WBEZ | privacy http://www.wbez.org/tags/privacy Latest from WBEZ Chicago Public Radio en A Common Secret: Struggling with the Stigma of Herpes http://www.wbez.org/news/common-secret-struggling-stigma-herpes-114575 <img typeof="foaf:Image" src="http://llnw.wbez.org//main-images/herpes-2-7479e6184a23dba10096f76f7f631581fe824a26-s800-c85.jpg" alt="" /><p><p>Meeting girls at the bar didn&#39;t come as easily for Adrial Dale as it did for his friends. Standing on the sidelines, Dale watched his pals saunter up to women, cool and confident, perfect for the pick-up scene.</p><p>But Dale could never bring himself to do it. He was terrified about having to reveal a secret, one that had brought him shame for years.</p><p>In 2005, Dale was diagnosed with&nbsp;<a href="http://www.cdc.gov/std/herpes/stats.htm">herpes simplex type 2</a>, a virus that causes genital herpes. He first noticed a lesion on his genitals when he was taking a shower. In that moment, he said, the world went blank.</p><p>He immediately called a nearby clinic in North Carolina and went in to get checked out. From then on, he felt like a different person.</p><p>&quot;I noticed a pattern in myself. I was still judging myself for having herpes,&quot; Dale, 36, said. &quot;I was convinced that this was pretty much a death sentence to my love life.&quot;</p><p>While herpes is common in the U.S., many people face psychological issues and suffer silently because of herpes&#39; stigma.</p><p>The Centers for Disease Control and Prevention&nbsp;<a href="http://www.cdc.gov/std/herpes/stdfact-herpes-detailed.htm">estimates</a>&nbsp;15.5 percent of people ages 14 to 49 in the U.S. have HSV-2 infections. More than half of people in the same age range had herpes simplex virus type 1, most commonly associated with cold sores. But more people are being&nbsp;<a href="http://sti.bmj.com/content/89/Suppl_1/A33.2.abstract">diagnosed</a>&nbsp;with HSV-1 on their genitals.</p><p>Herpes can be transmitted when there are no physical symptoms present, and the CDC estimates that nearly 90 percent of those infected with HSV-2, the most common cause of genital herpes, have never been diagnosed.</p><p>Symptoms can include painful lesions on the mouth or genitals, but over time, the eruptions tend to be less painful. Unlike chlamydia and gonorrhea, herpes doesn&#39;t affect fertility or other internal organs.</p><p>Statistically speaking, pretty much everyone knows someone who has herpes, but not many talk about it, said Jenelle Marie Davis, founder of&nbsp;<a href="http://www.thestdproject.com/">The STD Project</a>. A big reason is the stigma herpes carries. Society portrays people with an sexually transmitted infection as dirty and promiscuous, Davis said.</p><p>&quot;People get infections all the time &ndash; colds and flu &ndash; and no one shames those people because there is no &#39;you did something bad to get this,&#39; &quot; she said. &quot;As a society, we tell people how and who to have sex with, then you add a taboo infection as a result of being sexually active and people go crazy.&quot;</p><p>Herpes infections can&#39;t be cured, but there are treatments, such as the pill&nbsp;<a href="https://www.nlm.nih.gov/medlineplus/druginfo/meds/a695010.html">Valtrex</a>, to relieve symptoms and shorten eruptions. Regular treatment can make it less likely for someone to pass the virus on, too.</p><p>Having herpes doesn&#39;t consign a person to a life of celibacy and many herpes-positive people go on to have active sex lives without transmitting the virus to others. Disclosure is key when starting a sexual relationship with someone, Davis said. Condoms lower the risk of transmission, but don&#39;t eliminate it.</p><div id="res463852274" previewtitle="&quot;I was rejecting myself way before anyone else had the chance to reject me,&quot; said Adrial Dale, founder of Herpes Opportunity."><div data-crop-type=""><img alt="&quot;I was rejecting myself way before anyone else had the chance to reject me,&quot; said Adrial Dale, founder of Herpes Opportunity." src="http://media.npr.org/assets/img/2016/01/21/adrialdale-1_custom-b12d5b9d31ba5c59a0ea6d87bb20e505bfcb10c5-s400-c85.jpg" style="height: 419px; width: 310px; float: right;" title="&quot;I was rejecting myself way before anyone else had the chance to reject me,&quot; said Adrial Dale, founder of Herpes Opportunity. (Courtesy of Marc LeMauviel)" /></div><div><div><p>Today, Dale is a life coach and the founder of&nbsp;<a href="https://herpeslife.com/herpes-forum/discussions">Herpes Opportunity</a>, which helps people cope with herpes through blog posts, forums and weekend retreats that brings herpes-positive people together.</p></div></div></div><p>But he concedes that accepting his diagnosis wasn&#39;t easy. What helped him, he said, was having a support group, and realizing that herpes infections are common and can happen to anyone.</p><p>Disclosing his status to future partners was the scariest part. He&#39;s noticed that fear is common among other herpes-positive people who write about what they&#39;re going through on Herpes Opportunity forums.</p><p>&quot;If I feel undesirable and unwanted, then the way I&#39;m disclosing to potential partners has that undertone to it,&quot; Dale said. &quot;I was rejecting myself way before anyone else had the chance to reject me.&quot;</p><p>For him, self-confidence was the key when it came to sharing his status with potential partners. &quot;The more we shame and judge those &#39;dirty people with herpes,&#39; the more ashamed they are of disclosing and saying that yeah, it&#39;s just a skin condition, it&#39;s herpes,&quot; Dale said.</p><p>But it&#39;s also the case that failing to disclose herpes infection can have serious health consequences for a sexual partner who becomes pregnant.</p><p>Mariel David, 41,&nbsp;<a href="http://projectaccept.org/cinderella-storybook-ending/">learned</a>&nbsp;she contracted HSV-2 from her former husband, her first and only partner at the time, shortly after giving birth to their first child. A week after delivery, her daughter started having seizures. Doctors realized the girl had herpetic encephalitis, a condition that affects the human nervous system caused by the herpes simplex virus.