Index

A
‘Abilitec’, 57
users, 62
Active Directory, 116
Acxiom, 57, 62, 65, 194, 196
Adobe flash player, 119
AdRoll, 60
Advanced persistent threat (APT), 120
Affordable Care Act (ACA), 160, See also ObamaCare
Aggregate data, 154, 197
All-Part Parliamentary Group on Medical Research, 147
Amazon, 71, 173
Amnesty International and Liberty, 32
Android operating system, 76–77, 80
Anonymized data, 154
Anti-privacy activity, 132
Anti-virus firms, 82
Anti-virus tool, 115
AOL helpdesk, 118
Apple, 69
Appstore, 86, 104
iCloud Drive service, 87
iPhone 6, 188
Safari browser, 7, 78
Application Program Interfaces (APIs), 104
Armed Forces Security Agency (AFSA), 18
Army Security Agency (ASA), 18
Aspirational concept, 168
Associated Press (AP), 161
AstraZeneca, 153
ATM
operator’s manual online, 184
security, 184
B
Baby-related vouchers, 55
BackRub, 71
Berners-Lee, Tim, 70
Biometrics
age of biometrics and big data, and tasks
safeguarding privacy in, 193
benefits of, 186
body as password, 185–187
Clandestine identification of individuals, 189–190
conclusions, 193–195
and future, 183–197
future of, 188
linking biometric data, 191–192
mobile biometrics, 188–189
risks of, 186, 187
scanner, 188
solution, 192–193
technology, 188
Biometrics Commissioner, 186
Black chambers, 18
Bloomberg’s cyber security conference, 28
Blueprint, 142
Bluetooth beacons, 113
Bluetooth-enabled devices, 113
Blu-ray player, 60
B-Movie, 163
Bot-nets, 112
Bradshaw, Marc, 8
British Council of Churches, 125
British law, 67
British Standards Institution, 191
Broken privacy, 55–64
C
Calabrese, Christopher, 66
Calcutt Committee on Privacy and Related Matters, 125
California Online Privacy Protection Act, 39
Canadian Privacy Commissioner, 130
Candy Crush saga game, 85, 92
Canvas fingerprinting, 58
CARE.DATA programme, 149, 154
Caveat emptor, 50
CCTV
cameras, 190
network, 187
system, 9
Centre for Commercial Law Studies, 127
Cloud Legal Project in, 165
Chaos Computer Club, 189
Chief Executive Officer (CEO), 122
Chief Information Officer (CIO), 112, 114
Chief Information Security Officers (CISOs), 113
Chrome browser, 83
CIA contractor, 5
CIA plan, 20
CIA’s venture capital firm, 175
Cipher Bureau and Military Intelligence Branch Section 8, 17
Cisco, 180
Citation, 70–74
Civil liberties groups, 26
Clash of Clans game, 92
Cloud legal project, 127
Cloud security, 166
Cloud services, 166
Cluster analysis, 137
Commerce Department, 144
Communications technology, 17, 163
Compelling argument, 49
Comprehensive National Cybersecurity Initiative, 176
Computerised tomography (CT) scanners, 147
Computing-Tabulating-Recording Company (CTR), 179
Congestion charging scheme, 171
Consumer rights bill, 142
Convention, 126
‘Cookie Directive Debate’, 65
Cooley, Thomas, 125
Corporate security, 123
Cost recovery, 153
Council of Europe Data Protection Convention, 126
Counterproductive strategy, 38
Cowrie shells, 3
CPG brands and retailers, 52
Credit cards, 3, 51
first used in, 3
Creepy lines, 78–84
The Crimson, 90
Currency, form of, 3
Customer privacy, 27
Cyber-attack
forms of, 114
Cyber criminals, 17
Cyber markets, 117
Cyber security, 28, 112
professionals, 113
Cyber-threats, 30
D
Data
communications bill, 140
controllers, 139
minimization, principle of, 137, 170
mining, 53–55
processing, 37
processors, 138
Data analyst, 54
Data brokerage industry, 58
Data brokers, 49, 65, 66
broken privacy, 55–64
data mining, 53–55
privacy violation, sign up for, 49–53
Data protection, 93
authorities, 131
circles, 137
directive, 195
laws, 131, 169
legislation, 63
registrar, 126
regulation, 41, 195
Data Protection Act, 126, 129, 193
