Blog

Archive for the ‘surveillance’ category: Page 7

Feb 28, 2023

A simple DIY hoodie can fool security cameras

Posted by in categories: cybercrime/malcode, surveillance

Pierce, an artist whose work critically engages with weaponized emerging technologies, recently unveiled their latest ingenious project—an everyday hoodie retrofitted to include an array of infrared (IR) LEDs that, when activated, blinds any nearby night vision security cameras. Using mostly off-the-shelf components like LumiLED lights, an Adafruit microcontroller, and silicone wire, as well as we software Pierce that made open-source for interested DIYers, the privacy-boosting “Camera Shy Hoodie” is designed to enable citizens to safely engage in civic protests and demonstrations. Or, wearers can just simply opt-out of being tracked by unknown third-parties while walking down the street.


A DIY hack for hoodies emits infrared LEDs to obscure wearers’ faces from invasive surveillance camera tracking.

Feb 19, 2023

Quantum sensing readies to be the 21st century’s surveillance leap

Posted by in categories: quantum physics, surveillance

Devices now being tested in the sky could gather ultra-precise data.

Feb 15, 2023

Why stratospheric balloons are used in era of space-based intelligence

Posted by in categories: drones, military, satellites, surveillance

WASHINGTON — When the Pentagon revealed last week that a high-flying, Chinese balloon was spotted over the United States, officials said they didn’t expect the airship would add much value to the intelligence China is already gathering through its network of spy satellites.

“Our best assessment at the moment is that whatever the surveillance payload is on this balloon, it does not create significant value added over and above what the [People’s Republic of China] is likely able to collect through things like satellites in low Earth orbit,” a senior defense official told reporters Feb. 2.

While it’s unclear what information the uncrewed airship gathered before the Pentagon shot it down Feb. 4, experts say balloons loitering at high altitudes can offer some advantages over satellites and drones — or could at least augment their intelligence, surveillance and reconnaissance capabilities.

Feb 4, 2023

China urges calm over ‘spy’ balloon in US airspace — BBC News

Posted by in category: surveillance

China has urged “cool-headed” handling of a dispute over a giant Chinese balloon heading for the eastern US.

US Secretary of State Antony Blinken earlier called off a visit to Beijing, saying the “surveillance” balloon’s presence was “an irresponsible act”.

Continue reading “China urges calm over ‘spy’ balloon in US airspace — BBC News” »

Feb 3, 2023

Bill Gates proposal to monitor disease outbreaks could cost $1 billion a year

Posted by in categories: biotech/medical, surveillance

Bill Gates, the Microsoft founder turned philanthropist, has called for a global response team to be set up to carry out surveillance for pathogens that can potentially ring in the next pandemic, Financial Times reported.

Long before COVID-19 struck, Gates warned the world of an imminent pandemic and the need to prepare ourselves to face it. Gates has been vocal about the long delays involved in the vaccine development process and the lack of equity in vaccine distribution in the world. So far, he has also been right about how the COVID-19 pandemic will play out and has pandemic avoiding strategies in his new book.

Dec 29, 2022

There Are Spying Eyes Everywhere—and Now They Share a Brain

Posted by in categories: existential risks, government, habitats, internet, neuroscience, security, surveillance

One afternoon in the fall of 2019, in a grand old office building near the Arc de Triomphe, I was buzzed through an unmarked door into a showroom for the future of surveillance. The space on the other side was dark and sleek, with a look somewhere between an Apple Store and a doomsday bunker. Along one wall, a grid of electronic devices glinted in the moody downlighting—automated license plate readers, Wi-Fi-enabled locks, boxy data processing units. I was here to meet Giovanni Gaccione, who runs the public safety division of a security technology company called Genetec. Headquartered in Montreal, the firm operates four of these “Experience Centers” around the world, where it peddles intelligence products to government officials. Genetec’s main sell here was software, and Gaccione had agreed to show me how it worked.

He led me first to a large monitor running a demo version of Citigraf, his division’s flagship product. The screen displayed a map of the East Side of Chicago. Around the edges were thumbnail-size video streams from neighborhood CCTV cameras. In one feed, a woman appeared to be unloading luggage from a car to the sidewalk. An alert popped up above her head: “ILLEGAL PARKING.” The map itself was scattered with color-coded icons—a house on fire, a gun, a pair of wrestling stick figures—each of which, Gaccione explained, corresponded to an unfolding emergency. He selected the stick figures, which denoted an assault, and a readout appeared onscreen with a few scant details drawn from the 911 dispatch center. At the bottom was a button marked “INVESTIGATE,” just begging to be clicked.

Dec 19, 2022

A face recognition framework based on vision transformers

Posted by in categories: law enforcement, privacy, robotics/AI, security, surveillance

Face recognition tools are computational models that can identify specific people in images, as well as CCTV or video footage. These tools are already being used in a wide range of real-world settings, for instance aiding law enforcement and border control agents in their criminal investigations and surveillance efforts, and for authentication and biometric applications. While most existing models perform remarkably well, there may still be much room for improvement.

Researchers at Queen Mary University of London have recently created a new and promising for face recognition. This architecture, presented in a paper pre-published on arXiv, is based on a strategy to extract from images that differs from most of those proposed so far.

“Holistic methods using (CNNs) and margin-based losses have dominated research on face recognition,” Zhonglin Sun and Georgios Tzimiropoulos, the two researchers who carried out the study, told TechXplore.

Dec 6, 2022

SpaceX rolls out new business line focused on military satellite services

Posted by in categories: business, government, internet, military, satellites, surveillance

SpaceX revealed a new business segment called Starshield aimed at U.S. national security government agencies. “While Starlink is designed for consumer and commercial use, Starshield is designed for government use, with an initial focus on three areas: Earth observation, communications and hosted payloads,” the company said on its website.

This is a big deal as SpaceX is currently burning through $2 billion/year as it works to develop Starlink and Starship. So SpaceX wouldn’t mind some extra cash!


WASHINGTON — SpaceX on Dec. 2 revealed a new business segment called Starshield aimed at U.S. national security government agencies.

Continue reading “SpaceX rolls out new business line focused on military satellite services” »

Dec 4, 2022

An architecture that gives users full control of their smartphones

Posted by in categories: computing, mobile phones, surveillance

In recent years, many smartphone users have become concerned about the privacy of their data and the extent to which companies might have access to this data. As things stand today, the applications that users can run on their phone and what they can do with these applications is determined by a few big tech companies.

Researchers at ETH Zurich have recently set out on a quest to change this current trend, through the development of a new smartphone architecture called TEEtime. This architecture, introduced in a paper pre-published on arXiv, allows users to flexibly choose what resources on their smartphone they will dedicate to legacy operating systems, such as Android or iOS, and which they wish to keep for their own and data.

Continue reading “An architecture that gives users full control of their smartphones” »

Dec 1, 2022

Google discovers Windows exploit framework used to deploy spyware

Posted by in categories: security, surveillance

Google’s Threat Analysis Group (TAG) has linked an exploit framework that targets now-patched vulnerabilities in the Chrome and Firefox web browsers and the Microsoft Defender security app to a Spanish software company.

While TAG is Google’s team of security experts focused on protecting Google users from state-sponsored attacks, it also keeps track of dozens of companies that enable governments to spy on dissidents, journalists, and political opponents using surveillance tools.

The search giant says the Barcelona-based software firm is one of these commercial surveillance vendors and not just a provider of custom security solutions as it officially claims.

Page 7 of 39First4567891011Last