Pages tagged surveillance:

Henchman's Helper
http://henchmanshelper.com/

42 live webcams from around the world, it's almost like you're a villian in a movie.. creepy!
Adam's Block
http://www.adamsblock.com/
live web cam in SF (Tenderloin) with chat
American Civil Liberties Union : Surveillance Society Clock
http://www.aclu.org/privacy/spying/areyoulivinginaconstitutionfreezone.html
Constitution-free zone
Using data provided by the U.S. Census Bureau, the ACLU has determined that nearly 2/3 of the entire US population (197.4 million people) live within 100 miles of the US land and coastal borders. The government is assuming extraordinary powers to stop and search individuals within this zone.
I live within 100 miles of the coastal border and "the government is assuming extraordinary powers to stop and search individuals within this zone." I don't have constitutional rights. ...Wait, what?
America's
xkcd - A Webcomic - I Know You're Listening
http://xkcd.com/525/
From xkcd.
In Warrantless Wiretapping Case, Obama DOJ's New Arguments Are Worse Than Bush's | Electronic Frontier Foundation
http://www.eff.org/deeplinks/2009/04/obama-doj-worse-than-bush
We had hoped this would go differently.
April 7th, 2009 Friday evening, in a motion to dismiss Jewel v. NSA, EFF's litigation against the National Security Agency for the warrantless wiretapping of countless Americans, the Obama Administration's made two deeply troubling arguments.
BlueServo
http://blueservo.net/
Project described in the Age, volunteer border watchers for USA-Mexico border
The TBSC BlueServoSM Virtual Community WatchSM is a network of cameras and sensors along the Texas-Mexico border that feeds live streaming video to www.BlueServo.net. Users will log in to the BlueServoSM website and directly monitor suspicious criminal activity along the border via this virtual fenceSM.
The Texas Border Sheriff's Coalition (TBSC) has joined BlueServoSM in a public-private partnership to deploy the Virtual Community Watch, an innovative real-time surveillance program designed to empower the public to proactively participate in fighting border crime. The TBSC BlueServoSM Virtual Community WatchSM is a network of cameras and sensors along the Texas-Mexico border that feeds live streaming video to www.BlueServo.net. Users will log in to the BlueServoSM website and directly monitor suspicious criminal activity along the border via this virtual fenceSM.
Schneier on Security: Privacy in the Age of Persistence
http://www.schneier.com/blog/archives/2009/02/privacy_in_the.html
"Cardinal Richelieu famously said: 'If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged.' When all your words and actions can be saved for later examination, different rules have to apply."
Schneier says privacy is quickly disappearing and we're ignoring it. It's like pollution at the beginning of the century: we're ignoring it now because it's small but soon we'll realize it was a big problem that should have been nipped in the bud. Also, if every conversation is recorded we have to change our standards accordingly; eg: how information is considered in a court.
"Society works precisely because conversation is ephemeral; because people forget, and because people don't have to justify every word they utter. ... Privacy isn't just about having something to hide; it's a basic right that has enormous value to democracy, liberty, and our humanity. ... Just as we look back at the beginning of the previous century and shake our heads at how people could ignore the pollution they caused, future generations will look back at us – living in the early decades of the information age – and judge our solutions to the proliferation of data. We must, all of us together, start discussing this major societal change and what it means. And we must work out a way to create a future that our grandchildren will be proud of."
Beautiful essay by Bruce Schneier on the challenges of our time due to data collection, the "pollution" of the information age. Tweeted by Thomas Kriese.
"Cardinal Richelieu famously said: "If one would give me six lines written by the hand of the most honest man, I would find something in them to have him hanged." When all your words and actions can be saved for later examination, different rules have to apply." This is especially important for those who say that they have nothing to hide. That misses the point.
