Home » Posts tagged 'surveillance' (Page 5)

Tag Archives: surveillance

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

The Chinese Government Identifies Citizens By The WAY THEY WALK

The Chinese Government Identifies Citizens By The WAY THEY WALK

Communist Chinese authorities are using “gait recognition” technology to identify Chinese civilians by the way that they walk. The new technology uses body shapes and movement to identify people even when their face is not in the camera.

This dystopian big brother nightmare is quickly becoming a reality for the souls residing in the People’s Republic of China.  Already used by police on the streets of Beijing and Shanghai, “gait recognition” is part of a push across China to develop artificial intelligence and data-driven surveillance that is raising concerns about how far the technology will go.

The software, built by a Chinese artificial intelligence company called Watrix, extracts a person’s silhouette from video and analyses the silhouette’s movement to create a model of the way the person walks. It can identify people from 50 meters away and requires no special camera to do so.

China is building a digital dictatorship to exert control over its 1.4 billion citizens. As if the “social credit” scoring system wasn’t terrifying enough, the country continues to cross the line with surveilling its own people.

“Gait analysis can’t be fooled by simply limping, walking with splayed feet or hunching over, because we’re analyzing all the features of an entire body,” said Watrix chief executive officer Huang Yongzhen. “You don’t need people’s cooperation for us to be able to recognize their identity,” Huang added.

Huang is a former researcher and quite obviously an authoritarian control freak who said he left academia after seeing how promising the technology had become. He then co-founded Watrix in 2016, and his company was incubated by the Chinese Academy of Sciences. Though the software isn’t as good as facial recognition, Huang said its 94 percent accuracy rate is good enough for commercial use.

…click on the above link to read the rest of the article…

DARPA Seeks FAA Approval For Military Drones Over American Cities By 2030 – At The Latest

DARPA Seeks FAA Approval For Military Drones Over American Cities By 2030 – At The Latest

Just a little over 10 years after drone surveillance inside U.S. borders was declared a conspiracy theory, it is now an indisputable fact of life. So, too, are military grade drones along the “border,” which in reality constitutes a 100-mile-wide swath that encircles the continental United States and 2/3 of its population.

According to a new report from Defense One, this level of access is still seen as a restriction by the DARPA-directed military apparatus. As new forms of autonomous aircraft take to the skies such as the latest Blackhawk helicopter drones that could be ready by 2019, DARPA and aircraft developers want permission to fly over large cities as needed. Utilizing a new artificial intelligence system that is literally called MATRIX, developers see an opportunity for more flexibility in potential use. Of course, surveillance isn’t mentioned among those uses:

After that, similar to Predator drone maker General Atomics, they have their eyes on FAA certification to fly large, unmanned aircraft within the continental United States, to help ferry people and supplies from the mainland to offshore oil rigs, among other potential jobs. Today, large drones likes Predators are forbidden to fly over the U.S. except in a handful of largely unpopulated areas along the U.S.Mexico border.

The FAA is now figuring out how to change guidelines to allow unmanned planes and helicopters to fly over big cities. “We are working with the FAA on that. Our stated goal is 2030. It very much depends on rule making. We are certainly hoping for sooner, for the mid-2020s, to field it,” he said.

In that linked article sourced above, the long-range plans of converting military aircraft to dronesand incorporating them anywhere and everywhere inside America is also detailed and expanded upon as a potential replacement for the already controversial use of police drones.

…click on the above link to read the rest of the article…

Israel Quietly Transferred $250m Of Sophisticated Spy Systems To Saudi Arabia: Report

A new bombshell report in the Jerusalem Post confirms that Israel and Saudi Arabia’s somewhat “quiet” but growing security relationship is far more extensive than previously thought, as it now includes a $250 million weapons deal.

This is unprecedented as the two nations still don’t even have official diplomatic relations, as the kingdom has yet to officially recognize the state of Israel, but continue a close behind the scenes alliance based on intelligence sharing especially in places like Syria or even Yemen in order to “counter Iran”.

