By the time Edelman was at the White House, “these issues were occupying the agenda of the [National Security Council] Deputies Committee on a very regular basis.” Far from inevitable, it was an intentional bolstering of global work on internet issues—as the internet in other spots on the globe looked increasingly different than that in the United States.
And as all of this unfolds, new research indicates that the governments around the world have exploited the pandemic to expand their domestic surveillance capabilities and curtail internet freedom and speech.
Mitchell says law enforcement agencies routinely use tools that trawl social media for posts on particular topics, and that they have been used, for example, against people protesting the killing of George Floyd by Minnesota police.“If you live in the United States and you’re exercising your rights to free speech and assembly to march and demonstrate, you might not realize that the entire time there’s a lot of data being vacuumed up and used against you,” Mitchell said.
Here’s the thing: Although the global response to this violation was furious, producing the largest intelligence scandal of the modern age, mass surveillance itself continues to work today, virtually unimpeded.
When Simone Browne wrote her book Dark Matters: On the Surveillance of Blackness in 2015, her goal was to position the invention of contemporary surveillance technologies “as not being outside of that of the social and historical formation of slavery.” Browne’s book helped inform our next episode of the Get WIRED podcast: Senior writer Sidney Fussell recently spoke to Brown for a WIRED interview about surveillance in the wake of the George Floyd protests.
But even if the Moneyball ethos has now penetrated major football clubs, and a handful of tech-savvy data-crunching firms have emerged, Jager says that there is still ample room for improvement.“Most of the top groups have dedicated teams, they have data scientists.
This week IBM, Amazon , and Microsoft all said they would halt sales of facial recognition to US police and called on Congress to impose rules on use of the technology.
“We are very much interested in the automated tracking of students,” says Michael Sawyers, superintendent for New Albany-Plain Schools.A small but growing surveillance industry has sprung up around Covid already, with firms pitching everything from temperature-tracking infrared cameras and contact tracing apps to wireless beacons and smart cameras to help enforce social distancing at work.
A smartphone broadcasts all sorts of identifying information; law enforcement can force your mobile carrier to cough up data about what cell towers your phone connected to and when.If you do need a mobile device, consider bringing only a secondary cell phone you don’t use often, or a burner.
These are broadly defined as hazard monitoring, resilience, diagnostics for essential services like biosecurity, maintaining animal facilities, and infrastructure that requires constant attention (e.g., security of samples, collections and computing facilities), as follows.
In a new report, the security firm Dragos details hacking activity against American electric utilities and attributes it to a group of Iranian hackers called Magnallium.That's the weight of Sony's new concept car , which debuted this week at CES.
After months of scandals around the security camera Ring and its controversial partnerships with law enforcement , perhaps it was inevitable that the Amazon-owned company would face a far more common sort of scandal for sellers of internet-connected consumer surveillance devices: They can be hacked.
On Monday, inspector general Michael Horowitz released the nearly 500-page “Review of Four FISA Applications and Other Aspects of the FBI’s Crossfire Hurricane Investigation,” referring to the agency’s probe of potential links between Russia and the Trump campaign.
Artificial intelligence has tremendous power to enhance spying, and both authoritarian governments and democracies are adopting the technology as a tool of political and social control.No country has embraced facial recognition and AI surveillance as keenly as China.
No surprise, then, that in the past five or so years companies like Nest and Ring have been pushing peace of mind in the form of home surveillance cameras.
For years, even before the team’s creation, Galperin and fellow EFF researcher Cooper Quintin investigated a hacking operation that planted spyware on the computers of journalists and opposition figures in Kazakhstan.
The hacker apparently got in through a bug in forum software vBulletin; the Dutch Broadcast Foundation reports that the hacker has attempted to sell the data online.But he also took the time to comb through the malware's code, and stole a database full of decryption keys from the hacking group's server.
That’s when House representative Eliot Engel, the Democrat of New York and the chair of the House Foreign Affairs Committee, sent a letter to White House national security advisor Robert O’Brien saying he was “deeply concerned” by reports that President Donald Trump was considering withdrawing from Open Skies.
The bill would ban the use of facial recognition algorithms in real time, when the body cameras are rolling, and in subsequent forensic analysis of footage.
Security News this Week: Palantir Manual Shows How Law Enforcement Tracks Families. If you happened to buy the Blue Smart hair straightener from Glamorizer—perhaps not even realizing it had Bluetooth capability, because why would it?—then TechCrunch is sorry to report but hackers could totally seize your device, and well, change the temperature of the hot iron remotely, if they wanted to.
Security News This Week: Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange. The first zero-day made headlines midweek when Mozilla confirmed that it had patched a bug which would allowed hackers to gain remote access to a Firefox browser and execute code.
Iran's Islamic Revolutionary Guard Corps said on Thursday that the Northrup Grumman-made Global Hawk—part of a multi-billion-dollar program that dates back to 2001—had entered Iranian airspace and crashed in Iranian waters; US Central Command confirmed the time and general location of the attack, but insists that the drone was flying in international airspace.
Based at the Wuhan University of Technology, in China, Guo’s team has tested its microphone array on four different college students and found that they can identify whether the person is sitting, standing, walking, or falling, with complete accuracy, they report in a paper published today in Applied Physics Letters . Some work with sound data, like Guo; others are developing better image recognition algorithms.
Most directly called for a moratorium on government use of facial recognition systems until Congress can pass legislation that adequately restricts and regulates the technology and establishes transparency standards.
The latest blow: Chip designer ARM has reportedly severed ties with the company. The BBC reports that its upcoming chip, the Kirin 985, may have snuck in under the wire, but after that the company will be stuck on the latest and greatest ARM designs as of May 22, 2019.
Terrorists should not feel free to upload terrible images of slaughter, but neither should they be empowered to empty people’s bank accounts or to tap the phones of presidents and prime ministers.“But,” people say, “What if only legitimate requests can get into the protected communications?” Weaknesses in computer systems are discovered by attackers all the time.
Gregory Barber covers cryptocurrency, blockchain, and artificial intelligence for WIRED.San Francisco’s ban covers government agencies, including the city police and county sheriff’s department, but doesn’t affect the technology that unlocks your iPhone or cameras installed by businesses or individuals.