-
Members of Scientific Journal Editorial Board Resign over China Genetics Papers
Eight members of the editorial board of Molecular Genetics & Genomic Medicine have resigned after the journal published several controversial papers which “critics fear could be used for DNA profiling and persecution of ethnic minorities in China.”
-
-
Maximum Privacy for Sharing Files Online
People who share documents or pictures online, or organizations which share confidential documents with employees and others, have little to no control over who views the information which is being sent and where it is being viewed. An FAU researcher has received a patent from the U.S. Patent and Trademark Office for a novel invention that controls how and when shared documents are displayed.
-
-
Spyware: Why the Booming Surveillance Tech Industry Is Vulnerable to Corruption and Abuse
The latest revelations about NSO Group’s Pegasus spyware are the latest indication that the spyware industry is out of control, with licensed customers free to spy on political and civilian targets as well as suspected criminals. We may be heading to a world in which no phone is safe from such attacks.
-
-
Journalists, Activists among 50,000 Targets of Israeli Spyware: Reports
Israeli cyber firm NSO Group claims that its Pegasus surveillance malware is sold to governments so they can better track terrorists and criminals, but many of the 45 governments deploying the surveillance software use it to track journalists, opposition politicians, and civil society activists. Some of these governments are authoritarian (for example, Azerbaijan, Bahrain, Kazakhstan, UAE, Saudi Arabia). Other are democracies (for example, India, Mexico, South Africa). The only EU member country to deploy the surveillance malware is Hungary, which places it in violation of the EU’s strict privacy and surveillance regulations.
-
-
Encrypting Photos on the Cloud to Keep Them Private
The limited amount of data that smartphones hold, and the way in which they are vulnerable to accidental loss and damage, lead many users to store their images online via cloud photo services. However, these online photo collections are not just valuable to their owners, but to attackers seeking to unearth a gold mine of personal data.
-
-
Berlin Court: Searching Phone of Asylum-Seeker Was Unlawful
Refugees have sued Germany for searching their cell phones during asylum applications. Regional judges have now ruled one such search unlawful. The impact could be far-reaching.
-
-
Privacy Activists Challenge Clearview AI in EU
European privacy groups accuse the facial scan company of stockpiling biometric data on billions of people without their permission. The firm’s database contains images “scraped” from websites, including social media.
-
-
How a Norwegian Government Report Shows the Limits of CFIUS Data Reviews
Amid growing attention to data and national security threats from China, a recent Norwegian government report sheds light on the limits of a U.S. government process for tackling them: the Committee on Foreign Investment in the United States (CFIUS). Kamran Kara-Pabani and Justin Sherman write that “CFIUS is still a useful and important mechanism for addressing the national security risks associated with direct foreign access to sensitive U.S. citizen data,” but that “policymakers must recognize that CFIUS must be complemented with other measures outside of the body’s scope.”
-
-
Supreme Court Asked to Review DHS’s Warrantless Searches of International Travelers’ Phones, Laptops
The Electronic Frontier Foundation (EFF), the American Civil Liberties Union, and the ACLU of Massachusetts on Friday filed a petition for a writ of certiorari, asking the Supreme Court to hear a challenge to the Department of Homeland Security’s policy and practice of warrantless and suspicionless searches of travelers’ electronic devices at U.S. airports and other ports of entry.
-
-
New Tool Reveals Security and Privacy Issues with Contact Tracing Apps
Researchers have developed a tool to identify security and privacy risks associated with Covid-19 contact tracing apps. COVIDGuardian, the first automated security and privacy assessment tool, tests contact tracing apps for potential threats such as malware, embedded trackers and private information leakage.
-
-
Deployment of Emotion-Recognition Technologies in China Threatens Human Rights
Emotion recognition is a biometric technology which purports to be able to analyze a person’s inner emotional state. These biometric applications are used by law enforcement authorities to identify suspicious individuals, and by schools to monitor how well a student is paying attention in class. China is deploying the technology to allow the authorities to better monitor forbidden anti-regime thoughts among citizens who are subject to police interrogation or investigation.
-
-
More Privacy When Using WhatsApp, Signal and Other Apps
Cryptography experts have developed a privacy-protecting security software for mobile messaging services. The software addresses to problem created when service providers access the users’ contact lists.
-
-
Baltimore Aerial Investigations Associated with Small Improvements in Solving Crimes
A preliminary report about an effort to use aerial surveillance to aid police investigations in Baltimore finds that the effort was associated with small increases in the rate at which police solved serious crimes, but an overall evaluation of the program will require a wider review of citywide police efforts, according to a new report.
-
-
Shining a Light on the Hidden Shadows of the Internet
The dark web is perceived as the underbelly of the internet world, but it’s not all as negative as it may seem, says a computer security expert. The dark web is becoming increasingly popular with internet users who simply want to safeguard their privacy online.
-
-
Coercive Collection of DNA Is Unethical, Damaging to the Future of Medical Research
The compulsory collection of DNA being undertaken in some parts of the world is not just unethical, but risks affecting people’s willingness to donate biological samples and thus contribute to the advancement of medical knowledge and the development of new treatments, say experts.
-
More headlines
The long view
Abuse-Resistant Digital Surveillance
Digital surveillance of suspects must be silent so as not to alert them. However, systems currently in use lack stringent technical mechanisms to ensure the legality of these measures. Security protocols to make legally required monitoring of digital communications more resistant to misuse and mass surveillance.