Whether you like it or not, Facebook knows exactly who you are. But who else does? If you're a member of Facebook, chances are you've stalked and been stalked. But what if Facebook stalked back? Facebook is a veritable trove
You can use Facebook to: Share information with people you know, See what's going on with your friends, Look up people around you.Entered By: Jean Carbonneau
There's rising concern among privacy experts and legislators about the frenetic business of assembling and distributing personal data. Everyone, it seems, wants Social Security numbers, birth dates, maiden names, criminal records, civil judgments
A scathing report by the Justice Department's inspector general has found that the FBI has been seriously abusing its powers to gather confidential information. Congressional hearings on the report's conclusions have further demonstrated that
Checks will be made on all children to identify potential criminals under an extension of the "surveillance state" announced by Tony Blair. A Downing Street review of law and order also foreshadowed greater use of sophisticated CCTV, an exp
Colleges have been using campus card ID systems for years. But with increasing security concerns, similar products are moving into public schools. "We have 56,000 high school students and we wanted a better handle on (them)," said Patricia
FBI counterterrorism officials continued to use flawed procedures to obtain thousands of U.S. telephone records during a two-year period when bureau lawyers and managers were expressing escalating concerns about the practice, according to senior FBI
On March 9, 2007, as mandated by law, the Department of Justice’s Office of Inspector General issued a report on the FBI’s use of National Security Letters (NSLs). The FBI used these NSLs to obtain phone and financial records without a court order.
Attorney General Alberto Gonzales left open the possibility of pursuing criminal charges against FBI agents or lawyers who improperly used the USA Patriot Act in pursuit of suspected terrorists and spies. [sure Torchy]Entered By: Powell Gammill
The nation's top two law enforcement officials acknowledged the FBI broke the law to secretly pry out personal information about Americans. They apologized and vowed to prevent further illegal intrusions. [we won't do it, snicker, again]
Imagine a bureaucratic foul-up, they accidentally give you a document marked "top secret." It contains a log of some of your private phone calls. You read it and wonder what it all means. Then, the FBI shows up at your door, demands the doc
A security expert has cracked one of the UK's new biometric passports, which the British government hopes will cut down on cross-border crime and illegal immigration. The attack, which uses a common RFID reader and customised code,
The Census Bureau inadvertently posted personal information from 302 households on a public site multiple times over a five-month period, the bureau said Wednesday. The information included names, addresses, phone numbers, birth dates
The confidential and carefully guarded information included names, addresses, phone numbers, birth dates and family income ranges, said Ruth Cymber, the agency's director of communications. Cymber added, posting the information violated bureau po
[Yet they clear Bush.] Wal-Mart Stores Inc. said it has fired a Wal-Mart systems technician for recording phone conversations between the company's PR office and a newspaper reporter and intercepting text messages without authorization.
A White House privacy board is giving its stamp of approval to two of the Bush administration's controversial surveillance programs — electronic eavesdropping and financial tracking — and says they do not violate citizens' civil liberties.
After receiving a letter threatening possible patent litigation that caused IOActive to cancel his Feb. 28 Black Hat briefing, IOActive R&D director Chris Paget did give his Hacking RFID talk after all. Sort of.
Researchers at Toshiba Corp. have developed a method that they say makes it possible-- barring a change in the laws of physics-- to absolutely secure distribution of encryption keys across a network. [place your bets]
When a coalition of technology companies, insurers and health care providers launched a $100 million project last month to provide free electronic prescribing software to every physician in the US, it was greeted with cheers.
Tiny computer chips used for tracking food, tickets and other items are getting even smaller. Hitachi Ltd., a Japanese electronics maker, recently showed off radio frequency identification, or RFID, chips that are just 0.002 inches by 0.002 inches
Implanting radio ID tags in U.S. passports makes stealing personal data easier than ever. “This whole design is totally brain damaged. All of these RFID passports are a huge waste of money. They’re not increasing security at all.”
Media companies lost a bid to unseal documents in a lawsuit accusing AT&T Inc. of helping the National Security Agency to spy on US residents. US District Judge Vaughn R. Walker, in a ruling filed in San Francisco federal court
Has the TSA's website been hacked? All indications are yes, and that a malicious phishing attack has been launched against travelers who have or think they have been delayed because they are on a watchlist or have a name similar
Cards can be read through a wallet or an item of clothing, the security of the information is startlingly weak. “Would you be comfortable wearing your name, your credit card number and your card expiration date on your T-shirt?”
The US Dept. of Veterans Affairs began notifying 1.8 million veterans and doctors that their personal and business information could be on a portable hard drive that has been missing from an Alabama hospital for nearly 3 weeks.
In some cities in Europe and the US, a person can be videotaped by surveillance cameras hundreds of times a day, and it's safe to say that most of the time no one is actually watching. But the advent of "intelligent video" software tha
A team of world-leading neuroscientists has developed a powerful technique that allows them to look deep inside a person's brain and read their intentions before they act.
Concerned network admins should examine traffic logs closely. A correlation of traffic from several of these IP blocks likely indicates that a network is under surveillance or has had access attempted by the US intelligence community and affiliated e
The police had not obtained a warrant to place the GPS tracker on the defendant’s car. The district judge, however, ruled they had reasonable suspicion the defendant was engaged in criminal activity and therefor didn't require a judicial warrant.
A public iris scanning device is able to scan the iris of the eye without the knowledge or consent of the person being scanned. The device uses multiple cameras, and then combines images to create a single scan to ID people.