Email / Spam / Phone / Wireless / Messaging
Articles and Resources
Date Fairness.com Resource Read it at: May 01, 2013 Cellphone Thefts Grow, but the Industry Looks the Other Way
QUOTE: new nationwide database for stolen cellphones, which tracks a phone’s unique identifying number to prevent it from being activated, theoretically discouraging thefts. But police officials say the database has not helped....Some law enforcement authorities, though, say there is a bigger issue — that carriers and handset makers have little incentive to fix the problem.
New York Times Mar 08, 2013 Skype's Been Hijacked in China, and Microsoft Is O.K. With It
QUOTE: a conflict between Microsoft’s advocacy of privacy rights and its role in surveillance....When Internet users in China try to access Skype.com, they’re diverted to the TOM-Skype site. While the Chinese version bears the blue Skype logo—and provides services for online phone calls and text chats—it’s a modified version of the program found elsewhere in the world. The surveillance feature in TOM-Skype conducts the monitoring directly on a user’s computer...
BusinessWeek Nov 15, 2012 The Real Reason You Should Care About the Petraeus Affair: Privacy
QUOTE: Once you've opened an email or your Facebook account, you've provided your personal information to a third party. The government can then ask that third party—Google, Yahoo, Facebook, Friendster, or whatever—for your information, and they don't necessarily need a warrant. The Constitution protects you from unreasonable search and seizure by the government. It doesn't stop third parties from sharing personal information you willingly give them.
Mother Jones Jul 19, 2012 It's legal: cops seize cell phone, impersonate owner: Court says sending texts using a seized iPhone doesn't violate privacy rights.
QUOTE: Mobile phones exist in a constitutional grey area. The law has well-developed doctrines protecting the privacy of our desktop computers, landline telephones, and filing cabinets. But modern cell phones perform all of these functions, and more. If the police are free to rummage through any cell phone that falls into their hands, every arrest would automatically give the police access to a treasure trove of private data that they would otherwise need a warrant, based on probable cause, to obtain.
Ars Technica Jul 13, 2012 That’s No Phone. That’s My Tracker.
QUOTE: Thanks to the explosion of GPS technology and smartphone apps, these devices are also taking note of what we buy, where and when we buy it, how much money we have in the bank, whom we text and e-mail, what Web sites we visit, how and where we travel, what time we go to sleep and wake up — and more. Much of that data is shared with companies that use it to offer us services they think we want.
New York Times Mar 31, 2012 Police Are Using Phone Tracking as a Routine Tool
QUOTE: Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show. The practice has become big business for cellphone companies, too...
New York Times Jan 25, 2012 Build Up Your Phone’s Defenses Against Hackers
QUOTE: Technology experts expect breached, infiltrated or otherwise compromised cellphones to be the scourge of 2012. The smartphone security company Lookout Inc. estimates that more than a million phones worldwide have already been affected.
New York Times Nov 30, 2011 Is your phone telling the carrier everything you do?
QUOTE: the XDA-Developer site noticed that a preinstalled mobile app, named CarrierIQ, was logging all smartphone activities with no way to opt out....Although consumers are buying smartphones — and assume they have ownership — are the handsets theirs to do with as they please, without the carriers or handset makers know what they’re doing?
GigaOM Nov 19, 2011 Document Trove Exposes Surveillance Methods (Censorship Inc.)
QUOTE: a retail market for surveillance tools has sprung up from "nearly zero" in 2001 to about $5 billion a year, said Jerry Lucas, president of TeleStrategies Inc., the show's operator. Critics say the market represents a new sort of arms trade supplying Western governments and repressive nations alike. "The Arab Spring countries all had more sophisticated surveillance capabilities than I would have guessed..."
Wall Street Journal, The (WSJ) Oct 26, 2011 When Secrets Aren’t Safe With Journalists (Op-Ed)
QUOTE: operational computer security is still not taught in most journalism schools, and poor data security practices remain widespread in news organizations....Until journalists take their security obligations seriously, it will be safer to leak something to WikiLeaks — or groups like it — than to the mainstream press.
New York Times Oct 10, 2011 Secret Orders Target Email: WikiLeaks Backer's Information Sought
QUOTE: The court clashes in the WikiLeaks case provide a rare public window into the growing debate over a federal law that lets the government secretly obtain information from people's email and cellphones without a search warrant. Several court decisions have questioned whether the law, the Electronic Communications Privacy Act, violates the U.S. Constitution's Fourth Amendment protections against unreasonable searches and seizures.
