Sep 302015
 September 30, 2015  Posted by  Breaches, Featured News, Govt, U.S.

Shades of J. Edgar and dirty politics! I’m classifying this as a privacy breach and also an infosec breach as these data were supposed to be protected. 


The Secret Service’s assistant director urged that unflattering information the agency had in its files about a congressman critical of the service should be made public, according to a government watchdog report released Wednesday.

“Some information that he might find embarrassing needs to get out,” Assistant Director Edward Lowery wrote in an e-mail to a fellow director on March 31, commenting on an internal file that was being widely circulated inside the service. “Just to be fair.”

Read more on Washington Post.

Sep 302015
 September 30, 2015  Posted by  Govt, Surveillance, U.S.

Patrick Howell O’Neill reports:

The Justice Department is investigating the FBI’s use of information taken directly from mass surveillance conducted by the National Security Agency (NSA)’s collection of telephone metadata.

The yield of that NSA spying program was described by a judge as a “staggering” amount of data when the agency’s ability to collect it was struck down as illegal in court earlier this year. The program was resumed in June and will run until at least December.

Read more on The Daily Dot.

Thanks to Joe Cadillic for this link.

Sep 302015
 September 30, 2015  Posted by  Surveillance

Peter Sayer reports:

It’s little surprise that European governments prefer to host their data in Europe than in the U.S. — but now even Australian academics are expressing a preference for the Old World over the New.

On Monday, the CIO of Macquarie University in Sydney, Australia, told staff that Google can no longer be entrusted with their email and calendars because it plans to host them in the U.S., and not the European Union.

Read more on PCWorld.

Sep 302015
 September 30, 2015  Posted by  Breaches

Researchers from a US university say that voice imitation attacks using samples could increasingly be used to breach automated and human authentication systems.

Voice morphing software will enable hackers to launch these attacks, found a team at the University of Alabama, Birmingham (UAB).

Read more on Planet Biometrics.