You are viewing a read-only archive of the Blogs.Harvard network. Learn more.
Skip to content

{ Author Archives }

There Is No Privacy #1: Snooping Browsing History through HTML

Unless you have installed a couple of specific firefox extensions to protect yourself, the owners of any website you visit can tell whether you have visited any other website. It has been known since 2006 that is it possible for any website to query whether you have visited any of a list of other websites […]

Tagged ,

Narus: Security through Surveillance

In 2006, an AT&T engineer named Mark Klein revealed a secret room inside a major Internet hub that was only accessible to engineers with NSA security clearance. His revelation was written up in the New York Times as part of its larger coverage of NSA wiretapping of domestic communications. Among the documents revealed by Klein […]

Tagged , ,

Best Western Data Breach as Shell Game

On August 26, 2008, the Sunday Herald reported that a hacker had broken into the Best Western reservations system and stolen personal and financial data about eight million Best Western customers, including credit card numbers. According to the report, the thief had installed a virus on the machine of an employee of a local hotel […]

Tagged , ,

CALEA Status

I recently spent a surprisingly difficult afternoon trying to figure out the current status of CALEA (Computer Assistance for Law Enforcement Act), the 1994 law that requires telecommunications companies to build tools into their telephone networks that allow them to respond quickly and fully to law enforcement requests for wiretaps. CALEA is a hugely important […]

Tagged , , , ,