The Present and Future of TV Surveillance
Schneier on Security
AUGUST 27, 2024
Ars Technica has a good article on what’s happening in the world of television surveillance. More than even I realized.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Schneier on Security
AUGUST 27, 2024
Ars Technica has a good article on what’s happening in the world of television surveillance. More than even I realized.
Schneier on Security
APRIL 26, 2024
Kashmir Hill has a really good article on how GM tricked its drivers into letting it spy on them—and then sold that data to insurance companies.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Schneier on Security
AUGUST 25, 2021
Vice has an article about how data brokers sell access to the Internet backbone. This is netflow data. It’s useful for cybersecurity forensics, but can also be used for things like tracing VPN activity. At a high level, netflow data creates a picture of traffic flow and volume across a network.
Schneier on Security
JULY 2, 2024
This article about an app that lets people remotely view bars to see if they’re crowded or not is filled with commentary—on both sides—about privacy and openness.
Schneier on Security
FEBRUARY 27, 2024
Lots of details in the news articles. Last week, someone posted something like 570 files, images and chat logs from a Chinese company called I-Soon. I-Soon sells hacking and espionage services to Chinese national and local government. These aren’t details about the tools or techniques, more the inner workings of the company.
Schneier on Security
JULY 15, 2019
All of this information is aggregated and synthesized in a way that gives law enforcement nearly omniscient knowledge over any suspect they decide to surveil. Read the whole article -- it has a lot of details. This seems like a commercial version of the NSA's XKEYSCORE. Boing Boing [link].
Schneier on Security
JANUARY 30, 2024
Some news articles. It finally admitted to buying bulk data on Americans from data brokers, in response to a query by Senator Weyden. This is almost certainly illegal, although the NSA maintains that it is legal until it’s told otherwise.
Schneier on Security
DECEMBER 17, 2020
Lots of details in the article. The cyberweapons arms business is immoral in many ways. This is just one of them.
Schneier on Security
MAY 24, 2024
New paper: “ Zero Progress on Zero Days: How the Last Ten Years Created the Modern Spyware Market “: Abstract: Spyware makes surveillance simple. Second, this Article applies lessons from these failures to guide regulatory efforts going forward.
Schneier on Security
APRIL 25, 2019
The image from this news article is most of what you need to know, but here's the research paper. Nice bit of adversarial machine learning.
Schneier on Security
JANUARY 10, 2020
Special Services Group, a company that sells surveillance tools to the FBI, DEA, ICE, and other US government agencies, has had its secret sales brochure published. The Tombstone Cam is our newest video concealment offering the ability to conduct remote surveillance operations from cemeteries," one section of the Black Book reads.
Schneier on Security
JUNE 28, 2024
Longtime NSA-watcher James Bamford has a long article on the reauthorization of Section 702 of the Foreign Intelligence Surveillance Act (FISA).
Schneier on Security
SEPTEMBER 4, 2019
Good article in the Washington Post on all the surveillance associated with credit card use.
Schneier on Security
JUNE 30, 2023
They indicate that the United States relied on spying powers granted under the Foreign Intelligence Surveillance Act (FISA) to gather the intercepts. Lots of details about different conversations in the article, which are based on classified documents leaked on Discord by Jack Teixeira.
Schneier on Security
MAY 21, 2019
Interesting article about how traditional nation-based spycraft is changing. Basically, the Internet makes it increasingly possible to generate a good cover story; cell phone and other electronic surveillance techniques make tracking people easier; and machine learning will make all of this automatic.
Security Affairs
OCTOBER 14, 2020
Earlier this month, German authorities have raided the offices of FinFisher, the German surveillance software firm, accused of providing its software to oppressive regimes. The company denied accusations and sued the German blog and requested the removal of the article on the case. Pierluigi Paganini.
Schneier on Security
OCTOBER 26, 2023
Interesting article about the Snowden documents, including comments from former Guardian editor Ewen MacAskill MacAskill, who shared the Pulitzer Prize for Public Service with Glenn Greenwald and Laura Poitras for their journalistic work on the Snowden files, retired from The Guardian in 2018.
Schneier on Security
SEPTEMBER 26, 2019
News articles talk about " spy trains ," and the possibility that the train cars might surreptitiously monitor their passengers' faces, movements, conversations or phone calls. Even so, these examples illustrate an important point: there's no escaping the technology of inevitable surveillance. This is a complicated topic.
Schneier on Security
JANUARY 21, 2022
News article : It’s not clear whether the security flaws were intentional or not, but the report speculated that proper encryption might interfere with some of China’s ubiquitous online surveillance tools, especially systems that allow local authorities to snoop on phones using public wireless networks or internet cafes.
Schneier on Security
MARCH 29, 2018
In the wake of the Cambridge Analytica scandal, news articles and commentators have focused on what Facebook knows about us. But for every article about Facebook's creepy stalker behavior, thousands of other companies are breathing a collective sigh of relief that it's Facebook and not them in the spotlight. A lot, it turns out.
Schneier on Security
JANUARY 28, 2020
Sometimes it's hard to tell the corporate surveillance operations from the government ones: Google reportedly has a database called Sensorvault in which it stores location data for millions of devices going back almost a decade.
Security Affairs
SEPTEMBER 16, 2024
The IT giant fears that the disclosures of its threat intelligence related to commercial spyware operations could aid NSO and other surveillance firms. ” reads The court filing referenced an article published by The Guardian article reporting that Israeli officials seized files from NSO Group’s headquarters.
Schneier on Security
MARCH 7, 2019
The article has no detail or analysis, so we don't know how well it works. But this kind of thing is surely the future of video surveillance.
Security Affairs
JULY 9, 2023
The Assemblée Nationale has approved the measure, which forms one of the articles encompassing multiple provisions. ”” reads the article published by Le Monde. ”” reads the article published by Le Monde. “People’s lives will be saved” by the law, he added.”
Security Affairs
JANUARY 17, 2025
Given that China is an authoritarian surveillance state, it is crystal clear that China doesnt offer the same level of data protection as the EU. ” reads the announcement published by noyb. .” ” reads the announcement published by noyb. said Kleanthi Sardeli, data protection lawyer atnoyb.
Security Affairs
APRIL 26, 2022
An interesting article published by The Intercept reveals the secretive business of a US surveillance firm named Anomaly Six. While Russia was invading Ukraine in February, two unknown surveillance startups, Anomaly Six and Zignal Labs joined forces to provide powerful surveillance services.
Schneier on Security
JUNE 12, 2020
This is a weird story : Hernandez was able to evade capture for so long because he used Tails, a version of Linux designed for users at high risk of surveillance and which routes all inbound and outbound connections through the open-source Tor network to anonymize it. Another article.
Malwarebytes
SEPTEMBER 24, 2021
Schools in the US have been using surveillance software to keep an eye on their students, and such software has grown significantly in popularity since the COVD-19 pandemic closed campuses nationwide. In fact, they worry that such surveillance could backfire. Source: The CDT).
Security Affairs
JULY 19, 2019
The Israeli surveillance firm NSO Group informed its clients that it is able to scoop user data by mining from major social media. The Financial Times reported that the Israeli surveillance firm NSO Group informed its clients that it is able to mine user data from major social media. SecurityAffairs – NSO Group, surveillance).
Security Affairs
FEBRUARY 6, 2022
One of the Apple iOS zero-day flaws exploited by the NSO group was also used by another surveillance firm named QuaDream. One of the vulnerabilities in Apple iOS that was previously exploited by the spyware developed by the Israeli company NSO Group was also separately used by another surveillance firm named QuaDream.
Schneier on Security
OCTOBER 28, 2020
The article goes on to talk about Juniper Networks equipment, which had the NSA-created DUAL_EC PRNG backdoor in its products. And if it’s still putting surveillance ahead of security. That backdoor was taken advantage of by an unnamed foreign adversary.
Schneier on Security
OCTOBER 27, 2021
Vice has a detailed article about how the FBI gets data from cell phone providers like AT&T, T-Mobile, and Verizon, based on a leaked (I think) 2019 139-page presentation.
SecureList
NOVEMBER 29, 2021
The victim was infected by PowerShell malware and we discovered evidence that the actor had already stolen data from the victim and had been surveilling this victim for several months. To surveil the victim, the list includes target folders as well as /Camera, /Recordings, /KakaoTalk (a renowned Korean messenger), /??(documents),
Schneier on Security
JANUARY 5, 2021
The New York Times has an in-depth article on the latest information about the SolarWinds hack (not a great name, since it’s much more far-reaching than that). Interviews with key players investigating what intelligence agencies believe to be an operation by Russia’s S.V.R.
CSO Magazine
MAY 2, 2023
The White House Office of Science and Technology Policy (OSTP) would soon be releasing a public request for information (RFI) to learn more about the automated tools employers use to surveil, monitor, evaluate, and manage workers, OSTP announced on Monday. To read this article in full, please click here
Malwarebytes
MARCH 20, 2025
Paragon Solutions is an Israeli company which sells high-end surveillance technology primarily to government clients, positioning its products as essential for combating crime and national security. The work done by CitizenLab has led to greater understanding of the global digital surveillance landscape and its implications for human rights.
CSO Magazine
AUGUST 11, 2022
To read this article in full, please click here Concerns over the use of the growing stockpile of sensitive personal data have reached a fevered pitch in the wake of the Supreme Court’s decision to overturn Roe v. Wade, which raises the specter of law enforcement weaponization of widely available digitized content against American citizens.
Schneier on Security
MAY 21, 2018
The Intercept has a long article on Japan's equivalent of the NSA: the Directorate for Signals Intelligence. The article includes some new documents from the Snowden archive. Interesting, but nothing really surprising. The directorate has a history that dates back to the 1950s; its role is to eavesdrop on communications.
The State of Security
DECEMBER 17, 2020
The post Could Universities’ Use of Surveillance Software Be Putting Students at Risk? This has, perhaps understandably, led to concerns about how well students are engaging with this way of studying. […]… Read More. appeared first on The State of Security.
Malwarebytes
FEBRUARY 22, 2022
Bosch, known more for its line of refrigerators, ovens, and dishwashers, also develops and sells an entire suite of surveillance cameras. The Intercept also reported that the operating system used on modern Bosch surveillance cameras could potentially be out of date. It shouldn’t. This is not innovation.
CSO Magazine
AUGUST 22, 2022
A class action lawsuit filed last week in the Northern District of California accused Oracle of running a “worldwide surveillance machine” and violating the fundamental privacy rights of hundreds of millions of people. To read this article in full, please click here
CSO Magazine
JULY 19, 2021
She wants to know exactly where they are, too, because such surveillance is one of the strategies Nigro has to keep her company safe. To read this article in full, please click here (Insider Story) Pam Nigro wants to know if workers at her company are working odd hours.
Security Affairs
AUGUST 11, 2018
Journalists revealed a new surveillance program that targets US citizens, the program was previously-undisclosed and code named ‘Quiet Skies’ According to the Transportation Security Administration (TSA), that has admitted the Quiet Skies , the program has monitored about 5,000 U.S. Securi ty Affairs – TSA, surveillance).
Schneier on Security
FEBRUARY 13, 2021
That included an FBI counterintelligence investigation that began around 2012, when agents started monitoring the communications of a small group of Supermicro workers, using warrants obtained under the Foreign Intelligence Surveillance Act , or FISA, according to five of the officials.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content