Jim Burrows writes: The following posting is intended as part of the background information for a forthcoming Get FISA Right chat on the technological issues in “getting FISA right” or more generally balancing needed foreign intelligence gathering with the rights reserved and protected in the Constitution. We eagerly seek your comments here and your participation…
Weaknesses in CALEA Wiretaps
Matt Blaze writes: This week in Chicago, Micah Sherr, Gaurav Shah, Eric Cronin, Sandy Clark, and I have a paper at the ACM Computer and Communications Security Conference (CCS) that’s getting a bit more attention than I expected. The paper, Can They Hear Me Now? A Security Analysis of Law Enforcement Wiretaps [pdf] examines the…
Google offers concessions on digital book deal
Michael Liedtke of the Associated Press reports that Google has offered a number of concessions in its latest attempts to settle complaints against its Google Books project. According to Liedtke: Among other things, the modified agreement provides more flexibility to offer discounts on electronic books and promises to make it easier for others to resell…
Amazon called out over cloud security, secrecy
Jon Brodkin reports: Amazon’s cloud computing service should not be used for applications that require advanced security and availability, the Burton Group analyst firm says in a report accusing Amazon of secrecy regarding its cloud data centers. […] Specifically, Burton Group says Amazon customers have no way of determining the “physical redundancy level and data…