Privacy News ArticlesExcerpts of key news articles on
Below are key excerpts of revealing news articles on privacy and mass surveillance issues from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
Note: Explore our full index to revealing excerpts of key major media news articles on dozens of engaging topics. And read excerpts from 20 of the most revealing news articles ever published.
Samsung is warning customers about discussing personal information in front of their smart television set. The warning applies to TV viewers who control their Samsung Smart TV using its voice activation feature. When the feature is active, such TV sets "listen" to what is said and may share what they hear with Samsung or third parties, it said. Privacy campaigners said the technology smacked of the telescreens, in George Orwell's 1984, which spied on citizens. The warning came to light via a story in ... the Daily Beast which published an excerpt of a section of Samsung's privacy policy for its net-connected Smart TV sets. These record what is said when a button on a remote control is pressed. The policy explains that the TV set will be listening to people in the same room to try to spot when commands or queries are issued via the remote. It goes on to say: "If your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party." Corynne McSherry, an intellectual property lawyer for the Electronic Frontier Foundation, [said] that the third party was probably the company providing speech-to-text conversion for Samsung. She added: "If I were the customer, I might like to know who that third party was, and I'd definitely like to know whether my words were being transmitted in a secure form." The third party handling the translation from speech to text is a firm called Nuance, which specialises in voice recognition, Samsung has confirmed to the BBC.
Note: Read more about Samsung's privacy issues in this 2013 Houston Chronicle article. For more along these lines, see concise summaries of deeply revealing news articles on the disappearance of privacy from reliable major media sources.
The US National Security Agency (NSA) tried to persuade its British counterpart to stop the Guardian publishing revelations about secret mass data collection from the NSA contractor, Edward Snowden. Sir Iain Lobban, the head of Government Communications Headquarters (GCHQ) ... rebuffed the suggestion that his agency should act as a censor on behalf of its US partner in electronic spying. British refusal to shut down publication of the leaks ... caused rifts within the Five Eyes signals intelligence coalition [according to] a new book ... by Richard Kerbaj. Kerbaj reports that the US-UK intelligence relationship was further strained when the head of the NSA, Gen Keith Alexander, failed to inform Lobban that the Americans had identified Snowden ... leaving the British agency investigating its own ranks in the search for the leaker. The Five Eyes allies were outraged that a contractor like Snowden, working as a computer systems administrator, could get access to their secrets, and that because of US government outsourcing, there were 1.5 million Americans with top security clearance like Snowden. Allies were not prepared to challenge the Americans out of anxiety that they could be cut off from the flow of intelligence. British officials also decided to bite their tongues ... because of the value of the intelligence and funding provided by the NSA. Sir Kim Darroch, the former UK national security adviser, is quoted ... saying: "The US give us more than we give them so we just have to basically get on with it."
Note: Read more on how US and UK spy agencies undermine privacy and security in this news article reported by The Guardian. For a guide from The Guardian on how to remain secure against NSA surveillance, click here.
The digital Covid vaccination certification, or "passport," is a mobile app that instantaneously affirms the vaccinated status, Covid test results, birth date, gender, and/or other identifiers of its holder. The information is usually mosaicked in a QR code, read by a proprietary scanner, and linked to a government registry. Led by New York, California, and Louisiana, as many as 30 states are rolling them out. The Biden administration announced last spring that it would wrangle them under national standards but so far it hasn't. Internationally, the EU and a growing number of countries are adopting them, from repressive regimes like Bahrain to democracies like Denmark. Twenty U.S. states have banned the passes, and hashtags like #NoVaccinePassports are proliferating. "Spoiler alert," tweeted British DJ ... Lange. "They are not planning on removing vax passports once introduced. This is just the first step to get you conditioned to accepting government restrictions in your daily life via your mobile phone. This digital ID is going to expand to all aspects of your life." New York, for one, is not expecting to mothball the technology when Covid wanes. State bureaucrats are "exploring how the platform could be retrofitted to verify other types of records and credentials." The surveillance technologies of the War on Contagion are inherited from the War on Terror, and the software is encoded with the same forever-war mentality: Both fight risk rather than actual threat.
Note: For more along these lines, see concise summaries of deeply revealing news articles on coronavirus vaccines and the disappearance of privacy from reliable major media sources.
“When the government tracks the location of a cellphone it achieves near perfect surveillance, as if it had attached an ankle monitor to the phone’s user,” wrote John Roberts, the chief justice of the Supreme Court, in a 2018 ruling that prevented the government from obtaining location data from cellphone towers without a warrant. “We decline to grant the state unrestricted access to a wireless carrier’s database of physical location information,” Chief Justice Roberts wrote in the decision, Carpenter v. United States. With that judicial intent in mind, it is alarming to read a new report in The Wall Street Journal that found the Trump administration “has bought access to a commercial database that maps the movements of millions of cellphones in America and is using it for immigration and border enforcement.” The data used by the government comes not from the phone companies but from a location data company, one of many that are quietly and relentlessly collecting the precise movements of all smartphone-owning Americans through their phone apps. Many apps — weather apps or coupon apps, for instance — gather and record location data without users’ understanding what the code is up to. That data can then be sold to third party buyers including, apparently, the government. The courts are [an] imperfect venue for protecting Fourth Amendment rights. The Carpenter ruling applies only to location data captured by cellphone towers and not to location data streamed from smartphone apps.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
Tech companies have outfitted classrooms across the U.S. with devices and technologies that allow for constant surveillance and data gathering. Firms such as Gaggle, Securly and Bark (to name a few) now collect data from tens of thousands of K-12 students. They are not required to disclose how they use that data, or guarantee its safety from hackers. In their new book, Surveillance Education: Navigating the Conspicuous Absence of Privacy in Schools, Nolan Higdon and Allison Butler show how all-encompassing surveillance is now all too real, and everything from basic privacy rights to educational quality is at stake. The tech industry has done a great job of convincing us that their platforms – like social media and email – are "free." But the truth is, they come at a cost: our privacy. These companies make money from our data, and all the content and information we share online is basically unpaid labor. So, when the COVID-19 lockdowns hit, a lot of people just assumed that using Zoom, Canvas and Moodle for online learning was a "free" alternative to in-person classes. In reality, we were giving up even more of our labor and privacy to an industry that ended up making record profits. Your data can be used against you ... or taken out of context, such as sarcasm being used to deny you a job or admission to a school. Data breaches happen all the time, which could lead to identity theft or other personal information becoming public.
Note: Learn about Proctorio, an AI surveillance anti-cheating software used in schools to monitor children through webcams–conducting "desk scans," "face detection," and "gaze detection" to flag potential cheating and to spot anybody "looking away from the screen for an extended period of time." For more along these lines, see concise summaries of deeply revealing news articles on Big Tech and the disappearance of privacy from reliable major media sources.
Ford Motor Company is just one of many automakers advancing technology that weaponizes cars for mass surveillance. The ... company is currently pursuing a patent for technology that would allow vehicles to monitor the speed of nearby cars, capture images, and transmit data to law enforcement agencies. This would effectively turn vehicles into mobile surveillance units, sharing detailed information with both police and insurance companies. Ford's initiative is part of a broader trend among car manufacturers, where vehicles are increasingly used to spy on drivers and harvest data. In today's world, a smartphone can produce up to 3 gigabytes of data per hour, but recently manufactured cars can churn out up to 25 gigabytes per hour–and the cars of the future will generate even more. These vehicles now gather biometric data such as voice, iris, retina, and fingerprint recognition. In 2022, Hyundai patented eye-scanning technology to replace car keys. This data isn't just stored locally; much of it is uploaded to the cloud, a system that has proven time and again to be incredibly vulnerable. Toyota recently announced that a significant amount of customer information was stolen and posted on a popular hacking site. Imagine a scenario where hackers gain control of your car. As cybersecurity threats become more advanced, the possibility of a widespread attack is not far-fetched.
Note: FedEx is helping the police build a large AI surveillance network to track people and vehicles. Michael Hastings, a journalist investigating U.S. military and intelligence abuses, was killed in a 2013 car crash that may have been the result of a hack. For more along these lines, explore summaries of news articles on the disappearance of privacy from reliable major media sources.
