From WSJ free content, Information Security – Where the Dangers Are: The threats to information security that keep the experts up at night — and what businesses and consumers can do to protect themselves.
FBI says it has files on ACLU, Greenpeace, other rights groups Large Volume of F.B.I. Files Alarms U.S. Activist Groups: “The Federal Bureau of Investigation has collected at least 3,500 pages of internal documents in the last several years on a handful of civil rights and antiwar protest groups in what the groups charge is… Continue Reading
As a follow-up to my December 12, 2003 posting, E-ZPass Technology, Law Enforcement and Privacy, see this article, A Pass on Privacy, from the Sunday New York Times Magazine: “The computer system to which you have surrendered your payment information also records data about your movements and habits. It can be hacked into.” Read on. Continue Reading
The Security Pretext: An Examination of the Growth of Federal Police Agencies, CATO Briefing Paper, by Melanie Scarborough. Full Text of Briefing Papers no. 94, 16 pages, (PDF) See also: Cities opening more video surveillance eyes, by Martha T. Moore, USA TODAY The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age, by Jeffrey… Continue Reading
New Bush Statement on Rove Conflicts with Executive Order: “Rep. Waxman explains that the President’s responsibility under E.O. 12958 to protect national security secrets requires the President to act before Special Prosecutor Patrick Fitzgerald completes his criminal investigation and to apply different standards and sanctions.” Letter to President Bush (5 pages, PDF) Related postings here… Continue Reading
Information Technology Management: Census Bureau Has Implemented Many Key Practices, but Additional Actions Are Needed GAO-05-661, June 16, 2005. Highlights. “The bureau has developed policies and procedures and initiated key practices in many of the areas that are important to successfully managing IT, including investment management, system development/management, enterprise architecture management, information security, and human… Continue Reading