In Anti-Surveillance Camouflage for Your Face,
technology reporter Robinson Meyer details an experiment in which he tried actually going about his day to day life in downtown Washington DC while wearing CV Dazzle
, (previously on MeFi
) makeup and hairstyles to confuse facial recognition software. The technique is inspired by the old naval technique of dazzle camouflage
, which sought not to conceal a ship, but to confuse viewers as to its size and heading. Similarly, CV Dazzle aims to confuse software by making your face look less like a face and more like a confusing collection of shapes. This proves to have unanticipated effects on how Robinson is perceived by humans as well, leading to insights about how our appearance signals our privilege and place in the social hierarchy, and how that can overlap or conflict with the digital wakes we leave.
posted by Naberius
on Jul 24, 2014 -
This week's Glenn Greenwald revelation
is that Britain's GCHQ JTRIG intelligence organization offers its agents and planners tools
with abilities to increase the search ranking of chosen web sites, “change outcome of online polls”, “masquerade Facebook Wall Posts for individuals or entire countries”, and accomplish “amplification of a given message, normally video, on popular multimedia websites (Youtube).” [more inside]
posted by XMLicious
on Jul 16, 2014 -
On a bright April morning in Menlo Park, California, I became an Internet spy.
This was easier than it sounds because I had a willing target. I had partnered with National Public Radio (NPR) tech correspondent Steve Henn for an experiment in Internet surveillance. For one week, while Henn researched a story, he allowed himself to be watched—acting as a stand-in, in effect, for everyone who uses Internet-connected devices. How much of our lives do we really reveal simply by going online?
Ars tests Internet surveillance—by spying on an NPR reporter.
posted by Johnny Wallflower
on Jun 16, 2014 -
As part of its effort to combat insurgent forces interspersed within an indigenous population, the use of biometrics has become a central component of the U.S. war effort. Having expanded heavily since its introduction during the war in Iraq, biometric identification and tracking of individuals has become a core mission in Afghanistan with initiatives sponsored by the U.S. and Afghan governments seeking to obtain the biometric identifiers of nearly everyone in the country. [more inside]
posted by gorbweaver
on Apr 23, 2014 -
Reuters: EU court rules against requirement to keep data of telecom users
[different news sources: BBC
, The Register
] Considerably more detail is available in the ECJ press release (pdf)
and the full judgement
but the Court has invalidated Data Retention Directive 2006/24/EC and struck a very clear blow against metadata storage in national law as the authority of the directive will soon cease to exist. This has a particular impact for UK MeFites, as UK law was based on the Directive and crucially passed through Parliament via the European Communities Act and thus skipped some review steps but is founded on the validity of the directive being implemented. Remaining national law would of course also be open to challenge on the same grounds. [more inside]
posted by jaduncan
on Apr 8, 2014 -
New Snowden disclosures:
"The National Security Agency has built a surveillance system capable of recording '100 percent' of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place." [more inside]
posted by Noisy Pink Bubbles
on Mar 18, 2014 -
United States Senator Dianne Feinstein Publicly Accuses C.I.A. of Spying on Congress.
'The chairwoman of the Senate intelligence committee on Tuesday accused the Central Intelligence Agency of improperly removing documents from computers that committee staff members had been using to complete a report on the agency’s detention program, saying the move was part of an effort to intimidate the committee.' 'Senator Dianne Feinstein, Democrat of California and the chairwoman of the committee, suggested on the Senate floor that the agency had violated federal law and said the C.I.A. had undermined Congress’s constitutional right to oversee the actions of the executive branch.' [more inside]
posted by VikingSword
on Mar 11, 2014 -
“The good news is that there are solutions. The weakness of mass surveillance is that it can very easily be made much more expensive through changes in technical standards: pervasive end-to-end encryption can quickly make indiscriminate surveillance impossible on a cost-effective basis. The result is that governments are likely to fall back to traditional, targeted surveillance founded upon an individualized suspicion. Governments cannot risk the discovery of their exploits by simply throwing attacks at every “endpoint,” or computer processor on the end of a network connection, in the world. Mass surveillance, passive surveillance, relies upon unencrypted or weakly encrypted communications at the global network level.
Edward Snowden submits written testimony to an EU committee investigating mass surveillance, and answers questions.
The testimony takes place 3 days ahead of his highly anticipated SXSW appearance, to take place later today. Snowden is expected to speak about privacy, security, mass surveillance programs, free speech and whistle-blowing in a rare remote video appearance before a live audience.
Kansas Congressman Mike Pompeo finds this “deeply troubling” in a letter he's sent to the organizers of the conference.
