Skip to main content

Home/ Future of the Web/ Group items tagged 2012

Rss Feed Group items tagged

Paul Merrell

Forget About Siri and Alexa - When It Comes to Voice Identification, the "NSA Reigns Su... - 0 views

  • These and other classified documents provided by former NSA contractor Edward Snowden reveal that the NSA has developed technology not just to record and transcribe private conversations but to automatically identify the speakers. Americans most regularly encounter this technology, known as speaker recognition, or speaker identification, when they wake up Amazon’s Alexa or call their bank. But a decade before voice commands like “Hello Siri” and “OK Google” became common household phrases, the NSA was using speaker recognition to monitor terrorists, politicians, drug lords, spies, and even agency employees. The technology works by analyzing the physical and behavioral features that make each person’s voice distinctive, such as the pitch, shape of the mouth, and length of the larynx. An algorithm then creates a dynamic computer model of the individual’s vocal characteristics. This is what’s popularly referred to as a “voiceprint.” The entire process — capturing a few spoken words, turning those words into a voiceprint, and comparing that representation to other “voiceprints” already stored in the database — can happen almost instantaneously. Although the NSA is known to rely on finger and face prints to identify targets, voiceprints, according to a 2008 agency document, are “where NSA reigns supreme.” It’s not difficult to see why. By intercepting and recording millions of overseas telephone conversations, video teleconferences, and internet calls — in addition to capturing, with or without warrants, the domestic conversations of Americans — the NSA has built an unrivaled collection of distinct voices. Documents from the Snowden archive reveal that analysts fed some of these recordings to speaker recognition algorithms that could connect individuals to their past utterances, even when they had used unknown phone numbers, secret code words, or multiple languages.
  • The classified documents, dating from 2004 to 2012, show the NSA refining increasingly sophisticated iterations of its speaker recognition technology. They confirm the uses of speaker recognition in counterterrorism operations and overseas drug busts. And they suggest that the agency planned to deploy the technology not just to retroactively identify spies like Pelton but to prevent whistleblowers like Snowden.
Paul Merrell

HART: Homeland Security's Massive New Database Will Include Face Recognition, DNA, and ... - 0 views

  • The U.S. Department of Homeland Security (DHS) is quietly building what will likely become the largest database of biometric and biographic data on citizens and foreigners in the United States. The agency’s new Homeland Advanced Recognition Technology (HART) database will include multiple forms of biometrics—from face recognition to DNA, data from questionable sources, and highly personal data on innocent people. It will be shared with federal agencies outside of DHS as well as state and local law enforcement and foreign governments. And yet, we still know very little about it.The records DHS plans to include in HART will chill and deter people from exercising their First Amendment protected rights to speak, assemble, and associate. Data like face recognition makes it possible to identify and track people in real time, including at lawful political protests and other gatherings. Other data DHS is planning to collect—including information about people’s “relationship patterns” and from officer “encounters” with the public—can be used to identify political affiliations, religious activities, and familial and friendly relationships. These data points are also frequently colored by conjecture and bias.
  • DHS currently collects a lot of data. Its legacy IDENT fingerprint database contains information on 220-million unique individuals and processes 350,000 fingerprint transactions every day. This is an exponential increase from 20 years ago when IDENT only contained information on 1.8-million people. Between IDENT and other DHS-managed databases, the agency manages over 10-billion biographic records and adds 10-15 million more each week.
  • DHS’s new HART database will allow the agency to vastly expand the types of records it can collect and store. HART will support at least seven types of biometric identifiers, including face and voice data, DNA, scars and tattoos, and a blanket category for “other modalities.” It will also include biographic information, like name, date of birth, physical descriptors, country of origin, and government ID numbers. And it will include data we know to by highly subjective, including information collected from officer “encounters” with the public and information about people’s “relationship patterns.”
  • ...1 more annotation...
  • DHS’s face recognition roll-out is especially concerning. The agency uses mobile biometric devices that can identify faces and capture face data in the field, allowing its ICE (immigration) and CBP (customs) officers to scan everyone with whom they come into contact, whether or not those people are suspected of any criminal activity or an immigration violation. DHS is also partnering with airlines and other third parties to collect face images from travelers entering and leaving the U.S. When combined with data from other government agencies, these troubling collection practices will allow DHS to build a database large enough to identify and track all people in public places, without their knowledge—not just in places the agency oversees, like airports, but anywhere there are cameras.Police abuse of facial recognition technology is not a theoretical issue: it’s happening today. Law enforcement has already used face recognition on public streets and at political protests. During the protests surrounding the death of Freddie Gray in 2015, Baltimore Police ran social media photos against a face recognition database to identify protesters and arrest them. Recent Amazon promotional videos encourage police agencies to acquire that company’s face “Rekognition” capabilities and use them with body cameras and smart cameras to track people throughout cities. At least two U.S. cities are already using Rekognition.DHS compounds face recognition’s threat to anonymity and free speech by planning to include “records related to the analysis of relationship patterns among individuals.” We don’t know where DHS or its external partners will be getting these “relationship pattern” records, but they could come from social media profiles and posts, which the government plans to track by collecting social media user names from all foreign travelers entering the country.
Paul Merrell

