policy Articles


Child pornography searches thrown out for lack of evidence

In a article from CNet, we are told that US District Court judges in Missouri and New York threw out searches used against people arrested in the Government's largest Child Pornography operation, Candyman. The problem is that it appears the FBI used a users list without verifying that all users …


Online porn law beaten back again by 3rd circuit

In a move certain to raise the eyebrows of the reactionary right and warm the hearts of first-amendment lovers, the US 3rd Circuit Court of Appeals has again struck down the COPA (Child Online Protection Act), an overly-broad act aimed at putting in prison people who don't cordon off "inappropriate …

Australia's police crack down on music piracy

From an article from Australian IT, comes a report that the Australian Federal Police have executed search warrants on Telstra and other ISPs to get the names of users who may be involved in music piracy. In another blow for the anonymity of the internet and a win for the …

Monster.Com warns about new identity theft method

According to an article on CNet, some people have fallen prey to a new identity theft scheme. The basic outline is that the perpetrators post a job on Monster (or some other service) and wait for the CVs and applications to roll in. If they need more info about you …

Flying or Buying, they both want your credit records

According to numerous articles on Friday, including this article on Fox News, Delta Airlines is preparing a trial run of a new federal program for security. This latest program involves consulting a database that includes many sources of data, including credit reports... that's right credit reports! Why, you may ask …

Ireland forcing telcoms to store call data.

In another shocking privacy twist, the WebLog of Karlin Lillington recounts an afternoon spent at a briefing by Irish authorities about a proposed new security policy. At this briefing, they revealed that, over a year ago, the Irish government had instructed all telecoms providers to maintain three years worth of …

AOL's customer DB hacked (maybe)

Wired is reporting in an article on their site that AOL's customer database, Merlin, was broken into by hackers using a combination of old-fashioned social engineering techniques and some adroit hacking. There are some disputes of this, though, in other press reports, including an article in The Register.

Harvard study reports net blocking threatens legit sites

An article points us to a study from Harvard University about IP sharing and filtering. Not surprisingly, the study indicates that lots of sites tend to share the same IP addresses, due to the scarcity of IP addresses and the way that most company's provide web hosting. The basic concern …

University of Wyoming watches file trading

According to an article on CNet is reporting that the University of Wyoming has been using a program from Audible Magic to watch over file trading on the campus networks. Chances are that most of the traders didn't know this was going on before the announcement, but the administration is …

Warning to PayPal customers: Don't click on that!

An article in Wired describes a series of social-engineering attacks on PayPal users. The attack is based on supposed "Security Alert" messages that are received by users and include Visual Basic components in them (.vbs files). If you receive a note that appears to be from PayPal telling you that …

FTD.com site serves up personal info to hackers

CNet is reporting that FTD (the floral company) had a significant bug that caused personal information to be made available to hackers. Unfortunately for FTD (and the customers) this is one of the busiest times of the year for them. Information from the company indicates that the data that …

House, Senate agree to limit surveillance

According to an article on StarTribune, the US House and Senate have agreed to limit the TIA in a manner similar to the proposed Senate amendment already discussed last week. It appears that there are few people in either chamber that like the idea of Mr. Poindexter (convicted of lying …

Grand jury hands down DMCA indictments

An article on CNet reports that a grand jury in California indicted six people on charges that they violated the anti-decryption portions of the DMCA, primarily related to signal theft on satellite TV. Of the six, one has apparently plead guilty to violating the DMCA. The trial dates will be …

German government shuts down gruesome website

Striking another blow for censorship, the German government has closed down a web site, Ogrish.com, because it contained gruesome pictures, according to Cnet.com in an article posted this morning. Although it certainly appears that the site was tasteless and quite possibly illegal under German laws, it is an …

Canadian's debate new ID cards for US entry

The CBC (Canadian Broadcasting Company) reports in an article today that Canadian legislators are attempting to determine whether to issue biometric ID cards for citizens that are going south or whether to continue pressing for exemption from the USA PATRIOT act.


DMCA vs. Verizon, take II

With Verizon's recent request for a stay of the order for it to provide information to the record labels after a recent court loss, the labels are fighting back. According to an article from CNet, the RIAA has filed a strongly worded brief accusing Verizon of failing to live up …

TIA gets two watchdogs

In an obvious effort to deflect recent complaints (and legal action) about the run-away nature of the TIA (Total Information Awareness) initiative to spy on Americans, the Pentagon announced the formation of two boards to help oversee the program. InfoWorld reports in this article that the two boards are being …

Student prosecuted for installing key logging on campus

Those who've spoken to me about using internet cafe's are familiar with my concerns about key logging software that might be on these public machines. An article from CNET tells of a student from Boston College who is being charged with "six counts of intercepting electronic communications and eight counts …