David Kirkpatrick

November 17, 2010

The erosion of personal privacy continues

Filed under: Business, Politics, Technology — Tags: , , , , , — David Kirkpatrick @ 10:41 am

And a to a very large extent, the violated are willfully doing it to themselves. I really wonder, do most people have no idea what data mining is and what it can do given a substantial amount of personal information? Maybe the boy-wonder CEOs of Google and Facebook are right, and most people just don’t care.

From the link:

In this cell-phone-centric age, your friends might learn that you’ve gone to see a movie when you arrive at the theater and check in on Facebook or Foursquare. But that’s probably too late to function as anything more than a boast. An iPhone app called Blaze Mobile Wallet tells them the instant you book a ticket in advance, giving them time to respond and meet you there.

When users pay for a reservation using the app, which debits funds from a prepaid account, a Facebook post lets friends know all the details: film, theater, and show time. “It makes it more likely that friends will join them at the movie,” says Michelle Fisher, CEO of Blaze Mobile, one of a slew of companies exploring how cell phones that act as wallets can encourage new connections between friends—and between businesses and their customers.

 

September 8, 2010

Department of Homeland Security sued for illegal search and seizure

This is a long overdue lawsuit. Unbeknownst to many United States citizens, if you leave the country with an electronic device — like a smartphone, cell phone, camera, or more likely, a laptop — your electronics can be seized, searched and contents archived by the Department of Homeland Security with no due process other than a field officer deciding you might be a threat to the nation.

I’ve blogged about this very topic a couple of times — first back in June 2008 and again in September 2009 — and my sense of outrage at the privacy and civil liberties violation hasn’t abated. Sure we need to protect the nation and monitor who comes and goes into and out of the country, but with the due process that represents the best of America. In the post-9/11 world, policies like this are slowly turning the United States into a police state that would be unrecognizable to the Founding Fathers.

From the first link:

Civil liberties groups sued the Department of Homeland Security on Tuesday, alleging that the government should not be able to search, copy or keep the data on electronic devices carried by people crossing the border without a reasonable suspicion of wrongdoing.

The American Civil Liberties Union, the New York Civil Liberties Union and the National Association of Criminal Defense Layers (NACDL) announced on Tuesday that they filed a lawsuit against the policy, arguing that Americans “do not surrender their privacy and free speech rights when they travel abroad.”

DHS policy says that electronic devices such as laptops, cameras and cell phones can be searched as a matter of course, and that the border agents can copy the contents of the devices in order to continue searching them once the traveler has been allowed to enter the U.S. — even if the traveler is not suspected of any wrongdoing. Information obtained by the ACLU indicated that over 6,600 travelers — nearly half of whom are U.S. citizens — had their electronic devices searched at the border between Oct. 1, 2008 and June 2, 2010.

Update 9/10/10 — In the meantime, here’s a CIO.com article on getting your data across the border while avoiding the invasive scrutiny of the DHS.

July 6, 2010

Social media, mobile devices and GPS

Filed under: et.al., Media, Technology — Tags: , , , , , — David Kirkpatrick @ 3:44 pm

A pretty nasty privacy combination.

Sure many people willingly broadcast their whereabouts at all times via all sorts of social media, but I’m betting most people really don’t want their location tracked at all times. This is where the privacy issue comes into play and why the linked story should give everyone more than a little pause — even those who are giving the milk away for free so to speak.

From the link:

A study out this week from Worcester Polytechnic Institute (WPI) shows that mobile social networks are giving data about users’ physical locations to tracking sites and other social networking services. Researchers reported that all 20 sites that were studied leaked some kind of private information to third-party tracking sites.

“This initial look at mobile online social networks raises some serious concerns, but there is more work to be done,” said Craig Wills, professor of computer science at WPI and co-author of the study. “The fact that third-party sites now seem to have the capacity to build a comprehensive and dynamic portrait of mobile online social network users argues for a comprehensive way to capture the entire gamut of privacy controls into a single, unified, simple, easy-to-understand framework, so that users can make informed choices about their online privacy and feel confident that they are sharing their personal, private information only with those they choose to share it with.”

