Daily updates on privacy stories in the news.

November 2005 Archives

« October 2005 | Main | December 2005 »

Canada Will Establish Do-Not-Call List

Canada's minister of industry said yesterday that the Canadian Parliament adopted amendments to the Telecommunications Act allowing for the establishment of a national do-not-call list. John Gustavson, president/CEO of the Canadian Marketing Association, said he doesn't expect the list to take effect until summer or fall 2007. The amendments give the Canadian Radio-television and Telecommunications Commission, which will regulate the list, power to levy fines against telemarketers who don't follow the rules.

Canada Passes Amendments to Establish DNC List, DMNews, November 29, 2005.

Defense Department Expands Surveillance Within United States

The Defense Department has expanded its programs aimed at gathering and analyzing intelligence within the United States, creating new agencies, adding personnel and seeking additional legal authority for domestic security activities in the post-9/11 world. The moves have taken place on several fronts. The White House is considering expanding the power of a little-known Pentagon agency called the Counterintelligence Field Activity, or CIFA, which was created three years ago. The proposal, made by a presidential commission, would transform CIFA from an office that coordinates Pentagon security efforts -- including protecting military facilities from attack -- to one that also has authority to investigate crimes within the United States such as treason, foreign or terrorist sabotage or even economic espionage.

Pentagon Expanding Its Domestic Surveillance Activity, Washington Post, November 27, 2005.

Army Plan for Database of Sexual Assaults Criticized Over Victim Privacy Issues

An Army plan to develop a database of sexual assaults is meeting resistance from lawmakers and members of an advocacy group, who say it could invade victims' privacy. In a letter to Army Secretary Francis J. Harvey, 15 members of Congress said the new system would deter victims of sexual assaults from reporting crimes and seeking treatment, and they asked him not to collect or store personal information or medical records in the database.

Army's Plan to Detail Sex Assaults Criticized, Associated Press, November 26, 2005.

Dutch Supreme Court Orders Lycos to Reveal Identity of Web Client

The Dutch Supreme Court on Friday ordered Internet company Lycos to reveal the identity of a client in a benchmark decision on privacy that was praised by copyright groups as a way to go after illegal swapping of music and movies
online. It is the first ruling of its kind in the Netherlands on Internet privacy and could have far reaching consequences for other Internet providers.

Lycos Ordered to Tell Web Client Identity, Associated Press, November 25, 2005.

Indiana Supreme Court Upholds Abortion Waiting-Period Law

The Indiana Supreme Court on Wednesday upheld a law that requires women seeking an abortion to get counseling about medical risks and alternatives, and to wait at least 18 hours after the session before going through with the procedure. The court ruled 4-1 that opponents of the law could not pursue their lawsuit, which argued that privacy is a core right under the state constitution that extends to women seeking to end their pregnancies.

High court upholds waiting-period abortion law, Chicago Tribune, November 24, 2005.

Australia Sees Misuse of Public Surveillance Cameras

Welcome to Sydney 2005 where, the New South Wales Privacy Office says, the rash of security video cameras across the city's suburbs has opened a whole new era for busybodies. "The office has received a number of complaints that video cameras, ostensibly installed for security purposes, have been used for spying on neighbours' houses," its report says. Disturbingly, pointing of CCTV cameras more often than not shows a "discernible streak of malice and more than a hint of retribution".

That's when good neighbours become good spies, New Zealand Herald, November 24, 2005.

Federal Government Proposes Rule Including New Powers to Track Travelers

The federal Centers for Disease Control and Prevention released a phone-book-thick proposed rule yesterday that would give the federal government new powers to track the comings and goings of individual travelers and expand the circumstances under which passengers exposed to a serious communicable disease could be isolated or quarantined. The new provisions -- the costs of which would fall mostly on the travel industry -- call for greater scrutiny of passengers for signs of illness and greater efforts by airlines and others to obtain personal contact information from travelers.

CDC Proposal Would Help U.S. Track Travelers, Washington Post, November 23, 2005.

Texas Sues Sony Over Rootkit Scandal

The Texas attorney general filed a civil lawsuit on Monday against Sony BMG Music Entertainment for allegedly including spyware on its media player designed to thwart music copying. According to the lawsuit filed in Travis County, several of the company's music compact discs require customers to download Sony's media players if they want to listen to the CDs on a computer.

Texas sues Sony BMG over alleged spyware, Reuters, November 21, 2005.

Libraries Struggle to Protect Privacy While Offering Convenience

Libraries around the country are borrowing techniques from Amazon, Netflix and other Internet companies that keep information about their customers' purchases and preferences so they can better cater to their needs or tastes. The hope is that these on-line programs, whose feasibility is still being tested at this point, will help libraries appeal to a generation that often prizes convenience over privacy. Yet for the libraries, privacy remains an important issue. The data such personalized programs store - information about what journals someone is reading, for example - could be sought by government agencies under laws like the USA Patriot Act.

