What Can Be Gleaned From Trump’s Allegations of Wiretapping

“An accusation for which the president again offered no evidence sets off another spasm surrounding his young administration.”

SafeJunction holds the privacy of citizens and lawfully conducted investigations, including conversations, documents, and materials gleaned thereby to be of the highest importance in a free democracy.  We believe that an individual’s right to privacy in the conduct of lawful personal and business affairs is a right, not just a privilege to be taken lightly.

Source: What Can Be Gleaned From Trump’s Allegations of Wiretapping – The New York Times

Thanks to The New York Times

ISPs say your Web browsing and app usage history isn’t “sensitive”

ISP lobby groups make case against the FCC’s broadband privacy rules.

And now begins the nit picking argument about language and the meaning of terms in the law that govern enforcement and permitted acts that affect public communications and the Internet.  “Sensitive” is the favorite these days.  Its become the new speak for “privacy”, as if the Fourth Amendment of the US Constitution doesn’t protect a citizens “sensitive” information or property.  Many of our long standing concepts about what is and what is not private are being turned on their heads by changes in surveillance technologies (read: security cameras and recording systems) and the new realities of 21st century living.

Source: ISPs say your Web browsing and app usage history isn’t “sensitive” | Ars Technica

Thanks to Ars Technica

Judge Has Doubts About Gmail Privacy Deal

Two proposed settlements involving Google drew very different reactions from two federal judges on Thursday in San Jose, with one headed toward approval and the other drawing a rebuke over the clas…

SafeJunction technology prevents providers like Google from viewing or analyzing emails in-transit or even after they are stored.

Source: Judge Has Doubts About Gmail Privacy Deal

Thanks to Courthouse News Service

10 Predictions for the Future of IoT

IoT and its diverse connected devices poses a serious threat to the security of our homes, automobiles, businesses, and personal devices.  Consumers need to realize that there’s more to connectivity and access than meets the eye.  And privacy is at the heart of the challenge.

What is the future of IoT going to be like? Ahmed Banafa gives us 10 key points to take into account while illuminating the future of this promising technology

1. Platforms

2.Standards and Ecosystems

3.Event Stream Processing

4.Operating Systems

5.Processors and Architecture

6.Low-Power, Wide-Area Networks

7.Low-Power, Short-Range IoT Networks

8.Device (Thing) Management

9.Analytics

10.Security

Source: 10 Predictions for the Future of IoT – OpenMind

Thanks to OpenMind

The state of privacy in America

Right or wrong, Edward Snowden’s revelations about NSA surveillance have focused attention on the Fourth Amendment and national security in ways that our founding father’s never could have imagined.

After the June 2013 leaks by Edward Snowden about NSA surveillance of Americans’ communications, Pew Research Center began an in-depth exploration of people’s views and behaviors related to privacy. Here’s what we learned.

Source: The state of privacy in America | Pew Research Center

Thanks to Pew Research

No such thing as absolute privacy

“There is no such thing as absolute privacy in America; there is no place outside of judicial reach,” Comey said at a Boston College conference on cybersecurity. He made the remark as he discussed the rise of encryption since 2013 disclosures by former National Security Agency contractor Edward Snowden revealed sensitive US spy practices.
“Even our communications with our spouses, with our clergy members, with our attorneys are not absolutely private in America,” Comey added. “In appropriate circumstances, a judge can compel any one of us to testify in court about those very private communications.”
 But, he also said Americans “have a reasonable expectation of privacy in our homes, in our cars, in our devices.
“It is a vital part of being an American. The government cannot invade our privacy without good reason, reviewable in court,” Comey continued.
The privacy conversation continues in 2017 as the White House sends mixed messages.  And new threats to computing devices and TVs remind us to be vigilent and not assume that we are protected from surveillance, hacking, and cyber crime.

FBI Chief Comey on Privacy

Thanks to the FBI and CNN

24 Home Security Tips for 2017

“Keep your home and loved ones safe with these time-tested home security tips.

  1. Survey your home, thinking like a would-be burglar.
  2. Have a look at the locks on your doors, the length of the screws used to secure the hinges, and the screws used in the striker plates that the deadbolts rest in.
  3. Securing the door frames themselves makes good sense.
  4. Consider the landscape around your home.
  5. Doors and locks themselves should be of the highest quality.
  6. Consider the space in-between the door and its frame.
  7. Windows can be secured in a number of ways.
  8. Use multiple locks on doors.
  9. Consider installing exterior lighting in key areas to light the most vulnerable doors and windrows.
  10. Identify things in your yard that could be of use to a burglar.
  11. Hide your valuables from plain view.
  12. Consider investing in protective window film or window bars if you live in a high risk area.
  13. Do not leave mail in the mailbox for any length of time, or leave flyers or advertising paraphernalia in the door.
  14. Use timers for lights inside your home, if you go away regularly from your home at night.
  15. For the same reasons that one shouldn’t leave mail and adverts in the door or mailbox, one also should take care not to leave any outside lights burning all night into the day.
  16. If you live in a neighborhood that has been plagues with home invasions, it is a good idea to create a safe room inside your home for you and your family.
  17. Engrave your valuables with an engraving tool, putting your name on them.
  18. Don’t stash all of your valuables in one place.
  19. This goes with tip # 17: photocopy all the contents of your purse or wallet.
  20. Join or start a neighborhood watch program, if this is possible.
  21. If you go out,whether to work or just about town, consider leaving the radio or television on, and preferably on a talk program. this, with the other tip of leaving lights on timers, can go a long way to confusing a would-be burglar.
  22. If you like animals, and don’t have any sorts of allergies or similar issues, consider getting a dog.
  23. Most garages have doors leading to the house from the inside of the garage, and most often these are the least protected entrances. Give these doors the same consideration as you would your front or back doors!
  24. This last one is so obvious, but you would be surprised how many of my neighbors do it: do not leave home with the windows open!”

Source: 24 Home Security Tips for 2017 | Live Safely

Thanks to Live Safely

Malicious fake app bricks phone and installs ransomware

The message:  Your mobile and computing devices can be attacked, breached, infected, or otherwise compromised anytime – anywhere – and without warning.  The important truth about technology in the 21st Century is that its fraught with danger AND you ignore the threats until YOU become a victim.

So curious!

Source: Top Story: Malicious fake app bricks phone and installs ransomware | Komando.com

Thanks to Komando.com

Privacy Mindfulness

Personal information, particularly health care information, is being exposed in more places, through more “things” and to more people every day, which is creating new risks for people, businesses, health care organizations, governments and society as a whole. People all around the world are more concerned than ever about their privacy and the security of the personal information they share with others, with good reason.

The coming of age of privacy awareness is imminent.  The question for today is “will you express your opinion and take action?”

Source: Blogs | StaySafeOnline.org

Thanks to StaySafeOnline