40 States Are Addressing K-12 Data Privacy Laws. Is Yours One of Them?
By B.N. Frank Internet user data collection for the purpose of marketing products and services to users as well as selling their data to third…
By B.N. Frank Internet user data collection for the purpose of marketing products and services to users as well as selling their data to third…
By B.N. Frank Data collection for the purpose of marketing more products and services to customers as well as selling customer data to third parties…
By Janet Phelan As the country swings further towards despotism, some interesting and telling cases are being filed in the courts, in an effort to…
By The Rutherford Institute WASHINGTON, D.C. — The U.S. Supreme Court has refused to stop police from using hidden cameras to secretly and warrantlessly record…
By Steven Maxwell Biometric security measures are becoming routine. Once considered a futuristic technology — biometrics often featured in science fiction across mediums — iris…
By Patrick Wood According to popular tech expert, Rob Braxman, “There’s a secret network in operation today and this network can send centralized commands from…
By B.N. Frank Despite increasing opposition to facial recognition technology, significant risks associated with its use, and lawsuits (see 1, 2, 3, 4, 5, 6),…
What Cambodia is implementing today will spread like wildfire as a means to end free speech around the world. This has always been the plan…
By Adam Schwartz Face surveillance is a growing menace to racial justice, privacy, free speech, and information security. So EFF supports bans on government use…
By Alexa Schwerha A George Washington University pilot program ‘used locational data tracked by Wi-Fi access points’ to map student and employee movements on campus….
By B.N. Frank Even though Meta (formerly Facebook) stopped using facial recognition technology on its platform last year and promised to delete data on over…
By B.N. Frank Tracking technology existed before Apple introduced its AirTags. However, AirTags seem to have made it cheaper and easier to stalk unsuspecting people. …
Marketed on the basis of being free and convenient, the IKE kiosks collect data on every person who comes near them, including id’ing your Bluetooth…
In 2015, a CIA whistleblower who actually created “The Hammer”software to spy on foreign terror threats, revealed that the CIA had turned the surveillance weapon…