background preloader

Privacy, Especially Online

Facebook Twitter

It’s legal: cops seize cell phone, impersonate owner. In November 2009, police officers in the state of Washington seized an iPhone belonging to suspected drug dealer Daniel Lee. While the phone was in police custody, a man named Shawn Hinton sent a text message to the device, reading, "Hey whats up dogg can you call me i need to talk to you. " Suspecting that Hinton was looking to buy drugs from Lee, Detective Kevin Sawyer replied to the message, posing as Lee. With a series of text messages, he arranged to meet Hinton in the parking lot of a local grocery store—where Hinton was arrested and charged with attempted possession of heroin. Hinton wasn't Sawyer's only target. According to a court decision summing up the facts, "Sawyer spent about 5 or 10 minutes looking at some of the text messages on the iPhone; he also looked to see who had been calling.

So Sawyer texted one of the individuals on the list and asked him if he "needed more. " But can cops legally do this with seized cell phones? Unsettled law. Critics See South Korea Internet Curbs as Censorship. Photo SEOUL, South Korea — A government critic who called the president a curse word on his Twitter account found it blocked.

Critics See South Korea Internet Curbs as Censorship

An activist whose Twitter posting likened officials to pirates for approving a controversial naval base was accused by the navy of criminal defamation. And a judge who wrote that the president (“His Highness”) was out to “screw” Internet users who challenged his authority was fired in what was widely seen as retaliation. Such a crackdown on Internet freedom would be notable, but perhaps not surprising, in China, with its army of vigilant online censors. But the avid policing of social media in these cases took place in South Korea, a thriving democracy and one of the world’s most wired societies. The seeming disconnect is at least partly rooted in South Korea’s struggle to manage the contradictions in eagerly embracing the Web as one way to catch up with the world’s top economies, while clinging to a patriarchal and somewhat puritanical past.

F.D.A. Surveillance of Scientists Spread to Outside Critics. How former Leafs GM Brian Burke aims to unmask online rumour-mongers. Brian Burke’s lawsuit against anonymous online commenters might seem far-fetched, but Internet privacy-law experts say it should be only a matter of time and money before those identities are revealed.

How former Leafs GM Brian Burke aims to unmask online rumour-mongers

Mr. Burke, the former general manager and president of the Toronto Maple Leafs, filed a lawsuit Friday with the B.C. Supreme Court alleging defamation against 18 defendants, whose identities are limited to cryptic online handles such as Ncognito, Slobberface and Sir Psycho Sexy. According to the court filing, comments made between Jan. 12 and Jan. 28, 2013 accused Mr. Burke of having an extramarital affair with Rogers Sportsnet sportscaster Hazel Mae. Mr. “We think of defamation as being printed or said over the radio where you can easily identify who is saying it,” Mr. But revealing anonymous commenters through the Canadian legal system has been done, says Michael Geist, a law professor at the University of Ottawa.

American golfer Phil Mickelson went through the process last year. Mr. How to delete your digital life. Wiping away your digital life means getting rid of the traces you've left – the mistakes you made, the embarrassing photos, the unwise comments, the flawed social media profiles where you've left too much visible.

How to delete your digital life

But how easy is that? The following steps provide a start to reducing your digital footprint and taking back control of your online life. 1) If you have a Facebook account, change every setting in the Privacy tabs to "private" or "not shared" or "off" (there's a special "privacy settings" shortcut in the blue bar near the top). 2) Find out what photos you're tagged in on Facebook. These should appear in the Photos tab on the left hand side. 3) If you have a Google Blogger account, delete your profile there. 4) If you've got a Tumblr or Wordpress blog, delete that too.

Now start using a search engine, and begin searching on your name (put the first name and surname together in quotes; this works in pretty much all search engines to identify that as a phrase you're after). Major Pakistan Cellular Company Lets Users Tweet for Free - Mike Isaac - Social. Saudi telecom Mobily working on project to intercept mobile data. Software engineer Moxie Marlinspike over at Thought Crime says he's no stranger to unsolicited emails from individuals seeking help with surveillance efforts, due to some of the software he has created.

Saudi telecom Mobily working on project to intercept mobile data

While the programmer says he ignores most of them, one he received earlier this month caught his eye, and a short while later he discovered that Saudi Arabia telecom Mobily is working on a project to intercept mobile traffic. The email, says Marlinspike, appeared in his inbox one day with the alluring subject line: Solution for monitoring encrypted data on telecom.

Though he wasn't interested in helping, he did respond to the agent's email, initiating a correspondence that the programmer says lasted for a week.