Since the introduction of the current system , facial recognition identified 7,000 passengers who overstayed their visas on the 15,000 flights tracked.
WASHINGTON — The Drug Enforcement Administration secretly collected data in bulk about Americans’ purchases of money-counting machines — and took steps to hide the effort from defendants and courts — before quietly shuttering the program in 2013 amid the uproar over the disclosures by the National Security Agency contractor Edward Snowden, an inspector general report found.
The administration set no specific standards of proof for issuing subpoenas, and officials often justified data collection using “generic” and “cursory” explanations, the IG found.“The information provided [in subpoena documents] often lacks specificity sufficient to establish the particularized facts or basis for connecting the target number to a drug investigation, even if such review had occurred,” investigators said.
At the same time, however, U.S. officials have conceded that the post-9/11 domestic phone-records dragnet has not stopped a single terrorist attack – despite misleadingly suggesting otherwise after The Guardian exposed the surveillance in June 2013, thanks to Snowden.
“It's about searching for the answers and triggering accountability.”— David Carroll Carroll’s team hope the High Court judge will fire the administrator and pass the case to government receivers who would then appoint a new administrator willing to investigate legal breaches at Cambridge Analytica and five other interrelated companies.
In a discussion recorded for the Lawfare Podcast released on March 2, Luke Murry said that the NSA was no longer collecting call detail records—the metadata associated with phone calls and text messages—and that the Trump administration had not used the program for over six months.
The month started with this questions: But after the release of Tails 3.12, the hottest topics were: Our infrastructure was targeted by a distributed denial-of-service (DDoS) attack that caused a couple of temporary outages.
REUTERS/Edgar Su (SINGAPORE - Tags: SCIENCE TECHNOLOGY BUSINESS TELECOMS TPX IMAGES OF THE DAY) SHANGHAI (Reuters) - China’s cyber watchdog said on Wednesday it had deleted more than 7 million pieces of online information as well as 9,382 mobile apps, and it criticized tech giant Tencent’s (0700.HK) news app for spreading “vulgar information”.
“We do expect a record breaking thanksgiving travel season,” said David Pekoske, a TSA administrator during a news conference last week. “If the government has already created the ability to do this in airports, and databases to identify people, it's a really easy leap to use that in other settings,” Scott said.
The confidentiality of census information came up after Rep. Jimmy Gomez — a Democrat from California who serves on the House Committee on Oversight and Government Reform — asked a follow-up question after the acting head of the Justice Department's Civil Rights Division, John Gore, appeared at a congressional hearing in May. Gomez requested a written response on whether there are any laws that could compel the Census Bureau "to disclose confidential census data for law enforcement or national security purposes."
CDT hopes the administration champions this approach, and as the public interest privacy legislation principles demonstrate, there are many organizations that stand ready to work with the NTIA and Congress to propose concrete language to these ends.
On Friday, November 9, 2018, EFF submitted a letter in response to the U.S. Department of Commerce's request for comment on "Developing the Administration's Approach to Consumer Privacy," urging the agency to consider any future policy proposals in a users' rights framework.
They reveal the CIA not only intercepted emails of U.S. citizens but they were emails of the most sensitive kind — written to Congress and involving whistleblowers reporting alleged wrongdoing within the Intelligence Community.
It fits into a narrative building for a long time about the existential threat to US national security posed by Chinese telecom companies like Huawei and ZTE.
The Department of Justice announced on Sunday that it has filed a lawsuit against California to block its new net neutrality law, just hours after it was signed by governor Jerry Brown.
Risk and outcome-based approaches have been successfully used in cybersecurity, and can be enforced in a way that balances the needs of organizations to be agile in developing new products, services, and business models with the need to provide privacy protections to their customers, while also ensuring clarity in legal compliance.
Customers might want to consider the fact that the US government can do as it pleases – with your data whether it is stored in the cloud, or sitting inside your own company walls.
If signed, the order would represent a significant escalation of Trump’s antipathy toward Google, Facebook, and other social media companies, whom he has publicly accused of silencing conservative voices and news sources online.“Social Media is totally discriminating against Republican/Conservative voices," Trump said on Twitter in August.
WASHINGTON — The Trump administration and its closest intelligence partners have quietly warned technology firms that they will demand “lawful access” to all encrypted emails, text messages and voice communications, threatening to compel compliance if the private companies refuse to voluntarily provide the information to the governments.
“We are committed to being part of the process and a constructive part of the process,” said Dean Garfield, president of a leading tech industry lobbying group, the Information Technology Industry Council, which is working on proposals for the federal law.