article thumbnail

The Internet Enabled Mass Surveillance. AI Will Enable Mass Spying.

Schneier on Security

Spying and surveillance are different but related things. If I hired that same private detective to put you under surveillance, I would get a different report: where you went, whom you talked to, what you purchased, what you did. Before the internet, putting someone under surveillance was expensive and time-consuming.

article thumbnail

Surveillance of the Internet Backbone

Schneier on Security

Vice has an article about how data brokers sell access to the Internet backbone. This is netflow data. It’s useful for cybersecurity forensics, but can also be used for things like tracing VPN activity. At a high level, netflow data creates a picture of traffic flow and volume across a network.

Internet 358
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Internet Enabled Mass Surveillance. AI Will Enable Mass Spying.

Security Boulevard

Spying and surveillance are different but related things. If I hired that same private detective to put you under surveillance, I would get a different report: where you went, whom you talked to, what you purchased, what you did. Before the internet, putting someone under surveillance was expensive and time-consuming.

article thumbnail

Modern Mass Surveillance: Identify, Correlate, Discriminate

Schneier on Security

These efforts are well-intentioned, but facial recognition bans are the wrong way to fight against modern surveillance. Focusing on one particular identification method misconstrues the nature of the surveillance society we're in the process of building. Ubiquitous mass surveillance is increasingly the norm.

article thumbnail

Transacting in Person with Strangers from the Internet

Krebs on Security

But when dealing with strangers from the Internet, there is always a risk that the person you’ve agreed to meet has other intentions. These safe trading places exist because sometimes in-person transactions from the Internet don’t end well for one or more parties involved. Nearly all U.S. Nearly all U.S.

Internet 280
article thumbnail

Israeli Surveillance Gear

Schneier on Security

They were attempting to install surveillance gear, which they ended up leaving behind. Israeli media is claiming that the capture of this gear by Hamas causes major damage to Israeli electronic surveillance capabilities. And if there are other photos on the Internet, please post them. There are photos -- scroll past the video.)

article thumbnail

How Surveillance Inhibits Freedom of Expression

Schneier on Security

We know that surveillance has a chilling effect on freedom. People change their behavior when they live their lives under surveillance. This is obviously true for government surveillance, but is true for corporate surveillance as well. If surveillance nips that process in the bud, change never happens.