Think this issue is something of a nonstarter? Chew on this for a little while:

he researchers found that all 20 sites leaked some kind of private information to third-party tracking sites. In many cases, the data given out contained the user’s unique social networking identifier, which could allow third-party sites to connect the records they keeps of users’ browsing behavior with the their profiles on the social networking sites, the study said.

Mobile social networks track users’ geographic location by tapping into the data on the mobile devices.

The study noted that only two social networks directly gave location information to the third-party tracking sites, but several use a third-party map service to show the user’s location on a map. The study also reported that six different sites transmit a unique identifier to the user’s mobile phone, enabling third-party sites to continue to track a user’s location even as the phone is used for other applications.

July 1, 2010

One more privacy issue to ponder

Filed under: Science — Tags: , , , , — David Kirkpatrick @ 2:13 pm

What you drink could be used to trace your movements.

From the link:

The bottled water, soda pop, or micro brew-beer that you drank in Pittsburgh, Dallas, Denver or 30 other American cities contains a natural chemical imprint related to geographic location. When you consume these beverage you may leave a chemical imprint in your hair that could be used to track your travels over time, a new study suggests. The findings, believed to be the first concerted effort to describe the use of beverages as a potential tool to investigate the geographic location of people, appears in ACS’ Journal of Agricultural and Food Chemistry.

And:

A person who drinks a beer or soda in Denver, Des Moines, or Dallas, for instance, consumes a different isotope signature than a person in Las Cruces, Las Vegas, or Laramie. The finding may help trace the origin of drinks or help criminal investigators identify the geographic travels of crime suspects and other individuals through analysis of hair strands, the study suggests.

June 2, 2010

Searching for “mal-intent”

I have to admit, stories like this really set off klaxon alarm bells in terms of civil liberties and what looks a lot like a slippery slope of pseudoscience. Particularly when talking about trained security teams pulling 152,000 people out of airport lines over the last few years leading to over 1000 arrests. Arrests for outstanding warrants and immigration violations — no terrorism arrests, even though screeners did miss at least 16 actual terrorists.

I’m guessing if you randomly pulled that many travelers you’d easily get that many hits for run-of-the-mill violations. You’d probably even randomly catch a few terrorists. I think it’s safe to say I have very serious reservations of the efficacy of screening for mal-intent, and even greater reservations on how that screening weakens civil liberties and personal privacy.

From the link:

If Bob Burns is correct, terrorists may betray themselves someday by jiggling on a Nintendo Wii balance board, blinking too fast, curling a lip like Elvis — or doing nothing at all. Burns and his team of scientists are researching whether video game boards, biometric sensors and other high-tech devices can be used to detect distinct nonverbal cues from people who harbor “mal-intent,” or malicious intent.

“We’re looking pre-event,” said Burns, the No. 2 at the Homeland Security Advanced Research Project Agency, a counterpart of the fabled Pentagon agency that developed Stealth aircraft and the Internet.

“We’re trying to detect a crime before it has occurred.”

OK, roll the sci-fi thriller “Minority Report,” in which Tom Cruise and other “pre-crime” cops use psychic visions to arrest murderers before they kill. Or maybe “The Men Who Stare at Goats,” a George Clooney comedy inspired by real military experiments with supposedly psychic soldiers.

The work on mal-intent, which has cost $20 million so far, represents the future in screening: trying to find the bomber, not just the bomb.

“Sometimes people look at our projects and say, ‘This is crazy,'” conceded Burns, a former submarine weapons officer.

April 21, 2010

The downside of Google’s Chrome OS?

Filed under: Business, Technology — Tags: , , , , , — David Kirkpatrick @ 12:04 pm

Privacy issues. I consider privacy the big bugaboo of cloud computing in general, and the simple nature of Google’s Chrome operating system and the company’s penchant for (really its corporate raison d’etre) data mining the potential for serious abuse of user data is there.

