Erin Andrews still fighting to take down videos
The beautiful Erin Andrews was violated a while back when some creep used a camera to film her undressing through the peep hole in the door to her hotel room. She’s still trying to deal with the videos taken from that incident.
But Andrews was also traumatized when peephole stalker Michael David Barrett posted nude videos of her that went viral. Barrett was sentenced to 2 1/2 years in prison for interstate stalking. That sentence wasn’t nearly long enough for Andrews who blasted him as a “sexual predator” in court.
Andrews is buying copyrights of the videos in an attempt to take them down for good. Still, she’s reminded of her frightening experience every day on Twitter, where she has over 645,000 followers. She has a warning for any famous athlete, celebrity or media personality who wants to play the social media game. Learn to accept criticism. Ignore the urge to fire back — no matter how much you want to.
4 Ways to Guarantee Home Safety
They say an Englishman’s home is his castle, but the same idea could equally be applied to anyone no matter where they live. Your home is your private dwelling and naturally you want to feel secure in your home. Unfortunately, even the safety of the home can be compromised by various things from acts of nature to people breaking in and stealing your possessions.
Luckily, there are a number of things you can do to protect your home and guarantee safety in your house.
1. Get Contents Insurance
Unfortunately, if you have any accidents in your home such as a fire, there is a good chance that you will lose a number of your precious and valuable possessions. One way to counteract this is to take out a contents insurance policy that will safeguard you in the event you lose any valuable or even everyday items. Many policies also have a clause that covers cash in your home, as well as valuables you may have in the garden. Of course, there may be some personal items and mementos that will be irreplaceable, but it is reassuring to know that other more common items can be insured and replaced should you have an accident.
2. Flood Insurance
Depending on where you live, you may also want to consider taking out a separate policy that offers flood insurance for your home. This is essential for people that live near large bodies of water, in low lying areas of land or near the ocean. Nature can be unpredictable at the best of times, and as a flood is a relatively rare occurrence, you may find that it is not covered on your standard contents insurance policy. Taking out an agreement that protects you from flood damage will give you peace of mind, especially during the next heavy thunderstorm.
3. Home Alarm Systems
Anybody who has been burgled will tell you that it is an invasive and horrifying experience. However, the sad truth is that many people could have helped prevent a burglary of their home by installing an alarm system. Not only will this precaution alert the local authorities should anybody try to gain unwanted access to your home, but the alarm box and system that works it are usually placed on the front wall of the house, acting as a clear deterrent for any passing burglar who thinks your home might be a soft mark and a good place to try to break into.
4. Additional Locks
If you employ the use of deadbolts and extra locks on your front and back doors and windows, your home is practically a fortress. Make sure you only give copies of the keys to people who live there or people you know you can trust to avoid anybody else getting their hands on a set and being able to let themselves in.
By undertaking these four steps, you should be able to guarantee your home safety at all times. Which will you use first?
Consult your local laws before recording anyone without consent
This story is crazy, and it demonstrates how many of our laws are outdated.
In Illinois, it’s illegal to record anyone without their consent, including police officers! A woman is now charged with a crime for recording a conversation with a police officer who was assaulting her sexually.
This has naturally sparked outrage from various groups.
But the lesson here is you have to be very careful if you’re going to use surveillance equipment to monitor anyone. Check your local laws first!
The fight for the social web
The battle for privacy on social networking sites is heating up.
Privacy. It’s a word we hear a lot in the digital age, especially now that Facebook and Twitter are signing on users practically straight from the womb. It’s also a concept very few people understand. Just type your name into the search engine pipl.com. If you’re like me, you’re fortunate enough to have a fairly common name, but even then an alarming amount of information can show up. The funny thing about that search engine is everything on it is either in the public record or was shared by the person to whom it pertains. That’s right, we’re to blame for the vast majority of private information that is publicly available.
Legislators in California are trying to reduce the amount of information we accidentally share by imposing new privacy laws on social media.
The arguments against these regulations are ridiculous, so you have to read the entire articles, which also includes a story of a 14-year-old girl who created all sorts of issues for her family with her online social media accounts.
The cyber security issue
The recent Sony case highlights the depth of the problem:
Sony is run by a bunch of greedy morons who stupidly left their systems vulnerable to an attack by hackers: This is the conventional explanation of how the company finds itself bent into a familiar pose of contrition, following news that cyber-pirates breached its defenses, potentially gaining access to troves of valuable information — credit card numbers, email addresses — for more than 100 million customers.
