Pages with tag Big Brother

Amazon employees demand stopping face-recognition contract with federal government Among the Amazon Web Services is Rekognition, a facial recognition system running on Amazon's cloud. Anyone can sign up with the service, to have video analyzed to identify people or objects. Turns out the federal government is using this service for various tasks including deportation and detention programs run by ICE, the Immigration Control force. A group of Amazon employees have written to Amazon CEO Jeff Bezos demanding that Amazon not do as IBM did during the 1940's when IBM's systems were used by Nazi Germany to help round up the Jews.
Big Brother touched Juniper Networks - backdoor allowed anyone to eavesdrop on communications It's known the U.S. Government spy agencies have demanded "cooperation" from computer and networking equipment vendors in ensuring spy agencies can unlawfully tap into communications traffic. The effect is that anybody learning the secret keys used by government spies to wiretap communications can also listen in on communications.
British Home Secretary makes chillingly authoritarian response to 'terror' attack Last week an angry man of Islamic descent (but born in Great Britain) rented a car, drove through a crowd on Westminster Bridge, killing several people, before killing a Police officer guarding Westminster Palace, after which he was shot and killed by other police officers. The killer may have been ISIS-connected (ISIS claims responsibility). In response British Home Secretary Amber Rudd named several online sites as hotbeds of online terrorism communication and radicalization. Her list included blogging platform Wordpress.com of all things. Her chilling message is there should be no secret places to hide.
Facebook has built a surveillance state where the inmates WANT to be in the prison

Facebook may need to come under government regulation. Facebook's COO claimed in a TV interview that the company has an advertising-driven model just like Radio and Television, both of whom are regulated by Governments. She also said that what Facebook is selling is access to people, but that's not for sale, which causes a big "HUH"? Any owner/operator of a Facebook page knows that over the last year or so Facebook has diminished the organic growth potential of Facebook Page postings. Such postings previously showed up organically in the newsfeed of folks following the pages, today that doesn't happen organically (very much). Instead, Page owner/operators are constantly barraged with please to spend money on advertising, in other words Facebook begs page owners to buy access to Facebook's users.

Facial recognition technology used to solve cases like Capitol Gazette newspaper shooting in Annapolis

The immediate reaction on Thursday to the Capitol Gazette newspaper shooting was that the climate of violence encouraged by Pres. Trump, all the vindictive aimed at newspapers by Trump, has resulted in some lunatic acting out the grievances inflamed by Trump's rhetoric. In other words, some Patriot believing the Capitol Gazette to be a hub of Liberal nonsense could have decided to shoot the place up. Supposedly the shooter, to mess up law enforcement efforts, had damaged his fingerprints, and did not carry identification, making us think maybe this was some kind of terror attack. At the end of the day, "Facial Recognition Technology" was used to identify the shooter as a person with a long-standing personal grievance against the staff of that newspaper, because of reporting by that newspaper about that person.

In other words, there is no nefarious dark scheme here. While it is true that Pres. Trump, and others in his administration, are inflaming the public against journalists with eery similarity to the Nazi Germany playbook, this particular case is a straight-up personal grievance. And, we have proof that while we should be concerned about big brother implications of facial recognition technology, in some cases like this one the technology is higly useful.

Google employees demand AI rules to preclude use as weapons

Google's culture of open free-flowing discussion could be ending in the wake of an uproar over Google's partnership with the US Dept. of Defense, called Project Maven, on AI software to analyze drone footage. Since Google's participation in Project Maven was publicly revealed in March, a raging debate with Google has swirled around whether the company famous for its "Do No Evil" slogan should be involved with making weapons. Googlers even sent an open letter to Google CEO Sundar Pichai starting with the declaration "We believe that Google should not be in the business of war." That letter flatly called for Google's participation in Project Maven to be canceled.

On June 27, 2018, it is learned that Google has instituted new rules for internal discussion and workplace conduct within the company.

