U.S. court: Mass surveillance program exposed by Snowden was illegal. Police surveillance is more invasive and more mysterious than ever. There are a host of artificial intelligence and algorithm-based technologies that the New York Police Department could be using, but few know exactly what’s in the NYPD’s arsenal.
As multiple sources told Recode, trying to get the department, the largest in the United States, to reveal what surveillance tools they use is a process full of opacity and shifting legal arguments. Basically, if you want to know how the NYPD might be using tech to police your neighborhood, tough luck. I learned this lesson firsthand this past December when looking into various artificial intelligence-based technologies I thought the police department could be using. Like many journalists, I filed a request for public records, which is a wonky-but-nonetheless-simple process for requesting information from the government.
My query included documents like contracts and correspondence related to 21 security companies. Consider predictive policing tools, which NYPD representatives described in an article in 2017. Why Google Is Yanking Negative Coverage Of Powerful People From Its Search Results. The implementation of the European Union's so-called "right to be forgotten" policy is already having a worrying impact on the media, with at least two outlets revealing on Wednesday that links to articles of theirs have been scrubbed from Google.
A European court ruled in May that Google must remove links to articles from its search engine if the subjects of the post asked it to. GCHQ has tools to manipulate online information, leaked documents show. Meet the Online Tracking Device That is Virtually Impossible to Block. This story was co-published with Mashable.
A new, extremely persistent type of online tracking is shadowing visitors to thousands of top websites, from WhiteHouse.gov to YouPorn.com. First documented in a forthcoming paper by researchers at Princeton University and KU Leuven University in Belgium, this type of tracking, called canvas fingerprinting, works by instructing the visitor’s Web browser to draw a hidden image. Because each computer draws the image slightly differently, the images can be used to assign each user’s device a number that uniquely identifies it. Like other tracking tools, canvas fingerprints are used to build profiles of users based on the websites they visit — profiles that shape which ads, news articles, or other types of content are displayed to them. But fingerprints are unusually hard to block: They can’t be prevented by using standard Web browser privacy settings or using anti-tracking tools such as AdBlock Plus.
Panopticlick. Government agents 'directly involved' in most high-profile US terror plots. Nearly all of the highest-profile domestic terrorism plots in the United States since 9/11 featured the "direct involvement" of government agents or informants, a new report says.
Some of the controversial "sting" operations "were proposed or led by informants", bordering on entrapment by law enforcement. Yet the courtroom obstacles to proving entrapment are significant, one of the reasons the stings persist. The lengthy report, released on Monday by Human Rights Watch, raises questions about the US criminal justice system's ability to respect civil rights and due process in post-9/11 terrorism cases. It portrays a system that features not just the sting operations but secret evidence, anonymous juries, extensive pretrial detentions and convictions significantly removed from actual plots. "In some cases the FBI may have created terrorists out of law-abiding individuals by suggesting the idea of taking terrorist action or encouraging the target to act," the report alleges. How the NSA hacks PCs, phones, routers, hard disks 'at speed of light': Spy tech catalog leaks. 5 ways to prepare your advertising infrastructure for disaster Analysis A leaked NSA cyber-arms catalog has shed light on the technologies US and UK spies use to infiltrate and remotely control PCs, routers, firewalls, phones and software from some of the biggest names in IT.
The exploits, often delivered via the web, provide clandestine backdoor access across networks, allowing the intelligence services to carry out man-in-the-middle attacks that conventional security software has no chance of stopping. And if that fails, agents can simply intercept your hardware deliveries from Amazon to install hidden gadgets that rat you out via radio communications. Blogs - Adam Curtis - SUSPICIOUS MINDS. Extracting audio from visual information. Researchers at MIT, Microsoft, and Adobe have developed an algorithm that can reconstruct an audio signal by analyzing minute vibrations of objects depicted in video.
In one set of experiments, they were able to recover intelligible speech from the vibrations of a potato-chip bag photographed from 15 feet away through soundproof glass. In other experiments, they extracted useful audio signals from videos of aluminum foil, the surface of a glass of water, and even the leaves of a potted plant. The researchers will present their findings in a paper at this year’s Siggraph, the premier computer graphics conference.
“When sound hits an object, it causes the object to vibrate,” says Abe Davis, a graduate student in electrical engineering and computer science at MIT and first author on the new paper. Police escalate use of secret surveillance. Secret methods are being used increasingly by police.
(Photo: Microstock) Secret methods are being used increasingly by police, according to Professor Paul Larsson of the Norwegian Police University College. Larsson presented his observations at a recent conference on police research in Växjö, Sweden. The U.S. Government's Secret Plans to Spy for American Corporations. Throughout the last year, the U.S. government has repeatedly insisted that it does not engage in economic and industrial espionage, in an effort to distinguish its own spying from China’s infiltrations of Google, Nortel, and other corporate targets.
