Amazon gets U.S. patent to use delivery drones for surveillance service

Amazon gets U.S. patent to use delivery drones for surveillance service

(Reuters) - Inc is exploring using drones not just to deliver packages but also to provide surveillance as a service to its customers, according to a patent granted by the United States Patent and Trademark Office.

I’m a Journalist but I Didn’t Fully Realize the Terrible Power of U.S. Border Officials Until They Violated My Rights and Privacy

I’m a Journalist but I Didn’t Fully Realize the Terrible Power of U.S. Border Officials Until They Violated My Rights and Privacy

Sophia Cope, an attorney with the Electronic Frontier Foundation, which has sued CBP over its warrantless device searches, told me that the agency “has for sure said no” as to whether there is a right to counsel during secondary screening.

No Slack for you! Microsoft puts rival app on internal list of ‘prohibited and discouraged’ software

No Slack for you! Microsoft puts rival app on internal list of ‘prohibited and discouraged’ software

GeekWire obtained an internal Microsoft list of prohibited and discouraged technology — software and online services that the company doesn’t want its employees using as part of their day-to-day work. Slack Enterprise Grid version complies with Microsoft security requirements; however, we encourage use of Microsoft Teams rather than a competitive software.

Cyber security issues in 2018: three most prominent data breaches

Cyber security issues in 2018: three most prominent data breaches

Cambridge Analytica shocked the netizens of the world wide web and gave birth to intense debates on online privacy, cyber security, and accountability of the companies that experienced data breaches.

Your car's data privacy comes into question in Georgia Supreme Court case

Your car's data privacy comes into question in Georgia Supreme Court case

Last June, the US Supreme Court also ruled that police need a warrant to get phone location data , but there are still privacy challenges as more cases take on other ways technology can collect information.

Much Of Our Government Digital Surveillance Is Outsourced To Private Companies

Much Of Our Government Digital Surveillance Is Outsourced To Private Companies

Increasingly, at least when it comes to digital data streams like social media, the entire process, from initial data acquisition to final analytic outputs, is overseen by private companies with large portions of the analytic pipeline occurring within their own data centers with little oversight by the federal government.

Nearly All U.S. Visa Applicants Now Required To Submit 5-Year Social Media History

Nearly All U.S. Visa Applicants Now Required To Submit 5-Year Social Media History

Under a State Department policy that took effect Friday, almost all visa applicants to the United States will now be required to submit the social media usernames, email addresses and phone numbers they’ve used in the past five years.

Facebook wants to pay you for your data — read this before you sign up

Facebook wants to pay you for your data — read this before you sign up

The social-media giant this week announced Study, a “market research program” that will compensate willing users of Android, Google’s GOOG, +0.66% GOOGL, +0.70% operating system, in exchange for information about their phone-app use.

Facebook worries emails could show Zuckerberg knew of questionable privacy practices: WSJ

Facebook worries emails could show Zuckerberg knew of questionable privacy practices: WSJ

Within the company, the unearthing of the emails in the process of responding to a continuing federal privacy investigation has raised concerns that they would be harmful to Facebook, at least from a public-relations standpoint, if they were to become public, the WSJ reported.

The U.S. Government Is Utterly Inept at Keeping Your Data Secure

The U.S. Government Is Utterly Inept at Keeping Your Data Secure

The revelations that NSA hackers and Border Patrol data-trackers had played themselves came on the heels of potentially worse news for wired Americans: An Israeli coding firm also admitted last month that its spyware was being deployed by hackers to attack WhatsApp users and gain access to their phones.

Facebook CEO may have known of questionable privacy practices: WSJ

Facebook CEO may have known of questionable privacy practices: WSJ

(Reuters) - Facebook Inc emails appear to show Chief Executive Officer Mark Zuckerberg’s involvement in discussions about its much criticized privacy practices, the Wall Street Journal reported on Wednesday, citing people familiar with the matter.

Report: Russia Will Block Nine VPN Services in July

Report: Russia Will Block Nine VPN Services in July

The other providers contacted by Roskomnadzor include popular services like OpenVPN, NordVPN, four others with VPN in their names, IPVanish, TorGuard and Hide My Ass. Most were explicit in their refusal to comply with the regulator's demands, assuring their users that they weren't interested in perpetuating the Russian government's censorship.

The Hindu Explains: Why are the U.S. immigration norms being tightened?

The Hindu Explains: Why are the U.S. immigration norms being tightened?

The story so far: On May 31, 2019, the U.S. Department of State introduced a change in online visa forms for immigrant (form DS-260) and non-immigrant visas (form DS-160) requiring applicants to register their social media handles over a five-year period.

China Telecom Swallows Huge Amount of European Mobile Traffic For Over Two Hours

China Telecom Swallows Huge Amount of European Mobile Traffic For Over Two Hours

On Thursday, a major data center in Switzerland, Safe Host, leaked more than 70,000 routes to China Telecom, which in turn announced the routes on the global internet, causing huge amounts of traffic destined for European networks to be rerouted through its own servers.

For two hours, a large chunk of European mobile traffic was rerouted through China

For two hours, a large chunk of European mobile traffic was rerouted through China

But instead of ignoring the BGP leak, China Telecom re-announced Safe Host's routes as its own, and by doing so, interposed itself as one of the shortest ways to reach Safe Host's network and other nearby European telcos and ISPs. Mobile operators in France, Holland, Switzerland affected.