of 1984, 141
of 1998, 126, 193
framework, 128
DCC gateway, 173
Debit cards, 51
Deficient oversight argument, 46
Democratic lawmakers, 143
Department for Communities and Local Government (DCLG), 191
Department of Energy, 143
Department of Health, 149
Department of Homeland Security, 187
Department of Justice, 31
Digital information, 10
Digital privacy, 93
Digital rights group demand progress, 31
Direct Marketing Association (DMA), 67
Director of National Intelligence, 23, 26
DLA piper, 129
DNA
Database Strategy Board, 192
fingerprints, 186
profiles, 186, 187, 192
Dog Owner, 66
Domain awareness system, 187
Domain name system, 70
Dr. Martin Luther King, 19
E
Economic and Social Research Council’s Administrative Data Research Network, 191
Effective enforcement strategy, 64
Electricity customer data
protecting, with code of conduct, 143
Electronic communication service, 6
Electronic Frontier Foundation (EFF), 94, 174, 187
E-mail
address, 91
malware, format of, 118
End-to-end encryption, 102, 139
Engineering and Physical Sciences Research Council, 192
Ethics, 21st century
for social media, 97–102
European Centre for International Political Economy (ECIPE), 37
economists, 38
European Cloud Partnership, 35
European Commission, 34, 74, 126, 131, 133
level, 34
European Convention on Human Rights, 32
European Council, 41
European Court of Human Rights, 32
European Court of Justice, 37
European Data Protection Day, 131
European governments, 39
European parliamentary report, 41
European privacy officer, 132
European Union (EU), 47
Charter of Fundamental Rights, 37
Data Protection Directive, 41
95/46/EC, 138
Data Protection Regulation, 145
internal security argument, 46
member states, 38
policymakers, 34
in privacy laws, 130–135
privacy regulations, 133
US safe harbor agreement, 35
Evil concept, 69
Excel file, 119
Executive Order 12333, 22
F
Facebook, 27, 77, 185, 190
account, 12, 13
age, medical privacy in, 160
applications, 92
launched in, 89
Facial recognition software, 74, 186, 187, 189
Farmville game, 92
Fazio’s systems, 116
FBI director, 43
Federal Communications Commission’s (FCC), 76
Federal law, 116
Federal Trade Commission (FTC), 7
Commissioner, 67
guidance, 73
privacy order, 64
workshop, 66
Fingerprint authentication, 188
FireEye, 114
software, 114
tool, 115
‘Five Eyes’, 17
Fluorescent lamps, 163
Foreign Intelligence Surveillance Act (FISA), 22
of 1978, 20
Amendments Act 2008, 26
Free services, 4, 61
Friendster, 91
Fundamental rights argument, 46
G
Gartner’s Frank Buytendijk points, 52
General Data Protection Regulation, 37
Geo-tagging, 103
Girls Around Me app, 103, 121
GlaxoSmithKline, 153
Global social network, 90
Gmail, 6, 12, 22
servers, 25
users, 81, 82
Good government argument, 45
Google, 6, 7, 22, 65, 67, 69, 71, 77, 86, 89, 194
advertisements, 81
bank account, 72
business model, 77
data contained in, 7
data harvesting street view cars, 87
fine on, 7
genesis, 70
private cloud, 24
problem for, 24
rifles, 10
search engine, 77
servers, 25
service CNET, 25
social network, 80
street view collecting Wi-Fi data, 78
Google Cloud, 23
Google Engineer Amit Patel, 72
Google Flight Search, 73
Google Glass, 74–75
Google Hotel Finder, 73
Google Play store, 84
Google Plus, 80, 93, 100
Google Shopping, 83
Government Communications Headquarters (GCHQ), 5, 18
by privacy campaign groups, 32
project, 25
Government surveillance programs, 20, 26
GP surgeries, 148
Graham, Christopher, 128
Graham Leach Bliley Act, 39
Guardian newspaper, 28
Guardian readers, 28
Gulf of Tonkin Incident, 18
Gulf of Tonkin Resolution, 19
H
