Jump to content

Replying to Surveillance and Misinformation!

Post Options

  or Cancel

Topic Summary

Posted 24 July 2018 - 03:42 PM



Posted 24 July 2018 - 03:12 PM

I see what you did there...

I can see you in the morning when you go to school
Don't forget your books, you know you've got to learn the golden rule,
Teacher tells you stop your play and get on with your work
And be like Johnnie-too-good, well don't you know he never shirks
He's coming along

After school is over you're playing in the park
Don't be out too late, don't let it get too dark
They tell you not to hang around and learn what life's about
And grow up just like them, won't you let it work it out
And you're full of doubt

Don't do this and don't do that
What are they trying to do?
Make a good boy of you
Do they know where it's at?
Don't criticize, they're old and wise
Do as they tell you to
Don't want…







Posted 24 July 2018 - 03:07 PM


Remember the Panopticon?
Academics of a certain age will remember when you couldn’t take a seminar without hearing about Foucault and the Panopticon. The panopticon was Jeremy Bentham’s design, intended for a prison. 
Although Foucault liked to discuss what he called the “capillaries of power,” the panopticon was still an easily located, centralized thing. It was a tool of a single central authority. The jail would deploy surveillance to control the inmates. You knew who was in charge of the tower, even if you didn’t know if it was being used at any given time
In the age of camera phones, though, you don’t know who’s doing the watching. Lenses are everywhere, rather than in the middle, and control has been, well, decentered. In the age of social media, someone in the back row can isolate a single statement -- heard correctly or incorrectly -- and loose it upon a world with multiple and conflicting agendas.
But awareness of the possibility of that kind of surveillance also rewards a certain blandness, grounded in a warranted paranoia. If you don’t know when you’re being watched, you start to watch yourself. Error avoidance can easily become risk avoidance.  From there, it’s a short step to stagnation and decline. Innovation is messy. We need some tolerance for messiness if we want it to thrive. Candor is sometimes awkward and halting; subjecting it to too much scrutiny at an early stage can kill it.  If every decision is premised on “how would this look if…,” we’ll die of caution. That’s not an inspiring way to go.




I see a similar design here...








Forms of biometrics
Iris recognition
Facial recognition
Voice recognition
Gait recognition
DNA analysis
Fingerprint Recognition
Fingerprint recognition refers to the automated method of identifying or confirming the identity of an individual based on the comparisson of two fingerprints. Fingerprint recognition is one of the most well known biometrics, and it is by far the most used biometric solution for authentication on computerized systems. The reasons for fingerprint recognition being so popular are the ease of acquisition, established use and acceptance when compared to other biometrics, and the fact that there are numerous (ten) sources of this biometric on each individual.
Iris Recognition vs. Retina Scanning – What are the Differences?
In biometrics, iris and retinal scanning are known as “ocular-based” identification technologies, meaning they rely on unique physiological characteristics of the eye to identify an individual. Even though they both share part of the eye for identification purposes, these biometric modalities are quite different in how they work. Let’s take a closer look at both and then explain the similarities and differences in detail:
Facial recognition: is the technology taking away your identity?
Facial recognition technology is being used by companies such as Tesco, Google and Facebook, and it has huge potential for security. Concerned? It may be too late to opt out…
And while facial recognition algorithms may be neutral themselves, the databases they are tied to are anything but. Whether a database concerns criminal suspects or first-class travellers, they are still designed to sort us into categorisable groups.
"These databases are what define our social mobility and our ability to move through the world," says Gates. "Individual identification is always tied to social classification. It's always there for some specific purpose, and that's usually to determine someone's level of access or privilege. The ethical questions in facial recognition relate to those social hierarchies and how they're established."
Biometric identification that goes beyond fingerprints
Ready for ID by body odor? Or the butt scan?
Neither are we. But in the brave new world of the biometric revolution, biomarkers like scent and derrière shape could open doors — literally. Or start your car. Or let you vote.
This is not the distant future. Around the world, governments are rolling out massive biometric identification programs. Smartphone makers are acquiring all sorts of Minority Report-ish techologies. And for scientists, the race is on to find new, workable biomarkers, which go away beyond the iris scans and fingerprints we have now.
Think recognition by gait, electrocardiogram, palm vein — and, yes, eau de you and tush shape, too.
The Fear That Has 1,000 Eyes 