According to the Jerusalem Post report:

Saudi Arabia and Israel held secret meetings which led to an estimated $250-million deal, including the transfer of Israeli espionage technologies to the kingdom, Israeli media reported on Sunday, citing an exclusive report by the United Arab Emirate news website Al-Khaleej.

The report goes on to describe the spy systems as “the most sophisticated systems Israel has ever sold to any Arab country” and notes they’ve already been transferred to Saudi Arabia, where a Saudi technical team will undergo training to operate them.

It is extremely unlikely if not impossible that Israel’s own technicians and operators would actually conduct the training of Saudi personnel — likely it is to be done through contractors from Western countries who are usually in abundance in the kingdom.

Interestingly, it appears the United States and Britain may also have had a role to play in cementing the deal, which was first exposed by a Gulf-based news outlet:

The exclusive report also revealed that the two countries exchanged strategic military information in the meetings, which were conducted in Washington and London through a European mediator.

…click on the above link to read the rest of the article…

“Colonizing Experiment in Surveillance Capitalism”: Privacy Expert Resigns From Google-Backed Smart City Project Over Surveillance Concerns

A privacy expert tasked with protecting personal data within a Google-backed smart city project has resigned as her pro-privacy guidelines would largely be ignored by participants.

“I imagined us creating a Smart City of Privacy, as opposed to a Smart City of Surveillance,” Ann Cavoukian, the former privacy commissioner of Ontario, wrote in a resignation letter to Google sister company Sidewalk Labs.

“I felt I had no choice because I had been told by Sidewalk Labs that all of the data collected will be de-identified at source,” she added.

Cavoukian was an acting consultant involved in the plan by Canada’s Waterfront Toronto to develop a smart city neighborhood in the city’s Quayside development. She had created an initiative called Privacy by Design that aimed to ensure citizens’ personal data would be protected.

Once it became apparent that citizen privacy could not be guaranteed, Cavoukian decided it was time to leave the project:

But then, at a Thursday meeting, Cavoukian reportedly realized such anonymization protocols could not be guaranteed. She told the Candian news outlet that Sidewalk Labs revealed at that meeting that their organization could commit to her guidelines, but other involved groups would not be required to abide by them.

Cavoukian realized third parties could possibly have access to identifiable data gathered through the project. “When I heard that, I said, ‘I’m sorry. I can’t support this. I have to resign because you committed to embedding privacy by design into every aspect of your operation,’” she told Global News. – Gizmodo

Being touted as “the world’s first neighborhood built from the internet up,” the Google designed smart city is set to deploy an array of cameras and sensors that detect pedestrians at traffic lights or alert cleanup crews when garbage bins overflow, reports The Globe and Mail.

…click on the above link to read the rest of the article…

Listening In to Killings – and Everything Else

Listening In to Killings – and Everything Else

Listening In to Killings – and Everything Else

It was intriguing that the murder of Saudi journalist Jamal Khashoggi in the Saudi consulate in Istanbul on October 2 was apparently recorded in some fashion. The BBC reported that “A Turkish security source has confirmed to BBC Arabic the existence of an audio and a video recording. What is not clear is if anyone other than Turkish officials has seen or heard them. One source is cited by the Washington Post saying men can be heard beating Mr Khashoggi; it adds that the recordings show he was killed and dismembered.”

It seemed pretty much an open-and-shut case. There was evidence that the despotic regime of Saudi monarchy, as always regarding themselves as being above decency, law and civilisation in general, had been so annoyed with a Saudi journalist that they killed him. It was an amateur operation, and Mossad (for example) would have done a better and more discreet job (although their assassination of Mahmoud al-Mabhouh in Dubai was a bit botched), but it achieved the Saudis’ objective and sent the message round the world that any of their nationals daring to speak out against the Trump-supported boy dictator in Riyadh, the ruthless Mohammed bin Salman, would pay the ultimate price.

