Show sidebar

Tag Archive: Privacy

Questions to Ask As DHS Proposes Border Drones With Facial Recognition

 

In what could prove to be a Frankenstein combination of invasive technologies, the Department of Homeland Security is considering a project to arm Customs and Border Patrol (CBP) with drones using facial recognition scanning at the border. Specifically, the proposal states that “DHS is interested in sUAS [small drone] sensor technology with the following attributes ….…   continue »

Censorship at the Border Threatens Free Speech Everywhere

Defending one’s political and religious beliefs to government officials is an obligation we associate with life in authoritarian regimes, not open societies.  It’s becoming common, though, for foreign citizens who visit the United States—and even for Americans returning home after travel abroad—to be interrogated about their beliefs by customs and border personnel.…   continue »

To Senate Committee on Homeland Security: Five Questions for Secretary Kelly About Passwords Demands at the Border

 

On January 31, an NASA engineer and U.S. citizen, Sidd Bikkannavar, was informed by federal border agents he hat he was required to turn over the password to his smartphone on his way into the country, that doing so was mandatory, and that if he failed to comply, the phone could be seized.  …   continue »

Reforming Surveillance In the Age of Donald Trump

An NSA site in Germany.

On Wednesday, the Republican chair of the House Intelligence Committee, Devin Nunes (R-CA), gave a press conference in which he reported that Trump transition team members’ communications were intercepted by US intelligence agencies through “incidental collection.” This follows on Nunes’ concerns, after Michael Flynn stepped down following intelligence reports that he had talked to the Russian ambassador.…   continue »

Encryption Backdoors, Vault 7, and the Jurassic Park Rule of Internet Security

Surely without a hint of irony, just a day after WikiLeaks dumped a vault-load of documents detailing the Central Intelligence Agency’s use of hacking tools and software exploits, FBI Director James Comey told an audience at a Boston College conference on cybersecurity that “[t]here is no such thing as absolute privacy in America.” Comey’s elevator pitch in support of his claim was that “there is no place outside of judicial reach,” citing the fact that even time-tested testimonial privileges of the spousal, clergy–penitent, and attorney–client sort can be pierced by judges in “appropriate” circumstances.…   continue »

Just Security Event: Surveillance and the Trump Administration

Join Just Security for a fireside chat on U.S. surveillance and a celebration of Jennifer Granick‘s new book, American Spies: Modern Surveillance, Why You Should Care, And What to Do About It. Opening remarks by Senator Ron Wyden, followed by a discussion between Granick and Pulitzer Prize-winning New York Times Washington Correspondent Charlie Savage on U.S.…   continue »

The Investigatory Powers Act: The Official Entrenchment of Far-Reaching Surveillance Powers

surveillance

What was formerly known as the Investigatory Powers Bill, referred to elsewhere as the “revised Snoopers’ Charter,” has received Royal Assent and, as of Nov. 29, is officially law in the UK. The Act (full text here) does introduce additional safeguards, as well as a new body of oversight and the involvement of judges in the authorization of surveillance warrants.  continue »

New UN Report Highlights Freedom of Expression Violations Across the Globe

UN Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, David Kaye, yesterday issued his fourth report, a comprehensive survey of global trends i n restrictions on freedom of expression. From Chinese cybersecurity legislation and the censorship of social media, to the detention of journalists covering the Black Lives Matter protests, Kaye’s 24-page study addresses an array of threats to this fundamental right, and it presents several recommendations for state action.…   continue »