So critical is this denial to the U.S. government that last August, an NSA spokesperson emailed The Washington Post to say (emphasis in original): “The department does ***not*** engage in economic espionage in any domain, including cyber.” After that categorical statement to the Post, the NSA was caught spying on plainly financial targets such as the Brazilian oil giant Petrobras; economic summits; international credit card and banking systems; the EU antitrust commissioner investigating Google, Microsoft, and Intel; and the International Monetary Fund and World Bank.
In response, the U.S. modified its denial to acknowledge that it does engage in economic spying, but unlike China, the spying is never done to benefit American corporations. The CIA's Mop-Up Man: L.A. Times Reporter Cleared Stories With Agency Before Publication. A prominent national security reporter for the Los Angeles Times routinely submitted drafts and detailed summaries of his stories to CIA press handlers prior to publication, according to documents obtained by The Intercept.
Email exchanges between CIA public affairs officers and Ken Dilanian, now an Associated Press intelligence reporter who previously covered the CIA for the Times, show that Dilanian enjoyed a closely collaborative relationship with the agency, explicitly promising positive news coverage and sometimes sending the press office entire story drafts for review prior to publication. In at least one instance, the CIA’s reaction appears to have led to significant changes in the story that was eventually published in the Times. Who Is Running Phony Cell Phone Towers Around The United States? <img class="full-width" style="" typeof="foaf:Image" alt="" data-smsrc="<a pearltreesdevid="PTD454" rel="nofollow" href=" class="vglnk"><span pearltreesdevid="PTD455">http</span><span pearltreesdevid="PTD457">://</span><span pearltreesdevid="PTD459">www</span><span pearltreesdevid="PTD461">.
</span><span pearltreesdevid="PTD463">popsci</span><span pearltreesdevid="PTD465">. </span><span pearltreesdevid="PTD467">com</span><span pearltreesdevid="PTD469">/</span><span pearltreesdevid="PTD471">sites</span><span pearltreesdevid="PTD473">/</span><span pearltreesdevid="PTD475">popsci</span><span pearltreesdevid="PTD477">.
Enlarge Who Is Running Interceptor Towers? Though the F.B.I. has been using a basic mobile phone interceptor that tracks phone location, known colloquially by the brand name of "Stingray" since at least 2008, federal, state, and local officials have tried to say as little as possible about use of the technology, even in court proceedings. August GSM Interceptor Map. The CIA's Secret Journal Articles Are Gossipy, Snarky, and No Longer Classified. The CIA has declassified a trove of articles from its in-house journal, Studies in Intelligence.
Ostensibly a semi-academic review of spycraft, Studies emerges in the pieces, which date from the 1970s to the 2000s, as so much more, at turns mocking excessive secrecy and bad writing, dishing on problematic affairs, and bragging about press manipulation. Core Secrets: NSA Saboteurs in China and Germany. The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to documents obtained by The Intercept. The documents, leaked by NSA whistleblower Edward Snowden, also indicate that the agency has used “under cover” operatives to gain access to sensitive data and systems in the global communications industry, and that these secret agents may have even dealt with American firms.
The documents describe a range of clandestine field activities that are among the agency’s “core secrets” when it comes to computer network attacks, details of which are apparently shared with only a small number of officials outside the NSA. I’m terrified of my new TV: Why I’m scared to turn this thing on — and you’d be, too. I just bought a new TV. The old one had a good run, but after the volume got stuck on 63, I decided it was time to replace it. I am now the owner of a new “smart” TV, which promises to deliver streaming multimedia content, games, apps, social media and Internet browsing. Oh, and TV too. The Psychology of Color in Marketing. The psychology of color as it relates to persuasion is one of the most interesting—and most controversial—aspects of marketing. The reason: Most of today’s conversations on colors and persuasion consist of hunches, anecdotal evidence and advertisers blowing smoke about “colors and the mind.” To alleviate this trend and give proper treatment to a truly fascinating element of human behavior, today we’re going to cover a selection of the most reliable research on color theory and persuasion.
Misconceptions around the Psychology of Color. Wish You Had NSA's Cool Spying Toys? Now You Can. Ten Popular Mind Control Techniques Used Today. The more one researches mind control, the more one will come to the conclusion that there is a coordinated script that has been in place for a very long time with the goal to turn the human race into non-thinking automatons. For as long as man has pursued power over the masses, mind control has been orchestrated by those who study human behavior in order to bend large populations to the will of a small “elite” group. Today, we have entered a perilous phase where mind control has taken on a physical, scientific dimension that threatens to become a permanent state if we do not become aware of the tools at the disposal of the technocratic dictatorship unfolding on a worldwide scale.
