Nearly 50 years ago, Gordon Moore suggested that the number of transistors that could be placed on a silicon chip would continue to double at regular intervals for the foreseeable future. Known as Moore’s law, the truth of that observation has made computers cheap and ubiquitous. Cellphones are so inexpensive there are now more than six billion of them—almost one for every person on the planet.
Category: surveillance – Page 39
Sebastian Anthony - Extreme Tech
Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening – yes, with a microphone — to a computer as it decrypts some encrypted data. The attack is fairly simple and can be carried out with rudimentary hardware. The repercussions for the average computer user are minimal, but if you’re a secret agent, power user, or some other kind of encryption-using miscreant, you may want to reach for the Rammstein when decrypting your data.
Kelsey D. Atherton — Popular Science
Consider it a rough Audubon guide to the mechanical fauna of battlefields. Created by Amsterdam-based designer Ruben Pater, the Drone Survival Guide is, on one side, a rough bird watcher’s guide to the modern robot at war. The other side is a short section of printed survival tips, and the guides are available in Pashto, Dutch, German, Italian, Indonesian, Arabic, and English.
The selection of drones included in the guide leads heavily towards those from NATO member countries, with the United Kingdom, Canada, France, Germany, and the United States all represented, as well as NATO itself, for the other member countries that use these drones. Partly because those are the countries that have used drones, in Afghanistan and elsewhere, the most, but partly because they are just the countries where it is easier to get information about the scale and wingspan of their flying robots.
Rex Troumbley — Slate
This essay originally appeared in Internet Monitor 2013: Reflections on the Digital World, published by the Internet Monitor project at Harvard’s Berkman Center for Internet & Society. It is licensed under a Creative Commons Attribution 3.0 Unported license and has been lightly edited to align with Slate’s style guide.
On June 30, 2013, prompted by revelations of surveillance programs in the United States and United Kingdom, former Union of International Associations Assistant Secretary-General Anthony Judge published a detailed proposal titled “Circumventing Invasive Internet Surveillance With Carrier Pigeons.” In it, Judge discusses the proven competence of carrier pigeons for delivering messages, their non-military and military messaging capacity, and Chinese experiments to create pigeon cyborgs. Judge acknowledges that pigeon networks have their own vulnerability (such as disease, hawks, or being lured off course by sexy decoys), but argues that others have proven pigeons are effective at transmitting digital data.
PEÑITAS — It’s a bird, it’s a plane, it’s … no, it’s a Border Patrol blimp. Mobile, unmanned, aerial security surveillance has arrived in the Rio Grande Valley.
A so-called aerostat surveillance blimp was unveiled to media Thursday afternoon in a field south of Interstate 2/Expressway 83. Standing behind a U.S. Department of Homeland Security dais, local and national officials introduced the big, white airship and fielded questions about its upcoming use.
Noting how border fencing ends near Peñitas, Rosendo Hinojosa, chief patrol agent of the Border Patrol’s Rio Grande Valley Sector, said that the aerostat will provide Valley authorities with means previously unavailable to them.
“This is good technology,” he said of the camera-bearing aircraft, which will roam 1,000 feet above the ground. “It’s proven technology.”
Spying could become much easier if a new lightweight, folding satellite concept gets off the ground.
Darpa, the military’s futuristic research agency, says it has plans to “break the glass ceiling” of space telescopes by shooting a new design into orbit that’s made of plastic and unfolds into a mammoth satellite that would dwarf the world’s most famous telescopes.
Darpa’s Membrane Optical Imager for Real-Time Exploitation (MOIRE) program redesigns the traditional glass telescope into an orbital telescope that’s bigger and lighter than previous imaging satellites, making it easier to spy on larger areas and for longer periods of time.
Launched as a tightly packed cluster of petals 20 feet in diameter, MOIRE stretches to 68 feet across once it reaches 22,000 miles above the earth. From orbit, MOIRE could view approximately 40 percent of the earth’s surface at once while recording high resolution images and video, making it the ultimate spying satellite (Darpa notes that it could also be beneficial in weather forecasting and disaster response).
Applied Omniscience in Transformative and Integrative Risk Management!
Posted in big data, biological, biotech/medical, bitcoin, business, climatology, complex systems, cosmology, counterterrorism, defense, economics, education, energy, engineering, environmental, ethics, existential risks, finance, food, futurism, genetics, geopolitics, government, habitats, health, information science, life extension, nanotechnology, neuroscience, physics, policy, robotics/AI, science, scientific freedom, security, singularity, space, supercomputing, surveillance, sustainability, transhumanism, transparency, transportation, treaties
Applied Omniscience in Transformative and Integrative Risk Management! By Mr. Andres Agostini
This is an excerpt from the presentation, “…Applied Omniscience in Transformative and Integrative Risk Management!…” that discusses some management theories and practices. To read the entire piece, just click the link at the end of article:
Please see the graphic at http://lnkd.in/dUstZEk
By
Summary:
The incident, which was probably a case of the French finance ministry going overboard in its efforts to monitor employee activities, provides a timely reminder of how certificates are the weak point in online security.
Google appears to have caught the French finance ministry spying on its workers’ internet traffic by spoofing Google security certificates, judging from an episode that took place last week.
The web firm said in a blog post on Saturday that, on the preceding Tuesday, it had become aware of “unauthorized digital certificates for several Google domains.” It tracked the provenance of these certificates back to ANSSI, the French state information security agency, which in turn pointed to the Treasury as the culprit.
Written by John Kelly USA Today
The National Security Agency isn’t the only government entity secretly collecting data from people’s cellphones. Local police are increasingly scooping it up, too.
Armed with new technologies, including mobile devices that tap into cellphone data in real time, dozens of local and state police agencies are capturing information — about thousands of cellphone users at a time, whether they are targets of an investigation or not, according to public records obtained by USA Today, The Des Moines Register and other Gannett newspapers and TV stations.
The records, from more than 125 police agencies in 33 states, reveal:
If NSA employees were bummed that President Obama hasn’t paid them a visit, they’re going to be devastated to learn that all their favorite tech companies are publicly calling them out. Eight companies – Google, Facebook, Apple, Microsoft, Twitter, Yahoo, LinkedIn and AOL – have put aside their rivalries and issued a call for the reform of government surveillance. “We understand that governments have a duty to protect their citizens. But this summer’s revelations highlighted the urgent need to reform government surveillance practices worldwide,” says an open letter featured in full-page ads in several newspaper on Monday. “The balance in many countries has tipped too far in favor of the state and away from the rights of the individual — rights that are enshrined in our Constitution. This undermines the freedoms we all cherish.”