Data Act Aims to Protect EU Consumers in Smart Device Era

The European Commission has proposed new rules on who can use and access data generated across economic sectors in the European Union. The proposed legislation would require Amazon, Microsoft, Google and other cloud service providers as well as those who harvest data to establish safeguards preventing non-EU governments from illegally accessing EU consumer information. “We want to give consumers and companies even more control over what can be done with their data, clarifying who can access data and on what terms,” said Margrethe Vestager, the EC’s commissioner for competition, in announcing the Data Act. Continue reading Data Act Aims to Protect EU Consumers in Smart Device Era

China Cyberspace Agency Tightens Rules on Foreign Listings

The Cyberspace Administration of China, an agency set up by President Xi Jinping that reports to a leadership group he chairs, increased interagency oversight of companies traded in the United States and elsewhere overseas. The agency also will harden rules related to domestic companies listed on foreign stock exchanges and better coordinate various regulators. That lack of coordination was apparent in DiDi Global’s IPO last month, which was supported by financial regulators but tagged by the country’s cybersecurity regulator. Continue reading China Cyberspace Agency Tightens Rules on Foreign Listings

Cybersecurity: White House Pursues Public-Private Alliances

Russia and China recently ran sophisticated hacks from servers inside the United States, going undetected by the National Security Agency, which is prohibited from conducting surveillance in the U.S., as well as the FBI and Department of Homeland Security. Private computer security firms were the first to raise the alarm on these foreign attacks, and Microsoft reported that its patches are being reverse-engineered by criminal groups to launch ransomware attacks on corporations. The White House is paying attention. Continue reading Cybersecurity: White House Pursues Public-Private Alliances

Ireland Orders Facebook to Stop Moving EU Data to the U.S.

Ireland’s Data Protection Commission sent Facebook a preliminary order to cease data transfers of its European Union users to the U.S., a move confirmed by Facebook vice president of global affairs Nick Clegg. In doing so, EU regulators have taken a major step to enact a July ruling forbidding such transfers. Facebook would have to partition the data it collects from European users or stop serving them altogether. Otherwise, Ireland’s commission can fine Facebook up to $2.8 billion, 4 percent of its annual revenue. Continue reading Ireland Orders Facebook to Stop Moving EU Data to the U.S.

Privacy Shield: Top EU Court Strikes Down Data Transfer Pact

The European Union’s top court voided a transatlantic data-sharing pact this week, ruling that EU residents’ data, when moved to the U.S., are not sufficiently protected from that government’s surveillance. The legal battle began in 2013, when privacy activist Max Schrems complained to the Irish Data Protection Commissioner, pointing to Edward Snowden’s leaks as proof that U.S. law did not protect against scrutiny. Countries outside of the European Union and companies that want to move EU data abroad must now meet strict EU data laws. Continue reading Privacy Shield: Top EU Court Strikes Down Data Transfer Pact

Ghostery Goes Open Source and Intros New Business Model

Ghostery, an ad blocker recommended by Edward Snowden, just published all its code on GitHub. The company was acquired last year by Cliqz, “the first browser with integrated privacy protection,” including anti-tracking and anti-phishing. Ghostery’s revenue model has been hard to understand for some users, who opt-in to share data about the ad trackers they find on the web. Ghostery then sells that data to e-commerce websites and other companies, a seeming incongruity with its stated mission. Continue reading Ghostery Goes Open Source and Intros New Business Model

U.S. and China Continue to Compete in Supercomputing Race

In an experiment described in Science, Chinese researchers used photons (also known as light particles) from the country’s quantum-communications satellite and established an instantaneous connection between two ground stations more than 744 miles apart. By doing so, say the experts, China is now a pioneer in harnessing matter and energy at a subatomic level — and a leader in the field of using quantum technology to build a global communications network that can’t be hacked. Meanwhile, the U.S. Department of Energy is paying for companies to develop new supercomputers in pursuit of at least one “exascale” system. Continue reading U.S. and China Continue to Compete in Supercomputing Race

WikiLeaks Claims of CIA Hacking Could Impact Tech Industry

WikiLeaks released thousands of documents yesterday that it claims detail methods used by the CIA “to break into smartphones, computers and even Internet-connected televisions,” reports The New York Times. According to WikiLeaks, the CIA and allied intelligence services bypassed encryption on messaging services including Signal, Telegram and WhatsApp. WikiLeaks also suggests that agencies can collect audio and messaging data from Android phones “before encryption is applied.” The Wall Street Journal notes that such activities, if actually taking place with consumer electronics, could fuel tensions between intelligence agencies and the tech industry, which has been concerned about customer privacy. Mobile devices are a major concern; NYT published an article detailing potential smartphone vulnerabilities. Continue reading WikiLeaks Claims of CIA Hacking Could Impact Tech Industry