Wall Street Journal, The (WSJ) Aug 19, 2011 Your Voice Mail May Be Even Less Secure Than You Thought
QUOTE: AT&T, Sprint and T-Mobile do not require cellphone customers to use a password on their voice mail boxes, and plenty of people never bother to set one up. But if you don’t, people using a service colloquially known as caller ID spoofing could disguise their phone as yours and get access to your messages. This is possible because voice mail systems often grant access to callers who appear to be phoning from their own number.
New York Times Aug 11, 2011 Court: Clogging email and voicemail systems can be legal: Court ruling means it's OK for protesters to shut down a company's communication systems under certain circumstances
QUOTE: The ruling can be viewed a victory for free speech because it means people can continue to freely launch legitimate protest campaigns against business and politicians alike via email and phone calls. But it also means that groups with questionable aims can engage in similar practices under the guise of fighting for a greater good when, in fact, they're acting out of selfish interests.
InfoWorld Jul 07, 2011 Murdoch paper suffers new blow in hacking scandal
QUOTE: the latest blow to the British Sunday tabloid [News of the World--Ed.] that has been accused of illegally eavesdropping on the messages of murder and terror victims, celebrities and politicians. Prime Minister David Cameron Wednesday backed calls for an independent inquiry into the scandal
CNN (Cable News Network) Jul 06, 2011 How Did News of the World Hack Victims' Cell Phones?
QUOTE: The alleged actions of the tabloid's cell phone-hacking employees may beggar belief, Kevin Mahaffey, co-founder and CTO of mobile security firm Lookout, told PC Mag Wednesday. But their techniques for accessing other people's private mail boxes were probably very simple.
PC Magazine May 12, 2011 Why gadget makers wield a 'kill switch'
QUOTE: When you buy a video game from Best Buy, you don't give the retailer the right to barge into your house whenever it wants. So why do we give that permission to software companies? Most popular smartphone operating systems and other electronic gadgets include what security researchers refer to as a kill switch. This capability enables the company that makes the operating software to send a command over the Web or wireless networks that alters or removes certain applications from devices.
CNN (Cable News Network) May 08, 2011 Suit Opens a Window Into Google
QUOTE: In the smartphone market....“Google has the same problem today that Microsoft had 20 years ago, when Windows started to take off in the personal computer market,” said David B. Yoffie, a professor at the Harvard Business School. “It needs to maintain the integrity of its technology, and control it.”
New York Times Apr 25, 2011 Email users still running amok despite years of warnings: A survey shows that email remains a major source of corporate data leakage, as users continue to break the rules
QUOTE: Despite years of regulations, fines, corporate policies, and data leakage prevention tools, companies are still remarkably vulnerable when it comes to employees' inappropriate use of email.
InfoWorld Mar 21, 2011 Google says Gmail problems designed by Chinese government
QUOTE: "There is no technical issue on our side. We have checked extensively," said a Google spokesperson. "This is a government blockage carefully designed to look like the problem is with Gmail…” The word "Jasmine" and terms relating to the anti-government protests in the Middle East can no longer be searched for on the country's microblogs. China has also responded by arresting activists, harassing foreign journalists and deploying large police forces to prevent unrest.
InfoWorld Mar 04, 2011 Hacked e-mails show Web is increasingly useful tool in dirty-tricks campaigns
QUOTE: But many experts say the shadowy political intelligence business has become larger and more sophisticated as corporations, trade groups and political parties increasingly turn to computer sleuths to monitor and, in some cases, harass their detractors. The work almost always goes undetected and has been made easier with the rise of computer networks and social media sites with relatively lax safeguards.
Washington Post Dec 21, 2010 F.C.C. Approves Net Rules and Braces for Fight (Media Decoder)
QUOTE: The new rules [approved by the FCC-- Ed.] are, at best, net semi-neutrality. They ban any outright blocking and any “unreasonable discrimination” of Web sites or applications by fixed-line broadband providers, but they afford more wiggle room to wireless providers like AT&T and Verizon.
New York Times Dec 13, 2010 How spammers will poison your social network: Spammers wrecked e-mail, then they ruined search, and soon they'll go after your friends and family
QUOTE: your social graph is the next ripe target for shady marketers. As services increasingly enable you to search for things influenced by your social graph, spammer types will try to infiltrate your social group and sway the results. Here's how they'll do it:
InfoWorld Oct 27, 2010 Satisfied with Google's promise to restrain Street View, FTC drops privacy-breach probe
QUOTE: The federal government has ended an inquiry into a privacy breach involving Google's Street View service, satisfied with the company's pledge to stop gathering e-mail, passwords and other information from residential WiFi networks as it rolls through neighborhoods.
