surveillance   43548

« earlier    

Want to see something crazy? Open this link on your phone with WiFi turned off • Medium
Philip Neustrom:
<p>Want to see something crazy? Open this link on your phone with WiFi turned off:
<a href=""></a>

Click “Begin,” enter the ZIP code and then click “See Underlying Data.”

What you should see is your home address, phone number, cell phone contract details, and — depending on what kind of cell phone towers you’re currently connected to — a latitude and longitude describing the current location of your cell phone…

…In 2003, news came to light that AT&T was providing the DEA and other law enforcement agencies with no-court-warrant-required access to real time cell phone metadata. This was a pretty big deal at the time.

But what these services show us is even more alarming: US telcos appear to be selling direct, non-anonymized, real-time access to consumer telephone data to third party services — not just federal law enforcement officials — who are then selling access to that data.

Given the trivial “consent” step required by these services and unlikely audit controls, it appears that these services could be used to track or de-anonymize nearly anyone with a cell phone in the United States with potentially no oversight.</p>

I haven't confirmed that this works (because I'm not in the US). But others are very worried by it.
privacy  wireless  surveillance 
yesterday by charlesarthur
Following heavy criticism, OnePlus makes changes to its data collection policy • AndroidAuthority
Brian Reigh:
<p>the company’s co-founder has taken to the official OnePlus forum to address some of the concerns. Specifically, Carl Pei says that there will be some much-needed changes in how the company collects user data in the future:
<p>By the end of October, all OnePlus phones running OxygenOS will have a prompt in the setup wizard that asks users if they want to join our user experience program. The setup wizard will clearly indicate that the program collects usage analytics. In addition, we will include a terms of service agreement that further explains our analytics collection. We would also like to share we will no longer be collecting telephone numbers, MAC Addresses and WiFi information.</p>

Pei emphasizes again that for existing users, usage analytics collection can be turned off by going into Settings – Advanced – Join user experience program. For new users, you will have the option to disable it during the initial setup.

Not to condone the company’s unauthorized collection of personal data, but information like reboot and charging timestamps could be useful for “after-sales support” indeed. However, I can’t help but conclude that the collection of phone numbers, MAC addresses, and Wi-Fi information was, plainly put, gross misconduct on the company’s part. And Pei’s simply stating that the company would stop collecting the said data from now on doesn’t absolve him from his duty owed to consumers to explain why it was necessary in the first place.</p>

Reigh has said it all. Just stop collecting this data now.
oneplus  surveillance 
yesterday by charlesarthur
[1707.06557] leave a trace - A People Tracking System Meets Anomaly Detection
Video surveillance always had a negative connotation, among others because of the loss of privacy and because it may not automatically increase public safety. If it was able to detect atypical (i.e. dangerous) situations in real time, autonomously and anonymously, this could change. A prerequisite for this is a reliable automatic detection of possibly dangerous situations from video data. This is done classically by object extraction and tracking. From the derived trajectories, we then want to determine dangerous situations by detecting atypical trajectories. However, due to ethical considerations it is better to develop such a system on data without people being threatened or even harmed, plus with having them know that there is such a tracking system installed. Another important point is that these situations do not occur very often in real, public CCTV areas and may be captured properly even less. In the artistic project leave a trace the tracked objects, people in an atrium of a institutional building, become actor and thus part of the installation. Visualisation in real-time allows interaction by these actors, which in turn creates many atypical interaction situations on which we can develop our situation detection. The data set has evolved over three years and hence, is huge. In this article we describe the tracking system and several approaches for the detection of atypical trajectories.
amusing  anomaly-detection  computer-vision  surveillance  machine-learning  the-mangle-in-practice  to-write-about 
yesterday by Vaguery
Windows 10 telemetry violates privacy laws – BetaNews
"Microsoft does not clearly inform users about the type of data it uses, and for which purpose. Also, people cannot provide valid consent for the processing of their personal data, because of the approach used by Microsoft. The company does not clearly inform users that it continuously collects personal data about the usage of apps and web surfing behaviour through its web browser Edge, when the default settings are used."
against  Windows  surveillance  privacy 
yesterday by dandv
The Other Big Brother: Why Workplace Surveillance Should Get More Scrutiny - The Atlantic
Those who focus on the government’s privacy infringements also tend to emphasize that, while employees can switch jobs, it is much harder to move to another nation to avoid American surveillance. But this argument is a red herring as well: Competiti…
privacy  surveillance  SurveillanceCapitalism  WorkplaceSurveillance  FrankPasquale 
2 days ago by loughlin
Wes Clark Jr. - Posts
They have the names, emails, addresses, phone numbers and personal information for each and every one of us that went out there or contributed money to the cause of protecting both our environment and our Constitution
nodapl  surveillance  police.state 
3 days ago by lutzray
Google is permanently removing Home Mini’s top touch functionality due to always-recording bug • 9to5Google
Justin Duino:
<p>On October 10, Google confirmed that one of the Home Mini’s features — the ability to trigger Assistant by tapping on the top of the speaker — was defective on a select number of units. As the bug was causing the smart speaker to essentially listen and record its surroundings 24/7, Google quickly pushed out an update to disable this feature.

Google has now reached out to let us know that it has permanently removed the Assistant-specific touch functionality and will not bring it back…
<p>We take user privacy and product quality concerns very seriously. Although we only received a few reports of this issue, we want people to have complete peace of mind while using Google Home Mini.

We have made the decision to permanently remove all top touch functionality on the Google Home Mini. As before, the best way to control and activate Google Home Mini is through voice, by saying “Ok Google” or “Hey Google,” which is already how most people engage with our Google Home products. You can still adjust the volume by using the touch control on the side of the device.</p>

This stemmed from the experience of Artem Russakovskii of Android Police, as <a href="">noted here last week</a>. Google should probably be glad he discovered it: imagine the outcry if it had gone into full production with this happening.
googlehome  mini  recording  surveillance 
3 days ago by charlesarthur
The myth of Responsible Encryption: why it would never work - CNET
Government officials call for a way to protect consumers while also letting law enforcement see criminal data. But experts say it's not possible.
encryption  surveillance  security 
3 days ago by kger
How Israel Caught Russian Hackers Scouring the World for U.S. Secrets - The New York Times
It was a case of spies watching spies watching spies: Israeli intelligence officers looked on in real time as Russian government hackers searched computers around the world for the code names of American intelligence programs.

What gave the Russian hacking, detected more than two years ago, such global reach was its improvised search tool — antivirus software made by a Russian company, Kaspersky Lab, that is used by 400 million people worldwide, including by officials at some two dozen American government agencies.

The Israeli officials who had hacked into Kaspersky’s own network alerted the United States to the broad Russian intrusion, which has not been previously reported, leading to a decision just last month to order Kaspersky software removed from government computers.
2017-10  data  tech  privacy  security  surveillance  russian 
5 days ago by Weaverbird
MacArthur Foundation
Paglen developed a method of "limit telephotography," which uses high-power telescopes in combination with cameras, to photograph secret prisons and military bases. In an ongoing body of photographs known collectively as "The Other Night Sky," Paglen works with amateur astronomers to document classified satellites that orbit the earth. The mysterious images of the physical manifestations of military power hover between abstraction and information, between the inscrutable and the mundane. They are at once compelling as visual compositions and chilling as photographic documentation of activities that are otherwise based on speculation. More recently, Paglen has explored the ocean floor to make photographs of underwater fiber optic cables that circle the Earth and enable internet connection and developed tools to show what artificial intelligence networks and other autonomous surveillance systems "see" when they look at the world.
photography  surveillance  infrastructure 
5 days ago by gwijthoff
Google is nerfing all Home Minis because mine spied on everything I said 24/7 [Update] • Android Police
Artem Russakovskii:
<p>Without fail, every time a new listening device comes to market, some tinfoil hat-wearer points out how perfect they would be as modern-day Trojan horses for any of the three-letter acronym organizations - NSA, CIA, FBI - you name it. Manufacturers, on their part, assure us their devices are perfectly safe and only listen when prompted. We brush the concerns off and move on with our lives, but not before granting our smart pineapples (did you know "pineapple" is the codename for Google Home?) access to the smart rice maker, smart vacuum, and smart toothbrush.

I didn't give too much thought to these privacy concerns because they all sounded theoretical and unlikely. My four Google Homes and three Echos sat quietly on their respective desks and counters, and only turned on when one of three things happened:

• I called out a hotword (Alexa for Echos and Hey or OK Google for Homes).<br />• A video I was watching or podcast I was listening to did this (I'm looking at you, Marques!)<br />• They heard a noise or word that they thought sounded like a hotword but in reality was not. This happened once or twice every few days.

That is until last week, when a 4th case came along - 24/7 recording, transmission to Google's servers, and storing on them of pretty much everything going on around my Home Mini, which I had just received at the Made by Google October 4th launch event.</p>

The Home Mini was recording <em>everything</em>, and storing it on Google's servers. Google says it was a hardware flaw on the batches given out at the "Made by Google" events introducing this. Russakovskii estimates that's at least 4,000 of them. It has disabled the long-press functionality as a result.
googlehome  surveillance 
5 days ago by charlesarthur

« earlier    

related tags

2013  2017-10  2017  341webmgmt  351  50centarmy  644  account  aclu  addiction  ads  advertisements  advertising  against  ai  algorithms  ali-refaie  american+civil+liberties+union  amusing  analytics  android  anomaly-detection  anthropology  apple  application  architecture  archive  art  articles  associative  auromation  auspol  australia  automated-cars  aviationweek  axon  biometric  boeing  bot  business  buzzfeed  california  cameras  canada  captology  cctv  censorship  china  civil+liberties  clippings  cloud  cogsci  commerce  communication  comprehension  compthinking  computation  computer-vision  computervision  consent  content  control  copyright  crime  criminology  culture  customer  cv  cvdazzle  dariuskazemi  data-ethics  data  database  datascience  dating  deepface  delete  deletion  design  dhs  dissent  distraction  diy  dj  dopamine  dystopia  edtech  education  encryption  endurance  enforcement  engagementtime  ethics  eu  extortion  facebook  facial  facial_recognition  facialrecognition  failure  fakenews  familiar  family_surveillence  fbi  feed  frankpasquale  freewill  gchq  geoprofiling  geotag  gfw  githubeg  google  googleads  googleclips  googlehome  guardian  guidelines  hacking  health  hjd  howto  humanrights  humor  identity  image  imageanalysis  imaging  immigration  influence  infrastructure  instant-messaging  intelsat  interaction  internet  interviews  iphone  ireland  justice  keystroke  langauge  law  learning  lms  location  longreads  machine-learning  macintosh  malware  marketing  markov  max  mental  metadata  metdata  midtheory  mini  mobile  mobilemedia  monitoring  mosaic  mygovid  netcritique  nodapl  nsa  offices  oneplus  online  openplan  orwell  otf  panopticon  people  personal-data  peteraldhouse  philosophy  photography  planes  platform  police.state  police  policebrutality  politics  power  privacy  privacykit  profile  programming  projects  psc  quotes  racism  radio  recognition  recording  reidentification  research  researchers  retention  review  robotics  roundup  russian  satire  scale  schneier  scif  search  security  sensitive-compartmented-information-facility  sensorship  service  siliconvalley  smartdevice  smartmeter  socialgraph  socialmedia  sousveillance  spam  spyapps  spyphones  spyware  stream  subject  surveillancecapitalism  tagging  taser  tech  technology  terrorism  the-mangle-in-practice  thirdplace  time  tinder  to-write-about  toys  tracking  tutorials  twitter  uas  uav  ubc  unitedstates  usa  user  videos  vle  voice  voice_activation  web  weibo  windows  wireless  witness  workplacesurveillance  workspace 

Copy this bookmark: