Linux Privacy - Page 66
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
While US congressional committees are holding meetings to consider legislation by the Justice Department, organisations such as the Electronic Privacy Information Center (Epic) are urging Congress to be careful of changes that will affect privacy and constitutional rights. Topics under consideration . . .
US lawmakers may be asked to give the FBI a "software key" to encryption technology that would allow the agency to unlock secret Internet messages but experts warn the measure would impair commerce and violate privacy right without deterring terrorism. The . . .
Although renewed calls for a national identity card have sparked a heated debate in the United States in the wake of the Sept. 11 terrorist attack, such cards are the norm in most of the world.. . .
Technology is the ultimate chameleon, taking on the characteristics of its handler. In some hands technology is a tool of treachery, while in others it morphs into a peaceful protest. In still others, it represents the bleeding edge of freedom. . . .
CHAIRMAN and Chief Executive Officer Larry Ellison has called for a national identification (ID) card to be issued to all U.S. citizens in an effort to help prevent future terrorist attacks. To help build such a system, Ellison has reportedly offered . . .
Tools acquired by the Google search engine could make its results more relevant to users - but it runs the risk of infringing privacy. Google looks set to add personalisation features to its popular search engine, following the acquisition of Outride's intellectual property assets, announced yesterday.. . .
The debate over the ethics of using an employer's system to surf the Net is ongoing. Employee privacy rights and whether or not the company owns the contents of employees' machines are just two facets of it. The opportunity for system . . .
Significant and perhaps worrisome changes in the government's Internet surveillance authority have been proposed by legislators in the wake of the attacks on the World Trade Center and the Pentagon. Indeed, so much is happening so quickly it's hard to keep . . .
In the wake of last week's terrorist attacks on New York and Washington, all kinds of fancy machines--from facial-recognition databases to advanced luggage scanners to glorified autopilots--have been proposed as technological fixes in the fight against terrorism. So what do such . . .
Created in response to last week's bloody attacks, the draft "Mobilization Against Terrorism Act" (MATA) rewrites laws dealing with wiretapping, eavesdropping and immigration. The draft, intended to increase prosecutors' courtroom authority, also unleashes the government's Echelon and Carnivore spy systems. President . . .
There's no doubt that public sentiment has shifted to favor those who would give primacy to security, even at the expense of civil liberties. Lawmakers are being buoyed by John and Jane Q. Citizen's apparent willingness to say, "Hey, I'm not . . .
A controversial law was recently drafted, although not yet introduced, by U.S. Sen. Fritz Hollings (D-South Carolina), chairman of the Senate Commerce committee, and Sen. Ted Stevens (R-Alaska), titled "The Security Systems Standards and Certification Act" (SSSCA).. . .
What's that unknown person with the laptop sitting on a bench outside your office doing? If you're running an 802.11-based wireless LAN, that person could be watching your employees' every online move.. . .
The U.S. National Security Agency engaged the so-called Echelon communications monitoring network, following on warnings of possible terrorist attacks, as long as three months ago, the Frankfurter Allgemeine Zeitung newspaper reported. . . .
Federal police are reportedly increasing Internet surveillance after Tuesday's deadly attacks on the World Trade Center and the Pentagon. Just hours after three airplanes smashed into the buildings in what some U.S. legislators have dubbed a second Pearl Harbor, FBI agents . . .
The European Parliament Wednesday adopted a report that says the global electronic-surveillance network known as "Echelon" does exist. Some 367 members of the European Parliament voted to support the report, which was several years in the making, while 159 voted against and 34 members abstained at the Parliament's plenary session in Strasbourg, France.. . .
Echelon exists, the European Union (EU) Parliament was told Wednesday. Echelon, allegedly a vast information collection system capable of monitoring all the electronic communications in the world, has been talked about in security circles for several years. But no government agency . . .
Friday, in a New Jersey courtroom, the FBI is scheduled to deliver a secret report detailing a new way it uses to spy on American citizens behind their backs. The dispute is technical, involving a way to track a computer's every keystroke.. . .
The following information consists entirely of excerpts from the European Parliament's "Temporary Committee on the ECHELON Interception System" report. After reading the entire lengthy, and often technical, report I decided to sift through and find the information that most people would . . .
Consumer information is currency. And businesses that collect, mint and trade this information have done so thus far with relative impunity. "The key to privacy protection is enforcement. Right now, there's no financial harm for not having or following a privacy . . .