PRIVACY + SECURITY BLOG

News, Developments, and Insights

high-tech technology background with eyes on computer display

The Lives of Others

The Lives of Others

I recently saw The Lives of Others and was thoroughly impressed with this film. After having seen the amazing Pan’s Labyrinth, I was stunned that another movie could win the Oscar for best foreign film of 2006 (one of the rare categories in the Oscars where worthy films actually win). But after finally seeing it, I now know why. It’s a spectacular film.

Continue Reading

The Do Not Call List’s Memory Lapse

Phone

So you signed up for the federal Do Not Call List and expect not to receive any more of those annoying telemarketing calls ever again. Think again. Signing up expires after 5 years, so if you signed up back when the list first came into existence, you’ll need to sign up all over again soon. It’s the FTC’s way of making us feel like Sisyphus. Lame.

Continue Reading

Can the TB Patient Sue the CDC?

Lungs

The WSJ blog points to this interesting update [link no longer available] about the TB patient who was quarantined for having a highly-resistant strain of TB. I blogged about the case here and here. According to the news story, times aren’t very good from Andrew Speaker, the TB patient:

Continue Reading

The FBI’s New Surveillance System

Surveillance

Remember the good old days, when the FBI used tools such as Carnivore, the device that sifted through email traffic at ISPs. The FBI renamed the device DCS-1000 to sound less ominous and mean, but the name Carnivore stuck. Later on, Carnivore no longer became necessary, as ISPs could deliver the goods to the FBI without its help. Attention then shifted to the NSA, the new king of surveillance.

Continue Reading

The Problems With Terrorist Watch Lists

Terrorist Watch Lists

From the Washington Post:

The government’s terrorist screening database flagged Americans and foreigners as suspected terrorists almost 20,000 times last year. But only a small fraction of those questioned were arrested or denied entry into the United States, raising concerns among critics about privacy and the list’s effectiveness.

A range of state, local and federal agencies as well as U.S. embassies overseas rely on the database to pinpoint terrorism suspects, who can be identified at borders or even during routine traffic stops. The database consolidates a dozen government watch lists, as well as a growing amount of information from various sources, including airline passenger data. The government said it was planning to expand the data-sharing to private-sector groups with a “substantial bearing on homeland security,” though officials would not be more specific.

Continue Reading

Congress, the President, and NSA Surveillance

NSA

Congress recently passed a broad authorization of the NSA surveillance program, bowing to pressure from President Bush. From the New York Times:

Racing to complete a final rush of legislation before a scheduled monthlong break, the House voted 227 to 183 to endorse a measure the Bush administration said was needed to keep pace with communications technology in the effort to track terrorists overseas. . . .

There was no indication that lawmakers were responding to new intelligence warnings. Rather, Democrats were responding to administration pleas that a recent secret court ruling had created a legal obstacle in monitoring foreign communications relayed over the Internet.

They also appeared worried about the political repercussions of being perceived as interfering with intelligence gathering.

Continue Reading

CCTV as Entertainment

CCTV and Privacy

Britain has implemented an extensive video surveillance system called Closed Circuit Television (CCTV), with over 4 million cameras watching over public areas. The purpose of the cameras is for officials in monitoring centers to watch for suspicious behavior and dispatch the police if they see crime developing. CCTV footage has also been used to investigate crimes. For more about CCTV, see this great article by my colleague, Jeffrey Rosen.
Continue Reading

Noteworthy Privacy Law Scholarship: 2006

Privacy Scholarship

As there are tons of new scholarly works in the privacy law field each year, I thought it might be useful to point out a few books and articles that I found particularly interesting and useful from the past year. This post will cover only those books and articles published in 2006.
Continue Reading