Washington Post Jun 25, 2010 Cellphone Charges, Rung Up by a Thief (The Haggler)
QUOTE: When a credit card company notices spending patterns way beyond a customer’s norm, it suspends the card until it’s sure the card is in the customer’s possession. Shouldn’t a cellphone company do the same?
New York Times Jun 22, 2010 Tips for Using Your Cellphone Abroad
QUOTE: one way to reduce the international bill, at least for travel to some countries: Call your mobile service provider ahead of time and temporarily change your phone plan.
New York Times Jun 18, 2010 Supreme Court rules on employer monitoring of cellphone, computer conversations
QUOTE: A hesitant Supreme Court waded cautiously into a question that arises daily in workplaces and offices across the country: whether employers have the right to look over the shoulders of workers who use company computers and cellphones for personal communication. In the first ruling of its kind, the justices said they do, as long as there is a "legitimate work-related purpose" to monitor them.
Washington Post Jun 09, 2010 Lies, damned lies, and technology hype
QUOTE: in this age of short attention spans, where stories flare up and die off on the Web in the matter of hours, it could well be a tactic. Get the headlines first, correct the mistakes later, hope nobody notices.
InfoWorld Jun 02, 2010 Thrifty Wi-Fi That Travels With You
QUOTE: The cost-cutting solution might be to create your own Wi-Fi hot spot, a cloud of Internet connectivity for wherever you go....There was no one solution that was best for all users in all situations.
New York Times Jun 01, 2010 Antiradiation Products With Some Science in Them
QUOTE: There is still no definitive evidence that electromagnetic radiation from wireless devices like cellphones and Wi-Fi networks is hazardous. But many companies are profiting from public concern about the issue, most by selling unscientific placebos, usually pendants or decals that do nothing to stop the radiation.
New York Times May 13, 2010 Recording Customer Service Calls to India
QUOTE: Last month, I wrote a Bucks post, “When and Why You Should Record Customer Service Calls,” with resources and guidelines for recording customer service calls....in this age of outsourcing, customer service representatives are often in other countries, like India or Ireland or a few other places. Which begs the question: What recording guidelines should one follow if the customer service representative is elsewhere?
New York Times May 02, 2010 Web’s Users Against Its Gatekeepers
QUOTE: With the majority of Internet traffic expected to shift to congestion-prone mobile networks, there is growing debate on both sides of the Atlantic about whether operators of the networks should be allowed to treat Web users differently, based on the users’ consumption.
New York Times Mar 31, 2010 Federal Judge Finds N.S.A. Wiretaps Were Illegal
QUOTE: A federal judge ruled Wednesday that the National Security Agency’s program of surveillance without warrants was illegal, rejecting the Obama administration’s effort to keep shrouded in secrecy one of the most disputed counterterrorism policies of former President George W. Bush.
New York Times Mar 24, 2010 Mobs Are Born as Word Grows by Text Message
QUOTE: so-called flash mobs have taken a more aggressive and raucous turn [in Philadelphia] as hundreds of teenagers have been converging downtown for a ritual that is part bullying, part running of the bulls: sprinting down the block, the teenagers sometimes pause to brawl with one another, assault pedestrians or vandalize property.
New York Times Mar 12, 2010 Apple’s Spat With Google Is Getting Personal
QUOTE: Google and Apple had worked together to bring Google’s search and mapping services to the iPhone...Mr. Jobs, Mr. Schmidt and their companies are now engaged in a gritty battle royale over the future and shape of mobile computing and cellphones, with implications that are reverberating across the digital landscape.
New York Times Mar 02, 2010 Fraudsters hone their attacks with spear phishing
QUOTE: The next generation of phishing messages, which is still prevalent today, strongly resembles legitimate messages from our banks, cable companies, online electronic payment services, and credit card companies. Everything in the emails looks legitimate, including the graphics that originate from the real company's Website.
InfoWorld Mar 01, 2010 Misdials help 'crammers' ring up millions in phone bill scam
QUOTE: sneak small, unauthorized fees onto thousands of monthly bills and hope the charges would go unnoticed, court documents state. The scheme, known as "cramming,"...
Washington Post Feb 13, 2010 Justice Dept. defends warrantless cell phone tracking
QUOTE: The FBI and other police agencies don't need to obtain a search warrant to learn the locations of Americans' cell phones, the U.S. Department of Justice told a federal appeals court in Philadelphia on Friday.
CNET Oct 21, 2009 Tweets from the jury box: jurors using Twitter jeopardize trials
QUOTE: in an age of citizen journalism and Web publishing, a growing number of jurors are tapping away at their BlackBerries and iPhones from the jury box and the deliberation room – potentially putting trial outcomes into jeopardy.
