background preloader

Data Mining a Major Challenge to Personal Privacy

Data Mining a Major Challenge to Personal Privacy
12 min ago | ChinaTechNews.com Alibaba Throws Money At Internet Privacy Hu Xiaoming, Alibaba's vice president for small- and micro-financial group and chief risk officer, announced in Beijing that the company will invest CNY40 million to establish a security fund. Trending on the Topix Network 12 min ago | ComputerWorld Dropbox angling for larger corporate share Dropbox on Tuesday unveiled a new version of its data storage and sharing service for business claimed to provide IT administrators with more control by separating work and personal files. 3 hrs ago | ComputerWorld Data breaches nail more U.S. More U.S. 3 hrs ago | MediaPost Users Trust Online Retailers With Data Privacy, Less Confidence With Advertisers, Marketers Online auctions, banking, social networks, and competitions are taking the brunt of the burden when it comes to data protection. 3 hrs ago | JD Supra Balancing the data privacy debate: The benefits of big (and little) data 7 hrs ago | ComputerWorld 7 hrs ago | Mashable

Data privacy: What your zip code reveals about you - Apr. 18, 2013 All that is needed to match the information data brokers compile with what you buy is your full name — obtained when you swipe a credit card — and a zip code, according to data privacy experts. NEW YORK (CNNMoney) That five-digit zip code is one of the key items data brokers use to link a wealth of public records to what you buy. They can figure out whether you're getting married (or divorced), selling your home, smoke cigarettes, sending a kid off to college or about to have one. Such information is the cornerstone of a multi-billion dollar industry that enables retailers to target consumers with advertising and coupons. Acxiom, one of the biggest data brokers in the business, claims to have a database that holds information -- including one's age, marital status, education level, political leanings, hobbies and income level -- on 190 million individuals. Related: Your phone company is selling your personal data Buying a bunch of maternity clothes? Related: What type of consumer are you?

Obama 'Internet kill switch' plan approved by US Senate panel A US Senate committee has approved a wide-ranging cybersecurity bill that some critics have suggested would give the US president the authority to shut down parts of the Internet during a cyberattack. Senator Joe Lieberman and other bill sponsors have refuted the charges that the Protecting Cyberspace as a National Asset Act gives the president an Internet "kill switch." Instead, the bill puts limits on the powers the president already has to cause "the closing of any facility or stations for wire communication" in a time of war, as described in the Communications Act of 1934, they said in a breakdown of the bill published on the Senate Homeland Security and Governmental Affairs Committee website. The committee unanimously approved an amended version of the legislation by voice vote Thursday, a committee spokeswoman said. "Our responsibility for cyber defence goes well beyond the public sector because so much of cyberspace is owned and operated by the private sector," he said.

How Privacy is Lost April 28th, 2013 at 17:45 UTC by Ross Anderson On Friday I went to a fascinating lobbying meeting on the new EU data protection regulation. Europe is by default the world’s privacy regulator, as America doesn’t care and no-one else is big enough to matter; so this is really important. Some 3000 amendments have been proposed and the regulation is in the final stages of the committee process; the rapporteurs of the various parties are negotiating compromise amendments which should be ready for a vote within weeks. So the pressure is really on. Friday was extraordinary because all the lobbyists came together in one room to argue their cases. I am posting my notes of the meeting here, as it’s a good case history of how lobbying works, as well as of how our privacy is being lost. Sarah Ludford DPR meeting, 3–6 PM, 26/4/13, Europa House, Smith Square. Sarah says the shadows’ meeting has not so far gone through the articles in order but cherry-picked; started with articles 2, 3, 81, 83. 1. ..

