December 29, 2006

Facial-ID tech and humans seen as key to better photo search


Facial-ID tech and humans seen as key to better photo search, but privacy concerns raised

By Associated Press

A Swedish startup is combining software and humans to help make photos and other images more easily searchable online, raising privacy concerns as the technology eases the tracking of people across Web sites.

Traditionally, search engines analyze text surrounding an image on a Web site. So a search for ''Bill Gates'' might produce a photograph captioned with the name of the Microsoft Corp. chairman. But a search for a reporter's name might produce that same photograph if it had accompanied an article he had written.

Polar Rose AB is bringing facial-recognition technology to the mix. Its software scans everyday images for about 90 different attributes. If the software finds a match with images in a database, it concludes the two photos are of the same person.

Read the full article

December 28, 2006

The Death of Privacy


The Death of Privacy
With Cameras Everywhere, Is Privacy a Thing of the Past?
By JOHN STOSSEL, AUDREY BAKER, and GENA BINKLEY
ABC NEWS



Dec. 28, 2006 — For Sen. George Allen, some Los Angeles police officers, and Britney Spears, being caught on tape this year was bad news.

But they're celebrities or public officials. What about you? What about your privacy?

I was shocked to get my issue of Reason magazine showing a picture of my office on the cover. Reason did this for every subscriber to show how easy it is, with readily available satellite technology on the Internet, to invade our privacy. Cameras on Earth are even more intrusive. They're everywhere now.

Read the full article at ABC NEWS

December 26, 2006

Social network users have ruined their privacy, forever


Social network users have ruined their privacy, forever
By Steve Kerrison at Hexus.net

Students at the University of Bristol have recently been warned of the dangers of posting to social networking websites. They aren't the first to hear these warnings, and they won't be the last.

Prof. Nigel Smart of the Computer Science Department at the University of Bristol has expressed his concern at the worrying trend of people giving up their privacy on the internet via social networking websites. He told HEXUS: "I am concerned that from some of the posts I have seen, by colleagues, students and others, that there is a deep societal problem emerging of people giving up their privacy without realising it".

There's little point in worrying about ID cards, RFID tags and spyware when more and more people are throwing away their privacy anyway. And the potential consequences are dire.

Read the full article at Hexus.net

December 21, 2006

Merry Christmas

December 19, 2006

Privacy Watch: Phishers reach cell phones


Privacy Watch: Phishers reach cell phones

Article published by Andrew Brandt at Techworld.nl

Have you ever been SMiShed? That's not as personal a question as it may sound to the uninitiated, but it does relate to protecting your personal data.

SMiShing, a term coined by researchers for the McAfee security software firm, describes a form of phishing in which the bad guys send an SMS (short message service) message to a person's mobile phone. The first such messages purported to come from dating-service Web sites. Victims would receive a message announcing that the site intended to charge them US$2 a day unless they visited the URL listed in the message and followed the steps outlined there to unsubscribe from the service. Upon browsing to the URL (via computer), victims would get hit with drive-by downloads that installed Trojan horse software that subsequently would steal passwords and do other nasty things to the victims' PC.

Read the full article at Techworld.nl


More

McAfee warns of 'SMiShing' attacks InfoWorld News 2006-08-28 ...

December 18, 2006

Security in Computing


Security in Computing by Shari Lawrence Pfleeger

Text EPIC Alert 13.25

"A sweeping revision of the classic computer security text. This bookprovides end-to-end, detailed coverage of the state of the art in allaspects of computer security. Starting with a clear, in-depth review ofcryptography, it also covers specific options for securing software anddata against malicious code and intruders; the special challenges ofsecuring networks and distributed systems; firewalls; ways to administersecurity on personal computers and UNIX systems; analyzing securityrisks and benefits; and the legal and ethical issues surroundingcomputer security."

December 15, 2006

DHS privacy office


DHS privacy office steps up scrutiny of technology projects

By Daniel Pulliam at www.govexec.com

The Homeland Security Department's Privacy Office has started scrutinizing information technology projects and research initiatives more intensely, according to the office's recently released report to Congress.

In an effort to establish privacy protections during initial planning and development of IT systems, Privacy Office officials have strengthened their working relationship with the department's chief information officer and officials in the Science and Technology Directorate, the report stated.

Read the full article

December 14, 2006

e-Prodat: European Best Practices Observatory


The project named “e-PRODAT” (www.eprodat.org) aims to promote the exchange of knowledge and experiences between Agencies and other public bodies concerning the protection of personal data used by Governments and Public Administrations for the provision of public services, and specially those related to e-Government or based on the Internet, helping in particular to create best practices recommendations in this area.

The Project has three main goals:

The exchange of knowledge and experiences related to personal data protection in public bodies belonging to different European countries.

To create an Internet based “European e-Government data protection observatory”, for the permanent assessment on the accomplishment with European data protection laws and principles and the awareness of data protection issues among European citizens.

Identifying best data protection practices already in place for e-Government or other public bodies’ services, and building recommendations for increasing data protection standards in the public sector.

e-PRODAT Partnership

Data Protection Agency of the Community of Madrid (Spain, leading partner)
City of Bologna (Italy)
University King Juan Carlos (Spain)
Association of Local Authorities of the Municipality of Kavala (Greece)
City of Santa Cruz of Tenerife (Spain)
Abruzzo Region (Italy)
University of Patras (Greece)
Region of Western Greece (Greece)
Estonian Data Protection Inspectorate (Estonia)

December 13, 2006

Nano-Berkeley & DNA Detector


Portable, Magnetic DNA Detector

Researchers use magnetic materials found in computer hard drives to build chips for detecting genes, cancer, and toxins.

By Kate Greene at Technology Review Tuesday, December 12, 2006

Stanford researchers have integrated an array of tiny magnetic sensors into a silicon chip containing circuitry that reads the sensor data. The magnetic biochip could offer an alternative to existing bioanalysis tools, which are costly and bulky.

"The magnetic chip and its reader can be made portable, into a system the size of a shoebox," says Shan Wang, professor of materials science and electrical engineering at Stanford University, in Palo Alto, CA. Its small size, he says, could make it useful at airports for detecting toxins, such as anthrax, and at crime scenes for DNA analysis.

The Stanford biochip is one of a number of approaches being explored to replace the current bioanalysis technology.
Read the full article at Technology Review

Links:

The Open Society Paradox: DNA Privacy

Genomic Privacy Project


- - - - -- - - -- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Berkeley expected to be first city to regulate nanotechnology by amending hazmat laws

Published at theage.com.au

The use of subatomic materials as microscopic building blocks for thousands of consumer products has turned into a big business so quickly that few are monitoring the so-called nanotechnology's effects on health and the environment.

So Berkeley intends to be the first city to step into the breach and attempt to regulate the nascent but fast-growing industry.

The City Council is expected Tuesday to amend its hazardous materials law to compel researchers and manufacturers to report what nanotechnology materials they are working with and how they are handling the tiny particles.

The aim of nanotechnology, in the commercial world, is to develop new products and materials by changing or creating materials at the atomic and molecular level. But much of the impacts from those developments remains unknown, particularly with regard to possible environmental and health problems.

"The ordinance is quite important, and I think it will be given worldwide attention," said David Rejeski, director of the Project on Emerging Nanotechnologies, which is funded by the Woodrow Wilson International centre for Scholars and the Pew Charitable Trusts. "This is a new industry, and there is a lack of federal and state regulations."

Read the full article at The Age


Links:

Nanotechnology surveillance & privacy: an interview

EPIC Privacy Implications of Nanotechnology Page

Ethics in Nanotechnology: Privacy (EthicsWeb.ca)



December 12, 2006

CapGemini reports



I have found two reports (by CapGemini) to realized how privacy, data protection, transparency and more and more important to build trust with your customers.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Cars Online 06/07: Understanding the Dynamics of Consumer Buying Behavior and Customer Loyalty

Vehicle ownership is a long-term, complex relationship among the consumer, the manufacturer and the dealer that is often dependent as much on emotional as rational factors. This was among the key findings of the eighth annual Cars Online study from Capgemini. The study - which surveyed consumers in China, France, Germany, the United Kingdom and the United States - examines trends in consumer buying behavior, Internet usage and customer loyalty.
 
Abstract

The need for accurate consumer knowledge—how they shop, why they buy, what keeps them coming back—will continue to grow. Customers’ search for information during the vehicle buying process has become increasingly diverse and complex, making it more difficult for automotive companies to predict their behaviour.

Page 3

. . . .

Transparency and Trust Are Critical

The research found that automotive companies must move away from the traditional asymmetrical customer/dealer relationship so often characterised by negative preconceptions and stereotypes on the part of both parties. The key is to move toward a more balanced relationship where there is transparency of information and mutual trust, thereby improving sales and beginning to build customer loyalty.

Improved customer intelligence was found to be a critical success factor in responding to the changing dynamics of the customer/dealer relationship. Since customer intelligence, and in fact customer behaviour, evolves, it’s critical that automotive companies always keep their finger on the pulse. Best practices include sales training seminars that incorporate intelligence about customer research tactics, as well as careful and constant observation of consumer behaviour through the entire vehicle buying process.

Page 14


. . . .

The Personal Touch Works

It’s clear from our Cars Online findings that the move toward greater personalisation and customisation is an increasingly important element in the entire vehicle buying process and is a key to maintaining the customer relationship.

However, personalisation can be a double-edged sword given today’s privacy concerns. Whilst close to twothirds said they would welcome personalised communications, about 15% of respondents indicated that they would be less likely to buy their next vehicle from the same dealer or manufacturer if they received these types of personalised communication.


Page 20


- - - - - - - - - - - - - - - - - - - - - -


2016: The Future Value Chain

The speed of change and a sense of urgency will drive the evolution of the value chain over the next decade. Is the consumer products and retail industry ready? This new study, from the Global Commerce Initiative, Capgemini and Intel, defines a unique vision of the total value chain for consumer goods from manufacture to consumption.
[read the full article]

Abstract


New Technologies Will Benefit Businesses and Consumers


By 2016, quantum computers will be reality and chips will have a capacity of one terabyte (1 million megabytes). Software agents will manage auctions, work and personal diaries and take care of many other daily jobs. Information will be available everywhere and through one personal device. Virtual reality will exist for a variety of products and services, not just video games. Security of data and privacy will be critical and biometry will be a key to ensuring secure access and authorisation.


Pag 12


2016 Information Flow

Consumers’ willingness to share their personal information with companies will increase over time with greater Internet use and presuming their experiences in sharing data are largely positive.

This will be dependent on the consumer having confidence in the privacy and security measures in place covering this type of activity. Most importantly, however, they will expect to get something of value in return, such as tailor-made promotions or added convenience. Companies will also develop clearer market segmentation based not on who the consumers are (age, gender, etc.) but on how they act (their buying behaviour separate from traditional demographic cohorts).


Pag 20




December 11, 2006

Tech Giants Push for New Data-Privacy Law




Tech Giants Push for New Data-Privacy Law
at NewsFactor.com

By Christopher S. Rugaber

Microsoft, HP and eBay earlier this year formed the Consumer Privacy Legislative Forum to lobby for privacy legislation. Google, Intel, Oracle, and other companies later joined. The forum supports legislation that would set standards for what notice must be given to consumers about personal information collected on them and how it will be used.

Microsoft Corp., Hewlett-Packard Co. and other high-tech companies are preparing to push for data-privacy legislation next year to replace what they consider an outdated patchwork of state and federal laws that are inconsistent and burdensome.

Read full article at NewsFactor


Consumer Privacy Legislative Forum Statement

Consumer Privacy Legislative Forum (26 Jun 2006 post)

December 10, 2006

Location privacy in pervasive computing


Location privacy in pervasive computing

Beresford, A.R. (received a PhD for Location Privacy in Ubiquitous Computing)
Stajano, F.
Lab. for Commun. Eng., Cambridge Univ., UK;
(department publications)

This paper appears in: Pervasive Computing, IEEE

Publication Date: Jan-Mar 2003Volume: 2, Issue: 1On page(s): 46- 55ISSN: 1536-1268

Abstract As location-aware applications begin to track our movements in the name of convenience, how can we protect our privacy? This article introduces the mix zone-a new construction inspired by anonymous communication techniques-together with metrics for assessing user anonymity. It is based on frequently changing pseudonyms.


More:

Ford-Long Wong, Frank Stajano, Location Privacy in Bluetooth. Proceedings of 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks, Series LNCS, Number 3813, Pages 176-188, Springer-Verlag, July 2005.

A Value Sensitive Design Investigation of Privacy for Location-Enhanced Computing. Freier, Consolvo, Kahn, Smith and Friedman

December 09, 2006

US Congress approves data privacy bill

Source: The New York Times

Senate Passes Bill to Criminalize Pretexting

By BRAD STONE and MATT RICHTEL

The Senate passed legislation last night that would make it a federal crime to obtain a person’s telephone records without permission, an act known as pretexting.

The measure, which was approved by unanimous consent last night and is similar to a bill passed earlier in the House, imposes a fine of up to $250,000 and imprisonment of up to 10 years for duping telephone companies into divulging the calling records of private individuals.
The penalties can go up under special circumstances, like cases involving domestic abuse.

The support for the legislation comes in the aftermath of the spying scandal at Hewlett-Packard, the computer giant. The company, eager to ferret out purported leaks to journalists from within its board, used private detective firms to retrieve phone records of directors, managers and journalists.

Full article at The New York Times

December 07, 2006

Most Americans Want Electronic Health Data, But Fear For Privacy



Most Americans Want Electronic Health Data, But Fear For Privacy

By Marianne Kolbasuk McGee InformationWeek

Nearly two-thirds -- 65% -- of U.S. consumers want personal electronic health records, but 80% of them have concerns about the misuse and security of their information.

While a majority of American consumers say they want electronic access to their medical information and believe digitized records could improve health care and cut costs, they fear for the security and the privacy of that personal data.

Nearly two-thirds -- 65% -- of U.S. consumers want personal electronic health records, but 80% of them have concerns about the misuse and security of their information, according to new survey of 1,003 Americans, commissioned by the Markle Foundation and conducted by polling firms Lake Research Partners and American ViewPoint.

Read full article at Information Week


Links:

Markle Foundation Press Release

Connecting for Health Releases new common framework document on personal health records(PHRs) Full Report (PDF 6.58 Mb)

December 05, 2006

Guidelines and Requirements in Support of the Information Sharing Environment


Source: U.S. Newswire

WASHINGTON, Dec. 4 /U.S. Newswire/ -- The Program Manager for the Information Sharing Environment (ISE), Ambassador Thomas E. McNamara, today released guidelines to ensure that information privacy and other legal rights of Americans are protected in the development and use of the ISE. These guidelines have been approved by the President and are being issued to the heads of all executive departments and agencies.

On Dec. 16, 2005, the President issued a memorandum to the heads of executive departments and agencies titled, "Guidelines and Requirements in Support of the Information Sharing Environment." Guideline 5 of that memorandum directed the Attorney General and the Director of National Intelligence, in coordination with the heads of executive departments and agencies that possess or use intelligence or terrorism information, to develop guidelines to ensure that the information privacy and other legal rights of Americans are protected in the development and use of the ISE. These guidelines fulfill the requirements of section 1016(d) of the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA).

Read full article at U.S. Newswire

To view the privacy guidlines, visit: http://www.dni.gov/press_releases/PrivacyGuideline.pdf

December 04, 2006

The Privacy and Civil Liberties Oversight Board’s 17th meeting


Recommended by the July 22, 2004, report of the National Commission on Terrorist Attacks Upon the United States (the 9/11 Commission), the Privacy and Civil Liberties Oversight Board was established by the Intelligence Reform and Terrorism Prevention Act of 2004. It consists of five members appointed by and serving at the pleasure of the President. The Chairman and Vice Chairman are confirmed by the Senate. Board members are selected from among trustworthy and distinguished citizens outside the Federal Government who are qualified on the basis of achievement, experience, and independence. The Board is part of the White House Office within the Executive Office of the President and supported by an Executive Director and staff.


The Privacy and Civil Liberties Oversight Board’s seventeenth meeting will be hosted by Georgetown University in Gaston Hall at Healy Hall on December 5, 2006, from 2:00 to 5:00 pm. This will be the first public meeting of the Board, and it is designed as an expert’s forum in which the Board will solicit comments from non-governmental individuals and organizations with an interest and expertise in privacy and civil liberties issues arising in the context of the government’s actions to protect the nation from terrorism. The Board has also invited privacy and civil liberties officers from a number of federal departments and agencies, including the Departments of Justice and Homeland Security, the Office of the Director of National Intelligence and the Terrorist Screening Center, to attend.


Members of the public interested in attending this meeting as audience members register at http://www12.georgetown.edu/sfs/rsvp/campus.

December 01, 2006

Shoes & X-ray screening


TSA's revealing X-ray screening raises privacy concerns
Usa Today By Thomas Frank

The federal government plans this month to launch the nation's first airport screening system that takes potentially revealing X-ray photos of travelers in an effort to find bombs and other weapons.

Transportation Security Administration screeners at Phoenix Sky Harbor International Airport will test a "backscatter" machine that could vastly improve weapons detection but has been labeled a "virtual strip search" by the American Civil Liberties Union. Backscatter can show clear images of nude bodies.

Full article at Usa Today


Nike+iPod Sport Kit raises privacy concerns
Phsysorg.com

"It is easy for someone to use the Nike+iPod as a tracking device," says Scott Saponas, a doctoral student in computer science and lead author of a technical report posted online at www.cs.washington.edu/research/systems/privacy.html on Nov. 30. "It's an example of how new gadgetry can erode our personal privacy." The researchers suggest that people who own a Nike+iPod Sport Kit turn it off when they're not exercising so that it stops emitting signals.

Privacy saved my life

Labels

Contact Me

Creative Commons License
Esta obra está bajo una licencia de Creative Commons.