cj.myfreeforum.org Forum Index cj.myfreeforum.org
NEWS, prophecy, dreams, ZionsCRY, Bible, teaching, visions
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   Join! (free) Join! (free)
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

Total surveillance society becoming reality
Page Previous  1, 2, 3, 4, 5  Next
Post new topic   Reply to topic    cj.myfreeforum.org Forum Index -> Conspiracy, Terrorism
View previous topic :: View next topic  
Author Message

Joined: 12 Dec 2009
Posts: 17167

PostPosted: Thu Sep 05, 2013 8:59 am    Post subject:  Reply with quote

Google argues for right to continue scanning Gmail

Google's attorneys say their long-running practice of electronically scanning the contents of people's Gmail accounts to help sell ads is legal, and are asking a federal judge to dismiss a lawsuit that seeks to stop the practice.

In court records filed in advance of a federal hearing scheduled for Thursday in San Jose, Google argues that "all users of email must necessarily expect that their emails will be subject to automated processing."

The class action lawsuit, filed in May, says Google "unlawfully opens up, reads, and acquires the content of people's private email messages" in violation of California's privacy laws and federal wiretapping statutes. The lawsuit notes that the company even scans messages sent to any of the 425 million active Gmail users from non-Gmail users who never agreed to the company's terms.

Google has repeatedly described how it targets its advertising based on words that show up in Gmail messages. For example, the company says if someone has received a lot of messages about photography or cameras then it might display an advertisement from a local camera store. Google says the process is fully automated, "and no humans read your email..."

"This case involves Plaintiffs' effort to criminalize ordinary business practices that have been part of Google's free Gmail service since it was introduced nearly a decade ago," argue company attorneys in their motion to dismiss the case.

Privacy advocates have long questioned the practice.

"People believe, for better or worse, that their email is private correspondence, not subject to the eyes of a $180 billion corporation and its whims," said Consumer Watchdog president Jamie Court.

Back to top
View user's profile Send private message

Joined: 12 Dec 2009
Posts: 17167

PostPosted: Thu Sep 05, 2013 9:17 am    Post subject: Reply with quote

'Environmental Crimes': EPA sends SWAT team to Alaskan mine to check water quality...

'Wearing body armor and jackets emblazoned with POLICE'...

Gold miners near Chicken cry foul over 'heavy-handed' EPA raids


When agents with the Alaska Environmental Crimes Task Force surged out of the wilderness around the remote community of Chicken wearing body armor and jackets emblazoned with POLICE in big, bold letters, local placer miners didn’t quite know what to think.

Did it really take eight armed men and a squad-size display of paramilitary force to check for dirty water? Some of the miners, who run small businesses, say they felt intimidated.

Others wonder if the actions of the agents put everyone at risk. When your family business involves collecting gold far from nowhere, unusual behavior can be taken as a sign someone might be trying to stage a robbery. How is a remote placer miner to know the people in the jackets saying POLICE really are police?

Miners suggest it might have been better all around if officials had just shown up at the door -- as they used to do -- and said they wanted to check the water.

rest: http://www.alaskadispatch.com/art...-foul-over-heavy-handed-epa-raids
Back to top
View user's profile Send private message

Joined: 12 Dec 2009
Posts: 17167

PostPosted: Wed Sep 11, 2013 11:14 am    Post subject: Reply with quote

Google security exec: 'Passwords are dead'

Speaking at TechCrunch Disrupt, Google's Heather Adkins says startups should look beyond passwords to secure users and their data.


New startups looking for ways to keep their users secure should know one thing, a top Google security executive said Tuesday: "Passwords are dead."

Speaking on a TechCrunch Disrupt panel called "Spies Like Us," Heather Adkins, Google's manager of information security, told moderator Greg Ferenstein that in the future, the "game is over for" any startup that relies on passwords as its chief method to secure users and their data.

Google manager of information security Heather Adkins.

Adkins, speaking alongside Kleiner Perkins Caufield & Byers managing partner Ted Schlein and author James Bamford, said that looking ahead, "our relationship with passwords are done," and that "passwords are done at Google."

She talked briefly about Google's use of two-step authentication and the fact that the search giant has been working to innovate in the area of non-standard password security. As a result, she said, any startup that still relies on standard passwords needs to ensure that it has an abuse team set up to deal "with customers getting compromised."

Although Adkins didn't offer any real specifics on how Google will innovate beyond today's security, she did say the company is experimenting with hardware-based tokens as well as a Motorola-created system that authenticates users by having them touch a device to something embedded, or held, in their own clothing. "A hacker can't steal that from you," she said.