Welcome to the future, where everything about you is saved. A future where your actions are recorded, your movements are tracked, and your conversations are no longer ephemeral. A future brought to you not by some 1984-like dystopia, but by the natural tendencies of computers to produce data. Data is the pollution of the information age. It's a natural byproduct of every computer-mediated interaction. It stays around forever, unless it's disposed of. It is valuable when reused, but it must be done carefully. Otherwise, its after effects are toxic. And just as 100 years ago people ignored pollution in our rush to build the Industrial Age, today we're ignoring data in our rush to build the Information Age. Increasingly, you leave a trail of digital footprints throughout your day.
graphpaper.com - Who Watches the Watchman?
http://www.graphpaper.com/2009/05-02_who_watches_the_watchman
Let’s say you own a big building full of valuable stuff. How do you make sure that the night watchman patrolling your factory floor or museum galleries after closing time actually makes his rounds? How do you know he’s inspecting every hallway, floor, and stairwell in the facility? How do you know he (or she) is not just spending every night sleeping at his desk? An elegant solution, designed and patented in 1901 by the German engineer A.A. Newman, is called the “watchclock”. It’s an ingenious mechanical device, slung over the shoulder like a canteen and powered by a simple wind-up spring mechanism. It precisely tracks and records a night watchman’s position in both space and time for the duration of every evening. It also generates a detailed, permanent, and verifiable record of each night’s patrol.
"But the watchclock is another kind of interaction design, one whose function corrals the user into a single, linear, constrained sort of behavior. The night watchman has a fundamental social constraint — the desire to not get fired from their job. This constraint allows the watchclock patrol system to work so effectively (some would say insidiously) as an interaction design instrument of control."
"How do you make sure that the night watchman patrolling your factory floor or museum galleries...actually makes his rounds? How do you know he’s inspecting every hallway, floor & stairwell? How do you know he is not just spending every night sleeping at his desk? If you’re a technology designer, you might suggest using surveillance cameras or even GPS to track his location each night, right? But let’s make this interesting...go...back...[to]1900. What could you possibly do in 1900 to be absolutely sure a night watchman was making his full patrol? An elegant solution, designed and patented in 1901 by the German engineer A.A. Newman, is called the “watchclock”. It’s an ingenious mechanical device, slung over the shoulder like a canteen and powered by a simple wind-up spring mechanism. It precisely tracks and records a night watchman’s position in both space and time for the duration of every evening. It also generates a detailed, permanent & verifiable record of each night’s patrol."
Let’s say you own a big building full of valuable stuff. How do you make sure that the night watchman patrolling your factory floor or museum galleries after closing time actually makes his rounds? How do you know he’s inspecting every hallway, floor, and stairwell in the facility? How do you know he (or she) is not just spending every night sleeping at his desk?
Tracking GhostNet: Investigating a Cyber Espionage Network
http://www.scribd.com/doc/13731776/Tracking-GhostNet-Investigating-a-Cyber-Espionage-Network
This report documents the GhostNet - a suspected cyber espionage network of over 1,295 infected computers in 103 countries, 30% of which are high-value targets, including ministries of foreign affairs, embassies, international organizations, news media, and NGOs. The capabilities of GhostNet are far-reaching. The report reveals that Tibetan computer systems were compromised giving attackers access to potentially sensitive information, including documents from the private office of the Dalai Lama. The report presents evidence showing that numerous computer systems were compromised in ways that circumstantially point to China as the culprit. But the report is careful not to draw conclusions about the exact motivation or the identity of the attacker(s), or how to accurately characterize this network of infections as a whole. The report argues that attribution can be obscured. The report concludes that who is in control of GhostNet is less important than the opportunity for generating st
This report documents the GhostNet - a suspected cyber espionage network of over 1,295 infected computers in 103 countries, 30% of which are high-value targets, including ministries of foreign affairs, embassies, international organizations, news media, and NGOs. The capabilities of GhostNet are far-reaching. The report reveals that Tibetan computer systems were compromised giving attackers access to potentially sensitive information, including documents from the private office of the Dalai Lama. The report presents evidence showing that numerous computer systems were compromised in ways that circumstantially point to China as the culprit. But the report is careful not to draw conclusions about the exact motivation or the identity of the attacker(s), or how to accurately characterize this network of infections as a whole. The report argues that attribution can be obscured.
Iran's Web Spying Aided By Western Technology - WSJ.com
http://online.wsj.com/article/SB124562668777335653.html
"Every digitized packet of online data is deconstructed, examined for keywords and reconstructed within milliseconds."
more on Deep packet
Deep packet inspection
How it's done.
The Iranian regime has developed, with the assistance of European telecommunications companies, one of the world's most sophisticated mechanisms for controlling and censoring the Internet, allowing it to examine the content of individual online communications on a massive scale.