In China, facial recognition technology is used to create a Big Brother tracking system

Modern technology is gifting society with many wonders, including democratization by giving more creative power to individuals. In some countries the Internet is not allowed to be used for democratization, but for authoritarian control. One particular area is facial recognition technology which is how social media networks like Facebook can automatically tag your pictures with your friends. That same technology can be aimed at a crowd, and used to implement real-time tracking of where folks walk throughout a city. Supposedly the benefit is catching wrong-doers, but in every movie about ubiquitous monitoring the government doesn't use the information for the benefit of all, but to squash freedom.

The man who spies on spy satellites, watching big brother watching us Several governments have spy satellites in orbit tracking us, so why not focus our cameras on the spy satellites? Citizens can spy on the governments who spy on citizens. Modern technology makes it possible to track how they are tracking us. And it is an exercise in freedom to determine just how it is we are being tracked by the government.
UN/EU eyes Blockchain technology to stop Moldovanian child sex trafficking

The UN and EU are proposing a solution to child sex trafficking based on Moldova, one of Europe's poorest countries. According to a Reuters report, many children born in Moldova do not have official identity documents, making them attractive for sex trafficking because they're outside the normal system where governments track the existence of its citizens. The proposal is to implement a system using Blockchain to give these children "paperless documents" containing immutable biometric identification information.

While Bitcoin itself may become irrelevant - i.e. it might be banned for legal use, and therefore its use would be limited to the shadowy underworld - the Blockchain technology it's built on is of wide-spread interest. The key features are using strong encryption to implement a ledger of data that is strongly protected by that encryption. It seems possible to use this for human identification -- if a set of data can be identified that automagically computes a security key that indexes into the blockchain, ...etc...

US Postal Service introduces Informed Delivery, a Big-Brotherly preview of incoming postal mail

Today the US Postal Service sent me an email inviting me to sign up with Informed Delivery. The pitch is that the USPS Mobile App will be upgraded to have access to Informed Delivery which is described as "a new, free feature that gives you the ability to see a digital preview of your incoming mail." Conveniently the Postal Service will send out grey-scale scans of the exterior of all pieces of mail arriving at the mailbox, and those scans can be viewed with the Mobile App or can be sent to ones e-mail inbox.

I'm not sure what the value is to me for this service. The big worry is that obviously it means the Postal Service is scanning the outside of every envelope, and what the heck are they doing with those scans? Who else is receiving those scans? The NSA? The FBI? Who?