Later in the conversation, which also touched on the NSA scandal, cybersecurity, and the weaponization of offensive cyber technologies, Adkins pointed out that hackers intent on making money from their bad acts had consistently found ways to exploit Google users who had yet to turn on two-factor authentication. Essentially, she explained, hackers were able to get into such users' accounts, turn on two-factor authentication themselves, and lock the users out before utilizing those accounts to send spam. "They are finding new ways to make money off it," she said. "Ways we hadn't anticipated."

Finally, Adkins argued, technology companies need to step up and build products that protect users so "they don't rely on not getting fooled." Ultimately, she said, anyone starting a new technology company should be sure that one person is designated to focus on security and privacy, and that one of the first 25 employees should work full time on security and privacy.

Back to top
View user's profile Send private message

Joined: 12 Dec 2009
Posts: 17167

PostPosted: Fri Sep 13, 2013 1:04 pm    Post subject: Reply with quote

New iPhone Touch ID Makes Fingerprint Scans Easy

"The latest iPhone has arrived, and along with it what may be the slickest integration of biometric security yet: A fingerprint scanner built seamlessly into the phone’s home button. But privacy-conscious users would be wise to think twice. Better to use your fingerprint as another layer of protection than as a replacement for old-fashioned passwords and passcodes.

In Apple’s iPhone 5S launch event Tuesday, the company’s vice president of marketing Phil Schiller introduced its first-ever fingerprint scanner, which it’s calling Touch ID, a feature that appears only as a thin ring of metal around the iPhone’s single front-facing button. According to Apple’s descriptions, the 170-micron thin scanning sensor sits under a laser-cut sapphire crystal and is surrounded by the steel detection ring, which can capture 550 pixels per inch of resolution in a user’s fingerprint.

“We have so much of our personal life on these devices…and they’re with us everywhere we have to go,” Schiller told the keynote’s audience, noting that only half of iPhone users set up lockscreen passcodes on their devices. “We have to protect them.” And Touch ID’s authentication, it seems, can be used to replace more than just the initial passcode lock on an iPhone. In his talk, Schiller also mentioned that it can be used to buy items in Apple’s App Store, implying that it can also replace full passwords.

But if Apple intends to offer Touch ID as an alternative to the traditional password, those of us with sensitive personal, corporate or government data at stake may want to wait, given the security industry’s less-than-perfect record when it comes to preventing spoofed fingerprints from **** its biometric protections, argues Brent Kennedy, a vulnerability analyst with the government-run U.S. Computer Emergency and Readiness Team who researched biometrics as a graduate student.

“If the fingerprint reader tests well, it may be more secure than a four-digit pin. But I’d caution right away, let’s see how it tests and what people come up with to break it,” says Kennedy. “I wouldn’t rely on it solely, just as I wouldn’t with any new technology right off the bat.”

A stolen phone, after all, is usually covered with its owner’s fingerprints, making the job of any would-be cracker much easier. Researchers have found plenty of methods for using lifted fingerprints to defeat commercial fingerprint readers before. One group at the University of West Virginia used sculpted Play-Doh and, in another experiment, cadaver fingerprints in 2002 to trick a variety of optical and conductivity-based sensors. A Japanese researcher copied fingers in gummy-worm like gelatin to fool the sensors of more than ten commercial products. And one episode of the Mythbusters television show demonstrated that fingerprint readers could be bypassed by licking a piece of latex with a copied print, or even just showing a print-out of the swirl to the scanner on paper.

Fingerprint reader technology has improved since many of those tests to incorporate anti-spoofing technologies that test for heat and even the patterns of sweat from a user’s pores, according to Reza Derakshani, a professor of computer science at the University of Missouri who built some of the first so-called “liveness” tests to disqualify spoofed fingers. “If you look at a finger’s active pores to see how the perspiration oozes and spreads along ridges, you can see patterns,” he says. “You can still spoof biometrics, but only naive ones. A good liveness check thwarts some if not all spoof attacks.”

In Tuesday’s presentation, Schiller boasted that Touch ID’s test includes somehow sensing “sub-epidermal skin layers.” But whether Apple’s detection ring includes enough of Derakshani’s “liveness” tests to rule out advanced spoofing won’t be clear until the product hits the market and is subjected to public security research’s experimentation.

One bright note for the privacy-conscious is that Touch ID doesn’t seem to transmit a user’s fingerprint to the cloud, but rather keeps that data restricted to the device itself. That measure may allay fears that Apple is somehow collecting a database of biometric data that could be accessed by the government or rogue hackers.

