-
Full-body imaging systems deployed to airports
Millimeter wave and backscatter technologies may be a popular alternative to searches, but privacy remains an issue
-
-
U.K. government plans to monitor online social networks
For the last three years, intelligence services in the United States and the United Kingdom have been examining the idea of keeping a close tab on communications made among members of social networks; the U.K. Home Office denies having plans for such monitoring, but critics are not convinced
-
-
Critics: Commercially driven deep packet inspection (DPI) is akin to wiretapping
New technology now allows third parties to engage in deep packet inspection (DPI), a technique that makes it possible to peer inside packets of data transmitted across the Internet; data collected is then sold to other companies to allow them more targeted advertising
-
-
Napolitano introduces make over top Real ID law
Napolitano, a harsh critic of the Real ID Act while governor of Arizona, adopts the “mend it, don’t end it” approach to the law
-
-
Personal information of 80,000 NYPD officers stolen
A NYPD pension telecommunications director swiped backup tapes that contained addresses, Social Security numbers, medical records, and direct-deposit information on nearly 80,000 current and retired police officers
-
-
Consumer-driven face recognition changes public debate
New photo programs from Apple and Google include revolutionary face-spotting technology; trouble is, Google’s Picasa would allow tagged photos from all its Picasa users to create a global database matching photos to e-mail addresses
-
-
Former U.K. home secretary: compulsory passports rather than national ID
David Blunkett, in a speech today, will suggest making national ID voluntary, opting instead for compulsory, pocket-size passports; will also raise questions about massive national database; critics charge there is less here than meets the eye
-
-
U.K. government's reports into ID scheme must be disclosed
U.K. Information Tribunal has ruled that requests from the public for review of internal government reports into the cost-effectiveness and feasibility of the planned National ID Card scheme should be granted — but with names of people quoted in the reports deleted
-
-
Former top MI6 official says bird flu more of a threat than terrorism
Former assistant chief of U.K.’s MI6 says pandemics posed more of threat to the U.K. population than terrorism; he also says that privacy worries about the international counterterrorist databases are exaggerated
-
-
EU security watchdog draws privacy baseline for national ID cards
As a dozen of EU members move toward e-IDs, a EU privacy and security watchdog raises questions about these ID schemes, calling for developing a strategy for protecting the privacy of data held through national ID card projects
-
-
Cybersecurity contractor's network hacked
A large U.S. government contractor specializing in providing cybersecurity and privacy services, has warned its employees their personal information may have been stolen after hackers planted a virus on its computer network
-
-
New technology would limit invasion of privacy posed by CCTVs
CCTVs proliferate to every corner, and worries grow about eroding privacy; a scientist offers a solution: face-blurring technology which would prevent the distribution on one’s image captured on CCTV without the authorization of those who sign up for the service
-
-
Beyond fingerprints: The FBI's next generation database
New, mammoth database will include not only enhanced fingerprint capabilities, but also other forms of biometric identification like palm prints, iris scans, facial imaging, scars, marks, and tattoos — in one searchable system
-
-
Heartland says it has fixed security problem
Heartland Payment Systems, the sixth-largest payment processor in the United States, processes payments for 250,000 companies; thieves install malicious program on company’s computers which captured data as it flowed across the network
-
-
N.Y. policeman illegally obtains, uses U.S. terror watch-list information
NYPD sergeant uses a colleague username and password to access the FBI terrorist watch-list; he then obtains information about an individual on the list — an individual locked in a child custody fight with a friend of the sergeant — and provide the information to the friend’s lawyer
-