"The first all-nonfiction McSweeney’s issue is a collection of essays and interviews focusing on issues related to technology, privacy, and surveillance. The collection features writing by EFF’s team, including Executive Director Cindy Cohn, Education and Design Lead Soraya Okuda, Senior Investigative Researcher Dave Maass, Special Advisor Cory Doctorow, and board member Bruce Schneier. We also … Continue reading End of Trust
Tag: surveillance
How to Boost Your Data Privacy With a Virtual Private Network
"Data privacy matters, and we all deserve respect and consideration from those we visit on the internet. As shown by the numerous data breaches that have affected companies and individual users around the world, individuals and governments, however, we must also look out for our own personal data and privacy. Using a VPN to obfuscate … Continue reading How to Boost Your Data Privacy With a Virtual Private Network
Click Here to Kill Everybody – Bruce Schneider
"There is simply no way to secure US networks while at the same time leaving foreign networks open to eavesdropping and attack. There's no way to secure our phones and computers from criminals and terrorists without also securing the phones and computers of those criminals and terrorists. On the generalized worldwide network that is the … Continue reading Click Here to Kill Everybody – Bruce Schneider
The Pendulum Will Swing
"If you believe in something, you have to be willing to stand for something or you don’t really believe in it at all. There’s always going to be consequences for opposing people in power and there’s no doubt that I have faced retaliation, as has every public interest whistleblower coming out of the intelligence community … Continue reading The Pendulum Will Swing
Tracking Firm LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers in Real Time Via Its Web Site
"A third-party firm leaking customer location information data [from all U.S. mobile telephone service providers in real-time] poses serious privacy and security risks for virtually all U.S. mobile customers (and perhaps beyond, although all my willing subjects were inside the United States)." Brian Krebs, "Tracking Firm LocationSmart Leaked Location Data for Customers of All Major … Continue reading Tracking Firm LocationSmart Leaked Location Data for Customers of All Major U.S. Mobile Carriers in Real Time Via Its Web Site
Pre-Crime
"When whole communities like East L.A. are algorithmically scraped for pre-crime suspects, data is destiny, says Saba. 'These are systemic processes. When people are constantly harassed in a gang context, it pushes them to join.'... ...'These cases are perfect examples of how databases filled with unverified information that is often false can destroy people’s lives,' … Continue reading Pre-Crime
Facebook’s Surveillance Machine
"Should we all just leave Facebook? That may sound attractive but it is not a viable solution. In many countries, Facebook and its products simply are the internet. Some employers and landlords demand to see Facebook profiles, and there are increasingly vast swaths of public and civic life — from volunteer groups to political campaigns … Continue reading Facebook’s Surveillance Machine
The Irony of Intelligence
"This is the irony of intelligence: the people with the time and effort to evade it are almost by definition uninteresting to the people they are attempting to evade." — Pwn ██ ██ ███; Error 404(b)(1): 702 auth not found (@pwnallthethings). Twitter. December 30, 2017.
You Give Up a Lot of Privacy Just Opening Emails. Here’s How to Stop It | WIRED
"[Email tracking] tech is pretty simple. Tracking clients embed a line of code in the body of an email—usually in a 1x1 pixel image, so tiny it's invisible, but also in elements like hyperlinks and custom fonts. When a recipient opens the email, the tracking client recognizes that pixel has been downloaded, as well as … Continue reading You Give Up a Lot of Privacy Just Opening Emails. Here’s How to Stop It | WIRED
Surveillance Cinema – Topic
Scenes from The Shining, Rocky, Say Anything, and When Harry Met Sally reimagined as scenes from surveillance footage.
Commercial Surveillance State
"Manipulation campaigns can plug into the commercial surveillance infrastructure and draw on lessons of behavioral science. They can use testing to refine strategies that take account of the personal traits of targets and identify interventions that may be most potent. This might mean identifying marginal participants, let’s say for joining a march or boycott, and … Continue reading Commercial Surveillance State
Invisible Manipulation
"The era where we were in control of the data on our own computers has been replaced with devices containing sensors we cannot control, storing data we cannot access, in operating systems we cannot monitor, in environments where our rights are rendered meaningless. Soon the default will shift from us interacting directly with our devices … Continue reading Invisible Manipulation
Giving Up Social Media & The Feudal Internet
Quitting social media is an ongoing theme of this blog with posts discussing various aspects: Arguing against particular social media services, e.g., Be Seeing You, Facebook. Describing new technologies major Internet companies employ for surveillance, e.g., Facebook & Facial Recognition. Describing how third parties use these platforms in the service of both advertising product and manipulating public … Continue reading Giving Up Social Media & The Feudal Internet
Finding Surveillance Aircraft in U.S. Cities
"...BuzzFeed News trained a computer to find [surveillance aircraft] by letting a machine-learning algorithm sift for planes with flight patterns that resembled those operated by the FBI and the Department of Homeland Security. Last year, we reported on aerial surveillance by these planes, mapping thousands of flights over more than four months from mid-August to … Continue reading Finding Surveillance Aircraft in U.S. Cities