But then the story about a recording of the torture and killing of Jamal Khashoggi underwent modification. Perhaps there wasn’t a Turkish audio and video recording, after all. CNBC broadcast that “The Turkish newspaper Sabah reported that Khashoggi recorded audio of the alleged killing using an app on his Apple Watch and was able to upload the recording to his iPhone and iCloud account,” but the conclusion was that “It would have been nearly impossible for Khashoggi to record audio and upload it to his iPhone or the internet, and it raises questions as to how Turkish officials obtained the audio and video evidence of the alleged killing.”

…click on the above link to read the rest of the article…

Surveillance Capitalism: Monetizing the Smartphone User

Surveillance Capitalism: Monetizing the Smartphone User

Commentary

This article is part of a series on corporate surveillance highlighting civil liberty, privacy, cyber security, safety, and tech-product user exploitation threats associated with connected products that are supported by the Android (Google) OS, Apple iOS, and Microsoft Windows OS.

Today, people, businesses, government officials, and law makers are unaware of the business model that supports their favorite technology such as smartphones and connected products that are supported by the Android, Apple, and Microsoft Windows operating systems.

The connected-product business model comprises surveillance and data mining business practices rooted in “surveillance capitalism.” These are terms that the public is unaware of because all parties concerned are not transparent about their business practices.

Addictive, Intrusive, and Exploitative

Companies that have adopted a surveillance capitalism business model are in the business to exploit their paying customers or product users for financial gain at the expense of the user’s civil liberties, privacy, cybersecurity, and safety, whether the product user is an adult or a child.

Don’t take my word for this claim: Former Alphabet Inc. executive chairman Eric Schmidt, Facebook co-founder Sean Parker, and former Google designer Tristan Harris admit that Google and Facebook develop addictive, intrusive, and even potentially harmful technology in order to exploit the product user for financial gain.

“I actually think most people don’t want Google to answer their questions. … They want Google to tell them what they should be doing next,” Schmidt toldThe Wall Street Journal in 2010.

…click on the above link to read the rest of the article…

Forget New Zealand – You Must Give Your Password & Pin to your Phone So Customs Can Search it When you Land

Ever since the Socialists took over New Zealand, it demonstrates how they presume everyone is guilty and they might be hiding money that they can confiscate all because rich bastards are not entitled to what they earn – it belongs to them always. If you refuse, the fine is $5,000. New Zealand has become the first country to fine passengers who refuse to hand over their phone passwords at the border. Obviously, forget New Zealand. The New Zealand Customs and Excise Act 2018, which went into effect this week, allows customs officials to demand passwords, PINs and encryption keys to unlock devices for “digital strip searches” of anyone traveling to New Zealand.

Unfortunately, some other countries are watching closely. They will let you in if you pay the $5,000 find and you cannot refuse and get on the next plane without paying the $5,000 fine. This is what lies in store when socialists grab control. Freedom of the individual NO LONGER exists!!!! The state comes before God, family, or human rights.

When you travel, you should get a burner phone. You cannot have anything private on your person. Welcome to 1984 – it was just a little late!

Government Surveillance: Those Signs Showing Your Speed May Be SPYING On You

Government Surveillance: Those Signs Showing Your Speed May Be SPYING On You

Those signs that show you how fast you are traveling may be a part of a United States government surveillance program. That sign might not only be there to remind you what the speed limit is but a part of a dystopian “Big Brother” spy network.

“There used to be an old police saying, ‘If you robbed a bank, please drive carefully,’” former NYPD Detective Sergeant and Bronx Cold Case Squad commander Joseph Giacalone told Quartz. Giacalone that if a getaway driver didn’t do anything to attract the attention of police and get pulled over, they usually had a half-decent chance of fleeing. “But that’s no longer in effect because you can drive slow, you can stop at every red light, but these license plate readers and surveillance cameras track your every movement.”

