Linux Privacy - Page 68

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Privacy News

Face ID Technology Gets Federal Funding

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A company that touts its facial identification system as a powerful new tool for security and crime fighting has received millions of dollars in federal funding to improve its surveillance technology for military and intelligence uses, according to documents and interviews.. . .

How Far Can FBI Spying Go?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

NEWARK -- Nicodemo S. Scarfo is not merely an affable computer aficionado, the son of Philadelphia's former mob boss and an alleged mastermind of a loan shark operation in New Jersey. He's also the defendant in a case that could . . .

Airport check-ins based on your iris

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Starting in October at London's Heathrow Airport, new iris recognition technology will enable selected passengers to look into a video camera at the passport control checkpoint and have their identity verified within seconds. The Heathrow program will be . . .

Huge identity theft still unresolved

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's been two weeks since key personal data belonging to hundreds of victims, including Social Security numbers, started appearing in an Internet chat room, and it was still unclear Saturday where the data was stolen from. The incident has been described as one of the largest identity theft cases ever, because the data being posted also includes driver's license numbers, date of birth and credit card information - everything a criminal would need to open an online bank account, apply for a credit card, even create the paperwork necessary to smuggle illegal immigrants.. . .

FBI Required to Report on E-Mail Wiretaps

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The U.S. House of Representatives passed a measure on Monday that would require the Federal Bureau of Investigation to report how it uses the controversial e-mail wiretap system formerly known as Carnivore. Although the bill places no restrictions on how the . . .

"Jam Echelon Day" doomed to failure, say experts

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Activists are planning an international day of protest. Their aim? To jam Echelon. But privacy experts warn that "trigger words" will not outsmart the global surveillance system. A group of Internet activists are hoping to bring attention to the US-led communications spy network, on 21 October, with a "Jam Echelon Day", but privacy experts are certain that the protests will have a minimal effect on the sophisticated surveillance system.. . .

Giving Up Privacy for a Bargain Price

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last week I got e-mail from eToys, the online retailer that went out of business last spring. Signed "Your Friends at eToys," it recommended I now do all my toy shopping at KBkids.com, the company that bought eToys' remaining inventory for . . .

House pulls Carnivore into the light

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A bill requiring federal law-enforcement officials to be more forthright when answering questions about electronic surveillance systems has passed the U.S. House. The bill, which passed by a unanimous voice vote Monday afternoon, would require the attorney general and the FBI . . .

Firms may unwittingly breach privacy act

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Knowledge management software configured to include email servers in its search boundaries could leave companies open to prosecution Organisations may be in danger of breaching privacy regulations unwittingly, if knowledge management (KM) software is configured to include email servers . . .

Industry body slams new security bill

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Computing Technology Industry Association (CTIA) has led a stinging attack on the UK Government's Private Security Issue Bill (PSIB), claiming that it is yet another burden on IT and network professionals. A spokesman for the CTIA said it would mean . . .

The spy in your living room

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Set-top boxes can tell corporate HQ what you watched last night and even what you bought online. And now the interactive TV industry wants to sell that data to advertisers. Touted as a possible replacement for both PC and analogue television . . .

Hitachi Unveils Tiny 'Money Chip'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hitachi's new chip can be embedded in currency, and can then tell a computer or other 'reader' whether a bill is real or counterfeit. Hitachi this week unveiled a tiny Radio Frequency Identification (RFID) chip so small that it can be embedded in money or other documents.. . .

Identity chip raises privacy concerns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A tiny new chip from Hitachi could have massive implications for security - and also for your privacy Hitachi has developed a chip that could be woven into paper money to help identify counterfeits, and which could also have wide ramifications for the identification and surveillance technologies.. . .

Critics Question New Internet Privacy Law

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Although providers of online financial services and others are taking steps to comply with new privacy laws, confusion over the Gramm-Leach-Bliley Act extends to companies affected by the legislation and to the government agencies enforcing it. Meanwhile, privacy advocates say . . .

Privacy by design

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Privacy efforts are intended to project an image of trust to consumers worried about the loss of their privacy, to dissuade lawmakers from tightening regulations, to prevent costly courtroom battles, and to avoid public relations nightmares while encouraging online transactions. IT . . .

Online firms in a fluster over privacy law

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Scores of online companies could find themselves in violation of new financial privacy rules that took effect on Sunday amid widespread uncertainties over their scope, legal experts say. Growing fears over ambiguities in the Gramm-Leach-Bliley Act have drawn a belated flurry . . .