Self-Driving Cars Are Surveillance Cameras on Wheels
Schneier on Security
JULY 3, 2023
. “We’ve known for a long time that they are essentially surveillance cameras on wheels,” said Chris Gilliard, a fellow at the Social Science Research Council.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Schneier on Security
JULY 3, 2023
. “We’ve known for a long time that they are essentially surveillance cameras on wheels,” said Chris Gilliard, a fellow at the Social Science Research Council.
Schneier on Security
FEBRUARY 21, 2020
I teach cybersecurity policy and technology at the Harvard Kennedy School of Government. My most recent two books, Data and Goliath -- about surveillance -- and Click Here to Kill Everybody -- about IoT security -- are really about the policy implications of technology. Technology is inherently future focused.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Adam Shostack
JANUARY 2, 2025
There's an interesting paper by Becky Kazansky, "It depends on your threat model": the anticipatory dimensions of resistance to data-driven surveillance. The author critiques 'anticipatory data practices', a collection of techniques that include my own work, as presented to civil society activists.
Security Affairs
NOVEMBER 28, 2021
Nexa Technologies was indicted for complicity in acts of torture, the French firm is accused of having sold surveillance equipment to the Egypt. Nexa Technologies offers a range of solutions for homeland security, including surveillance solutions. ” reported the website LeMonde. ” continues Télérama.
Security Boulevard
JANUARY 20, 2025
Items presented here are typically curated with the end user and small groups (such as families and small/micro businesses) in mind. May also include threat actors abusing legitimate technology - which of itself may be irrespective of user privacy in general - to gather information or otherwise target users.
Schneier on Security
OCTOBER 9, 2023
Reading the headlines, one would hope that the rapid gains in AI technology have also brought forth a unifying realization of the risks—and the steps we need to take to mitigate them. The technology historian David C. The reality, unfortunately, is quite different.
Security Affairs
SEPTEMBER 16, 2024
The IT giant fears that the disclosures of its threat intelligence related to commercial spyware operations could aid NSO and other surveillance firms. In November 2021, Apple sued NSO Group and its parent company Q Cyber Technologies in a U.S. ” reads the court filing. ” continues the court filing. .
Adam Shostack
APRIL 29, 2021
There’s an interesting paper, ‘It depends on your threat model’: the anticipatory dimensions of resistance to data-driven surveillance. The author critiques ‘anticipatory data practices’, a collection of techniques that include my own work, as presented to civil society activists.
Malwarebytes
OCTOBER 11, 2024
In a report titled “ How TV Watches Us: Commercial Surveillance in the Streaming Era ,” the Center for Digital Democracy (CDD) spotlighted a massive data-driven surveillance apparatus that ensnares the public through modern television sets. Your television is debuting the latest, most captivating program: You.
Security Affairs
JUNE 30, 2025
Canada ordered Chinese surveillance firm Hikvision to cease all operations in the country, citing national security concerns. following a national security review under the Investment Canada Act: pic.twitter.com/Gvl6aWRxyQ — Mélanie Joly (@melaniejoly) June 28, 2025 The ban includes its business and technology use.
The Last Watchdog
OCTOBER 18, 2023
The ubiquity of smart surveillance systems has contributed greatly to public safety. We discussed how ABE is ready to help resolve some rather sticky privacy issues stemming from widespread digital surveillance – and also do much more. Here are my takeaways. Today, Goto says, ABE is fully ready to validate in real world deployments.
Security Affairs
DECEMBER 7, 2024
“The spyware bears many similarities to the Monokle family of spyware, previously reported on by Lookout Mobile Security , which they attribute to the Special Technology Center, a contractor to the Russian government.” These extended capabilities suggest that the malware aims for comprehensive surveillance of the target device.
Security Affairs
DECEMBER 3, 2021
The US officials targeted by the surveillance software were either based in Uganda or focused on matters concerning the African country, revealed Reuters which was not able to determine which was NSO client that orchestrated the attacks. officials through NSO technology.” “Apple Inc iPhones of at least nine U.S. .
Schneier on Security
OCTOBER 1, 2019
There are four key implications of this revolution that policymakers in the national security sector will need to address: The first is that the unprecedented scale and pace of technological change will outstrip our ability to effectively adapt to it. The NSA doesn't opine on broad technological trends and their social implications.