Modern mind control is both technological and psychological. Tests show that simply by exposing the methods of mind control, the effects can be reduced or eliminated, at least for mind control advertising and propaganda. Invention Secrecy Orders Reach a 20 Year High. On October 27, 1977, Dr. Cover Story: How NSA Spied on Merkel Cell Phone from Berlin Embassy. What would you say to the NSA if you could send them an anonymous message? Backroom Move Strips 'Backdoor' NSA Spying Ban From Spending Bill. Congressional leaders have quietly deleted a measure meant to stop the National Security Agency's "backdoor" surveillance of American communications from a major spending bill.
You're being redirected to. Breaking the Addiction of Dissociation : S.M.A.R.T.'s Ritual Abuse Pages. This is a transcript from a presentation at the Eleventh Annual Ritual Abuse, Secretive Organizations and Mind Control Conference, August 2008. Welcome To The Matrix: Enslaved By Technology And The Internet Of Things. Secrets of Scientology. U.S. Spies on Millions of Cars. Are You Living with a Terrorist? The US Government Can Help You Be Sure. A government document obtained by journalists at The Intercept reveals the National Counterterrorism Center developed a complex set of criteria to help determine if individuals in the U.S. may be more vulnerable than others to the allure of violent extremism and created a "rating system" that would help law enforcement agents rank such prospects.
Dr. Evil is defending Big Oil — is anyone defending climate the same way? David and Goliath: What do we do about surveillance? - tech - 30 March 2015. “I couldn’t help but be surprised”: These Vietnam-era dirty tricks will shock you. WATCH: John Oliver Employs Brilliant Tactic to Get Edward Snowden to Explain Why NSA Surveillance Matters. Five Eyes. U.S. secretly tracked billions of calls for decades. Official Leaks: “These Senior People Do Whatever They Want” High Anxiety: LSD in the Cold War - The New Yorker. NSA’s Big Defenders Cash Big NSA Checks. Spy Agency's Secret Plans to Foster Online "Conformity" and "Obedience" Exposed. Churches Tracking Attendance With Facial Recognition Technology. Poly-graph. How do you spot the next terrorist? The Way GCHQ Obliterated The Guardian’s Laptops May Have Revealed More Than It Intended. "Definitely slanted against the United States" Ray Bradbury's FBI file.
How to gear up for a protest — Hopes&Fears — flow "Politics" MK ULTRA, LSD and the Military Industrial Music Industry. Conspiracy Theory and the Failure of Certainty. The Secret History of American Surveillance. New FBI Program Trains Teachers, Students to Snoop On Muslims. Tor Wars: The Signal Awakens. Could the Third Amendment be used to fight the surveillance state? Glenn Greenwald Stands by the Official Narrative. Did William Casey (ex CIA Director) really say this?, page 1. The new way police are surveilling you: Calculating your threat ‘score’ Cryptoscatology: A World of Stalking Fools: Strange Tales of Homeland Security and the Future of Mass Surveillance (Part One: Welcome to Gudavia)
Facial Recognition Services Coming to U.S. Airports Starting Next Month – FlyerTalk - The world's most popular frequent flyer community. ‘Eyewash’: How the CIA deceives its own workforce about operations. The Real Truth of the X-Files… Why Restaurants Are Googling Diners Before They Come In. The FBI has a new plan to spy on high school kids across the country. See Maps Showing Where FBI Planes Are Watching From Above. New Legislation Establishes Orwellian Propaganda Agency. Untitled. Tribute to Jose Delgado, Legendary and Slightly Scary Pioneer of Mind Control - Scientific American Blog Network. More False Flag Ops as the Deep State is Losing on Every Battlefront. The future of surveillance is hidden in airport ads. Chinese police endowed with glasses able to recognize faces. Theconversation.
Splinternews. China has started ranking citizens with a creepy 'social credit' system — here's what you can do wrong, and the embarrassing, demeaning ways they can punish you. Creepy New Uber Algorithm Knows When You're Drunk. The National Security Agency is A Criminal Organization. Saturday Matinee: The Minds of Men. A Group of 12-Year-Old Girls at a New York School Say They Were Strip Searched for Seeming 'Giddy' Breakthrough experiment beams audio messages across the room using only lasers. Glenn Greenwald: As Bezos Protests Invasion of His Privacy, Amazon Builds Global Surveillance State. The Pentagon's New Laser-Based Tool Uses Your Heartbeat to Track You. 30 People Who Downloaded Their Google Data Share The Most Unsettling Things They’ve Found. Red light cameras undermine rule of law. School Administration Reminds Female Students Bulletproof Vests Must Cover Midriff.