Christian Science Monitor Sep 27, 2009 Truckers Insist on Keeping Computers in the Cab: Driven to Distraction
QUOTE: The issues raised by truckers [on in-cab computers] show the challenges facing advocates for tougher distracted-driving laws, given that so many Americans have grown accustomed to talking and texting behind the wheel.
New York Times Jul 23, 2009 Hacker Says iPhone 3GS Encryption Is ‘Useless’ for Businesses (Gadget Lab: Hardware that Rocks Your World)
QUOTE: Apple claims that hundreds of thousands of iPhones are being used by corporations and government agencies. What it won’t tell you is that the supposedly enterprise-friendly encryption included with the iPhone 3GS is so weak it can be cracked in two minutes with a few pieces of readily available freeware.
Wired Jul 23, 2009 UAE cellular carrier rolls out spyware as a 3G "update"
QUOTE: ...Blackberry users in the United Arab Emirates have had a spyware package placed on their devices through the actions of their carrier...
Ars Technica Jul 09, 2009 Typing In an E-Mail Address, and Giving Up Your Friends’ as Well (Shortcuts)
QUOTE: this [Internet tactic] is generally called contact scraping. Once you enter your credentials, like your user name or password, the company sweeps through your contact list and sends everyone an invitation to join the site.
New York Times Jul 05, 2009 Growing Presence in the Courtroom: Cellphone Data as Witness
QUOTE: The pivotal role that cellphone records played in these two prominent New York murder trials this year highlights the surge in law enforcement’s use of increasingly sophisticated cellular tracking techniques to keep tabs on suspects before they are arrested and build criminal cases against them by mapping their past movements.
New York Times Jun 12, 2009 IRS Seeks to Simplify Workers' Cellphone Tax Law
QUOTE: the Internal Revenue Service is weighing whether a portion of a work-related cellphone bill should be taxed as income....The law was designed to prevent employees from using employee-issued cellphones for personal calls and then writing them off as a work-related tax deduction.
Washington Post Jun 05, 2009 US shuts 'criminal' internet service provider
QUOTE: The US Federal Trade Commission for the first time has sued and immediately shut down an internet service provider it accused of being a haven for a wide range of criminal activity, including child pornography and the electronic theft of personal banking data.
Financial Times Dec 21, 2008 Bush E-Mails May Be Secret a Bit Longer: Legal Battles, Technical Difficulties Delay Required Transfer to Archives
QUOTE: the administration began trying only in recent months to recover from White House backup tapes hundreds of thousands of e-mails that were reported missing from readily accessible files in 2005. The risks that the transfer may be incomplete are also pointed up by a continuing legal battle between a coalition of historians and nonprofit groups over access to Vice President Cheney's records.
Washington Post Nov 20, 2008 How I Slashed My Bills with Tech (Part 1): Time for some technological belt-tightening. How I cut $40 from my monthly phone bills within a few hours.
QUOTE: 1. Change your wireless carrier right now....2. Kill your land line....3. Get a bill assessment...
PC Magazine Nov 16, 2008 FOIA docs show feds can lojack mobiles without telco help
QUOTE: By posing as a cell tower, triggerfish trick nearby cell phones into transmitting their serial numbers, phone numbers, and other data to law enforcement.
Ars Technica Nov 03, 2008 Campaign Calls to Cellphones Invade Privacy, Voters Say
QUOTE: Telemarketing to cellphones for general consumer purposes, such as car warranty sales pitches, was outlawed in 2003 so as to not penalize consumers, whose cellphone plans typically require that they pay for minutes used. But an exemption in the law allowed political candidates to call people, whether on their cellphones or their landlines.
Washington Post Oct 06, 2008 China's Eye on Web Chatter
ABSTRACT: In China, you can't search for anything you want on popular search engines like Yahoo! or Google. The government has set filters on words that it's leaders think may jeopardize the political state of China. In addition to this search limitation movement, there has been a surveillance scheme employed. In fact, the United States has assisted in the scheme.
- Arts & Humanities
- Businesses & Organizations
- Computers & Information Technology
- Family & Friends & Interpersonal
- Government & Politics / History
- Health & Medicine
- Law & Justice
- Media & Journalism
- Personal Finance & Career
- Philosophy & Religion
- Recreation & Entertainment
- Science & Technology
- Social Sciences & Groups
- Arctic / Antarctic / Greenland
- Central America / Caribbean
- Eurasia / Central Asia
- Middle East
- North America
- Oceania / AustralAsia
- South America
- About Fairness.com
- Contact Us
- Conditions of Service
- Fair Use Notice
- Advisory Board
Not a current user? Sign up!