Les autorités iraniennes disposent de grande capacités de surveillance sur Internet (technologies Siemens + Nokia), expliquant pourquoi elles n'ont pas "coupé" le réseau...
How To Communicate Securely in Repressive Environments « iRevolution
http://irevolution.wordpress.com/2009/06/15/digital-security/
Dopo l'Iran. Come usare Internet per comunicare.
HighlightCam :: Make your video shorter, automatically -- for webcams, monitoring and security
http://highlightcam.com/
Make your video shorter, automatically -- for webcams, monitoring and security
How To Build A WiFi Home Surveillance System With Your PC
http://www.makeuseof.com/tag/how-to-build-a-wifi-home-surveillance-system-with-your-pc/
Not quite what I was expecting, but simple enough.
Exclusive: U.S. Spies Buy Stake in Firm That Monitors Blogs, Tweets | Danger Room | Wired.com
http://www.wired.com/dangerroom/2009/10/exclusive-us-spies-buy-stake-in-twitter-blog-monitoring-firm/
America’s spy agencies want to read your blog posts, keep track of your Twitter updates — even check out your book reviews on Amazon
America’s spy agencies want to read your blog posts, keep track of your Twitter updates — even check out your book reviews on Amazon. In-Q-Tel, the investment arm of the CIA and the wider intelligence community, is putting cash into Visible Technologies, a software firm that specializes in monitoring social media. It’s part of a larger movement within the spy services to get better at using ”open source intelligence” — information that’s publicly available, but often hidden in the flood of TV shows, newspaper articles, blog posts, online videos and radio reports generated every day. Visible crawls over half a million web 2.0 sites a day, scraping more than a million posts and conversations taking place on blogs, online forums, Flickr, YouTube, Twitter and Amazon. (It doesn’t touch closed social networks, like Facebook, at the moment.) Customers get customized, real-time feeds of what’s being said on these sites, based on a series of keywords.
Turn Your PC into a Home Surveillance System - Security - Lifehacker
http://lifehacker.com/5385018/turn-your-pc-into-a-home-surveillance-system
http://lifehacker.com/5385018/turn-your-pc-into-a-home-surveillance-system
vitamin d : home
http://www.vitamindinc.com/
Simple video monitoring software brings enterprise-grade functionality to anyone with a webcam or network camera.
Introducing Vitamin D Video. Our simple video monitoring software brings enterprise-grade functionality to anyone with a webcam or network camera.
Britain To Put CCTV Cameras Inside Private Homes | Gadget Lab | Wired.com
http://www.wired.com/gadgetlab/2009/08/britain-to-put-cctv-cameras-inside-private-homes/
As an ex-Brit, I’m well aware of the authorities’ love of surveillance and snooping, but even I, a pessimistic cynic, am amazed by the governments latest plan: to install Orwell’s telescreens in 20,000 homes.
£400 million ($668 million) will be spend on installing and monitoring CCTV cameras in the homes of private citizens.
Schneier on Security: My Reaction to Eric Schmidt
http://www.schneier.com/blog/archives/2009/12/my_reaction_to.html
This is the loss of freedom we face when our privacy is taken from us. This is life in former East Germany, or life in Saddam Hussein's Iraq. And it's our future as we allow an ever-intrusive eye into our personal, private lives. Too many wrongly characterize the debate as "security versus privacy." The real choice is liberty versus control. Tyranny, whether it arises under threat of foreign physical attack or under constant domestic authoritative scrutiny, is still tyranny. Liberty requires security without intrusion, security plus privacy. Widespread police surveillance is the very definition of a police state. And that's why we should champion privacy even when we have nothing to hide.
Privacy protects us from abuses by those in power, even if we're doing nothing wrong at the time of surveillance. We do nothing wrong when we make love or go to the bathroom. We are not deliberately hiding anything when we seek out private places for reflection or conversation. We keep private journals, sing in the privacy of the shower, and write letters to secret lovers and then burn them. Privacy is a basic human need. For if we are observed in all matters, we are constantly under threat of correction, judgment, criticism, even plagiarism of our own uniqueness. We become children, fettered under watchful eyes, constantly fearful that -- either now or in the uncertain future -- patterns we leave behind will be brought back to implicate us, by whatever authority has now become focused upon our once-private and innocent acts. We lose our individuality, because everything we do is observable and recordable.
