Online Privacy

  • Previous Page Disabled
  • 1
  • 2
  • Next Page
Lessons From the Celebrity iCloud Photo Breach

Lessons From the Celebrity iCloud Photo Breach

By Chris Soghoian, Principal Technologist and Senior Policy Analyst, ACLU Speech, Privacy, and Technology Project at 12:14pm
Based on initial media reports, it seems that intimate, private photographs from several celebrities' online accounts have been accessed without their consent and widely shared on the Internet. For now, many details about the breach (or breaches) remain unclear. One working theory, which is supported by anecdotal evidence, suggests that a security vulnerability in Apple's iCloud service may have been exploited to gain access to the celebrities' accounts and download their photos.
Beware the Dangers of Congress’ Latest Cybersecurity Bill

Beware the Dangers of Congress’ Latest Cybersecurity Bill

By Sandra Fulton, ACLU Washington Legislative Office at 5:52pm

A new cybersecurity bill poses serious threats to our privacy, gives the government extraordinary powers to silence potential whistleblowers, and exempts these dangerous new powers from transparency laws.

The Cybersecurity Information Sharing…

iPhone by Karlis Dambrans

Apple Throws Down Privacy Gauntlet

By Chris Soghoian, Principal Technologist and Senior Policy Analyst, ACLU Speech, Privacy, and Technology Project at 5:37pm

Apple made big news today by announcing that they are no longer able to extract data from iOS devices for law enforcement agencies. The company had, for several years, offered a popular service for police in which it would extract data from seized…

Crop of photo by Thomas Hawk via Flickr

To Protect Privacy, Utah Attorney General Gives Away Some of His Power

By Kade Crockford, Director, ACLU of Massachusetts Technology for Liberty Project at 6:10pm

In February 2014, the attorney general for the state of Utah did something remarkable, something that law enforcement officials hardly ever do: He willingly gave away some of his power. The power was too great, he said, and the potential for abuse…

Privacy Please laptop

How to Protect the Most Privacy with the Least Effort: Change Search Engines

By Jay Stanley, Senior Policy Analyst, ACLU Speech, Privacy & Technology Project at 1:15am

If you use Google, Yahoo, Bing, or any other service that tracks your search terms, there is no reason not to change search engines today.

When you do a search with these companies, they log your IP address and search terms, and store that…

Edward Snowden

The Tech Community Can Put Out the Fire the NSA Started

By Chris Soghoian, Principal Technologist and Senior Policy Analyst, ACLU Speech, Privacy, and Technology Project at 1:23pm

This piece originally ran at the Guardian.

“You are the firefighters,” National Security Agency whistleblower Edward Snowden told a tech savvy audience here yesterday, during my conversation with him at the SXSW festival. “The…

Photo of ACLU v. Clapper argument in Second Circuit

Nude Celebs and the NSA

By Jay Stanley, Senior Policy Analyst, ACLU Speech, Privacy & Technology Project at 1:49pm

Writing in the New Republic, Yishai Schwartz notes the confluence of two privacy stories yesterday: the theft of celebrities’ private nude photos stored in Apple’s iCloud, and my colleague Alexander Abdo’s argument before the Second Circuit Court…

This Revolution Should Not Be Televised

This Revolution Should Not Be Televised

By Lee Rowland, Staff Attorney, ACLU Speech, Privacy & Technology Project at 4:10pm

(Updated below)

The Prince George's County Police Department in Maryland announced this week that it will be live-tweeting a prostitution sting. With breathless glee, the press release tells us that "PGPD's Vice Unit will conduct a prostitution…

Invasion of the Data Snatchers: Big Data and the Internet of Things Means the Surveillance of Everything

Invasion of the Data Snatchers: Big Data and the Internet of Things Means the Surveillance of Everything

By Catherine Crump, Staff Attorney, ACLU Speech, Privacy and Technology Project & Matthew Harwood, Media Strategist, ACLU at 11:18am

This piece originally ran at TomDispatch.com.

Estimates vary, but by 2020 there could be over 30 billion devices connected to the Internet. Once dumb, they will have smartened up thanks to sensors and other technologies embedded in…

Finger pressing security button on keyboard

Protect our Privacy – Protect our Metadata

By Chris Conley, Staff Attorney, ACLU of Northern California Technology and Civil Liberties Project at 10:05am

Imagine bringing a date home for dinner. You put the laptop away and mute your phone. You prepare a gourmet home-cooked meal for two, queue up a selection of romantic songs and pick out a movie to watch after dinner. As the evening winds down, your…

  • Previous Page Disabled
  • 1
  • 2
  • Next Page
Statistics image