Data Brokers Are a Threat to Democracy

Data Brokers Are a Threat to Democracy

Companies that boast holding thousands of data points on millions or billions of people—all for selling them to whomever is buying—themselves represent the aggregation of unrestrained surveillance power.

The UK Is Secretly Testing a Controversial Web Snooping Tool

The UK Is Secretly Testing a Controversial Web Snooping Tool

The tests, which are being run by two unnamed internet service providers, the Home Office and the National Crime Agency, are being conducted under controversial surveillance laws introduced at the end of 2016.

There Are Spying Eyes Everywhere—and Now They Share a Brain

There Are Spying Eyes Everywhere—and Now They Share a Brain

Seconds later, a long list of possible leads appeared onscreen, including a lineup of individuals previously arrested in the neighborhood for violent crimes, the home addresses of parolees living nearby, a catalog of similar recent 911 calls, photographs and license plate numbers of vehicles that had been detected speeding away from the scene, and video feeds from any cameras that might have picked up evidence of the crime itself, including those mounted on passing buses and trains.

Palantir’s God’s-Eye View of Afghanistan

Palantir’s God’s-Eye View of Afghanistan

The man going to the bathroom was deemed a person of interest, and Kevin was working to establish his pattern of life in pursuit of a new methodology called activity-based intelligence, or ABI.

The US Used the Patriot Act to Justify Logging Website Visitors

The US Used the Patriot Act to Justify Logging Website Visitors

This week, three years later, Twitter finally took the step—a welcome change, if a belated one, given that attackers are more attuned than ever to the potential value of taking over a high-profile Twitter account .Hacker Defaces Spotify Pages of Celebrity MusiciansA hacker going by the name "Daniel" took control of prominent Spotify pages on Wednesday from artists like Dua Lipa, Lana Del Rey, Future, and Pop Smoke.

Trump's Un-American Failure to Protect Internet Freedom

Trump's Un-American Failure to Protect Internet Freedom

By the time Edelman was at the White House, “these issues were occupying the agenda of the [National Security Council] Deputies Committee on a very regular basis.” Far from inevitable, it was an intentional bolstering of global work on internet issues—as the internet in other spots on the globe looked increasingly different than that in the United States.

Internet Freedom Has Taken a Hit During the Covid-19 Pandemic

Internet Freedom Has Taken a Hit During the Covid-19 Pandemic

And as all of this unfolds, new research indicates that the governments around the world have exploited the pandemic to expand their domestic surveillance capabilities and curtail internet freedom and speech.

CryptoHarlem’s Founder Warns Against ‘Digital Stop and Frisk’

CryptoHarlem’s Founder Warns Against ‘Digital Stop and Frisk’

Mitchell says law enforcement agencies routinely use tools that trawl social media for posts on particular topics, and that they have been used, for example, against people protesting the killing of George Floyd by Minnesota police.“If you live in the United States and you’re exercising your rights to free speech and assembly to march and demonstrate, you might not realize that the entire time there’s a lot of data being vacuumed up and used against you,” Mitchell said.

The Age of Mass Surveillance Will Not Last Forever

The Age of Mass Surveillance Will Not Last Forever

Here’s the thing: Although the global response to this violation was furious, producing the largest intelligence scandal of the modern age, mass surveillance itself continues to work today, virtually unimpeded.

The Centuries-Long History of Racism in Surveillance Tech

The Centuries-Long History of Racism in Surveillance Tech

When Simone Browne wrote her book Dark Matters: On the Surveillance of Blackness in 2015, her goal was to position the invention of contemporary surveillance technologies “as not being outside of that of the social and historical formation of slavery.” Browne’s book helped inform our next episode of the Get WIRED podcast: Senior writer Sidney Fussell recently spoke to Brown for a WIRED interview about surveillance in the wake of the George Floyd protests.

European Football Clubs Are Turning to AI for an Assist

European Football Clubs Are Turning to AI for an Assist

But even if the Moneyball ethos has now penetrated major football clubs, and a handful of tech-savvy data-crunching firms have emerged, Jager says that there is still ample room for improvement.“Most of the top groups have dedicated teams, they have data scientists.

A Bill in Congress Would Limit Uses of Facial Recognition

A Bill in Congress Would Limit Uses of Facial Recognition

This week IBM, Amazon , and Microsoft all said they would halt sales of facial recognition to US police and called on Congress to impose rules on use of the technology.

Schools Turn to Surveillance Tech to Prevent Covid-19 Spread

Schools Turn to Surveillance Tech to Prevent Covid-19 Spread

“We are very much interested in the automated tracking of students,” says Michael Sawyers, superintendent for New Albany-Plain Schools.A small but growing surveillance industry has sprung up around Covid already, with firms pitching everything from temperature-tracking infrared cameras and contact tracing apps to wireless beacons and smart cameras to help enforce social distancing at work.

How to Protest Safely in the Age of Surveillance

How to Protest Safely in the Age of Surveillance

A smartphone broadcasts all sorts of identifying information; law enforcement can force your mobile carrier to cough up data about what cell towers your phone connected to and when.If you do need a mobile device, consider bringing only a secondary cell phone you don’t use often, or a burner.

