Skip to main content

Home/ PA311-2011/ Group items tagged technology

Rss Feed Group items tagged

Ron McKee

Why and How Apple Is Collecting Your iPhone Location Data | Gadget Lab | Wired.com - 0 views

  •  
    Excerpt: Apple's general counsel Bruce Sewell in July 2010 sent a 13-page letter (.pdf) explaining its location-data-collection techniques in response to a request from Congressmen Joe Barton and Edward Markey asking for Apple to disclose such practices (.pdf). (Incidentally, Markey authored the "Do Not Track" bill to stop online companies from tracking children.) Note: Article has a link to this 13-page letter dated July 2010 after they were asked to disclose such practices.
Ron McKee

South Carolina: Internal Emails Reveal Speed Trap Profit Motive - 0 views

  •  
    Internal emails regarding Ridgeland, South Carolina speed camera system shows profit drives deployment decisions: An ongoing federal lawsuit against the speed trap town of Ridgeland, South Carolina uncovered internal emails last month that shed light on the motivation behind the state's only photo enforcement program. Since July 2010, Ridgeland has allowed the private firm iTraffic to operate a mobile speed camera van on Interstate 95, despite a state law outlawing the practice and a pair of attorney general opinions warning that the photo ticketing was not legal.
Ron McKee

Michigan: Police Search Cell Phones During Traffic Stops - theNewspaper: A journal of ... - 6 views

  •  
    "ACLU learned that the police had acquired the cell phone scanning devices and in August 2008 filed an official request for records on the program, including logs of how the devices were used. The state police responded by saying they would provide the information only in return for a payment of $544,680. The ACLU found the charge outrageous."
Ron McKee

MSP - April 20, 2011 - Official Statement: Use of Cell Phone Data Extraction Devices - 0 views

  •  
     News Release by Tiffany Brown, Public Affairs Section, Lansing: Recent news coverage prompted by a press release issued by the American Civil Liberties Union (ACLU) has brought speculation and caused inaccurate information to be reported about data extraction devices (DEDs) owned by the Michigan State Police (MSP). The MSP only uses the DEDs if a search warrant is obtained or if the person possessing the mobile device gives consent. The department*s internal directive is that the DEDs only be used by MSP specialty teams on criminal cases, such as crimes against children. The DEDs are not being used to extract citizens' personal information during routine traffic stops. The implication by the ACLU that the MSP uses these devices "quietly to bypass Fourth Amendment protections against unreasonable searches" is untrue, and this divisive tactic unjustly harms police and community relations.
Ron McKee

FBI - The Intel-Driven FBI - 0 views

  •  
    See photo at top left of article showcasing one of their high-tech, computer laden facilities on display for this article "What are the most significant security threats? What do we know about them? What don't we know? What is just around the corner that we should be preparing for now? These are the kinds of questions we ask ourselves every day. It's part of our intelligence-driven, threat-based, future-focused approach to defending the country from a range of national security and major crime threats. Today, the FBI combines its investigations and intelligence operations to be more predictive and preventative-more aware of emerging threats and better able to stop them before they turn into crimes. "
Ron McKee

Here is the Cellebrite statement regarding the recent news-story in Michigan: | Facebook - 1 views

  •  
    Facebook statement by Cellebrite on Wednesday, April 20, 2011  strategic priority is our investigation of foreign countries that seek every day to steal our state secrets and private sector intellectual property, sometimes for the purpose of undermining the stability of our government by weakening our economic or military supremacy
Ron McKee

FBI - The Cyber Threat: Who's Doing What to Whom? - 0 views

  •  
    Speech by Steven R. Chabinsky, Deputy Assistant Director, Cyber Division, Federal Bureau of Investigation  - delivered March 23, 2010 "...to talk with you about the cyber threat, why it's important, and how you can help your organizations-and in doing so, help our country-rise to this enormous challenge. Some of you no doubt are on the front lines of the cyber security problem and are quite familiar with it, while others of you may only have passing familiarity with this growing problem. First, let me share with you the importance of the cyber security problem from the lens of the FBI. As you know, the FBI is a law enforcement agency that investigates hundreds of federal crimes as well as a domestic national security agency that combats terrorism, espionage, treason, and sabotage.
Ron McKee

Seven Tips for Techies in a Nonprofit Job Interview (relevant to any seniors headed in ... - 0 views

  •  
    By Amy Potthast, Director, Service and Graduate Programs at Idealist "As a non-techie, I think I can safely say that a hiring nonprofit's current staff may have so little technical knowledge, they don't even know what skills are needed to do a job they want done. This lack of clarity on the employer's part can translate into some confusion and challenges on your part when you apply for a nonprofit job. I chatted with my colleagues on Idealist's web team for pointers to pass along."
« First ‹ Previous 501 - 509 of 509
Showing 20 items per page