Skip navigation
Help

Crime prevention

warning: Creating default object from empty value in /var/www/vhosts/sayforward.com/subdomains/recorder/httpdocs/modules/taxonomy/taxonomy.pages.inc on line 33.
Original author: 
Dan Goodin

Josh Chin

The Chinese hackers who breached Google's corporate servers 41 months ago gained access to a database containing classified information about suspected spies, agents, and terrorists under surveillance by the US government, according to a published report.

The revelation came in an article published Monday by The Washington Post, and it heightens concerns about the December, 2009 hack. When Google disclosed it a few weeks later, the company said only that the operatives accessed Google "intellectual property"—which most people took to mean software source code—and Gmail accounts of human rights activists.

Citing officials who agreed to speak on the condition that they not be named, Washington Post reporter Ellen Nakashima said the assets compromised in the attack also included a database storing years' worth of information about US surveillance targets. The goal, according to Monday's report, appears to be unearthing the identities of Chinese intelligence operatives in the US who were being tracked by American law enforcement agencies.

Read 7 remaining paragraphs | Comments

0
Your rating: None
Original author: 
boesing

sha

The real capabilities and behavior of the US surveillance state are almost entirely unknown to the American public because, like most things of significance done by the US government, it operates behind an impenetrable wall of secrecy. But a seemingly spontaneous admission this week by a former FBI counterterrorism agent provides a rather startling acknowledgment of just how vast and invasive these surveillance activities are.

http://www.guardian.co.uk/commentisfree/2013/may/04/telephone-calls-reco...

0
Your rating: None

1450889124_6889803099_b_thumb

Today in the department of bad ideas, we have a pair of San Antonio high schools that’s decided to tag its students with RFID chips so that they can track their every move on campus. Starting this fall, the Northside Independent School District will be issuing RFID-equipped identification cards that the kids have to wear on lanyards any time they’re on campus. And then, in some corner of the principal’s office, the students show up as moving dots on a map of the screen like some real life game of Pac Man. This is the same way they keep track of cattle in Texas, by the way.

0
Your rating: None

Stranger Visions

With websites, corporations, and governments peeking at our activities both on and offline, many of us have become more mindful of the electronic footprints our online activities leave behind. But there aren't any privacy settings to deter the kind of surveillance that information artist Heather Dewey-Hagborg is modeling with her new project: a genetic intelligence database of computer-generated 3D profiles constructed from found hair samples.

Premiering last weekend at an open studio showcase for residents of New York City's Eyebeam art and technology lab, the project, Stranger Visions, began with a simple but profound realization: we are leaving physical traces of ourselves everywhere, and tools to unlock the secrets behind those...

Continue reading…

0
Your rating: None



The FBI can't get into a pimp's Android phone—so it wants Google to hand over the keys.

In addition to accessing the phone, agents also want Google to turn over e-mail searches, Web searches, GPS tracking data, websites visited, and text messages. A federal judge has agreed. Hopefully, digital devices can make life hard out there for a pimp—but the case also reminds us just how much data smartphones generate on even innocuous users.

Read the rest of this article...

Read the comments on this post

0
Your rating: None



As Bruce Schneier spent the past decade watching the growing rash of phishers, malware attacks, and identity theft, a new Internet threat has emerged that poses even greater risks, the security expert said.

Unlike the security risks posed by criminals, the threat from government regulation and data hoarders such as Apple and Google are more insidious because they threaten to alter the fabric of the Internet itself. They're also different from traditional Internet threats because the perpetrators are shielded in a cloak of legitimacy. As a result, many people don't recognize that their personal information or fortunes are more susceptible to these new forces than they ever were to the Russian Business Network or other Internet gangsters.

Read the rest of this article...

Read the comments on this post

0
Your rating: None

Desire of Codes - Art Installation by Seiko Mikami

Audio / Visual installation using robotics to capture video of visitors, projecting the captures onto a hexagon ‘eye’:

The “individual” visitor in a double role as a subject of expression and observation

This interactive installation consisting of three parts is set up in YCAM’s Studio A, a space that is normally used for theatre performances.

A large number of devices resembling tentacles with built-in small cameras are placed across a huge wall (Part 1), while six robotic “search arms” equipped with cameras and projectors are suspended from the ceiling (Part 2). Each device senses with insect-like wriggling movements the positions and movements of visitors, and turns toward detected persons in order to observe their actions. In addition, a giant round-shaped screen that looks like an insect’s compound eye is installed in the back of the exhibition space (Part 3). Visual data transmitted from each camera, along with footage recorded by surveillance cameras installed at various places around the world, are stored in a central database, and ultimately projected in complex images mixing elements of past and present, the venue itself and points around the globe, onto the screen. The compound eye visualizes a new reality in which fragmentary aspects of space and time are recombined, while the visitor’s position as a subject of expression and surveillance at once indicates the new appearances of human corporeality and desire.

More from the artist’s website here

(via prostheticknowledge:)

0
Your rating: None