0 оценок0% нашли этот документ полезным (0 голосов)
52 просмотров2 страницы
The U.S. government is building a $2-billion facility in Utah to spy on civilian communications
In the information age, what you share online may end up in unexpected places because of data miners and privacy and security flaws
On the bright side, privacy-protection efforts are underway and new protection tools are emerging
Full text available to subscribers only. To subscribe, please fill out the subscription form and send to report@censeisolutions.com
LIKE us at Facebook at: http://www.facebook.com/pages/The-CenSEI-Report/110668425707361
Also add our Facebook account: http://www.facebook.com/thecenseireport
The U.S. government is building a $2-billion facility in Utah to spy on civilian communications
In the information age, what you share online may end up in unexpected places because of data miners and privacy and security flaws
On the bright side, privacy-protection efforts are underway and new protection tools are emerging
Full text available to subscribers only. To subscribe, please fill out the subscription form and send to report@censeisolutions.com
LIKE us at Facebook at: http://www.facebook.com/pages/The-CenSEI-Report/110668425707361
Also add our Facebook account: http://www.facebook.com/thecenseireport
Авторское право:
Attribution Non-Commercial (BY-NC)
Доступные форматы
Скачайте в формате PDF, TXT или читайте онлайн в Scribd
The U.S. government is building a $2-billion facility in Utah to spy on civilian communications
In the information age, what you share online may end up in unexpected places because of data miners and privacy and security flaws
On the bright side, privacy-protection efforts are underway and new protection tools are emerging
Full text available to subscribers only. To subscribe, please fill out the subscription form and send to report@censeisolutions.com
LIKE us at Facebook at: http://www.facebook.com/pages/The-CenSEI-Report/110668425707361
Also add our Facebook account: http://www.facebook.com/thecenseireport
Авторское право:
Attribution Non-Commercial (BY-NC)
Доступные форматы
Скачайте в формате PDF, TXT или читайте онлайн в Scribd
STRATEGY POINTS The U.S. government is building a $2-billion facility in Utah to spy on civilian communications In the information age, what you share online may end up in unexpected places because of data miners and privacy and security aws On the bright side, privacy-protection efforts are underway and new protection tools are emerging S o youve booked the air tickets online, e-mailed the itinerary to your travel buddies, and posted on Facebook a photo of that quaint hotel you will call home for the weekend. Congratulations! It looks like youre all set for your summer getaway. L uIso Iooks IIke you`ve exposed yourseII and your friends to serious security risks. With personal data as the currency of the digital economy, and with the posting of information online becoming a normal part of everyday life, what you share with contacts on the Web, you might as well have shared with the rest of the world. Uncle Sam wants your data. Citizens of the U.S. should be doubly nervous. Web magazine Tecca reports the four ways the federal government is spying on its citizens, and this includes the construction of a $2-billion data center in Utah, to be completed in September 2013, to spy on civilian communications encompassing mobile, e-mails, and credit- card transactions. The report also warns that the U.S. governmenL muInLuIns deLuIIed hIes on numerous public, semi-public, and prIvuLe hgures, und empIoys soILwure und Iurdwure Lo rIe LIrougI InIormuLIon publicly available on social media sites, and that the House of Representatives is considering a bill, entitled Protecting Children from Internet Pornographers Act, which would require commercial Internet service providers to create logs of customers names, IP addresses, and bank information. Grabby corporations. Of course, no discussion of data mining is complete without mention of the two titans of the technological world: Google and Facebook. Both are known to collect user data in order to provide a more intuitive and personuIIzed onIIne experIence (reud: smother you with targeted ads). But just how much do they know? In February, Jonathan Mayer, a graduate student at Stanford University, blogged that he had discovered Google bypassing the privacy settings of Apples web browser, Safari. The three other companies that he found to be doing this were advertising companies Vibrant PREVIOUS PAGE NEXT PAGE cenSEI : . + 8KVUXZ CONTENTS BUSINESS NATION WORLD TECHNOLOGY Media, Media Innovation Group, and RollPoint. By deIuuIL, SuIurI Is conhgured Lo bIock third-party cookies. These four, however, placed traceable cookies by using a special computer code, which allowed them to spy on peoples Internet browsing habits. Google denied collecting personal information through the advertising cookIes, und expIuIned LIuL LIe prIvucy- setting circumvention was accidental. The code was disabled after Google was contacted by The Wall Street Journal, which has published a report on the matter. In its research into Facebooks privacy munugemenL, non-prohL consumer- protection organization Consumer Reports cites two Facebook users whose stories reveal that the social network maintains a massive repository of highly sensitive information about their members. TIe hrsL, Mux ScIrems, Is u zq-yeur-oId law student from Austria who was able Lo obLuIn u deLuIIed copy oI IIs prohIe information 1,222 pages spanning three years of Facebook activity from ucebook`s oIhce In DubIIn. ScIrems wus surprised to discover deleted messages, wall posts, e-mail addresses, and friends sLIII vIsIbIe In IIs hIe. AIso IncIuded In the document were sensitive data such as last known geographic location, including IongILude und IuLILude, und LIe exucL duLes and times he logged in. The Boston police investigation into the death of the second user mentioned in the report, Philip Markoff, illustrates how Facebook also knows so much about their American users. In 2010, Markoff committed suicide in jail while awaiting his trial for the murder of masseuse and former call girl Julissa Brisman, dubbed by the media as the Craigslist Killer case. TIe hIe ucebook reIeused Lo LIe poIIce showed Markoffs wall posts, photos, log-in dates and times, IP addresses, and list of friends. According to the same report, you dont even have to click on the Like button in order to be tracked: Facebook PREVIOUS PAGE NEXT PAGE