Bruce Schneier once again gets good mileage out of his earlier essay on the value of privacy. This time quoting portions in response to a remark made by Eric Schmidt with the typical "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place" argument.
Too many wrongly characterize the debate as "security versus privacy." The real choice is liberty versus control. Tyranny, whether it arises under threat of foreign physical attack or under constant domestic authoritative scrutiny, is still tyranny. Liberty requires security without intrusion, security plus privacy. Widespread police surveillance is the very definition of a police state. And that's why we should champion privacy even when we have nothing to hide.
I’m A Super.com » Flash Cookies: The Silent Privacy Killer
http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/
The Adobe Flash Player maintains proprietary cookies called Local Shared Objects or LSO’s. LSO’s are capable of storing 100 kb’s of information for an indefinite amount of time by default. When you clear your browser history in Internet Explorer, Firefox or Opera on Windows, Linux, or OS X LSO’s are not cleared from Adobe’s local repository.
Os X
There are hundreds of applications out there from spyware cleaners to built-in browser features that eliminate cookies on the spot, and even let you set cookie policies on your computer regarding what can be stored in your machine, and for how long. I’m assuming that if you’re here reading this post, you already know all of the dangers of cookies on your computer. In all honesty, I don’t seriously believe that they’re the most dangerous form of movement or web tracking, but they can definitely be used to monitor more movements than a person should feel comfortable with.
Explains how to adjust your Flash player settings
Shame on you, Adobe!
Never new this! Amazing amount of stuff stored on your computer using flash 'cookies' which never gets cleaned from the browser.
U.S. enables Chinese hacking of Google - CNN.com
http://www.cnn.com/2010/OPINION/01/23/schneier.google.hacking/
Official misuses are bad enough, but it's the unofficial uses that worry me more. Any surveillance and control system must itself be secured. An infrastructure conducive to surveillance and control invites surveillance and control, both by the people you expect and by the people you don't. The problem is that such control makes us all less safe. Whether the eavesdroppers are the good guys or the bad guys, these systems put us all at greater risk. Communications systems that have no inherent eavesdropping capabilities are more secure than systems with those capabilities built in. And it's bad civic hygiene to build technologies that could someday be used to facilitate a police state.
Bajo el título amarillista "USA habilita hackeo de China a Google" hay un buen artículo, lleno de info importante. http://bit.ly/64uzts [from http://twitter.com/dariuus/statuses/8156429222]
"In order to comply with government search warrants on user data, Google created a backdoor access system into Gmail accounts. This feature is what the Chinese hackers exploited to gain access. Google's system isn't unique. Democratic governments around the world -- in Sweden, Canada and the UK, for example -- are rushing to pass laws giving their police new powers of Internet surveillance, in many cases requiring communications system providers to redesign products and services they sell."
Schneier on how the mandated backdoor access system allowed for the China incident
articulo de Bruce Scheneier sobre el ataque de china a google. video hillary clinton sobre la libertad de internet
RT @dangoldin: RT @mikkohypponen: Bruce Schneier writes to CNN on Google & China http://bit.ly/6uMYkx [from http://twitter.com/davidajudd/statuses/8152550494]
In order to comply with government search warrants on user data, Google created a backdoor access system into Gmail accounts. This feature is what the Chinese hackers exploited to gain access.
School used student laptop webcams to spy on them at school and home Boing Boing
http://www.boingboing.net/2010/02/17/school-used-student.html
The laptops issued to high-school students in the well-heeled Philly suburb have webcams that can be covertly activated by the schools' administrators, who have used this facility to spy on students and even their families. The issue came to light when the Robbins's child was disciplined for "improper behavior in his home" and the Vice Principal used a photo taken by the webcam as evidence. The suit is a class action, brought on behalf of all students issued with these machines.
According to the filings in Blake J Robbins v Lower Merion School District (PA) et al, the laptops issued to high-school students in the well-heeled Philly suburb have webcams that can be covertly activated by the schools' administrators, who have used this facility to spy on students and even their families
According to the filings in Blake J Robbins v Lower Merion School District (PA) et al, the laptops issued to high-school students in the well-heeled Philly suburb have webcams that can be covertly activated by the schools' administrators, who have used this facility to spy on students and even their families.
