-
FBI wants 1994 online surveillance law updated
The FBI said the agency’s top priority this year is to update a surveillance law so authorities can monitor in real time Web activities of Americans suspected of committing crimes. The 1994 law, known as the Communications Assistance for Law Enforcement Act (CALEA), applies to telecommunication companies, but only partially to Web-based companies.
-
-
In 2012, Microsoft received 70,665 law-enforcement requests for customer information
On Thursday, Microsoft released the number of law enforcement requests it has received for information on its hundreds of millions of customers. By releasing the information, Microsoft is now putting itself on the same team as Google, Twitter, Yahoo, and other Web businesses which have published reports on law-enforcement request for customer information. In 2012 Microsoft received a total of 70,665 law-enforcement requests for customer information.
-
-
WOT distorting focus, resource allocation of U.S. intelligence community: experts
The U.S. Intelligence Advisory Board, a panel of fourteen highly regarded and experienced experts, many of whom past holder of high-level national security positions, has submitted a secret report to President Obama in which they say that the intense, 12-year focus of the intelligence community on finding and fighting terrorism has distorted the priorities, resource allocation, and training within that community. Former Senator David Boren, a member of the panel, asks: “in the long run, what’s more important to America: Afghanistan or China?”
-
-
Widely used FBI surveillance method ruled unconstitutional
A national security letters (NSLs) is an administrative subpoena which allows the FBI to ask Internet companies and communication service providers to turn over subscriber information on American customers, while prohibiting the providers from informing these customers that their personal information has been turned over to the FBI. Since the 9/11 attacks, the bureau has issued an average of 50,000 NSLs a year. A federal judge in California says this is “rendering the statute impermissibly overbroad.”
-
-
Google’s assault on privacy: a reminder
A year ago, on 1 March 2012, Goggle launched its privacy-eroding policy of combining and collating users’ information across all of Goggle’s products. Google offers no opt-out option. Forcing consumers to share every aspect and nuance of their Internet practices with the company was not enough for Google. Yesterday, the attorney generals of thirty-eight states reached an agreement with Google concerning Google’s practice of spying on Wi-Fi users. The company sheepishly admitted that its Street View Vans collected 600GB of user data from unprotected Wi-Fi networks, and was fined a measly $7 million.
-
-
Spotting and extracting relevant information from mountains of data
The term “Big Data” refers to a technology phenomenon that has arisen over the past thirty years. As computers have improved, growing storage and processing capacities have provided new and powerful ways to gain insight into the world by sifting through the infinite quantities of data available. This insight, discoverable in previously unseen patterns and trends within these phenomenally large data sets, can be hard to detect without new analytic tools that can comb through the information and highlight points of interest. Experts convene to address growing need for Big Data analysis tools.
-
-
DHS grant to fund technology for tracking mobile devices
The University Of Alabama at Birmingham(UAB) has been given a $583,000 grant from the Department of Homeland Securityto build a system for verifying the location history and chorological track of cell phones and smart phones, tablets, and other mobile devices. The system being built could also be used to eliminate contest fraud, verify the origin of sea food, and protect national security.
-
-
DNA sequencing a serious risk to privacy
The growing ease of DNA sequencing has led to enormous advancements in the scientific field. Through extensive networked databases, researchers can access genetic information to gain valuable knowledge about causative and preventative factors for disease, and identify new targets for future treatments. The wider availability of such information, however, also has a significant downside — the risk of revealing personal information. New study finds that new policies are needed to safeguard participants’ identity in genetic studies.
-
-
Google wants to limit law enforcement’s access to e-mails, users’ information
In 2012 Google received 16,407 requests for user data, which affected 31,072 users or accounts. More than half of the requests were accompanied with a subpoena, the others were not. Google is planning on lobbying Washington this year to persuade lawmakers that they should make it harder for law enforcement to gain access to e-mails and other digital messages.
-
-
New Hampshire bill would limit searches, expand expectation of privacy
New Hampshire State Representative Neal Kurk ® says state residents do not expect,when they throw something out in their trash or leave a drinking glass with their saliva on it at a public place, that law enforcement, insurance companies, or data miners would use the trash left behind to glean personally identifiable information.
-
-
Police depts. reviews policy on retaining data from license plate readers
License plate readers (LPRs) have been used more and more by law enforcement agencies across the United States, but as they gain popularity in law enforcement, they have become the subject of debate, and concern, in many local governments.
-
-
Unmanned vessel for continuous tracking of enemy submarines
DARPA looking for an unmanned naval vessel that can seek out and track quiet diesel submarines, forcing them to return to base and thus protecting friendly ships from attack
-
-
Kansas history says DHS opened his mail -- again
Grant Goodman, a retired professor at the University of Kansas, was shocked when he found out that DHS opened his mail in 2005, but now that it has happened again, he just wants to know why; CBP does not need a warrant or probable cause to check international mail or cargo
-
-
DARPA seeking surveillance technology to predict future behavior
DARPA has teamed up with scientists from Carnegie Mellon University to create an artificial intelligence system that can watch and predict what a person will “likely” do in the future, using specially programmed software designed to analyze various real-time video surveillance feeds; the system can automatically identify and notify officials if it recognized that an action is not permitted, detecting what is described as anomalous behaviors
-
-
Searching social media sources by geography
Geofeedia, has created a group of algorithms that can search multiple social media sources by geography in real time; the postings, pictures, and tweets that show up in the results of a search are geolocation-enabled, are free, and results can be streamed on a mobile device, computer, or tablet. Businesses may have to pay a fee for more intensive searches
-
More headlines
The long view
How DHS Laid the Groundwork for More Intelligence Abuse
I&A, the lead intelligence unit of the Department of Homeland Security (DHS) —long plagued by politicized targeting, permissive rules, and a toxic culture —has undergone a transformation over the last two years. Spencer Reynolds writes that this effort falls short. “Ultimately, Congress must rein in I&A,” he adds.