Federal Agent Abuses Monitoring Systems to Track Girlfriend

(Image is in the Public Domain)

Still trust the government to not abuse their surveillance power? Read this story about a federal agent who used the Department of Homeland Security's database to stalk his ex-girlfriend and her family. When we paraniod types tell you that massive government systems can be turned against us easily, remember that though we may be loud, obnoxious, and a little nuts at times, that doesn't mean we're wrong.

Tags: ,

Department of Homeland Security Dumps $42 Million Failed Data-Mining Project

DHL
(Image is in the Public Domain)

In what has become the norm and not the exception, an expensive Department of Defense project has been shown to be a complete failure wasting millions of dollars and all of our time. What makes this story interesting is it was due in no small part to the efforts of the Government Accountability office that this project was scrapped. They discovered that the program was using live data on American citizens instead of dummy data and that none of the required privacy protections had been put in place. Go figure.

Most frightening is this line:

The privacy office concluded that although required privacy analyses were ignored, the Privacy Act was not technically violated because the live data were covered by privacy notices issued earlier for other programs that originally gathered the information.

Which demonstrates the danger of taking data for one reason, but using for a completely different reason altogether.

Tags: , , ,

UK Police Authorized to Tap Traffic Cameras at Will

In the UK, they're allowing the police to use the toll camera network to track vehicles. The cameras are used to enforce a toll and have software that analyzes license plates to match them with the car's owner.
But they will only be able to use the data for national security purposes and not to fight ordinary crime, the Home Office stressed.
Yeah right. Just like the FBI and national security letters. JTAG ERROR: No slashdot_ht index defined Tags: ,

FBI Uses Virus to Nap Bomb-Threat Teen

This is actually pretty clever. This kid was making bomb threats to his school and was doing a pretty good job at hiding his tracks until the FBI got involved. By sending a small program to his Myspace page, they somehow managed to infect his home PC with a monitoring program that collected evidence of his crime:
...if the Bureau could get the CIPAV installed on the user's machine, it would be able to collect the machine's IP address, MAC address, list of running programs, operating system, Internet browser used, language used, the registered computer name, the currently logged-in username, and more. All of this information would be relayed over the Internet back to an FBI computer in Virginia.
That sounds just like Windows Vista. Tags: ,

US Builds Iraqi Biometric Database

Under the guise of security, the Iraqi people are being cataloged into a US database. First, I want to make it clear that I do not necessarily oppose this move in that it's possible that it will be used properly to target terrorist while leaving innocent people alone. As with all the various privacy concerns here, though, the problem is in what else they plan to do with the data. And let's face it, the US governement has a sad, sick, history of abusing our data and privacy. JTAG ERROR: No privacyorg_ht index defined Tags:

Software Reads Fleeting Expressions to Know What You’re Really Thinking

It's well known that body language is very difficult to control and often gives away your true thoughts and feelings for those capable of looking for the signs. Now a German company is trying to make software that understands those slight signals in order to produce superior quality ads.
"With this type of technology there are always going to be significant questions," Ngo said. "People should have the right to say 'no' as well." In the case of the IIS technology, the software doesn't identify individual people and then store the information for later. Instead, it compiles information and offers it as statistics, Küblbeck said. "We do not store any patterns and try to re-identify the person," he added.
And with all such technologies, they must be banned or strictly controlled to prevent them from being turned against us at the flip of a switch. Tags:

TSA Continues to Fail Random Tests

The TSA is failing more tests:
In one test, TSA inspectors hid the components of a fake bomb in carry-on luggage that also contained a bottle of water. The screeners at Albany International confiscated the water bottle but missed the bomb.
To which the TSA replied that the tests are unnaturally difficult and whine that it paints an "innacurate" picture of their work force. To which I wonder if the terrorists will not be so sneaky and mean as the TSA auditors. Perhaps they won't use every dirty trick. They wouldn't want the TSA to look bad after all.
Last October, the Star-Ledger newspaper of Newark, citing unnamed federal security officials, reported screeners at Newark Liberty International Airport flunked 20 of 22 tests, including failing to detect bombs and guns in luggage at checkpoints. The TSA responded to the report by launching an internal investigation in which federal employees were interrogated about whether they had leaked the results, the newspaper said.
That sounds like a perfect Bush-era response. "These statistics are horrible!" "Yeah, what should we do to fix them?" "Fix them!? We should cover them up!" Too bad the TSA doesn't get Nation Security as an excuse. (Thanks to The Consumerist for the link) Tags: ,

DHS Hasn’t Really Done Anything

DHL
(Image is in the Public Domain)

Apparently, the DHS has only charged 12 cases of terrorism out of 814,000 cases it's brought.

TRAC reported more than 85 percent of the charges involved more common immigration violations such as not having a valid immigrant visa, overstaying a student visa or entering the United States without an inspection.
Tags: , ,

UK Gets Police “Spy Drone”

(Image is in the Public Domain)

It's getting worse over there.

Assistant chief constable Simon Byrne said: "People clamour for the feeling of safety which cameras give.

Yes, but that's only because you tell them that cameras make them safer. How do you prevent them from becoming abused? What if a new law suddenly turns all those cameras on normal people. Things could go from ok to nightmare in a single day because of the infrastructure of social control that they're building.

I like this quote from Slashdot:

Is there any evidence to suggest that this increasingly Orwellian society is actually any safer?"
Tags: , ,

TSA Steals Money and Gets Away With It

Hmm, I've always wanted one of these.
(Image is in the Public Domain)

So they don't have cameras watching the TSA employees as they check the luggage? It's no wonder abuses like this keep happening.

Don't check valuables! You have to assume that anything worth more than 5 bucks that you check is going to be stolen. It's not pretty, but it's the world we live in.

This is unacceptable. When there's a string of employee thefts and in particular done by security personnel, there's no justification for ignoring the problem.

Tags: , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]