Posts Tagged Privacy

Researchers Use WiFi Radar to Covertly Monitor the Movement of People Through Walls

via: TheIntelHub
by: Madison Ruppert
August 7, 2012

In today’s world, the seeming safety and privacy provided by four walls and a roof is quickly diminishing with microchips enabling mobile devices to see through walls, microchips allowing mobile devices to provide ultra-precise location information, the hijacking of cell phone camerasand even stealthily recording sound and other environmental information, supposedly for advertising purposes.

Of course, those examples represent just one of the many ways in which our privacy is being invaded and diminished with a vengeance in the United States today.

Now new method is being explored by researchers which could allow people to use so-called “bistatic WiFi radar” at a distance in order to covertly detect and monitor people moving behind walls.

The researchers published the findings in a paper called “Through-the-Wall Sensing of Personnel Using Passive Bistatic WiFi Radar at Standoff Distances” in IEEE Transactions on Geoscience and Remote Sensing, volume 50, Issue 4.

The emphasis appears to be the ability to detect people “uncooperatively and covertly,” something which is also becoming increasingly important in facial recognition technology and other biometric technologies.

The researchers, who are affiliated with the Department of Security and Crime Science at the University College London in the United Kingdom, have demonstrated the first successful through-the-wall (TTW) detection of moving people using passive WiFi radar.

Continue Reading At: TheIntelHub.com

Advertisements

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Leave a comment

Senate Votes Down Cybersecurity Act, Obama Likely to Sign Executive Order

via: OccupyCorporatism
by: Susanne Posel
August 6, 2012

While a compromised version of the Cybersecurity Act of 2012 was introduced to the Senate in July, the false claims of “. . . foreign governments, criminal syndicates and lone individuals are probing our financial, energy and public safety systems every day. It would be the height of irresponsibility to leave a digital backdoor wide open to our cyber adversaries” was perpetuated by President Obama.

Shawn Henry, a veteran of the cyber security division in the FBI, stated in a CBS interview that although he has no proof, Russia and China are behind infiltration and damage to computers in America, while also claiming that he feels it is “very, very likely” that a massive cyber-attack is due to occur.

According to Jay Carney, White House Press Secretary, Obama may just write an executive order to ensure his cybersecurity agenda is implemented. “In the wake of Congressional inaction and Republican stall tactics, unfortunately, we will continue to be hamstrung by outdated and inadequate statutory authorities that the legislation would have fixed. Moving forward, the President is determined to do absolutely everything we can to better protects our nation against today’s cyber threats and we will do that.”

Continue Reading At: OccupyCorporatism.com

, , , , , , , ,

Leave a comment

The federal government is spying on every single American, say NSA whistleblowers

via: NaturalNews
Saturday, August 04, 2012
By: Ethan A. Huff

[NaturalNews] Two former high-ranking officials at the U.S. National Security Agency (NSA), a federal bureaucracy that collects data and intelligence on foreign communications for national security purposes, have come forward with allegations that the NSA actively monitors Americans as well. According to testimonies from both Thomas Drake, a former NSA senior official, and Kirk Wiebe, a former NSA senior analyst, the agency actively monitors and collects intelligence on every single American as part of a massive spying operation.

RT.com first broke the story after Drake and Wiebe, on two recent but separate occasions, disclosed inside information about the NSA’s spying activities to reporters. During a recent interview with Eliot Spitzer, host of Current TV’s “Viewpoint” program, Drake explained how the 9/11 terrorist attacks were a catalyst for redefining America as a “foreign nation” in order to legitimize unwarranted surveillance of innocent Americans — and he says this backdoor spying program continues to this day.

“When you open up the Pandora’s Box of just getting access to incredible amounts of data, for people that have no reason to be put under suspicion, no reason to have done anything wrong, and just collect all that for potential future use or even current use, it opens up a real danger,” said Drake during the interview.

“And for what else could they use that data (other than for future prosecutions unrelated to terrorism or for blackmail purposes), particularly when it’s all being hidden behind the mantle of national security.”

Binney expressed similar sentiments during a recent interview with journalist Geoff Shively, according to RT.com, in which he disclosed that the federal government is basically collecting whatever data it possibly can on every single American. This is made even easier, of course, by social networking sites like Facebook, Twitter, Instagram, Foursquare, Path, and many others that actively monitor and track people’s every action.