If it’s possible–and popular–for iPhone users to institute both a passcode and a fingerprint as security measures for their phone, Touch ID may be a good thing for overall user security, says US-CERT’s Kennedy. So-called two-factor authentication, after all, has become a popular method used by Google, Twitter, and others to bolster typical passwords protections, usually by sending a one-time code to a user’s phone so that only a hacker who has also stolen their phone can break into an online account. But a biometric factor may work just as well as a second device for that second safeguard.

“Two factor authentication usually uses something you know and something you have–in this case, it’s something you are,” says Kennedy. “If [Apple] allows you to use both, that’s the best of both worlds.”

Back to top
View user's profile Send private message

Joined: 12 Dec 2009
Posts: 17167

PostPosted: Mon Sep 16, 2013 9:04 pm    Post subject: Reply with quote

Say goodbye to the password

Technology companies are developing alternatives, including built-in fingerprint readers, voice recognition and authentication tokens.

Here's the fundamental problem with passwords: They are most effective in protecting a company when they are long, complicated and changed frequently. In other words, when employees are least likely to remember them.

As a result, technology companies are rushing to provide solutions that are both more secure and more convenient. Many laptops now come with built-in fingerprint readers. Smartphones and other devices, too, are opening up biometric options such as facial and voice recognition.

Apple (AAPL -3.18%) last year acquired AuthenTec, a developer of fingerprint-sensor technology, and on Sept. 10 it said its new iPhone will come with a fingerprint sensor. Microsoft (MSFT -0.69%) says its Windows 8.1 operating system, due out next month, is "optimized for fingerprint-based biometrics." Biometric authentication will be usable more extensively within the system, the company says.  (Microsoft owns MSN Money.)

Google (GOOG -0.15%), PayPal, Lenovo Group (LNVGF +1.94%) and others, meanwhile, have come together in an organization known as the FIDO (Fast Identity Online) Alliance, which is aimed at creating industry standards for biometric and other forms of so-called strong authentication.

A new kind of hardware token

Google is also experimenting with a new kind of hardware token, created by Palo Alto, Calif.-based Yubico. Like the traditional hardware tokens that generate random numeric passwords and which companies have used for years, the Yubico devices generate temporary passwords to be used as a second form of authentication.

But instead of having to read the password off the token and retype it, employees can simply plug the token into a USB port or touch it on a mobile device using near-field communication, a technology through which electronic devices communicate by making physical contact.

Google is testing the tokens with employees this year, and plans to offer them to consumers next year as a way of logging into Gmail and other Google accounts more securely.

Mayank Upadhyay, a director of security engineering at Google, says the tokens are easy to use and have strong encryption.

"We believe that by using this token we've raised the standard of security for our employees beyond what was commercially available," he says. The token works with Google's Web browser Chrome, and "works very seamlessly for people in their day-to-day workflow here at Google," he says.

Bringing smartphones to work

Another new option, from RSA, the security division of EMC (EMC +0.15%) and creator of the widely used SecurID hardware tokens, is risk-based authentication.

This technology sifts through masses of user data from various groups at a company to establish "normal" behavior, then assigns risk scores to each user. If an employee does something unusual, like log in from a new location, use a different computer, or try to access a system other than his or her usual, the risk score will increase, and the employee may be asked to provide additional authentication, for example by verifying his or her identity over the phone.

Many people expect the security landscape to change rapidly as more and more employees bring their own smartphones and other devices to work. While the proliferation of individual devices is often seen as a security threat, some analysts suggest that mobile devices can improve security by making it easier to use biometric authentication. Most mobile devices feature a microphone and camera, and can pinpoint an employee's location as well.

Use  your brainwaves

Other developers of groundbreaking security tools include Agnitio of Madrid, which makes voice-recognition software used in law enforcement. The company has developed a system that allows workers to log in by speaking a simple phrase.

"We think that biometric authentication is going to be significantly more popular, and the driver and enabler of this is mobile computing," says Ant Allan, research vice president at Gartner.

He explains that for large enterprises, installing new hardware for each employee can be very expensive, thus a system that draws on commonly owned personal devices has clear economic advantages. Moreover, employees with mobile devices are likely to find a fingerprint reader much easier to use than remembering and typing passwords.

London-based PixelPin, meanwhile, wants to replace passwords with pictures. Choose a picture of your spouse, for example, and log in by clicking on four parts of her face in a sequence you've memorized. A photo is easier for people to remember than a text password, and harder for others to replicate, says company co-founder Geoff Anderson.