</p><p>&quot;My husband had been dishonest with me and so I think he knew deep down inside he had something, but he didn&#39;t face the fact as to what it was,&quot; David said.</p><p>Doctors told David that her daughter wouldn&#39;t live through puberty. Despite the odds, David&#39;s daughter is turning 18 at the end of January, though her life comes with many difficulties. She is non-verbal, blind and suffered from abnormal bone growth.</p><p>After she became aware of her herpes status, David took precautions during two subsequent pregnancies. She took suppressive treatments during her last trimester to reduce the chance for transmission of the virus and gave birth to two healthy children by C-section.</p><p><em>Sarah Ravani, who previously worked in NPR&#39;s development department, is now astudent at Columbia University&#39;s Graduate School of Journalism in New York. You can follow her on Twitter:&nbsp;<a href="https://twitter.com/farrah_joon">@Farrah_Joon</a>.</em></p></p> Fri, 22 Jan 2016 15:49:00 -0600 http://www.wbez.org/news/common-secret-struggling-stigma-herpes-114575 Senate approves cybersecurity bill: what you need to know http://www.wbez.org/news/senate-approves-cybersecurity-bill-what-you-need-know-113539 <p><div class="image-insert-image "><img alt="" building="" class="image-original_image" important="" kevin="" lamarque="" reuters="" src="http://www.wbez.org/system/files/styles/original_image/llo/insert-images/President%20Obama%2C%20seen%20at%20a%20cybersecurity%20summit%20in%20Palo%20Alto%2C%20Calif..jpg" style="height: 464px; width: 620px;" title="President Obama, seen at a cybersecurity summit in Palo Alto, Calif., in February. The White House has called the Cybersecurity Information Sharing Act an &quot;important building block.&quot; (Kevin Lamarque/Reuters/Landov)" /></div><p>The latest clash in the cybersecurity vs. privacy debate played itself out in Congress on Tuesday when the Senate passed the&nbsp;<a href="https://www.congress.gov/bill/114th-congress/senate-bill/754">Cybersecurity Information Sharing Act</a>. Supporters say the bill, approved 74-21, will help stop hackers by getting companies that have been breached to share information about the embarrassing attack with federal law enforcement. The House passed&nbsp;<a href="https://www.congress.gov/bill/114th-congress/house-bill/1560">its version</a>&nbsp;in April.</p><p>But CISA is very controversial. While proponents call it common sense, critics say it&#39;s just an excuse for intelligence officials to grab data on citizens without a warrant.</p><p><strong>Before we get to the controversy, what is the bill supposed to&nbsp;do?</strong></p><p>According to supporters, there&#39;s a big problem: an information gap. When hackers hit a private company, that company is handcuffed or tongue-tied. It can&#39;t readily tell people outside its legal walls what happened, what suspicious Internet &mdash; IP &mdash; addresses or malware code hit it. So other potential targets can&#39;t defend themselves.</p><p>Supporters say CISA changes that by letting companies share &quot;cyber threat indicators&quot; with the Department of Homeland Security, which in turn can send out the red alert, share the code and warn others.</p><p><strong>So that <em>doesn&#39;t </em>happen right now?</strong></p><p>Well actually, it does. There are existing initiatives, coordinated by&nbsp;<a href="http://www.dhs.gov/ccubedvp">Homeland Security&nbsp;</a>and the&nbsp;<a href="http://www.nist.gov/itl/csd/sharing-111014.cfm">National Institute of Standards and Technology</a>, to share threat information. There are also subscription services in the private market.</p><div id="con452343227" previewtitle="Related NPR Stories"><div id="res452343226"><div class="image-insert-image "><a href="http://www.wbez.org/news/cybercrime-proliferates-so-does-demand-insurance-against-it-113315" target="_blank"><img -="" 000="" a="" about="" alt="" and="" been="" checking="" class="image-original_image" company="" consecutive="" construction="" down="" email="" excluding="" five="" following="" hacked="" had="" his="" its="" john="" losses="" mark="" night="" of="" on="" our="" out="" over="" patterson="" period="" s="" src="http://www.wbez.org/system/files/styles/original_image/llo/insert-images/mark_patterson.jpg" style="height: 299px; width: 400px; float: left; margin-left: 10px; margin-right: 10px;" system.="" taken="" the="" title="&quot;Over the period of five consecutive nights, excluding weekends, $100,000 a night had been taken out of our checking account, and we were down about $545,000.&quot; - Mark Patterson on his construction company PATCO's losses following its hacked email system. Patterson has since taken out cybercrime insurance to protect his company. (John Ydstie/NPR)" we="" were="" ydstie="" /></a></div></div></div><p>This bill creates a new pipeline. Homeland Security has to share the company&#39;s report &mdash; which may include customers&#39; personally identifiable information &mdash; with the National Security Agency and other spy agencies.</p><p>The Senate bill is coming out of the Intelligence Committee, not the Commerce Committee. It had&nbsp;<a href="http://fedscoop.com/heres-the-amendments-that-could-change-cisa">many amendments</a>. One that failed Tuesday would have required the removal of personally identifiable information before a company shares information about threats.</p><p><strong>Is privacy the&nbsp;main&nbsp;criticism?</strong></p><p>Privacy is a huge issue. Tech giants, which have to rebuild trust with users following the Edward Snowden leaks, have&nbsp;<a href="https://www.decidethefuture.org/#corporate">come out against the bill</a>&nbsp;for that reason.</p><p>Though another concern is simply effectiveness &mdash; or ineffectiveness. There&#39;s a technical problem. Many companies don&#39;t realize they&#39;ve been attacked, either because they&#39;re not investing in services to identify breaches or they&#39;re not reading the data they&#39;ve collected. According to a&nbsp;<a href="http://www.verizonenterprise.com/DBIR/2015/">breach report by Verizon</a>, this lag in detection is &quot;one of the primary challenges to the security industry.