Data breaches are a seemingly endless scourge with no simple answer, but the breach in recent months of the background-check service National Public Data illustrates just how dangerous and intractable they have become. In April, a hacker known for selling stolen information, known as USDoD, began hawking a trove of data on cybercriminal forums for $3.5 million that they said included 2.9 billion records and impacted "the entire population of USA, CA and UK." As the weeks went on, samples of the data started cropping up as other actors and legitimate researchers worked to understand its source and validate the information. By early June, it was clear that at least some of the data was legitimate and contained information like names, emails, and physical addresses in various combinations. When information is stolen from a single source, like Target customer data being stolen from Target, it's relatively straightforward to establish that source. But when information is stolen from a data broker and the company doesn't come forward about the incident, it's much more complicated to determine whether the information is legitimate and where it came from. Typically, people whose data is compromised in a breach–the true victims–aren't even aware that National Public Data held their information in the first place. Every trove of information that attackers can get their hands on ultimately fuels scamming, cybercrime, and espionage.
Note: Clearview AI scraped billions of faces off of social media without consent. At least 600 law enforcement agencies were tapping into its database of 3 billion facial images. During this time, Clearview was hacked and its entire client list – which included the Department of Justice, U.S. Immigration and Customs Enforcement, Interpol, retailers and hundreds of police departments – was leaked to hackers.
Peregrine ... is essentially a super-powered Google for police data. Enter a name or address into its web-based app, and Peregrine quickly scans court records, arrest reports, police interviews, body cam footage transcripts – any police dataset imaginable – for a match. It's taken data siloed across an array of older, slower systems, and made it accessible in a simple, speedy app that can be operated from a web browser. To date, Peregrine has scored 57 contracts across a wide range of police and public safety agencies in the U.S., from Atlanta to L.A. Revenue tripled in 2023, from $3 million to $10 million. [That will] triple again to $30 million this year, bolstered by $60 million in funding from the likes of Friends & Family Capital and Founders Fund. Privacy advocates [are] concerned about indiscriminate surveillance. "We see a lot of police departments of a lot of different sizes getting access to Real Time Crime Centers now, and it's definitely facilitating a lot more general access to surveillance feeds for some of these smaller departments that would have previously found it cost prohibitive," said Beryl Lipton ... at the Electronic Frontier Foundation (EFF). "These types of companies are inherently going to have a hard time protecting privacy, because everything that they're built on is basically privacy damaging." Peregrine technology can also enable "predictive policing," long criticized for unfairly targeting poorer, non-white neighborhoods.
Note: Learn more about Palantir's involvement in domestic surveillance and controversial military technologies. For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy from reliable major media sources.
Recall ... takes constant screenshots in the background while you go about your daily computer business. Microsoft's Copilot+ machine-learning tech then scans (and "reads") each of these screenshots in order to make a searchable database of every action performed on your computer and then stores it on the machine's disk. "Recall is like bestowing a photographic memory on everyone who buys a Copilot+ PC," [Microsoft marketing officer Yusuf] Mehdi said. "Anything you've ever seen or done, you'll now more or less be able to find." Charlie Stross, the sci-fi author and tech critic, called it a privacy "shit-show for any organisation that handles medical records or has a duty of legal confidentiality." He also said: "Suddenly, every PC becomes a target for discovery during legal proceedings. Lawyers can subpoena your Recall database and search it, no longer being limited to email but being able to search for terms that came up in Teams or Slack or Signal messages, and potentially verbally via Zoom or Skype if speech-to-text is included in Recall data." Faced with this pushback, Microsoft [announced] that Recall would be made opt-in instead of on by default, and also introducing extra security precautions – only producing results from Recall after user authentication, for example, and never decrypting data stored by the tool until after a search query. The only good news for Microsoft here is that it seems to have belatedly acknowledged that Recall has been a fiasco.
Note: For more along these lines, see concise summaries of deeply revealing news articles on Big Tech and the disappearance of privacy from reliable major media sources.