According to recently released US federal contracting data, the Drug Enforcement Administration will be expanding the footprint of its nationwide surveillance network with the purchase of “multiple” trailer-mounted speed displays “to be retrofitted as mobile LPR [License Plate Reader] platforms.” The DEA is buying them from RU2 Systems Inc., a private Mesa, Arizona company.  But that’s not all.  Two other related contracts have been found, as reported by Quartz.

The two contracts show that the DEA has hired a small machine shop in California, and another in Virginia, to conceal the readers within the signs. An RU2 representative said the company providing the LPR devices themselves is a Canadian firm called Genetec. The DEA’s most recent budget describes the program as “a federation of independent federal, state, local, and tribal law enforcement license plate readers linked into a cooperative system, designed to enhance the ability of law enforcement agencies to interdict drug traffickers, money launderers or other criminal activities on high drug and money trafficking corridors and other public roadways throughout the U.S.” .

…click on the above link to read the rest of the article…

New FCC Ruling Gives Federal Government Control of 5G Rollout

As the push towards 5G-powered “Smart” surveillance cities begins across the United States the Federal Communications Commission has approved a new rule limiting the power of local authorities.

On Monday October 1st, Sacramento, Houston, Indianapolis and Los Angeles became the first cities to gain access to Verizon’s 5G Wireless service. The City of Sacramento has become a focus of Verizon’s nationwide expansion of 5G, or 5th Generation Cellular technology. “We were able to make Sacramento one of our first 5G cities because Mayor Darrell Steinberg and city leaders embraced innovation and developed a strategic vision for how 5G could be a platform for the larger Sacramento technology ecosystem,” said Jonathan LeCompte, Pacific Market president for Verizon.

The rollout of 5G is expected to herald the beginning of Smart Cities, where driverless cars, pollution sensors, cell phones, traffic lights, and thousands of other devices interact in what is known as “The Internet of Things”. The move towards the smart grid was hastened last week when the Federal Communications Commission (FCC) approved a rule that will limit the role of local authorities regarding the build of 5G networks, specifically the amount city officials can charge telecommunication companies (“Big Tech”).

The Hill reported on the new rule:

“All four commissioners offered support for the rule, with Democrat Jessica Rosenworcel dissenting over only part of the proposal. When the new rules take effect, local officials will have 60 to 90 days to review installation requests.

Republicans on the commission say that limiting what they see as exorbitant fees in major cities will free up capital for companies like Verizon and AT&T to invest in building out their networks in underserved rural areas. The commission estimated that the rule will save wireless providers $2 billion.”

…click on the above link to read the rest of the article…

Empire of Lies: Are ‘We the People’ Useful Idiots in the Digital Age?

“Back in the heyday of the old Soviet Union, a phrase evolved to describe gullible western intellectuals who came to visit Russia and failed to notice the human and other costs of building a communist utopia. The phrase was “useful idiots” and it applied to a good many people who should have known better. I now propose a new, analogous term more appropriate for the age in which we live: useful hypocrites. That’s you and me, folks, and it’s how the masters of the digital universe see us. And they have pretty good reasons for seeing us that way. They hear us whingeing about privacy, security, surveillance, etc., but notice that despite our complaints and suspicions, we appear to do nothing about it. In other words, we say one thing and do another, which is as good a working definition of hypocrisy as one could hope for.”—John Naughton, The Guardian

“Who needs direct repression,” asked philosopher Slavoj Zizek, “when one can convince the chicken to walk freely into the slaughterhouse?”

In an Orwellian age where war equals peace, surveillance equals safety, and tolerance equals intolerance of uncomfortable truths and politically incorrect ideas, “we the people” have gotten very good at walking freely into the slaughterhouse, all the while convincing ourselves that the prison walls enclosing us within the American police state are there for our protection.