Meanwhile, people who wish to #asksnowden questions can use the hashtag on Twitter. The talk is to take place at 12pm PT, today.
posted by fantodstic
on Mar 10, 2014 -
The Day We Fight Back
is a protest against mass surveillance. "The SOPA and PIPA protests were successful because we all took part, as a community. As Aaron Swartz put it, everybody "made themselves the hero of their own story." We can set a date, but we need all of you, the users of the Internet, to make it a movement. [more inside]
posted by aniola
on Feb 11, 2014 -
You don’t want your privacy: Disney and the meat space data race
The bands are even uniquely colored and monogrammed with your family members’ names so that they won’t get switched up. Why? Because they don’t want their database to get confused and think that you, a 45-year-old man, rode the teacups instead of your little son Timmy. This is one of the first examples I’ve seen of physical design (e.g., monogramming and coloring) for the sake of digital data purity.
If ever there was a testimony to the importance big data has achieved in business it’s this: We will now shape our physical world to create better streams of digital information.
posted by frimble
on Jan 27, 2014 -
The defense of the illiberal activities of the actually-existing state cuts across superficial partisan lines, and the dominant political philosophy of both American parties is a venerable ideology of realpolitik imperial supremacy that deploys the rhetoric of liberalism as pacifying propaganda and recasts the completely mundane application of basic liberal-democratic principles–the kind at work in the activities of Wikileaks and Snowden–as irresponsibly adolescent, anarchical, and even libertarian (eww!) challenges to the very idea of the liberal state. “Liberal” apologists for the actually-existing criminal state spook actual liberals from the practice of actual liberalism by insinuating darkly that any doubts about the liberal legitimacy of the security state probably makes you a loathsome, possibly racist Paultard. Wil Wilkinson on why liberal critics of the "liberal" state seem "libertarian." [more inside]
posted by grobstein
on Jan 21, 2014 -
Der Spiegel reports on the NSA's "plumbers" at the Office of Tailored Access Operations, who collect and deploy exploits to infiltrate computers and even redirect shipments so they can install malware and hardware backdoors on electronics ordered by those they are targeting.
Jacob Appelbaum [AKA ioerror] reports
on the NSA's 'catalog', which ranges from $30 monitor cables that send back screenshots, to exploits for network security hardware from Cisco and Huawei, to backdoored BIOS code and firmware for all major hard drive manucfacturers.
While some of the NSA's malware requires physical access or proximity, much of it is remotely installable over the Internet.
At the 30c3 conference in Hamburg,
Appelbaum gives an in-depth talk about the NSA's Tailored Access Operations hacking activities
and its 'interdiction' process, whereby computers are tampered with during shipping or as part of a 'black-bag' operation.
Appelbaum, a Wikileaks affiliate who has reported on documents leaked by Edward Snowden, has been personally targeted
by such operations, as have his family members.
posted by anemone of the state
on Dec 30, 2013 -
The Men Who Leaked The Secrets
To the likes of Brooks, Snowden was a disconcerting mystery; Glenn Greenwald, though, got him right away. "He had no power, no prestige, he grew up in a lower-middle-class family, totally obscure, totally ordinary," Greenwald says. "He didn't even have a high school diploma. But he was going to change the world – and I knew that." And, Greenwald also believed, so would he. "In all kinds of ways, my whole life has been in preparation for this moment," he says. [more inside]
posted by the man of twists and turns
on Dec 10, 2013 -
"Reality has caught us"
Ubisoft game Watch Dogs
, scheduled for release next year, models pervasive surveillance as a game. Polygon's Charlie Hall investigates Chicago's vast camera network and finds the fiction might be not so far away from reality. [more inside]
posted by Sebmojo
on Oct 16, 2013 -
NSA mathematician Roger Barkan's take on NSA survellance of Americans. "As someone deep in the trenches of NSA, where I work on a daily basis with data acquired from these programs, I, too, feel compelled to raise my voice. Do I, as an American, have any concerns about whether the NSA is illegally or surreptitiously targeting or tracking the communications of other Americans? The answer is emphatically, "No."
posted by markkraft
on Sep 18, 2013 -
DJ Hennessy Youngman follows up CVS BANGERS [prev.]
with his new Soundcloud mix, NSA BANGERS.
NSA BANGERS is an audio landscape full of paranoia, espionage, epic snooping, unhealthy obsession, and the stress of being a contemporary type human being. Basically, NSA BANGERS is the soundtrack of Freedom! And Freedom is expensive y'all! Apparently, it like, costs your Freedom!
posted by porn in the woods
on Sep 2, 2013 -
"Making journalism harder, slower and less secure
, throwing sand in the gears, is fully within the capacity of the surveillance state. It has the means, the will and the latitude to go after journalism the way it went after terrorism... Only if they can turn a mostly passive public into a more active one can journalists come out ahead in this fight. I know they don’t think of mobilization as their job, and there are good reasons for that, but they didn’t think editors would be destroying hard drives under the gaze of the authorities, either! Journalism almost has to be brought closer to activism to stand a chance of prevailing in its current struggle with the state." [more inside]
posted by felch
on Aug 27, 2013 -