The U.S. Postal Service has shared information from thousands of Americans' letters and packages with law enforcement every year for the past decade, conveying the names, addresses and other details from the outside of boxes and envelopes without requiring a court order. Postal Service officials have received more than 60,000 requests from federal agents and police officers since 2015. Each request can cover days or weeks of mail sent to or from a person or address, and 97 percent of the requests were approved. The surveillance technique, known as the mail covers program, has long been used by postal inspectors to help track down suspects or evidence. The practice is legal, and the inspectors said they share only what they can see on the outside of the mail. [Sen. Ron] Wyden said in a statement, "Thousands of Americans are subjected to warrantless surveillance each year, and ... the Postal Inspection Service rubber stamps practically all of the requests they receive." He also criticized the agency for "refusing to raise its standards and require law enforcement agencies monitoring the outside of Americans' mail to get a court order, which is already required to monitor emails and texts." Anxieties over postal surveillance are classically American. In 1798, Vice President Thomas Jefferson wrote in a letter that his fears of having his private communications exposed by the "infidelities of the post office" had stopped him from "writing fully & freely."
Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy from reliable major media sources.
Every state in the U.S. requires hospitals to take a small blood sample from newborns to test for genetic diseases. In most places, the samples are destroyed or given to parents shortly after the testing, but New Jersey keeps them stored in a state facility–for 23 years–without asking for the parents' consent. During the decades that New Jersey keeps the baby blood samples, it can do whatever it wants with the samples. In fact, on at least a few occasions, samples have been handed over to law enforcement, without consent or a warrant. There is an opt out of testing for religious objections, and parents can request the state to destroy the sample after the testing is complete. But parents don't even know that the state is keeping the blood in the first place. This puts New Jersey out of step with other states, who in recent years were forced to end the sharing of blood samples without consent. Texas destroyed more than 5.3 million blood samples after a 2009 lawsuit revealed that the state had sold some of them to private companies and the Pentagon. Suits in Minnesota and Michigan also led those states to destroy millions of samples. The New Jersey parents aren't suing for money. What they want is for the state to do one of three things: 1) obtain informed consent including the specific uses New Jersey may have for the samples; 2) promptly return all samples that are produced without consent; or 3) destroy all samples once the screening tests are completed.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
Federal and state Homeland Security grants allow local law enforcement agencies to surveil American citizens with technology more commonly found in war zones and foreign espionage operations. At least two Texas communities along the U.S.-Mexico border have purchased a product called "TraffiCatch," which collects the unique wireless and Bluetooth signals emitted by nearly all modern electronics to identify devices and track their movements. The product is also listed in a federal supply catalog run by the U.S. government's General Services Administration, which negotiates prices and contracts for federal agencies. Combining license plate information with data collected from wireless signals is the kind of surveillance the U.S. military and intelligence agencies have long used, with devices mounted in vehicles, on drones or carried by hand to pinpoint the location of cell phones and other electronic devices. Their usage was once classified and deployed in places like Afghanistan and Iraq. Today, similar devices are showing up in the streets of American cities. The Supreme Court has said that attaching a GPS tracking device to a car or getting historical location data from a cell carrier requires a search warrant. However, law enforcement has found ways around these prohibitions. Increasingly, as people walk around with headphones, fitness wearables and other devices ... their data can be linked to a car, even after they have ditched the car. Courts have not definitively grappled with the question: Under what circumstances can law enforcement passively capture ambient signal information and use it as a tracking tool?
Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy from reliable major media sources.
Hardware that breaks into your phone; software that monitors you on the internet; systems that can recognize your face and track your car: The New York State Police are drowning in surveillance tech. Last year alone, the Troopers signed at least $15 million in contracts for powerful new surveillance tools. Surveillance technology has far outpaced traditional privacy laws. In New York, lawmakers launched a years-in-the-making legislative campaign last year to rein in police intrusion. None of their bills have made it out of committee. A report from the U.S. Office of the Director of National Intelligence, put it succinctly: "The government would never have been permitted to compel billions of people to carry location tracking devices on their persons at all times, to log and track most of their social interactions, or to keep flawless records of all their reading habits." That report called specific attention to the "data broker loophole": law enforcement's practice of obtaining data for which they'd otherwise have to obtain a warrant by buying it from brokers. The New York State Police have taken greater and greater advantage of the loophole in recent years. They've also spent millions on mobile device forensic tools, or MDFTs, powerful hacking hardware and software that allow users to download full, searchable copies of a cellphone's data, including social media messages, emails, web and search histories, and minute-by-minute location information.
Note: For more along these lines, see concise summaries of deeply revealing news articles on police corruption and the disappearance of privacy from reliable major media sources.