Trending on Fooooooox



Posted 19 July 2018 - 06:42 PM


So What Is Social Engineering?
Wondering what is social engineering? It’s a term that covers a variety of social engineering attacks — each of which you’ll read about below — that are geared towards attacking humans or a group of humans in order to obtain information or data for malicious use. Keep reading to learn more social engineering examples…
What is a Social Engineering Attack?
A social engineering attack is an orchestrated campaign against employees at either a variety of companies or one high valued business using a variety of digital, in-person or over the phone techniques to steal intellectual property, credentials or money.
Aren’t There More Efficient Ways than Social Engineering?
Hackers prefer social engineering because it’s much easier to hack a human than a business. Social engineering attacks allow the hacker to combine multiple efforts and even cover their tracks, because they can use the human to take money or install malware under their persona.
According to Nick Espinosa, CIO at BSSi2 where they do white hat hacking for their clients, “a [social engineering target] can either get [the hacker] access to the network by the [target] validating their malicious software or by actually having the person do the work for them.”
This problem is growing and our goal is to arm you against these attacks. With this list of social engineering attacks, you can educate your users and help them avoid falling for the insanely easy social engineering attacks that result in major security breaches. We’ve also included some ethical hacking ideas so you can test your users.
1. Pretexting
2. Blackmail
3. Phishing
4. The Friendly Hacker
5. Vendor Scams for API Keys
6. Typosquatting
7. Device Leave Behind
8. Malware Piggyback
9. Social Media Based Phishing
10. Neuro-Linguistic Programming (NLP)
11. Classic Piggyback
12. The Cable Guy
13. Reverse Social Engineering
14. Rogue Employee
15. Open Access
16. Six Degrees of Separation
17. Bar Hopping
18. Cause a Panic and Take Advantage
19. Anger
20. Whale Hunting
21. Election Season
22. Vishing
23. Vendor Scams for Wire Transfers




Posted 27 April 2018 - 06:29 PM

Don't forget about all the pipes and wires...



Posted 20 March 2018 - 02:07 AM


Defensive architecture is an option. It can be weaponized as well. Imagine a school shaped like this: 
Only the 'cell' space would be classroom size.
A large open space contains this form:
Expand the idea further and take a look at a community:
Would you feel safe having your children learn in this environment?




Posted 12 March 2018 - 02:46 PM

The next stop on the road to revolution is ambient intelligence


Digital technologies now surround us, with many people having multiple devices for business and personal use. When combined with the Internet of Things and its assortment of embedded sensors and connected devices in the home, the enterprise and the world at large, we will have created a digital intelligence network that transcends all that has gone before. Some have referred to this as a “third wave” of computing, where technology gains the ability to sense, predict and respond to our needs and is being integrated into our natural behaviors.

Ambient is generally defined as “surrounding on all sides.” Ambient intelligence is born of digital interconnectedness to produce information and services that enhance our lives. This is enabled by the dynamic combination of mobile computing platforms, the cloud and big data, neural networks and deep learning using graphics processing units (GPUs) to produce artificial intelligence (AI).

An example travel scenario set 10-15 years into the future outlined in Information Week describes arriving in San Francisco. Upon exiting the plane, a traveler will get a message that says, “Welcome to San Francisco. Please go to the curb after picking up your bag.” When at the curb, a self-driving car will meet them and, once inside, advise that the destination is the Marriott hotel.

A recent story notes that computing is on its way to becoming a sea of background data processing that bears little or no relation to the familiar world of PCs and servers. “We will talk, and the world will answer.” We have more than a hint of this with current implementations of Siri, Cortana and Echo. Using natural language processing and AI, these devices understand what we are asking and supply us with useful information.

Much of AI is built upon the voluminous amount of data — so-called big data — being collected through search, apps and the Internet of Things. These data provide the opportunity for neural networks to learn what people do, how they respond and their interests, providing the basis for deep learning-derived personalized information and services based on increasingly educated guesses within any given context.

In Shots of Awe, philosopher and technologist Jason Silva says AI is simply the outsourcing of cognition to machines, amplifying the most powerful force in the universe, which is intelligence. He adds there’s no reason to fear this, it’s just evolution.

What is clear is that our AI-powered assistants will increasingly manage our digital activities and address increasingly complex questions and situations. We don’t know what devices are coming, whether lapel pins, augmented reality visors or something else, but we know they’re coming. We are fully within the rainbow of digitally driven change. Will these make life better or somehow easier? We will definitely be more guided by the technology, relegating mundane tasks to ambient intelligence.


