Get flash to fully experience Pearltrees
Umberto Shtanzman/Shutterstock.com Cyberstalking apps and geolocation apps can track a mobile-device user’s location—and this information can then be shared with third parties such as advertisers, or with jealous spouses—often without the user’s knowledge that this is happening.
John Jay High School in San Antoni, Texas, has launched a new program to increase attendance. The "Student Locator Project" requires students to wear their microchip-embedded school IDs around their necks at all times and have their location tracked and monitored. "KSSHHT - We've got a teen purchasing some Reese's Pieces from a vending machines after designated vending time hours.
This weekend in New York City was a three-day hackers' conference called HOPE Number 9 which is only held every two years ; HOPE stands for "Hackers on Planet Earth" and there's always a lot of great info that comes out of it. One of the quotes floating around in regard to #HOPE9 came from Founder and CEO of Pallorium Inc 's Steven Rambam as " Rambam's first law : All databases will eventually be used for unintended purposes." This is the same man who spoke at the 2008 HOPE about " Privacy is dead - Get over it ."
By Nicole Ozer, ACLU of Northern California (Mar 12, 2012 at 10:00 am)
A Senate committee passed an act recently called the Protect IP Act but then, just as quickly, a Senator from Oregon, Ron Wyden, put the bill on hold because as he said, it would “muzzle speech and stifle innovation and economic growth.”
In an amazingly short and to the point ruling (embedded below), a judge in a district court in Southern Texas, Lynn Hughes, ruled that letting the government get mobile phone data without a warrant was unconstitutional : When the government requests records from cellular services, data disclosing the location of the telephone at the time of particular calls may be acquired only by a warrant issued on probable cause . U.S. Const., amend. 4.
After helping chairman Roger Ailes create the Fox News channel in 1996, Cooper was fired for doing an anonymous interview with New York Magazine : ”I'm frightened right now,” said a former Fox employee, noting the vast array of powerful connections Ailes maintains throughout the political and media worlds. “I've been told that if Ailes figures out I talked to you, he'll hunt me down and kill me.” Negotiating the ground rules for an off-the-record meeting, Ailes came on like an Edward G. Robinson character in a B movie.
Microsoft and Skype may represent a match made in mobile heaven but they’ve been in the news for all the wrong reasons of late. Skype outages have become a norm rather than an exception. Skype protocol has been cracked through reverse engineering and published as an open source project. And now a newly patented Microsoft technology called ‘ Legal Intercept ‘ that would allow the company to secretly intercept, monitor and record Skype calls is stoking privacy concerns. The technology would allow Microsoft to silently record communications on VoIP networks such as Skype.
An overzealous bill that claims to be about stopping child pornography turns every Web user into a person to monitor Every right-thinking person abhors child pornography. To combat it, legislators have brought through committee a poorly conceived, over-broad Congressional bill, The Protecting Children from Internet Pornographers Act of 2011.
Internet providers would be forced to keep logs of their customers' activities for one year--in case police want to review them in the future--under legislation that a U.S. House of Representatives committee approved today. The 19 to 10 vote represents a victory for conservative Republicans, who made data retention their first major technology initiative after last fall's elections, and the Justice Department officials who have quietly lobbied for the sweeping new requirements, a development first reported by CNET . House Judiciary committee prepares to vote on sweeping data retention mandate. (Credit: U.S. House of Representatives)
Aurora critics can remain anonymous, judge rules Tuesday, July 26, 2011 By National Post
What did you do for AT&T? How long did you work there? I worked at AT&T for 22 and a half years. My job was basically to keep the systems going. They were computer systems, network communication systems, Internet equipment, Voice over Internet [Protocol (VoIP)] equipment. I tested circuits long distance across the country.
This open-source application maps the information that your iPhone is recording about your movements. It doesn't record anything itself, it only displays files that are already hidden on your computer. Download the application Read the FAQ Authors
In a landmark decision issued today in the criminal appeal of U.S. v. Warshak , the Sixth Circuit Court of Appeals has ruled that the government must have a search warrant before it can secretly seize and search emails stored by email service providers. Closely tracking arguments made by EFF in its amicus brief , the court found that email users have the same reasonable expectation of privacy in their stored email as they do in their phone calls and postal mail. EFF filed a similar amicus brief with the 6th Circuit in 2006 in a civil suit brought by criminal defendant Warshak against the government for its warrantless seizure of his emails.
By Chris Conley (Jan 5, 2011 at 11:30 am) In a case with chilling privacy implications, the California Supreme Court recently held that police officers can search the entire contents of a cell phone whenever they arrest someone , no matter how small the suspected crime or how relevant the cell phone contents might be. Why? Because it's just like a backpack, according to the Court, and previous cases have stated that backpacks can be searched "incident to arrest" without a warrant. The problem, of course, is that cell phones and backpacks are very different.