Call it doublespeak, call it hypocrisy, call it delusion, call it whatever you like, but the fact remains that while we claim to value freedom, privacy, individuality, equality, diversity, accountability, and government transparency, our actions and those of our government rulers contradict these much-vaunted principles at every turn.

For instance, we claim to disdain the jaded mindset of the Washington elite, and yet we continue to re-elect politicians who lie, cheat and steal.

…click on the above link to read the rest of the article…

This Is The “Last Free Generation” Says Julian Assange In Last Pre-Blackout Intervi

Prior to being cut off from the internet, phone and most visitors, WikiLeaks founder Julian Assange gave an interview on the future of surveillance and how technological advances are changing humankind.

Provided to RT by officials with the World Ethical Data Forum in Barcelona, Assange’s outlook on where humanity is headed is – to put it lightly, dystopian. He says that it will soon be impossible for any human being not to be included in global government databases collected by federal officials and state-like entities alike.

This generation being born now… is the last free generation.You are born and either immediately or within say a year you are known globally. Your identity in one form or another –coming as a result of your idiotic parents plastering your name and photos all over Facebook or as a result of insurance applications or passport applications– is known to all major world powers.

A small child now in some sense has to negotiate its relationship with all the major world powers… It puts us in a very different position. Very few technically capable people are able to live apart, to choose to live apart, to choose to go their own way,” he added. “It smells a bit like totalitarianism – in some way. -Julian Assange

Assange also predicts that AI will be able to automate hacking activities, dramatically increasing the scale of hostile activities through cyberspace.

There is no border [online]. It’s 220 milliseconds from New York to Nairobi. Why would there ever be peace in such a scenario?” he said. “[Entities online] are creating their own borders using cryptography. But the size of the attack surface for any decent-sized organization, the number of people, different types of software and hardware it has to pull inside itself means that it is very hard to establish.

…click on the above link to read the rest of the article…

Freedom Where Did You Go?

Freedom Where Did You Go?

My Generation is the last one to have known privacy and to have lived out most of our lives in freedom.

I remember when driving licenses did not have photos and most certainly not fingerprints. A driving license was issued on proof of birth date alone.

Prior to the appearance of automobiles IDs did not exist in democratic nations. You were who you said you were.

The intrusive questions that accost us every day, even when doing something simple as reporting a telephone or Internet connection being out or inquiring about a credit card charge, were impermissible. I remember when you could telephone a utility company, for example, have the telephone answered no later than the third ring with a real person on the line who could clear up the problem in a few minutes without having to know your Social Security number and your mother’s maiden name. Today, after half an hour with robot voices asking intrusive questions you might finally get a real person somewhere in Asia who is controlled by such a tight system of rules that the person is, in effect, a robot. The person is not permitted to use any judgment or discretion and you listen to advertisements for another half hour while you wait for a supervisor who promises to have the matter looked into.

The minute you go online, you are subject to collection of information about yourself. You don’t even know it is being collected.

According to reports, soon our stoves, refrigerators, and microwave ovens will be reporting on us. The new cars already do.

When privacy disappears, there are no private persons. So what do people become? They become Big Brother’s subjects.

We are at that point now.

…click on the above link to read the rest of the article…

Google Suppresses Memo Revealing Plans to Closely Track Search Users in China

Illustration: Soohee Cho/The Intercept

GOOGLE SUPPRESSES MEMO REVEALING PLANS TO CLOSELY TRACK SEARCH USERS IN CHINA

GOOGLE BOSSES HAVE forced employees to delete a confidential memo circulating inside the company that revealed explosive details about a plan to launch a censored search engine in China, The Intercept has learned.

The memo, authored by a Google engineer who was asked to work on the project, disclosed that the search system, codenamed Dragonfly, would require users to log in to perform searches, track their location — and share the resulting history with a Chinese partner who would have “unilateral access” to the data.