Posted 11 March 2018 - 02:39 PM

An interesting graphic mapping the movements inside a home:



Posted 08 March 2018 - 06:20 PM

FBI Has Been Paying Geek Squad To Spy On Customers For Over A Decade
For over a decade, the FBI had been paying employees of Best Buy's Geek Squad to pass on information about illegal materials on customer devices sent in for repair, according to records obtained through the Freedom of Information lawsuit filed last year. 
Records posted Tuesday by the Electronic Frontier Foundation reveal that federal agents from the FBI's Louisville division had been paying Geek Squad informants for information that might kick off investigations related to their "Computer Intrusion and Cyber Crime" program, according to the documents. 
The documents released to EFF show that Best Buy officials have enjoyed a particularly close relationship with the agency for at least 10 years. For example, an FBI memo from September 2008 details how Best Buy hosted a meeting of the agency’s “Cyber Working Group” at the company’s Kentucky repair facility.
After several years of coordinating efforts, the FBI developed a process for following up on Geek Squad leads. After an employee had identified material thought to be illegal, the FBI would show up, review the suspected content, seize the computer or hard drive, and send it to another FBI field office close to where the owner of the device lived. From that point, field agents would then investigate further, and in some cases, attempt to obtain a warrant to search the device (after the device had been searched). 
Some of these reports indicate that the FBI treated Geek Squad employees as informants, identifying them as “CHS,” which is shorthand for confidential human sources. In other cases, the FBI identifies the initial calls as coming from Best Buy employees, raising questions as to whether certain employees had different relationships with the FBI.
In the case of the investigation into Rettenmaier’s computers, the documents released to EFF do not appear to have been made public in that prosecution. These raise additional questions about the level of cooperation between the company and law enforcement. -EFF

Posted 15 February 2018 - 06:08 PM

The School As A Panopticon? 
One of the angles being fore fronted appears to make it a case of private schools. Parents are complaining that private schools fleece money and don’t provide adequate safety and services. While this could be true or false, none of these schools forced the parents to get their children admitted there. They could have opted for nearby government school but they don’t. Why? Because ‘educational standard’ of these government schools are not good, they may say. But how did they know that? Parents in general have scanty idea of what constitutes ‘educational standards’ beyond board results. Schools are simply status symbol for the middle class. They opt for such ‘high class’ schools not because they have any clear evidence of the quality of education or other services they provide. They get their child admitted by any means just going by the name, fame, building and the ‘status’ of school. In such a case, complaining about them is like a drunkard diagnosed with liver cirrhosis blaming the nearby wine shop.
The Central Board of Secondary Education (CBSE) is India’s largest education board, has issued an advisory about safety and security in schools on September 12. The circular has asked schools to carry out a security audit and report back on its website within two months. Interestingly, a similar circular was issued on 23rd February, 2017 focusing on ‘Safety of school children in the school bus’. The February circular fixed the responsibility on the school management in following CBSE guidelines, adhering to by-laws and other circulars issued by them from time to time. The February circular also exhorts parents and says, ‘parents are equally responsible for the safety of their children during school journeys’. One wonders if the responsibilities of a body like CBSE ends by issuing such circulars and advisories and fix responsibilities for others? Don’t regulatory bodies have mechanisms of regular checking or inspections to ensure that those who don’t comply with such norms may be punished? Or else it is like police pasting the IPC regulation for theft or other crimes in each mohalla telling them about the provision of punishment and fixing everyone to be responsible for their own safety and rest in peace!
The CBSE directive had asked the schools to install CCTV cameras at all vulnerable points within the school premises and ensure that the cameras are functional. It is important to note that the bathroom where the child was killed had the CCTV installed, albeit it was not working. But who will look into all the CCTV camera feed all the time? What will happen to the huge amount of data generated every day? Who will decide which are vulnerable areas? Is a classroom vulnerable? Some say each of the classes too will have CCTV cameras. This will transform the school into a space of indiscriminate surveillance and tracking where everyone is seen as a potential criminal. It will no longer remain a school but a dragnet. Christopher Slobogin, a Vanderbilt University law professor, argues that surveillance dragnets are inherently unfair. By definition, they capture the innocent and the guilty indiscriminately. In doing so, they create a culture of fear. Schools, thus, will become a prototype of ‘Panopticon’, a prison design proposed by Jeremy Bentham in 1787 and popularized by Michel Foucault where inmates would be living under ‘ever anxious awareness of being observed’. Is that what we want our schools to be?

Review the complete topic (launches new window)

IPB Skin By Virteq