Remove Government Remove Surveillance Remove Technology
article thumbnail

Ubiquitous Surveillance by ICE

Schneier on Security

Report by Georgetown’s Center on Privacy and Technology published a comprehensive report on the surprising amount of mass surveillance conducted by Immigration and Customs Enforcement (ICE).

article thumbnail

The Internet Enabled Mass Surveillance. AI Will Enable Mass Spying.

Schneier on Security

Spying and surveillance are different but related things. If I hired that same private detective to put you under surveillance, I would get a different report: where you went, whom you talked to, what you purchased, what you did. Before the internet, putting someone under surveillance was expensive and time-consuming.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Computers and Video Surveillance

Schneier on Security

It used to be that surveillance cameras were passive. Recent developments in video analytics -- fueled by artificial intelligence techniques like machine learning -- enable computers to watch and understand surveillance videos with human-like discernment. The result is a level of surveillance that was impossible just a few years ago.

article thumbnail

Modern Mass Surveillance: Identify, Correlate, Discriminate

Schneier on Security

Communities across the United States are starting to ban facial recognition technologies. Forty major music festivals pledged not to use the technology, and activists are calling for a nationwide ban. Many Democratic presidential candidates support at least a partial ban on the technology. Let's take them in turn.

article thumbnail

China-linked threat actors compromised multiple telecos and spied on a limited number of U.S. government officials

Security Affairs

government officials. telecoms, compromising networks to steal call records and access private communications, mainly of government and political figures. broadband providers, including Verizon, AT&T, and Lumen Technologies, potentially accessing systems for lawful wiretapping and other data. .” broadband providers.

article thumbnail

Policy vs Technology

Schneier on Security

Back then, he and Vermont Senator Patrick Leahy were the most knowledgeable on this issue and our biggest supporters against government backdoors. I teach cybersecurity policy and technology at the Harvard Kennedy School of Government. Technologists don't try to consider all of the use cases of a given technology.

article thumbnail

China-linked threat actors compromised multiple telecos and spied on a limited number of U.S. government officials

Security Affairs

government officials. telecoms, compromising networks to steal call records and access private communications, mainly of government and political figures. broadband providers, including Verizon, AT&T, and Lumen Technologies, potentially accessing systems for lawful wiretapping and other data. .” broadband providers.