Protecting Yourself from Amazon Violating Your Air Rights and Privacy by Drone Trespassing

Protecting Yourself from Amazon Violating Your Air Rights and Privacy by Drone Trespassing

However, drone deliveries would also violate the air rights home owners and renters all over the US.

The web the world needs can be ours again, if we want it

The web the world needs can be ours again, if we want it

In a world where tech companies expect you to cobble together different tools to protect your privacy putting the burden on you, we are providing an easy-to-use solution with just one Firefox login to get the full benefit of all of the protections and capabilities we’ve built into our products and services.

Apple sold out kids' privacy yesterday under the guise of 'screen time' apps

Apple sold out kids' privacy yesterday under the guise of 'screen time' apps

Others like SafeLagoon offer all the stock imagery of a fun, friendly, safety-oriented service, but are already advertising the return of full-time chat and SMS monitoring to their iOS app as "coming soon," presumably on the heels of Apple's policy change.

Cyberstalking Techniques: What Stalkers Can Do If They Have Your Name & Surname (Part I)

Cyberstalking Techniques: What Stalkers Can Do If They Have Your Name & Surname (Part I)

Your stalker can simply enter name/surname to Maltego’s database, and see what contact information is available about his victim online: what emails, what domains have a person by the same name are registered.

Federal police raid home of News Corp journalist Annika Smethurst

Federal police raid home of News Corp journalist Annika Smethurst

The Australian federal police have raided the home of News Corp Australia journalist Annika Smethurst investigating the publication of a leaked plan to allow government spying on Australians.

Quest Diagnostics Says Up to 12 Million Patients May Have Had Financial, Medical, Personal Information Breached

Quest Diagnostics Says Up to 12 Million Patients May Have Had Financial, Medical, Personal Information Breached

Quest Diagnostics, one of the biggest blood testing providers in the country, warned Monday that nearly 12 million of its customers may have had personal, financial and medical information breached due to an issue with one of its vendors.

Apple touts privacy in web sign-on war with Facebook, Google

Apple touts privacy in web sign-on war with Facebook, Google

When users sign in with their Google or Facebook Inc profiles to third-party apps, the apps often share valuable data with Google and Facebook, a practice that Apple is looking to stop. Bajarin said Apple appears to be working to “firewall” off its customers from data collection practices it disagrees with.

Exclusive: U.S. Justice Dept considering Apple probe - sources

Exclusive: U.S. Justice Dept considering Apple probe - sources

The Justice Department’s Antitrust Division and the Federal Trade Commission (FTC) met in recent weeks and agreed to give the Justice Department the jurisdiction to undertake potential antitrust probes of Apple and Google, owned by Alphabet Inc, the sources said.

Want a Visa for the U.S.? You’ll Have to Hand Over Your Social Media Handles

Want a Visa for the U.S.? You’ll Have to Hand Over Your Social Media Handles

Although applicants will be able to say they don’t use social media, lying about it could lead to “serious immigration consequences,” a State Department official said in an interview with the Hill.

As russian censorship increases, is a decentralized web the answer?

As russian censorship increases, is a decentralized web the answer?

That it’s frequently used as a Russian propaganda tool is well-documented, and Sputnik coverage of the Kerch incident ended up being no different. Once data is posted on the Permaweb, it cannot be overwritten by bias and propaganda as Sputnik intended to do with its coverage of the Kerch incident.

Federal Judge Hears Challenge to NSA ‘Upstream’ Spying

Federal Judge Hears Challenge to NSA ‘Upstream’ Spying

(CN) – On remand from the Fourth Circuit, a federal judge heard arguments Thursday in a challenge to the National Security Agency’s “upstream” surveillance of international and domestic text-based communications.

Stop Filling Out Questionnaires for 'Personalized' Products

Stop Filling Out Questionnaires for 'Personalized' Products

Or actually, there’s one more thing: when you take the company’s quiz, pouring out your life story and hopes and dreams, they can also collect that information, tie it to your email address, and sell that data or use it to market more stuff to you.

Russia exposed: How Putin’s henchmen are ALREADY manipulating the internet

Russia exposed: How Putin’s henchmen are ALREADY manipulating the internet

“They are not the only government to use information control on the internet as a weapon against a population, but they are one of the most aggressive.” In November 2018, Russian website Sputnik published a news story about the Kerch incident with Ukraine, which resulted in the arrest by Russia of 24 Ukrainian soldiers, blaming the incident on Russian negligence or hostility, Mr Williams said.

Spy cameras imaged 1,700 unwitting subjects in facial recognition study funded by U.S. government

Spy cameras imaged 1,700 unwitting subjects in facial recognition study funded by U.S. government

How facial recognition technology uses 80 nodal points to match real time images with previous photos. Facial recognition software works by matching real time images to a previous photograph of a person.

Amazon's Alexa WILL listen to everything you say

Amazon's Alexa WILL listen to everything you say

How to find out what Alexa has recorded: Select the icon in the top left corner - often dubbed the 'hamburger' Press 'Settings' at the bottom of the menu.

More