Internet Blackout Costs Egypt £56m | eWEEK Europe UK The Egyptian government’s blocking of Internet services for five days is likely to have cost the country roughly $90 million (£56m), according to the Organisation for Economic Co-operation and Development (OECD). The blocked telecommunication and Internet services account for between three and four percent of the country’s GDP, equivalent to a loss of $18 million (£11m) per day. However, the OECD warns that the long-term impact could be far greater, as the cut-off could have deterred foreign investors from expanding their operations in Egypt. “Egypt has signed the OECD Seoul Declaration for the Future of the Internet Economy, which calls for an ‘open, decentralised and dynamic Internet’. “For this end the government has been promoting the adoption of telecommunication and the Internet throughout the country, but it might be difficult to win back some of that credit once the economy starts functioning normally again.”

Text of H.R. 6416, American Traveller Dignity Act of 2010 A BILL To ensure that certain Federal employees cannot hide behind immunity.Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,SECTION 1. SHORT TITLE. This Act may be cited as the ‘‘American Traveller Dignity Act of 2010’’.SEC. 2. NO IMMUNITY FOR CERTAIN AIRPORT SCREENING METHODS. No law of the United States shall be construed to confer any immunity for a Federal employee or agency or any individual or entity that receives Federal funds, who subjects an individual to any physical contact (including contact with any clothing the individual is wearing), x-rays, or millimeter waves, or aids in the creation of or views a representation of any part of a individual’s body covered by clothing as a condition for such individual to be in an airport or to fly in an aircraft. The preceding sentence shall apply even if the individual or the individual’s parent, guardian, or any other individual gives consent.

10 Safe Chat Sites for Teens That Aren’t Too Lame | DSL Service Providers Teens love to hang out and talk to their friends, but that’s not always safe to do online. It can be hard to figure out which sites are safe and which ones are scams, and even when you do find safe ones, they’re a drag. Well, not anymore. Here are ten sites that allow teens to chat, play, have fun and just chill safely. – The first social network geared toward tweens and teens hinging on the merits of education and social responsibility. – Solely a chat room, Free Teen Java Chat offers a safe, engaging environment for teens to hang out and talk. – Offering a safe website for children and teens, the Kidz World chat room is perfect for chatting it up after school, on a break from studying, TV, video games or….whatever. – The premiere entertainment and community website for teenagers! – A free web-cam chat room for teens, Teen Video Chat allows kids from all over the world chat together in a safe, monitored environment.

Life under digit continues | IPrivacy4IT - Clarinette's blog Update 24/02/2013: Surveillance keeps expanding. Drones are proliferating thanks to there cheap fabrications and the tentatives of regulation are regularly brought up. I have been curating articles on the subjects of surveillance, tracking, spying, and drones on my Pearltrees for anyone interested to make its own opinion. I am reading today a very well analysed essay by Ian Brown, Professor of Information Security and Privacy at the Oxford Internet Institute, on Drones surveillance and identity, titled ‘Privacy, surveillance and technologies impact on identity.’ Something to watch absolutely if you needed to understand what Drones are capable of producing: ‘Like a Swarm of Lethal Bugs: The Most Terrifying Drone Video Yet’ To read: ‘Why American Say No To Drones‘. ‘Are Drones Watching Your Town?’ Update 01/03/2011: CCTVs in schools even in the changing rooms I hear !! Update 08/11/2011 ‘Met Police request for Oyster data scrutiny ‘rises” ‘TSA Opt-Out Day, Now with a Superfantastic New Twist!

How to encrypt your entire life in less than an hour “Only the paranoid survive.” — Andy Grove Andy Grove was a Hungarian refugee who escaped communism, studied engineering, and ultimately lead the personal computer revolution as the CEO of Intel. He died earlier this year in Silicon Valley after a long fight with Parkinson’s disease. When one of the most powerful people in the world encourages us to be paranoid, maybe we should listen. And Grove isn’t the only powerful person urging caution. But you obey the law. Well, law-abiding citizens do have reason to fear. “If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.” — Cardinal Richelieu in 1641 In this article, I will show you how you can protect yourself by leveraging state-of-the-art encryption. Common sense security for everyone To be clear, everything I recommend here is 100% free and 100% legal. “Be prepared” — The Scout Motto Let’s get prepared. First, a couple definitions. Now. Seriously. Step #1: Install Signal

Carnival Fantasy - There's a video camera in my room! | Securely Travel There’s a video camera in my room and we’re not talking about the one in our smartphone, must have been the exclamation of Chris and Dana White of Pensacola, Florida when they found a video camera hidden behind their stateroom’s television aboard the Carnival Fantasy in October 2017. The shocking episode was first described in December 2017, via a Miami news outlet, which shared photos and the White’s story. At that time, I remember reading about the episode and thinking immediately what an odd thing to have occurred, but for an old Cold War warrior seeing rooms bugged with audio or video wasn’t exactly new science. Then this past week, the story recycled, with a Newsweek writeup and an Inside Edition piece. Here’s the device as photographed by the Whites. Now the close-up of the device’s wiring and antenna would seem to fly in the face of the Carnival’s claim that their security personnel determined, on the spot, that the device had no access to power. Which leave us with more questions.

Mise en œuvre expérimentale de l’application « REPORTY » par la ville de NICE : quelle est la position de la CNIL Cette application a été présentée à la Commission comme permettant à ses utilisateurs de signaler à la police municipale « une incivilité grave (dépôt sauvage d’encombrants ou de déchets sur la voie publique, tags conséquents sur un bien public) ou une « situation critique » (actes de violence, vol, enlèvement, attentat, effondrement, inondation, incendie, accident) » dont ils seraient témoins ou victimes, en transmettant en direct au « centre de supervision urbain » la localisation géographique en question accompagnée d’un enregistrement vidéo et sonore. Cette expérimentation a eu lieu du 10 janvier au 10 mars. Sur ce projet, la CNIL tient à apporter les précisions suivantes. Elle rappelle tout d’abord que la lutte contre le terrorisme et plus largement, la prévention des troubles à l’ordre public constituent des objectifs parfaitement légitimes pouvant justifier la mise en œuvre de dispositifs susceptibles de porter une atteinte à la vie privée.

OPN Reading Group – OPN Shoshana Zuboff’s new book, The Age of Surveillance Capitalism, is an investigation of the business model (and logic of accumulation) underlying the giants of Big Data. Because it lies right at the intersection of technology, philosophy, and economics, we think it is the ideal book to launch our reading group for the OPN. We’re looking forward to diving into this book and unravelling it with a mixture of philosophers, tech enthusiasts, and whoever else is interested. Schedule for our upcoming meetings Wed July 3rd – chapters 11, 12, 13, 14 (pp. 329 – 415) Wed August 7th – chapters 15, 16, 17, 18 (pp. 416 – 525) Here is the event poster for our upcoming meeting: We look forward to seeing you on July 3rd. Chapter Summaries & Extra Documents Click on the link below to download the summary of the respective chapter (summaries are uploaded one week before we meet) If you haven’t got your hands on a copy of the book yet, check out this article and interview to get a first taste of what it’s about.

Safe Crime Detection - i am trask TLDR: What if it was possible for surveillance to only invade the privacy of criminals or terrorists, leaving the innocent unsurveilled? This post proposes a way with a prototype in Python. Edit: If you're interested in training Encrypted Neural Networks, check out the PySyft Library at OpenMined Abstract: Modern criminals and terrorists hide amongst the patterns of innocent civilians, exactly mirroring daily life until the very last moments before becoming lethal, which can happen as quickly as a car turning onto a sidewalk or a man pulling out a knife on the street. Edit:The term "Prediction" seemed to trigger the assumption that I was proposing technology to predict "future" crimes. Edit 2: Some have critiqued this post by citing court cases when tools such as drug dogs or machine learning have been either inaccurate or biased based on unsuitable characteristics such as race. I typically tweet out new blogposts when they're complete @iamtrask. Part 1: Ideal Citizen Surveillance

Related: