Online privacy battle in California
Things are getting interesting in California. Tech companies are fighting privacy advocates over a California bill that would require companies like Facebook, Google and other social networks to disclose to users the personal data the services have collected and with whom they have shared it. It doesn’t restrict what they can do, but the disclosure requirements are still very controversial and could be very expensive.
Security gifts for the home
The holidays are here so everyone is going crazy getting gifts. One area that is perhaps overlooked at times for gifts is home security, though now with all sorts of surveillance gadgets tied to the Internet, you have some really cool options in this area that can make for great gifts.
Here’s one that is highlighted in the Bullz-Eye.com Holiday Gift Guide for the home:
iZON Remote Room Monitor
If anyone in your family or circle of friends has just had a baby or is expecting, this cool new monitor from Stem Innovation makes a great gift. This innovative and elegant video camera enables you to view and listen to activity in your home or office from anywhere in the world on your iPod touch, iPhone or iPad. You can use it as a baby monitor, or as a monitor in your home when the babysitter is watching your kid. It can also be used as a security device as well so it also makes a great gift for anyone who’s interested in a video monitor. Privacy is also protected ensured as iZON uses secure encryption to stream video and audio through your local wireless network. Set up multiple iZON on a single network and view in a list within the app.
It’s amazing how flexible these tools are these days, and here you have an easy dual use device that can be a baby monitor but also so much more. It’s a great way to keep an eye on your home, kids, pets etc. Check it out.
Posted in: Internet, Security, Surveillance
Tags: 2011 holiday gift guide, best security apps, cool security apps, fun security apps, home security, hot security apps, Internet surveillance, iZON Remote Room Monitor, killer security apps, online surveillance, protect your home, remote surveillance, security app reviews, security apps, security for your home, security gadget reviews, security gadgets, streaming surveillance, surveillance cameras, surveillance equipment, surveillance gadgets
The fight for the social web
The battle for privacy on social networking sites is heating up.
Privacy. It’s a word we hear a lot in the digital age, especially now that Facebook and Twitter are signing on users practically straight from the womb. It’s also a concept very few people understand. Just type your name into the search engine pipl.com. If you’re like me, you’re fortunate enough to have a fairly common name, but even then an alarming amount of information can show up. The funny thing about that search engine is everything on it is either in the public record or was shared by the person to whom it pertains. That’s right, we’re to blame for the vast majority of private information that is publicly available.
Legislators in California are trying to reduce the amount of information we accidentally share by imposing new privacy laws on social media.
The arguments against these regulations are ridiculous, so you have to read the entire articles, which also includes a story of a 14-year-old girl who created all sorts of issues for her family with her online social media accounts.
The cyber security issue
The recent Sony case highlights the depth of the problem:
Sony is run by a bunch of greedy morons who stupidly left their systems vulnerable to an attack by hackers: This is the conventional explanation of how the company finds itself bent into a familiar pose of contrition, following news that cyber-pirates breached its defenses, potentially gaining access to troves of valuable information — credit card numbers, email addresses — for more than 100 million customers.
If only life were so soothingly simple. The Sony data hack and the predictable pursuit of villains carries a dose of false comfort, implicitly affirming the assumption that someone must have fouled up to create such a menace to privacy and commerce; someone must have failed in a readily identifiable way, because this surely can’t be the ordinary state of events. But the blame narrative masks an unsettling question: What if Sony did the best it could to protect itself, and the pirates still won? What if the company employed the best defenses available, yet they proved inadequate in the face of a decentralized and proliferating threat?
Sony has captured headlines because it is one of the world’s most conspicuous consumer brands, and the recent attacks on its network have been both brazen and successful. But the list of companies that have been targeted by similar plots is lengthy and growing.
The problem is that we don’t focus enough resources on this issue, and we don’t go after simple targets.
Take simple spam. It’s all over the place. But if we pursued these idiots aggressively, we would start to build an apparatus that would start to root out cyber criminals at all levels.
We need to get serious about these issues, and stop wasting time on things like online poker.
It’s also one of the few areas where the interests of security and privacy converge.
Security and governance of cyberspace
Here’s a useful cybersecurity article that lists and explains the “19 global organizations whose international activities significantly influence the security and governance of cyberspace.”
Digital Due Process coalition
Many are now concerned about web privacy, so a group of companies have formed the Digital Due Process coalition to advocate for clearer laws to protect privacy online. The opening paragraphs from the web site for this group explains their position.
ECPA Reform: Why Now?
The Electronic Communications Privacy Act (ECPA) was a forward-looking statute when enacted in 1986. It specified standards for law enforcement access to electronic communications and associated data, affording important privacy protections to subscribers of emerging wireless and Internet technologies. Technology has advanced dramatically since 1986, and ECPA has been outpaced. The statute has not undergone a significant revision since it was enacted in 1986 – light years ago in Internet time.
As a result, ECPA is a patchwork of confusing standards that have been interpreted inconsistently by the courts, creating uncertainty for both service providers and law enforcement agencies. ECPA can no longer be applied in a clear and consistent way, and, consequently, the vast amount of personal information generated by today’s digital communication services may no longer be adequately protected. At the same time, ECPA must be flexible enough to allow law enforcement agencies and services providers to work effectively together to combat increasingly sophisticated cyber-criminals or sexual predators.
The time for an update to the ECPA is now. For more than a year, privacy advocates, legal scholars, and major Internet and communications service providers have been engaged in a dialogue to explore how the ECPA applies to new services and technologies. We have developed consensus around the notion of a core set of principles intended to simplify, clarify, and unify the ECPA standards; provide clearer privacy protections for subscribers taking into account changes in technology and usage patterns; and preserve the legal tools necessary for government agencies to enforce the laws and protect the public.
Posted in: Internet, News, Policies, Privacy, Security, Social Media
Tags: Digital Due Process coalition, ECPA, ECPA Reform, online privacy, The Electronic Communications Privacy Act, web privacy
Richard Clarke and cybersecurity
Richard Clarke is one of our leading experts on national security, and he has made cybersecurity his pet project. He’s written a new book on the subject, and he’s very critical of our nation’s efforts to combat digital terror, and he’s also critical of the efforts of companies to protect their own information.
His recommendations are summarized in a recent article in BusinessWeek, and they include getting serious about industrial espionage and creating information quarantines.
The privacy implications don’t appear obvious at first blush, but as with most security efforts, the privacy problems come out later as new policies and tactics are implemented.
Privacy in the digital age
Everything has changed. In the past ten years we’ve reached a tipping point where technology involving surveillance and the sharing of information has become so pervasive and inexpensive that we can no longer assume that our actions or words will be kept private.
Add in the dangers posed by terrorists and criminals, and now we have a greater appetite for compromising privacy in exchange for greater security.
We started this blog to address the tensions between the competing needs for security and privacy. We’ll also address the tools out there that citizens can use to shield their privacy, along with the tools that can be used to get information . . . even about others.
In the end, we will need to make choices about how to balance these interests as a society, and each individual will need to come to their own conclusions about how to live in the new environment. For example, if you could spy on your spouse or significant other, would you do it? Would you place a GPS device on their car? How much surveillance is appropriate regarding your children? Get used to these difficult questions.
Posted in: Gadgets, Identity Theft, Internet, News, Policies, Privacy, Security, Social Media, Surveillance
Tags: GPS, GPS surveillance, privacy tipping point, spying on your spouse