Blog Posts Tagged with "Electronic Frontier Foundation"

7ddc1f3000a13e4dfec28074e9e7b658

Law Professors Cast Further Doubt on ACTA's Constitutionality

May 17, 2012 Added by:Electronic Frontier Foundation

At issue is whether the Office of the United States Trade Representative (USTR) had authority to enter into the controversial IP enforcement agreement on behalf of the United States when the Deputy U.S. Trade Ambassador signed ACTA in October 2011...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Growing Mistrust of India’s Biometric ID Scheme

May 14, 2012 Added by:Electronic Frontier Foundation

In India, a massive effort is underway to collect biometric identity information for each of the country’s 1.2 billion people. The incredible plan has stirred controversy in India and beyond, raising serious concerns about the security of individuals’ personal data...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Drones, Secret Surveillance, and Classifying the Wizard of Oz

May 10, 2012 Added by:Electronic Frontier Foundation

The FAA finally released the names of the government agencies which applied for and received authorization to fly drones in the US. Unfortunately, the list did not include what drones were authorized, what they were being used for, or what information they were collecting...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

DOJ: Any Protection is too Much for Cell Phone Tracking

May 08, 2012 Added by:Electronic Frontier Foundation

For years, we've been arguing that cell phone location data should only be accessible to law enforcement with a search warrant. After all, as web enabled smart phones become more prevalent, this location data reveals an incredibly revealing portrait of your every move...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Microsoft Continues Crusade Against Botnet Masters

May 04, 2012 Added by:Headlines

"Google began alerting the registrants of more than three dozen Gmail accounts that were the subject of Microsoft’s subpoenas... The email addresses were already named in Microsoft’s initial complaint posted at zeuslegalnotice.com, which listed nicknames and other information..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

FBI Overreaches with May First - Riseup Server Seizure

May 02, 2012 Added by:Electronic Frontier Foundation

Most troubling is the collateral damage. The search warrant authorized seizure of emails, communications, and files on the server, and records of IP addresses connected to the server. And the server was used by a wide range of people who had nothing to do with the bomb threats...

Comments  (5)

7ddc1f3000a13e4dfec28074e9e7b658

Will Industry Agree to a Meaningful Do Not Track?

April 27, 2012 Added by:Electronic Frontier Foundation

A coalition of companies say they "only" want to track opted-out users for security purposes, market research, testing and improving their various advertising and tracking products, auditing, copyright enforcement and other "legal compliance" purposes, not other purposes...

Comments  (3)

7ddc1f3000a13e4dfec28074e9e7b658

Court Orders Megaupload Parties to Come Up with a Plan

April 25, 2012 Added by:Electronic Frontier Foundation

The government, which had originally seized files and still apparently holds all of Megaupload's financial assets, had argued that it had no obligation to make sure the files of innocent Megaupload users were returned and, in fact, believed that they could be destroyed...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

EFF Opposes CISPA at Hackers and Founders Panel

April 23, 2012 Added by:Electronic Frontier Foundation

The fundamental problems with the bill are numerous. The language of the bill is too broad, and it's hard to know what information will actually be shared by private entities as a result of the bill, or what “cybersecurity systems” will do once they are enabled...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Warrantless Cell Phone Tracking, Drones, and FBI Surveillance

April 19, 2012 Added by:Electronic Frontier Foundation

Documents prove warrantless cell phone tracking “has become a powerful and widely used surveillance tool for local police officials, with hundreds of departments, large and small, often using it aggressively with little or no court oversight, documents show...

Comments  (1)

7ddc1f3000a13e4dfec28074e9e7b658

CISPA Legislation FAQs: The Disturbing Dangers

April 18, 2012 Added by:Electronic Frontier Foundation

EFF—along with a host of other civil liberties groups—are protesting the dangerous new cybersecurity bill known as CISPA that will be voted on in the House on April 23. Here is everything you need to know about the bill and why we are protesting...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Counter Terrorism Guidelines Give Authorities Vast Access to Info

April 17, 2012 Added by:Electronic Frontier Foundation

Attorney General Holder recently signed expansive guidelines for terrorism analysts, allowing the NCTC to mirror federal databases containing personal information and hold onto the it for an extended period even if the person is not suspected of involvement in terrorism...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Megaupload Goes to Court: A Primer

April 11, 2012 Added by:Electronic Frontier Foundation

Does the government have a responsibility to protect innocent third parties from collateral damage when it seizes their property in the course of prosecuting alleged copyright infringement? That is the question a federal district court will consider...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

UK Proposes Monitoring Every Email, Call, and Text Message

April 10, 2012 Added by:Electronic Frontier Foundation

Law enforcement would have access to IP addresses, email addresses, when you send an email, and corresponding data for phone calls and text messages. The government has claimed this is needed to fight terrorism, but it would be available to law enforcement for all purposes...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Campaign Targeting Activists Escalates with New Surveillance Malware

April 08, 2012 Added by:Electronic Frontier Foundation

The malware installs a remote administration tool called DarkComet RAT, which can capture webcam activity, disable the notification setting for certain antivirus programs, record key strokes, steal passwords, and more...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Court to Rehear Electronic Device Border Search Case

April 05, 2012 Added by:Electronic Frontier Foundation

When it comes to the government's ability to search your electronic devices, we've always maintained that the border is not an "anything goes" zone. Recently, the Ninth Circuit Court of Appeals agreed to rehear a case that gave the government carte blanche...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »