<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>What&#039;s All This Brouhaha? &#187; Privacy</title>
	<atom:link href="https://whats.all.this.brouhaha.com/category/legal/privacy/feed/" rel="self" type="application/rss+xml" />
	<link>https://whats.all.this.brouhaha.com</link>
	<description>miscellaneous musings and random rantings</description>
	<lastBuildDate>Fri, 01 Nov 2019 06:31:54 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9</generator>
	<item>
		<title>Is privacy a lost cause?</title>
		<link>https://whats.all.this.brouhaha.com/2009/05/12/is-privacy-a-lost-cause/</link>
		<comments>https://whats.all.this.brouhaha.com/2009/05/12/is-privacy-a-lost-cause/#comments</comments>
		<pubDate>Tue, 12 May 2009 21:35:55 +0000</pubDate>
		<dc:creator><![CDATA[Eric]]></dc:creator>
				<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://whats.all.this.brouhaha.com/?p=768</guid>
		<description><![CDATA[When I see the frequent news stories about theft of personal data, such as the recent theft of medical records of more than 160,000 individuals from the University of California at Berkeley, I start to fear that Scott McNealy, former &#8230; <a href="https://whats.all.this.brouhaha.com/2009/05/12/is-privacy-a-lost-cause/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>When I see the frequent news stories about theft of personal data, such as the recent <a title="Hackers steal UC Berkeley health records" href="http://www.securityfocus.com/brief/960" target="_blank">theft of medical records</a> of more than 160,000 individuals from the University of California at Berkeley, I start to fear that Scott McNealy, former CEO of Sun, may have been correct when he said &#8220;<a title="Sun on Privacy: 'Get Over It'" href="http://www.wired.com/politics/law/news/1999/01/17538" target="_blank">You have zero privacy anyway. Get over it.</a>&#8221;</p>
<p>Computer and networking technology has allowed private data to be stored in databases to make it readily accessible to those who have a legitimate reason to access it, but in the process have made it entirely too susceptible to unauthorized access.Â  It is easy to blame this on programmers for writing shoddy software, and there certainly is some truth to that, but no matter how good the software is, there will still be problems with the people authorized to use the databases making mistakes such as using weak passwords.</p>
<p>Even if it&#8217;s a losing battle, we should fight tooth-and-nail to try to hold onto privacy.Â  As Dylan Thomas wrote, &#8220;Do not go gentle into that good night.Â  [...] Rage, rage against the dying of the light.&#8221;</p>
]]></content:encoded>
			<wfw:commentRss>https://whats.all.this.brouhaha.com/2009/05/12/is-privacy-a-lost-cause/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Surveillance state</title>
		<link>https://whats.all.this.brouhaha.com/2009/05/12/surveillance-state/</link>
		<comments>https://whats.all.this.brouhaha.com/2009/05/12/surveillance-state/#comments</comments>
		<pubDate>Tue, 12 May 2009 21:24:38 +0000</pubDate>
		<dc:creator><![CDATA[Eric]]></dc:creator>
				<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://whats.all.this.brouhaha.com/?p=766</guid>
		<description><![CDATA[A WIsconsin appeals court has issued a decision (HTML, PDF) that it is acceptable for the police to surreptitiously plant GPS tracking devices onto the cars of suspects without getting warrants, because doing so is not a search or seizure.Â  &#8230; <a href="https://whats.all.this.brouhaha.com/2009/05/12/surveillance-state/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>A WIsconsin appeals court has issued a decision (<a title="Wisconsin v. Sveum" href="http://www.wicourts.gov/ca/opinion/DisplayDocument.html?content=html&amp;seqNo=36414" target="_blank">HTML</a>, <a title="Wisconsin v. Sveum" href="http://www.wicourts.gov/ca/opinion/DisplayDocument.pdf?content=pdf&amp;seqNo=36414" target="_blank">PDF</a>) that it is acceptable for the police to surreptitiously plant GPS tracking devices onto the cars of suspects without getting warrants, because doing so is not a search or seizure.Â  Apparently the court doesn&#8217;t think that doing so violates anyone&#8217;s constitutionally protected rights.</p>
<p>That being the case, presumably they wouldn&#8217;t have any problem with citizens surreptitiously planting GPS tracking devices onto police cars.Â  WIth suitable distribution of the tracking information via the internet to mobile devices (e.g., smart phones), that could be quite useful for people that want to avoid speed traps, etc.</p>
<p>The appeals court did write that &#8220;We are also concerned about the private use of GPS surveillance devices.<span> [...] </span>Consequently, we urge the legislature to explore imposing limitations on the use of GPS and similar devices by both government and private actors.<span>&#8220;Â  I think the outcome of that is predicable.Â  The legislature will impose substantial limitations on the use of GPS trackers by private actors, and minimal or no limitations on their use by the government.</span></p>
<p>A New York appeals court just reached the opposite decision (<a title="People v. Weaver" href="http://www.nycourts.gov/ctapps/decisions/2009/may09/53opn09.pdf" target="_blank">PDF</a>), that the police should not plant GPS tracking devices without a warrant, citing Supreme Court Justice Brandeis&#8217; dissenting opinion in <a title="Olmstead v. United States" href="http://en.wikipedia.org/wiki/Olmstead_v._United_States" target="_blank">Olmstead v. United States</a>:</p>
<blockquote><p>â€œThe protection guaranteed by the Amendments [the Fourth and Fifth] is much broader in scope [than the protection of property]. The makers of our Constitution undertook to secure conditions favorable to the pursuit of happiness. They recognized the significance of man&#8217;s spiritual nature, of his feelings and of his intellect. They knew that only a part of the pain, pleasure and satisfactions of life are to be found in material things. They sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone &#8212; the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment. And the use, as evidence in a criminal proceeding, of facts ascertained by such intrusion must be deemed a violation of the Fifth.â€</p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://whats.all.this.brouhaha.com/2009/05/12/surveillance-state/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Google Latitude privacy</title>
		<link>https://whats.all.this.brouhaha.com/2009/02/16/google-latitude-privacy/</link>
		<comments>https://whats.all.this.brouhaha.com/2009/02/16/google-latitude-privacy/#comments</comments>
		<pubDate>Mon, 16 Feb 2009 09:01:00 +0000</pubDate>
		<dc:creator><![CDATA[Eric]]></dc:creator>
				<category><![CDATA[Blog/website/news comments]]></category>
		<category><![CDATA[Freedom and liberty]]></category>
		<category><![CDATA[National Security]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://whats.all.this.brouhaha.com/?p=741</guid>
		<description><![CDATA[Google has taken steps to address the privacy concerns over their Latitude service, and most people seem to be satisfied.Â  One thing I&#8217;m slightly surprised about is that no one seems to be particularly suspicious of what their statement Google &#8230; <a href="https://whats.all.this.brouhaha.com/2009/02/16/google-latitude-privacy/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Google has taken steps to address the privacy concerns over their Latitude service, and most people seem to be satisfied.Â  One thing I&#8217;m slightly surprised about is that no one seems to be particularly suspicious of what their statement</p>
<blockquote><p>Google stores only the most recent automatic update or location selection you manually entered on our servers.</p></blockquote>
<p>does NOT say, to wit, whether the data might be stored on servers other than &#8220;our servers&#8221;.</p>
<p>If DHS wants to track your location via your cell phone, they don&#8217;t really need Google&#8217;s help doing that.  On the other hand, if a private company is already collecting data on people&#8217;s movements, that must look like a mighty tempting target&#8230;</p>