Continue Reading At: NaturalNews.com

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Leave a comment

Central Banks Using 119 Billion Google Searches To Spy On You

via: SilverVigilante
by: SV
August 5, 2012

Central Banks are using Google data in order track economic trends before they become economic trends. But, while Bloomberg leads us to believe this has only just begun, the truth of the matter is quite different. The article puts across the feeling that Google Trends is a breakthrough in behavioral research, and that worldwide central banks are beginning to use the data in order gather information on the people who, in Bloomberg’s words, they “oversee.” But, Google is but one piece in a complex puzzle of Full Spectrum Dominance, using the diverse interplay of multiple social media interfaces and Pentagon digital-avatars of U.S. citizens predicting where individuals in the population will be and when.  And, they are confident that their formulas are accurate.

Says the article, the Federal Reserve and the central banks of England, Israel, Italy, Spain and Chile have recently embarked upon studies to determine the helpfulness of Google search volumes in the pursuit of tracing trends in the economies they “oversee,” in the language of Bloomberg News.  “The guardians” – their word, not mine  – are pursuing techniques to “deploy nimbler policy responses.” According to Bloomberg, Erik Brynjolfsson, a member of the Federal Reserve Bank of Boston’s Academic Advisory Council, believes that “greater foresight could make the difference between a slowdown and a recession, a recovery and an inflation-stoking boom.

Continue Reading At: SilverVigilante.com

, , , , , , , , , , ,

Leave a comment

Twitter Censors User for Opinion

via: TheIntelHub
August 2, 2012

While it’s obvious that most large corporations are fronts for the illumines global criminal activity, now Twitter has censored it’s user for opinion.

The Wall Street Journal reports;

The biggest brouhaha so far erupted on Monday and Tuesday, when a finger-pointing spat emerged over a journalist getting booted off Twitter after he was critical of NBC’s Olympics coverage.

The journalist was reinstated on the short-messaging service Tuesday—but not before the blogosphere lit up with criticism over whether Twitter was curtailing free speech. Twitter apologized for what it said were its missteps in the incident.

Beyond that, two athletes have been kicked out of the Games for posting controversial statements on Twitter. At least one other athlete had been reprimanded for using social media to name their sponsors, in apparent violation of Olympics rules—and athletes have used Twitter to strike back, criticizing the IOC rules.

British diver Tom Daley also warred on Twitter this week with a critic, who was later arrested on suspicion of malicious communication and revealed to be a British teenager.

Another push by the globalists to control the populace.

Read More At: TheIntelHub.com

, , , , , , ,

Leave a comment

Twitter & Privacy – Impossible Union?

via: RTAmerica
August 2, 2012

, , , , , ,

Leave a comment

Is your power strip spying on you? Complex hacking device looks like extension cord

via: NaturalNews
Wednesday, August 01, 2012
By: J. D. Heyes

[NaturalNews] I’ve said often that the Information Age in which we currently find ourselves is turning out to be a double-edged sword when it comes to striking a balance between advancing our quality of life and preserving our freedoms.

Such is the case with a “new” product called a power strip.

Wait. I know. You’ve heard of power strips. Heck, you’ve probably got several of them in your home, powering your various electronic devices, television sets, DVD players, etc.

But did you know a company now makes a power strip that can actually spy on you.

According to Adrian Kingsley-Hughes at Forbes.com, this insidious new device looks, for all intents and purposes, like an ordinary power strip.

Evil piece of kit

The company, called Pwnie Express, manufactures a strip called the Power Pwn, which is described as “a fully-integrated enterprise-class penetration testing platform.”

“Through it’s (sic) ingenious form-factor and highly-integrated/modular hardware design, the Power Pwn covers the entire spectrum of a full-scale pentesting engagement, from the physical-layer to the application-layer,” the company says.

Hmmm. That’s highly technical talk and it’s too complicated except for a few tech gurus who can speak that language. According to Kingsley-Hughes: “This is an evil piece of kit.”

Some of the device’s features are:

— It is “unpingable” and there are “no listening ports in stealth mode” (my emphasis)

— It’s capable of carrying out “passive recon”

— It has 16GB of “internal disk storage” (for what?)

— “Maintains persistent, covert, encrypted SSH access to your target network”

According to Forbes, the power strip “could sit unnoticed in a home or work environment and yet be spying on an entire network.”

Sinister.

Another feature is an unlocked 3G/GSM adapter, which makes the strip compatible with GSM carriers in nearly every country on the planet.

“A hacker can communicate with the Power Pwn either over the web or via SMS text messaging, and it can be used to launch remote attacks against Wi-Fi, Bluetooth, and Ethernet networks,” says Kingsley-Hughes.

Back to the term “pentest.” That is short for penetration test, which is the method of evaluating the security of a network or computer system by simulating an outside hack attack.

“These tests are carefully designed and crafted to define any gaps in systems without causing any downtime or unnecessary security risks,” says a definition from Network Security Services, Inc., an IT security firm.

Continue Reading At: NaturalNews.com

, , , , , ,

Leave a comment