Articles and Resources
Date Fairness.com Resource Read it at: May 01, 2013 Google Glass, the beginning of wearable surveillance
QUOTE: imagine that millions of Americans walk around each day wearing the equivalent of a drone on their head: a device capable of capturing video and audio recordings of everything that happens around them. And imagine that these devices upload the data to large-scale commercial enterprises that are able to collect the recordings from each and every American and integrate them together to form a minute-by-minute tracking of the activities of millions....default mode is for all data to be automatically uploaded to cloud servers, where aggregation and back-end analytic capacity resides. So, who owns and what happens to the user's data?
CNN (Cable News Network) Mar 16, 2013 The Internet is a surveillance state
QUOTE: ...we're being tracked all the time. Google tracks us, both on its pages and on other pages it has access to. Facebook does the same; it even tracks non-Facebook users. Apple tracks us on our iPhones and iPads....Increasingly, what we do on the Internet is being combined with other data about us. Unmasking Broadwell's identity involved correlating her Internet activity with her hotel stays.
CNN (Cable News Network) Mar 08, 2013 Skype's Been Hijacked in China, and Microsoft Is O.K. With It
QUOTE: a conflict between Microsoft’s advocacy of privacy rights and its role in surveillance....When Internet users in China try to access Skype.com, they’re diverted to the TOM-Skype site. While the Chinese version bears the blue Skype logo—and provides services for online phone calls and text chats—it’s a modified version of the program found elsewhere in the world. The surveillance feature in TOM-Skype conducts the monitoring directly on a user’s computer...
BusinessWeek Feb 21, 2013 Steps to Guard Against Identity Fraud
QUOTE: The annual report found that the incidence of identity theft overall was about 5.3 percent of consumers, compared with 4.9 percent the year before. Much of the increase was driven by so-called “new account” fraud, involving the unauthorized opening of general use or store brand credit cards, as well as “account takeover” fraud, in which the identity thieves may change consumers’ contact information — like their mailing addresses — to gain illegal access to their accounts
New York Times Nov 15, 2012 The Real Reason You Should Care About the Petraeus Affair: Privacy
QUOTE: Once you've opened an email or your Facebook account, you've provided your personal information to a third party. The government can then ask that third party—Google, Yahoo, Facebook, Friendster, or whatever—for your information, and they don't necessarily need a warrant. The Constitution protects you from unreasonable search and seizure by the government. It doesn't stop third parties from sharing personal information you willingly give them.
Mother Jones Jul 13, 2012 That’s No Phone. That’s My Tracker.
QUOTE: Thanks to the explosion of GPS technology and smartphone apps, these devices are also taking note of what we buy, where and when we buy it, how much money we have in the bank, whom we text and e-mail, what Web sites we visit, how and where we travel, what time we go to sleep and wake up — and more. Much of that data is shared with companies that use it to offer us services they think we want.
New York Times Mar 31, 2012 Police Are Using Phone Tracking as a Routine Tool
QUOTE: Law enforcement tracking of cellphones, once the province mainly of federal agents, has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show. The practice has become big business for cellphone companies, too...
New York Times Mar 15, 2012 For Apple, Pressure Builds Over App Store Fraud
QUOTE: as reflected by hundreds of online complaints saying that Apple’s iTunes Store, and in particular its App Store, which the company portrays as the safest of shopping environments, is not so secure....It’s a change for Apple, which was once criticized for its micromanaging of the App Store. Now the problem is not too much control, but too little.
New York Times Feb 29, 2012 Stop the ‘Do Not Track’ Madness
QUOTE: There are certainly aspects of our lives where genuinely intrusive practices can have serious detrimental impacts. But with so much in our world that needs attention, a misguided focus on web advertising personalization is not only irrational, but could ultimately undermine the “free services” basis of the web in ways that we could very soon come to severely regret.
Wired Feb 17, 2012 Drones Set Sights on U.S. Skies
QUOTE: A new federal law, signed by the president on Tuesday, compels the Federal Aviation Administration to allow drones to be used for all sorts of commercial endeavors... Local police and emergency services will also be freer to send up their own drones. But while businesses, and drone manufacturers especially, are celebrating the opening of the skies to these unmanned aerial vehicles, the law raises new worries about how much detail the drones will capture about lives down below — and what will be done with that information.
InfoWorld Jan 23, 2012 Justices Say GPS Tracker Violated Privacy Rights
QUOTE: The Supreme Court on Monday ruled unanimously that the police violated the Constitution when they placed a Global Positioning System tracking device on a suspect’s car and monitored its movements for 28 days. A set of overlapping opinions in the case collectively suggested that a majority of the justices are prepared to apply broad privacy principles to bring the Fourth Amendment’s ban on unreasonable searches into the digital age...
New York Times Dec 23, 2011 CIA report: No issue with spy agency's partnership with N.Y. police
QUOTE: the agency helped police conduct covert surveillance on Muslims living in New York, raising broader civil liberty questions about the legality of the methods and scope of federal efforts to counter terrorism.
CNN (Cable News Network) Nov 29, 2011 British Inquiry Is Told Hacking Is Worthy Tool
QUOTE: After Paul McMullan, a former deputy features editor at Rupert Murdoch’s now-defunct News of the World tabloid, had finished his jaw-droppingly brazen remarks at a judicial inquiry on Tuesday, it was hard to think of any dubious news-gathering technique he had not confessed to...
New York Times Nov 23, 2011 Police Tracking Your Every Move With License Plate Readers: Is a law enforcement aid worth sacrificing personal liberties?
QUOTE: These plate readers in D.C. take 1,800 images per minute, every one of which is stored in a database. Basically, these plate readers have made it possible for police to track everyone's movements as they move across the city. These plate readers and the subsequent database of image captures has tipped the privacy concerns of some -- notably the American Civil Liberties Union.
WebProNews Nov 19, 2011 Document Trove Exposes Surveillance Methods (Censorship Inc.)
QUOTE: a retail market for surveillance tools has sprung up from "nearly zero" in 2001 to about $5 billion a year, said Jerry Lucas, president of TeleStrategies Inc., the show's operator. Critics say the market represents a new sort of arms trade supplying Western governments and repressive nations alike. "The Arab Spring countries all had more sophisticated surveillance capabilities than I would have guessed..."
Wall Street Journal, The (WSJ) Nov 08, 2011 Which Way Privacy? The Supreme Court asks whether the government can put a GPS device on your car without a warrant.
QUOTE: The warrant expired after 10 days, but the police nevertheless used the GPS to monitor everywhere he drove, every 10 seconds, for 28 days....Jones tried to have his conviction set aside, arguing that warrantless GPS surveillance violated his Fourth Amendment right to be free of unreasonable government searches and seizures. The government replied that GPS tracking is no different from police observing activity in public spaces and roadways, which is not protected under the Constitution.
Slate Aug 01, 2011 Death & Taxes & Identity Theft
QUOTE: National Taxpayer Advocate, Nina Olson testified before the House Ways and Means subcommittee on Oversight, suggesting the [Death Master File (DMF)] provides significant opportunities for identity thieves to commit tax fraud and should be limited.
Forbes Jun 20, 2011 Upending Anonymity, These Days the Web Unmasks Everyone
QUOTE: The collective intelligence of the Internet’s two billion users, and the digital fingerprints that so many users leave on Web sites, combine to make it more and more likely that every embarrassing video, every intimate photo, and every indelicate e-mail is attributed to its source, whether that source wants it to be or not. This intelligence makes the public sphere more public than ever before and sometimes forces personal lives into public view.
New York Times Jun 12, 2011 F.B.I. Agents Get Leeway to Push Privacy Bounds
QUOTE: The Federal Bureau of Investigation is giving significant new powers to its roughly 14,000 agents, allowing them more leeway to search databases, go through household trash or use surveillance teams to scrutinize the lives of people who have attracted their attention.
New York Times Jun 10, 2011 U.S. Senators Want to Shut Down Bitcoins, Currency of Internet Drug Trade
QUOTE: The tone of the senators' letter comes off as though they themselves don't know what entity they want to destroy or how to go about it. Bitcoins, by nature and general practice, are harmless; they're merely an Internet-based alternative to traditional federal banks. Silk Road is what the U.S. government is really after.
PC World Jun 07, 2011 Companies Offer Free Versions of Identity Theft Services
QUOTE: We here at Bucks typically advocate creating your own free monitoring system....But the idea of a service that is free and automatic piqued our interest.
New York Times May 16, 2011 Questions Raised About a Code of Silence
QUOTE: the arrest of Dominique Strauss-Kahn is once again challenging the assumption that the private lives of the rich, famous and powerful are off limits to public scrutiny. That the most serious accusation against Mr. Strauss-Kahn is attempted rape, and not just an indiscretion involving a consensual sexual relationship, only adds to a sense on the part of some people in France that the curtain of privacy needs to be lifted.
New York Times May 06, 2011 ID Theft Tool That Sony Isn’t Using
QUOTE: A surveillance service is reactive. By the time you get an alert from one, thieves may have already done a lot of damage. A security freeze, also known as a credit freeze, is proactive.
New York Times Apr 26, 2011 Sony Says PlayStation Hacker Got Personal Data
QUOTE: An “unauthorized person” had obtained personal information about account holders, including their names, addresses, e-mail addresses, and PlayStation user names and passwords. Sony warned that other confidential information, including credit card numbers, could have been compromised.
New York Times Mar 31, 2011 Google making app that would identify people's faces
QUOTE: Google plans to introduce a mobile application that would allow users to snap pictures of people's faces in order to access their personal information... As Google's size and clout grow, so does the chorus of critics who say the company frequently encroaches on people's privacy... North said she believes Google has a tendency to push boundaries in order to outdo competitors. The service could push too far by, say, aggregating every photo of a user it finds on the internet without giving that user an easy way to erase certain images.
CNN (Cable News Network) Mar 27, 2011 Ethical Quandary for Social Sites
QUOTE: The photos had been removed because he did not take the images himself, a violation of the site’s community rules… “That is totally ludicrous,” he said. “Flickr is full of accounts with photos that people did not take themselves.” Human rights advocates have also criticized Facebook for not being more flexible with some of its policies, specifically its rule requiring users to create accounts with their real names.
New York Times Mar 04, 2011 Hacked e-mails show Web is increasingly useful tool in dirty-tricks campaigns
QUOTE: But many experts say the shadowy political intelligence business has become larger and more sophisticated as corporations, trade groups and political parties increasingly turn to computer sleuths to monitor and, in some cases, harass their detractors. The work almost always goes undetected and has been made easier with the rise of computer networks and social media sites with relatively lax safeguards.
Washington Post Jan 28, 2011 Republican Congressman Proposes Tracking Freedom of Information Act Requests
QUOTE: Mr. Issa, a California Republican and the new chairman of the House Committee on Oversight and Government Reform, says he wants to make sure agencies respond in a timely fashion to Freedom of Information Act requests and do not delay them out of political considerations. But his extraordinary request worries some civil libertarians.
New York Times Dec 20, 2010 Monitoring America (Top Secret America)
QUOTE: Nine years after the terrorist attacks of 2001, the United States is assembling a vast domestic intelligence apparatus to collect information about Americans, using the FBI, local police, state homeland security offices and military criminal investigators. The system, by far the largest and most technologically sophisticated in the nation's history, collects, stores and analyzes information about thousands of U.S. citizens and residents, many of whom have not been accused of any wrongdoing.
Washington Post Oct 27, 2010 Satisfied with Google's promise to restrain Street View, FTC drops privacy-breach probe
QUOTE: The federal government has ended an inquiry into a privacy breach involving Google's Street View service, satisfied with the company's pledge to stop gathering e-mail, passwords and other information from residential WiFi networks as it rolls through neighborhoods.
Washington Post Jun 18, 2010 Supreme Court rules on employer monitoring of cellphone, computer conversations
QUOTE: A hesitant Supreme Court waded cautiously into a question that arises daily in workplaces and offices across the country: whether employers have the right to look over the shoulders of workers who use company computers and cellphones for personal communication. In the first ruling of its kind, the justices said they do, as long as there is a "legitimate work-related purpose" to monitor them.
Washington Post May 21, 2010 Social networks may be sharing your info with advertisers
QUOTE: several social networking sites are sharing, with advertisers, information that can be used to identify individuals....In the case of social networking sites, the information on the last page viewed often reveals user names or profile ID numbers that could potentially be used to look up the individuals.
InfoWorld May 20, 2010 The Identity Theft Threat From Copiers
QUOTE: Why in the world would Congress provide some consumers with free access to credit scores, but not others? This could happen under a measure being considered by lawmakers that would grant free access to people whose credit scores were used to deny them credit or a job.
New York Times May 18, 2010 EFF: Forget cookies, your browser has fingerprints
QUOTE: Even without cookies, popular browsers such as Internet Explorer and Firefox give Web sites enough information to get a unique picture of their visitors about 94 percent of the time, according to research compiled over the past few months by the Electronic Frontier Foundation.
MacWorld May 15, 2010 Google Data Admission Angers European Officials
QUOTE: European privacy regulators and advocates reacted angrily Saturday to the disclosure by Google, the world’s largest search engine, that it had systematically collected private data since 2006 while compiling its Street View photo archive.
New York Times May 11, 2010 Amazon Spying On Your Ebook Highlighting
QUOTE: ...Amazon will now remotely upload and store the user notes and highlights you take on your Kindle, which it then compiles into "popular highlights."
Techdirt Apr 18, 2010 School Admin Takes Fifth Amendment in "Peeping Tom" Case
QUOTE: Lawyers for Harriton High School sophomore Blake Robbins are claiming that the teenager's school district has used built-in tracking software on students' laptops to take "thousands" of unauthorized images, "including pictures of Blake partially undressed and of Blake sleeping."
PC Magazine Apr 02, 2010 About That Webcam
QUOTE: A Pennsylvania town has been roiled by a local high school using cameras in school-issued laptops to spy on students. Almost as shocking is the fact that the federal wiretap law that should prohibit this kind of surveillance does not cover spying done through photography and video in private settings.
New York Times Mar 31, 2010 Federal Judge Finds N.S.A. Wiretaps Were Illegal
QUOTE: A federal judge ruled Wednesday that the National Security Agency’s program of surveillance without warrants was illegal, rejecting the Obama administration’s effort to keep shrouded in secrecy one of the most disputed counterterrorism policies of former President George W. Bush.
New York Times Mar 24, 2010 New software lets businesses track employees' Facebook, Twitter activity
QUOTE: Facebook and Twitter users should probably just assume that what they post publicly is being monitored by their employer. If your privacy settings don't limit content to friends only, anyone can search Google or the social networking sites themselves to see what you're writing. Granted, that can be a tedious process that an employer may not want to bother with -- but now it's becoming easier for businesses to monitor social networking activity.
InfoWorld Feb 19, 2010 PleaseRobMe Hits Foursquare Users with a Dose of Reality: Foursquare Responds With Privacy Philosophy
QUOTE: PleaseRobMe is a site set up by a few developers who want to spread awareness about how easy it would be for people to rob your home if you share too much information about yourself online...
WebProNews Feb 13, 2010 Justice Dept. defends warrantless cell phone tracking
QUOTE: The FBI and other police agencies don't need to obtain a search warrant to learn the locations of Americans' cell phones, the U.S. Department of Justice told a federal appeals court in Philadelphia on Friday.
CNET Feb 11, 2010 Who Owns Your PC? New Anti-Piracy Windows 7 Update "Phones Home" to Microsoft Every 90 Days
QUOTE: The release of Windows 7 "Update for Microsoft Windows (KB971033)" will change the current activation and anti-piracy behavior of Windows 7 by triggering automatic "phone home" operations over the Internet to Microsoft servers, typically for now at intervals of around 90 days. The purpose? To verify that you're not running a pirated copy of Windows, and to take various actions changing the behavior of your PC if the WAT system believes that you are not now properly authenticated and "genuine"...
Lauren Weinstein's Blog Dec 04, 2009 The electronic fink that will squeal if you drink
QUOTE: in the not-too-distant future, could you find yourself wearing such a device if you misbehave after having a few too many? Is this the first step towards a Big Brother age even more intrusive than that envisaged by George Orwell, where the authorities are automatically alerted whenever you consume any substance deemed undesirable? And is this kind of monitoring reliable?
New Scientist Dec 01, 2009 Sprint fed customer GPS data to cops over 8 million times
QUOTE: Christopher Soghoian... has made public an audio recording of Sprint/Nextel's Electronic Surveillance Manager describing how his company has provided GPS location data about its wireless customers to law enforcement over 8 million times.
Ars Technica Nov 12, 2009 Welcome Home, War!: How America's Wars Are Systematically Destroying Our Liberties
QUOTE: surprisingly few Americans seem aware of the toll that this already endless war [on terror] has taken on our civil liberties.
TomDispatch Nov 05, 2009 Who's in Big Brother's Database?
QUOTE: these new centers in Utah, Texas, and possibly elsewhere will likely become the centralized repositories for the data intercepted by the NSA in America's version of the "big brother database" rejected by the British.
New York Review of Books (NYRB) Nov 05, 2009 Shudder speed: Rise of the stealthy traffic camera fuels drivers' disgust
QUOTE: People get worked up. Put these cyborgs [traffic cameras] on a ballot, and the voters beat them to the pavement.
Washington Post Oct 05, 2009 New York to fight terrorism with more street-corner cameras: Mayor Bloomberg moves to expand high-tech surveillance to midtown Manhattan. But civil liberties groups are concerned, and some security experts question its value.
QUOTE: On the heels of breaking up an alleged bomb terror plot, New York is planning to place high-tech security cameras, license plate readers, and "weapons sensors" in midtown Manhattan.... But some terrorism experts have questioned whether a camera network will deter terrorists. They also say that sensors are known to give off "false positives."
Christian Science Monitor
- Arts & Humanities
- Businesses & Organizations
- Computers & Information Technology
- Family & Friends & Interpersonal
- Government & Politics / History
- Health & Medicine
- Law & Justice
- Media & Journalism
- Personal Finance & Career
- Philosophy & Religion
- Recreation & Entertainment
- Science & Technology
- Social Sciences & Groups
- Arctic / Antarctic / Greenland
- Central America / Caribbean
- Eurasia / Central Asia
- Middle East
- North America
- Oceania / AustralAsia
- South America
- About Fairness.com
- Contact Us
- Conditions of Service
- Fair Use Notice
- Advisory Board
Not a current user? Sign up!