Surveillance of Your Car

Schneier on Security

Uncategorized cars data collection privacy surveillanceTheMarkup has an extensive analysis of connected vehicle data and the companies that are collecting it.

NSA Over-surveillance

Schneier on Security

Uncategorized NSA privacy surveillanceHere in 2022, we have a newly declassified 2016 Inspector General report—”Misuse of Sigint Systems”—about a 2013 NSA program that resulted in the unauthorized (that is, illegal) targeting of Americans.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Ubiquitous Surveillance by ICE

Schneier on Security

Report by Georgetown’s Center on Privacy and Technology published a comprehensive report on the surprising amount of mass surveillance conducted by Immigration and Customs Enforcement (ICE). Uncategorized privacy reports surveillance

Iran’s Digital Surveillance Tools Leaked

Schneier on Security

Uncategorized Iran leaks privacy surveillance

Surveillance by Driverless Car

Schneier on Security

San Francisco police are using autonomous vehicles as mobile surveillance cameras. Uncategorized cars police privacy surveillancePrivacy advocates say the revelation that police are actively using AV footage is cause for alarm.

Banning Surveillance-Based Advertising

Schneier on Security

The Norwegian Consumer Council just published a fantastic new report: “ Time to Ban Surveillance-Based Advertising. A ban on surveillance-based advertising does not mean that one can no longer finance digital content using advertising.

ICE Is a Domestic Surveillance Agency

Schneier on Security

Georgetown has a new report on the highly secretive bulk surveillance activities of ICE in the US: When you think about government surveillance in the United States, you likely think of the National Security Agency or the FBI.

Apple Censorship and Surveillance in China

Schneier on Security

Good investigative reporting on how Apple is participating in and assisting with Chinese censorship and surveillance. Uncategorized Apple censorship China privacy surveillance

Emergency Surveillance During COVID-19 Crisis

Schneier on Security

Israel is using emergency surveillance powers to track people who may have COVID-19, joining China and Iran in using mass surveillance in this way. china covid19 datacollection eff epidemiology iran israel nationalsecuritypolicy privacy surveillance

Hacking School Surveillance Systems

Schneier on Security

Lance Vick suggesting that students hack their schools' surveillance systems. generations hacking privacy schools surveillanceThis is an ethical minefield that I feel students would be well within their rights to challenge, and if needed, undermine," he said.

San Francisco Police Want Real-Time Access to Private Surveillance Cameras

Schneier on Security

Uncategorized cameras police privacy surveillance

Insider Attack on Home Surveillance Systems

Schneier on Security

Uncategorized hacking insiders privacy surveillance

Using Foreign Nationals to Bypass US Surveillance Restrictions

Schneier on Security

on behalf of the FBI, Senator Ron Wyden told Motherboard in a statement “Multiple intelligence community officials have confirmed to me, in writing, that intelligence agencies cannot ask foreign partners to conduct surveillance that the U.S.

The European Parliament Voted to Ban Remote Biometric Surveillance

Schneier on Security

It’s not actually banned in the EU yet — the legislative process is much more complicated than that — but it’s a step: a total ban on biometric mass surveillance. Uncategorized biometrics EU privacy surveillance

Global Surveillance in the Wake of COVID-19

Schneier on Security

covid19 facerecognition privacy surveillance tracking

Video Surveillance by Computer

Schneier on Security

The ACLU's Jay Stanley has just published a fantastic report: " The Dawn of Robot Surveillance " (blog post here ) Basically, it lays out a future of ubiquitous video cameras watched by increasingly sophisticated video analytics software, and discusses the potential harms to society. aclu cameras machinelearning privacy reports surveillance

Modern Mass Surveillance: Identify, Correlate, Discriminate

Schneier on Security

These efforts are well-intentioned, but facial recognition bans are the wrong way to fight against modern surveillance. Focusing on one particular identification method misconstrues the nature of the surveillance society we're in the process of building.

Computers and Video Surveillance

Schneier on Security

It used to be that surveillance cameras were passive. Recent developments in video analytics -- fueled by artificial intelligence techniques like machine learning -- enable computers to watch and understand surveillance videos with human-like discernment. The result is a level of surveillance that was impossible just a few years ago. These automated 'video analytics' technologies threaten to fundamentally change the nature of surveillance.".

Israeli Surveillance Gear

Schneier on Security

They were attempting to install surveillance gear, which they ended up leaving behind. Israeli media is claiming that the capture of this gear by Hamas causes major damage to Israeli electronic surveillance capabilities. israel surveillanceThe Israeli Defense Force mounted a botched raid in Gaza. There are photos -- scroll past the video.) The Israelis themselves destroyed the vehicle the commandos used to enter Gaza.

Cory Doctorow on The Age of Surveillance Capitalism

Schneier on Security

Cory Doctorow has writtten an extended rebuttal of The Age of Surveillance Capitalism by Shoshana Zuboff. Shorter summary: it's not the surveillance part, it's the fact that these companies are monopolies. Surveillance capitalism has some unique properties that make it particularly unethical and incompatible with a free society, and Zuboff makes them clear in her book. books datacollection nationalsecuritypolicy privacy surveillance

Reverse Engineering a Chinese Surveillance App

Schneier on Security

Human Rights Watch has reverse engineered an app used by the Chinese police to conduct mass surveillance on Turkic Muslims in Xinjiang. china privacy reverseengineering surveillanceThe details are fascinating, and chilling. Boing Boing post.

Privacy vs. Surveillance in the Age of COVID-19

Schneier on Security

The trade-offs are changing : As countries around the world race to contain the pandemic, many are deploying digital surveillance tools as a means to exert social control, even turning security agency technologies on their own civilians.

Possible Government Surveillance of the Otter.ai Transcription App

Schneier on Security

Customer service or Chinese surveillance? A reporter interviews a Uyghur human-rights advocate, and uses the Otter.ai transcription app. The next day, I received an odd note from Otter.ai, the automated transcription app that I had used to record the interview.

EFF on the Mechanics of Corporate Surveillance

Schneier on Security

EFF has published a comprehensible and very readable "deep dive" into the technologies of corporate surveillance, both on the Internet and off. businessofsecurity eff privacy surveillance tracking

Surveillance vendor exploited Samsung phone zero-days

Security Affairs

Google Project Zero researchers reported that a surveillance vendor is using three Samsung phone zero-day exploits. The researchers pointed out that the surveillance firm included in its spyware the exploits for these three vulnerabilities that were zero-day at the time of their exploitation.

Banning Surveillance-Based Advertising

Security Boulevard

The Norwegian Consumer Council just published a fantastic new report: “ Time to Ban Surveillance-Based Advertising. From the Introduction: The challenges caused and entrenched by surveillance-based advertising include, but are not limited to: privacy and data protection infringements.

On Surveillance in the Workplace

Schneier on Security

Data & Society just published a report entitled " Workplace Monitoring & Surveillance ": This explainer highlights four broad trends in employee monitoring and surveillance technologies: Prediction and flagging tools that aim to predict characteristics or behaviors of employees or that are designed to identify or deter perceived rule-breaking or fraud. biometrics employment privacy surveillance tracking

Surveillance as a Condition for Humanitarian Aid

Schneier on Security

Excellent op-ed on the growing trend to tie humanitarian aid to surveillance. biometrics privacy surveillanceDespite the best intentions, the decision to deploy technology like biometrics is built on a number of unproven assumptions, such as, technology solutions can fix deeply embedded political problems. And that auditing for fraud requires entire populations to be tracked using their personal data.

Ubiquitous Surveillance by ICE

Security Boulevard

Report by Georgetown’s Center on Privacy and Technology published a comprehensive report on the surprising amount of mass surveillance conducted by Immigration and Customs Enforcement (ICE). The post Ubiquitous Surveillance by ICE appeared first on Security Boulevard.

Surveillance firm’s leaked docs show the purchase of an $8M iOS RCE zero-day exploit?