&quot;</p><div class="image-insert-image " style="text-align: center;"><img alt="" class="image-original_image" src="http://www.wbez.org/system/files/styles/original_image/llo/insert-images/AP_910189987279.jpg" style="height: 392px; width: 620px;" title="In this Sept. 24, 2015 file photo, Senate Intelligence Committee Chairman Sen. Richard Burr, R-N.C., right, and Committee Vice Chair Sen. Dianne Feinstein, D-Calif. listen as Director of the National Security Agency (NSA) Adm. Michael Rogers testifies on Capitol Hill in Washington.The Cybersecurity Information Sharing Act is co-sponsored by Feinstein and Burr, who said it was critical to limit increasingly high-profile cyberattacks, such as one suffered by Sony Pictures last year. (AP Photo/Pablo Martinez Monsivais, File)" /></div><p>Lawmakers could have focused on creating mandatory cybersecurity standards for companies, to encourage the firms to invest more in data security. A group of professors who teach cyber law and cybersecurity &mdash; and oppose CISA &mdash; say in a <a href="https://www.elon.edu/e/CmsFile/GetFile?FileID=202">statement</a>:</p><blockquote><div><p><em>&quot;Rather than encouraging companies to increase their own cybersecurity standards, CISA ignores that goal and offloads responsibility to a generalized public-private secret information sharing network. CISA creates new law in the wrong places.&quot;</em></p></div></blockquote><p><strong>Does the bill require information-sharing?</strong></p><p>No. Cooperation is voluntary. But there&#39;s a nice incentive built in. Say a company shares too much about its users or customers. The bill eliminates legal liability, so the company can be shielded from private lawsuits and antitrust laws.</p><p>This isn&#39;t the first time we&#39;ve heard about an information-sharing bill to stop hackers. Another failed in 2012. What&#39;s different?</p><p>CISA comes at a different time, politically.</p><p>Back when Democrats controlled the Senate, they blocked a bill with a similar acronym &mdash; CISPA (the Cyber Intelligence Sharing and Protection Act) &mdash; that had the same thrust. Now Republicans control the Senate.</p><p>And on President Obama&#39;s watch, we&#39;ve had megabreaches like Sony and the federal Office of Personnel Management. He feels pressure to do something. Five days ago, the White House came out in support of the latest bill, saying in a memo that it&#39;s an &quot;<a href="https://www.whitehouse.gov/sites/default/files/omb/legislative/sap/114/saps754s_20151022.pdf">important building block</a>.&quot;</p><p>&mdash;<a href="http://www.npr.org/sections/alltechconsidered/2015/10/27/452338925/senate-approves-cybersecurity-bill-what-you-need-to-know?ft=nprml&amp;f=452338925" target="_blank"><em> via NPR</em></a></p></p> Wed, 28 Oct 2015 12:24:00 -0500 http://www.wbez.org/news/senate-approves-cybersecurity-bill-what-you-need-know-113539 Lawsuit challenges transgender locker room access at Planet Fitness http://www.wbez.org/news/lawsuit-challenges-transgender-locker-room-access-planet-fitness-113231 <p><div class="image-insert-image " style="text-align: center;"><img alt="" class="image-original_image" src="http://www.wbez.org/system/files/styles/original_image/llo/insert-images/15844192161_a7fe99139b_k.jpg" style="height: 407px; width: 610px;" title="A sign over a Planet Fitness workout space touts &quot;no critics&quot;. The gym chain is at the center of a string of debates around policies to guard transgender people against discrimination. (flickr/ Peter Hale)" /></div><p>The gym chain Planet Fitness has found&nbsp;itself in the middle of a national debate over how to accommodate transgender people in single-sex spaces like bathrooms and locker rooms.</p><p>Earlier this year, Yvette Cormier complained to her gym in Midland, Michigan, after seeing a transgender woman in the women&rsquo;s locker room. Cormier took it upon herself to &ldquo;warn&rdquo; other customers of the transgender-friendly policy. The gym canceled her membership, and now she&rsquo;s suing.</p><p>On Monday,&nbsp;<a href="https://hereandnow.wbur.org/2015/10/05/gym-locker-rooms-transgender" target="_blank">we heard from two professors</a>&nbsp;who framed the issue&nbsp;as a new frontier for civil rights. But others say it&rsquo;s an entirely different issue and that transgender-friendly locker room policies are risky and misguided.</p><p><em>Here &amp; Now&#39;s</em> Jeremy Hobson speaks with&nbsp;David Kallman, an attorney whose firm is representing Cormier in her lawsuit against Planet Fitness.</p><hr /><h3><strong>Interview Highlights: David Kallman</strong></h3><p><strong>On Yvette Cormier&rsquo;s case against Planet Fitness</strong></p><p>&ldquo;The case is simply about the expectation of privacy that all people have in bathrooms, in locker rooms, and men&rsquo;s rooms and women&rsquo;s rooms. And essentially this case involves Planet Fitness, which has an unwritten policy that we believe creates a hostile sexual environment for women and children and it&rsquo;s essentially putting political correctness above common sense and common decency, so that&rsquo;s what the case is about. The lawsuit itself involves, like you say, invasion of privacy counts, breach of contract because there was no notification prior to our client signing up that this was their policy, and various violations under our state&rsquo;s civil rights law.&rdquo;</p><p><strong>Does a person have a right to define whether they are a man or woman and then use the locker room that corresponds with this?