The FBI spends "every day, all day long" interrogating people over their Facebook posts. At least, that's what agents told Stillwater, Oklahoma, resident Rolla Abdeljawad when they showed up at her house to ask her about her social media activity. Three FBI agents came to Abdeljawad's house and said that they had been given "screenshots" of her posts by Facebook. Her lawyer Hassan Shibly posted a video of the incident. "Facebook gave us a couple of screenshots of your account," one agent in a gray shirt said in the video. "So we no longer live in a free country and we can't say what we want?" replied Abdeljawad. "No, we totally do. That's why we're not here to arrest you or anything," a second agent in a red shirt added. "We do this every day, all day long. It's just an effort to keep everybody safe and make sure nobody has any ill will." Shibly says that he doesn't know which Facebook post caught the agents' attention, and that it was the first time he had heard of Facebook's parent company, Meta, preemptively reporting posts to law enforcement. [Abdeljawad] made multiple angry posts per day about the war in Gaza, referring to Israel as "Israhell." But none of the posts on her feed call for violence. Ironically, Abdeljawad had also posted a warning about exactly the kind of government monitoring she was later subjected to. "Don't fall for their games. Our community is being watched & they are just waiting for any reason to round us up," Abdeljawad wrote.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the erosion of civil liberties from reliable major media sources.
In November 2020 ... a ballot initiative known as Measure J passed with 57 percent support, amending the LA County charter so that jailing people before trial would be treated as a last resort. In June, LA County signed over the handling of changes to pretrial detention under Measure J to the consulting firm Accenture, a behemoth in the world of biometric databases and predictive policing. Accenture has pushed counterterror and policing strategies around the globe: The company built the world's biggest biometric identification system in India, which has used similar technologies to surveil protesters and conduct crowd control as part of efforts by Prime Minister Narendra Modi's Bharatiya Janata Party to investigate the citizenship of Muslim residents. Accenture ballooned into a giant in federal consulting over the course of the "war on terror," winning hundreds of millions of dollars in lucrative contracts from federal agencies like the Department of Homeland Security for projects from a "virtual border" to recruiting and hiring Customs and Border Protection and Border Patrol agents. In 2006, Accenture won a $10 million contract for a DHS biometric ID program, the world's second biggest, to collect and share biometric data on foreign nationals entering or leaving the U.S. Several LA-based advocates told The Intercept that the contract is yet another development that calls into question the county's commitment to real criminal justice reform.
Note: For more along these lines, see concise summaries of deeply revealing news articles on corporate corruption and the disappearance of privacy from reliable major media sources.
The Department of Homeland Security (DHS) is likely the single largest collector and consumer in the U.S. government of detailed, often intimate, information about Americans and foreigners alike. The department stores and analyzes this information using vast data systems to determine who can enter the country and who is subjected to intrusive inspections, including by parsing through travel records, social media data, non-immigrant visa applications, and other information to detect patterns of behavior that the department has determined are worthy of scrutiny. As we explain in a new Brennan Center report, these systems ... are too often deployed in discriminatory ways that violate Americans' constitutional rights and civil liberties. It is past time for DHS to stop improvising how it designs and implements its automated systems, with inadequate mechanisms for evaluation and oversight, weak standards, and disproportionate impacts on marginalized communities and individuals. DHS must disclose additional information about its systems, including the policies that govern their operations and reports explaining how they are used. An independent body should undertake a rigorous investigation of DHS's automated systems, evaluating whether they are useful and accurate, assessing how they function, and determining whether they contain sufficient safeguards to protect privacy, civil rights, and civil liberties.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
Public schools ... are the focus of a new report on surveillance and kids by the American Civil Liberties Union (ACLU). "Over the last two decades, a segment of the educational technology (EdTech) sector that markets student surveillance products to schools – the EdTech Surveillance industry – has grown into a $3.1 billion a year economic juggernaut," begins Digital Dystopia The Danger in Buying What the EdTech Surveillance Industry is Selling. "The EdTech Surveillance industry accomplished that feat by playing on school districts' fears of school shootings, student self-harm and suicides, and bullying – marketing them as common, ever-present threats." As the authors detail, among the technologies are surveillance cameras. These are often linked to software for facial recognition, access control, behavior analysis, and weapon detection. That is, cameras scan student faces and then algorithms identify them, allow or deny them entry based on that ID, decide if their activities are threatening, and determine if objects they carry may be dangerous or forbidden. "False hits, such as mistaking a broomstick, three-ring binder, or a Google Chromebook laptop for a gun or other type of weapon, could result in an armed police response to a school," cautions the report. Students are aware that they're being observed. Of students aged 14–18 surveyed by the ACLU ... thirty-two percent say, "I always feel like I'm being watched."
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
An effort by United States lawmakers to prevent government agencies from domestically tracking citizens without a search warrant is facing opposition internally from one of its largest intelligence services. Officials at the National Security Agency (NSA) have approached lawmakers charged with its oversight about opposing an amendment that would prevent it from paying companies for location data instead of obtaining a warrant in court. Introduced by US representatives Warren Davidson and Sara Jacobs, the amendment ... would prohibit US military agencies from "purchasing data that would otherwise require a warrant, court order, or subpoena" to obtain. The ban would cover more than half of the US intelligence community, including the NSA, the Defense Intelligence Agency, and the newly formed National Space Intelligence Center, among others. A government report declassified by the Office of the Director of National Intelligence last month revealed that US intelligence agencies were avoiding judicial review by purchasing a "large amount" of "sensitive and intimate information" about Americans, including data that can be used to trace people's whereabouts over extended periods of time. The sensitivity of the data is such that "in the wrong hands," the report says, it could be used to "facilitate blackmail," among other undesirable outcomes. The report also acknowledges that some of the data being procured is protected under the US Constitution's Fourth Amendment.
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
These blank-looking warehouses are home to an artificial intelligence (AI) company used by the Government to monitor people's posts on social media. Logically has been paid more than Ł1.2 million of taxpayers' money to analyse what the Government terms "disinformation" – false information deliberately seeded online – and "misinformation", which is false information that has been spread inadvertently. It does this by "ingesting" material from more than hundreds of thousands of media sources and "all public posts on major social media platforms", using AI to identify those that are potentially problematic. It has a Ł1.2 million deal with the Department for Culture, Media and Sport (DCMS), as well as another worth up to Ł1.4 million with the Department of Health and Social Care to monitor threats to high-profile individuals within the vaccine service. Other blue-chip clients include US federal agencies, the Indian electoral commission, and TikTok. It also has a "partnership" with Facebook, which appears to grant Logically's fact-checkers huge influence over the content other people see. A joint press release issued in July 2021 suggests that Facebook will limit the reach of certain posts if Logically says they are untrue. "When Logically rates a piece of content as false, Facebook will significantly reduce its distribution so that fewer people see it, apply a warning label to let people know that the content has been rated false, and notify people who try to share it," states the press release.
Note: For more along these lines, see concise summaries of deeply revealing news articles on government corruption and the disappearance of privacy from reliable major media sources.
The Pentagon's intelligence branch is developing new tech to help it track the mass movement of people around the globe and flag "anomalies." The project is called the Hidden Activity Signal and Trajectory Anomaly Characterization (HAYSTAC) program and it "aims to establish â€normal' movement models across times, locations, and populations and determine what makes an activity atypical," according to a press release from the Office of the Director of National Intelligence (DNI). HAYSTAC will be run by the DNI's Intelligence Advanced Research Projects Activity (IARPA). It's kind of like DARPA, the Pentagon's blue-sky research department, but with a focus on intelligence projects. According to the agency, the project will analyze data from internet-connected devices and "smart city" sensors using AI. "An ever-increasing amount of geospatial data is created every day," Jack Cooper, HAYSTAC's program manager, said. Cooper also mentioned privacy, or rather a lack of it. "Today you might think that privacy means going to live off the grid in the middle of nowhere," he said. "That's just not realistic in today's environment. Sensors are cheap. Everybodys got one. There's no such thing as living off the grid." In one project, [contractor] AIS simulated a cyber attack. "Devices included traditional desktop systems, laptops, tablets, and mobile platforms," the firm said. "The technology tracks users through biometric features, including keystroke biometrics, mouse movement behavior, and gait detection."
Note: For more along these lines, see concise summaries of deeply revealing news articles on intelligence agency corruption and the disappearance of privacy from reliable major media sources.
Important Note: Explore our full index to revealing excerpts of key major media news articles on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.