SecureList
JUNE 16, 2021
When run, the executables display decoy content to the victims, with some presenting images of protests against the Iranian regime and its institutions, or videos from resistance camps. Decoy image found within one of the malicious executables showing a protest against the central bank of Iran.
Security Affairs
NOVEMBER 29, 2019
Group-IB’s annual report was presented at CyberCrimeCon 2019 international Threat Hunting and Intelligence conference in Singapore. If they manage to compromise a telecommunications company, they can then also compromise its customers for surveillance or sabotage purposes. Pierluigi Paganini.
Security Boulevard
MARCH 24, 2025
Items presented here are typically curated with the end user and small groups (such as families and small/micro businesses) in mind. Surveillance Tech in the News This section covers surveillance technology and methods in the news.
Malwarebytes
MARCH 7, 2024
Predator can turn infected smartphones into surveillance devices. Nelson said: “Today’s actions represent a tangible step forward in discouraging the misuse of commercial surveillance tools, which increasingly present a security risk to the United States and our citizens.”
The Last Watchdog
SEPTEMBER 11, 2023
Yet, the rise of internal fraud presents a unique challenge. Another example of on-the-ground tactics includes Intelligence agencies exploiting graduate students at research universities to access sensitive materials and coercing professionals working on sensitive technologies to engage in activities like IP theft.
The Last Watchdog
SEPTEMBER 18, 2018
I talked with Jonathan Sander, Chief Technology Officer with STEALTHbits Technologies , about this at Black Hat USA 2018. While there is nascent technology for analyzing unstructured data, these solutions are still fairly primitive. Editor’s note: LW has provided consulting services to STEALTHbits Technologies.).
Krebs on Security
AUGUST 5, 2019
This story is about how crooks increasingly are abusing third-party financial aggregation services like Mint , Plaid , Yodlee , YNAB and others to surveil and drain consumer accounts online. Alex Holden is founder and chief technology officer of Hold Security , a Milwaukee-based security consultancy.
SecureWorld News
FEBRUARY 17, 2025
From its early days, where security was an afterthought to business operations, to the present, where it has become a board-level discussion, governance has had to adapt to an ever-evolving digital landscape. Privacy and ethics: Balancing employee monitoring with privacy rights in an era of increasing workplace surveillance.
Security Affairs
OCTOBER 22, 2018
“The Israel Defense Forces asked cybersecurity companies in 2016 to present proposals for creating a system that would monitor social media users’ personal correspondence.” The Israeli Defense explained added that the bidding process was not carried out for both operational and technological reasons.
Security Boulevard
MARCH 31, 2025
Items presented here are typically curated with the end user and small groups (such as families and small/micro businesses) in mind. Surveillance Tech in the News This section covers surveillance technology and methods in the news. Private search engines generally avoid connecting users to their searches.
Security Affairs
NOVEMBER 2, 2019
Proton Technologies announced this week that it has made available the source code of its popular ProtonMail iOS App. The Proton Technologies firm continues to propose initiatives aimed at ensuring the transparency of its ProtonMail applications, this week it announced the availability of the source code of its popular ProtonMail iOS App.
Security Boulevard
MARCH 17, 2025
Items presented here are typically curated with the end user and small groups (such as families and small/micro businesses) in mind. Surveillance Tech in the News This section covers surveillance technology and methods in the news.
Malwarebytes
OCTOBER 11, 2023
It’s spying when governments do it through opaque, mass surveillance regimes, it’s spying when companies do it through shadowy data broker networks that braid together disparate streams of information, and it’s spying when private individuals do it through unseen behavior on personal devices. They are deeply concerning.
CSO Magazine
MARCH 2, 2022
These include scanning of Microsoft Azure Active Directory (AD), Microsoft 365 and AWS environments for signs of attack, surveillance of network infrastructure both in the cloud and on-premises and supporting the retention of historical metadata to aid incident response investigations based on indicators of compromise for specific attack variants.
Security Affairs
MARCH 11, 2025
This divergence presents a significant challenge for global businesses, which must navigate complex regulatory environments while safeguarding sensitive data from cyber threats. Privacy-enhancing technologies are designed to minimize exposure to sensitive data while ensuring regulatory adherence.