</strong></p><p>&ldquo;That&rsquo;s a great question because I think that&rsquo;s a misconception about what this lawsuit&rsquo;s about. We&rsquo;re not attacking transgender people. We&rsquo;re not saying they don&rsquo;t have the right to self-identify however they want. I mean, I may disagree with it or whatever, but that&rsquo;s not the issue. The issue here is where now it&rsquo;s bleeding over into other areas of privacy and other rights that other folks have and the expectation that that has to be accepted in all circumstances. And I think, again, that there are lines that society can draw, and there&rsquo;s lines of common sense and common decency that, for example, biological men should not be allowed to undress and shower with women and 13-year-old girls &ndash; which would be the Planet Fitness situation &ndash; and impose their self-identification on other people. They&rsquo;re the ones doing the imposing here. So this is not an attack on that person, you know, that they don&rsquo;t have the right to make that choice for themselves. They can obviously choose to live their life how they see best, you know, what&rsquo;s best for them.&rdquo;</p><p><strong>On the comparison of&nbsp;transgender rights to those of people who are disabled or people of color</strong></p><p>&ldquo;Well, I don&rsquo;t think the comparison is valid at all. A disabled person is disabled, they&rsquo;re not transitioning to anything. An African-American is African-American, they&rsquo;re not transitioning to anything. And so what we have here is a situation where it&rsquo;s a biological man, OK, who&rsquo;s saying &lsquo;I have the right to impose myself on you in a women&rsquo;s locker room.&rsquo; That is not the same. You&rsquo;re not comparing apples to apples&hellip; They may see themselves as a woman, but other people don&rsquo;t at that point. And again, you know, you&rsquo;re asking individuals &ndash; this type of argument is so ripe for abuse. How are you going to determine if somebody is sincere in what they&rsquo;re doing at this point, or that they&rsquo;re actually on this journey or road to transition? How do you do that? I mean, this is so ripe for abuse, for somebody to just come in and say &lsquo;Oh, I&rsquo;m transitioning. I feel like I&rsquo;m a transgender person. I&rsquo;m gonna go in, use the women&rsquo;s locker room.&rsquo; And then bad things happen. This is possible under these kinds of policies, in fact, I&rsquo;m sure will happen. And I&rsquo;m not saying that about the person who&rsquo;s transgender, who&rsquo;s legitimately on that road, OK? I&rsquo;m talking about these policies are ripe for abuse by other people with more nefarious intentions.&rdquo;</p><p><img alt="" class="image-original_image" src="http://www.wbez.org/system/files/styles/original_image/llo/insert-images/AP_833910851408.jpg" style="height: 357px; width: 310px; margin-left: 10px; margin-right: 10px; float: right;" title="This Tuesday Aug. 25, 2015 photo shows Gavin Grimm standing on his front porch during an interview at his home in Gloucester, Va. Grimm is a transgender student whose demand to use the boys' restrooms has divided the community and prompted a lawsuit. (AP Photo/Steve Helber)" /></p><p><strong>What if a person transitioning from male to female doesn&rsquo;t feel comfortable in the men&rsquo;s locker room?</strong></p><p>&ldquo;Well, and lots of other people don&rsquo;t feel comfortable the other way. So we&rsquo;re talking about here &ndash; we&rsquo;re trying to accommodate these differences here, OK, and do it in a way that it&rsquo;s not subjecting other people to unwanted situations that they don&rsquo;t want to be in these locker rooms and showers. But back to your question, you know, is there some way to maybe have, you know, for lack of a better term, separate but equal. I mean I think that&rsquo;s always been shot down, and if you&rsquo;re talking in civil rights issues. But to have a locker room where maybe there&rsquo;s individual stalls or lockers with a shower or something that does not subject other people from either side to anyone being offended by them being present or that sort of thing. I mean, there may be some ways to do that. But the bottom line here is, I don&rsquo;t think the vast majority of people in America believe that it&rsquo;s appropriate for a women&rsquo;s locker room for a man, who is a man biologically, to simply be able to say &lsquo;I&rsquo;m transitioning and I get to come into this locker room and you have to put up with it.&rsquo; You know, call me old fashioned, you can say whatever. I don&rsquo;t think America as a whole is anywhere near that, and I don&rsquo;t think that imposing their moral viewpoint on the rest of us is appropriate either. So I&rsquo;m open to discussions of having some way to accommodate. I think that&rsquo;s a legitimate rational discussion, but that&rsquo;s where we&rsquo;re at.&rdquo;</p><p><strong>On Yvette Cormier returning to the gym three days in a row to warn about a &ldquo;man&rdquo; in the locker room</strong></p><p>&ldquo;She wasn&rsquo;t running around yelling, screaming, harassing people, that sort of thing. She was simply &ndash; in the conversations that people have at gyms and talking with people that they know there &ndash; was letting other women know, who had no idea that this was Plant Fitness&rsquo;s policy, letting them know that they were allowing biological men into the women&rsquo;s locker room and that they should be aware of that. That&rsquo;s all she was doing was letting people know that. And if this is a policy that Planet Fitness is so proud of and that they feel is appropriate, why would they be concerned that she&rsquo;s letting the patrons of Planet Fitness know about the policy? I mean, why does that bother them? I would think they would welcome that.&rdquo;</p><p>&mdash; <a href="http://hereandnow.wbur.org/2015/10/07/transgender-locker-room-lawsuit" target="_blank"><em>via Here &amp; Now</em></a></p></p> Wed, 07 Oct 2015 16:14:00 -0500 http://www.wbez.org/news/lawsuit-challenges-transgender-locker-room-access-planet-fitness-113231 Lawsuit seeks information on alleged CPD spying http://www.wbez.org/news/lawsuit-seeks-information-alleged-cpd-spying-111202 <img typeof="foaf:Image" src="http://llnw.wbez.org//main-images/sskc.PNG" alt="" /><p><p>Activists say the Chicago Police Department is monitoring their cell phones at protests, and they are trying to use a lawsuit to prove it.</p><p>At issue are cell-phone interceptors called stingrays. These force mobile phones to communicate with them by mimicking a cell tower. For years, Chicago police denied owning any of these stingrays, but a 2014 lawsuit forced the department to turn over records proving the department had purchased several of them.