Classified revisions accepted by secret Fisa court affect NSA data involving Americans’ international emails, texts and phone calls
The FBI has quietly revised its privacy rules for searching data involving Americans’ international communications that was collected by the National Security Agency, US officials have confirmed to the Guardian.
Pro Domo Sua: Are We Puppets in a Wired World? Surveillance and privacy revisited…
More on privacy in this IMS blog:
more on surveillance in this IMS blog:
Privacy in the Surveillance Age: How Librarians Can Fight Back.
Wednesday, December 9, 2015
2pm Eastern (11am Pacific | 12pm Mountain | 1pm Central)
In the wake of Edward Snowden’s revelations about NSA and FBI dragnet surveillance, many Americans are concerned that their rights to privacy and intellectual freedom are under threat. But librarians are perfectly positioned to help our communities develop strategies to protect themselves against unwanted surveillance. In this webinar, Alison Macrina and April Glaser of the Library Freedom Project will talk about the landscape of surveillance, the work of the LFP, and some tips and tools librarians can use to resist pervasive surveillance in the digital age.
About the Presenters:
Alison Macrina is a librarian, privacy rights activist, and the founder and director of the Library Freedom Project, an initiative which aims to make real the promise of intellectual freedom in libraries by teaching librarians and their local communities about surveillance threats, privacy rights and law, and privacy-protecting technology tools to help safeguard digital freedoms. Alison is passionate about connecting surveillance issues to larger global struggles for justice, demystifying privacy and security technologies for ordinary users, and resisting an internet controlled by a handful of intelligence agencies and giant multinational corporations. When she’s not doing any of that, she’s reading.
April Glaser is a writer and an activist with the Library Freedom Project. She currently works as a mobilization specialist at Greenpeace USA, where she focuses on ending oil extraction in the Arctic. Prior to Greenpeace, April was at the Electronic Frontier Foundation, organizing around the net neutrality campaign and EFF’s grassroots programming. April also previously worked with the Prometheus Radio Project, where her efforts helped propel the passage of the Local Community Radio Act, the largest expansion of community radio in U.S. history. She lives in Oakland, California and continues to work with local organizations on a range of digital rights issues.
Can’t make it to the live show? That’s okay. The session will be recorded and available on the Carterette Series Webinars site for later viewing.
To register for the online event
2. Complete and submit the form.
3. A URL for the event will be emailed to you immediately after registration.
Contact a member of the Carterette Series planning team with questions or suggestions:
More on privacy in this IMS blog:
Obama Adviser John Podesta: ‘Every Country Has a History of Going Over the Line’
Instead of a no-spy deal, the US has begun a Cyber Dialogue with Germany. In a SPIEGEL interview, John Podesta, a special adviser to President Barack Obama, speaks of the balance between alliances and security and says that changes are being made to NSA espionage practices.
Pls consider the following additional resources on the topic:
Power, Privacy, and the Internet
- Governments, Corporations and Hackers: The Internet and Threats to the Privacy and Dignity of the Citizen:
- The Internet and the Future of the Press
- The Internet, Repression and Dissent
Merkel calls for separate EU internet
The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)
Are We Puppets in a Wired World?
But while we were having fun, we happily and willingly helped to create the greatest surveillance system ever imagined, a web whose strings give governments and businesses countless threads to pull, which makes us…puppets. The free flow of information over the Internet (except in places where that flow is blocked), which serves us well, may serve others better. Whether this distinction turns out to matter may be the one piece of information the Internet cannot deliver.
by Evgeny Morozov
PublicAffairs, 413 pp., $28.99
by Cole Stryker
Overlook, 255 pp., $25.95
by John Naughton
Quercus, 302 pp., $24.95
by Eric Siegel
Wiley, 302 pp., $28.00
by Viktor Mayer-Schönberger and Kenneth Cukier
Eamon Dolan/Houghton Mifflin Harcourt, 242 pp., $27.00
by Alice E. Marwick
Yale University Press, 368 pp., $27.50
by Terence Craig and Mary E. Ludloff
O’Reilly Media, 108 pp., $19.99 (paper)
6 things you should never do on your work computer
Amy Elisa Jackson, Glassdoor Mar. 15, 2017, 10:45 AM
cyber security experts say that weaving your personal and professional lives together via a work laptop is risky business — for you and the company. Software technology company Check Point conducted a survey of over 700 IT professionals which revealed that nearly two-thirds of IT pros believed that recent high-profile breaches were caused by employee carelessness.
- DON’T: Save personal passwords in your work device keychain.
- DON’T: Make off-color jokes on messaging software.
- DON’T: Access free public wi-fi while working on sensitive material.
- DON’T: Allow friends or non-IT department colleagues to remotely access your work computer.
- DON’T: Store personal data.
- DON’T: Work on your side hustle while at the office.
more on privacy in this IMS blog
more on surveillance in this IMS blog:
Survey: IoT Overtakes Mobile as Security Threat
By Rhea Kelly 06/05/17
a report from ISACA, a nonprofit association focused on knowledge and practices for information systems. The 2017 State of Cyber Security Study surveyed IT security leaders around the globe on security issues, the emerging threat landscape, workforce challenges and more.
- 53 percent of survey respondents reported a year-over-year increase in cyber attacks;
- 62 percent experienced ransomware in 2016, but only 53 percent have a formal process in place to address a ransomware attack;
- 78 percent reported malicious attacks aimed at impairing an organization’s operations or user data;
- Only 31 percent said they routinely test their security controls, while 13 percent never test them; and
- 16 percent do not have an incident response plan.
- 65 percent of organizations now employ a chief information security officers, up from 50 percent in 2016, yet still struggle to fill open cyber security positions;
- 48 percent of respondents don’t feel comfortable with their staff’s ability to address complex cyber security issues;
- More than half say cyber security professionals “lack an ability to understand the business”;
- One in four organizations allot less than $1,000 per cyber security team member for training; and
- About half of the organizations surveyed will see an increase in their cyber security budget, down from 61 percent in 2016.
IoT to Represent More Than Half of Connected Device Landscape by 2021
By Sri Ravipati 06/09/17
analysis comes from Cisco’s recent Visual Networking Index for the 2016-2021 forecast period.
- IP video traffic will increase from 73 percent of all internet consumer traffic in 2016 to 82 percent in 2021 (with live streaming accounting for 13 percent);
- Virtual and augmented reality traffic is expected to increase 20-fold during the forecast period at a compound annual growth rate of 82 percent; and
- Internet video surveillance traffic is anticipated to grow during the forecast period, comprising 3.4 percent of all internet traffic.
To learn more, view the full report.
5 ways to use the Internet of Things in higher ed
By Danielle R. June 14th, 2017
1. Labeling and Finding
2. Booking and Availability
Laboratories are often required to be completely controlled spaces with considerations made for climate, light, and sometimes even biometric data inside the lab.
4 Big Intelligence Stories You Missed Amid The Comey Headlines This Week
more on surveillance and privacy in this IMS blog
Report: Tech Companies Are Spying on Children Through Devices and Software Used in Classroom
By Richard Chang 04/17/17
according to a new report from the nonprofit Electronic Frontier Foundation (EFF), “Spying on Students: School-Issued Devices and Student Privacy”
shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.
One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.
Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.
Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services
EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.
“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.
more on students and privacy
How to defend against government hackers
By Mark Rockwell Mar 31, 2017
The 188-page “Challenging Government Hacking In Criminal Cases” report, released by the American Civil Liberties Union on March 30, addresses new amendments to Rule 41 of the Federal Rules of Criminal Procedure, which took effect last December.
Under the changes to criminal procedure rules, feds can remotely search computers in multiple jurisdictions with a single warrant. The rules are touted by law enforcement agencies as a way to streamline 100-year-old rules of criminal procedure
more on surveillance in this IMS blog