I don’t have a problem with all data mining and I certainly understand what Google does and why. I absolutely love the Chrome browser and recommend it for everyone, and I use Gmail for a number of secondary email accounts, but I’m not even close to ready to trusting all my data to a cloud controlled by Google, or any other entity for that matter.

From the link:

The naming scheme is no accident. It reflects Google’s ambition to create an operating system that is all but indistinguishable from the browser. Gone will be the normal files, directories, and applications. Instead, Chrome OS will put Google’s cloud computing infrastructure–services and applications delivered over the Internet from its vast array of servers–at the heart of practically everything you do. Within a few years, Chrome OS could become the planet’s simplest, fastest, and safest environment for personal computing. But there’s a catch: it will also make Google the gatekeeper of your personal information. It could let Google delve further into your data to make its online advertising business more profitable than ever.

There is one upside — your “backup” data is located in your computer, so when it craps out the real data still resides on Google’s servers and isn’t lost. That alone might make the Chrome OS attractive to some people.

Also from the link:

Google’s engineers have explained that Chrome OS will use your computer’s hard drive as a cache, making copies of whatever you’re working on so that you won’t burn up your netbook’s wireless data plan (or your batteries). All that personal data will be encrypted, so you won’t need to worry if you happen to lose the machine. And if for some reason your computer gets corrupted–perhaps by a virus–you’ll be able to wipe it and start over without losing any work at all, since your data is stored in the cloud.

February 18, 2010

One major advantage with cloud computing — experimentation

Filed under: Business, Technology — Tags: , , , , — David Kirkpatrick @ 2:22 pm

This link goes an article titled, “Cloud Computing’s Three Revolutions: Part 2,” and the whole piece is worth checking out (along with the first part) if you’re interesting in cloud computing. I have some serious concerns about cloud computing, particularly with privacy and the current state of legal precedent regarding the public/private status of data in the cloud (hint: right now people computing in the cloud are “not truly acting in private space at all” per U.S. District Court Judge Michael Mosman.)

Those concerns aside, this point from the first link details one place where a secure, private cloud can really help push innovation by removing a traditional roadblock to IT experimentation:

Low Cost Fosters Experimentation

An aspect of cloud computing that isn’t emphasized enough in most discussions about it is the fact that it is ideally suited for application experimentation. Just as the high-cost, capital-intensive IT of the past caused investment to focus on the safest, lowest-risk applications, the low-cost, capital-lite IT of cloud computing will motivate business organizations to experiment with new business initiatives. Business initiatives that, in the past, couldn’t have gotten enough support to justify sharing precious capital to take a flyer on them, will find a far friendlier environment in cloud computing.

A good example of this is the NASDAQ Market Replay application that leverages Amazon Web Services. Trying to buy enough equipment for this application would have been prohibitive, even though the application’s value seemed intuitive. Using AWS, the application could be developed for much less, which made launching it much lower risk. New applications can be tried out at a cost of hundreds or thousands of dollars, rather than the hundreds of thousands of dollars required heretofore. If you are a line of business executive with innovative ideas, cloud computing is going to make your prospects much brighter.

In the “low cost fosters experimentation” perspective, cloud computing is much like open source. In his book Here Comes Everybody, Clay Shirky noted that open source’s low cost encourages experimentation and making mistakes. When the stakes are low, trials that don’t work out are much more acceptable—and increasing the numbers of trials increases the odds for success.

February 11, 2010

Big Brother …

… may well be a little electronic device in your pocket. It shouldn’t be shocking, but I never cease to be amazed at the unconstitutional power grabs the Federal government continues to attempt and take in terms of civil liberties and personal privacy. New technology is wonderful, but it is very important to track, and reign in, the long, sneaky arm of the Fed.

From the link:

If you own a cell phone, you should care about the outcome of a case scheduled to be argued in federal appeals court in Philadelphia tomorrow. It could well decide whether the government can use your cell phone to track you — even if it hasn’t shown probable cause to believe it will turn up evidence of a crime.

The American Civil Liberties Union, the Electronic Frontier Foundation and the Center for Democracy and Technology will ask the court to require that the government at least show probable cause before it can track your whereabouts.

And:

There’s no question that cell phones and cell-phone records can be useful for police officers who need to track the movements of those they believe to be breaking the law. And it is important for law enforcement agents to have the tools they need to stop crimes. However, it is just as important to make sure such tools are used responsibly, in a manner that safeguards our personal privacy.

But documents obtained by the ACLU and the EFF as part of a Freedom of Information Act lawsuit show that the government takes advantage of this technology to track cell phones as extensively as possible — often without first obtaining warrants — except in states where courts step in to establish boundaries.

And here is the absolutely ridiculous government argument for retaining this right to breach your privacy:

The government has argued that “one who does not wish to disclose his movements to the government need not use a cellular telephone.” This is a startling and dismaying statement coming from the United States. The government is supposed to care about people’s privacy. It should not be forcing the nation’s 277 million cell-phone subscribers to choose between risking being tracked and going without an essential communications tool.

What’s at stake in the case is not whether it’s OK for the government to track the locations of cell phones; we agree that cell-phone tracking is lawful and appropriate in certain situations. The question is whether the government should first have to show that it has good reason to think such tracking will turn up evidence of a crime.

Update 2/13/10 — the above link and quotes are from the ACLU. Here’s the Cato Institute’s take on this issue. As with many, many public policy issues, Cato and the ACLU are in total agreement here.

January 29, 2010

Cloud computing and privacy

The early results are not too promising.

From the link:

Loosely defined, cloud computing involves programs or services that run on Internet servers. Despite the buzz surrounding it, the idea isn’t new–think Web mail. But huge benefits, such as being able to gain access to your data from anywhere and not having to worry about backups, have led more people to leap to the Internet to do everything from writing documents and watching movies to managing their businesses. Unfortunately, privacy is often still stuck at home.

Behind the Times

Archaic laws that focus on where your information is, rather than what it is, are part of the problem. But a disturbing lack of respect for essential privacy among industry heavyweights who should know better is also evident.

Consider comments that Google CEO Eric Schmidt made during a recent CNBC interview. In response to the question, “People are treating Google (GOOG) like their most trusted friend. Should they be?” Schmidt responded, “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.

This kind of “only the guilty have anything to hide” mindset is a privacy killer, and rests on the completely flawed no tion that people want privacy only when they’re doing something wrong. There’s nothing wrong with my taking a shower or searching for information about a medical condition. But it’s still private.

It’s possible Schmidt spoke without thinking–Google is mum for now on the prospect of issuing a clarification of any kind. But meanwhile, privacy is taking a pounding in other areas, as well.

Last summer, a U.S. District Court judge in Oregon ruled that government law enforcement agencies need not provide you with a copy of a warrant they have obtained in order to read all of your e-mail stored on an Internet server–where most of us keep e-mail these days. It’s sufficient to give your Internet service provider notice, according to Judge Michael Mosman.

In his opinion and order, Mosman noted the Fourth Amendment’s “strong privacy protection for homes and the items within them in the physical world.” Still, he said, “When a person uses the Internet, however, the user’s actions are no longer in his or her physical home; in fact he or she is not truly acting in private space at all.”

I bolded that last bit of text, and that may be the most important statement regarding cloud computing and privacy — when you are operating in the cloud, United States Fourth Amendment law as it is currently read does not protect your privacy.

Let me restate that — any actions you take in any aspect of cloud computing conceivably are not covered by your Fourth Amendment right to privacy. This fact should give anyone who is considering the cloud for anything beyond trivial usage a great deal of pause.

January 12, 2010

More on Google and China

Filed under: Business, Media, Politics, Technology — Tags: , , , , , , — David Kirkpatrick @ 6:10 pm

Who’d a thunk I’d be doing two posts on Google and China today? First Google apologizes for a copyright breach issue in China (?!), and now the Mountain View company is threatening to pull out of China because of claims the Asian behemoth breached Google email accounts of human rights activists. Whatever else is going on here, I don’t see any changes to China’s overarching attitudes toward individual privacy or intellectual property — well, at least the intellectual property of non-Chinese citizens.

