Posts Tagged Privacy
by: Susanne Posel
August 6, 2012
While a compromised version of the Cybersecurity Act of 2012 was introduced to the Senate in July, the false claims of “. . . foreign governments, criminal syndicates and lone individuals are probing our financial, energy and public safety systems every day. It would be the height of irresponsibility to leave a digital backdoor wide open to our cyber adversaries” was perpetuated by President Obama.
Shawn Henry, a veteran of the cyber security division in the FBI, stated in a CBS interview that although he has no proof, Russia and China are behind infiltration and damage to computers in America, while also claiming that he feels it is “very, very likely” that a massive cyber-attack is due to occur.
According to Jay Carney, White House Press Secretary, Obama may just write an executive order to ensure his cybersecurity agenda is implemented. “In the wake of Congressional inaction and Republican stall tactics, unfortunately, we will continue to be hamstrung by outdated and inadequate statutory authorities that the legislation would have fixed. Moving forward, the President is determined to do absolutely everything we can to better protects our nation against today’s cyber threats and we will do that.”
August 2, 2012
While it’s obvious that most large corporations are fronts for the illumines global criminal activity, now Twitter has censored it’s user for opinion.
The Wall Street Journal reports;
The biggest brouhaha so far erupted on Monday and Tuesday, when a finger-pointing spat emerged over a journalist getting booted off Twitter after he was critical of NBC’s Olympics coverage.
The journalist was reinstated on the short-messaging service Tuesday—but not before the blogosphere lit up with criticism over whether Twitter was curtailing free speech. Twitter apologized for what it said were its missteps in the incident.
Beyond that, two athletes have been kicked out of the Games for posting controversial statements on Twitter. At least one other athlete had been reprimanded for using social media to name their sponsors, in apparent violation of Olympics rules—and athletes have used Twitter to strike back, criticizing the IOC rules.
British diver Tom Daley also warred on Twitter this week with a critic, who was later arrested on suspicion of malicious communication and revealed to be a British teenager.
Another push by the globalists to control the populace.
August 2, 2012
July 31, 2012
Google is trying to clean up YouTube’s comments section by encouraging users to post their real names.
When a YouTube user now tries to comment on a video, a box pops up asking that person to start using their “full name” at the video sharing site.
The “full name” is taken from the person’s Google+ account since Google requires the real name of someone signing up for a Google+ account.
After the “start using your full name” box appears, you can refuse to start using your real name. If you do that, another pop up appears asking you to justify your decision. Choices offered by Google include:
- My channel is for show or character.
- My channel is for a music artist of group.
- My channel is for a product, business or organization.
- My channel is well-known for other reasons.
- My channel is for personal use, but I cannot use my real name.
- I’m not sure, I’ll decide later.
by: Rebecca Bowe
Friday, July 27, 2012
At the Black Hat Security Conference in Las Vegas this week, Javier Galbally revealed that it’s possible to spoof a biometric iris scanning system using synthetic images derived from real irises. The Madrid-based security researcher’s talk is timely, coming on the heels of a July 23 Israeli Supreme Court hearing where the potential vulnerabilities of a proposed governmental biometric database drove the debate. Consider the week’s events a reminder that if the adoption of biometric identification systems continues apace without serious contemplation of the pitfalls, we’re headed for trouble.
When it comes to the collection and storage of individuals’ digital fingerprints, iris scans, or facial photographs, system vulnerability is a chief concern. A social security number can always be cancelled and reissued if it’s compromised, but it’s impossible for someone to get a new eyeball if an attacker succeeds in seizing control of his or her digital biometric information.
Among all the various biometric traits that can be measured for machine identification — such as fingerprints, face, voice, or keystroke dynamics — the iris is generally regarded as being the most reliable. Yet Galbally’s team of researchers has shown that even the method traditionally presumed to be foolproof is actually quite susceptible to being hacked.
The project, unveiled for the first time at the security researchers’ conference, made use of synthetic images that match digital iris codes linked to real irises. The codes, which are derived from the unique measurements of an individuals’ iris and contain about 5,000 pieces of information, are stored in biometric databases and used to positively identify people when they position their eyes in front of the scanners. By printing out the replica images on commercial printers, the researchers found they could trick the iris-scanning systems into confirming a match.