Daily updates on privacy stories in the news.

August 2008 Archives

« July 2008 | Main | September 2008 »

Deceptive Campaign Practices Moving Online in 2008

This election year voters are experiencing a revolution in the way they engage and are engaged by the electoral process. Election officials are using the Internet as a tool to enhance the information services provided to voters. Campaigns are using the Internet as a more efficient means of targeting voters for messaging and solicitation of financial support. The use of deceptive messaging tactics in elections is not new, and the migration of these practices online is a real possibility in 2008.

Online dirty tricks may mar U.S. elections, CNN.org, August 26, 2008

Man Caught Using a Hidden Video Camera to Spy on Friends Using his Bathroom

A man alleged to have video recorded female friends while using a bathroom in his home has been charged with two misdemeanors. The man was reported to have shown the video to one of the victims who then reported the incident to authorities. The patch work of state and federal laws intended to protect the privacy rights of individuals are falling behind the pace of technology. Domestic violence is increasingly complicated by the misuse of surveillance technologies that are affordable and accessible to abusers.

Sioux Falls man charged with privacy invasion, Sioux City Journal, August 22, 2008

DOJ Announces Plan to Weaken Privacy Rule on Databases

The Department of Justice (DOJ) announced a plan to weaken the 28 Code of Federal Regulation (CFR) Part 23 that governs federal law enforcement access to the criminal databases operated by state and local governments. The 28 CFR Part 23 is cited in the National Criminal Intelligence Sharing Plan as the rule that allegedly provide "privacy protection for data subjects. The regulation addresses the management of inter-, and multi jurisdictional criminal intelligence sharing systems operated by local and state law enforcement or on their behalf. The Federal Privacy Act, which requires data accuracy, provides much better protection for how personal information stored in databases should be managed. In 2003, the DOJ opted to not require that the FBI comply with accuracy requirements for information held by the National Crime Information Center database. The DOJ and Department of Homeland Security fund a number of local and state law enforcement domestic surveillance programs.

U.S. May Ease Police Spy Rules, Washington Post, August 16, 2008

TSA Amasses Secret Database on Air Travelers

The Department of Homeland Security's Transportation Security Administration Agency (TSA) disclosed that it amassed a secret database of air travelers who arrived at airports without a drivers license or passport. The database also includes information on the traveler's companions. The TSA reported it routinely shared access to this once secret database with other law enforcement agencies. The TSA now says that it will no longer add the names of travelers who arrive at airports without a drivers license or passport. There is no word on whether those previously added to the database for not having a drivers license or passport will be removed. Privacy requires that there be no secret databases because they can be used to cause real harm to the rights of individuals. Secret databases may also allow abuse and misuse of government resources, while preventing effective oversight of the agency by the public.

Fliers without ID placed on TSA list, USA Today, August 13, 2008

Credit Card Thieves Used Knowledge of Retail Computer Networks

It is estimated that 40 million credit card numbers might have been compromised by well coordinated attacks on large US retailers. TJX, DSW Shoes, BJ's Wholesale Club, OfficeMax, and Boston Market are a few of the retailers identified as having lost customer credit card data. The Department of Justice outlined the means used by thieves to steal credit card information. Some of the methods include wireless surveillance technology to capture unencrypted credit card point of sale data, and break-ins into computer networks owned by retailers. Two key privacy principles are implicated by the incidents: securing of personal information held by third parties, and not discarding information once payment is received and the benefit or service is provided.

DOJ: Credit card thefts helped by 'well designed' software, Computer World, August 5, 2008

TSA Reports Loss of Registered Traveler Data

For a year, San Francisco air travelers have been offered the option of enrollment in the Clear Registered Traveler Program at a cost of $128. Those who registered were given a biometric ID card that could be used to bypass regular security lines. The Department of Homeland Security's Transportation Security Administration contracted with Verified Identity Pass, Inc. (VIP), a private company to run the program. VIP reported the theft of a laptop containing registration information from its San Francisco office. The agency is now prohibiting VIP from registering new customers into the Registered Traveler program. Registered traveler schemes are all vulnerable to several serious flaws including, the example presented in this news item. Travelers who registered for the program may find themselves waiting in lines once again.

Clear suspended following SFO laptop theft, ABC 7 News, August 5, 2008

Washington State Supreme Court Rules in Support of Privacy

Fifteen teachers accused of sexually abusing students, but cleared of suspicion, sued their school districts to block release of their names to news organizations. The court stated that the names of teachers must be disclosed only in cases where sexual misconduct has been found.

Washington Supreme Court says privacy trumps identifying teacher in cases of unsubstantiated sexual misconduct, Seattle Times, August 1, 2008