ICE Shackles Terminally Ill Patients, Uses Therapy Sessions Against Children During Immigration Hearings
When a man in the custody of Immigration and Customs Enforcement, who had metastatic cancer, was brought to a hospital in Houston, a doctor was not able to conduct a proper examination. ICE would not let the doctor remove restraints that ran across his body, and he died after a
House Oversight Hearing On Facial Recognition Technology: FBI Still Can’t Vouch For Accuracy Of Systems
The FBI has a unit for facial recognition services that oversees a database with more than six hundred million photos. While the Government Accountability Office (GAO) recommended that the FBI take steps to ensure the accuracy of how the agency uses facial recognition, the FBI has failed to implement such
The growth of warrantless searches of electronic devices by Customs And Border Protection puts press freedom at great risk.
On February 16, a federal magistrate judge ordered Apple to help the FBI hack into the San Bernardino shooter’s phone.
Though Facebook claims publicly to oppose the privacy invading bill, the massive social networking site is working behind the scenes to get CISA passed.
A draft of the “Snowden Treaty,” which would expand international legal obligations to protect privacy and whistleblowers, is under review by multiple countries. The “International Treaty on the Right to Privacy, Protection Against Improper Surveillance and Protection of Whistleblowers” — is spearheaded by activist David Miranda and Avaaz campaign director Dalia Hasad.
On Monday, the ACLU asked an attorney general to “back off” and stop invading the privacy of Internet users to infringe on free speech or serve the agenda of big corporations and their lawyers. Google already sued Attorney General Jim Hood over the massive, invasive subpoena.
W3C’s specification explicitly frees sites from needing to ask user permission to discover they remaining battery life, arguing that “the information disclosed has minimal impact on privacy or fingerprinting, and therefore is exposed without permission grants”. But in a new paper from four French and Belgian security researchers, that assertion is questioned.