Hackers, 85, 118, 122
Hacking group, 121
Hacking technique, 105
Hand sanitizers, 53
Harvard dormitory facebook, 90
Health and Social Care Act of 2012, 150
Health and Social Care Information Centre (HSCIC), 148, 150, 153
systems, 155
Healthcare.gov, 161, 180
Healthcare professionals, 152
Health industry, 147
privacy, 94
Health Insurance Portability and Accountability Act (HIPAA), 39
Health, privacy and, 147–162
amount of, 156–160
CARE.DATA, 148–153
facebook age, medical privacy in, 160
fears, 155–156
health records, selling of, 153–155
aggregate data, 154
anonymized data, 154
clearly identifiable data, 155
pseudonymized data, 154–155
ObamaCare about privacy, 160–162
Health records, 148
selling of, 153–155
aggregate data, 154
anonymized data, 154
clearly identifiable data, 155
pseudonymized data, 154–155
Heating, ventilation and air conditioning (HVAC), 111
firm, 115
Hotmail, 11
HTTPS, 87
Hypertext, 70
I
IBM, 180
ICO, 155
Identifiable data, 155
Identity theft, 15
for social media, 102–105
tackling, 142–143
In-built feedback mechanism, 98
Individuals privacy, 2
Industrial control systems, 176
Industrial programmable logic controllers, 113
Information, appetite for, 84–87
Information Commissioner, 128, 134, 141
Office, 8, 76, 186
Information entropy concept, 184
principles of, 184
Information Governance Alliance (IGA), 156
Information Security and Privacy, 170
Instagram, 96
Intelligence agencies, 21
Intelligence and Security Committee (ISC), 140
Intelligence/national security argument, 44
Interconnected computers, 69
International Commission of Jurists, 1
Internet, 2, 102
architecture, 38
based communications, 26
communications, interception of, 26
fridge, 167, 172
protocol, 36
services, 10
traffic, 118
user, 59
Internet Engineering Task Force (IETF), 35
Internet of things, 166–170, 180
problems with, 170
Investigatory Powers Tribunal, 25, 32
IP address, 86
IPT’s website, 26
J
JavaScript tag, 58
Je Suis Charlie
of privacy laws, 139–141
Joint Chiefs of Staff, 28
Justice and Home Affairs Ministerial meeting in Athens, Greece in June 2014, 34
Justice Department, 30
K
Keith Alexander, 22
Knowledge-based matching, 56
KPMG’s Cyber Security department, 177
L
Law enforcement agencies, 135, 173
Leibowitz, Jon, 64
LIBE committee, 134
Liberty and Privacy International, 197
Living Constitution, 165
Load disaggregator, 175
Local city generator, 163
Localization, 36
Local Medical Committees Conference, 149
M
Mail order responder, 66
Malware, 123
forms of, 113
Malwarebytes Anti-Malware, 116
Marketing technology firm, 56
Massive Data Repository, 176
Mass surveillance argument, 45
MasterCard, 51
McAfee, 82
Mechanical, Fazio, 117
Media vilification, 97
Members of the European Parliament (MEP), 134
Microsoft, 12, 27, 69, 82, 86
flagship operating system, 82
Microwave radiation, 173
Millard, Christopher, 165
MINARET operation, 19
Mission data repository, 176
Mobile mixers, 66
Mobile Offender Recognition and Information System (MORIS), 185
Mobile operating systems, 83, 86
MSN messenger, 12
MUSCULAR program, 20, 25, 26, 42
MySpace, 91, 95
N
National Data Guardian, 159
National health applications and infrastructure services, 151
National insurance number, 105
National programme for IT (NPfIT), 148
National Security Agency (NSA), 5, 17, 18, 23
chief analyst, 22
historical study, 19
mass surveillance programs, 34
operations, 22
security analyst, 26
surveillance operations, 29
surveillance review board, 29
report, 43
total internet traffic volume, 26
National security archive, 20
Neoface system, 190
Neural plasticity, 107
New America Foundation Open Technology Institute
