Security News
Mass surveillance fundamentally changed the nature of surveillance. Because all the data is saved, mass surveillance allows people to conduct surveillance backward in time, and without even knowing whom specifically you want to target.
According to the letter, a surveillance program now known as Data Analytical Services has for more than a decade allowed federal, state, and local law enforcement agencies to mine the details of Americans' calls, analyzing the phone records of countless people who are not suspected of any crime, including victims. Using a technique known as chain analysis, the program targets not only those in direct phone contact with a criminal suspect but anyone with whom those individuals have been in contact as well.
Generative AI is going to be a powerful tool for data analysis and summarization. Here's an example of it being used for sentiment analysis.
Australian retailers are rolling out mass surveillance solutions to combat shoplifting, but a poor regulatory environment could mean high risks associated with data security and privacy. "Once you start using CCTV or any sort of imaging, they've got the raw data from which various biometric mechanisms might be applied," said Chair of the Australian Privacy Foundation David Vaile.
About Bruce Schneier I am a public-interest technologist, working at the intersection of security, technology, and people. I've been writing about security issues on my blog since 2004, and in my monthly newsletter since 1998.
Successful camera surveillance deployments require a delicate interplay between the security cameras, sensors and other hardware, the video management system, and the network itself. Surveillance installations tend to grow over time, and as the number of cameras increases, the bandwidth limit of the network is reached.
Typically, Automatic License Plate Recognition technology is used to search for plates linked to specific crimes. In this case it was used to examine the driving patterns of anyone passing one of Westchester County's 480 cameras over a two-year period.
The overarching mission of the US-based non-profit organization the Tor Project is to advance human rights and make open-source, privacy preserving software available to people globally, so that they can browse the internet privately, protect themselves against surveillance and bypass online censorship. To infosec professionals The Tor Project doesn't need an introduction, but there's always other people out there who have never heard of it.
Apple has warned that it would rather stop offering iMessage and FaceTime services in the U.K. than bowing down to government pressure in response to new proposals that seek to expand digital surveillance powers available to state intelligence agencies. Specifically, the Online Safety Bill requires companies to install technology to scan for child sex exploitation and abuse material and terrorism content in encrypted messaging apps and other services.
DUCK. Yes, the usual large number of bugs fixed. Although Elevation of Privilege usually gets looked down on as lesser than Remote Code Execution, where crooks use the bug to break in in the first place, the problem with EoP has to do with crooks who are already "Loitering with intent" in your network.