Index
A
Advanced persistent threat (APT),
120
All-Part Parliamentary Group on Medical Research,
147
Amnesty International and Liberty,
32
Android operating system,
76–77,
80
Anti-privacy activity,
132
Application Program Interfaces (APIs),
104
Armed Forces Security Agency (AFSA),
18
Army Security Agency (ASA),
18
Aspirational concept,
168
Associated Press (AP),
161
ATM
operator’s manual online,
184
B
Baby-related vouchers,
55
Biometrics
age of biometrics and big data, and tasks
safeguarding privacy in,
193
Clandestine identification of individuals,
189–190
Biometrics Commissioner,
186
Bloomberg’s cyber security conference,
28
Bluetooth-enabled devices,
113
Bradshaw, Marc,
British Council of Churches,
125
British Standards Institution,
191
C
Calabrese, Christopher,
66
Calcutt Committee on Privacy and Related Matters,
125
California Online Privacy Protection Act,
39
Canadian Privacy Commissioner,
130
Candy Crush saga game,
85,
92
Canvas fingerprinting,
58
CCTV
system,
Centre for Commercial Law Studies,
127
Cloud Legal Project in,
165
Chief Executive Officer (CEO),
122
Chief Information Officer (CIO),
112,
114
Chief Information Security Officers (CISOs),
113
CIA contractor,
CIA’s venture capital firm,
175
Cipher Bureau and Military Intelligence Branch Section 8,
17
Civil liberties groups,
26
Communications technology,
17,
163
Comprehensive National Cybersecurity Initiative,
176
Computerised tomography (CT) scanners,
147
Computing-Tabulating-Recording Company (CTR),
179
Congestion charging scheme,
171
Consumer rights bill,
142
‘Cookie Directive Debate’,
65
Council of Europe Data Protection Convention,
126
Counterproductive strategy,
38
Cowrie shells,
CPG brands and retailers,
52
first used in,
Currency, form of,
Cyber-attack
D
Data
minimization, principle of,
137,
170
Data brokerage industry,
58
privacy violation, sign up for,
49–53
Deficient oversight argument,
46
Democratic lawmakers,
143
Department for Communities and Local Government (DCLG),
191
Department of Energy,
143
Department of Health,
149
Department of Homeland Security,
187
Department of Justice,
31
Digital rights group demand progress,
31
Direct Marketing Association (DMA),
67
Director of National Intelligence,
23,
26
DNA
Database Strategy Board,
192
Domain awareness system,
187
Dr. Martin Luther King,
19
E
Economic and Social Research Council’s Administrative Data Research Network,
191
Effective enforcement strategy,
64
Electricity customer data
protecting, with code of conduct,
143
Electronic communication service,
Electronic Frontier Foundation (EFF),
94,
174,
187
E-mail
End-to-end encryption,
102,
139
Engineering and Physical Sciences Research Council,
192
Ethics, 21st century
European Centre for International Political Economy (ECIPE),
37
European Cloud Partnership,
35
European Convention on Human Rights,
32
European Court of Human Rights,
32
European Court of Justice,
37
European Data Protection Day,
131
European parliamentary report,
41
European privacy officer,
132
Charter of Fundamental Rights,
37
Data Protection Directive,
41
Data Protection Regulation,
145
internal security argument,
46
US safe harbor agreement,
35
Executive Order 12333,
22
F
age, medical privacy in,
160
Federal Communications Commission’s (FCC),
76
Federal Trade Commission (FTC),
Fingerprint authentication,
188
Foreign Intelligence Surveillance Act (FISA),
22
Fundamental rights argument,
46
G
Gartner’s Frank Buytendijk points,
52
General Data Protection Regulation,
37
Global social network,
90
Good government argument,
45
Google, , ,
22,
65,
67,
69,
71,
77,
86,
89,
194
data contained in,
data harvesting street view cars,
87
fine on,
street view collecting Wi-Fi data,
78
Google Engineer Amit Patel,
72
Government Communications Headquarters (GCHQ), ,
18
by privacy campaign groups,
32
Government surveillance programs,
20,
26
Graham Leach Bliley Act,
39
Gulf of Tonkin Incident,
18
Gulf of Tonkin Resolution,
19
H
Harvard dormitory facebook,
90
Health and Social Care Act of 2012,
150
Health and Social Care Information Centre (HSCIC),
148,
150,
153
Healthcare professionals,
152
Health Insurance Portability and Accountability Act (HIPAA),
39
facebook age, medical privacy in,
160
health records, selling of,
153–155
clearly identifiable data,
155
clearly identifiable data,
155
Heating, ventilation and air conditioning (HVAC),
111
I
In-built feedback mechanism,
98
Individuals privacy,
Industrial control systems,
176
Industrial programmable logic controllers,
113
Information, appetite for,
84–87
Information entropy concept,
184
Information Governance Alliance (IGA),
156
Information Security and Privacy,
170
Intelligence agencies,
21
Intelligence and Security Committee (ISC),
140
Intelligence/national security argument,
44
Interconnected computers,
69
International Commission of Jurists,
