Blog

Archive for the ‘surveillance’ category: Page 26

Aug 17, 2019

A.I. Is Learning From Humans. Many Humans

Posted by in categories: education, health, robotics/AI, surveillance, transportation

Before an A.I. system can learn, someone has to label the data supplied to it. Humans, for example, must pinpoint the polyps. The work is vital to the creation of artificial intelligence like self-driving cars, surveillance systems and automated health care.


Artificial intelligence is being taught by thousands of office workers around the world. It is not exactly futuristic work.

At iMerit offices in Kolkata, India, employees label images that are used to teach artificial intelligence systems. Credit Credit Rebecca Conway for The New York Times.

Aug 14, 2019

Turn your Tesla into a CIA-like counter-surveillance tool with this hack

Posted by in categories: cybercrime/malcode, surveillance, transportation

A software engineer has built an impressive real-time counter-surveillance tool for Tesla vehicles on top of Sentry Mode.

It looks like something the CIA or James Bond would have in their car.

Aug 14, 2019

It’s 2043. We Need a New American Dream for the A.I. Revolution

Posted by in categories: biotech/medical, drones, economics, employment, food, government, robotics/AI, surveillance

Nevertheless, to date, most of the wealth generated by advances in A.I. and robotics has been acquired by the executives of technology companies. It’s time for the benefits of the A.I. revolution to be broadly distributed through an expanded social safety net.

Unfortunately, members of Congress are taking the opposite path and have proposed cuts to a range of social programs. Several hundred thousand people arrived in Washington on Saturday to protest these cuts. During the demonstration, masked agitators threw rocks at the autonomous drones deployed for crowd control; in response, drones dispensed pepper spray on the protesters below, causing a stampede. More than 20 people were injured and treated at local hospitals; one protester died of his injuries on Monday. The police detained 35 people at the scene; 25 more arrests have been made since then, after authorities used facial recognition technology to identify protesters from surveillance video.

Punishing the poor who were harmed by economic disruptions has been a mistake repeated throughout American history. During the Industrial Revolution, machines displaced many artisans and agricultural workers. To deter these unemployed workers from seeking public relief, local governments set up poorhouses that required residents to perform hard labor. And between 1990 and 2020, the federal government — and some state governments — repeatedly cut social program spending even as middle-class jobs disappeared as a result of outsourcing and automation. Workers who didn’t have the skills to thrive in the knowledge economy were resigned to join the underclass of service workers.

Aug 12, 2019

Pre-installed apps in 7 million Android devices found containing malware

Posted by in categories: cybercrime/malcode, mobile phones, surveillance

Security researchers from Google’s Project Zero team recently uncovered pre-installed apps in Android devices that either allowed remote attackers to carry out remote code execution, could disable Google Play Protect in devices, or could collect information on users’ web activities.

At the Black Hat cybersecurity conference in Las Vegas, Maddie Stone, a security researcher on Project Zero and who previously served as Senior Reverse Engineer & Tech Lead on Android Security team, revealed that her team discovered three instances of Android malware being pre-installed in budget Android phones in the recent past.

One such pre-installed app was capable of turning off Google Play Protect, the default mobile security app in Android devices, thereby leaving devices vulnerable to all forms of cyber attacks or remote surveillance. The Project Zero team also found an app pre-installed on Android phones that gathered logs of users’ web activities.

Aug 5, 2019

A Multimillionaire Surveillance Dealer Steps Out Of The Shadows… And His $9 Million WhatsApp Hacking Van

Posted by in categories: cybercrime/malcode, mobile phones, surveillance

He can hack your WhatsApp, find out where you are in 15 minutes and monitor your iPhone. But Tal Dilian says he’s one of the good guys. It’s badly-behaved governments who should be in trouble, not the $12 billion industry he’s come to represent.

Aug 4, 2019

The U.S. Spy Hub in the Heart of Australia

Posted by in categories: security, surveillance

A short drive south of Alice Springs, the second largest population center in Australia’s Northern Territory, there is a high-security compound, code-named “RAINFALL.” The remote base, in the heart of the country’s barren outback, is one of the most important covert surveillance sites in the eastern hemisphere.

Aug 3, 2019

How to Hack a Face: From Facial Recognition to Facial Recreation

Posted by in categories: cybercrime/malcode, information science, mobile phones, privacy, robotics/AI, surveillance

Given that going viral on the Internet is often cyclical, it should come as no surprise that an app that made its debut in 2017 has once again surged in popularity. FaceApp applies various transformations to the image of any face, but the option that ages facial features has been especially popular. However, the fun has been accompanied by controversy; since biometric systems are replacing access passwords, is it wise to freely offer up our image and our personal data? The truth is that today the face is ceasing to be as non-transferable as it used to be, and in just a few years it could be more hackable than the password of a lifetime.

Our countenance is the most recognisable key to social relationships. We might have doubts when hearing a voice on the phone, but never when looking at the face of a familiar person. In the 1960s, a handful of pioneering researchers began training computers to recognise human faces, although it was not until the 1990s that this technology really began to take off. Facial recognition algorithms have improved to such an extent that since 1993 their error rate has been halved every two years. When it comes to recognising unfamiliar faces in laboratory experiments, today’s systems outperform human capabilities.

Continue reading “How to Hack a Face: From Facial Recognition to Facial Recreation” »

Aug 2, 2019

Mass Surveillance: 1 in 2 Americans Are Already In A Government Facial Recognition Database

Posted by in categories: government, robotics/AI, surveillance, transportation

As well as Gait Recognition. (Go ahead and wear a disguise.)


The mass surveillance of innocent Americans continues as George Orwell’s 1984 becomes more of a reality with each passing day. “All told, we are barreling toward a future where every ritual of public life carries implicit consent to be surveilled,” writes Sidney Fussell for The Atlantic.

A new report from Georgetown Law‘s Center on Privacy & Technology (CPT) suggests that Immigration and Customs Enforcement (ICE) may be using the rampant problem of illegal immigration as a type of cover to track and spy on Americans in violation of their Fourth Amendment rights. Three years ago, the center revealed that nearly half of all U.S. adults are already in the FBI’s facial recognition database, which is largely sourced from DMV photos.

Continue reading “Mass Surveillance: 1 in 2 Americans Are Already In A Government Facial Recognition Database” »

Jul 30, 2019

Electronic Harassment Must Stop‼️ Photo

Posted by in categories: mobile phones, surveillance

Do you know how to jam these?


Description:

The StingRay is an IMSI-catcher, a controversial cellular phone surveillance device, manufactured by Harris Corporation.

Jul 28, 2019

The French Have Plans For A Constellation Of Laser-Armed Miniature Satellites

Posted by in categories: satellites, surveillance

France’s “Mastering Space” plan calls for an active defense against hostile satellites and new space-based surveillance capabilities to spot threats.

Page 26 of 39First2324252627282930Last