Security Affairs

Leaked documents show the surveillance firm Intellexa offering exploits for iOS and Android devices for $8 Million. Intellexa is an Israeli surveillance firm founded by Israeli entrepreneur Tal Dilian, it offers surveillance and hacking solution to law enforcement and intelligence agencies.

How Surveillance Inhibits Freedom of Expression

Schneier on Security

We know that surveillance has a chilling effect on freedom. People change their behavior when they live their lives under surveillance. This is obviously true for government surveillance, but is true for corporate surveillance as well. You visit the website of an international immigrants' rights group, a fact that is available to the government through mass Internet surveillance. If surveillance nips that process in the bud, change never happens.

The Onion on Google Map Surveillance

Schneier on Security

“ Google Maps Adds Shortcuts through Houses of People Google Knows Aren’t Home Right Now.” ” Excellent satire

Palantir's Surveillance Service for Law Enforcement

Schneier on Security

All of this information is aggregated and synthesized in a way that gives law enforcement nearly omniscient knowledge over any suspect they decide to surveil. datacollection foia lawenforcement nsa police privacy surveillance

Police Surveillance Tools from Special Services Group

Schneier on Security

Special Services Group, a company that sells surveillance tools to the FBI, DEA, ICE, and other US government agencies, has had its secret sales brochure published. cameras eavesdropping foia police privacy surveillance

NSA Mass Surveillance Program Is Ruled Illegal

Adam Levin

The post NSA Mass Surveillance Program Is Ruled Illegal appeared first on Adam Levin. The controversial collection of details on billions of American phone calls by the National Security Agency (NSA) was illegal and possibly unconstitutional, according to a ruling by a federal appeals court.

Fake Santa Surveillance Camera

Schneier on Security

Instead, it just gets children used to being under constant surveillance. cameras children privacy surveillanceReka makes a " decorative Santa cam ," meaning that it's not a real camera. Our Santa Cam has a cute Father Christmas and mistletoe design, and a red, flashing LED light which will make the most logical kids suspend their disbelief and start to believe!

Video surveillance network hacked by researchers to hijack footage

Naked Security

Uncategorized CVE-2021-28372 hacking iot video surveillance vulnerability webcamHome automation. Internet of Things. Cloud management. And a security bug that could let other people watch you online.

US NCSC and DoS share best practices against surveillance tools

Security Affairs

The US NCSC and the Department of State published joint guidance on defending against attacks using commercial surveillance tools. Surveillance tools can be used to record audio, including phone calls, track the phone’s location, and access and retrieve all content on a phone (i.e.

Surveillance data of Chinese citizens put online by hackers

CyberSecurity Insiders

Since 2016, China has been conducting surveillance on its populace in different parts of the country. The aim behind the surveillance is to identify crime at its root level and nip it out before it is too late. News China surveillance data leak Citizen

Greek intelligence service used surveillance malware to spy on a journalist, Reuters reports

Security Affairs

Greek intelligence admitted it had spied on a journalist, while citizens ask the government to reveal the use of surveillance malware. The revelation comes while media and journalists are making pressure on the government to reveal the use of surveillance software.

Surveillance inside the Body

Schneier on Security

medicine phones privacy surveillanceThe FDA has approved a pill with an embedded sensor that can report when it is swallowed. The pill transmits information to a wearable patch, which in turn transmits information to a smartphone.

Verkada Surveillance Hack, Breach Highlights IoT Risks

Security Boulevard

reported a breach of customer surveillance data to the U.S. The post Verkada Surveillance Hack, Breach Highlights IoT Risks appeared first on Security Boulevard. Cloud Security Featured IoT & ICS Security News Security Boulevard (Original) Breach IoT Security surveillance Verkada

The NSA's Domestic Surveillance Centers

Schneier on Security

edwardsnowden espionage nationalsecuritypolicy nsa privacy surveillanceThe Intercept has a long story about the NSA's domestic interception points. Includes some new Snowden documents.