]]></content:encoded>
			<wfw:commentRss>https://whats.all.this.brouhaha.com/2009/02/16/google-latitude-privacy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Suboptimal new computer experience &#8212; privacy vs. Mac OS X</title>
		<link>https://whats.all.this.brouhaha.com/2008/04/10/suboptimal-new-computer-experience-privacy-vs-mac-os-x/</link>
		<comments>https://whats.all.this.brouhaha.com/2008/04/10/suboptimal-new-computer-experience-privacy-vs-mac-os-x/#comments</comments>
		<pubDate>Fri, 11 Apr 2008 01:35:16 +0000</pubDate>
		<dc:creator><![CDATA[Eric]]></dc:creator>
				<category><![CDATA[Mac OS X]]></category>
		<category><![CDATA[Nonpareil]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[The Suboptimal Way]]></category>

		<guid isPermaLink="false">http://whats.all.this.brouhaha.com/?p=657</guid>
		<description><![CDATA[I just got a refurbished Apple Mac mini, with the 1.83 GHz Intel Core 2 Duo processor. It is mainly intended for use compiling my open source programs such as Nonpareil for Mac OS X. I am extremely surprised at &#8230; <a href="https://whats.all.this.brouhaha.com/2008/04/10/suboptimal-new-computer-experience-privacy-vs-mac-os-x/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>I just got a refurbished <a href="http://www.apple.com/" title="Apple" target="_blank">Apple</a> <a href="http://www.apple.com/macmini/" title="Mac mini" target="_blank">Mac mini</a>, with the 1.83 GHz Intel Core 2 Duo processor.  It is mainly intended for use compiling my open source programs such as <a href="http://nonpareil.brouhaha.com/" title="Nonpareil" target="_blank">Nonpareil</a> for Mac OS X.  I am extremely surprised at the user experience of booting <a href="http://www.apple.com/macosx/" title="Mac OS X" target="_blank">Mac OS X</a> Leopard for the first time, and very disappointed in Apple.</p>
<p>I&#8217;m used to new operating system installations wanting a very small amount of personal information from the user.  Windows asks for the user&#8217;s name and company, though it allows the user to leave the company blank, as would be typical for home users.  Fedora Core Linux asks for the users full name (not required) and a username.  Neither of these seem very onerous, and the reasons for requesting the user&#8217;s name are reasonably clear.  It&#8217;s less obvious why Microsoft wants a company name, but since you can omit it, I don&#8217;t much care.</p>
<p>Mac OS X, on the other hand, requires the user&#8217;s full name, postal address, phone number, expected place of use (home, small business, medium business, large business, etc), and industry.  It will not allow the user to proceed until this information is entered.  I don&#8217;t mind entering my name, but I&#8217;ll be damned if I&#8217;m going to tell my computer any of that other stuff without a very good reason.  If I don&#8217;t put personally identifying information into a computer, that makes it less likely that the information will be misused or compromised.  I&#8217;m pretty sure that the C compiler isn&#8217;t going to need any of that in order to compile my programs successfully.</p>
<p>The pages requesting the information have a button to view Apple&#8217;s privacy policy, which explains that Apple collects the information in order to provide an exceptional user experience.  Exceptionally bad, in my opinion.  I was put in the position of lying to the computer.  I put &#8220;n/a&#8221; for all the fields that would accept that, and all nines for the ZIP code and phone number.  I selected &#8220;home&#8221; for the place the computer will be used, though I wasn&#8217;t very happy about it.  I selected &#8220;other&#8221; for the industry.</p>
<p>Apple shouldn&#8217;t force the user to choose between revealing personal information for no good reason, and providing false information.  They should allow the user to skip providing the unnecessary information, or better yet, not even attempt to collect it.</p>
]]></content:encoded>
			<wfw:commentRss>https://whats.all.this.brouhaha.com/2008/04/10/suboptimal-new-computer-experience-privacy-vs-mac-os-x/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Personal data theft</title>
		<link>https://whats.all.this.brouhaha.com/2007/08/31/personal-data-theft/</link>
		<comments>https://whats.all.this.brouhaha.com/2007/08/31/personal-data-theft/#comments</comments>
		<pubDate>Fri, 31 Aug 2007 17:57:52 +0000</pubDate>
		<dc:creator><![CDATA[Eric]]></dc:creator>
				<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://whats.all.this.brouhaha.com/?p=584</guid>
		<description><![CDATA[Yesterday I received a mailed notice from Monster.com, stating that their database had been compromised, including my contact information. Fortunately I had not provided them with any information that I consider sensitive. Given how many such cases of personal data &#8230; <a href="https://whats.all.this.brouhaha.com/2007/08/31/personal-data-theft/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Yesterday I received a mailed notice from Monster.com, stating that their database had been compromised, including my contact information.  Fortunately I had not provided them with any information that I consider sensitive.</p>
<p>Given how many such cases of personal data theft or loss are reported, I wonder how many are covered up, and how many go undetected?</p>
<p>While I don&#8217;t have any ill will toward Monster.com, I think the only thing that would significantly reduce the number of cases of this nature would be to hold parties that collect personal data criminally liable for any misuse, loss, or theft of the data, with statutory damages.  As long as companies have only minimal liability for data theft, they are not going to take adequate precautions to prevent it.</p>
]]></content:encoded>
			<wfw:commentRss>https://whats.all.this.brouhaha.com/2007/08/31/personal-data-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SSN Database for Sale</title>
		<link>https://whats.all.this.brouhaha.com/2007/07/27/ssn-database-for-sale/</link>
		<comments>https://whats.all.this.brouhaha.com/2007/07/27/ssn-database-for-sale/#comments</comments>
		<pubDate>Fri, 27 Jul 2007 16:09:55 +0000</pubDate>
		<dc:creator><![CDATA[Eric]]></dc:creator>
				<category><![CDATA[Blog/website/news comments]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://whats.all.this.brouhaha.com/?p=569</guid>
		<description><![CDATA[Thinking about starting a lucrative career in identity theft? Don&#8217;t rely on stolen backup tapes! Buy our new database containing nearly one billion Social Security Numbers, many of which are actually valid. The list includes the Social Security Numbers of: &#8230; <a href="https://whats.all.this.brouhaha.com/2007/07/27/ssn-database-for-sale/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Thinking about starting a lucrative career in identity theft?  Don&#8217;t rely on <a href="http://tech.blorge.com/Structure:%20/2007/07/26/800000-stolen-social-security-numbers-a-22-year-old-scapegoat/" title="800,000 stolen social security numbers: a 22-year-old scapegoat?" target="_blank">stolen backup tapes</a>! Buy our new database containing nearly one billion Social Security Numbers, many of which are actually valid.  The list includes the Social Security Numbers of:</p>
<ul>
<li>     The US President, Vice President, and cabinet members</li>
<li>     US Senators and Representatives</li>
<li>     Board members and executives of Fortune 500 corporations</li>
</ul>
<p>and many more!</p>
<p>This SSN database available for sale on a DVD-R, and is updated monthly.  A single issue is available for $19.95 plus $4.95 shipping and handling.  A 12-month subscription is available for the disounted rate of $199.95 plus $29.95 shipping and handling.  Send orders with payment to:</p>
<blockquote><p>SSN Database Offer<br />
142 N. Milpitas Blvd. PMB 379<br />
Milpitas, CA  95035</p></blockquote>
<p>For a limited time only, with every order for the SSN Database we will include at no extra charge a complimentary copy of our ZIP Code Database and a complimentary copy of our Birth Date Database, together containing the ZIP Codes and birth dates of over 290 million US citizens and legal residents.  These databases have been carefully screened to ensure that every entry is valid.</p>
<p>Allow four to six weeks for delivery.</p>
<p><strong>Opt Out: </strong> If you wish to have your Social Security Number removed from our SSN database, mail a copy of your Social Security Card and a $1.95 processing fee to:</p>
<blockquote><p>SSN Database Opt Out<br />
142 N. Milpitas Blvd. PMB 379<br />
Milpitas, CA  95035</p></blockquote>
<p>For removal from our ZIP Code Database and Birth Data Database, mail a copy of your birth certificate and a $1.95 processing fee to:</p>
<blockquote><p>ZIP Code/Birth Date Database Opt Out<br />
142 N. Milpitas Blvd. PMB 379<br />
Milpitas, CA  95035</p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://whats.all.this.brouhaha.com/2007/07/27/ssn-database-for-sale/feed/</wfw:commentRss>
		<slash:comments>10</slash:comments>
		</item>
		<item>
		<title>Your world, delivered&#8230; to the NSA, MPAA, and RIAA</title>
		<link>https://whats.all.this.brouhaha.com/2007/07/24/your-world-delivered-to-the-nsa-mpaa-and-riaa/</link>
		<comments>https://whats.all.this.brouhaha.com/2007/07/24/your-world-delivered-to-the-nsa-mpaa-and-riaa/#comments</comments>
		<pubDate>Tue, 24 Jul 2007 17:24:58 +0000</pubDate>
		<dc:creator><![CDATA[Eric]]></dc:creator>
				<category><![CDATA[Blog/website/news comments]]></category>
		<category><![CDATA[Copyright]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://whats.all.this.brouhaha.com/?p=563</guid>
		<description><![CDATA[AT&#38;T now claims that they will deploy some kind of filtering to keep copyrighted content off their network, effectively spying for the MPAA and RIAA. No one has developed a reliable way to even identify copyrighted content, but even if &#8230; <a href="https://whats.all.this.brouhaha.com/2007/07/24/your-world-delivered-to-the-nsa-mpaa-and-riaa/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>AT&amp;T now claims that they will deploy some kind of filtering to keep copyrighted content off their network, effectively <a href="http://arstechnica.com/news.ars/post/20070613-att-willing-to-spy-for-nsa-mpaa-and-riaa.html?bub" title="AT&amp;T willing to spy for NSA, MPAA, and RIAA" target="_blank">spying for the MPAA and RIAA</a>.  No one has developed a reliable way to even identify copyrighted content, but even if that existed, how would they distinguish legitimate transfers of copyrighted content from unauthorized transfers?</p>
<p>It seems obvious that this is just more of their plan to run a protection racket, which is why they so vehemently oppose net neutrality.  What they really want is to only transport &#8220;legitimate&#8221; content from providers that pay them for the privilege.  Nevermind that the end user and the content provider are already paying AT&amp;T for the privilege of having their broadband internet connections; AT&amp;T wants to be paid again for the content.   &#8220;That&#8217;s a nice video you&#8217;ve got on your web site; it would be a shame if no one could watch it.&#8221;</p>
]]></content:encoded>
			<wfw:commentRss>https://whats.all.this.brouhaha.com/2007/07/24/your-world-delivered-to-the-nsa-mpaa-and-riaa/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Warrantless wiretaps not justified by national security claims</title>
		<link>https://whats.all.this.brouhaha.com/2007/04/20/warrantless-wiretaps-not-justified-by-national-security-claims/</link>
		<comments>https://whats.all.this.brouhaha.com/2007/04/20/warrantless-wiretaps-not-justified-by-national-security-claims/#comments</comments>
		<pubDate>Fri, 20 Apr 2007 23:23:05 +0000</pubDate>
		<dc:creator><![CDATA[Eric]]></dc:creator>
				<category><![CDATA[National Security]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://whats.all.this.brouhaha.com/?p=466</guid>
		<description><![CDATA[In Katz v. United States, 389 U.S. 347 (1967), Justice Douglas gives a concurring opinion in which he expresses serious concern over warrantless wiretaps: While I join the opinion of the Court, I feel compelled to reply to the separate &#8230; <a href="https://whats.all.this.brouhaha.com/2007/04/20/warrantless-wiretaps-not-justified-by-national-security-claims/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>In  Katz v. United States, 389 U.S. 347 (1967), Justice Douglas gives a concurring opinion in which he expresses serious concern over warrantless wiretaps:</p>
<blockquote><p>While I join the opinion of the Court, I feel compelled to reply to the separate concurring opinion of my Brother WHITE, which I view as a wholly unwarranted green light for the Executive Branch to resort to electronic eaves-dropping without a warrant in cases which the Executive Branch itself labels &#8220;national security&#8221; matters.</p>
<p>Neither the President nor the Attorney General is a magistrate. In matters where they believe national security may be involved they are not detached, disinterested, and neutral as a court or magistrate must be. Under the separation of powers created by the Constitution, the Executive Branch is not supposed to be neutral and disinterested. Rather it should vigorously investigate [389 U.S. 347, 360] and prevent breaches of national security and prosecute those who violate the pertinent federal laws. The President and Attorney General are properly interested parties, cast in the role of adversary, in national security cases. They may even be the intended victims of subversive action. Since spies and saboteurs are as entitled to the protection of the Fourth Amendment as suspected gamblers like petitioner, I cannot agree that where spies and saboteurs are involved adequate protection of Fourth Amendment rights is assured when the President and Attorney General assume both the position of adversary-and-prosecutor and disinterested, neutral magistrate.</p>
<p>There is, so far as I understand constitutional history, no distinction under the Fourth Amendment between types of crimes. Article III, 3, gives &#8220;treason&#8221; a very narrow definition and puts restrictions on its proof. But the Fourth Amendment draws no lines between various substantive offenses. The arrests in cases of &#8220;hot pursuit&#8221; and the arrests on visible or other evidence of probable cause cut across the board and are not peculiar to any kind of crime.</p>
<p>I would respect the present lines of distinction and not improvise because a particular crime seems particularly heinous. When the Framers took that step, as they did with treason, the worst crime of all, they made their purpose manifest.</p></blockquote>
<p>I wonder what Justice Douglas would have written had he considered a case concerning FISA.</p>
]]></content:encoded>
			<wfw:commentRss>https://whats.all.this.brouhaha.com/2007/04/20/warrantless-wiretaps-not-justified-by-national-security-claims/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>MPAA and RIAA ask Congress for permission to commit fraud</title>
		<link>https://whats.all.this.brouhaha.com/2007/04/09/mpaa-and-riaa-ask-congress-for-permission-to-commit-fraud/</link>
		<comments>https://whats.all.this.brouhaha.com/2007/04/09/mpaa-and-riaa-ask-congress-for-permission-to-commit-fraud/#comments</comments>
		<pubDate>Mon, 09 Apr 2007 17:51:59 +0000</pubDate>
		<dc:creator><![CDATA[Eric]]></dc:creator>
				<category><![CDATA[Blog/website/news comments]]></category>
		<category><![CDATA[Copyright]]></category>
		<category><![CDATA[Privacy]]></category>

		<guid isPermaLink="false">http://whats.all.this.brouhaha.com/?p=453</guid>
		<description><![CDATA[The HP &#8220;pretexting&#8221; scandal was publicized in such a way as to make people think it was a new problem, and required new legislation.Â  Apparently it didn&#8217;t occur to anyone that the very term &#8220;pretexting&#8221; is a euphemism to disguise &#8230; <a href="https://whats.all.this.brouhaha.com/2007/04/09/mpaa-and-riaa-ask-congress-for-permission-to-commit-fraud/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>The HP &#8220;pretexting&#8221; scandal was publicized in such a way as to make people think it was a new problem, and required new legislation.Â  Apparently it didn&#8217;t occur to anyone that the very term &#8220;pretexting&#8221; is a euphemism to disguise the nature of the act, which is actually &#8220;fraud.&#8221;Â  Fraud is defined by <a href="http://en.wiktionary.org/wiki/fraud" title="Wiktionary - fraud" target="_blank">Wiktionary</a> as &#8220;an act of deception carried out for the purpose of unfair, undeserved, and/or unlawful gain, esp. financial gain.&#8221;Â  For instance, it is unfair and undeserved for HP to get their board member&#8217;s personal telephone records by paying someone to call the phone company pretending to be that board member.</p>
<p>Now that Congress is considering specific &#8220;pretexting&#8221; legislation, the LA Times reports that <a href="http://www.latimes.com/business/la-fi-pretext7apr07,1,1936238.story?coll=la-headlines-business&amp;ctrack=1&amp;cset=true" title="Recording, movie industries lobby for permission to deceive" target="_blank">the MPAA and RIAA are asking to be exempted from it</a>.Â  In other words, they are asking Congress for permission to commit fraud.Â  [via <a href="http://yro.slashdot.org/article.pl?sid=07/04/07/1917255" title="RIAA &amp; MPAA Seek Authority to Pretext" target="_blank">Slashdot</a> and <a href="http://www.theinquirer.net/default.aspx?article=38791" title="RIAA and movie inudstry want to pretext" target="_blank">The Inquirer</a>]</p>
]]></content:encoded>
			<wfw:commentRss>https://whats.all.this.brouhaha.com/2007/04/09/mpaa-and-riaa-ask-congress-for-permission-to-commit-fraud/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Airport security theater: forgetting to remove laptop from bag</title>
		<link>https://whats.all.this.brouhaha.com/2007/01/08/airport-security-theater-forgetting-to-remove-laptop-from-bag/</link>
		<comments>https://whats.all.this.brouhaha.com/2007/01/08/airport-security-theater-forgetting-to-remove-laptop-from-bag/#comments</comments>
		<pubDate>Tue, 09 Jan 2007 03:17:02 +0000</pubDate>
		<dc:creator><![CDATA[Eric]]></dc:creator>
				<category><![CDATA[Freedom and liberty]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Travel]]></category>

		<guid isPermaLink="false">http://whats.all.this.brouhaha.com/?p=397</guid>
		<description><![CDATA[At the security checkpoint, they usually tell you to remove your laptop from a bag and put it in a bin to be xrayed separately from the bag. And to take your shoes off, etc. Yesterday they didn&#8217;t tell me &#8230; <a href="https://whats.all.this.brouhaha.com/2007/01/08/airport-security-theater-forgetting-to-remove-laptop-from-bag/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>At the security checkpoint, they usually tell you to remove your laptop from a bag and put it in a bin to be xrayed separately from the bag.  And to take your shoes off, etc.</p>
<p>Yesterday they didn&#8217;t tell me to do that, and I&#8217;d forgotten about it, so I just sent my entire backback including laptop through the scanner.</p>
<p><span id="more-397"></span><br />
I was expecting them to pull one of my bags aside for manual screening, because it contains a CPAP machine, and they always manually screen those now.  (I have no idea why, as a CPAP machine isn&#8217;t the least bit dangerous, nor does it look particularly strange on an xray.)  But because of the laptop, they had to manually screen both of my bags.</p>
<p>They removed the laptop from the backpack and swabbed it.  Then they ran the backpack (but not the laptop) through the xray again.</p>
<p>I can&#8217;t think of any rational basis for the manual screening of CPAP machines after they&#8217;ve been xrayed, nor why a laptop must be xrayed separately from a bag.  I&#8217;m fairly sure that this is just another case of &#8220;security theater,&#8221; trying to make the public feel like something is being done to protect them, even if the so-called security measures are actually silly.</p>
]]></content:encoded>
			<wfw:commentRss>https://whats.all.this.brouhaha.com/2007/01/08/airport-security-theater-forgetting-to-remove-laptop-from-bag/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
