Secrecy / Security
Articles and Resources
91 Articles and Resources. Go to: [Next 41]
Date Fairness.com Resource Read it at: Nov 11, 2012 Officials Say F.B.I. Knew of Petraeus Affair in the Summer
QUOTE: The new accounts of the events that led to Mr. Petraeus’s sudden resignation on Friday shed light on the competing pressures facing F.B.I. agents who recognized the high stakes of any investigation involving the C.I.A. director but who were wary of exposing a private affair with no criminal or security implications.
New York Times Jul 25, 2012 Are cruise lines 'dumping' sick passengers?
QUOTE: I asked Royal Caribbean about its policy on dropping off passengers and whether the Claussens could have done anything differently. It declined to answer. Walker says that cruise lines keep their policies on emergency care confidential.
Seattle Post-Intelligencer Jul 24, 2012 First they came for Wikileaks, then the New York Times
QUOTE: There are signs that the U.S. government wants to target mainstream journalists and media outlets for the same kind of investigation that WikiLeaks has been subjected to for publishing classified information, which makes it even more important to defend WikiLeaks’ status as a media entity.
GigaOM Feb 10, 2012 The Afghanistan Report the Pentagon Doesn't Want You to Read
QUOTE: a bombshell piece about Lt. Colonel Daniel Davis, a 17-year Army veteran recently returned from a second tour in Afghanistan. According to the Times, the 48-year-old Davis had written an 84-page unclassified report, as well as a classified report, offering his assessment of the decade-long war. That assessment is essentially that the war has been a disaster and the military's top brass has not leveled with the American public about just how badly it’s been going.
Rolling Stone Dec 22, 2011 U.S. Report Faults Two Sides in Deadly Pakistan Strike
QUOTE: mistakes by both American and Pakistani troops led to airstrikes against two Pakistani posts on the Afghan border that killed 26 Pakistani troops. But two crucial findings — that the Pakistanis fired first at a joint Afghan-American patrol and that they kept firing even after the Americans tried to warn them that they were shooting at allied troops — were likely to further anger Pakistan and plunge the already tattered relationship between the United States and Pakistan to new depths.
New York Times Oct 25, 2011 How the Patriot Act stripped me of my free-speech rights
QUOTE: the government implausibly claimed that if I were able to identify myself as the plaintiff in the case, irreparable damage to national security would result. But I did not believe then, nor do I believe now, that the FBI’s gag order was motivated by legitimate national security concerns. It was motivated by a desire to insulate the FBI from public criticism and oversight.
Washington Post Oct 07, 2011 What Everyone Is Too Polite to Say About Steve Jobs
QUOTE: In the days after Steve Jobs' death, friends and colleagues have, in customary fashion, been sharing their fondest memories of the Apple co-founder. He's been hailed as "a genius" and "the greatest CEO of his generation" by pundits and tech journalists. But a great man's reputation can withstand a full accounting. And, truth be told, Jobs could be terrible to people, and his impact on the world was not uniformly positive.
Gawker Sep 19, 2011 In Small Towns, Gossip Moves to the Web, and Turns Vicious
QUOTE: In rural America, where an older, poorer and more remote population has lagged the rest of the country in embracing the Internet, the growing use of social media is raising familiar concerns about bullying and privacy. But in small towns there are complications. The same Web sites created as places for candid talk about local news and politics are also hubs of unsubstantiated gossip, stirring widespread resentment in communities where ties run deep, memories run long and anonymity is something of a novel concept.
New York Times Jul 05, 2011 U.S. to Prosecute a Somali Suspect in Civilian Court
QUOTE: The Obama administration announced Tuesday that it would prosecute in civilian court a Somali accused of ties to two Islamist militant groups. The decision to fly the man to New York for trial, after interrogating him for months aboard a United States naval vessel, is likely to reignite debate about the detention and prosecution of terrorism suspects.
New York Times Jun 26, 2011 U.S. Plans Stealth Survey on Access to Doctors
QUOTE: Alarmed by a shortage of primary care doctors, Obama administration officials are recruiting a team of “mystery shoppers” to pose as patients, call doctors’ offices and request appointments to see how difficult it is for people to get care when they need it....In response to the drumbeat of criticism, a federal health official said doctors need not worry because the data would be kept confidential.
New York Times May 31, 2011 Web Hackings Rattle Media Companies
QUOTE: latest examples of what security experts call “reputational attacks” on media companies that publish material that the hackers disagree with. Such companies are particularly vulnerable to such attacks because many of them depend on online advertising and subscription revenue from Web sites that can be upended by the clicks of a hacker’s keyboard — and because unlike other targets, like government entities and defense contractors, they are less likely to have state-of-the-art security to thwart attacks.
New York Times May 25, 2011 How Can Congress Debate a Secret Law?
QUOTE: Legal scholars, law professors, advocacy groups, and the Congressional Research Service have all written interpretations of the Patriot Act and Americans can read any of these interpretations and decide whether they support or agree with them. But by far the most important interpretation of what the law means is the official interpretation used by the U.S. government and this interpretation is - stunningly -classified.
Huffington Post Apr 26, 2011 Sony Says PlayStation Hacker Got Personal Data
QUOTE: An “unauthorized person” had obtained personal information about account holders, including their names, addresses, e-mail addresses, and PlayStation user names and passwords. Sony warned that other confidential information, including credit card numbers, could have been compromised.
New York Times Apr 25, 2011 Email users still running amok despite years of warnings: A survey shows that email remains a major source of corporate data leakage, as users continue to break the rules
QUOTE: Despite years of regulations, fines, corporate policies, and data leakage prevention tools, companies are still remarkably vulnerable when it comes to employees' inappropriate use of email.
InfoWorld Apr 19, 2011 Stripped of Dignity
QUOTE: [airline security] system does not seem smartly tailored to focus on dangerous people rather than “good, law-abiding people.” So kids, seniors and those with disabilities, joint replacements and other medical conditions — things they already feel embarrassed about — end up getting harassed.
New York Times Mar 27, 2011 Ethical Quandary for Social Sites
QUOTE: The photos had been removed because he did not take the images himself, a violation of the site’s community rules… “That is totally ludicrous,” he said. “Flickr is full of accounts with photos that people did not take themselves.” Human rights advocates have also criticized Facebook for not being more flexible with some of its policies, specifically its rule requiring users to create accounts with their real names.
New York Times Mar 04, 2011 Hacked e-mails show Web is increasingly useful tool in dirty-tricks campaigns
QUOTE: But many experts say the shadowy political intelligence business has become larger and more sophisticated as corporations, trade groups and political parties increasingly turn to computer sleuths to monitor and, in some cases, harass their detractors. The work almost always goes undetected and has been made easier with the rise of computer networks and social media sites with relatively lax safeguards.
Washington Post Feb 16, 2011 New Hacking Tools Pose Bigger Threats to Wi-Fi Users
QUOTE: But some simple software lets just about anyone sitting next to you at your local coffee shop watch you browse the Web and even assume your identity online... But a free program called Firesheep, released in October, has made it simple to see what other users of an unsecured Wi-Fi network are doing and then log on as them at the sites they visited.
New York Times Feb 10, 2011 Ex-C.I.A. Agent Goes Public With Story of Mistreatment on the Job
QUOTE: He contends that the events broke up his marriage and destroyed his career, and that C.I.A. officials abused the State Secrets Privilege doctrine in an effort to cover up their own negligence.
New York Times Jan 18, 2011 In Knotty State Secrets Case, Justices Ponder Telling Litigants to ‘Go Away’
QUOTE: The contractors sued, asking to keep the money and seeking $1.2 billion more. They said their work had been frustrated by the government’s failure to share classified technology. The government disputed that, but would not explain why, invoking the state secrets privilege.
New York Times Jan 09, 2011 Twitter Shines a Spotlight on Secret F.B.I. Subpoenas
QUOTE: THE news that federal prosecutors have demanded that the microblogging site Twitter provide the account details of people connected to the WikiLeaks case, including its founder, Julian Assange, isn’t noteworthy because the government’s request was unusual or intrusive. It is noteworthy because it became public.... the government — in the course of conducting inquiries — has been able to look through much of the information without the knowledge of the people being investigated.
New York Times Jan 06, 2011 Software security: Honesty is the best policy
QUOTE: Admitting to flaws in your code can be embarrassing, but OpenBSD's hunt for a backdoor proves the alternative could be much worse
InfoWorld Jan 03, 2011 A Clear Danger to Free Speech
QUOTE: THE so-called Shield bill, which was recently introduced in both houses of Congress in response to the WikiLeaks disclosures, would amend the Espionage Act of 1917 to make it a crime for any person knowingly and willfully to disseminate, “in any manner prejudicial to the safety or interest of the United States,” any classified information “concerning the human intelligence activities of the United States.” Although this proposed law may be constitutional as applied to government employees who unlawfully leak such material to people who are unauthorized to receive it, it would plainly violate the First Amendment to punish anyone who might publish or otherwise circulate the information after it has been leaked.
New York Times Nov 28, 2010 Leaked Cables Offer Raw Look at U.S. Diplomacy
QUOTE: A cache of a quarter-million confidential American diplomatic cables, most of them from the past three years, provides an unprecedented look at back-room bargaining by embassies around the world, brutally candid views of foreign leaders and frank assessments of nuclear and terrorist threats.
New York Times Nov 05, 2010 What happens when Internet Explorer breaks big-time: Much like a bad antivirus signature file, Microsoft's browser is flagging harmless sites and blocking access to them
QUOTE: Much like a bad antivirus signature file, Microsoft's browser is flagging harmless sites and blocking access to them
InfoWorld Jun 27, 2010 Travelers, be wary of 'data passing' online
QUOTE: "Data pass" refers to a shady practice of sending credit card information along to a third party at the end of a transaction without the buyer's explicit approval. In years past, travelers often found themselves unwittingly enrolled in clubs that automatically charged a monthly enrollment fee while travel companies raked in millions in profits, according to investigators and consumers.
Washington Post Jun 25, 2010 Justices say petition signers should not expect their names to be kept secret
QUOTE: Those who sign referendum petitions should generally not expect to keep their names secret, the Supreme Court ruled Thursday, rejecting the argument of an anti-gay-rights group that disclosure would violate their First Amendment protection of political expression.
Washington Post Jun 18, 2010 Supreme Court rules on employer monitoring of cellphone, computer conversations
QUOTE: A hesitant Supreme Court waded cautiously into a question that arises daily in workplaces and offices across the country: whether employers have the right to look over the shoulders of workers who use company computers and cellphones for personal communication. In the first ruling of its kind, the justices said they do, as long as there is a "legitimate work-related purpose" to monitor them.
Washington Post May 27, 2010 The Magic Behind Rating Apps
QUOTE: The customer-review process isn’t perfect. Occasionally, it can be abused, or manipulated. But this week, I came across something I’d never seen before: an app that had earned dozens of one-star (terrible) ratings — yet the written reviews were ecstatic.
New York Times May 10, 2010 Social networking raises legal, regulatory issues for businesses: Companies are finding...too valuable as sales-lead generation and marketing to block
QUOTE: many businesses are attempting to simply block all access to social networking sites for employees who would fall under regulatory scrutiny, such as broker-dealers and sales and marketing representatives, even though these employee are finding the sites invaluable.
InfoWorld Mar 24, 2010 Law Enforcement Appliance Subverts SSL
QUOTE: Normally when a user visits a secure website, such as Bank of America, Gmail, PayPal or eBay, the browser examines the website’s certificate to verify its authenticity. At a recent wiretapping convention however, security researcher Chris Soghoian discovered that a small company was marketing internet spying boxes to the feds designed to intercept those communications, without breaking the encryption, by using forged security certificates, instead of the real ones that websites use to verify secure connections.
Wired Sep 22, 2009 Netflix Prize 2: (Privacy) Apocalypse Now?
QUOTE: security researchers found a way to link the anonymous movie recommendations with data from other sites in order to identify individual Netflix users.
Ars Technica Sep 18, 2009 Threat Level Privacy, Crime and Security Online Court: Disloyal Computing Is Not Illegal (Threat Level)
QUOTE: A federal appeals court says employees are not liable for damages under anti-hacking laws for accessing their employers’ computers for disloyal purposes.
Wired Aug 31, 2009 How we’re losing our privacy online
QUOTE: As we slip further into the Internet era, they [computer experts] argue that we are every day surrendering more of the private us to the public domain
Christian Science Monitor Aug 31, 2009 Keeping genes out of terrorists' hands: Gene-synthesis industry at odds over how to screen DNA orders.
QUOTE: A standards war is brewing in the gene-synthesis industry. At stake is the way that the industry screens orders for hazardous toxins and genes
Nature Aug 27, 2009 ACLU chapter flags Facebook app privacy (The Social)
QUOTE: The Northern California chapter of the American Civil Liberties Union has put out a campaign designed to raise awareness of the privacy implications of Facebook's developer platform.
CNET Aug 26, 2009 Debate on lithium batteries reignites
QUOTE: Pilots are calling for a ban on all lithium-based battery shipments on passenger and cargo jets.
USA TODAY Aug 25, 2009 Businesses Reluctant to Report Online Banking Fraud (Security Fix)
QUOTE: many victimized companies [of online banking fraud] are reluctant to come forward out of fear of retribution by their bank.
Washington Post Aug 20, 2009 Splashing, and clashing, in murky waters: Piracy and private enterprise
QUOTE: for strategists grappling with the diminished safety of the world’s seas... figuring out a sensible and workable division of labour between navies and private firms is not easy.
Economist Aug 19, 2009 UBS deal cracks door on banking secrecy worldwide (Rebuilding the Economy)
QUOTE: The amount of global wealth stashed in tax-haven nations is staggering and largely uncontrolled, financial experts say.
Christian Science Monitor Aug 18, 2009 Three Alleged Hackers Indicted in Large Identity-Theft Case
QUOTE: A federal grand jury has indicted three people on charges of hacking into the files of the credit and debit card processing giant Heartland Payment Systems last year in what the Justice Department is calling the largest identity-theft case ever prosecuted.
Washington Post Aug 07, 2009 Professor Main Target of Assault on Twitter
QUOTE: The cyberattacks Thursday and Friday on Twitter and other popular Web services disrupted the lives of hundreds of millions of Internet users, but the principal target appeared to be one man: a 34-year-old economics professor from the republic of Georgia.
New York Times Aug 06, 2009 5 lessons from the dark side of cloud computing
QUOTE: While many companies are considering moving applications to the cloud, the security of the third-party services still leaves much to be desired, security experts warned attendees at last week's Black Hat Security Conference.
CIO Magazine Aug 05, 2009 Responsible Twittering: The company's security issues are well-known, but users also need to be more responsible about what they tweet.
QUOTE: While this [network hacking] highlights the risks associated with applications in the cloud, it isn't the only security risk associated with Twitter. In addition there are risks with people spoofing other identities, risks of people disclosing sensitive data and people creating risks by talking about some of their activities.
Forbes Jul 29, 2009 Details on presidential motorcades, safe house for First Family, leak via P2P: Lawmakers eye bill to ban P2P use on government, contractor networks
QUOTE: Tiversa is a Cranberry Township, Pa.-based provider of P2P monitoring services. In the past, it has served up dramatic examples of highly sensitive information found on file-sharing networks.
Computerworld Jul 28, 2009 How To Hijack 'Every iPhone In The World (Security)
QUOTE: Using a flaw they've found in the iPhone's handling of text messages, the researchers [Charlie Miller and Collin Mulliner] say they'll demonstrate how to send a series of mostly invisible SMS bursts that can give a hacker complete power over any of the smart phone's functions.
Forbes Jul 23, 2009 Hacker Says iPhone 3GS Encryption Is ‘Useless’ for Businesses (Gadget Lab: Hardware that Rocks Your World)
QUOTE: Apple claims that hundreds of thousands of iPhones are being used by corporations and government agencies. What it won’t tell you is that the supposedly enterprise-friendly encryption included with the iPhone 3GS is so weak it can be cracked in two minutes with a few pieces of readily available freeware.
Wired Jul 22, 2009 Blackwater Seeks Gag Order
QUOTE: On July 20, the company's [Blackwater] high-powered lawyers from Mayer Brown... filed a motion in the US District Court for the Eastern District of Virginia to impose a gag order on Iraqi civilians suing the company.
Nation Jul 01, 2009 It's Management's Fault: Bad management decisions produce the most system failures.
QUOTE: management errors are much more common than human errors...
Forbes Jun 12, 2009 IT staff snooping HR and layoff lists, taking data with them
QUOTE: In a recent survey conducted [by Cyber-Ark Software] on network admins and other IT staff, more than a third admitted to snooping into HR records, layoff lists, customer databases, and M&A plans.
91 Articles and Resources. Go to: [Next 41]
- Arts & Humanities
- Businesses & Organizations
- Computers & Information Technology
- Family & Friends & Interpersonal
- Government & Politics / History
- Health & Medicine
- Law & Justice
- Media & Journalism
- Personal Finance & Career
- Philosophy & Religion
- Recreation & Entertainment
- Science & Technology
- Social Sciences & Groups
- Arctic / Antarctic / Greenland
- Central America / Caribbean
- Eurasia / Central Asia
- Middle East
- North America
- Oceania / AustralAsia
- South America
- About Fairness.com
- Contact Us
- Conditions of Service
- Fair Use Notice
- Advisory Board
Not a current user? Sign up!