H/T Lenny Ladner The A.I. Surveillance Tool DHS Uses to Detect ‘Sentiment and Emotion’ Customs and Border Protection (CBP), part of the Department of Homeland Security, has bought millions of dollars worth of software from a company that uses artificial intelligence to detect “sentiment and emotion” in online posts, according to a…
Category: Computer Related
Comm Corner: Encrypted Radio Comms Compromised
H/T WRSA An Intentional Backdoor discovered in Encrypted Radio Comms used Globally for over 25 years. Via Source Article from WIRED. This backdoor could allow someone to snoop on communications and potentially send harmful commands. The researchers also found a second vulnerability that could let someone decrypt encrypted voice and data communications…
Dystopianism Becoming Painfully Accurate
Cyber-Security: WOROK – Powerful Malware Hidden in .PNG Images
WOROK: Powerful Malware Hidden in .PNG Images “Unless it’s your first day on the internet, you’re probably aware that downloading certain files can be a serious mistake. It doesn’t take a cybersecurity expert to know that double-clicking the TotallyNotAVirus.exe file that mysteriously appeared in your downloads folder is a bad idea. If you’re a bit more security…
The Surveillance State: Presidential Policy Directive 28
Surveillance State USA. Biden quietly unleashes spymasters in dramatic Executive Order. The collection of signals intelligence shall be authorized by statute or Executive Order, proclamation, or other Presidential directive, and undertaken in accordance with the Constitution and applicable statutes, Executive Orders, proclamations, and Presidential directives. (b) Privacy and civil liberties shall be integral considerations…
The Surveillance State: Intelligence Community Developing AI Tool To Unmask Anonymous Writers
Intelligence Community Developing AI Tool To Unmask Anonymous Writers A press release on Tuesday from the ODNI revealed that the Intelligence Advanced Research Projects Activity (IARPA), their research and development arm, is starting work on the Human Interpretable Attribution of Text Using Underlying Structure program – HIATUS for short.
The Surveillance State: The Simple Reason Why you should STOP🤚 🛑 using Gmail
The Simple Reason why you should Stop using Gmail Would also highly recommend 7 Simple Steps to Online Privacy. I dumped everything associated with Google (including Chrome) a long while ago. Think OPSEC All The Time.
The Surveillance State: Augury
US military using tool that captures ‘93% of the internet’ Multiple branches of the US military have bought access to “petabytes” of American citizens’ private online data via a tool called Augury, giving them access to an almost omniscient set of data points, Senator Ron Wyden (D-Oregon) claimed in a letter to the Office of the…
VISUALIZED: Map of Ransomware Attacks Since 2018
VISUALIZED: Map of Ransomware Attacks Since 2018 Each dot represents the location of a ransomware attack, with the size of the dot depicting the number of records impacted. This map updates weekly and pinpoints the locations of each ransomware attack in the US, from 2018 to present day. Where available, it includes the ransom amount,…
The Proliferation of Wireless Signal Jammers
The Proliferation of Wireless Signal Jammers This is a fundmental part of 4GW. Learn about it now so you are not behind the 8 ball.