Mothers of black, male teenagers in Chicago, fear their children will be added to the Chicago Police Department's gang database. As of the end of 2017, the database contains the names of 130,000 people, 90% of them black or Latino, who are suspected of being gang members. Most have never been
A 2017 research report found that the most vulnerable smartphone users are the ones whose devices are most open to fraud and harassment. Cheaper, low-end devices are less secure to begin with, and they are also less often replaced than their more expensive counterparts made by. Apple and Google. At
In 2017, when user Robert Martin posted a frustrated, disparaging review of the remote garage door opening kit Garadget on Amazon, the peeved owner briefly locked him out of the company's server and told him to send the kit back. After complaints on social media and from the company's board members
The story began with the free Bylock messaging app, which was used between 2014 and 2016 and which the Turkish government associated with treason and followers of Fethullah Gülen, the group they believe was behind the attempted 2016 coup. The app was downloaded roughly half a million times and had
Sidewalk Labs, a subsidiary of Alphabet (Google's owner), has signed a deal with the Canadian city of Toronto to redevelop the brownfield Quayside waterfront district and turn it into a technology hub. The deal raises three sets of issues. First (The Guardian) is the essential privatisation of
Privacy and child advocacy groups in the US, Denmark, Belgium, the Netherlands, Sweden, Germany, and the UK are filing complaints with regulators after a study by the Norwegian Consumer Council found critical security flaws and missing privacy protection in children's smartwatches. The watches
In January 2019, the security researcher Justin Paine discovered that the California-based voice over IP provider Voipo had left exposed an unprotected database containing tens of gigabytes of call logs, other internal documents, and customer text messages, including password resets and two-factor
In the remote western city Xinjiang, the Chinese government is using new technology and humans to monitor every aspect of citizens' lives. China, which has gradually increased restrictions in the region over the last ten years in response to unrest and violent attacks, blames the need for these
An investigation by the Irish Data Protection Commissioner has led Eir, a telecommunications company, to replace almost 20,000 modems supplied to customers with basic broadband packages without access to fibre services. The action follows an incident in 2016 in which nearly 2,000 customer routers
On August 1, 2017, Wisconsin company Three Square Market began offering its employees the option of implanting a tiny chip between their thumb and index finger. The chip enables employees to wave at hand at any of the company's RFID readers in order to enter the building, pay for food in the
In 2014, the UK suicide prevention group The Samaritans launched Radar, a Twitter-based service intended to leverage the social graph to identify people showing signs of suicidal intent on social media and alert their friends to reach out to offer them help. The app was quickly taken offline after
A paper by Michael Veale (UCL) and Reuben Binns (Oxford), "Fairer Machine Learning in the Real World: Mitigating Discrimination Without Collecting Sensitive Data", proposes three potential approaches to deal with hidden bias and unfairness in algorithmic machine learning systems. Often, the cause is
A new examination of documents detailing the US National Security Agency's SKYNET programme shows that SKYNET carries out mass surveillance of Pakistan's mobile phone network and then uses a machine learning algorithm to score each of its 55 million users to rate their likelihood of being a
In a draft January 2018 report obtained by Foreign Policy and produced at the request of US Customs and Border Protection Commissioner Kevin McAleenan, the Department of Homeland Security called for continuous vetting of Sunni Muslim immigrants deemed to have "at-risk" profiles. Based on studying 25
The light surrounding you this very second may be used to expose how much money you make, where you live, when you're home, and much more. That's the big takeaway from A 2016 analysis of ambient light sensors by London-based security and privacy consultant and University College London researcher
In 2015, the University of Arizona began tracking freshman students’ ID card swipes as part of a project to try to lower the rate at which students drop out or leave for another university. The cards, which include an embedded sensor and are given to all students, can be read at almost 700 locations
In January 2018 the Cyberspace Administration of China summoned representatives of Ant Financial Services Group, a subsidiary of Alibaba, to rebuke them for automatically enrolling its 520 million users in its credit-scoring system. The main complaint was that people using Ant's Alipay service were
The first conditional cash transfer program in a higher-income country was trialled in the United States by Mayor Bloomberg in New York City from April 2007 to August 2010. Known as Opportunity NYC-Family Rewards, the privately funded pilot program transferred cash rewards to families who were able
A report from the University of Washington studies parents' and children's interactions with general-purpose connected devices and connected toys. There are numerous privacy issues: toy companies may collect masses of children's intimate data; the toys may enable parents to spy on their children