Documentarians Entreat Camera Manufacturers for Encryption

Documentary filmmaker Laura Poitras, who shot the Oscar-winning “Citizenfour” about Edward Snowden, along with 150 other documentary filmmakers, signed an open letter from the nonprofit Freedom of the Press Foundation (FPF) asking camera manufacturers Canon, Nikon, Olympus, Sony, Fuji, Kodak and Ricoh to add encryption features. The fear is that thieves, law enforcement or agents of authoritarian governments can access footage by simply taking possession of the camera, and the documentarians want protection. Continue reading Documentarians Entreat Camera Manufacturers for Encryption

WhatsApp Updates Privacy Policy, Shares Data with Facebook

When Facebook bought the popular free messaging service WhatsApp, it promised it wouldn’t change the privacy policies. Now the company has done just that, and organizations including the Electronic Privacy Information Center (EPIC) and the Center for Digital Democracy are not happy. Facebook has stated it will now connect users’ phone numbers with Facebook’s systems, offering “better friend suggestions” and more relevant ads. The new approach will help Facebook finally monetize WhatsApp. Continue reading WhatsApp Updates Privacy Policy, Shares Data with Facebook

App for Broadcasting Text Chats Rolls Out with ‘SummerBreak’

Avner Ronen, founder of consumer electronics startup Boxee, has rolled out Public, a messaging service that he calls “a third medium for broadcasting conversations.” Public, which raised $2 million at the end of 2015 and is available as an iPhone app and website, broadcasts group chats to an audience, complete with GIFs and emoji. A handful of active participants chat about a topic, which anyone can follow in real-time or read later. Chats can also be shared on Facebook, Twitter or Instagram or embedded in other websites. Continue reading App for Broadcasting Text Chats Rolls Out with ‘SummerBreak’

Apple’s Growth Stalls, China Shutdown Could Signal Trouble

Apple’s 13-year run of quarterly revenue growth has come to an end; the company reported that revenue for its second fiscal quarter, ending March, declined 13 percent to $50.6 billion. The reasons are many: its huge size makes sustained momentum difficult; it has suffered setbacks in China, its second largest market; it lacks a hot new product; and, with iPhones accounting for half the smartphones in the U.S., phones have likely reached a saturation point. Sales of iPhones fell 16 percent in Q1 2016 compared to the same quarter last year. Continue reading Apple’s Growth Stalls, China Shutdown Could Signal Trouble

Whistleblower Edward Snowden Virtually Attends CES 2016

Edward Snowden, the former government contractor who famously leaked thousands of classified NSA documents, made an appearance at the Suitable Technologies booth during CES by way of a video chatting device on wheels. Snowden used a Beam telepresence device by Suitable to chat with founder of the Xprize Foundation Peter Diamandis about the future of technology and government surveillance. Snowden faces arrest if he returns the United States, so he touted the Beam technology as a way to stay connected. Continue reading Whistleblower Edward Snowden Virtually Attends CES 2016

U.K. Plans to Ban Advanced Encryption to Combat Terrorists

In response to Edward Snowden’s revelations of government surveillance of ordinary citizens, many Internet and social media companies responded by creating encryption so advanced that even they couldn’t read users’ communications. Now, many critics say, terrorists and other criminals are using those same platforms because their messages will be safely encrypted from prying eyes of intelligence and government authorities. Among the strongest critic is the U.K. government, which is proposing that such encryption be illegal. Continue reading U.K. Plans to Ban Advanced Encryption to Combat Terrorists

Leaked Documents Offer Details of U.S. Military’s Drone Wars

Two years after government contractor Edward Snowden famously leaked secret NSA documents, another release of classified information has occurred. This time, The Intercept — which is staffed by journalists who previously worked with Snowden — has published what it claims is a comprehensive breakdown of the U.S. government’s military drone program. The report, featuring documents provided by another whistleblower, offers details regarding U.S. strategy to kill foreign targets in Afghanistan, Somalia and Yemen — and highlights the unintended consequences involved with drone wars. Continue reading Leaked Documents Offer Details of U.S. Military’s Drone Wars