To Search Through Millions of License Plates, Police Should Get a Warrant

To Search Through Millions of License Plates, Police Should Get a Warrant

Yang, argues that when a U.S. Postal Service inspector used a commercial ALPR database to locate a suspected mail thief, it was a Fourth Amendment search that required a warrant.

U.S. agency error exposes 2.3 million disaster survivors to fraud: watchdog

U.S. agency error exposes 2.3 million disaster survivors to fraud: watchdog

WASHINGTON (Reuters) - The U.S. Federal Emergency Management Agency (FEMA) exposed 2.3 million disaster survivors to possible identity theft and fraud by improperly sharing sensitive personal information with an outside company, according to an internal government watchdog.

Utah Just Became a Leader in Digital Privacy

Utah Just Became a Leader in Digital Privacy

Rather than wait for court action, Utah legislators passed this latest privacy law, which requires law enforcement to obtain a warrant with probable cause in order to access any electronic data held by a third party, at least in most cases.

89% of EU Government sites contain ad tech trackers

89% of EU Government sites contain ad tech trackers

Governmental sites in France, for example, have the highest number of commercial trackers, with a total of 52 different companies tracking visitors. The report says that cookies were discovered on public health service websites as well, with 52% of the sites tested found to contain ad trackers.

Facebook stored hundreds of millions of user passwords in plain text

Facebook stored hundreds of millions of user passwords in plain text

Facebook stored hundreds of millions of user passwords in plain text. Facebook is once again making headlines after the company discovered it had been storing hundreds of millions of users passwords in plain text for years.

Congress Has a Chance to Finally End the NSA’s Mass Telephone Records Program

Congress Has a Chance to Finally End the NSA’s Mass Telephone Records Program

Coincidentally, EFF had organized a briefing of congressional staff the day after the Times report on the controversial surveillance law used to conduct telephone record surveillance: Section 215 of the Patriot Act. As we told Congress, it is long past time to end the telephone records program for good.

Who Defends Your Data? Report Reveals Peruvian ISPs Progress on User Privacy, Still Room for Improvement

Who Defends Your Data? Report Reveals Peruvian ISPs Progress on User Privacy, Still Room for Improvement

Judicial Order: Companies earned a star in this category if they require that the government obtain a warrant from a judge before handing over user data (either content or metadata).

Law enforcement needs to protect citizens and their data

Law enforcement needs to protect citizens and their data

While the bill includes limited restrictions on law enforcement requests, the vague definitions and concentrated authorities give the Australian government sweeping powers that ultimately undermine the security and privacy of the very citizens they aim to protect.

With facial recognition, shoplifting may get you banned in places you've never been

With facial recognition, shoplifting may get you banned in places you've never been

If a logged person tries entering the store, Kogniz's facial recognition will be able to detect that and flag security, Daniel Putterman, the company's co-founder and director, said in an interview. There aren't any rules or standards governing how companies use facial recognition technology.

The U.S. May Soon Have a De Facto National DNA Database

The U.S. May Soon Have a De Facto National DNA Database

One is traditional law enforcement DNA databases: Every state and the federal government has enacted legislation identifying whose DNA is subject to government collection and search for crime detection purposes, and each has limited its database to some subset of individuals arrested or convicted of crimes.

Facial recognition has no checks, and that’s bad news for our privacy

Facial recognition has no checks, and that’s bad news for our privacy

If a logged person tries entering the store, Kogniz's facial recognition will be able to detect that and flag security, Daniel Putterman, the company's co-founder and director, said in an interview. One store that uses Kogniz shares its login information with its local police department, Putterman said.

Alarm over leaked US database targeting journalists and immigration activists

Alarm over leaked US database targeting journalists and immigration activists

Photograph: Ariana Drehsler/UPI/Barcroft Images “It means that the debate about immigrants’ rights, about the treatment of immigrants, about the treatment of asylum seekers, is going to be suppressed or censored because the people who are speaking out with a voice that’s critical of the government are going to be singled out for harsher treatment or punished,” Bhandari said.

Tracking tools found on EU government and health websites

Tracking tools found on EU government and health websites

These are external links and will open in a new window Image copyright Getty Images Image caption Almost all EU government websites have trackers Online tools which track user behaviour for advertisers have been found on a swathe of EU public health websites, including NHS and Gov.uk pages.

Russia doubles down on censorship with new ‘fake news’ and ‘internet insults’ law

Russia doubles down on censorship with new ‘fake news’ and ‘internet insults’ law

The Russian government has passed a new censorship law that allows it to target individuals and websites for such nondescript crimes as spreading “fake news” and “disrespecting” state symbols of figures – including Vladimir Putin.

Thousands protest Russia’s plans to cut off Russians’ internet access to the outside world

Thousands protest Russia’s plans to cut off Russians’ internet access to the outside world

These protests were similar to those seen in summer 2017 after Russia revealed plans to add VPN websites to their website blacklist All in all, BBC reports that over 15,000 Russians marched on Moscow.

The government uses images of vulnerable people to test facial recognition software.

The government uses images of vulnerable people to test facial recognition software.

When a company, university group, or developer wants to test a facial recognition algorithm, it sends that software to NIST, which then uses the full set of photograph collections to determine how well the program performs in terms of accuracy, speed, storage and memory consumption, and resilience.

EU member state websites laden with third-party cookies

EU member state websites laden with third-party cookies

A new report (PDF) reveals that the vast majority of EU member state websites are laden with third-party cookies that are not disclosed to visitors. Third-party service plugins and embeds are the main way in which trackers landed on government and public health sector websites according to the report.

This is how age verification will work under the UK's porn law

This is how age verification will work under the UK's porn law

"The user verifies their email address and then chooses an age verification option from our list of third party providers, using options such as SMS, credit card, passport, or driving licence," a spokesperson for AgeID explains.

US red lines for digital trade with the UK cause alarm

| Javier Ruiz US red lines for digital trade with the UK cause alarm The US government has published its negotiating objectives for a trade deal with the UK, which include some worrying proposals on digital trade, including a ban on the disclosure of source code and algorithms, and potential restrictions on data protection.

Appeals Court Doesn't Buy Government's National Security Assertions; Says Lawsuit Against FBI Can Continue

Appeals Court Doesn't Buy Government's National Security Assertions; Says Lawsuit Against FBI Can Continue

The panel further held that the district court should have reviewed any state secrets evidence necessary for a determination of whether the alleged surveillance was unlawful following the secrecy-protective procedure set forth in FISA.

World Day Against Cyber Censorship 2019 — Who are the Biggest Enemies of the Internet?

World Day Against Cyber Censorship 2019 — Who are the Biggest Enemies of the Internet?

Current ‘Enemies of the Internet’: The governments of these countries usually block popular applications and technologies, filter specific websites and sometimes even manipulate the content that is allowed by sharing propaganda and fake news. Privacy and geo-blocked content bypass, are the two main purposes of the VPN, so it’s an essential tool when fighting cyber censorship.

The Rise Of Totalitarian Technology

The Rise Of Totalitarian Technology

The TSA operates its own total tech program, called Quiet Skies, which monitors and flags travelers based on “suspicious” behavior patterns . The future of total tech in America and elsewhere in the west will be a battle between the drive for efficiency and the preservation of privacy and autonomy.

Preventing Government Facial Recognition Oppression

Preventing Government Facial Recognition Oppression

The report notes that law enforcement can use facial recognition technology for four purposes: arrest identification (to confirm an arrestee's ID), field identification (to ID a person stopped by an officer), investigative identification (to obtain images for IDing an unidentified suspect), and real-time surveillance (to match unidentified folks to a watchlist).

China’s electric cars are government spies

China’s electric cars are government spies

Though the Volkswagen chief doesn’t explicitly say it, for automakers, providing electric-car data to China’s one-party government is just another cost of doing business in the country.

China database lists 'breedready' status of 1.8 million women

China database lists 'breedready' status of 1.8 million women

An open database in China contains the personal information of more than 1.8 million women, including their phone numbers, addresses, and something called “BreedReady” status, according to a researcher.

The Spy Equipment On Sale to Dictatorships at the UK's Secret Security Trade Fair

The Spy Equipment On Sale to Dictatorships at the UK's Secret Security Trade Fair

Image from Gamma Group’s sales brochures from the Security and Policing exhibition Britain’s biggest arms firm, BAE Systems, have also become the UK’s leading "lawful interception" company.

Lords urge tougher rules for tech firms

Lords urge tougher rules for tech firms

These are external links and will open in a new window These are external links and will open in a new window Image copyright PA Image caption A Lords committee wants tech companies to have one overarching regulator setting rules for user privacy, data and anti-social content Tech firms, such as Google and Facebook, must improve their "inadequate" responses to privacy and data breaches and anti-social content, a House of Lords report says.

The UK’s AgeID porn filters are a recurring April Fool’s joke with a dark punchline

The UK’s AgeID porn filters are a recurring April Fool’s joke with a dark punchline

A statement from the DCMS to Sky News read: “The government, and the BBFC as the regulator, have taken the time to get this right and we will announce a commencement date shortly.” How is the UK going to issue a unique porn ID anyways?

Facebook’s new move isn't about privacy. It’s about domination

Facebook’s new move isn't about privacy. It’s about domination

People in China use WeChat for everything from sending messages to family to reading news and opinion to ordering food to paying at vending machines to paying for a taxi.

It looks like Facebook is giving up on its years-long effort to bring its social network to China

It looks like Facebook is giving up on its years-long effort to bring its social network to China

For example, data that's collected in China must be stored in that country, and companies must comply with strict rules like undergoing a security assessment if they want to send or move the data outside of China.

More