Category: Spying

Microsoft urges regulation of face-recognizing tech

When face recognition is used to gain access to a secure location or function, what happens when one’s likeness is stolen and reproduced? What happens when the local police monitor all political rallies and use facial recognition to identify each individual in attendance? What if businesses scan your face upon entry and dynamically change prices based on their estimates of your income and wealth? Microsoft’s chief legal officer on Friday called for regulation of facial...

#Google’s #Android was developed first and foremost as a spying tool, may be sanctioned by the European Union

For Google, the consequences could prove vast. Packaging tools like search, and including them on Android devices, offers the company a way to capture data about users — and show them more ads. Eliminating that pathway for profits and insight could prompt Google to rethink the entire ecosystem for Android, which it licenses to device makers free in a bid to ensure its wide-scale adoption while warding off such competitors as Apple. Source: Google could...

Fascinating details: “The NSA’s Hidden Spy Hubs In Eight U.S. Cities”

These fortress-like AT&T buildings are central to a secret NSA program that has monitored billions of communications, documents and sources reveal. Source: The NSA’s Hidden Spy Hubs In Eight U.S. Cities Stephen Budiansky, in his book, Code Warriors, explains how the pre-cursor to the NSA tape recorded communications prior to and during WW II. As they worked to decrypt and interpret contemporary messages, access to older communications proved invaluable to understanding current events and why...

HP computers and data privacy and spying

I have an older HP desktop computer. I’ve long observed significant slow downs as various background tasks were underway and I had assumed it was just anti-virus software running in the background. But it was not – instead, the HP Support Assistance was frequently scanning the entire system, using 55% of the CPU and hogging the disk input/output, tremendously slowing down the system. I finally disabled the HP software as I had never seen any...

Private Prison Phone Company tracking location of all cell phone users, nationwide

They collect cell phone location data collected by all major cellular phone carriers, and then sell that location data to law enforcement agencies (no warrant needed). The data is used to conduct surveillance on potentially everyone in the U.S. who has a cellular phone. Source: Senator Wyden Demands Answers from Prison Phone Service Caught Sharing Cellphone Location Data | Electronic Frontier Foundation When the FCC mandated “wireless 911” technology so that phones would be required...

Should you delete your #Facebook account? Yes, if you can #DeleteFacebook

I’ve written a detailed of explanation of the enormous quantity of data that Facebook is accumulating on each of us, and some of the shocking methods they use to spy on us. That explanation is available at my Learn2C (programming) web site. At its core, Facebook is a global surveillance and propaganda platform and nothing more. They are using every possible method to track our online activities, our mobile device activities (location, phone and text...

1

Loyalty Cards are used to spy on  your purchases, and not just with the vendor

The story of how that Sudafed ad got to me begins at Walgreens. As I bought tissues and Afrin, I keyed in my phone number so I could get loyalty points. Source: Facebook Really Is Spying on You, Just Not Through Your Phone’s Mic – WSJ Stores use your loyalty card to identify you and all of your purchases. Your purchase transactions are then sold to other marketing companies. This data, in turn, can and...

0

Autonomous self driving cars’ sensor arrays may be used for intensive public surveillance

Autonomous self-driving cars are continuously surveying their surroundings using an array of sensors and recording this to memory. In the event of an accident of malfunction, this data can be retrieved for analysis. However, this data could also be retrieved as surveillance data – even when the vehicle itself has not been in an crash. Consider, a bike versus human driven car crash at an intersection. Two other vehicles at the intersection are autonomous vehicles...

Social Media Auto Publish Powered By : XYZScripts.com