Skip to main content

Home/ Indie Nation/ Group items tagged tracking

Rss Feed Group items tagged

John Lemke

NSA Is Tracking Mobile Phone Location On So Many People It Can't Handle The Data Storag... - 0 views

  • The NSA cannot know in advance which tiny fraction of 1 percent of the records it may need, so it collects and keeps as many as it can — 27 terabytes, by one account, or more than double the text content of the Library of Congress’s print collection.
  • NSA defends the program by saying that it uses the location data to find "unknown associates of known intelligence targets." Basically, it's tracking where everyone goes, just in case people end up spending time with people the NSA deems as being terrorists.
  • Elsewhere in the article, they quote NSA officials repeatedly saying that the program is "tuned to be looking outside the United States," but not saying it only collects info outside the US. Also, they make clear, once a person leaves the US, the NSA no longer believes the 4th Amendment applies to them, so their location is fair game in this giant database.. Asked for specific numbers, an NSA person said:
  • ...1 more annotation...
  • It’s awkward for us to try to provide any specific numbers..."
    • John Lemke
       
      Sad day when accountability becomes awkward.
    • John Lemke
       
      Sad day when accountability becomes awkward.
John Lemke

NSA reportedly 'piggybacking' on Google advertising cookies to home in on surveillance ... - 0 views

  • US surveillance agency may be using Google's advertising cookies to track and "pinpoint" targets for government hacking and location-tracking. According to Snowden's leaked presentation slides, both the NSA and the British equivalent, the GCHQ, are using a Google-specific ad cookie (know as "PREF") as a way of homing in on specific surveillance targets. While Google's cookie doesn't contain personal information like a name or email address, it does contain numeric codes that uniquely identify a user's browser.
  • The report notes that the NSA doesn't use this technique to find suspicious activity amidst the massive flood of internet communication that takes place every day — instead, it uses it to home in on targets already under suspicion.
John Lemke

The Land Walker: the world's first 340cm bipedal exoskeleton - 0 views

  •  
    Japanese machinery and robotics manufacturer Sakakibara-Kikai has released the first genuine bi-pedal exoskeleton - a landmark event and one which is certain to attract a lot of attention for the company. Mechanatrons and BattleMechs have long been the subject of scifi books, comics and movies with the promise of cyborg technology popularised by the smash sixties television series "The Six Million Dollar Man." We've previously seen some celebrated exoskeletons in films such as Alien (Sigourney Weaver's Ripley takes out the Queen alien in an exoskeleton), Star Wars (the AT-ST Imperial Scout Walker) and RoboCop (the ED209), but until now, the nearest thing we've seen in the metal was the 3.5 metre superhero exoskeleton Enryu from Tmsuk in Japan. Sakakibara-Kikai's Land Walker is just a tad shorter than Enryu at 3.4 metres, weighs 1000kg and shuffles along at 1.5kmh. Enryu is a lot faster than Land Walker but uses caterpillar-like tracks rather than legs to perform its chores - the strapping 3.5 metre Enryu will be called upon to rush into burning buildings, lift heavy objects and rescue people.
John Lemke

RoboMara 2011: Autonomous bot wins marathon by a nose - 0 views

  •  
    he RoboMara or robot marathon has just come to a close in Osaka Japan, with a pair of bipedal bots battling it out in surprisingly close dash to the finish. After 422 laps of a 100-meter track, two robots found themselves only inches apart as coming out of the final turn.
John Lemke

$100 Million Pledged To Indie Film On Kickstarter... And 8,000 Films Made | Techdirt - 0 views

  • And, yes, the "but what about my $100 million movie" crowd will scoff and argue that this number is so "small." But, two points there: first, this number is growing very, very, very fast. And if you can't understand how trends explode, then you're going to be in trouble soon. Second -- and this is the more important point -- those funds helped create 8,000 films. For those who have been arguing about culture and how we're going to lose the ability to make movies... this suggests something amazing and important is happening which goes against all those gloom and doom predictions. By way of comparison, the UN, which keeps track of stats on film production, claimed that in 2009, 7,233 films were made. Worldwide.
  •  
    "Less than a year after being declared the darling of Sundance -- especially for not having "the arrogance of a studio" -- Kickstarter has announced that over $100 million has been pledged to indie film via its platform (which, of course, is hardly the only crowdfunding platform that filmmakers use, though it is the most popular). There are some caveats, of course. This is over Kickstarter's lifetime (since April 2009), but the numbers have been growing rapidly. $60 million of those pledges came in 2012. Also, that's pledges, not actual money given, since only projects that hit their target get the money. The actual total collected is $85.7 million -- which means that'll get over $100 million pretty quickly. "
John Lemke

Why The Copyright Industry Is Doomed, In One Single Sentence | TorrentFreak - 0 views

  • In order to prevent copyright monopoly violations from happening in such channels, the only means possible is to wiretap all private digital communications to discover when copyrighted works are being communicated. As a side effect, you would eliminate private communications as a concept. There is no way to sort communications into legal and illegal without breaching the postal secret – the activity of sorting requires observation.
  • Therefore, as a society, we are at a crossroads where we can make a choice between privacy and the ability to communicate in private, with all the other things that depend on that ability (like whistleblower protections and freedom of the press), or a distribution monopoly for a particular entertainment industry. These two have become mutually exclusive and cannot coexist, which is also why you see the copyright industry lobbying so hard for more surveillance, wiretapping, tracking, and data retention (they understand this perfectly).
  • Any digital, private communications channel can be used for private protected correspondence, or to transfer works that are under copyright monopoly. In order to prevent copyright monopoly violations from happening in such channels, the only means possible is to wiretap all private digital communications to discover when copyrighted works are being communicated. As a side effect, you would eliminate private communications as a concept. There is no way to sort communications into legal and illegal without breaching the postal secret – the activity of sorting requires observation.
John Lemke

Snowden documents show British digital spies use viruses and 'honey traps' * The Register - 0 views

  • "deny, disrupt, degrade and deceive" by any means possible.
  • According to reports in Der Spiegel last year, British intelligence has tapped the reservations systems of over 350 top hotels around the world for the past three years to set up Royal Concierge. It was used to spy on trade delegations, foreign diplomats, and other targets with a taste for the high life.
  • A PowerPoint presentation from 2010 states that JTRIG activities account for five per cent of GCHQ's operations budget and uses a variety of techniques. These include "call bombing" to drown out a target's ability to receive messages, attacking targets in hotels, Psyops (psychological operations) against individuals, and going all the way up to disrupting a country's critical infrastructure.
  • ...1 more annotation...
  • Targets can also be discredited with a "honey trap", whereby a fake social media profile is created, maybe backed up by a personal blog to provide credibility. This could be used to entice someone into making embarrassing confessions, which the presentation notes described as "a great option" and "very successful when it works."
  •  
    All that evil spy stuff in the hands of the government.   Big Brother is real.  Too Fin' real.
John Lemke

FBI surveillance malware in bomb threat case tests constitutional limits | Ars Technica - 0 views

  • The FBI has an elite hacker team that creates customized malware to identify or monitor high-value suspects who are adept at covering their tracks online, according to a published report.
  • as the capability to remotely activate video cameras and report users' geographic locations—is pushing the boundaries of constitutional limits on searches and seizures
  • Critics compare it to a physical search that indiscriminately seizes the entire contents of a home, rather than just those items linked to a suspected crime. Former US officials said the FBI uses the technique sparingly, in part to prevent it from being widely known.
  • ...1 more annotation...
  • "We have transitioned into a world where law enforcement is hacking into people’s computers, and we have never had public debate,” Christopher Soghoian, principal technologist for the American Civil Liberties Union, told The Washington Post, speaking of the case against Mo. "Judges are having to make up these powers as they go along."
1 - 8 of 8
Showing 20 items per page