I understand Google wanting to do business with such a massive market, but it made serious concessions regarding censorship when it went into China so it can’t be all that shocked when China decides to just go out and do whatever it wants.

(Quick joke for Robot Chicken fans — Darth Vader: I’ve changed the terms of our deal. Pray I don’t change it further. Lando: Man, this deal keeps getting worse all the time.)

From the second link:

The company disclosed in a blog post that it had detected a “highly sophisticated and targeted attack on our corporate infrastructure originating from China.” Further investigation revealed that “a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists,” Google’s post said.

Google did not specifically accuse the Chinese government. But the company added that it is “no longer willing to continue censoring our results” on its Chinese search engine, as the government requires. Google says the decision could force it to shut down its Chinese site and its offices in the country.

October 23, 2009

Cato v. Heritage

On the topic of the Patriot Act two right leaning think tanks pair off. This she says/he says is a nice, succinct illustration of one key difference between the right-wing hawkishness/pro-military industrial complex and libertarian schools of thought.

In a nutshell, the Heritage Foundation is all for the Patriot Act and its civil liberties trampling totality. The Cato Institute is for protecting the hard-won freedoms of American citizens while continuing to work at keeping the U.S. safe from terrorism.

The point further boils down to: do you trust handing the government total control over your civil liberties and right to privacy, or not. Personally I’m 100 percent behind the Cato approach, and honestly the Heritage position strikes me as profoundly un-American. The founding fathers would certainly not recognize the Heritage stance as having anything to do with their noble ideals.

October 20, 2009

Why FISA never needed reform in the first place

I’ve already done a post today on this excellent article by Julian Sanchez on the Obama administration and how it’s retaining some of the Bush administration’s overreaching tools for use in the “global war on terror.” So far the Obama administration has been a disappointment in not rolling back the beating U.S. civil liberties took in the Bush administration’s  panicked response to 9/11.

And as it turns out — and that I’ve argued repeatedly — the tools to fight international terrorists were firmly in place before 9/11, they were just implemented with Keystone Kop level competence.

From the second link:

The FISA Amendments Act is the successor to an even broader bill called the Protect America Act, which similarly gave the attorney general and director of national intelligence extraordinary power to authorize sweeping interception of Americans’ international communications. It was hastily passed in 2007 amid claims that the secret FISA Court had issued a ruling that prevented investigators from intercepting wholly foreign communications that traveled across US wires. Former Director of National Intelligence Michael McConnell even claimed that FISA’s restrictions had rendered it impossible to immediately eavesdrop on Iraqi insurgents who had captured several American soldiers. The New York Post quoted tearful parents of the captured men expressing their horror at the situation and a senior Congressional staffer who alleged that “the intelligence community was forced to abandon our soldiers because of the law.”

Yet as a Justice Department official later admitted, the FISA law clearly placed no such broad restriction on foreign wire communications passing through the United States; rather, there had been a far more narrow problem involving e-mails for which the recipient’s location could not be determined. And as James Bamford explained in his essential 2008 book, The Shadow Factory, the delay in getting wiretaps running on the suspected kidnappers was the result of a series of missteps at the Justice Department, not the limits of FISA — no surprise, since even when FISA does require a warrant, surveillance may begin immediately in emergencies if a warrant is sought later. (The suspected kidnappers, by the way, turned out not to have been the actual kidnappers.) Yet on the basis of such claims, a panicked Congress signed off on almost limitless authority to vacuum up international communications — authority that we already know has resulted in systematic “overcollection” of purely domestic conversations, and even resulted in the interception of former President Bill Clinton’s e-mails.

October 9, 2009

Cloud computing in D.C.

Filed under: Politics, Technology — Tags: , , , , — David Kirkpatrick @ 2:40 pm

CIO.com carried two stories today on cloud computing in Washington. The first covers a cloud computing conference in D.C. going on this week, and the second covers an endorsement of cloud computing by the CIA for internal use.

From the second link:

One of the U.S. government’s strongest advocates of cloud computing is also one of its most secretive operations: the Central Intelligence Agency. But the CIA has adopted cloud computing in a big way, and the agency believes that the cloud approach makes IT environments more flexible and secure.

Jill Tummler Singer, the CIA’s deputy CIO, says that she sees enormous benefits to a cloud approach. And while the CIA has been moving steadily to build a cloud-friendly infrastructure — it has adopted virtualization, among other things — cloud computing is still a relatively new idea among federal agencies.

“Cloud computing as a term really didn’t hit our vocabulary until a year ago,” said Singer.

But now that the CIA is building an internal cloud, Singer sees numerous benefits. For example, a cloud approach could bolster security , in part, because it entails the use of a standards-based environment that reduces complexity and allows faster deployment of patches.

“By keeping the cloud inside your firewalls, you can focus your strongest intrusion-detection and -prevention sensors on your perimeter, thus gaining significant advantage over the most common attack vector, the Internet,” said Singer.

October 2, 2009

Sunset provisions in the PATRIOT Act …

… offer the Obama administration a great opportunity to overturn a set of horrible, privacy-violating and, most likely, un-Constitutional policies. And get back some of that civil liberties mojo many people voted for when they pulled the lever for Obama.

From the Cato Institute (the first) link:

Civil liberties advocates have hastily revived a campaign to support commonsense limits on government surveillance, but with health-care reform dominating headlines and anxieties about the Bush administration’s excesses fading like the memory of a bad dream, precious little attention is being paid to the PATRIOT renewal debate. But if the Senate declines to press for real reform this week, the issue is unlikely to be taken up again for at least another four years — during which those new powers will only become more entrenched, more heavily relied upon, and more difficult to roll back. It’s no exaggeration to say that today may well be the most important day of the Obama administration for privacy and civil liberties — or the biggest squandered opportunity.

Surveillance and wireless data networks

Filed under: Technology — Tags: , , , , , — David Kirkpatrick @ 12:04 pm

This is a pretty ingenious use of wireless data networks. And a pretty cheap method of imaging into rooms and buildings.

From the link:

Researchers at the University of Utah say that the way radio signals vary in a wireless network can reveal the movement of people behind closed doors. Joey Wilson and Neal Patwari have developed a technique called variance-based radio tomographic imaging that processes the signals to reveal signs of movement. They’ve even tested the idea with a 34-node wireless network using the IEEE 802.15.4 wireless protocol, the protocol for personal area networks employed by home automation services such as ZigBee.

The basic idea is straightforward. The signal strength at any point in a network is the sum of all the paths the radio waves can take to get to the receiver. Any change in the volume of space through which the signals pass, for example caused by the movement of a person, makes the signal strength vary. So by “interrogating” this volume of space with many signals, picked up by multiple receivers, it is possible to build up a picture of the movement within it.

The physics arXiv blog post did offer a bit of a caveat:

How might such cheap and easy-to-configure monitoring networks be used if they become widely available? What’s to stop next door’s teenage brats from monitoring your every move, or house thieves choosing their targets on the basis that nobody is inside?

July 24, 2009

The NSA wiretapped US citizens …

… and the mainstream media brushed the story under the proverbial rug. Just imagine, the MSM totally failed at doing its job. Er, scratch that bit of sarcasm. The MSM has been so full of fail for so long it’s far beyond parody.

From the link:

The cliché doesn’t seem far off the mark after reading Mark Klein’s new book, “Wiring up the Big Brother Machine … and Fighting It.” It’s an account of his experiences as the whistleblower who exposed a secret room at a Folsom Street facility in San Francisco that was apparently used to monitor the Internet communications of ordinary Americans.

Klein, 64, was a retired AT&T communications technician in December 2005, when he read the New York Times story that blew the lid off the Bush administration’s warrantless wiretapping program. Secretly authorized in 2002, the program lets the U.S. National Security Agency (NSA) monitor telephone conversations and e-mail messages of people inside the U.S. in order to identify suspected terrorists. Klein knew right away that he had proof — documents from his time at AT&T — that could provide a snapshot of how the program was siphoning data off of the AT&T network in San Francisco.

Click here to find out more!Amazingly, however, nobody wanted to hear his story. In his book he talks about meetings with reporters and privacy groups that went nowhere until a fateful January 20, 2006, meeting with Kevin Bankston of the Electronic Frontier Foundation (EFF). Bankston was preparing a lawsuit that he hoped would put a stop to the wiretap program, and Klein was just the kind of witness the EFF was looking for.

June 1, 2009

Massive privacy violation in Colorado

Filed under: Politics — Tags: , , , , , — David Kirkpatrick @ 3:46 pm

Astounding investigative overreach in Colorado while looking for illegal immigrants. Glad to see the judges in the case see things the same way. Fourth Amendment anyone?

From the link:

Immigrant advocates say they’ve seen nothing like it before or since: A prosecutor looking for illegal immigrants seized thousands of confidential tax records from an income tax preparer popular with Hispanics in this northern Colorado city.The October seizures led to identity theft and criminal impersonation charges against more than 70 people, and prosecutors allege that as many as 1,300 suspected illegal immigrants were working using false or stolen Social Security numbers.

But the American Civil Liberties Union said the documents of as many as 4,900 people were seized, many of them legal residents, and that the probe was the “equivalent of a house-by-house search of innocent homeowners in order to find a suspect believed to be somewhere in the neighborhood.”

Two judges have agreed, ruling that Weld County District Attorney Ken Buck had no probable cause to seize the records. Buck is appealing, however, and a ruling in his favor could open up a new avenue for prosecuting illegal immigrants.

March 20, 2009

LinkedIn privacy tutorial

Filed under: Business, Technology — Tags: , , , , — David Kirkpatrick @ 3:54 pm

If you use LinkedIn, this is a must read.

You can find me on LinkedIn at http://www.linkedin.com/in/davidkonline

From the link:

Since LinkedIn doesn’t require you to share the same types of personal information as you do on Facebook, the service’s privacy settings appear to be much more straightforward than its less business-oriented competitor. But if you leave the default settings in place, you might be surprised to know what information you make public on LinkedIn.

July 25, 2008

All credit card transactions to be reported to the IRS

Filed under: Politics — Tags: , , , , , — David Kirkpatrick @ 9:47 pm

Here’s a disturbing bit of privacy loss that’s not all that publicized. All links are from the blog at RonPaul2008.com, now the site for Paul’s “Campaign for Liberty.”

First the humdrum bit of congressional news:

Yesterday Congress passed a housing bailout bill by a vote of 272 to 152. Here is a typical MSM story about the bill from the LA Times that lauds the importance of these “sweeping measures” that will “stave off foreclosure for 400,000 or more homeowners,” and allow the Treasury to “bolster confidence in Fannie and Freddie” by allowing the government to “temporarily increase its lending” and “buy their stock.” Couched in these terms, it probably sounds good to most Americans.

But there is much that the typical MSM dispatch does not mention (for example, where will the money come from?). For the rest of the story, take 7 minutes to watch Dr. Paul’s video commentary on the bill, which made the front page of Digg in a screaming three hours.

And then comes this odd, and somewhat frightening little tidbit some tax-happy elected official threw in:

  • Finally, buried deep within the bill, and not mentioned in any MSM source that I am aware of, is the provision that every credit card transaction will now be reported to the IRS. How this fits in to the housing crisis is anyone’s guess.
  • Yowzaa. More government creepage. The system really does need blowing up coupled with an effort toward building a new, smaller, better and smarter government — by the people, for the people.

    June 25, 2008

    IDs, airports and “security”

    Filed under: Politics — Tags: , , , , , , — David Kirkpatrick @ 11:47 am

    Jim Harper at Cato-at-Liberty has a great post pointing out the essential truth behind the policy preventing anyone from flying unless an ID is presented.

    The first graf:

    We’re now learning the meaning of a new policy that Americans can’t “willfully” refuse to show ID at airports. The Consumerist has a write-upof one man’s experience with IDless travel. It turns out they do a background check on you using, among other things, your political affiliation.

    He goes on to point out the TSA’s “system” is easily subverted by anyone with no history of breaking the law. It does provide a burden on the overwhelming majority of travelers who just want to get from point A to point B. Oh, and it has another effect as well. This time on the civil liberties and right to privacy of the traveler. Two US Constitution granted ideals held near and dear by most Americans.

    Harper’s conclusion:

    Identity checks at airports require law-abiding American citizens to give up their privacy, including their political affiliations, with essentially no security benefit.

    February 24, 2008

    Would you put your privacy on the open market?

    Filed under: Business, et.al., Technology — Tags: , , , , , — David Kirkpatrick @ 11:31 pm

    Hear, hear. As a libertarian, I love the idea of being able to turn your personal data into a commodity.

    Money is being made on our personal information. The creator of that data ought to be recognized as the “owner” and compensated in any transaction involving the information. And the “owner” should be able to keep that info off the market if so desired.

    Here’s this entire Daily Dish post:

    The Market for Privacy

    24 Feb 2008 12:29 am

    <!– –>[Jim Manzi]

    MIT’s flagship magazine, Technology Review, produces a an annual list of the year’s 10 most exciting technologies (as with any of these lists, of course it is really more like “the 10 most exciting technologies developed by researchers who are one degree of separation from the editors, are quotable and are, ideally, photogenic”).  Nonetheless, one striking aspect of this year’s list is that two ofthe ten technologies are algorithmic methods of using the large datasets created by digital transaction records to generate economically valuable insights.

    The erosion of historical notions of privacy at the hands of commerce is almost inexorable, ultimately because of Moore’s Law.  You don’t need eavesdropping or other surveillance techniques when the infrastructure by which you communicate, travel, and buy things generates data as a by-product of each of these activities.  This, much more than government spies, is the primary driver of lack of privacy.

    It seems to me that the logical method to protect such information is to codify and create a tangible property right in it.  When the choices are (1) opt out of modern life, or (2) implicitly surrender all of this info, pretty much everybody picks door #2.  But what if I had the practical ability to charge commercial entities for access to or use of information of this sort?  It would, first, go from a free good to a scarcer resource, and second, I could protect those parts of my transaction history that I feel to be most sensitive.  In effect, we need a functioning market into which I can sell my transaction history.

    February 16, 2008

    NY Times story on wiretap overreach

    Filed under: Politics, Technology — Tags: , , , — David Kirkpatrick @ 5:40 pm

    This NY Times story is a little reminder why the privacy and government surveillance debates begun after 9/11, and continue today, are important.

    From the linked article:

    Bureau officials noticed a “surge” in the e-mail activity they were monitoring and realized that the provider had mistakenly set its filtering equipment to trap far more data than a judge had actually authorized.

    The episode is an unusual example of what has become a regular if little-noticed occurrence, as American officials have expanded their technological tools: government officials, or the private companies they rely on for surveillance operations, sometimes foul up their instructions about what they can and cannot collect.

    The problem has received no discussion as part of the fierce debate in Congress about whether to expand the government’s wiretapping authorities and give legal immunity to private telecommunications companies that have helped in those operations.

    But an intelligence official, who spoke on condition of anonymity because surveillance operations are classified, said: “It’s inevitable that these things will happen. It’s not weekly, but it’s common.”

    As a “little l” libertarian the concepts of personal privacy are very important to me, especially vis-a-vis government oversight. I don’t have anything to hide, but at the same time I don’t want a government agent peeking into my windows a few times a day.

    Giving any government sweeping surveillance authorization is no different than allowing the government to force you to keep all your drapes and blinds cracked open a bit, with a light on in each room — or better yet just a system of cameras throughout your home, office and vehicle — so they can keep tabs on your activities. Just to ensure you have nothing to hide.

    For all the Bush-43 authoritarians who say the government needs this oversight over all Americans to fight a small handful of fanatics, how do you feel about a Hillary presidency with the level of executive branch power, secrecy and lack of oversight this Bush administration set into motion and continues to fight for? I know that idea scares me more than a bit.