Oct 242014

This is an unofficial announcement of Commission action. Release of the full text of a Commission order constitutes official action. See MCI v. FCC. 515 F 2d 385 (D.C. Cir. 1974). FCC PLANS $10 MILLION FINE FOR CARRIERS THAT BREACHED CONSUMER PRIVACY TerraCom and YourTel Allegedly Stored Customers’ Personal Information Online in a Format Accessible [...]

Oct 232014

Kim Zetter reports: Senator Ron Wyden thought he knew what was going on. The Democrat from Oregon, who has served on the Senate Select Committee on Intelligence since 2001, thought he knew the nature of the National Security Agency’s surveillance activities. As a committee member with a classified clearance, he received regular briefings to conduct oversight. But [...]

Oct 222014

Ashkan Soltani (who will be FTC’s new Chief Technologist) and Craig Timberg report: Wireless carrier T-Mobile US has been quietly upgrading its network in a way that makes it harder for surveillance equipment to eavesdrop on calls and monitor texts, even on the company’s legacy system. The upgrade involves switching to a new encryption standard, [...]

Oct 212014

Dr. Laura Finley writes: As if enduring the routine cat calls and doing whatever we must to “protect ourselves” against the possibility of being sexually assaulted isn’t enough, now women must also take care that no one surreptitiously takes a photo of our nether regions. It would seem that if there is any such thing [...]

Oct 202014

G.W. Schulz of the Center for Investigative Reporting reports: While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny. The database, which affects unknown numbers of people, contains phone records that at [...]

Oct 202014

Rick Forno of InfoWarrior noted this concerning entry on github: This repository provides a corpus of network communications automatically sent to Apple by OS X Yosemite; we’re using this dataset to explore how Yosemite shares user data with Apple. The provided data was collected using our Net Monitor toolkit; more information regarding usage and methodology is provided below. [...]