According to the filings in Blake J Robbins v Lower Merion School District (PA) et al, the laptops issued to high-school students in the well-heeled Philly suburb have webcams that can be covertly activated by the schools' administrators, who have used this facility to spy on students and even their families. The issue came to light when the Robbins's child was disciplined for "improper behavior in his home" and the Vice Principal used a photo taken by the webcam as evidence. The suit is a class action, brought on behalf of all students issued with these machines. If true, these allegations are about as creepy as they come. I don't know about you, but I often have the laptop in the room while I'm getting dressed, having private discussions with my family, and so on. The idea that a school district would not only spy on its students' clickstreams and emails (bad enough), but also use these machines as AV bugs is purely horrifying.
School used student laptop webcams to spy on them at school and home Boing Boing
if you borrow a laptop from your school or government, double check they're not spying on you. Scary post from Boing Boing about how one school in Philadelphia has been turning on the students' web cameras remotely to monitor "student behaviour". via stephen downes.
According to the filings in Blake J Robbins v Lower Merion School District (PA) et al, the laptops issued to high-school students in the well-heeled Philly suburb have webcams that can be covertly activated by the schools' administrators, who have used this facility to spy on students and even their families. Creepy!
See also /. discussion http://yro.slashdot.org/story/10/02/21/2010213/PA-School-Defends-Web-Cam-Spying-As-Security-Measure-Denies-Misuse
The Raw Story | Whistleblower: NSA spied on everyone, targeted journalists
http://rawstory.com/news/2008/Whistleblower_Bushs_NSA_targeted_reporters_0121.html
Former National Security Agency analyst Russell Tice, who helped expose the NSA's warrantless wiretapping in December 2005, has now come forward with even more startling allegations. Tice told MSNBC's Keith Olbermann on Wednesday that the programs that spied on Americans were not only much broader than previously acknowledged but specifically targeted journalists.
Article was updated. One time there were military helicopters that were hovering directly over me and Kenneth's apartments in Bowling Green. I went to tell Francis Gardler what had just happened to me and he just dismissed me as paranoid and crazy. Of course, military helicopters really did hover directly over our apartments. That's about the time that I started losing respect for Gardler.
Whether you were in Kansas and you never made foreign communications at all. They monitored all communications: says Whistleblower Russell Tice
Facebook’s E-mail Censorship is Legally Dubious, Experts Say | Epicenter
http://www.wired.com/epicenter/2009/05/facebooks-e-mail-censorship-is-legally-dubious-experts-say/
Yet another privacy issue with facebook.
"While the sniffing of e-mails is not unknown — it’s how Google serves up targeted ads in Gmail and how Yahoo filters out viruses, for example — the notion that a legitimate e-mail would be not be delivered based on its content is extraordinary."
Facebook private messages are governed by the Electronic Communications Privacy Act, which forbids communications providers from intercepting user messages, barring limited exceptions for security and valid legal orders. While the sniffing of e-mails is not unknown — it’s how Google serves up targeted ads in Gmail and how Yahoo filters out viruses, for example — the notion that a legitimate e-mail would be not be delivered based on its content is extraordinary.
article re FB censoring messages containing piratebay
AHAHAHHAHAHHAHAHA
On Facebook, links to The Pirate Bay is not allowed even in private messages
Should Obama Control the Internet? | Mother Jones
http://www.motherjones.com/politics/2009/04/should-obama-control-internet
The Cybersecurity Act gives the president the ability to "declare a cybersecurity emergency" and shut down or limit Internet traffic in any "critical" information network "in the interest of national security." does not define a critical information network or a cybersecurity emergency-- left to the president. grants the Secretary of Commerce "access to all relevant data concerning [critical] networks without regard to any provision of law, regulation, rule, or policy restricting such access." This means... can monitor or access any data on private or public networks without regard to privacy laws. The bill could undermine the Electronic Communications Privacy Act enacted in the mid '80s, requires law enforcement seek a warrant before tapping in to data transmissions between computers. might violate the Constitutional protection against searches without cause. Once information is accessed, it can be used for whatever purpose, no matter the original reason for accessing something
from the page: "The Cybersecurity Act of 2009 (PDF) gives the president the ability to "declare a cybersecurity emergency" and shut down or limit Internet traffic in any "critical" information network "in the interest of national security." The bill does not define a critical information network or a cybersecurity emergency. That definition would be left to the president... It also grants the Secretary of Commerce "access to all relevant data concerning [critical] networks without regard to any provision of law, regulation, rule, or policy restricting such access." ... When one person can access all information on a network, "it makes it more vulnerable to intruders," Granick says... "Once information is accessed, it can be used for whatever purpose, no matter the original reason for accessing something... Who's interested in this [bill]? Law enforcement and people in the security industry who want to ensure more government dollars go to them...""
