Privacy

Amazon’s Ring Planned Neighborhood β€œWatch Lists” Built on Facial Recognition

Amazon’s Ring Planned Neighborhood β€œWatch Lists” Built on Facial Recognition

Ring, Amazon’s crimefighting surveillance camera division, has crafted plans to use facial recognition software and its ever-expanding network of home security cameras to create AI-enabled neighborhood “watch lists,” according to internal documents reviewed by The Intercept.

The planning materials envision a seamless system whereby a Ring owner would be automatically alerted when an individual deemed “suspicious” was captured in their camera’s frame, something described as a “suspicious activity prompt.”

It’s unclear who would have access to these neighborhood watch lists, if implemented, or how exactly they would be compiled, but the documents refer repeatedly to law enforcement, and Ring has forged partnerships with police departments throughout the U.S., raising the possibility that the lists could be used to aid local authorities. The documents indicate that the lists would be available in Ring’s Neighbors app, through which Ring camera owners discuss potential porch and garage security threats with others nearby.

It Seemed Like a Popular Chat App. It’s Secretly a Spy Tool. – The New York Times

It Seemed Like a Popular Chat App. It’s Secretly a Spy Tool. – The New York Times

It is billed as an easy and secure way to chat by video or text message with friends and family, even in a country that has restricted popular messaging services like WhatsApp and Skype.

But the service, ToTok, is actually a spying tool, according to American officials familiar with a classified intelligence assessment and a New York Times investigation into the app and its developers. It is used by the government of the United Arab Emirates to try to track every conversation, movement, relationship, appointment, sound and image of those who install it on their phones.

ToTok, introduced only months ago, was downloaded millions of times from the Apple and Google app stores by users throughout the Middle East, Europe, Asia, Africa and North America. While the majority of its users are in the Emirates, ToTok surged to become one of the most downloaded social apps in the United States last week, according to app rankings and App Annie, a research firm.

Opinion | How to Track President Trump – The New York Times

Opinion | How to Track President Trump – The New York Times

f you own a mobile phone, its every move is logged and tracked by dozens of companies. No one is beyond the reach of this constant digital surveillance. Not even the president of the United States.

The Times Privacy Project obtained a dataset with more than 50 billion location pings from the phones of more than 12 million people in this country. It was a random sample from 2016 and 2017, but it took only minutes — with assistance from publicly available information — for us to deanonymize location data and track the whereabouts of President Trump.

Planting Tiny Spy Chips in Hardware Can Cost as Little as $200 | WIRED

Planting Tiny Spy Chips in Hardware Can Cost as Little as $200 | WIRED

More than a year has passed since Bloomberg Businessweek grabbed the lapels of the cybersecurity world with a bombshell claim: that Supermicro motherboards in servers used by major tech firms, including Apple and Amazon, had been stealthily implanted with a chip the size of a rice grain that allowed Chinese hackers to spy deep into those networks. Apple, Amazon, and Supermicro all vehemently denied the report. The NSA dismissed it as a false alarm. The Defcon hacker conference awarded it two Pwnie Awards, for "most overhyped bug" and "most epic fail." And no follow-up reporting has yet affirmed its central premise.

But even as the facts of that story remain unconfirmed, the security community has warned that the possibility of the supply chain attacks it describes is all too real. The NSA, after all, has been doing something like it for years, according to the leaks of whistle-blower Edward Snowden. Now researchers have gone further, showing just how easily and cheaply a tiny, tough-to-detect spy chip could be planted in a company's hardware supply chain. And one of them has demonstrated that it doesn't even require a state-sponsored spy agency to pull it off—just a motivated hardware hacker with the right access and as little as $200 worth of equipment.

Forget Gen Z. This Is Generation Surveillance. – GEN

Forget Gen Z. This Is Generation Surveillance. – GEN

It’s time we acknowledge this reality and adopt a new name for Gen Z — let’s call it Gen S for surveillance. They are saved in the cloud, perpetually viewable, the memories of memories posted to the stream long ago, unable to forget or be forgotten. They are a generation living in a paradox: The more they do and the more they come alive, the more they’re watched and the more narrowly they’ll be defined, boxed in and buried under the data they produce.

U.S. in Danger of Chinese-Style Social Credit System

U.S. in Danger of Chinese-Style Social Credit System

Communist China's massive internet surveillance system is coming to the United States, and conservatives should be worried.

Since 2014, the Communist Chinese government has been perfecting its internet monitoring system, which spies on its citizens' online activity. Using the data, the Chinese can "blacklist" various citizens whose online comments they deem undesirable and lower their credit rating, restricting them from traveling, being barred from better schools, jobs and even from getting a loan.

Beijing is now applying its system to foreign businesses in China in the ongoing trade war with the United States.

Paranoid rhetoric from a far right-wing website? Yeah, probably. But we shouldn't discount that possibility of an arbitrary social score system coming to America, possibly put forward by social media companies or maybe something like a credit rating bureau. Their might be push back from the civil libertarians, but it's hard to stop something like that if it's not put forward by the government and big businesses want it. I could also see it being tied in with the Red Flag Laws or the right to vote -- people who are viewed as too dangerous might have their voter files flagged and their voting records deleted by the government. Sometimes it's impossible to stop the procession of dangerous technology.

To Search Through Millions of License Plates, Police Should Get a Warrant | Electronic Frontier Foundation

To Search Through Millions of License Plates, Police Should Get a Warrant | Electronic Frontier Foundation

"Earlier this week, EFF filed a brief in one of the first cases to consider whether the use of automated license plate reader (ALPR) technology implicates the Fourth Amendment. Our amicus brief, filed in the Ninth Circuit Court of Appeals in United States v. Yang, argues that when a U.S. Postal Service inspector used a commercial ALPR database to locate a suspected mail thief, it was a Fourth Amendment search that required a warrant."

"ALPRs are high-speed, computer-controlled camera systems. Some models can photograph up to 1,800 license plates every minute, and every week, law enforcement agencies across the country use these cameras to collect data on millions of license plates. The plate numbers, together with location, date, and time information, are uploaded to a central server, and made instantly available to other agencies. The data include photographs of the vehicle, and sometimes of its drivers and passengers. ALPRs are typically attached to vehicles, such as police cars, or can be mounted on street poles, highway overpasses, or mobile trailers."