6 private links
A review of 3 automated systems in use by the Swiss police and judiciary reveals serious issues. Real-world effects are impossible to assess due to a lack of transparency.
But the controversial phone metadata program played little role in the terror-fundraising case at issue, the long-awaited ruling says.
A guide to stingray surveillance technology, which may have been deployed at recent protests.
Thousands of companies will face restrictions on storing information about European Union residents on U.S. servers, after the bloc’s top court ruled that such transfers exposed Europeans to American government surveillance without “actionable rights” to challenge it.
At least 11 local police forces in Europe use computer vision to automatically analyze images from surveillance cameras. The risks of discrimination run high but authorities ignore them.
Can we take government officials at their word that they'll eventually abandon their new powers?
Data-analytics company Palantir Technologies Inc. is in talks to provide software to governments across Europe to battle the spread of Covid-19 and make strained health-care systems more efficient, a person familiar with the matter said.
Afin de contrôler les déplacements, de nombreux pays mettent en place des applications ou exploitent les données mobiles. Une pratique polém
Nombreux sont les gouvernements du monde entier qui utilisent déjà des mesures de surveillance high-tech dans le combat contre la pandémie de Covid-19. À Singapour par exemple, les personnes susceptibles d'avoir fait lobjet dexposition au nouveau coronavirus (en particulier celles qui revenaient de l'étranger) ont été soumises à des périodes d'isolement à domicile de 14 jours. Les patients confirmés pour leur part ont été hospitalisés. Le contrôle du respect des périodes disolement prescrites...
Tracking entire populations to combat the pandemic now could open the doors to more invasive forms of government snooping later.
Governments around the world are using high-tech coronavirus surveillance measures to combat the outbreak. But are they worth it?
The federal government is in talks with Facebook, Google and other tech companies about ways to use smartphone location data to tackle the coronavirus,
Katrina Gulliver considers how we have acquiesced to losing our privacy
Tech from NEC aimed at spotting wanted persons on the streets to alert officers.
From Twitter’s spies to complete shutdowns, repressive regimes are using A.I. and VPN fingerprinting to silence their critics
It's time to shed light on the technical methods and business practices behind third-party tracking. For journalists, policy makers, and concerned consumers, this paper will demystify the fundamentals of third-party tracking, explain the scope of the problem, and suggest ways for users and legislation to fight back against the status quo.
As governments and companies invest more in security networks, hundreds of millions more surveillance cameras will be watching the world in 2021, mostly in China, according to a new report.
An interview with this specialist in human rights, technology and freedom of expression to discuss how today’s societies are advancing to the drumbeat of “digital colonialism”.
Under digital surveillance: how American schools spy on millions of kids | World news | The Guardian
Fueled by fears of school shootings, the market has grown rapidly for technologies that monitor students through official school emails and chats
It took Chinese authorities just seven minutes to locate and apprehend BBC reporter John Sudworth using its powerful network of CCTV camera and facial recognition technology. This wasn’t a case of a member of the media being forcibly removed from the country. The chase was a stunt set up to i…
Nanjing city cleaners are tracked by GPS and warned about long breaks
Experts with whom we consulted confirmed New York Times reports on the Saudi capability to “collect vast amounts of previously inaccessible data from smartphones in the air without leaving a trace—including phone calls, texts, emails”—and confirmed that hacking was a key part of the Saudis’ “extensive surveillance efforts that ultimately led to the killing of [Washington Post] journalist Jamal Khashoggi.”
Un chercheur en sécurité a découvert la preuve de la surveillance en masse dans Xinjiang, une région au nord-ouest, montrant ainsi lampleur du suivi des habitants de la Chine, pays qui est déjà connu pour son utilisation à grande échelle de lintelligence artificielle par le gouvernement pour la surveillance des minorités. Selon les révélations de Victor Gevers, chercheur en sécurité et co-fondateur de la Fondation GDI, la Chine suit de près les déplacements de près de 2,6 millions de personnes...
As the year draws to a close, so has EFF’s long-running Freedom of Information Act lawsuit against the Drug Enforcement Agency about the mass phone surveillance program infamously known as “Hemisphere.” We won our case and freed up tons of records. (So did the Electronic Privacy Information Center...
Recently, a patent application from Amazon became public that would pair face surveillance — like Rekognition, the product that the company is aggressively marketing to police and Immigration and Customs Enforcement — with Ring, a doorbell camera company that Amazon bought earlier this year.
We are Google employees and we join Amnesty International in calling on Google to cancel project Dragonfly, Google’s effort to create a…
Hi-tech drones that look and move like real birds have already flown over restive Xinjiang region
Beijing is putting billions of dollars behind facial recognition and other technologies to track and control its citizens.
Beijing’s underground system is planning to introduce 'bio-identification' technology including facial recognition in what it says is an effort to streamline passenger flow through its stations.
The 2010s will be remembered as the first decade in which we, the people, paid for the pleasure of welcoming Big Brother into our lives.
Amazon in June pitched its facial recognition technology as a tool for U.S. Immigration and Customs Enforcement.
The authenticity of the following anonymous op-ed has been verified by Medium’s editorial staff. Our columnist, Trevor Timm, has also interviewed the op-ed’s writer. You can read that here. When a…
Google CEO Sundar Pichai refused to answer a list of questions from a bipartisan group of six senators.
The company forced employees to delete the document, which stated that a Chinese partner would have “unilateral access” to user data.
Secret program gives NSA, FBI backdoor access to Apple, Google, Facebook, Microsoft data - The Verge
Five-year-old program provides government with direct access to email, messages, browser history, more
These photographers explored the implications of a culture of pervasive monitoring.
Supporters of wholesale government surveillance are fond of saying that only the guilty should be worried about spying. Let's put that spurious argument out to pasture once and for all. Commentary by Bruce Schneier.
Une étude américaine montre que la surveillance gouvernementale incite les internautes à taire leurs opinions quand ils les considèrent minoritaires.
Il est une question à laquelle j’avoue avoir du mal à répondre : « pourquoi la surveillance de masse est-elle néfaste à la société dans son ensemble ? ». Comme beaucoup, j’ai une
L'agence de surveillance US victime de son zèle
And how it might change what cops can do with our smartphones.
Monitoring tech pioneered in the region is spreading across China and the world.
A British spy agency secretly hacked a company in Belgium then evaded an extraordinary police investigation.
The story of the deliberate creation of the modern mass-surveillance state includes elements of Google’s surprising, and largely unknown, origin. It is a somewhat different creation story than the one the public has heard, and explains what Google cofounders Sergey Brin and Larry Page set out to build, and why.
Le gouvernement américain cherche à se procurer des informations sur tous les visiteurs d’un site Internet critique envers Donald Trump, a-t-on appris lundi 14 août. Un mandat a été présenté par le ministère de la justice le 17 juillet à Dreamhost, l’entreprise hébergeant le site disruptj20.org (« perturbez le 20 janvier »), créé pour organiser les manifestations en marge de la cérémonie d’investiture du 45e président américain.
Mais si la surveillance des communications par l’employeur est possible en Europe, elle suppose pour être légale que les salariés soient informés de son existence. Or, M. Barbulescu ne savait pas que le contenu de ses communications pouvait être enregistré, et son droit à la vie privée n’a donc pas été respecté, a tranché la CEDH. « L’avertissement de l’employeur doit être donné avant que celui-ci ne commence son activité de surveillance, a fortiori lorsque la surveillance implique également l’accès au contenu des communications des employés, note la cour dans sa décision.
[...]
Cette décision conforte la pratique française, qui impose une consultation et une information des salariés sur les dispositifs mis en place, les modalités du contrôle et la durée de conservation des données de connexion.
Sous couvert d’installation et mise à jour de systèmes biométriques, la CIA espionnait ses partenaires, le FBI, la NSA et le DHS.
The NSA's TAO hacking unit is considered to be the intelligence agency's top secret weapon. It maintains its own covert network, infiltrates computers around the world and even intercepts shipping deliveries to plant back doors in electronics ordered by those it is targeting.
The text messages looked innocuous enough — but they actually contained links to a specially crafted webpage designed to silently infect smartphones with powerful surveillance software.
The instruction was sent out to residents in Xinjiang, home to millions of Muslim people.