Jan 252021
 January 25, 2021  Posted by  Surveillance, U.S.

Joe Cadillic sends me an “I told you this would happen” message as Bruce Leshan reports:

 If you were anywhere near the Capitol on Jan. 6, you may be getting a knock on your door from the FBI.

A D.C. woman said an agent visited her neighbor and called her, telling them investigators were tracking people whose cell phones connected to wi-fi or pinged cell phone towers near the Capitol during the riots.

“They don’t call first, they just come to your house,” Bree Stevens, a legal investigator who lives near Capitol Hill, said.

Stevens said an FBI agent told her they were reaching out to every single person whose cell phone put them near the Capitol during the riots.

But it’s how they got the information that is concerning as this is an extremely broad sweep/surveillance operation:

“Extremely creepy, because he explained that they have everyone’s phone number from pinging off the cell phone towers, and they know basically exactly where you were, within the vicinity of the Capitol,” Stevens said. “And they can actually pinpoint on Google Maps exactly where you were standing. Like, he knew where I was standing on the sidewalk, like specifically, based on my cell phone ping.”

Read more on WUSA9.com.

Related: Feds Ask Travel Companies (Hotels, Car Rentals, Bus Companies) To ID Suspected Capitol Rioters (UPDATED)


Jan 252021
 January 25, 2021  Posted by  Healthcare

This appears to be a sponsored article written by Oddny Johnsen of the Norwegian centre for E-health research. It appeared on Sciencenorway.no.

A new IT tool will make it easier to carry out quality assurance throughout the health service.

“We can now easily extract information and statistics from electronic health records (EHR) to conduct research and quality assurance, without any risk of comprising sensitive information,” says professor Johan Gustav Bellika at the Norwegian Centre for E-health Research.

This technology could be an important step towards a national system for patient records, even if data is spread across numerous systems.


“The tool can be applied to all electronic health records, regardless of where in the system the record is stored, at a dentist, at a nursing home or a hospital. Not even the researchers will be able to identify which patient record the information comes from,” explains researcher Kassaye Yitbarek Yigzaw.

The tool is based on a data protection algorithm which Yigzaw developed and studied for his PhD in 2017.

To test the tool, researchers looked into prescriptions of antibiotics by GPs. The tool and its special algorithm were installed on the servers of three Norwegian GP centres.

Read more on sciencenorway.no


Kassaye Yitbarek Yigzaw et al.: Privacy-preserving architecture for providing feedback to clinicians on their clinical performance, BMC Med Inform Decis Mak. 2020. https://doi.org/10.1186/s12911-020-01147-5

Hamed Abedtash: Using OHDSI Data Network for Capturing Real-World Evidence: Our Experience with a Multi-Country Study on an Obese and Overweight Cohort, 2019.

Jan 252021
 January 25, 2021  Posted by  Court, Laws, Non-U.S.

Kristof Van Quathem, Shona O’Donovan, and Marianna Drake of Covington and Burling write:

On January 13, 2021, the Advocate General (“AG”), Michal Bobek, of the Court of Justice of the European Union (“CJEU”) issued his Opinion in Case C-645/19 Facebook Ireland Limited, Facebook Inc., Facebook Belgium BVBA v. the Belgian Data Protection Authority (“Belgian DPA”).  The AG determined that the one-stop shop mechanism under the EU’s General Data Protection Regulation (“GDPR”) prevents supervisory authorities, who are not the lead supervisory authority (“LSA”) of a controller or processor, from bringing proceedings before their national court, except in limited and exceptional cases specifically provided for by the GDPR.  The case will now move to the CJEU for a final judgment.

Read more on InsidePrivacy.

Jan 232021
 January 23, 2021  Posted by  Online, Surveillance, U.S.

Andy Greenberg of WIRED reports:

When hackers exploited a bug in Parler to download all of the right-wing social media platform’s contents last week, they were surprised to find that many of the pictures and videos contained geolocation metadata revealing exactly how many of the site’s users had taken part in the invasion of the US Capitol building just days before. But the videos uploaded to Parler also contain an equally sensitive bounty of data sitting in plain sight: thousands of images of unmasked faces, many of whom participated in the Capitol riot. Now one website has done the work of cataloging and publishing every one of those faces in a single, easy-to-browse lineup.

Late last week, a website called Faces of the Riot appeared online, showing nothing but a vast grid of more than 6,000 images of faces, each one tagged only with a string of characters associated with the Parler video in which it appeared.

Read more on Ars Technica.