policy director of, 30
New York City Police Department’s Computer Investigation and Technology Unit, 103
Next Generation Identification System, 185
NHS, 160
England, 159
National programme for IT (NPfIT), 148
number, 154
Non-Governmental Organizations (NGO), 41
Non-profit policy research, 37
NoPlaque, 52
North Vietnamese Navy, 19
O
ObamaCare, 160
about privacy, 160–162
Obfuscation services, 99
Olswang case, 7
Open rights group, 140
Open whisper systems, 101
Optical surveillance system, 187
Organizations, 197
OSX operating system, 87
Overarching service, 15
P
Paper money
appeared in, first, 3
Partner billing system, 116
Password, 183
Patient Protection and Affordable Care Act (PPACA), 160
Patriot Act, 29
Paul Buchheit
Gmail creator, 72
Pay data analytics firms, 51
Payment card firms, 55
PDF file, 119, 122
Personal Data Notification & Protection Act, 142
Personal health information, 149
Pew Research Center, 142
Pew Research Internet Project of 2014, 2
Phishing
with or without a spear, 117–119
Phone records program, 30
Phone’s fingerprint scanner, 189
Phone’s operating system, 188
Photo-sharing service
Instagram, 104
Snapchat, 128
Pickpockets, 108
PIN system, 188
Plasticity, 107
Plastic thinking test, 107–109
Poison Ivy, 119
Police National Database, 186
Pregnancy score, 53
Priming, 109
PRISM, 26
Privacy
amount of, 156–160
in aspect of freedom, 2
better product for, 2–5
Bill of Rights, 142
care about, 8–11
caution, about hackers, 11–13
definition for, 1
fears, 155–156
free offers in, 5–8
fuss about, 1–2
and Human Rights Act 1998, 2
notices, 136
policy, 136
related legislation, 126
serious business, 13–15
threats to, 17
violations, 102
sign up for, 49–53
Privacy International, 32, 33, 125
Fielder, 40
and Liberty, 26
Privacy laws, 125–145
across the pond, 141–143
consumer rights bill, 142
protecting electricity customer data with code of conduct, 143
safeguarding student privacy, 143
tackling identity theft, 142–143
collaboration, need for, 130
criticism of reforms, 143–145
EU in, 130–135
Je Suis Charli, in wake of, 139–141
new rules in, 135–139
quick fix, 145
US vs. UK laws, 128–130
Private communications
UK authorities of, 26
Private data, 123
Private organizations, 49
Processing power, 164
Product
at reasonable price, 2
Profiteering approach, 195
Pseudonymized data, 154–155
Public data collection, 126
Public Health England, 156
Public internet, 23
Public ledger, 3
Q
Queen Mary University of London, 127
R
Radar technology, 120
Radio-frequency identification, 175
Radio transmitter, 163
Realism argument, 44
Real-time conversation, 12
Retail loyalty cards, 49
Reuters cybersecurity Summit in Washington, 29
RFID chip, 173
Rock paper scissors game, 110
Royal Mail service, 151
Royal Society in London, 127
RSA security, 119, 120
discovers, 119–123
RVASec conference in Richmond, Virginia, 107
S
Safeguarding student privacy, 143
Samsung Galaxy S5, 188
Samsung Galaxy S6, 188
Samsung’s privacy policy, 174
Schmidt, Eric, 74
Schnitt, Barry, 95
Screening services, 151
Security
applications vendor, Splashdata, 183
Classification Appeals Panel, 20
departments, 124
experts, 120
firm, Veracode, 85
policies, 172
professionals, 108
spear phishing and social engineering, 107–124
technology, 121
vendors, 114
Senate Intelligence Committee, 46
Senator for Massachusetts, 143
Sensitive customer information, 79
Sensitive personal data, 126
Sensors, 175
networks, 167
Sgt. Mike Blain of Pulaski County Sheriff’s Office, 104
Shady app, 86
Shady areas, 78–84
Signal Security Agency (SSA), 18
Silicon Valley, 75
firms, 93
Skype, 28