Security Boulevard
FEBRUARY 17, 2025
Items presented here are typically curated with the end user and small groups (such as families and small/micro businesses) in mind. Surveillance Tech in the News This section covers surveillance technology and methods in the news. Tips for finding old accounts.
Security Affairs
FEBRUARY 8, 2019
The Agency calls for proposals on solutions that could support NATO’s command, control, communications, computers, intelligence, surveillance and reconnaissance (C4ISR) and of course to improve cyber capabilities. Proposals must be received by 22 March, and the Agency will announce the winners on 8 April.
Security Boulevard
MARCH 3, 2025
Items presented here are typically curated with the end user and small groups (such as families and small/micro businesses) in mind. Surveillance Tech in the News This section covers surveillance technology and methods in the news.
The Last Watchdog
NOVEMBER 9, 2020
The good news is that we already possess the technology, as well as the best practices frameworks, to mitigate fast-rising IoT exposures. Automatic trust is no longer an option IoT system intrusions present a clear and present danger beyond the healthcare sector, of course. This surge can, and must, be blunted.
SecureWorld News
MAY 19, 2025
Our dependency on satellite technology means even minor hacks could be devastating, especially against the new threats and attack vectors brought about by AI. Each presents unique vulnerabilities ripe for exploitation. But many commercial satellites are based on legacy tech , and updating them could be costly.
Security Affairs
NOVEMBER 24, 2024
CISA adds Progress Kemp LoadMaster, Palo Alto Networks PAN-OS and Expedition bugs to its Known Exploited Vulnerabilities catalog Great Plains Regional Medical Center ransomware attack impacted 133,000 individuals Recently disclosed VMware vCenter Server bugs are actively exploited in attacks Foreign adversary hacked email communications of the Library (..)
eSecurity Planet
FEBRUARY 11, 2022
The technology isn’t yet perfect, but it has evolved to a point that enterprise use is growing. The application of facial recognition technology in operations was primarily in law enforcement organizations until the last decade, when a massive advance in AI and deep learning allowed it to be more broadly applied.
BH Consulting
MARCH 10, 2021
State sector surveillance as well as local authorities’ use of CCTV cameras was a key focus for the DPC in 2020 as highlighted in the recently published DPC annual report. Primary areas of focus for the DPC in 2020 included enforcement (under both GDPR & ePrivacy), breach notifications, data transfers and surveillance.
SecureWorld News
AUGUST 16, 2023
Technology is increasingly part of our day-to-day life; we use it for communication, work, getting information, and even running our households with smart devices. However, as we spend more and more of our lives online and put our trust in technology, it becomes an increasingly accessible tool for abusers to utilize.
Krebs on Security
NOVEMBER 6, 2018
This includes people who run or work at cryptocurrency-focused companies; those who participate as speakers at public conferences centered around Blockchain and cryptocurrency technologies; and those who like to talk openly on social media about their crypto investments. That’s just too risky for the attackers, he said.
SecureWorld News
JULY 10, 2024
Some cybersecurity experts argue that the Chevron Doctrine allowed agencies such as the Federal Trade Commission (FTC) and the Cybersecurity and Infrastructure Security Agency (CISA) to respond quickly to new threats and technologies. These agencies could interpret and enforce cyber regulations without waiting for new legislation.
eSecurity Planet
SEPTEMBER 25, 2022
In 2013, for example, the FIDO Alliance was created to solve the world’s password problem by replacing login technology. But beyond these cases, how advanced is the implementation of the technology that wants to end passwords once and for all? The Challenges of New Authentication Technologies. See the Top Password Managers.
Malwarebytes
AUGUST 20, 2024
It reasons that when consumers buy a vehicle, they want a mode of transportation to get them from one point to another, but with GM (and its subsidiary OnStar) they unwittingly opt-in to an all-seeing surveillance system.
Security Affairs
FEBRUARY 9, 2023
the SIM card is not present in the phone or if the SIM card used was provided by a different operator in China or in the UK). The experts pointed out that also users that leave the country are exposed to surveillance, through the pre-installed software. . ” reads the paper published by the experts.
Malwarebytes
MARCH 9, 2022
All data vanishes when the browser is closed (think Incognito mode), and three levels of security increasingly strip out page aspects such as JavaScript and media which could present problems. Many sites have a.onion version available to make it even harder to perform surveillance on the user. That’s not all.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content