NIWA Essential Services: COVID-19

NIWA Essential Services: COVID-19

These are broadly defined as hazard monitoring, resilience, diagnostics for essential services like biosecurity, maintaining animal facilities, and infrastructure that requires constant attention (e.g., security of samples, collections and computing facilities), as follows.

An Iranian Hacking Campaign, Social Media Surveillance, and More News

An Iranian Hacking Campaign, Social Media Surveillance, and More News

In a new report, the security firm Dragos details hacking activity against American electric utilities and attributes it to a group of Iranian hackers called Magnallium.That's the weight of Sony's new concept car , which debuted this week at CES.

Alleged Spy App ToTok Puts Apple in a Bind

Alleged Spy App ToTok Puts Apple in a Bind

Last month, both Google and Apple removed a popular social messaging app called ToTok from their official app stores.This seems to imply that in reviewing ToTok, Google didn't find anything about the app that violates Play Store policies.

15 Million Iranian Bank Accounts Were Breached

15 Million Iranian Bank Accounts Were Breached

After months of scandals around the security camera Ring and its controversial partnerships with law enforcement , perhaps it was inevitable that the Amazon-owned company would face a far more common sort of scandal for sellers of internet-connected consumer surveillance devices: They can be hacked.

So Much for the Deep State Plot Against Donald Trump

So Much for the Deep State Plot Against Donald Trump

On Monday, inspector general Michael Horowitz released the nearly 500-page “Review of Four FISA Applications and Other Aspects of the FBI’s Crossfire Hurricane Investigation,” referring to the agency’s probe of potential links between Russia and the Trump campaign.

Sleepwalkers Podcast: Artificial Intelligence Is Watching Us and Judging Us

Sleepwalkers Podcast: Artificial Intelligence Is Watching Us and Judging Us

Artificial intelligence has tremendous power to enhance spying, and both authoritarian governments and democracies are adopting the technology as a tool of political and social control.No country has embraced facial recognition and AI surveillance as keenly as China.

In Praise of Ugly and Conspicuous Security Cameras

In Praise of Ugly and Conspicuous Security Cameras

No surprise, then, that in the past five or so years companies like Nest and Ring have been pushing peace of mind in the form of home surveillance cameras.

WIRED25: Stories of People Who Are Racing to Save Us

WIRED25: Stories of People Who Are Racing to Save Us

For years, even before the team’s creation, Galperin and fellow EFF researcher Cooper Quintin investigated a hacking operation that planted spyware on the computers of journalists and opposition figures in Kazakhstan.

An iTunes Bug Let Hackers Spread Ransomware

An iTunes Bug Let Hackers Spread Ransomware

The hacker apparently got in through a bug in forum software vBulletin; the Dutch Broadcast Foundation reports that the hacker has attempted to sell the data online.But he also took the time to comb through the malware's code, and stole a database full of decryption keys from the hacking group's server.

Trump Takes Aim at the 'Open Skies' Cold War Treaty With Russia

Trump Takes Aim at the 'Open Skies' Cold War Treaty With Russia

That’s when House representative Eliot Engel, the Democrat of New York and the chair of the House Foreign Affairs Committee, sent a letter to White House national security advisor Robert O’Brien saying he was “deeply concerned” by reports that President Donald Trump was considering withdrawing from Open Skies.

California Bill Would Halt Facial Recognition on Bodycams

California Bill Would Halt Facial Recognition on Bodycams

The bill would ban the use of facial recognition algorithms in real time, when the body cameras are rolling, and in subsequent forensic analysis of footage.

This Tesla Mod Turns a Model S Into a Mobile 'Surveillance Station'

This Tesla Mod Turns a Model S Into a Mobile 'Surveillance Station'

The tool uses open source image recognition software to automatically put an alert on the Tesla's display and the user's phone if it repeatedly sees the same license plate.

Palantir Manual Shows How Law Enforcement Tracks Families

Palantir Manual Shows How Law Enforcement Tracks Families

Security News this Week: Palantir Manual Shows How Law Enforcement Tracks Families. If you happened to buy the Blue Smart hair straightener from Glamorizer—perhaps not even realizing it had Bluetooth capability, because why would it?—then TechCrunch is sorry to report but hackers could totally seize your device, and well, change the temperature of the hot iron remotely, if they wanted to.

Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange

Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange

Security News This Week: Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange. The first zero-day made headlines midweek when Mozilla confirmed that it had patched a bug which would allowed hackers to gain remote access to a Firefox browser and execute code.

The Drone Iran Shot Down Was a $220M Surveillance Monster

The Drone Iran Shot Down Was a $220M Surveillance Monster

Iran's Islamic Revolutionary Guard Corps said on Thursday that the Northrup Grumman-made Global Hawk—part of a multi-billion-dollar program that dates back to 2001—had entered Iranian airspace and crashed in Iranian waters; US Central Command confirmed the time and general location of the attack, but insists that the drone was flying in international airspace.

This AI Uses Echolocation to Identify What You're Doing

This AI Uses Echolocation to Identify What You're Doing

Based at the Wuhan University of Technology, in China, Guo’s team has tested its microphone array on four different college students and found that they can identify whether the person is sitting, standing, walking, or falling, with complete accuracy, they report in a paper published today in Applied Physics Letters . Some work with sound data, like Guo; others are developing better image recognition algorithms.