‘Smart cities’ concept, 168
Smart grid, 177
back to internet of things, 166–170
dangers of being smart, 172–174
data trawling, 170–172
internet of, 163–180
point of, 164–166
striding over creepy line, 174–176
Smart meter systems, 96, 172, 173, 177
Smartphone
cameras, 9
wallet as money, 4
Smart TV detection zone, 174
Snapchat, 4
Snoopers Charter, 140
Snowden documents, 21, 23
Snowden, Edward, 17
Snowden revelations, 17–47, 49
about them, 40–44
history books, 17–18
incidents in, 18–20
PLUS CA change, 32–40
PRISM, 25–32
reasons for
to act, 45–47
not to act, 44–45
revelations, 20–25
Snowflake, 109–111
Social Engineering: The Art of Human Hacking, 122
Social media, 98, 122
as blessing and curse, 91–93
dangers of, 102
identity theft, 102–105
launching the facebook, 90–91
norm to suit yourself, 93–96
and over-sharing dangers of, 89–105
21st century ethics, 97–102
Social networks, 100, 101, 196
fundamental traits of, 105
MySpace, 185
providers, 99
Social security number, 105
Software payment system, 3
Spear-heading invasive population tracking technology, 178
Steinhafel, Gregg, 117
Street View, 75–76
Student Digital Privacy Act, 143
‘Stuxnet’ cyber-attack, 113
Super-Identity Project, 192
Supermarkets, 49, 53
broken privacy, 55–64
data mining, 53–55
privacy violation, sign up for, 49–53
profit, 52
Symantec Endpoint Protection, 115
T
Target
breach, 116
cash registers, 115
by name, 111–117
security staff, 114
servers, 112
Telecom carriers, 30
Telecommunications, 26, 32
firm, 77
Telegraph, 42
Telephony meta-data program, 29
TEMPORA program, 32
Terrorism argument, 44
Tesla coil, 163
TextSecure, 101
The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our Culture, 72
Third party app, 4
Thomas Edison’s electricity network, 164
Threat intelligence operations
McAfee director of, 116
TOR network, 99
Traditional matching techniques, 56
Transmission Control Protocol, 70
Treason argument, 44
Trip Advisor, 61
Truman, H. S., 18
Twitter, 61, 67, 97, 121
U
Umbrella Agreement, 40
Umbrella Law Enforcement Agreement, 34
United Kingdom
based newspaper, 8
based pharmaceutical chain, 50
intelligence agencies, 25
legal systems, 165
National Data Guardian, 150, 156
national DNA database, 192
parliament’s science and technology committee, 186
supermarket chains, 50
tax authority HM revenue and customs, 166
United States Senate Select Committee on Intelligence, 22
UNIX servers, 57
Urban Scrambler, 66
USA
Civil Rights Act 1964, 92
cloud computing, 35
Congress, 19
constitution, 26
constitutional law, 1
Department of Commerce, 40
District Court for District of Columbia, 31
enforcement system, 64
first amendment, 19
Freedom Act, 31
intelligence agencies, 22, See also Intelligence agencies
legal systems, 165
Library of Congress, 92
privacy, 127
laws, 129, 141
senators, 161
statutory law, 1
vs. UK privacy laws, 128–130
User agreement, 5
V
Virtual network, 114
Vulnerable communities, 67
W
Walt Disney Company, 77
Watergate Scandal, 20
Web
advertising, 60
master, 119
search service, 89
transactional system, 171
Western Union, 18
Whatsapp
servers, 101
WhiteHat Security, 121
White House Big Data Survey, 2
Wi-Fi
data, 81
networks, 76
password, 76
signals, 170, 173
Windows, 113
7 and 8.1, 83
Winter Activity Enthusiast, 66
Wiretap Law, 81
Wi-Spy, 76
Word document, 119
Workload, 57
World of Warcraft, 14
World Trade Center in 2001, 27
World Wide Web (WWW), 69, 70
X
X-ray viewers, 147
Y
Yahoo, 22, 25
Yardley, H. O., 18
Yosemite wham, 87
Younger Committee, 125, 126
YouTube, 72
Z
Zero-day vulnerabilities, 82, 83
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.17.29.48