communications, interception of,
26
Internet Engineering Task Force (IETF),
35
Investigatory Powers Tribunal,
25,
32
J
Je Suis Charlie
Joint Chiefs of Staff,
28
Justice and Home Affairs Ministerial meeting in Athens, Greece in June 2014,
34
K
Knowledge-based matching,
56
KPMG’s Cyber Security department,
177
L
Law enforcement agencies,
135,
173
Liberty and Privacy International,
197
Local city generator,
163
Local Medical Committees Conference,
149
M
Malwarebytes Anti-Malware,
116
Marketing technology firm,
56
Massive Data Repository,
176
Mass surveillance argument,
45
Members of the European Parliament (MEP),
134
flagship operating system,
82
Millard, Christopher,
165
Mission data repository,
176
Mobile Offender Recognition and Information System (MORIS),
185
Mobile operating systems,
83,
86
N
National Data Guardian,
159
National health applications and infrastructure services,
151
National insurance number,
105
National programme for IT (NPfIT),
148
National Security Agency (NSA), ,
17,
18,
23
mass surveillance programs,
34
surveillance operations,
29
surveillance review board,
29
total internet traffic volume,
26
National security archive,
20
New America Foundation Open Technology Institute
New York City Police Department’s Computer Investigation and Technology Unit,
103
Next Generation Identification System,
185
National programme for IT (NPfIT),
148
Non-Governmental Organizations (NGO),
41
Non-profit policy research,
37
North Vietnamese Navy,
19
O
Olswang case,
Open whisper systems,
101
Optical surveillance system,
187
P
Paper money
appeared in, first,
Partner billing system,
116
Patient Protection and Affordable Care Act (PPACA),
160
Paul Buchheit
Pay data analytics firms,
51
Personal Data Notification & Protection Act,
142
Personal health information,
149
Pew Research Internet Project of 2014,
Phishing
Phone records program,
30
Phone’s fingerprint scanner,
189
Phone’s operating system,
188
Photo-sharing service
Police National Database,
186
Privacy
in aspect of freedom,
caution, about hackers,
11–13
definition for,
and Human Rights Act 1998,
consumer rights bill,
142
protecting electricity customer data with code of conduct,
143
safeguarding student privacy,
143
collaboration, need for,
130
Je Suis Charli, in wake of,
139–141
Private communications
Private organizations,
49
Product
at reasonable price,
Profiteering approach,
195
Public data collection,
126
Public Health England,
156
Public ledger,
Q
Queen Mary University of London,
127
R
Radio-frequency identification,
175
Real-time conversation,
12
Reuters cybersecurity Summit in Washington,
29
Rock paper scissors game,
110
Royal Society in London,
127
RVASec conference in Richmond, Virginia,
107
S
Safeguarding student privacy,
143
Samsung’s privacy policy,
174
Security
applications vendor, Splashdata,
183
Classification Appeals Panel,
20
spear phishing and social engineering,
107–124
Senate Intelligence Committee,
46
Senator for Massachusetts,
143
Sensitive customer information,
79
Sensitive personal data,
126
Sgt. Mike Blain of Pulaski County Sheriff’s Office,
104
Signal Security Agency (SSA),
18
‘Smart cities’ concept,
168
back to internet of things,
166–170
Smartphone
cameras,
wallet as money,
Smart TV detection zone,
174
Snapchat,
Snowden documents,
21,
23
reasons for
Social Engineering: The Art of Human Hacking,
122
as blessing and curse,
91–93
launching the facebook,
90–91
norm to suit yourself,
93–96
and over-sharing dangers of,
89–105
fundamental traits of,
105
Social security number,
105
Software payment system,
Spear-heading invasive population tracking technology,
178
Student Digital Privacy Act,
143
‘Stuxnet’ cyber-attack,
113
Super-Identity Project,
192
privacy violation, sign up for,
49–53
Symantec Endpoint Protection,
115
T
Target
Telecommunications,
26,
32
Telephony meta-data program,
29
The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our Culture,
72
Third party app,
Thomas Edison’s electricity network,
164
Threat intelligence operations
Traditional matching techniques,
56
Transmission Control Protocol,
70
U
Umbrella Law Enforcement Agreement,
34
United Kingdom
based newspaper,
based pharmaceutical chain,
50
intelligence agencies,
25
National Data Guardian,
150,
156
national DNA database,
192
parliament’s science and technology committee,
186
tax authority HM revenue and customs,
166
United States Senate Select Committee on Intelligence,
22
USA
Civil Rights Act 1964,
92
constitutional law,
Department of Commerce,
40
District Court for District of Columbia,
31
statutory law,
User agreement,
V
Vulnerable communities,
67
W
Web
transactional system,
171
Whatsapp
White House Big Data Survey,
Wi-Fi
Winter Activity Enthusiast,
66
World Trade Center in 2001,
27
World Wide Web (WWW),
69,
70
X
Y
Z
Zero-day vulnerabilities,
82,
83