In Anti-Surveillance Camouflage for Your Face,
technology reporter Robinson Meyer details an experiment in which he tried actually going about his day to day life in downtown Washington DC while wearing CV Dazzle
, (previously on MeFi
) makeup and hairstyles to confuse facial recognition software. The technique is inspired by the old naval technique of dazzle camouflage
, which sought not to conceal a ship, but to confuse viewers as to its size and heading. Similarly, CV Dazzle aims to confuse software by making your face look less like a face and more like a confusing collection of shapes. This proves to have unanticipated effects on how Robinson is perceived by humans as well, leading to insights about how our appearance signals our privilege and place in the social hierarchy, and how that can overlap or conflict with the digital wakes we leave.
posted by Naberius
on Jul 24, 2014 -
In one of the most damning Snowden leaks yet revealed, Glenn Greenwald and Murtaza Hussain show that the NSA targets prominent Muslim-Americans
under the FISA secret court program. The Office of the Director of National Intelligence has in response issued a denial
that any Americans were targeted for exercising their constitutional rights via its tumblr.
posted by p3on
on Jul 9, 2014 -
“The good news is that there are solutions. The weakness of mass surveillance is that it can very easily be made much more expensive through changes in technical standards: pervasive end-to-end encryption can quickly make indiscriminate surveillance impossible on a cost-effective basis. The result is that governments are likely to fall back to traditional, targeted surveillance founded upon an individualized suspicion. Governments cannot risk the discovery of their exploits by simply throwing attacks at every “endpoint,” or computer processor on the end of a network connection, in the world. Mass surveillance, passive surveillance, relies upon unencrypted or weakly encrypted communications at the global network level.
Edward Snowden submits written testimony to an EU committee investigating mass surveillance, and answers questions.
The testimony takes place 3 days ahead of his highly anticipated SXSW appearance, to take place later today. Snowden is expected to speak about privacy, security, mass surveillance programs, free speech and whistle-blowing in a rare remote video appearance before a live audience.
Kansas Congressman Mike Pompeo finds this “deeply troubling” in a letter he's sent to the organizers of the conference.
Meanwhile, people who wish to #asksnowden questions can use the hashtag on Twitter. The talk is to take place at 12pm PT, today.
posted by fantodstic
on Mar 10, 2014 -
The defense of the illiberal activities of the actually-existing state cuts across superficial partisan lines, and the dominant political philosophy of both American parties is a venerable ideology of realpolitik imperial supremacy that deploys the rhetoric of liberalism as pacifying propaganda and recasts the completely mundane application of basic liberal-democratic principles–the kind at work in the activities of Wikileaks and Snowden–as irresponsibly adolescent, anarchical, and even libertarian (eww!) challenges to the very idea of the liberal state. “Liberal” apologists for the actually-existing criminal state spook actual liberals from the practice of actual liberalism by insinuating darkly that any doubts about the liberal legitimacy of the security state probably makes you a loathsome, possibly racist Paultard. Wil Wilkinson on why liberal critics of the "liberal" state seem "libertarian." [more inside]
posted by grobstein
on Jan 21, 2014 -
Der Spiegel reports on the NSA's "plumbers" at the Office of Tailored Access Operations, who collect and deploy exploits to infiltrate computers and even redirect shipments so they can install malware and hardware backdoors on electronics ordered by those they are targeting.
Jacob Appelbaum [AKA ioerror] reports
on the NSA's 'catalog', which ranges from $30 monitor cables that send back screenshots, to exploits for network security hardware from Cisco and Huawei, to backdoored BIOS code and firmware for all major hard drive manucfacturers.
While some of the NSA's malware requires physical access or proximity, much of it is remotely installable over the Internet.
At the 30c3 conference in Hamburg,
Appelbaum gives an in-depth talk about the NSA's Tailored Access Operations hacking activities
and its 'interdiction' process, whereby computers are tampered with during shipping or as part of a 'black-bag' operation.
Appelbaum, a Wikileaks affiliate who has reported on documents leaked by Edward Snowden, has been personally targeted
by such operations, as have his family members.
posted by anemone of the state
on Dec 30, 2013 -
Edward Snowden has delivered the UK Channel 4's Alternative Christmas Message
Together, we can find a better balance. End mass surveillance. And remind the government that if it really wants to know how we feel, asking is always cheaper than spying.
This address follows Monday's interview
with the Washington Post in which he explains his motives for releasing information he collected while working for the NSA.
posted by Joe in Australia
on Dec 24, 2013 -
The Men Who Leaked The Secrets
To the likes of Brooks, Snowden was a disconcerting mystery; Glenn Greenwald, though, got him right away. "He had no power, no prestige, he grew up in a lower-middle-class family, totally obscure, totally ordinary," Greenwald says. "He didn't even have a high school diploma. But he was going to change the world – and I knew that." And, Greenwald also believed, so would he. "In all kinds of ways, my whole life has been in preparation for this moment," he says. [more inside]
posted by the man of twists and turns
on Dec 10, 2013 -
Freedom of Information
. The New Yorker
looks behind the scenes at The Guardian
under current editor Alan Rusbridger, including the investigation of the News of the World
phone hacking scandal (previously
), overseeing the release of US diplomatic cables obtained by Wikileaks (previously
), and the continuing reporting on NSA material obtained by Edward Snowden (previously
posted by figurant
on Oct 10, 2013 -
In a new batch of slides
from an NSA presentation (originally leaked by now fugitive Edward Snowden), Glenn Greenwald of the Gaurdian goes into great detail about NSA tool "X-Keyscore" information gathering system, which allows the NSA to view "nearly everything a user does on the internet", including Skype, Facebook chats, and other social media activity. [more inside]
posted by lattiboy
on Jul 31, 2013 -