</p><p>Government transparency attorney Matt Topic was the lead attorney on that case.</p><p>&ldquo;Once the stingray has tricked phones in the vicinity into thinking it&rsquo;s talking to a cell tower when it&rsquo;s actually talking to the police,&quot; Topic said. &quot;It can force the phones to broadcast to the police things like &hellip; the call logs and many think these can actually be used to intercept the content of the communications themselves.&rdquo;</p><blockquote><p><strong>Related: <a href="http://www.wbez.org/www.wbez.org/news/who-polices-police-chicago-its-increasingly-ex-cops-111194" target="_blank">Who polices the police? In Chicago, it&#39;s mostly ex-cops</a></strong></p></blockquote><p>Topic, who is an attorney at Chicago firm Loevy and Loevy, says because the interceptor mimics a cell tower it can only work within a certain radius.</p><p>&ldquo;I don&rsquo;t know what that radius is, but I believe it&rsquo;s a large enough radius that if the police department put one of these devices into a truck or into a car and drove it up next to a reasonably sized protest, they could certainly secretly obtain a lot of information from protesters who are there.&rdquo;</p><p>Topic says it is a reasonable concern that the Chicago Police Department may be using these stingrays to get information during demonstrations. He pointed to a post by the hacker group Anonymous of a recording allegedly taken from the Chicago police scanner. In the recording a man, who Anonymous says is a Chicago police officer, asks if the department is monitoring a protest organizer&rsquo;s cell phone conversation.</p><p>That recording, and pictures of an Office of Emergency Management and Communication vehicle allegedly following marchers, has sparked several allegations of police spying.</p><blockquote><p><strong>Related: <a href="http://www.wbez.org/news/chicago-protestors-focus-future-111201" target="_blank">From pulpits to protests, Chicago clergy lead demonstrations</a></strong></p></blockquote><p>An OEMC spokeswoman says the SVU that has raised demonstrators&rsquo; suspicious is a vehicle equipped with mobile field cameras the city uses often in planned and unplanned large scale events and that it&rsquo;s nothing more. She says it does not have any sort of spying or monitoring capabilities beyond the ability to shoot video.</p><p>And a Chicago Police Department spokesman says the department hasn&rsquo;t used the stingrays during demonstrations.</p><p>But Ed Yohnka with the American Civil Liberties Union of Illinois says that isn&rsquo;t good enough. Yohnka says the department refuses to admit how they are using the stingrays, which naturally leads people to be suspicious.</p><p>Yohnka says their use has been &ldquo;treated as a great secret by government at all levels.&rdquo;</p><p>&ldquo;We know that this technology has been used in connection with protests in other places,&rdquo; Yohnka said. &ldquo;I don&rsquo;t know whether or not that&rsquo;s been used in Chicago. I would say that if this technology is being used to track people, if there are technologies that are being used to collect large swaths of communication, those are things that are very troubling and very wrong and I think people would rightly be concerned about them.&rdquo;</p><p>Topic&rsquo;s latest lawsuit, brought on behalf of privacy advocate Freddie Martinez, is meant to compel the Chicago Police Department to say when and where the stingrays are being used.</p><p>&ldquo;The second suit, which asks for broader records (as to the extent to which the equipment is being used, with what constitutional safeguards, what happens with data), that complaint was filed a while back and we&rsquo;re expecting the police department&rsquo;s answer to that complaint [this] week,&rdquo; Topic said.</p><p>&ldquo;We&rsquo;re very interested to see &hellip; whether these are wholesale constitutional violations and if so we intend to explore what can be done about them,&rdquo; Topic said.</p><p><em>Patrick Smith is WBEZ&rsquo;s morning news producer. Follow him <a href="http://twitter.com/pksmid" target="_blank">@pksmid </a></em></p></p> Mon, 08 Dec 2014 15:33:00 -0600 http://www.wbez.org/news/lawsuit-seeks-information-alleged-cpd-spying-111202 A humanitarian crisis at the U.S.-Mexico border http://www.wbez.org/programs/worldview/2014-06-12/humanitarian-crisis-us-mexico-border-110335 <img typeof="foaf:Image" src="http://llnw.wbez.org//main-images/AP646672363735.jpg" alt="" /><p><p>American border control have seen an increase in unaccompanied minors crossing the border from Latin America, creating a growing humanitarian crisis. Adam Isacson, a senior associate for regional security policy with the Washington Office on Latin America, joins us to discuss the issue.</p><div class="storify"><iframe allowtransparency="true" frameborder="no" height="750" src="//storify.com/WBEZ/worldview-18/embed?header=false&amp;border=false" width="100%"></iframe><script src="//storify.com/WBEZ/worldview-18.js?header=false&border=false"></script><noscript>[<a href="//storify.com/WBEZ/worldview-18" target="_blank">View the story "Worldview: A humanitarian crisis at the U.S.-Mexico border" on Storify</a>]</noscript></div></p> Thu, 12 Jun 2014 13:51:00 -0500 http://www.wbez.org/programs/worldview/2014-06-12/humanitarian-crisis-us-mexico-border-110335 Morning Shift: Evaluating our privacy in the digital age http://www.wbez.org/programs/morning-shift-tony-sarabia/2014-01-17/morning-shift-evaluating-our-privacy-digital-age <img typeof="foaf:Image" src="http://llnw.wbez.org//main-images/surveillance Flickr jonathan mcintosh.jpg" alt="" /><p><p>We talk with a member of the White House panel tasked with crafting NSA reform. We also explore whether there are enough laws to protect our privacy in this digital age with The Nation&#39;s David Cole.</p><div class="storify"><iframe allowtransparency="true" frameborder="no" height="750" src="//storify.com/WBEZ/morning-shift-evaluating-our-privacy-in-the-digita/embed?header=false" width="100%"></iframe><script src="//storify.com/WBEZ/morning-shift-evaluating-our-privacy-in-the-digita.js?header=false"></script><noscript>[<a href="//storify.com/WBEZ/morning-shift-evaluating-our-privacy-in-the-digita" target="_blank">View the story "Morning Shift: Evaluating our privacy in the digital age " on Storify</a>]</noscript></div></p> Fri, 17 Jan 2014 08:34:00 -0600 http://www.wbez.org/programs/morning-shift-tony-sarabia/2014-01-17/morning-shift-evaluating-our-privacy-digital-age In the age of social networking, there's no such thing as privacy http://www.wbez.org/blogs/leah-pickett/2013-05/age-social-networking-theres-no-such-thing-privacy-107021 <p><p><img alt="" class="image-original_image" src="http://www.wbez.org/system/files/styles/original_image/llo/insert-images/110207_zuckerberg_facbook_ap_328.jpg" title="File: Facebook CEO Mark Zuckerberg. (Paul Sakuma/AP)" /></p><div class="image-insert-image ">Surprise, surprise: Millenials are more willing than any other generation to share personal information online.</div><div class="image-insert-image ">&nbsp;</div><div class="image-insert-image ">According to a <a href="http://www.usatoday.com/story/money/business/2013/04/21/millennials-personal-info-online/2087989/" target="_blank">new survey</a> from the University of California&#39;s Center for the Digital Future, Millenials, ages 18-34, were more likely to share their location in order to receive coupons from nearby businesses: 56 percent vs. 42 percent of those 35 and over. More than half of the Millenials surveyed also said that they would share private information with a company if they got something in return.&nbsp;</div><div class="image-insert-image ">&nbsp;</div><div class="image-insert-image ">This push for active participation in social media may seem harmless at first, until you look at the bigger picture and cringe at the Orwellian nature of it all.</div><div class="image-insert-image ">&nbsp;</div><div class="image-insert-image ">For example, have you ever bought a product at your favorite store, and then saw an advertisement for a similar product pop up on your Facebook sidebar just moments later? Cue the Big Brother shiver up your spine: <a href="http://adage.com/article/digital/facebook-partner-acxiom-epsilon-match-store-purchases-user-profiles/239967/" target="_blank">that&#39;s no coincidence</a>.</div><div class="image-insert-image ">&nbsp;</div><div class="image-insert-image ">Everything that we post to our personal websites can be tracked, and the Internet is always watching. Whether we admit to ourselves or not, and whether we like it or not, we live in a <a href="http://www.cnn.com/2013/03/16/opinion/schneier-internet-surveillance" target="_blank">surveillance state</a> that is growing more efficient and eerily omniscient by the day.&nbsp;</div><div class="image-insert-image ">&nbsp;</div><div class="image-insert-image ">Facebook, Google, Apple, Microsoft and Amazon rule the Web; and consequently, have delved deeper into our private lives and personal interactions than ever before. Apple tracks us on or iPhones and iPads. Google tracks us on every page that it has access to, and Facebook does the same, even following&nbsp;<a href="http://www.firstpost.com/tech/facebook-finally-admits-to-tracking-non-users-133684.html" target="_blank">non-Facebook users</a> in their pursuit of prime marketing data. One reporter used a tool called Collusion to track who was tracking him, and discovered that <a href="http://www.theatlantic.com/technology/archive/2012/02/im-being-followed-how-google-151-and-104-other-companies-151-are-tracking-me-on-the-web/253758/" target="_blank">105 companies tracked his Internet use</a> in one 36-hour period.&nbsp;</div><div class="image-insert-image ">&nbsp;</div><div class="image-insert-image ">Sometimes we fight back, like when Instagram proposed <a href="http://www.nytimes.com/2012/12/19/technology/facebook-responds-to-anger-over-proposed-instagram-changes.html?_r=0" target="_blank">giving advertisers free reign over all posted photos</a> and then backed down when users threatened to boycott. Sometimes the Internet giants admit their wrongdoing, like when Google apologized (after being slapped with a $7M fine, of course) for &quot;<a href="http://www.washingtontimes.com/news/2013/mar/13/google-hit-7m-fine-scooping-email-passwords-medica/" target="_blank">data-scooping</a>&quot; personal information from zillions of unencrypted databases.</div><div class="image-insert-image ">&nbsp;</div><div class="image-insert-image ">But the truth is, these highly-sophisticated apps and websites thrive on monitering our every move, and we may be powerless to stop them. If the <a href="http://www.aclu.org/blog/technology-and-liberty-national-security/surveillance-and-security-lessons-petraeus-scandal" target="_blank">director of the CIA</a> can&#39;t maintain his privacy on the Internet, then what hope is there for the rest of us?</div><div class="image-insert-image ">&nbsp;</div><p>Consider the <a href="http://blog.hostgator.com/2013/04/23/1984-in-2013-privacy-the-internet/" target="_blank">major data breaches</a> of networking sites in 2012 alone:&nbsp;</p><ul><li>LinkedIn: 6.5 million passwords stolen</li><li>Yahoo: 400,000 passwords stolen</li><li>Global Payments: 1.5 million customers&#39; credit card numbers and PINs exposed</li></ul><p>Facebook experienced yet another <a href="http://bits.blogs.nytimes.com/2013/02/15/facebook-admits-it-was-hacked/" target="_blank">privacy breach</a> in February, two weeks after Twitter made a <a href="http://bits.blogs.nytimes.com/2013/02/01/twitter-hacked-data-for-250000-users-stolen/" target="_blank">similar admission</a>. Also, users have been <a href="http://abcnews.go.com/ABC_Univision/quitting-facebook/story?id=18668978&amp;page=2#.UYdPqZUlbFJ" target="_blank">quitting Facebook in record numbers</a>&nbsp;for months now. Perhaps people are finally catching on to the &quot;privacy paradox&quot; and deciding to forgo social media altogether, although the more likely scenario is that this decline is only temporary.