Remove 2018 Remove Internet Remove Surveillance
article thumbnail

Modern Mass Surveillance: Identify, Correlate, Discriminate

Schneier on Security

These efforts are well-intentioned, but facial recognition bans are the wrong way to fight against modern surveillance. Focusing on one particular identification method misconstrues the nature of the surveillance society we're in the process of building. Ubiquitous mass surveillance is increasingly the norm.

article thumbnail

Google Responds to Warrants for “About” Searches

Schneier on Security

.” These searches are legal when conducted for the purpose of foreign surveillance, but the worry about using them domestically is that they are unconstitutionally broad. The very nature of these searches requires mass surveillance. The FBI does not conduct mass surveillance. The FBI does not conduct mass surveillance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Poland probes Pegasus spyware abuse under the PiS government

Security Affairs

According to rumors, the Polish special services are using surveillance software to spy on government opponents. In 2021, the University of Toronto-based Citizen Lab Internet reported that a Polish opposition duo was hacked with NSO spyware. The politicians who inspired and commissioned these activities belong in prison.”

Spyware 118
article thumbnail

Another California Data Privacy Law

Schneier on Security

While the proposed privacy initiative was initially met with significant opposition, particularly from large technology companies, some of that opposition faded in the wake of the Cambridge Analytica scandal and Mark Zuckerberg's April 2018 testimony before Congress. Enforcement was supposed to start this year, but we haven't seen much yet.

article thumbnail

Chinese Supply-Chain Attack on Computer Systems

Schneier on Security

That included an FBI counterintelligence investigation that began around 2012, when agents started monitoring the communications of a small group of Supermicro workers, using warrants obtained under the Foreign Intelligence Surveillance Act , or FISA, according to five of the officials. This was the result of decades of research.

article thumbnail

RedTorch Formed from Ashes of Norse Corp.

Krebs on Security

“And Norse’s much-vaunted interactive attack map was indeed some serious eye candy: It purported to track the source and destination of countless Internet attacks in near real-time, and showed what appeared to be multicolored fireballs continuously arcing across the globe.”

article thumbnail

Expert found Russia’s SORM surveillance equipment leaking user data

Security Affairs

A Russian security researcher has found that hardware wiretapping equipment composing Russia’s SORM surveillance system had been leaking user data. SORM is a mass surveillance system that allows the Government of Moscow to track online activities of single individuals thanks to the support of the Russian ISPs. Pierluigi Paganini.