If only life were so soothingly simple. The Sony data hack and the predictable pursuit of villains carries a dose of false comfort, implicitly affirming the assumption that someone must have fouled up to create such a menace to privacy and commerce; someone must have failed in a readily identifiable way, because this surely can’t be the ordinary state of events. But the blame narrative masks an unsettling question: What if Sony did the best it could to protect itself, and the pirates still won? What if the company employed the best defenses available, yet they proved inadequate in the face of a decentralized and proliferating threat?
Sony has captured headlines because it is one of the world’s most conspicuous consumer brands, and the recent attacks on its network have been both brazen and successful. But the list of companies that have been targeted by similar plots is lengthy and growing.
The problem is that we don’t focus enough resources on this issue, and we don’t go after simple targets.
Take simple spam. It’s all over the place. But if we pursued these idiots aggressively, we would start to build an apparatus that would start to root out cyber criminals at all levels.
We need to get serious about these issues, and stop wasting time on things like online poker.
It’s also one of the few areas where the interests of security and privacy converge.
The body scanner hysteria
Over the past several weeks, the issue of new body scanners and pat-down procedures at our airports has become a very hot topic. Naturally, the cable new channels are feeding the hysteria.
It’s a very legitimate issue, as we need to decide how far we are willing to go to invade the privacy of travelers in order to improve the security of flying. It goes to the heart of issues that will be discussed on this blog. TSA certainly has not done a good job of dealing with this issue.
Unfortunately, the news media is sensationalizing the story.
A win for privacy . . .
This seems like a reasonable ruling.
Giving privacy-rights advocates and civil libertarians an important victory, a federal appeals court ruled that police conducted an illegal warrant-less search by planting a GPS device in a drug-case suspect’s car and tracking him for a month.
In ruling Friday that the police violated the suspect’s Fourth Amendment rights, the U.S. Court of Appeals for the D.C. Circuit said that by almost any measure, planting a GPS device, then following a person for several weeks conflicted with an individual’s reasonable expectations for privacy.
It will be interesting to see how the law develops for personal spying and private investigators.
Posted in: Gadgets, News, Policies, Privacy, Surveillance
Tags: civil libertarians, Fourth Amendment, GPS, GPS device, GPS privacy, GPS surveillance, illegal warrant-less search, planting a GPS device, privacy-rights advocates, reasonable expectations for privacy
Security and governance of cyberspace
Here’s a useful cybersecurity article that lists and explains the “19 global organizations whose international activities significantly influence the security and governance of cyberspace.”
Digital Due Process coalition
Many are now concerned about web privacy, so a group of companies have formed the Digital Due Process coalition to advocate for clearer laws to protect privacy online. The opening paragraphs from the web site for this group explains their position.
ECPA Reform: Why Now?
The Electronic Communications Privacy Act (ECPA) was a forward-looking statute when enacted in 1986. It specified standards for law enforcement access to electronic communications and associated data, affording important privacy protections to subscribers of emerging wireless and Internet technologies. Technology has advanced dramatically since 1986, and ECPA has been outpaced. The statute has not undergone a significant revision since it was enacted in 1986 – light years ago in Internet time.
As a result, ECPA is a patchwork of confusing standards that have been interpreted inconsistently by the courts, creating uncertainty for both service providers and law enforcement agencies. ECPA can no longer be applied in a clear and consistent way, and, consequently, the vast amount of personal information generated by today’s digital communication services may no longer be adequately protected. At the same time, ECPA must be flexible enough to allow law enforcement agencies and services providers to work effectively together to combat increasingly sophisticated cyber-criminals or sexual predators.
The time for an update to the ECPA is now. For more than a year, privacy advocates, legal scholars, and major Internet and communications service providers have been engaged in a dialogue to explore how the ECPA applies to new services and technologies. We have developed consensus around the notion of a core set of principles intended to simplify, clarify, and unify the ECPA standards; provide clearer privacy protections for subscribers taking into account changes in technology and usage patterns; and preserve the legal tools necessary for government agencies to enforce the laws and protect the public.
Posted in: Internet, News, Policies, Privacy, Security, Social Media
Tags: Digital Due Process coalition, ECPA, ECPA Reform, online privacy, The Electronic Communications Privacy Act, web privacy
Richard Clarke and cybersecurity
Richard Clarke is one of our leading experts on national security, and he has made cybersecurity his pet project. He’s written a new book on the subject, and he’s very critical of our nation’s efforts to combat digital terror, and he’s also critical of the efforts of companies to protect their own information.
His recommendations are summarized in a recent article in BusinessWeek, and they include getting serious about industrial espionage and creating information quarantines.
The privacy implications don’t appear obvious at first blush, but as with most security efforts, the privacy problems come out later as new policies and tactics are implemented.