&nbsp;</p><p>Statistics prove that most of these Facebook users will <a href="http://mashable.com/2013/02/05/facebook-break-study/" target="_blank">likely return</a>&nbsp;(because, sadly, nearly 40 percent of Americans <a href="http://news.yahoo.com/social-media-addiction-based-fear-missing-143357943.html" target="_blank">would rather have a root canal</a>&nbsp;than give up their social networking profiles for good) so where does that leave us? We can combine forces to change the pervasive nature of the Internet, or we can look inward and start by changing ourselves.</p><p>If we really want our private lives to remain private, then we can&#39;t give up without a fight.&nbsp;</p><p><em>Leah Pickett writes about popular culture for WBEZ. She still uses&nbsp;<a href="https://twitter.com/leahkpickett" target="_blank">Twitter</a> and <a href="https://www.facebook.com" target="_blank">Facebook</a>, but has given<a href="http://www.theverge.com/2013/5/1/4279674/im-still-here-back-online-after-a-year-without-the-internet" target="_blank"> a year without Internet</a> some serious thought.&nbsp;</em></p></p> Mon, 06 May 2013 08:00:00 -0500 http://www.wbez.org/blogs/leah-pickett/2013-05/age-social-networking-theres-no-such-thing-privacy-107021 Use of surveillance in Boston bombing case raises questions about cameras in Chicago http://www.wbez.org/news/use-surveillance-boston-bombing-case-raises-questions-about-cameras-chicago-106787 <p><p>Dzhokhar Tsarnaev was charged with conspiring to use a weapon of mass destruction in his hospital room Monday afternoon.</p><p dir="ltr"><img alt="" class="image-original_image" src="http://www.wbez.org/system/files/styles/original_image/llo/insert-images/surveillance_130422_ko.jpg" style="float: left;" title="Investigators inspect the roof of the Lord &amp; Taylor store where a surveillance camera is placed, center, and an official said is crucial in the investigation of the explosions near the Boston Marathon finish line, Thursday, April 18, 2013, in Boston. Boston City Council President Stephen Murphy, who said Wednesday he was briefed by Boston police, said investigators saw the image on surveillance footage they got from the department store near the finish line, and matched the findings with witness descriptions of someone leaving the scene. (AP Photo/Julio Cortez)" />The surviving suspect in the Boston marathon bombing was captured Friday, just one day after the FBI released video images of the Tsarnaev brothers to the public.</p><p dir="ltr">The role of cameras in the case sparked a debate weighing privacy against public safety.</p><p dir="ltr">Cameras played a critical role in piecing together what happened in Boston exactly one week ago.</p><p dir="ltr">Investigators poured over photos and videos from onlookers and surveillance footage before ultimately releasing images of the two suspects. When the FBI first released the images, special agent in charge Richard DesLauriers emphasized the public&rsquo;s important role in this investigation and others like it.</p><p dir="ltr">&ldquo;For more than 100 years, the FBI has relied upon the public to be its eyes and ears. With the media&rsquo;s help, in an instant, these images will be delivered directly into the hands of millions around the world,&rdquo; DesLauriers explained.</p><p dir="ltr">Meanwhile, in Chicago, Mayor Rahm Emanuel said last week the city continues to add cameras for security reasons.</p><p dir="ltr">The ACLU <a href="http://www.aclu-il.org/chicagos-video-surveillance-camera-system-growing-and-unregulated/">reported</a> that Chicago already has the largest urban network of public and private surveillance cameras--more than 10,000.</p><p dir="ltr">&ldquo;They [cameras] serve an important function, for the city in providing the type of safety, on a day-to-day basis, not just for big events like a marathon but day-to-day,&rdquo; Emanuel noted last week.</p><p dir="ltr">But while the mayor was quick to tout the upside of surveillance, others were just as fast to voice their concerns. And not just as it relates to privacy.</p><p dir="ltr">Sharon Franklin is senior counsel for the <a href="http://www.constitutionproject.org/">Constitution Project,</a> a D.C.-based watchdog group.</p><p dir="ltr">&ldquo;It&rsquo;s important to note the role of surveillance here was not helpful in preventing this attack. The role of the &nbsp;surveillance footage was in identifying the suspects after the event and in helping to track that down,&rdquo; Franklin said.</p><p dir="ltr">The project developed <a href="http://www.constitutionproject.org/wp-content/uploads/2012/09/54.pdf">guidelines</a> for cities installing video surveillance systems.</p><p dir="ltr">Among the suggestions --that tape not relevant to the criminal investigations be purged.</p><p dir="ltr">Franklin said she doesn&rsquo;t want the government building a database of innocent people who happen to be present at the scene of a crime.</p><p dir="ltr">&ldquo;In this case, we don&rsquo;t want them starting criminal or terrorist files on all sorts of people who were simply innocently watching the marathon,&rdquo; Franklin explained.</p><p><em>Katie O&rsquo;Brien is a WBEZ reporter and producer. Follow her <a href="http://twitter.com/katieobez">@katieobez.</a></em></p></p> Mon, 22 Apr 2013 23:12:00 -0500 http://www.wbez.org/news/use-surveillance-boston-bombing-case-raises-questions-about-cameras-chicago-106787 Immigration enforcement program faces novel suit http://www.wbez.org/news/immigration-enforcement-program-faces-novel-suit-100646 <p><p><img alt="" class="image-original_image" src="http://www.wbez.org/system/files/styles/original_image/llo/insert-images/ColoradoFingerprinting.jpg" style="margin: 4px 0px 0px 0px; float: left; width: 214px; height: 250px; " title="A sheriff’s deputy in Centennial, Colo., prepares to fingerprint a suspect as part of booking into the Arapahoe County Justice Center. Secure Communities runs the fingerprints of everyone booked into jail against immigration records. (AP File/Chris Schneider)" />We&rsquo;ve been hearing a lot about how immigration enforcement intersects with local law enforcement. Last week, the U.S. Supreme Court upheld an Arizona requirement that police officers check the immigration status of people they stop for other reasons. Now we&rsquo;ll hear from our West Side bureau about a suburban Chicago man who got tangled up with immigration enforcement after a drug arrest. He has filed a suit that offers a novel challenge to one of President Obama&rsquo;s key immigration-enforcement programs.</p><p>MITCHELL: There&rsquo;s no doubt James Makowski of Clarendan Hills did something illegal. In 2010 police caught him with heroin and he pleaded guilty to that. A judge approved him for a state-run boot camp. But that&rsquo;s not where Makowski ended up.</p><p>MAKOWSKI: I thought I would be home in 120 days but -- then after I get a note back from a counselor, after I&rsquo;d asked about when I&rsquo;d be shipping to boot camp -- she said that I was ineligible for boot camp due to an immigration detainer.</p><p>MITCHELL: That&rsquo;s basically a flag in his file from Immigration and Customs Enforcement, the federal agency known as ICE. So . . .</p><p>MAKOWSKI: I got sent to the maximum-security penitentiary in Pontiac.</p><p>MITCHELL: And he stayed for about two months. How did this happen? It comes down to an ICE program called Secure Communities. In that program, FBI fingerprint data about people booked at local jails get run against immigration data. If a check yields a match, ICE can issue one of its detainers. The point is to catch people in the criminal justice system who are not authorized to be in the U.S. and eventually deport them. The thing is, Makowski had every right to be in the country.</p><p>MAKOWSKI: I feel like I got punished twice for what I did in my past.</p><p>MITCHELL: Makowski&rsquo;s detention was based on faulty information. He was born in India and adopted by a U.S. family. When he was 1, the government granted him citizenship. But &mdash; at age 22, when he got picked up on the heroin charge &mdash; the feds didn&rsquo;t have their records right. So, Makowski stayed in that maximum-security pen before authorities straightened things out and let him into the boot camp. On Tuesday, Makowski filed a federal suit over all this. Defendants include top officials at the FBI, ICE and their parent departments. Makowski claims that when the FBI shared data with ICE &mdash; and when ICE didn&rsquo;t keep track of his citizenship status &mdash; they violated his rights under the U.S. Privacy Act. Legal experts say the suit appears to be the first challenge to Secure Communities under that law. Makowski&rsquo;s attorneys include Mark Fleming of the Chicago-based National Immigrant Justice Center.</p><p>FLEMING: There [are] simple ways in which both the FBI and ICE could be in compliance with the Privacy Act.</p><p>MITCHELL: Fleming says ICE could, for example, interview suspected immigration violators before slapping detainers on them.</p><p>FLEMING: Unfortunately, the system does not provide those basic checks right now and, so, there are many more U.S. citizens that are getting wrapped up into this.</p><p>MITCHELL: Officials at ICE and the departments of Justice and Homeland Security did not answer our questions about the suit Tuesday (see&nbsp;<a href="#note">UPDATE</a>). An FBI spokesman said his agency does not comment about pending litigation outside the courtroom. But a supporter of tougher immigration controls doubts that the Privacy Act protects U.S. citizens from what Makowski endured. Jessica Vaughan directs policy studies for a Washington group called the Center for Immigration Studies. Vaughan says the FBI and ICE share the fingerprint information for legitimate law-enforcement purposes.</p><p>VAUGHAN: Mistakes can be made. But that is not necessarily a reason to throw out the whole system.</p><p>MITCHELL: Vaughan says it&rsquo;s important to keep something else in mind.</p><p><a name="note"></a></p><p>VAUGHAN: The individual who&rsquo;s filing this suit would not have had anything to worry about had he not been convicted of a serious crime to begin with. He was convicted of a drug crime.</p><p>MITCHELL: Convicted he was. But Makowski says no one should have to serve extra time behind bars because of errors in immigration records.</p><p><em>After a deadline for Tuesday&rsquo;s broadcast of this story, ICE provided this statement: &ldquo;The information-sharing partnership between the Department of Homeland Security and the FBI serves as the cornerstone of Secure Communities, and fulfills a mandate required by federal law. This information sharing does not violate the Privacy Act. U.S. Immigration and Customs Enforcement (ICE) is evaluating the allegations contained in the lawsuit; however, we do not comment on pending litigation.&rdquo;</em></p><p><em>The ICE statement continues: &ldquo;In December ICE announced a new detainer form and the launch of a toll-free hotline &mdash; (855) 448-6903 &mdash; that detained individuals can call if they believe they may be U.S. citizens or victims of a crime. The hotline is staffed 24 hours a day, seven days a week, by ICE personnel at the Law Enforcement Support Center. Translation services are available in several languages from 7 a.m. until midnight (Eastern), seven days a week. ICE personnel collect information from the individual and refer it to the relevant ICE Enforcement and Removal Operations (ERO) Field Office for immediate action.&rdquo;</em><br />&nbsp;</p></p> Wed, 04 Jul 2012 10:16:00 -0500 http://www.wbez.org/news/immigration-enforcement-program-faces-novel-suit-100646 Ill. House OKs ban on password snooping by bosses http://www.wbez.org/story/ill-house-oks-ban-password-snooping-bosses-97753 <p><p>The Illinois House wants to bar employers from asking workers and job applicants for access to social media like Facebook.</p><p>The legislation passed 78-30 Thursday and now goes to the Senate.</p><p>Some employers, particularly law enforcement, have begun asking for passwords so they can review the online activities of job applicants.</p><p>Under the legislation sponsored by Democratic Rep. La Shawn Ford, workers could file lawsuits if pressured to open up private accounts or they're denied a job for refusing. Bosses could still ask for usernames to view public information online, and they can monitor work-owned computers.</p></p> Fri, 30 Mar 2012 14:19:00 -0500 http://www.wbez.org/story/ill-house-oks-ban-password-snooping-bosses-97753