Will Obama Shut the Internet Down. http://www.motherjones.com/politics/2009/04/should-obama-control-internet [from http://twitter.com/HenryDubb/statuses/1451549136]
The Sentinel
http://www.thesentinel.com/302730670790449.php
"Originating from Wootton High School, the parent said, students duplicate the license plates by printing plate numbers on glossy photo paper, using fonts from certain websites that "mimic" those on Maryland license plates. They tape the duplicate plate over the existing plate on the back of their car and purposefully speed through a speed camera, the parent said. The victim then receives a citation in the mail days later." Interesting if true, but only source may be one 'parent,' no one else (incl MoCo police) knows about it according to story. Maybe anti speed camera hoax? Web link doesn't work on 2/19/09.
hurt the integrity of the Speed Camera Program. "It will cause potential problems for the Speed Camera Program in terms of the confidence in it," he said. He said he is glad someone caught it before it becomes more widespread and he said he hopes that the word get
As a prank, students from local high schools have been taking advantage of the county's Speed Camera Program in order to exact revenge on people who they believe have wronged them in the past, including other students and even teachers. Students from Richard Montgomery High School dubbed the prank the Speed Camera "Pimping" game, according to a parent of a student enrolled at one of the high schools. Originating from Wootton High School, the parent said, students duplicate the license plates by printing plate numbers on glossy photo paper, using fonts from certain websites that "mimic" those on Maryland license plates. They tape the duplicate plate over the existing plate on the back of their car and purposefully speed through a speed camera, the parent said. The victim then receives a citation in the mail days later.
[County Council President] Andrews said that this could hurt the integrity of the Speed Camera Program. "It will cause potential problems for the Speed Camera Program in terms of the confidence in it"
As a prank, students from local high schools have been taking advantage of the county's Speed Camera Program in order to exact revenge on people who they believe have wronged them in the past, including other students and even teachers.
BBC News - First human 'infected with computer virus'
http://news.bbc.co.uk/2/hi/technology/10158517.stm
the first cyborg is now the first infected cyborg. TOI esque headline on BBC http://news.bbc.co.uk/2/hi/technology/10158517.stm [from http://twitter.com/madguy000/statuses/14764804819]
Are Cameras the New Guns?
http://gizmodo.com/5553765/are-cameras-the-new-guns
A few weeks ago, an Illinois judge rejected a motion to dismiss an eavesdropping charge against Christopher Drew, who recorded his own arrest for selling one-dollar artwork on the streets of Chicago. Although the misdemeanor charges of not having a peddler's license and peddling in a prohibited area were dropped, Drew is being prosecuted for illegal recording, a Class I felony punishable by 4 to 15 years in prison.
In response to a flood of Facebook and YouTube videos that depict police abuse, a new trend in law enforcement is gaining popularity. In at least three states, it is now illegal to record any on-duty police officer.
In response to a flood of Facebook and YouTube videos that depict police abuse, a new trend in law enforcement is gaining popularity. In at least three states, it is now illegal to record any on-duty police officer. Even if the encounter involves you and may be necessary to your defense, and even if the recording is on a public street where no expectation of privacy exists. The legal justification for arresting the "shooter" rests on existing wiretapping or eavesdropping laws, with statutes against obstructing law enforcement sometimes cited. Illinois, Massachusetts, and Maryland are among the 12 states in which all parties must consent for a recording to be legal unless, as with TV news crews, it is obvious to all that recording is underway. Since the police do not consent, the camera-wielder can be arrested.