This Tesla Mod Turns a Model S Into a Mobile 'Surveillance Station'

This Tesla Mod Turns a Model S Into a Mobile 'Surveillance Station'

The tool uses open source image recognition software to automatically put an alert on the Tesla's display and the user's phone if it repeatedly sees the same license plate.

Palantir Manual Shows How Law Enforcement Tracks Families

Palantir Manual Shows How Law Enforcement Tracks Families

Security News this Week: Palantir Manual Shows How Law Enforcement Tracks Families. If you happened to buy the Blue Smart hair straightener from Glamorizer—perhaps not even realizing it had Bluetooth capability, because why would it?—then TechCrunch is sorry to report but hackers could totally seize your device, and well, change the temperature of the hot iron remotely, if they wanted to.

Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange

Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange

Security News This Week: Hackers Used Two Firefox Zero Days to Hit a Crypto Exchange. The first zero-day made headlines midweek when Mozilla confirmed that it had patched a bug which would allowed hackers to gain remote access to a Firefox browser and execute code.

The Drone Iran Shot Down Was a $220M Surveillance Monster

The Drone Iran Shot Down Was a $220M Surveillance Monster

Iran's Islamic Revolutionary Guard Corps said on Thursday that the Northrup Grumman-made Global Hawk—part of a multi-billion-dollar program that dates back to 2001—had entered Iranian airspace and crashed in Iranian waters; US Central Command confirmed the time and general location of the attack, but insists that the drone was flying in international airspace.

This AI Uses Echolocation to Identify What You're Doing

This AI Uses Echolocation to Identify What You're Doing

Based at the Wuhan University of Technology, in China, Guo’s team has tested its microphone array on four different college students and found that they can identify whether the person is sitting, standing, walking, or falling, with complete accuracy, they report in a paper published today in Applied Physics Letters . Some work with sound data, like Guo; others are developing better image recognition algorithms.

Facial Recognition Has Already Reached Its Breaking Point

Facial Recognition Has Already Reached Its Breaking Point

Most directly called for a moratorium on government use of facial recognition systems until Congress can pass legislation that adequately restricts and regulates the technology and establishes transparency standards.

If Huawei Loses ARM's Chip Designs, It's Toast

If Huawei Loses ARM's Chip Designs, It's Toast

The latest blow: Chip designer ARM has reportedly severed ties with the company. The BBC reports that its upcoming chip, the Kirin 985, may have snuck in under the wire, but after that the company will be stuck on the latest and greatest ARM designs as of May 22, 2019.

The False Promise of “Lawful Access” to Private Data

The False Promise of “Lawful Access” to Private Data

Terrorists should not feel free to upload terrible images of slaughter, but neither should they be empowered to empty people’s bank accounts or to tap the phones of presidents and prime ministers.“But,” people say, “What if only legitimate requests can get into the protected communications?” Weaknesses in computer systems are discovered by attackers all the time.

San Francisco Bans Agency Use of Facial Recognition Tech

San Francisco Bans Agency Use of Facial Recognition Tech

Gregory Barber covers cryptocurrency, blockchain, and artificial intelligence for WIRED.San Francisco’s ban covers government agencies, including the city police and county sheriff’s department, but doesn’t affect the technology that unlocks your iPhone or cameras installed by businesses or individuals.

'Exodus' Spyware Posed as a Legit iOS App

'Exodus' Spyware Posed as a Legit iOS App

The iOS version of Exodus, built to look like a mobile carrier support app, used all of the mechanisms iOS offers legitimate apps to grab as much of a target’s data as possible.

It’s Time to End the NSA’s Metadata Collection Program

It’s Time to End the NSA’s Metadata Collection Program

In 2015, Congress passed the USA Freedom Act to reform Section 215 and prohibit the nationwide bulk collection of communications metadata, like who we make calls to and receive them from, when, and the call duration.

In the Face of Danger, We’re Turning to Surveillance

In the Face of Danger, We’re Turning to Surveillance

But they’re emblematic of something that’s happening more and more in the United States right now: people turning to surveillance, and specifically biometric surveillance like facial recognition technology, as a result of the US’s inability to take action to stop gun violence.

Internal Docs Show How ICE Gets Surveillance Help From Local Cops

Internal Docs Show How ICE Gets Surveillance Help From Local Cops

The internal documents show that through its Vigilant Solutions contract, which began in 2018 and runs to September 2020, ICE has access not only to five billion records gathered by private businesses, but also to 1.5 billion data points contributed by over 80 local law enforcement agencies from more than a dozen states.

San Francisco Could Be First to Ban Facial Recognition Tech

San Francisco Could Be First to Ban Facial Recognition Tech

“This is the first piece of legislation that I’ve seen that really takes facial recognition technology as serious as it is warranted and treats it as uniquely dangerous.” Woodrow Hartzog, Northeastern University Privacy laws in Texas and Illinois require anyone recording biometric data, including face scans and fingerprints, to give people notice and obtain their consent.

Is Big Tech Merging With Big Brother? Kinda Looks Like It

Is Big Tech Merging With Big Brother? Kinda Looks Like It

Yet in the West, at least, the threat of government surveillance systems being integrated with the existing corporate surveillance capacities of big-data companies like Facebook, Google, Microsoft, and Amazon into one gigantic all-seeing eye appears to trouble very few people—even as countries like Venezuela have been quick to copy the Chinese model.

Shouldn’t We All Have Seamless Micropayments By Now?

Shouldn’t We All Have Seamless Micropayments By Now?

If you buy things directly from small vendors, you’re stuck entering your credit card information, your email, and your billing address on site after site—sinking ever deeper into the surveillance economy as each digital form puts your personal details into someone else’s database, while also giving hackers ever more opportunities to filch your data.

Google Glass Wasn't a Failure. It Raised Crucial Concerns

Google Glass Wasn't a Failure. It Raised Crucial Concerns

Airport security regulations might mean you can no longer reasonably expect that you’re not being recorded in a terminal or on an airplane.And it’s not just government surveillance that has changed over the years — we ourselves are inviting devices into our homes and lives that could fundamentally alter what we can expect when it comes to privacy.

Surveillance Kills Freedom By Killing Experimentation

Surveillance Kills Freedom By Killing Experimentation

Of course the story is more complicated than that, but the ability for members of society to privately smoke weed was essential for putting it on the path to legalization.We don’t yet know which subversive ideas and illegal acts of today will become political causes and positive social change tomorrow, but they’re around.