Wikileaks reveals CIA iPhone penetration team: hacking the iPhone A new batch of 8,761 files was released on Tuesday by WikiLeaks that alleges that the U.S. Central Intelligence Agency (CIA) has a dedicated iOS exploit team —and lacks the ability to keep the attack vectors under lock and key. They either bought or developed in-house a large pile of iPhone hacking tools. They were collected by the CIA's Center for Cyber Intelligence (CCI), a group of over 5000 members, and have been used to directly target over 10,000 people. However, the tools have escaped the CIA and are now circulating among former U.S. government hackers and contractors in an unauthorized manner. It is one of those people who released the information to Wikileaks.
2016 Election Acer C720 Ad block AkashaCMS Amazon Amazon Kindle Amazon Web Services America Amiga and Jon Pertwee Android Anti-Fascism AntiVirus Software Apple Apple Hardware History Apple iPhone Apple iPhone Hardware April 1st Arduino ARM Compilation Artificial Intelligence Astronomy Astrophotography Asynchronous Programming Authoritarianism Automated Social Posting AWS DynamoDB AWS Lambda Ayo.JS Bells Law Big Brother Big Finish Bitcoin Mining Black Holes Blade Runner Blockchain Blogger Blogging Books Botnets Cassette Tapes Cellphones China China Manufacturing Christopher Eccleston Chrome Chrome Apps Chromebook Chromebox ChromeOS CIA CitiCards Citizen Journalism Civil Liberties Clinton Cluster Computing Command Line Tools Comment Systems Computer Accessories Computer Hardware Computer Repair Computers Cross Compilation Crouton Cryptocurrency Curiosity Rover Currencies Cyber Security Cybermen Daleks Darth Vader Data backup Data Storage Database Database Backup Databases David Tenant DDoS Botnet Detect Adblocker Developers Editors Digital Photography Diskless Booting Disqus DIY DIY Repair DNP3 Do it yourself Docker Docker MAMP Docker Swarm Doctor Who Doctor Who Paradox Doctor Who Review Drobo Drupal Drupal Themes DVD E-Books E-Readers Early Computers Election Hacks Electric Bicycles Electric Vehicles Electron Emdebian Encabulators Energy Efficiency Enterprise Node EPUB ESP8266 Ethical Curation Eurovision Event Driven Asynchronous Express Face Recognition Facebook Fake News Fedora VirtualBox File transfer without iTunes FireFly Flickr Fraud Freedom of Speech Front-end Development Gallifrey git Github GitKraken Gitlab GMAIL Google Google Chrome Google Gnome Google+ Government Spying Great Britain Heat Loss Hibernate Hoax Science Home Automation HTTP Security HTTPS Human ID I2C Protocol Image Analysis Image Conversion Image Processing ImageMagick In-memory Computing InfluxDB Infrared Thermometers Insulation Internet Internet Advertising Internet Law Internet of Things Internet Policy Internet Privacy iOS Devices iPad iPhone iPhone hacking Iron Man iTunes Java JavaScript JavaScript Injection JDBC John Simms Journalism Joyent Kaspersky Labs Kindle Kindle Marketplace Lets Encrypt LibreOffice Linux Linux Hints Linux Single Board Computers Logging Mac Mini Mac OS Mac OS X Machine Learning Machine Readable ID macOS MacOS X setup Make Money Online March For Our Lives MariaDB Mars Mass Violence Matt Lucas MEADS Anti-Missile Mercurial MERN Stack Michele Gomez Micro Apartments Microsoft Military AI Military Hardware Minification Minimized CSS Minimized HTML Minimized JavaScript Missy Mobile Applications Mobile Computers MODBUS Mondas Monetary System MongoDB Mongoose Monty Python MQTT Music Player Music Streaming MySQL NanoPi Nardole NASA Net Neutrality Network Attached Storage Node Web Development Node.js Node.js Database Node.js Testing Node.JS Web Development Node.x North Korea npm NVIDIA NY Times Online advertising Online Community Online Fraud Online Journalism Online Photography Online Video Open Media Vault Open Source Open Source Governance Open Source Licenses Open Source Software OpenAPI OpenVPN Palmtop PDA Patrick Troughton Paywalls Personal Flight Peter Capaldi Phishing Photography PHP Plex Plex Media Server Political Protest Postal Service Power Control Privacy Production use Public Violence Raspberry Pi Raspberry Pi 3 Raspberry Pi Zero ReactJS Recaptcha Recycling Refurbished Computers Remote Desktop Removable Storage Republicans Retro Computing Retro-Technology Reviews RFID Right to Repair River Song Robotics Rocket Ships RSS News Readers rsync Russia Russia Troll Factory Russian Hacking Rust SCADA Scheme Science Fiction SD Cards Search Engine Ranking Season 1 Season 10 Season 11 Security Security Cameras Server-side JavaScript Serverless Framework Servers Shell Scripts Silence Simsimi Skype SmugMug Social Media Social Media Warfare Social Network Management Social Networks Software Development Space Flight Space Ship Reuse Space Ships SpaceX Spear Phishing Spring Spring Boot Spy Satellites SQLite3 SSD Drives SSD upgrade SSH SSH Key SSL Stand For Truth Strange Parts Swagger Synchronizing Files Telescopes Terrorism The Cybermen The Daleks The Master Time-Series Database Tom Baker Torchwood Total Information Awareness Trump Trump Administration Trump Campaign Twitter Ubuntu Udemy UDOO US Department of Defense Virtual Private Networks VirtualBox VLC VNC VOIP Vue.js Web Applications Web Developer Resources Web Development Web Development Tools Web Marketing Webpack Website Advertising Weeping Angels WhatsApp William Hartnell Window Insulation Windows Windows Alternatives Wordpress World Wide Web Yahoo YouTube YouTube Monetization