And, looking further into the future, researchers at the University of California, Berkeley, are studying the use of brain waves as authentication. Test subjects in the research wore a headset that measured their brain-wave signals as they imagined performing a particular task, and the researchers were able to distinguish between different people with 99% accuracy. In theory, an imagined task like this could become a worker's "passthought."

Most experts expect companies to use a variety of different measures. Saratoga Hospital, in Saratoga Springs, N.Y., for example, uses fingerprint readers as a more secure alternative to passwords. But while they've solved many of the hospital's security problems, the print readers don't work for everyone. A few elderly volunteer workers struggle to hold their hand still, and the readers don't work when people are wearing gloves, or when their hands are too dry, says Gary Moon, security analyst at the hospital. Some employees also have refused to hand over their prints.

As a result, Moon says, the hospital is still using passwords as a backup security system.

"There really isn't any 'one size fits all' in authentication," says Vance Bjorn, founder of DigitalPersona. in Redwood City, Calif., which supplied the fingerprint readers to Saratoga Hospital. Companies need access to a combination of different technologies, Bjorn says.

"One technology solves certain problems, but it might not be the right mix of security, convenience, cost and ease of deployment for everyone."
Back to top
View user's profile Send private message

Joined: 12 Dec 2009
Posts: 17167

PostPosted: Sat Sep 28, 2013 12:53 pm    Post subject: Reply with quote

N.S.A. Examines Social Networks of U.S. Citizens

Since 2010, the National Security Agency has been exploiting its huge collections of data to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, according to newly disclosed documents and interviews with officials.

The spy agency began allowing the analysis of phone call and e-mail logs in November 2010 to examine Americans’ networks of associations for foreign intelligence purposes after N.S.A. officials lifted restrictions on the practice, according to documents provided by Edward J. Snowden, the former N.S.A. contractor.

The policy shift was intended to help the agency “discover and track” connections between intelligence targets overseas and people in the United States, according to an N.S.A. memorandum from January 2011. The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. Because of concerns about infringing on the privacy of American citizens, the computer analysis of such data had previously been permitted only for foreigners.

The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners.

rest 3 pages: http://www.nytimes.com/2013/09/29...itizens.html?ref=us&_r=1&
Back to top
View user's profile Send private message

Joined: 12 Dec 2009
Posts: 17167

PostPosted: Wed Mar 26, 2014 8:19 pm    Post subject: Reply with quote

Millennials Are Ditching Their Television Sets, Shifting To Mobile To Watch TV Shows

A new report suggests bigger isn’t better, when it comes to watching television programming. Deloitte found that Millennials rather watch movies and television shows on computers, smartphones, and tablets. These details were recently published in the firm’s annual Digital Democracy Survey.

Those between the ages of 14 and 24 only watch TV shows on an actual television set 44 percent of the time. Thirty-two percent of the time, TV shows are consumed on a desktop or laptop. Smartphones and tablets make up another 16 percent, while gaming devices are used 8 percent.

This is the first time computers, smartphones, and tablets have eclipsed televisions for any segment of the population, according to Gerald Belson, vice chairman of the firm’s U.S. media and entertainment practice, who spoke to Re/Code.

Not surprisingly, television use increases, the older the age group.

Those aged 25-30, for example, watch TV shows on a television set 53 percent of the time. This compares to 70 percent for Generation Xers (aged 31-47), 88 percent for Baby Boomers (aged 48-66), and 92 percent for those aged 67 and older.

Belson notes “The fact that we have some demographics watching television, but not on TV, is significant.”

As Re/Code concludes:

This shift has profound implications for networks, and Nielsen, which are working find ways to measure TV viewing across multiple screens. Nielsen announced plans to begin incorporating mobile into its traditional ratings with the 2014-15 season.

Personally, I’m not surprised by these findings. People are more mobile than ever before, and this survey reflects this reality.

Which devices do you use to watch TV shows and movies?
Back to top
View user's profile Send private message

Joined: 12 Dec 2009
Posts: 17167

PostPosted: Thu Aug 07, 2014 11:20 pm    Post subject: Reply with quote

NFL to Use Tracking Chips on Players

As a hardcore baseball guy, I often wonder why people needlessly waste their time on all those other, lesser sports. But I suppose everyone has a right to their insane opinions.

In any case, football fans may want to keep an eye on this development: The NFL announced this week that it will be using RFID tracking chips on players during select games in the 2014 season. The high-tech chips — RFID stands for radio-frequency identification — will generate precise positioning data on each player on every play.