Books for Lending, Data for Taking, New York Times, November 20, 2005.

Louisville, Kentucky Considers Camera Surveillance System

Louisville city leaders hope the threat of being caught on video will help curb crime in some of the city's criminal hotspots. Police Chief Robert White and some members of the Metro Council have proposed spending about $300,000 next year to purchase and install 10 surveillance cameras around the city.

Louisville proposes crime-area cameras, Associated Press, November 19, 2005.

Baltimore to Install Talking Surveillance Cameras

Five talking cameras - armed with motion detectors, a bright flash and a recorded warning - were approved by the city's Board of Estimates yesterday as part of an effort to curb quality-of-life crimes, especially illegal dumping. The cameras, which cost about $5,000 apiece, are the latest in surveillance technology that cities across the country are using to deter everything from red-light runners to drug dealers. They will add to an already expansive network of monitoring equipment in Baltimore.

Voice you hear might be a camera, Baltimore Sun, November 17, 2005.

U.S. Government Wants to Spy on Internet Use

The federal government wants to peer into your computer communications, forcing companies that provide high-speed access or Internet-based telephone service to design -- or redesign -- their networks to accommodate surveillance. On Monday, the Federal Communications Commission gave broadband Internet service and voice-over-Internet Protocol services, or VoIP, 18 months to ensure that their networks are wiretap-ready. This followed the FCC's formal release of the order in September.

U.S. Wants to Peer Into Phone Service Networks, Newsday, November 17, 2005.

More Employers Using GPS Tracking Technology

While they're out chasing the news, employees at a local television station are wondering if anybody is tailing them. The news trucks at WABC-TV were recently equipped with global positioning systems, raising concerns among the station's union workers about privacy issues. It's a small but growing workplace topic as companies slowly embrace the GPS technology already in use to track everything from wayward teens to sex offenders.

GPS technology creeping into workplace, Associated Press, November 17, 2005.

Keystroke Spying Increasing, Study Finds

Keylogger programs that record passwords and other typed-in text are increasing, according to data from iDefense. The programs are an increasingly popular tool among identity thieves, the security company said Tuesday. The biggest problem with keyloggers, which silently relay data to attackers, is that they often go undetected, easily slipping past firewalls and antivirus software, iDefense, a division of VeriSign, said.

Study: Keystroke spying on the rise, CNet News, November 15, 2005.

Ohio County's New Iris ID System Links Up With National Database

The Summit County Sheriff's Office in Ohio expects to have a new identification system operational next month based on digital photographs of the composition of the iris, the colored portion of the eye, and is far more accurate and speedy than conventional fingerprint identification. Sheriff Drew Alexander and Akron police Chief Michael Matulavich said both agencies will use the system in conjunction with a nationwide program called the Children's Identification and Location Database, known as the CHILD Project.

Summit eyes new I.D. system, Beacon Journal, November 15, 2005.

Boy Finds Anonymous Sperm Donor Through Online DNA Service

By submitting a DNA sample to a commercial genetic database service designed to help people draw their family tree, a youth found a crucial clue that quickly enabled him to track down his long-sought parent. While welcomed by advocates of children trying to locate anonymous donors, the case -- apparently the first of its kind -- has raised alarm among sperm banks and some medical ethicists. They are concerned it might start a trend that could violate the privacy of thousands of sperm donors and discourage future ones.

Found on the Web, With DNA: a Boy's Father, Washington Post, November 13, 2005.

States Monitoring Drivers by Tracking Cell Phones

Several state transportation agencies, including those in Maryland
and Virginia, are starting to test technology that allows them to
monitor traffic by tracking cellphone signals and mapping them
against road grids. The technology underlines how readily cellphones can become tracking devices for private companies, law enforcement and government agencies.

Enlisting Cellphone Signals to Fight Road Gridlock, New York Times, November 11, 2005.

Medical Privacy Important to Americans, Survey Shows

Americans are concerned about the privacy of their medical information and are mostly unaware of their privacy rights, a survey released today found. The survey from the California HealthCare Foundation found that 67 percent of adults age 18 and older were either very concerned or somewhat concerned about the privacy of their personal medical records.

Survey: Americans concerned about privacy, unaware of rights, Healthcare IT News, November 9, 2005.

Verizon Wireless Sues Company Over Consumer Privacy

Verizon Wireless filed a lawsuit in Florida against a private investigative agency that allegedly was trying to obtain confidential information about its subscribers. The suit, filed in Hillsborough County, Fla., names Global Information Group (GIG) as a defendant and claims it made "thousands of attempts" to secure confidential information about its customers without first obtaining authorization to do so. The carrier asserts the company tried to impersonate Verizon Wireless employees as well as customers.

