EPIC Freedom Awards to Allen, Amash, The Guardian, Snowden

EPIC is honored to recognize these Champions of Freedom who have worked to safeguard privacy, some at great personal risk,” said Marc Rotenberg, EPIC’s President and Executive Director.

EPIC Freedom Awards to Allen, Amash, The Guardian, Snowden
On June 2 the Electronic Privacy Information Center will celebrate 20
years of privacy advocacy with the 2014 EPIC Champions of Freedom
Awards.
Established in 1994, EPIC was created to focus public attention on
emerging privacy issues. EPIC maintains two of the most popular privacy
websites in the world – epic.org and privacy.org – and pursues policy
research, litigation, public education, and advocacy. EPIC’s Advisory
Board includes leading experts in law, technology and public policy.
EPIC established the Champion of Freedom Awards to recognize
individuals and organizations that safeguard the right to privacy with
courage and integrity. Internationally renowned security technologist
Bruce Schneier will host the 2014 EPIC celebration.
EPIC will honor University of Pennsylvania Law Professor Anita L.
Allen for her work as the nation’s leading privacy law scholar. A
longtime EPIC Advisory Board member, Professor Allen has helped shape
the modern understanding of the right to privacy.
EPIC will honor Congressman Justin Amash (R-MI) for his campaign to
defund the NSA’s telephone record collection program.
EPIC will recognize The Guardian newspaper for publishing documents
obtained by Edward Snowden that provided the basis for EPIC’s petition
to the US Supreme Court to end the bulk collection of Americans’
telephone records.
Edward Snowden will also receive an award from EPIC for disclosing the
secret court that documented the unlawful surveillance of Americans and
for transforming the debate about privacy protection.
“EPIC is honored to recognize these Champions of Freedom who have
worked to safeguard privacy, some at great personal risk,” said Marc
Rotenberg, EPIC’s President and Executive Director.
Previous recipients of the Champion of Freedom Award include Senators
Rand Paul (R-KY) and Ron Wyden (D-OR), and journalist Martha Mendoza
(2013); Senator Al Franken (D-MN), Judge Alex Kozinski of the 9th
Circuit, and journalists Dana Priest and William Arkin (2012);
Representatives Jason Chaffetz (R-UT) and Rush Holt (D-NJ), former
Miss USA Susie Castillo, and the Wall Street Journal (2011);
Representative Joe Barton (R-TX), former FTC Commissioner Pamela
Jones Harbour, and the Rose Foundation (2010); Senator Ed Markey
(D-MA), director D.J. Caruso, philanthropist Addison Fischer, and
attorney Paul M. Smith (2009); and Senator Patrick Leahy (D-VT) (2004).
EPIC has previously presented the Lifetime Achievement award to David
Flaherty (2013), Whitfield Diffie (2012), and Willis Ware (2012).

Origin of the The Philadelphia Cheese Steak and Hoagie The Philly Cheese Steak

The Hoagie
European settlers purchased Hog Island from the Lenape Indians in 1680. The settlers gradually developed the island by building log and earthwork dikes to minimize storm damage and convert the marshes into good grazing meadows. Hog Island supposedly got its name from the pigs which local residents left to roam free, as no fencing was needed.

#Privacy #Heartbleed

Heartbleed Means HealthCare.gov Users Must Reset Passwords
http://www.nextgov.com/cybersecurity/2014/04/heartbleed-means-healthcaregov-users-must-reset-passwords/82852/
By Aliya Sternstein
Nextgov.com
April 19, 2014
Federal officials are telling Obamacare website account holders to reset
their passwords, following revelations of a bug that could allow hackers
to steal data.
Officials earlier in the month said the government’s main public sites,
including HealthCare.gov, were safe from the risks surrounding Heartbleed
— faulty code recently found in a widely-used encryption tool.
But, this weekend, the online marketplace’s homepage directs users to
change their login information.
“While there’s no indication that any personal information has ever been
at risk, we have taken steps to address Heartbleed issues and reset
consumers’ passwords out of an abundance of caution,” HealthCare.gov
states.
[…]
INFO: Google scans user’s emails
http://bit.ly/1reFUNj
Google updates terms of service to reflect its scanning of users’ emails
Google has updated its terms of service to reflect that it analyzes user
content including emails to provide users tailored advertising, customized
search results and other features.
The Internet giant’s scanning of users’ email has been controversial with
privacy groups describing it as an intrusion into user privacy.
[…]
Mission-critical satellite communications wide open to malicious hacking
By Dan Goodin
Ars Technica
April 17, 2014
Mission-critical satellite communications relied on by Western militaries
and international aeronautics and maritime systems are susceptible to
interception, tampering, or blocking by attackers who exploit easy-to-find
backdoors, software bugs, and similar high-risk vulnerabilities, a
researcher warned Thursday.
Ground-, sea-, and air-based satellite terminals from a broad spectrum of
manufacturers—including Iridium, Cobham, Hughes, Harris, and Thuraya—can
be hijacked by adversaries who send them booby-trapped SMS text messages
and use other techniques, according to a 25-page white paper published by
penetration testing firm IOActive. Once a malicious hacker has remotely
gained control of the devices, which are used to communicate with
satellites orbiting in space, the adversary can completely disrupt
mission-critical satellite communications (SATCOM). Other malicious
actions include reporting false emergencies or misleading geographic
locations of ships, planes, or ground crews; suppressing reports of actual
emergencies; or obtaining the coordinates of devices and other potentially
confidential information.
“If one of these affected devices can be compromised, the entire SATCOM
infrastructure could be at risk,” Ruben Santamarta, IOActive’s principal
security consultant, wrote. “Ships, aircraft, military personnel,
emergency services, media services, and industrial facilities (oil rigs,
gas pipelines, water treatment plants, wind turbines, substations, etc.)
could all be impacted by these vulnerabilities.”
Santamarta said that every single one of the terminals he audited
contained one or more weaknesses that hackers could exploit to gain remote
access. When he completed his review in December, he worked with the CERT
Coordination Center to alert each manufacturer to the security holes he
discovered and suggested improvements to close them. To date, Santamarta
said, the only company to respond was Iridium. To his knowledge, the
remainder have not yet addressed the weaknesses. He called on the
manufacturers to immediately remove all publicly accessible copies of
device firmware from their websites to prevent malicious hackers from
reverse engineering the code and uncovering the same vulnerabilities he
did.
[…]