• The problem with U.S. secrets

    Secrets are often harmless, but they can prompt major problems when they happen at the highest levels of government. So what are the consequences when a U.S. president is dangerously preoccupied with secrecy? One expert says that question is particularly relevant with a new administration taking charge. She said that every other administration withheld some crucial information, whether about Woodrow Wilson’s stroke, Richard Nixon’s burglaries, or Bill Clinton’s affairs. “Secrecy turns out to be the president’s greatest power,” she said. “And if not controlled, it’s also the greatest threat to democracy.”

  • Making it harder to track Bitcoin transactions

    Bitcoin was initially conceived as a way for people to exchange money anonymously. But then it was discovered that anyone could track all Bitcoin transactions and often identify the parties involved. Researchers have developed a Bitcoin-compatible system that could make it significantly more difficult for observers to identify or track the parties involved in any given Bitcoin transaction.

  • Consumers ignorant of tracking methods used by online advertisers

    The general public has a poor understanding of the workings of online behavioral advertising, and the privacy implications behind the information that advertisers gather. Researchers found that two-thirds of the consumers they interviewed in the study did not realize that most online advertising involved third-party entities and advertising networks that track a user’s browsing activities across websites to provide targeted ads.

  • “Anonymized” Web browsing history may not be anonymous after all

    Raising further questions about privacy on the internet, researchers have released a study showing that a specific person’s online behavior can be identified by linking anonymous Web browsing histories with social media profiles. The new research shows that anyone with access to browsing histories — a great number of companies and organizations —can identify many users by analyzing public information from social media accounts.

  • Personal technology aids in criminal proceedings, but poses privacy, rights risks

    Personal technology such as fitness trackers and smartphones that record users’ daily activities are likely to be used increasingly in criminal investigations, raising questions about individuals’ rights that the legal system is not yet fully prepared to address. Information such as location, travel patterns, and even physiological details such as heart rate and activity levels could be retrieved from devices as a part of criminal investigations. Such technology offers new tools to law enforcement, but raises unique issues regarding important constitutional rights such as self-incrimination, according to the report.

  • Health wearable devices pose new consumer and privacy risks

    Watches, fitness bands, and so-called “smart” clothing, linked to apps and mobile devices, are part of a growing “connected-health” system in the U.S., promising to provide people with more efficient ways to manage their own health. These personal health wearable devices, which are used to monitor heart rates, sleep patterns, calories, and even stress levels, raise new privacy and security risks, according to a new report.

  • Malware covertly turns PCs into eavesdropping devices

    Researchers have demonstrated malware that can turn computers into perpetual eavesdropping devices, even without a microphone. Using SPEAKE(a)R, malware that can covertly transform headphones into a pair of microphones, the researchers show how commonly used technology can be exploited.

  • Can you be anonymous on the Internet? No, you cannot

    If you still think you can be anonymous on the Internet, a team of Stanford and Princeton researchers has news for you: You cannot. Researchers say most people do not realize how much information they are leaving behind as they browse the Web. Online privacy risks are not new, but the researchers say their research is “another nail in the coffin” to the idea that the average person with the average Web browser can be private online.

  • We are watching you: U.K. CCTV strategy

    There are over six million CCTV cameras in the United Kingdom – one CCTV camera for every ten citizens. This number does not include body-cam footage, unmanned aerial vehicles, or the automatic number plate recognition system. Britain has 20 percent of the world’s cameras despite being home to less than one percent of its population. In 2015, turnover for the video and CCTV surveillance sector topped £2.12 billion in the United Kingdom. The government has just released a draft national surveillance camera strategy for England and Wales.

  • Half of American adults are in a little regulated police face recognition database

    Half of American adults — more than 117 million people — are in a law enforcement face recognition network, according to a report. Of the fifty-two government agencies that acknowledged using face recognition, only one obtained legislative approval for its use and only one agency provided evidence that it audited officers’ face recognition searches for misuse. Not one agency required warrants, and many agencies did not even require an officer to suspect someone of committing a crime before using face recognition to identify her.

  • Yahoo stealthily scanned customer e-mails on behalf of U.S. intelligence agencies

    A report on Tuesday accuses Yahoo of secretly building a customized software program to search all of its customers’ incoming e-mails for specific information provided by the U.S. intelligence company. The company, complying with classified NSA and FBI directives, scanned hundreds of millions of Yahoo Mail accounts. Yahoo is the first U.S. Internet company to agree to such a blanket request.

  • Which best protects your privacy: Apps or Web sites? It depends

    To protect your privacy, should you use the app — or a Web browser? This is the question researchers ask in new research that explores how free app — and Web-based services on Android and iOS mobile devices — compare with respect to protecting users’ privacy. In particular, the researchers investigated the degree to which each platform leaks personally identifiable information. The answer? “It depends,” they say.

  • Feds: We can read all your e-mail, and you’ll never know

    Fear of hackers reading private e-mails in cloud-based systems like Microsoft Outlook, Gmail, or Yahoo has recently sent regular people and public officials scrambling to delete entire accounts full of messages dating back years. What we don’t expect is our own government to hack our e-mail — but it’s happening. Federal court cases going on right now are revealing that federal officials can read all your e-mail without your knowledge. For example, in the case of U.S. v. Ravelo, pending in Newark, New Jersey, the government used a search warrant to download the entire contents of a lawyer’s personal cellphone – more than 90,000 items including text messages, e-mails, contact lists, and photos. When the phone’s owner complained to a judge, the government argued it could look at everything (except for privileged lawyer-client communications) before the court even issued a ruling. The judge in Ravelo is expected to issue a preliminary ruling on the feds’ arguments sometime in October. All Americans should be watching carefully to what happens next in these cases – the government may be already watching you without your knowledge.

  • Swiss approve broader surveillance powers for the government

    A majority of 65.5 percent of Swiss voters have on Sunday approved a new surveillance law, agreeing with the government’s argument that that the country’s security services needed more powers in an increasingly dangerous world. Relative to other European countries, the Swiss police and intelligence agencies have had limited investigative powers. For example, the law which was updated on Sunday had banned phone tapping and e-mail surveillance under any circumstances.

  • Fitness trackers found to have serious security flaws

    They may look like a normal watch but are capable to do much more than just showing the time: So-called fitness trackers are collecting data on their users’ lifestyle and health status on a large scale helping them with training or losing weight. Researchers have investigated fraud opportunities with fitness trackers and detected serious security flaws.