties.

Article Image

AP

[Yet they clear Bush.] Wal-Mart Stores Inc. said it has fired a Wal-Mart systems technician for recording phone conversations between the company's PR office and a newspaper reporter and intercepting text messages without authorization.

Article Image

PC World

Researchers at Toshiba Corp. have developed a method that they say makes it possible-- barring a change in the laws of physics-- to absolutely secure distribution of encryption keys across a network. [place your bets]

Article Image

Government Health IT

When a coalition of technology companies, insurers and health care providers launched a $100 million project last month to provide free electronic prescribing software to every physician in the US, it was greeted with cheers.

Article Image

AP

Tiny computer chips used for tracking food, tickets and other items are getting even smaller. Hitachi Ltd., a Japanese electronics maker, recently showed off radio frequency identification, or RFID, chips that are just 0.002 inches by 0.002 inches

Article Image

by William Norman Grigg (Am. Conservative)

Implanting radio ID tags in U.S. passports makes stealing personal data easier than ever. “This whole design is totally brain damaged. All of these RFID passports are a huge waste of money. They’re not increasing security at all.”

Article Image

Wired Blog

Has the TSA's website been hacked? All indications are yes, and that a malicious phishing attack has been launched against travelers who have or think they have been delayed because they are on a watchlist or have a name similar

Article Image

NY Times

Cards can be read through a wallet or an item of clothing, the security of the information is startlingly weak. “Would you be comfortable wearing your name, your credit card number and your card expiration date on your T-shirt?”

Article Image

AP

The US Dept. of Veterans Affairs began notifying 1.8 million veterans and doctors that their personal and business information could be on a portable hard drive that has been missing from an Alabama hospital for nearly 3 weeks.

Article Image

Wolfesblog

Concerned network admins should examine traffic logs closely. A correlation of traffic from several of these IP blocks likely indicates that a network is under surveillance or has had access attempted by the US intelligence community and affiliated e

Article Image

LiveScience.com

A public iris scanning device is able to scan the iris of the eye without the knowledge or consent of the person being scanned. The device uses multiple cameras, and then combines images to create a single scan to ID people.

musicandsky.com/ref/240/