Security Experts:

long dotted


US President Barack Obama meets Internet bosses to discuss his latest plans to overhaul US spy agency surveillance practices which have infuriated the industry.
The French intelligence agency in charge of military and electronic spying is massively collecting data and monitoring networks of telecoms giant Orange, according to a report.
US conglomerate Comcast said it received 24,698 law enforcement requests for customer data in 2013, plus some for national security reasons.
NSA deputy director Richard Ledgett spoke out against former intelligence contractor Edward Snowden, saying he does a disservice to whistle blowers.
The U.S. Federal Trade Commission has the tricky task of protecting consumer privacy in the age of Big Data and ubiquitous data collection without stifling innovation, a deputy director with the agency said at a conference this week.
Google co-founder Larry Page a the TED conference condemned US government snooping on the Internet as a threat to democracy.
The US government's clandestine PRISM Internet program exposed by Edward Snowden targets suspect email addresses and phone numbers but does not search for keywords like terrorism, officials said.
Edward Snowden used the conference organized by educational non-profit organization TED ("Technology Entertainment Design"), to call for people worldwide to fight for privacy and Internet freedom.
The National Security Agency has technology capable of recording all the phone calls of an entire country and replaying them later, a report based on leaked documents from Edward Snowden said.
According to IBM executive Robert Weber, IBM has not provided client data to the NSA or any other government agency under the program known as PRISM or under any surveillance program involving the bulk collection of content or metadata.


rss icon

Gant Redmon's picture
In the spirit of "trust but verify", you may occasionally scroll through your kid’s email or Google+ account, or pick up their phone to glance at recent texts. One would think this behavior it protected by law. Surprisingly, wiretap laws don’t have carve outs for parental snooping.
Gant Redmon's picture
By comparing what was creepy a few years back with what is creepy today and asking “why the change,” we will see the commonalities of creepiness and lessons for all who wish to make a successful business involving personal information.
Gant Redmon's picture
The CSO is so critical for the CPO’s success that I guarantee that if you send this article to your CPO, they will take you out for a free lunch the next day.
Jon-Louis Heimerl's picture
The power of metadata does not come in that data itself but in the ability of that data to be processed and correlated in an automated fashion. What many believe is meaningless data can reveal more than one would think.
Eric Knapp's picture
The NSA tapping into our digital lives is a heinous breach of privacy, say those on the opposing team. I say, “meh.” Assume that everything you do and say is being watched and heard, always.
Jon-Louis Heimerl's picture
The Omnibus Rule that updated the Health Insurance Portability and Accountability Act (HIPAA) has the potential to be a game changer because of the things it says in writing, as well as some of the things that it doesn’t say.
Gant Redmon's picture
What is unique to the Patriot Act compared to most other countries is the need for a court order. Most other countries allow their government authorities to go directly to the data host with administrative orders to produce data.
Gant Redmon's picture
Being in a public place makes you fair game. So what makes a place private instead of public? This is where that famed “reasonable person” comes in.
Gant Redmon's picture
When it comes to privacy policy, size matters. As a general rule, the longer it is, the more you’re hosed. But privacy statements don’t have to be a mystery.
Ryan Naraine's picture
Ryan Naraine talks to Christopher Soghoian about the latest iMessage encryption brouhaha, the indifference of the telephone companies towards security and the controversial practice of buying and selling software exploits.