YouTube removed five times more content for violating hate speech rules - CNN - 0 views

  • n a blog post on Tuesday, YouTube said it had removed more than 100,000 videos and over 17,000 channels for violating its hate speech rules in April through June, which is five times more than it removed in the previous three months. It also took down over 500 million comments over hate speech. YouTube attributed the increase to its recent efforts to counter the proliferation of hate content. In June, the company updated its hate speech policy to include a ban on supremacist content and the removal of videos that deny well-documented atrocities, such as the Holocaust, and the 2012 shooting rampage at Sandy Hook elementary school.
Paul Merrell

Apple Suffers "Doomsday" Plunge In iPhone Shipments Across China | Zero Hedge - 0 views

  • Wedbush analyst Daniel Ives called the decline of iPhone sales in China a "doomsday type" like decline. Ives said the fall was an "unprecedented" drop and was "not surprising given the essential lockdown that most of China saw" in February. Wedbush expects Chinese demand to come back online in the second half of the year. * * * We've explained that economic paralysis in China started in early February and continues to this day. Alternative data first showed us the incoming economic crash developing in early February, only to be confirmed weeks later. Twin shocks plague the Chinese economy, which is a supply shock with manufacturers operating at less than full capacity, along with a demand shock, where consumers have been confined to their homes in forced quarantine, unable to spend.  So, on Monday morning, when new data from the China Academy of Information and Communications Technology (CAICT) reveals Apple smartphone sales in China were halved in February, this really shouldn't surprise ZeroHedge readers, considering they've been well informed about what would happen next. 
  • And it wasn't just Apple with plunging activity, all mobile phone brands operating in China saw shipments halved over the month.  CAICT said 6.34 million devices were shipped last month, down 54.7% from 14 million in the same month the previous year. This was the lowest level of February shipments since 2012, when the CAICT data first became available.  Android brands, including Huawei and Xiaomi, accounted for most of the drop, collectively saw shipments at 5.85 million units for the month, compared to 12.72 million units last year. Apple shipped 494,000 last month, down from 1.27 million in February 2019.
Paul Merrell

Facebook Quietly Notifies Public That Millions Of Instagram Users Had Passwords Exposed... - 0 views

  • While everyone was focused on the release of the Mueller report Thursday, Facebook quietly notified the public that the passwords of "millions of Instagram users" were stored in an unencrypted format on an internal server, and searchable by any employee.
  • In March, security expert Brian Krebs of KrebsonSecurity noted:  The Facebook source said the investigation so far indicates between 200 million and 600 million Facebook users may have had their account passwords stored in plain text and searchable by more than 20,000 Facebook employees. The source said Facebook is still trying to determine how many passwords were exposed and for how long, but so far the inquiry has uncovered archives with plain text user passwords dating back to 2012. My Facebook insider said access logs showed some 2,000 engineers or developers made approximately nine million internal queries for data elements that contained plain text user passwords. -KrebsonSecurity In short, if you believe Facebook that the passwords were not improperly accessed, rest well. If you don't believe them, and you use your Instagram password for other things, perhaps it's time to think of a new one.  
Paul Merrell

Shocking Leak Reveals Facebook Leveraged User Data To Reward Friends, Punish Enemies | ... - 0 views

  • As traders focused on bank earnings and the outlook for global growth, NBC News wrested the market's attention back toward Facebook by publishing a report on what appears to be the largest leak of internal documents since the data privacy scandal that has dogged the company for more than a year erupted with the first reports about Cambridge Analytica's 'improper' leveraging of Facebook user data to influence elections.
  • Some 4,000 pages of documents shared with the network news organization by a journalist affiliated with the ICIJ, the same organization that helped bring us the Panama Papers leaks, revealed that Facebook had employed sensitive user data as a bargaining chip to attract major advertisers and close other deals between 2011 and 2015, when the company was struggling to cement its business model following its botched 2012 IPO.
  • Facebook essentially offered companies like Amazon unfettered access to its data in exchange for agreeing to advertise on Facebook's platform, according to the documents, only a small fraction of which have been previously reported on. All of this was happening at a time when the company publicly professed to bee safeguarding user data.
Paul Merrell

Ecuador Expected To Extradite Assange To US, Lawyer Says | PopularResistance.Org - 1 views

  • Julian Assange, WikiLeaks’ founder, has taken refuge in the Ecuadorean Embassy since 2012. That might end soon. Ecuador may be preparing to extradite WikiLeaks’ founder Julian Assange to the United States, Carlos Poveda, his lawyer warned Thursday. “I believe that [Washington, London and Quito] have reached some agreement and that is exactly why the special protocol [on home rules] was introduced… to accelerate the process of ending his asylum and hand him over to the United Kingdom authorities,” Poveda said Thursday.
« First ‹ Previous 121 - 127 of 127
Showing 20 items per page