privacy

See the following -

The Latest Snowden Leak Is Devastating To NSA Defenders

Conor Friedersdorf | The Atlantic | July 7, 2014

The agency collected and stored intimate chats, photos, and emails belonging to innocent Americans—and secured them so poorly that reporters can now browse them at will...

Read More »

The NSA-Reform Paradox: Stop Domestic Spying, Get More Security

Bruce Schneier | The Atlantic | September 11, 2013

The nation can survive the occasional terrorist attack, but our freedoms can't survive an invulnerable leader like Keith Alexander operating within inadequate constraints. Read More »

The OpenID Foundation Launches The OpenID Connect Standard

Press Release | OpenID Foundation | February 26, 2014

The OpenID Foundation announced today that its membership has ratified the OpenID Connect standard.  Organizations and businesses can now use OpenID Connect to develop secure, flexible, and interoperable identity Internet ecosystems so that digital identities can be easily used across websites and applications via any computing or mobile device. Read More »

The REAL X-Ray Spex: New 'Terahertz' Scanner Lets Mobile Phones See Through Walls - And Through Clothes

Rob Waugh | Daily Mail | April 19, 2012

A hi-tech chip allows a phone to 'see through' walls, wood and plastics - and (although the researchers are coy about this) through fabrics such as clothing. Doctors could also use the imagers to look inside the body for cancer tumours without damaging X-Rays or large, expensive MRI scanners. Read More »

The Rise Of Medical Identity Theft

Michael Ollove | The Pew | February 7, 2014

If modern technology has ushered in a plague of identity theft, one particular strain of the disease has emerged as most virulent: medical identity theft. Read More »

The Roles I Play

John Halamka | Healthcare IT News | January 15, 2014

As 2014 begins, I marvel at the evolution of the CIO role from 1997 to 2014. Gone are the days when my role was to serve as technical expert, configuring web servers, optimizing data bases, or simplifying code. [...] Here are a few examples of the roles I play today from the past few weeks: Read More »

The Secret Sharer

Jane Mayer | The New Yorker | May 23, 2013

On June 13th, a fifty-four-year-old former government employee named Thomas Drake is scheduled to appear in a courtroom in Baltimore, where he will face some of the gravest charges that can be brought against an American citizen. A former senior executive at the National Security Agency, the government’s electronic-espionage service, he is accused, in essence, of being an enemy of the state... Read More »

The Top Secret Rules That Allow NSA To Use US Data Without A Warrant

Glenn Greenwald and James Ball | The Guardian | June 20, 2013

Fisa court submissions show broad scope of procedures governing NSA's surveillance of Americans' communication Read More »

The Ultimate Goal Of The NSA Is Total Population Control

Antony Loewenstein | The Guardian | July 10, 2014

At least 80% of all audio calls, not just metadata, are recorded and stored in the US, says whistleblower William Binney – that's a 'totalitarian mentality'...

Read More »

The White House Comedy Club

Kathleen Parker | Washington Post | October 25, 2013

While the nation’s attention has been riveted on the Keystone Congress, the executive branch was busy developing its own comedy routine. Picture the cast (you know the characters) shrugging their shoulders in unison: “Who, me?” Read More »

They're Killing The PC

Steven J. Vaughan-Nichols | ZDNet | November 15, 2013

First things first. Yes, PC sales are dismal. They're not coming back. It's not just because we love our tablets and smartphones. It's also because almost all the vendors are pushing us away from the PC model to sealed, cloud-based appliances as fast as they can. Read More »

Thousands Of NFL Players' Medical Records Stolen From Skins Trainer

Barry Petchesky | Deadspin | June 1, 2016

In late April, the NFL recently informed its players, a Skins athletic trainer’s car was broken into. The thief took a backpack, and inside that backpack was a cache of electronic and paper medical records for thousands of players, including NFL Combine attendees from the last 13 years. That would encompass the vast majority of NFL players, and for them, it’s a worrying breach of privacy; for the NFL, it’s potentially a costly violation of medical privacy laws.Last month the league alerted the players’ union to the theft...

Read More »

Time For Internet Engineers To Fight Back Against The “Surveillance Internet”

David Talbot | MIT Technology Review | November 6, 2013

Amid torrent of revelations that the NSA finds mass surveillance easy, the IETF ponders how to harden the Internet. Read More »

Todd Park: President Obama's Tech 'Entrepreneur-In-Residence'

Staff Writer | The Takeaway | February 5, 2013

Congress created the Office of Science and Technology Policy in 1976, but Barack Obama was the first president to appoint a White House chief technology officer. In 2012, Todd Park became the second person to hold the position. Read More »

Top 3 blockchain-based healthcare companies to watch in 2017

Peter B. Nichol | CIO | December 13, 2016

Game theory is the science of strategy. A branch of mathematics and economics that explores strategic situations across multiple stakeholders with different goals, whose actions can affect one another. Pioneering companies are changing the game with blockchain technologies. The new game of consumer interactions redefines transparency, immutability and security across industries. Much progress has been made with game theory. John von Neumann and Oskar Morgenstern’s 1944 book Game Theory and Economic Behavior outlined classic game theory...

Read More »