Privacy Research Group Blog

April 17 Panel 3




Wei-Chen Hung

The issue arising here is the legitimacy of Microsoft’s investigation which accessed the Hotmail content of a user who was tracking in stolen Microsoft source code. The purpose of Microsoft’s internal investigation is to search for evidence of theft of its trade secrets in a Hotmail account.…

Continue Reading →

April 10 Panel 4



Oliver Richards

The fallout of Edward Snowden’s revelations continue to echo throughout the world.  Under a threat by European Parliament to veto future trade agreements, the U.S. Department of Commerce announced that it will take another good look at its framework for US companies to receive so-called “safe harbor” status under EU law, allowing them to export the data collected about EU citizens to the US.…

Continue Reading →

April 3 Panel 5



Yali Hu

N.S.A. documents provided by the former contractor Edward J. Snowden indicate that N.S.A. has been conducted surveillance on the Chinese telecommunications giant, Huawei, a private company, since at least 2010 FISA cannot be applied as it is designed to govern the collection of “foreign intelligence” within the United States.…

Continue Reading →

March 27 Panel 06





Gabriel Gutiérrez

Documents Say NSA Pretends to be Facebook in Surveillance , from the Wall Street Journal’s Big Data Blog, written by Reed Albergotti and Danny Yadron

The article “reveals” that the NSA has disguised itself as Facebook to gain access to the computers of targets of investigations.…

Continue Reading →

13 March Panel 7



Jeffrey Ritholtz

The Obama administration has come under fire in recent weeks for its failure to publicize the “Certificates of Demonstrated Competence” that the State Department fills out and submits to the Senate Foreign Relations Committee prior to nomination hearings for foreign ambassador candidates.…

Continue Reading →

February 27 Panel 08



Fanny Pelpel

This article deals with National Security Letters (NSL) and the gag order that is applied with regards to them in particular. This issue has generated a lot of tensions over the years, especially from a First Amendment perspective, leading some service providers such as Google, Facebook, Yahoo and Microsoft to file lawsuits before the Foreign Intelligence Surveillance Court.…

Continue Reading →

February 20 PANEL 09




Yael Tzipori

On January 30, 2014, a judge of the Southern District of Texas determined that there is no reasonable expectation of privacy in the metadata embedded in a photograph posted on the Internet. The defendant in the case, United States v.

Continue Reading →

February 13 PANEL 10




Angela Lelo

This article’s author discusses the influence that Sotomayor’s concurring opinion in U.S. v. Jones has already had on the White House, federal judges, and legal scholars. To recall, Sotomayor asserted in that case that the third party doctrine is no longer tenable in the digital age where individuals routinely convey a vast amount of information about themselves to third parties.…

Continue Reading →

Agricultural Privacy?

Here’s the story I mentioned at PRG today about farmers giving their farm data to big agricultural companies for analytic purposes. I think the article calls to mind the lack of focus on non-urban subjects when we talk about surveillance and privacy, something I’ve been thinking about recently since many of my truckers come from rural backgrounds.…

Continue Reading →

iBeacon might be a scary tracking tool. It might also become a Privacy Enhancing Technology

A recent article in Wired describes iBeacon, a new Apple technology that profoundly increases automatic information sharing capabilities between devices. Based on Bluetooth Low Energy technology is already built into new Apple and Android devices, and is spreading rapidly thanks to new products and services that support it.…

Continue Reading →