-
NSA revelations hobble pursuit of a comprehensive cyberdefense initiative
NSA director General Keith Alexander has proposed a digital version of Ronald Reagan’s space-based Star Wars missile defense program, which Reagan unveiled in 1983. In Alexander’s vision, when a cyberattack is launched at the United States, the defense system would intercept and thwart the attack before it caused any damage. Intercepting a cyberattack would require the NSA to tap, track, and scan all cyber traffic entering the United States. The technology needed to intercept cyberattacks, however, is strikingly similar to the technology the NSA uses for the types of surveillance Snowden exposed. Post-Snowden, it is doubtful that the administration would pursue a comprehensive cyberdefense initiative, or that lawmakers would accept it.
-
-
Automatic license plate readers used to collect, store data on millions of Americans
Automatic license plate readers are the most widespread location tracking technology available to law enforcement. Mounted on patrol cars or stationary objects like bridges, they snap photos of every passing car, recording their plate numbers, times, and locations. At first the captured plate data was used just to check against lists of cars law enforcement hoped to locate for various reasons (to act on arrest warrants, find stolen cars, etc.). Increasingly, however, all of this data is being fed into massive databases that contain the location information of many millions of innocent Americans stretching back for months or even years.
-
-
States move to draft their own drone laws
Advances in drone technology and drop in prices have led media and other organizations, and even private citizens, to purchase drones to do their own investigations. Several states have now drafted their own drone laws.
-
-
Studying how journalists and private citizens use of drones
Newly published research offers a groundbreaking perspective on the controversial use of unmanned aerial vehicles in journalism and mass communication, or “drone journalism.” Until now, there has been no formal research and academic writing on the use of smaller drones by news organizations and private citizens.
-
-
ACLU files lawsuit challenging NSA's phone surveillance
In the wake of the past week’s revelations about the NSA’s surveillance of phone calls, the yesterday American Civil Liberties Union (ACLU) filed a lawsuit charging that the program violates Americans’ constitutional rights of free speech, association, and privacy.
-
-
Cloud computing user privacy needs serious reform: scholars
When Web surfers sign up for a new online service or download a Web application for their smartphone or tablet, the service typically requires them to click a seemingly innocuous box and accept the company’s terms of service and privacy policy. Agreeing to terms without reading them beforehand, however, can adversely affect a user’s legal rights, says a new paper by an expert in technology and legal issues.
-
-
NIST publishes draft cloud computing security document for comment
The National Institute of Standards and Technology (NIST) has published a draft document on security for cloud computing as used in the federal government. The public comment period runs through 12 July 2013.
-
-
DHS: electronic devices of border crossers can be searched without reasonable suspicion
An internal DHS study says there was no legal problem with U.S. border agents searching a traveler’s laptop, cellphone, or other electronic devices based solely on a hunch. The study says that the searches do not violate the First and Fourth amendments, and that a 1986 government policy allowing only a cursory review of a traveler’s documents was insufficient.
-
-
NSA collecting information on Verizon customers’ communications
The National Security Agency (NSA) has been collecting massive amounts of “metadata,” or transactional information, on millions of Verizon’s U.S. customers. A court granted the NSA permission to begin information collection on 25 April, stipulating the collection must end by 19 July. The court order instructs Verizon to “continue production on an ongoing daily basis thereafter for the duration of this order.” It specifies that the records to be produced include “session identifying information,” such as “originating and terminating number,” the duration of each call, telephone calling card numbers, trunk identifiers, International Mobile Subscriber Identity (IMSI) number, and “comprehensive communication routing information.”
-
-
Iowa City to ban red-light cameras, drones, license plate readers
Iowa City could become the first city in the United States to issue a sweeping ban on three law-enforcement technologies: drones, license plate readers, and red-light cameras. Privacy advocates say each of these technologies poses a threat to privacy, and the cumulative effect of using all three would turn America into a surveillance society.
-
-
Divided Supreme Court allows collection of DNA samples from suspects upon arrest
The Supreme Court on Monday, in a 5-4 decision, ruled that law enforcement is now allowed to take samples of DNA from people who have been arrested on suspicion of committing a serious crime.“Taking and analyzing a cheek swab of the arrestee’s DNA is, like fingerprinting and photographing, a legitimate police booking procedure that is reasonable under the Fourth Amendment,”Justice Anthony Kennedy wrote for the majority.
-
-
DHS debars scanner maker from government contracts
The Transportation Security Administration (TSA) has sent OSI Systems, the manufacturer of airport body scanners, a debarment notice which would prevent the company from receiving government contacts in the future. The notice was sent to the company after TSA determined that the company had failed to address security concerns about its scanners.
-
-
Social sites’ privacy practices “seriously deficient”
The privacy management of sixteen popular social networking sites, including Facebook and Twitter, is “seriously deficient,” according to a new study. Researchers found a disconnect between privacy statements and the site’s actual privacy controls.
-
-
U.S. secretly obtains AP phone records to identify source of story
In what the AP calls a “massive and unprecedented intrusion” into the news organization’s news work, the U.S. Justice Department secretly gathered two-months-worth of telephone records of the agency’s reporters and editors. The AP says the records listed incoming and outgoing calls to the offices and homes of reporters and editors. The Justice Department began collecting the phone records in order to identify the source or sources of a 7 May 2012 AP story which detailed a secret CIA operation in Yemen to intercept an al Qaeda-sponsored attempt to load an IED onto a U.S.-bound airplane.
-
-
Texas legislators want TSA out to allow for anti-groping policy
Texas lawmakers are considering proposals to opt out of federal protection at all airports in the state. One of the proposals calls for charging airport security officials who aggressively check passengers.
-