-
Ensuring that software security policies reflect user needs
Researchers have developed a new natural language processing tool that businesses or other customers can use to ensure that software developers have a clear idea of the security policies to be incorporated into new software products
-
-
As domestic use of drones grows, privacy advocates worry
Small aerial drones are moving from the battlefield to local communities, and the pace grows faster; during the next year, drones may be used in cities and towns to help fight crime and keep officers out of danger; their use would save on the cost of fuel for police helicopters; some would feel safer as a result, but activists worry that this could be the beginning of a systemic invasion of privacy
-
-
New app uses scattered public information to put together a digital footprint of individuals, organizations
A new app application can collect scattered online clues to provide a picture of individuals or organizations; the application draws on public data sources in order to put together a graphical digital footprint
-
-
NIST awards $9 million to promote online security and privacy
The National Institute of Standards and Technology (NIST) last month announced more than $9 million in grant awards to support the National Strategy for Trusted Identities in Cyberspace (NSTIC); five U.S. organizations will pilot identity solutions which increase confidence in online transactions, prevent identity theft, and provide individuals with more control over how they share their personal information
-
-
Aussie banks considering biometric security
Australia’s major banks are considering a move to biometric security systems in an effort to boost security for their customers; the banks are changing their systems as a way for customers to keep their money and valuables safe without ATM cards
-
-
Electronic surveillance by U.S. law enforcement agencies has increased dramatically
According to data obtained by the American Civil Liberties Union (ACLU), U.S. law enforcement’s surveillance of e-mails and other Internet communication has skyrocketed in the last two years; some forms of surveillance have increased 361 percent
-
-
Law-enforcement agencies eager for Web-surveillance tools
Private technology firms are pitching software capable of analyzing large swaths of the Internet to local law enforcement looking for ways to stop the next mass shooting or domestic terrorist event before it happens; police departments hope the software will help them detect online information from terrorists, traffickers, pedophiles, and rioters
-
-
Drone use spreads to more areas and missions
As security challenges in the United State and around the globe change, many countries have one thing in common: unmanned drones will be a significant part of the future of security; advancements in technology are driving the use of UAVs into newareas
-
-
ACLU-sponsored app keeps police accountable
A new app from the ACLU of New Jersey allows people securely and discreetly to record and store interactions with police, as well as provide legal information about citizens’ rights when interacting with the police
-
-
U.S., Canada issue a joint statement of privacy principles
The United States and Canada issue a joint statement about the two countries’ perimeter security approach; the statement aims to reassure Canadians that their privacy rights would not be sacrificed to satisfy the U.S. security demands
-
-
WWII-like message encryption now available for e-mail security
A Singapore-based company offers an e-mail encryption system based on the Verman cipher, or one-time pad, which was invented in 1917 and used by spies in the Second World War; the Vernam cipher is unbreakable because it produces completely random cipher-text that secures data so that even the most powerful super computers can not break the encryption when it is used properly
-
-
ACLU: Cell phone tracking by police widespread
ACLU obtains information from over 200 law enforcement agencies; finds widespread police use of cell phone location tracking along with variance in legal standards, technology used
-
-
DHS resisted calls for intelligence on Occupy movement
Internal documents released by DHS demonstrate the efforts made by the department to avoid gathering intelligence on last year’s Occupy movement
-
-
California bill would restrict data usage from license plate scanners
Legislation has been introduced in California to limit the use of data gathered by patrol car-mounted license plate readers, and the duration for which such data may be held; access to the data by other agencies and personnel would be limited as well
-
-
NATO commander target of persistent Facebook cyberattacks
The senior commander of NATO has been the target of repeated Facebook-based cyberattacks that are believed to have originated from China; Admiral James Stavridis is the subject of a campaign to gain information about him and his colleagues, friends, and family
-