• Privacy3-D printing Poses a Threat to Privacy

    3D printing technology poses a “grave and growing threat” to individual privacy because of the potential for products to reveal private information about individuals, experts have warned. A new study warns about a lack of awareness among governments and companies about privacy issues associated with 3D printers, and calls for changes to treaties on copyright law and international human rights law.

  • SurveillanceNSA’s Post-9/11 Mass Surveillance Program, Exposed by Snowden, Illegal: Court

    The U.S. Court of Appeals for the Ninth Circuit has ruled that the National Security Agency (NSA) intelligence’s surveillance program exposed by whistleblower Edward Snowden was unlawful, and possibly unconstitutional. Critics of the program say that in addition to violating privacy rights, the program’s was ineffective: Billions of phone calls and email messages were collected and scanned over the years, but only a handful of terrorism suspects were seized, and even fewer were convicted.

  • PrivacyBetter Control of What Mobile Apps Do with Your Data

    Every year, mobile app developers make billions of dollars selling data they collect from the mobile apps on your cell phone, and they aren’t making it easy for you to prevent that. While both Apple iOS and Android have introduced a growing collection of privacy permission settings that, in theory, give you more control over your data, studies have shown that users are still overwhelmed and are unable to take advantage of them. In particular, the privacy controls fail to distinguish between different purposes for which data is collected.

  • School surveillanceSchools’ Facial Recognition Technology Problematic, Should Be Banned: Experts

    Facial recognition technology should be banned for use in schools, according to a new study. The research reveals inaccuracy, racial inequity, and increased surveillance are the touchstones of a flawed technology.

  • AIArtificial Intelligence Is a Totalitarian’s Dream – Here’s How to Take Power Back

    By Simon McCarthy-Jones

    Individualistic Western societies are built on the idea that no one knows our thoughts, desires or joys better than we do. And so we put ourselves, rather than the government, in charge of our lives. We tend to agree with the philosopher Immanuel Kant’s claim that no one has the right to force their idea of the good life on us. Artificial intelligence (AI) will change this.

  • CybersecurityCyberspace Is Critical Infrastructure – It Will Take Effective Government Oversight to Make It Safe

    By Francine Berman

    A famous 1990s New Yorker cartoon showed two dogs at a computer and a caption that read “On the Internet, nobody knows you’re a dog.” The New Yorker cartoon doesn’t apply today. Not only do your browser, service provider and apps know you’re a dog, they know what breed you are, what kind of dog food you eat, who your owner is and where your doghouse is. Cyberspace can function as critical infrastructure only when it’s safe for everyone, but legal and regulatory protections in cyberspace have not kept up with the times.

  • PrivacyProtecting Yourself against Facial Recognition Software

    The rapid rise of facial recognition systems has placed the technology into many facets of our daily lives, whether we know it or not. What might seem innocuous when Facebook identifies a friend in an uploaded photo grows more ominous in enterprises such as Clearview AI, a private company that trained its facial recognition system on billions of images scraped without consent from social media and the internet. A new research project from the University of Chicago provides a powerful new protection mechanism.

  • TrustTrust in Data Privacy Increases During Pandemic

    COVID-19 has seen Australians become more trusting of organizations and governments when it comes to their personal data and privacy, according to new research. “Our findings provide strong support for the notion that trust and confidence in different aspects of policy design and delivery interact with each other, creating vicious or virtuous circles,” says the study’s lead author.

  • SurveillanceHow to Hide from a Drone – the Subtle Art of “Ghosting” in the Age of Surveillance

    By Austin Choi-Fitzpatrick

    Drones of all sizes are being used by environmental advocates to monitor deforestation, by conservationists to track poachers, and by journalists and activists to document large protests. But when the Department of Homeland Security redirects large, fixed-wing drones from the U.S.-Mexico border to monitor protests, and when towns experiment with using drones to test people for fevers, it’s time to think about how many eyes are in the sky and how to avoid unwanted aerial surveillance. One way that’s within reach of nearly everyone is learning how to simply disappear from view.

  • Contact tracingContact Tracing’s Long, Turbulent History Holds Lessons for COVID-19

    To get the COVID-19 pandemic under control and keep it from flaring up again, contact tracing is critical, but persuading everyone who tests positive to share where they’ve been and with whom relies on trust and cooperation. Amy Lauren Fairchild, Lawrence O. Gostin, and Ronald Bayer write in The Conversation that contact tracing’s long, contested history shows how easily both can be shattered. Looking back at the reasons for resistance to contact tracing as the U.S. struggled to contain epidemics in the past can help us understand the first signs of pushback against contact tracing in the COVID-19 response, as well as the public health consequences.

  • CybersecurityPersonal Data Can Easily Be Extracted from Zoom, Other Video Conference Screenshots

    Video conference users should not post screen images of Zoom and other video conference sessions on social media, according to BGU researchers, who easily identified people from public screenshots of video meetings on Zoom, Microsoft Teams and Google Meet.

  • SurveillanceEFF Launches Searchable Database of Police Use of Surveillance Technologies

    The Electronic Frontier Foundation (EFF), in partnership with the Reynolds School of Journalism at the University of Nevada, Reno, the other day launched what the EFF describes as “the largest-ever collection of searchable data on police use of surveillance technologies,” created as a tool for the public to learn about facial recognition, drones, license plate readers, and other devices law enforcement agencies are acquiring to spy on our communities.

  • SurveillanceLarge-Scale Facial Recognition Is Incompatible with a Free Society

    By Seth Lazar, Claire Benn, and Mario Günther

    In the U.S., tireless opposition to state use of facial recognition algorithms has recently won some victories. Outside the U.S., however, the tide is heading in the other direction. To decide whether to expand or limit the use of facial recognition technology, nations will need to answer fundamental questions about the kind of people, and the kind of society, they want to be. Face surveillance is based on morally compromised research, violates our rights, is harmful, and exacerbates structural injustice, both when it works and when it fails. Its adoption harms individuals, and makes our society as a whole more unjust, and less free. A moratorium on its use is the least we should demand.

  • PrivacyPrivacy Risks of Home Security Cameras

    Researchers have used data from a major home Internet Protocol (IP) security camera provider to evaluate potential privacy risks for users. The researchers found that the traffic generated by the cameras could be monitored by attackers and used to predict when a house is occupied or not.

  • SurveillanceCoronavirus opens door to company surveillance of workers

    Employers are rushing to use digital tracking technology to reduce virus transmission in the workplace. Mohana Ravindranath writes in Politico that privacy experts worry that businesses will start using their newfound surveillance capabilities for purposes far beyond public health. The data could be used to evaluate workers’ productivity, see which colleagues are holding meetings or even flag an employee who unexpectedly ducks out of the office during work hours.