Verizon Goes to Court over Consumer Privacy, Wireless Week, November 9, 2005.

Information on 3,623 People Stolen From Databroker TransUnion

Social Security numbers and other information about more than 3,000 consumers were stolen recently from TransUnion LLC, one of three U.S. companies that maintain credit histories on individuals, in the latest of many security breaches that have focused congressional attention on identity theft and fraud. On Oct. 21, the company sent 3,623 notices to consumers alerting them to the breach and offering free monitoring of their credit reports for a year.

Data on 3,000 Consumers Stolen With Computer, Washington Post, November 9, 2005.

Lawmakers Seek to Limit FBI Power to Secretly Demand Documents

On Sunday, Republicans and Democrats in Congress called for greater restrictions on the Federal Bureau of Investigation's ability to demand business and personal records in terrorism investigations without a judge's approval and to retain the records indefinitely. They were responding to an article published that day in The Washington Post about the government's increasing use of what are known as national security letters to demand records from businesses and institutions, without a judge's approval, to aid in terrorism and intelligence investigations.

Lawmakers Call for Limits on F.B.I. Power to Demand Records in Terrorism Investigations, New York Times, November 7, 2005.

'Metadata' in Files Can Cause Embarrassing Gaffes

It pays to mind your metadata. Technically, metadata is sort of the DNA of documents created with modern word-processing software. By default, it is automatically saved into the deep structure of a file, hidden from view, with information that can hint at authorship, times and dates of revisions (along with names of editors). Recently, the United Nations issued a long-awaited report on Syria's suspected involvement in the assassination of Lebanon's former prime minister, Rafik Hariri. Recipients of one version of the report were able to track the editing changes, which included the deletion of names of officials allegedly involved in the plot, including the Syrian president's brother and brother-in-law.

Beware Your Trail of Digital Fingerprints, New York Times, November 7, 2005.

FBI Searches Records of Ordinary, Unaccused Americans in Search for Terrorists

A case in Connecticut affords a rare glimpse of an exponentially growing practice of domestic surveillance under the USA Patriot Act. "National security letters," created in the 1970s for espionage and terrorism investigations, originated as narrow exceptions in consumer privacy law, enabling the FBI to review in secret the customer records of suspected foreign agents. The Patriot Act, and Bush administration guidelines for its use, transformed those letters by permitting clandestine scrutiny of U.S. residents and visitors who are not alleged to be terrorists or spies. The FBI now issues more than 30,000 national security letters a year, according to government sources.

The FBI's Secret Scrutiny, Washington Post, November 6, 2005.

Utah Supreme Court Protects Privacy of Rape Victims' Mental Health Records

The Utah Supreme Court on Friday moved to protect the confidentiality of rape victims' mental health records. Defendants now must give their accusers notice when they attempt to subpoena such protected records, which cannot be disclosed without approval from a judge. "When a victim's confidential records are reviewed before she even knows they are subpoenaed, she cannot choose to protect them," wrote Justice Ronald E. Nehringa for the high court.

Court backs privacy of rape accusers' mental health files, Salt Lake Tribune, November 5, 2005.

FBI Arrests Man Accused of Covertly Installing Ad Software

In the first U.S. prosecution of its kind, FBI agents arrested a 20-year-old Los Angeles man Thursday on charges that he cracked some 400,000 Windows machines and covertly installed pop-up-generating adware on them, in a scheme that allegedly brought in $60,000 in ill-gotten profits.

Alleged Pop-Up Hacker Busted, Wired News, November 3, 2005.

'Private' Wireless Camera Systems Actually Broadcast to the Public

In Wales, Michelle Teran is leading a band of followers through the city streets. The Canadian artist drags along a screen embedded in a suitcase that is showing supposedly secret images captured from cameras inside surrounding buildings. Equipment that underpins in-store closed-circuit TV cameras, personal internet surveillance, even baby crib monitors and TV signal extenders, sends signals along the 2.4-GHz wave band, an unlicensed portion of radio spectrum that is firmly in the public domain. If the cameras are set up incorrectly, passersby with the proper equipment can easily grab images from them when they wander within range.

The Art of Privacy Invasion, Wired News, November 3, 2005.

1971 Paper by Judge Alito Suports Privacy Protections

As a senior at Princeton University, Samuel A. Alito Jr., nominee to the U.S. Supreme Court, chaired an undergraduate task force that recommended the decriminalization of sodomy, accused the CIA and the FBI of invading the privacy of citizens, and said discrimination against gays in hiring ''should be forbidden." The report, issued in 1971 by Alito and 16 other Princeton students, provides a glimpse of a more liberal Alito than the jurist is now perceived.

Alito writing backed privacy, gay rights, Boston Globe, November 2, 2005.