The U.S. National Security Agency knew for at least two years about a flaw in the way that many websites send sensitive information, now dubbed the Heartbleed bug, and regularly used it to gather critical intelligence, two people familiar with the matter said.
Yesterday, the judge in the SAC case accepted the firm’s plea deal with the Justice Department, in which the firm and its subsidiaries pled guilty to wire fraud and securities fraud and agreed to pay a $900 million penalty and $300 million in disgorged profits. The Southern District hailed the deal as the crowning victory in their multi-year campaign against insider trading, which notably has resulted in more than 70 convictions and exactly zero acquittals. Congratulations.
But what many of us want to know is: why, immediately after the most severe financial crisis in more than seventy years, which resulted in the loss of almost nine million jobs, did the Justice Department choose to train its heavy artillery on insider traders? Sure, insider trading is bad. It’s very rich people cheating to make themselves extravagantly rich. It should be illegal, and people should go to jail for it. But it’s far from the biggest thing wrong with our financial markets and institutions.
For Sen. Dianne Feinstein, regulation of unmanned aerial vehicles has gotten personal. In an interview with CBS’s “60 Minutes” that aired on Sunday night, the California Democrat said a drone spied into the window of her home during a protest outside her house, and that privacy concerns for the technology were “major.”…
Jonathan Mayer explaining his research, which seems to debunk the idea forwarded by government that metadata isn’t personally identifiable or that there are insubstantial privacy concerns re such data. Via PBS Newshour.
We found that phone metadata is unambiguously sensitive, even in a small population and over a short time window. We were able to infer medical conditions, firearm ownership, and more, using solely phone metadata.
Evidence is building against the use of Smith to analyze telephony metadata. Metadata is closer to content than it is to mere numbers voluntarily submitted to a third party with no expectation of privacy.