Oct 212014
 

Dr. Laura Finley writes: As if enduring the routine cat calls and doing whatever we must to “protect ourselves” against the possibility of being sexually assaulted isn’t enough, now women must also take care that no one surreptitiously takes a photo of our nether regions. It would seem that if there is any such thing [...]

Oct 202014
 

G.W. Schulz of the Center for Investigative Reporting reports: While revelations from Edward Snowden about the National Security Agency’s massive database of phone records have sparked a national debate about its constitutionality, another secretive database has gone largely unnoticed and without scrutiny. The database, which affects unknown numbers of people, contains phone records that at [...]

Oct 202014
 

Rick Forno of InfoWarrior noted this concerning entry on github: This repository provides a corpus of network communications automatically sent to Apple by OS X Yosemite; we’re using this dataset to explore how Yosemite shares user data with Apple. The provided data was collected using our Net Monitor toolkit; more information regarding usage and methodology is provided below. [...]

Oct 202014
 

Julian Hattem reports: FBI Director James Comey has launched a new “crypto war” by asking Congress to update a two-decade old law to make sure officials can access information from people’s cell phones and other communication devices. The call is expected to trigger a major Capitol Hill fight about whether or not tech companies need [...]

Oct 172014
 

Okay, so that’s not an actual headline from any news story, but it probably should be. Dan Froomkin and Natasha Vargas-Cooper write: FBI Director James Comey gave a speech Thursday about how cell-phone encryption could lead law enforcement to a “very dark place” where it “misses out” on crucial evidence to nail criminals. To make his case, he [...]

Oct 172014
 

Given that identity crimes, including credit, debit, and other payment card fraud, continue to be a risk to U.S. economic activity, and given the economic consequences of data breaches, the United States must take further action to enhance the security of data in the financial marketplace. While the U.S. Government’s credit, debit, and other payment [...]