The memo was shared earlier this month among a group of Google employees who have been organizing internal protests over the censored search system, which has been designed to remove content that China’s authoritarian Communist Party regime views as sensitive, such as information about democracy, human rights, and peaceful protest.

According to three sources familiar with the incident, Google leadership discovered the memo and were furious that secret details about the China censorship were being passed between employees who were not supposed to have any knowledge about it. Subsequently, Google human resources personnel emailed employees who were believed to have accessed or saved copies of the memo and ordered them to immediately delete it from their computers. Emails demanding deletion of the memo contained “pixel trackers” that notified human resource managers when their messages had been read, recipients determined.

The Dragonfly memo reveals that a prototype of the censored search engine was being developed as an app for both Android and iOS devices, and would force users to sign in so they could use the service. The memo confirms, as The Intercept first reported last week, that users’ searches would be associated with their personal phone number.

…click on the above link to read the rest of the article…

Apple’s Mysterious New ‘Trust Score’ For iPhone Users Leaves Many Unanswered Questions

Like Facebook (and the Chinese Communist Party) before it, Apple is now assigning users of its products a “trust” score that is based on users’ call and email habits, the Sun reports. The new ratings were added as part of the latest iOS 12 update, as VentureBeatexplains.

Apple’s promise of transparency regarding user data means that any new privacy policy update might reveal that it’s doing something new and weird with your data.

[…]

Alongside yesterday’s releases of iOS 12, tvOS 12, and watchOS 5, Apple quietly updated some of its iTunes Store terms and privacy disclosures, including one standout provision: It’s now using an abstracted summary of your phone calls or emails as an anti-fraud measure.

The provision appears in the iTunes store and privacy windows of iOS and tvOS devices. An Apple spokesperson clarified that the score is meant to stop unauthorized iTunes purchases, but as VentureBeat explains, the trust score is unusual for several reasons – not least of which being that users can’t make phone calls or send emails on Apple TVs. Indeed, the only thing Apple customers can say for sure is that the company’s disclosure leaves many unanswered questions.

Trust

Aside from the obvious inconsistencies surrounding the Apple TV, it’s also unclear how recording and tracking the number of calls or emails made from an iPhone, iPad, or iPod touch will help Apple verify a user’s identity. One would think, as Venturebeat points out, that Apple could simply rely on serial numbers or SIM cards. Perhaps the company feels that verifying the device isn’t enough, and that it needs to go further to make sure the person using the device is the same. Still, exactly how the company will go about accomplishing this is suspiciously unclear.

…click on the above link to read the rest of the article…

Leaked Memo Reveals Details Of Google’s “Censored Search Engine” For Communist China

It’s now confirmed that Google’s long suspected assistance to the Communist government of China to censor and monitor its citizens’ online activity runs deeper and is more proactive that initially thought.

The Intercept published a bombshell report based on internal Google whistle-blower testimony which shows the internet giant plans to launch a search engine for China with censorship capabilities built into it, which provides a backdoor monitoring platform allowing government authorities to track users’ entire search history and even their location.

The search system is code-named “Dragonfly,” according to a confidential memo outlining the project that circulated inside the company the contents of which have been leaked to The Intercept by an engineer who worked on the search engine. The Google engineer said that employees were forced by Google bosses to delete the memo as it was authored and circulated among a group voicing concern and dissent over the planned search engine.

The Intercept summarizes the confidential memo’s contents as follows:

The memo, authored by a Google engineer who was asked to work on the project, disclosed that the search system, code-named Dragonfly, would require users to log in to perform searches, track their location — and share the resulting history with a Chinese partner who would have “unilateral access” to the data.

By requiring users to log-in to perform a simple search, system administrators can immediately identify the person behind the search and their profile; and a Chinese partner would then have the capability to “selectively edit search result pages” with few limitations, according to the memo.

The “Chinese partner”  thought to be a private company working in tandem with the Chinese government — will store user information in a database on servers in Taiwan.

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress