Change CCTV to Webcams for Government Accountability

(Image is in the Public Domain)

In the UK, which is fast becoming a police state, they already have a large network of closed-circuit TVs (CCTV). Privacy groups are arguing that the CCTV must be converted to public webcams so people can see what the government is watching.

Tags: ,

Private Lenders Turn Away People on The Terrorist Watch List

Watch lists have serious downsides that need to be addressed if we're going to use them

Now the terrorist watch list is making it to our everyday lives.

Private businesses such as rental and mortgage companies and car dealers are checking the names of customers against a list of suspected terrorists and drug traffickers made publicly available by the Treasury Department, sometimes denying services to ordinary people whose names are similar to those on the list.

Yet anyone who does business with a person or group on the list risks penalties of up to $10 million and 10 to 30 years in prison, a powerful incentive for businesses to comply.

"It prohibits anyone from doing business with anyone who's on the list. It does not have a minimum dollar amount. . . . The local deli, if it sells a sandwich to someone whose name appears on the list, has violated the law."

This might be a good thing if it actually worked. Judging on how the no-fly list works, I'm guessing it doesn't.

So what happens when the terrorists start using names like:

  • John Smith
  • Mike Brown
  • Chris Anderson
  • Mary Jones
  • Beth Miller
Tags: , , ,

Detection Methods Used by Copyright Holders

Download responsibly - which also means keeping your downloading habits private.
(Image is in the Public Domain)

Not too long ago, a good friend of mine did a lot of work in understanding how copyright holders (such as those represented by the RIAA and MPAA for example) act and react to Peer 2 Peer filesharing networks.

I managed to dig up his 20 page essay on the topic which provides an in-depth summary of the P2P issue including suggestions on how to avoid being identified on a P2P network.

This is a great resource for someone who needs historical information on the issue or who is interested in building a secure P2P app. Also see my article on avoiding P2P nightmares for parents for additional tips and tricks.

Tags: , , ,

University of Nebraska Stands Up to RIAA for Students

(Image source is unknown)

Wisconsin may have refused to help the RIAA, but the U of N actually took it all the way:

If there were any doubt that the university is really irritated by the RIAA's requests, it has requested that the RIAA pay the university to reimburse its expenses from dealing with this

That's so awesome 😀

Tags: , , , ,

FBI Illegally Circumvents Subpeonas

(Image is in the Public Domain)

According to the Washington Post, the FBI issued thousands of national security letters many without any clear ties to "emergencies" or current investigations.

Referring to the exigent circumstance letters, Sen. Charles E. Grassley (R-Iowa) wrote in a letter Friday to Justice Department Inspector General Glenn A. Fine: "It is . . . difficult to imagine why there should not have been swift and severe consequences for anyone who knowingly signed . . . a letter containing false statements. Anyone at the FBI who knew about that kind of wrongdoing had an obligation to put a stop to it and report it immediately."

No kidding. What I don't get is why everyone is saying that the "FBI's use of the exigency letters "circumvented" the law" rather than just say "They broke the law and many of the buggers are going to jail".

Tags: , ,

Car Dealership Forces Thumbprints to Sell a Car?

(Image is in the Public Domain)

In my last experience buying a car, they tried to take my Social Security Number even though I had financing from someone else. I fought them for a half hour and nearly left the place until a manager got involved and saw the writing on the wall.

Now, it's getting worse. Public Citizen's blog points to an article about a car dealership that data-brokerings customers for their thumbprints before selling them a car. First seen at banks, the practice seems to be spreading.

Tags: ,

University of Wisconsin Doesn’t Bend to RIAA

Oh no! The university isn't letting us bully people out of money!
(Image used under: Creative Commons 2.0 [SRC])

In the RIAA's ongiong bully-lawsuit campaign, it has sent "settlement" letters to numerous Universities to be distributed to "alleged" abusers. The University of Wisconsin has refused to do so without a subpoena. Innocent before guilty? Wow. Count on a University to remember our Constitution.

Tags: , ,

Workplace Monitoring Gets Evil

(Image is in the Public Domain)

This article talks about a company who designs workplace monitoring software. This isn't new technology, but the reason I point it out is how human they make these guys seem. Check out the Star Wars and Battlestar Galactica references 😀

Tags:

In Game Ads Come Closer to Reality

(Image used under: Creative Commons 2.0 [SRC])

Now that Google is getting in the game (so-to-speak), the chance of seeing in-game advertising has just skyrocketed. Would a company like Google who tracks your searches match your ads to your search habits? Hmm…I guess Penny Arcade was right.

Tags: ,

Dept of Homeland Security Clueless – Says Privacy Isn’t at Risk

DHL
(Image is in the Public Domain)

Apparently the head of the DHS doesn't see why the REAL-ID act is such a big deal.

I'll make this very simple: Passports. E-voting. Airline security. Domestic spying. Not a great track record.

Tags: , , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

passwords Tutorial
|INDEX|next: Password Tips and Tricks

Making Good Passwords

To understand what makes a good password, let's talk about what makes a bad one first.
Making good passwords can be complex, but here are some tips and tricks that will make it easier.

Password Protection

Once you've taken the trouble to make a good password, the next step is to keep it safe!
Now that you've done all this work, you have to learn the most important rule of all: DON'T GIVE THEM AWAY!

... or check out any of my other guides and tutorials by clicking here!

Bad Passwords

To understand what makes good passwords, first check out some of the worst passwords out there and what makes them so bad.

[Click for full description]

Password Tips and Tricks

It's impossible to expect someone to make good passwords by just giving them some rules. There are tricks that make your passwords secure and easy for you all at the same time.

[Click for full description]

Password Protection

It's really a skill to come up with secure passwords that you can remember. Once you've learned how, remember that it doesn't matter how good you are if you don't protect your password properly.

[Click for full description]

Password Mugging

A disturbing new practice among websites and services is where they ask you for your user name and password to other sites. I call this "Password Mugging"

[Click for full description]