Football Uniforms Throughout History

For the initial rollout, the RFID system will be used in 17 of the NFL’s 31 stadiums. (Astute sports fans will note that the NFL has 32 teams, but the Giants and the Jets share the MetLife Stadium in New Jersey.) When squaring off in these stadiums, players will actually be tracked by two RFID chips — one in each shoulder pad. Data is broadcast in real-time to provide information on positioning, velocity, direction, distance run and even force-of-impact.

All of that data is instantly analyzed by the NFL’s MotionWorks system, which then generates statistics for every play. The data can also be instantly incorporated into the visual elements of the TV broadcast. In fact, the MotionWorks system crunches the numbers so quickly that graphics can be added within the broadcast’s standard two-second delay.

Should Kids Play Football?

The upshot of all this is that viewers — not to mention coaches and team executives — will be able to track every players’ movement in the often chaotic scrum of the typical NFL football game. When a blocking assignment is missed or a receiver is suddenly wide open in the end zone, fans will know precisely which player screwed up, and when and where.

The system will also generate an entire new field of statistics for fans to obsess over. In fact, the MotionWorks system is part of a larger initiative the NFL is calling “Next Generation Statistics.” The stadiums participating in the 2014 program: Atlanta, Baltimore, Carolina, Chicago, Cincinnati, Denver, Detroit, Green Bay, Houston, Jacksonville, Miami, New England, New Orleans, Oakland, San Francisco, St. Louis and Washington.
Back to top
View user's profile Send private message

Joined: 12 Dec 2009
Posts: 17167

PostPosted: Thu Aug 14, 2014 6:43 pm    Post subject: Reply with quote

How the FBI nabbed a 14-year fugitive and juggling star almost by accident

Even the best show-biz acts eventually come to an end.

Neil Stammer, a star in the juggling world and a suspected child molester, has been captured by the FBI in Nepal after 14 years on the run.

Authorities in Albuquerque, New Mexico, say Stammer, who owned Rob’s Magic and Juggling Shop, skipped town in 2000 after police charged him with the kidnap and rape of a 12-year-old boy.

The FBI tried to find Stammer, now 47, but feared that the fugitive — who had traveled extensively and spoke dozens of languages — had fled the country.

In his teens and 20s, Stammer, who was born Andrew J. Allen but later changed his name, performed at nightclubs and on cruises ships, juggling for money in more than 30 countries.

“Given his overseas travel experience and his language skills, the juggler could have been hiding anywhere in the world,” the FBI acknowledged this week in a press release.

Without many leads, the case went cold.

Fast-forward to 2014, and the FBI got their guy — pretty much by accident.

In January, Special Agent Russ Wilson, recently assigned to the Albuquerque FBI division, decided to crack open Stammer's case again, because he was intrigued by the unique suspect. A new "wanted" poster was issued and distributed.

Then, in June, a special agent with the State Department was testing new facial recognition software for passport fraud investigations. The agent needed samples and used photos from FBI "wanted" posters.

Voilà — Stammer’s face matched a person whose passport photo carried a different name.

The agent contacted the bureau, and the tip soon led investigators to Nepal, where Stammer was living under the name Kevin Hodges "and regularly visiting the U.S. Embassy there to renew his tourist visa," the FBI said.

“He was very comfortable in Nepal,” FBI special agent Russ Wilson said in the release. “My impression was that he never thought he would be discovered.” Stammer had been living in Nepal for years, teaching English and other languages to students hoping to gain entrance into U.S. universities."

The fugitive juggler — who once performed at the esteemed Kennedy Center in Washington, D.C. — was extradited from Nepal to New Mexico.

In July, Stammer pleaded not guilty to charges of rape, kidnapping, witness intimidation, and criminal sexual contact of a minor stemming from an incident in which Stammer allegedly took the 12-year-old boy to his apartment and raped him. Bernalillo County District Attorney Kari Brandenburg told the Albuquerque Journal that at least "three alleged victims have come forward" with allegations against Stammer. He's being held without bail in Bernalillo County Jail.

“The Albuquerque Police Department is grateful for the hard work and perseverance of our federal law enforcement partners and the government of Nepal in locating this extremely dangerous fugitive,” Police Chief Gorden Eden Jr. said in announcing Stammer's capture last month. “We can only hope that during his time as a fugitive that he did not commit similar terrible crimes on others.”

Back to top
View user's profile Send private message
Display posts from previous:   
Post new topic   Reply to topic    cj.myfreeforum.org Forum Index -> Conspiracy, Terrorism All times are GMT - 5 Hours
Page Previous  1, 2, 3, 4, 5  Next
Page 3 of 5

Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Card File  Gallery  Forum Archive
Powered by phpBB © 2001, 2005 phpBB Group
Create your own free forum | Buy a domain to use with your forum