•

Trying to “Fix” the No-Fly List

Too bad if you're innocent, you're not flying anyway.
(Image is in the Public Domain)

In a Washington Post article, they address the problem of false positives, where an innocent person is "wrongly detained" because their information is similar to someone's on the no fly list.

A specific example in the article is of Keiran O'Dwyer, a veteran American Airlines pilot who has been stopped and questioned over 80 times since 2003. They say that besides him, there are around 15,000 people, per week, that apply for redress for being mistakenly targetted due to TSA's screening systems.

An agency official said in an interview that the system, launched in February 2006, has eliminated about 17,500 detentions involving people entering the country at airports, seaports and at land borders. It is part of what the government says is an effort to prevent terrorism while not inconveniencing travelers or violating their privacy and civil liberties, though it is not yet applied to domestic flights.
Tags: , , ,

RFID Tattoos for Soldiers

Uh. Oh." (Image used under: Creative Commons 2.0 [SRC])

Hmm…. Prime cuts of meat… and military personnel. In the same sentence. I realize that military people have a reduced set of rights compared to civilians, but they deserve respect, not to be tagged like a piece of meat.

"It could help identify friends or foes, prevent friendly fire, and help save soldiers' lives," he said. "It's a very scary proposition when you're dealing with humans, but with military personnel, we're talking about saving soldiers' lives and it may be something worthwhile."

Tag our soldiers with wireless beacons? Sez one militant to another "That guy looks American." Other: "Yeah, I scanned his chip, he is". First Militant: "Ok, let's shoot him".

Tags: , , ,

TJ Maxx and Marshalls Hacked (Yawn)

Monday, March 4th, 2019 (No comments yet)
Businesses, Privacy, Security
You wouldn't have lost it if you didn't take it in the first place.
(Image used under: Creative Commons 2.0 [SRC][Mod])

In a not so surprising story, some large chain stores have been hacked and had their databases of customer information stolen creating a risk for their customers.

The end result is that consumers are often left completely in the dark when data breaches occur, wondering if they dodged a bullet, or if the inconvenience and frustration of fraud is simply waiting to hit them at a later date.

I hate these stories. If they didn't store so much data in the first place, this wouldn't even be a problem.

Tags: , , ,

Domino’s Exposed for Taking and Storing Customer Data Forever

Monday, March 4th, 2019 (No comments yet)
Businesses, Privacy
Data collection is everywhere; including the pizza store
(Image used under: Creative Commons 4.0 [SRC])

In the Washington Post was a nice article explaining how even a normal average citizen can be tracked during her whole day through technology that exists right now. From the article:

Domino's tracks her name, phone number, address, and size and type of pizza ordered. Unless a store decides otherwise, the data are held forever. That way, Domino's can provide more personalized service -- "Hi, Ms. Bernard, would you like your regular -- mushroom and sausage?"

She didn't ask them to store it, and they didn't ask her permission, they just took it. No company should be allowed to do this unchecked.

Bernard's credit card companies know her income and her shopping habits. They can share her information with affiliates without her permission and need not stop even if she asks them to.

Cheery.

Tags: , ,

Warantless Wiretapping Gets Oversight?

Monday, March 4th, 2019 (No comments yet)
Privacy, US Goverment
Maybe, just maybe, people should be free from surveillance if they're not doing anything wrong?

Read about it here.

The question is, what will happen now that it's being monitored by the court that should have been monitoring it in the first place? Why is Bush allowing this? It can only be because he thinks they won't do anything about it.

Tags: , ,

Best Buy Fights the Devil

Sunday, March 3rd, 2019 (No comments yet)
Businesses, Privacy
Best Buy wants to know if you're a good person or a bad... for profits anyway.
(Image used under: Fair Use doctrine)

Sixwise gives and in-depth review of Best Buy's plan to "actively…eliminate " what they call "devil" customers. I've written about this before, but I like how they list specific actions that could land you on the "blacklist".

Most notably, this is the advent of "customer reports" similar to credit reports where you will be assigned a number based on profitability and treated accordingly. If you don't want to see that happen, make sure you let your legislation know.

Tags: , ,

FBI Aren’t Snooping Alone – CIA and Military Take and Keep Info

Monday, March 4th, 2019 (No comments yet)
Privacy, US Goverment
If you're not doing anything wrong, the government should leave you alone!
(Image is in the Public Domain)

Here's a snippet from Ars Technica about how it's not just the FBI abusing power these days. From the article:

Wired's Ryan Singel adds a bit more to the story with the tidbit that the Pentagon plans to hang on to the records and feed them into TALON, the database project that the military uses for the data-mining part of its anti-terrorism efforts. Great! This is especially encouraging in light of the comments of Pentagon officials quoted by the Times who claim that these records are typically used to knock names off of the suspects list. In other words, they look at the records, determine that Mr. Smith is completely innocent, has no ties to terror, and got his money legitimately, then they promptly feed his data into an anti-terror database.
Tags: , ,

Pretexting Becomes Illegal

Monday, March 4th, 2019 (No comments yet)
Businesses, Privacy

From the Ars Technica article:

Under the new law, anyone attempting to "knowingly and intentionally" acquire the phone records of a third party by making false representations to a phone company or selling such illegally obtained records will face up to ten years in prison and fines.

Is it just me or does this seem really wrong? Why did we have to make a law about this? Wasn't it obviously a bad thing already?

Tags: ,

PASS Card Has RFID Too

Sunday, March 3rd, 2019 (No comments yet)
Privacy, US Goverment
Is there anything that doesn't have RFID anymore?
(Image used under: Creative Commons 2.0 [SRC])

EPIC reports that the Department of Homeland Security is creating a passport-like system that will be required for travelers between the US, Canada, Mexico, the Caribbean, and Bermuda. This "passport" will contain RFID and very little security. From the article:

The federal government has been increasingly using RFID technology in its identification documents. The Department of Homeland security last year began using RFID-enabled I-94 forms in its United States Visitor and Immigrant Status Indicator Technology ("US-VISIT ") program to track the entry and exit of visitors.19 This year, the State Department began issuing RFID-enabled passports to U.S. citizens.20 Only 23% of U.S. citizens have passports.21 Therefore, under the Western Hemisphere Travel Initiative, U.S. citizens would have to carry either a passport, which costs $97 for first-time applicants, or a PASS card. As the proposed Western Hemisphere Travel Initiative PASS card, U.S. passport, and US-VISIT I-94 entry and exit forms all contain RFID chips, if the PASS card proposal is adopted, then all U.S. citizens carrying either a passport or PASS card and visitors entering the country through US-VISIT will be able to be tracked using RFID technology.
Tags: , ,

City Surveillance Cameras Show Slaying

Sunday, March 3rd, 2019 (No comments yet)
Privacy, US Goverment
(Image is in the Public Domain)

Schneier reports on a murder that was captured on a city camera system. He clearly thinks that such systems are pointless though the article seems to present it as being good (it caught a thief after all).

By using the worst possible scenario, however unlikely, it becomes easy to scare people into supporting something you personally want. When it comes to camera systems everywhere, remember this: absolute security can be acheived through absolute surveillance. This is true, but absolute surveillance also brings zero privacy and freedom.

Tags: , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]