Sharing Data, Compromising Privacy

Public-Private Partnerships: Sharing Data, Compromising Privacy

Our privacy is up for sale to anyone—even government and law enforcement agencies There are things that the government is allowed to do that private entities can’t. This includes activities such as arresting people and throwing them in jail, executing search warrants and engaging in electronic surveillance and wiretaps without ... Read More
Security Boulevard
Surveillance Sans Frontiers

Surveillance Sans Frontiers, Thanks to the Internet

When Congress passed the Clarifying Lawful Overseas Use of Data (CLOUD) Act, it amended the federal Stored Communications Act in a way that now requires internet companies including Verizon, AOL, Yahoo, Google and Facebook to produce records that belong to foreigners wherever such records may be located, pursuant to an ... Read More
Security Boulevard
Privacy in Public Places

Privacy in Public Places

Does license plate information-gathering constitute an invasion of privacy? As you drive down Robert E. Lee Memorial Highway in the Virginia suburbs of Washington, D.C., a police camera captures and reads your license plate. After checking to make sure that the owner of the car is not a wanted fugitive ... Read More
Security Boulevard
Providing Security Be a Crime

Can Providing Security Be a Crime?

/ / criminality, Law, services, software
The purpose of security is to allow the “right” people to have access to data and resources and to keep others out. It is ultimately about having control over data and data processing and enforcing decisions about who gets access to what. In a hospital, for example, good security ensures ... Read More
Security Boulevard
Stormy Daniels Lawsuit Contracts

What the Stormy Daniels Lawsuit Means for Clickwrap Contracts

Adult film actress Stephanie Clifford, aka “Stormy Daniels,” aka Penelope Peterson, has filed a lawsuit in Los Angeles Superior Court seeking the court declare that her Nondisclosure Agreement with David Dennison—aka Donald Trump, aka the Commander in Chief—is null and void. While Clifford (through counsel) alleges that the contract is ... Read More
Security Boulevard
Flight Simulator Passwords Trojan

Flight Simulator Passwords Trojan Might Lead to Legal Liability

After designing the impenetrable maze that was the labyrinth (to restrain the half-man, half-bull Minotaur), Icarus was imprisoned by King Minos. To escape, he set his sights on flying—designing wax and feather wings that he and his son Daedalus used to fly. When, in a fit of hubris, his son ... Read More
Security Boulevard
Meuller Russia Indictment Cybersecurity

What the Meuller/Russia Indictment Means for Cybersecurity

On Feb. 16, a federal grand jury in Washington, D.C. returned an indictment against 13 Russian citizens and three Russian companies for a scheme involving information warfare against the political institutions of the United States. Does this portend a new strategy for dealing with cyberthreats or is this merely political ... Read More
Security Boulevard
The Kindness of Strangers - Supreme Court and Privacy for Third Parties

The Kindness of Strangers – Supreme Court and Privacy for Third Parties

/
A trio of U.S. Supreme Court cases – on topics like cell phone records, rental cars, and overseas storage of Hotmail accounts may change how the Internet is configured and how IoT, cloud and outsourcing agreements are effectuated in the future. What all of these cases have in common is ... Read More
Security Boulevard
You realize, of course, this means War

You realize, of course, this means War

/
Security researchers have long spoken about “the attribution problem” – that is, the difficulty of pinning a specific security event to a specific threat actor with a particular motivation and support group. But we forget the other part of the attribution problem – what happens when we actually ARE able ... Read More
Security Boulevard
Supreme Court and Private (Privacy) Property

Supreme Court and Private (Privacy) Property

The U.S. Supreme Court heard oral arguments Nov. 29 in a case that could radically transform not only privacy law and the way we look at the Fourth Amendment, but also could restructure the way cloud providers, IoT companies, data analytics firms and even your doctor, lawyer and accountant keeps ... Read More
Security Boulevard
Loading...