Image of A 'Black Mirror' Episode Is Coming to Life in China: (China's social Credit Score)
A 'Black Mirror' Episode Is Coming to Life in China: (China's social Credit Score)
In another indication that Back Mirror isn't just a sci-fi anthology series and instead a glimpse into our actual future, China is extending its "social credit" system to block accused wrongdoers from traveling on trains and planes.The social credit program has been around since 2014, and has been steadily expanding. According to Wired:    In 2014, the State Council, China’s governi... [Read More]
Image of China has started ranking citizens with a creepy 'social credit' system  --  here's what you can do wrong, and the embarrassing, demeaning ways they can punish you | Business Insider
China has started ranking citizens with a creepy 'social credit' system -- here's what you can do wrong, and the embarrassing, demeaning ways they can punish you | Business Insider
The Chinese state is setting up a vast ranking system system that will monitor the behaviour of its enormous population, and rank them all based on their “social credit.”The “social credit system,” first announced in 2014, aims to reinforce the idea that “keeping trust is glorious and breaking trust is disgraceful,” according to a government document.The program is due to be fully operational by 2... [Read More]
Image of David Icke | Welcome To The Minority Report: Thousands Of Stores Plan Facial Recognition Use For Anti-Theft
David Icke | Welcome To The Minority Report: Thousands Of Stores Plan Facial Recognition Use For Anti-Theft
'Hundreds of retail stores and soon thousands are investigating using biometric facial recognition software FaceFirst to build a database of shoplifters to aid in the fight against theft, Peter Trepp CEO of FaceFirst told BuzzFeed News.The software is called FaceFirst and is designed to scan faces as far as 50 to 100 feet away. As customers walk through a store entrance, the video camera captures ... [Read More]
Tencent employs facial recognition to detect minors in top-grossing mobile game ‘Honour of Kings’ | South China Morning Post
Tencent’s stricter controls over underage gamers come amid Beijing’s call to protect children’s health, with the government blaming the country’s widespread myopia on the playing of video games.Tencent Holdings, the world’s top-grossing games publisher, will use facial recognition technology to detect minors amid tighter scrutiny by the Chinese government over concerns excessive video gaming is hu... [Read More]
Image of Facial Recognition In The Toilet: Asia’s Restrooms Are Going High Tech
Facial Recognition In The Toilet: Asia’s Restrooms Are Going High Tech
It seems everything is receiving a technology upgrade nowadays, and public restrooms might be the next target. Whether it’s to fight toilet paper thieves or show which stalls are occupied, the next time you go pee there may be technology watching over you.Authorities in China are adding facial recognition toilet paper dispensers in some public restrooms to stop visitors from stealing entire rolls ... [Read More]
Image of AI-Powered Body Cams Give Cops The Power To Google Everything They See
AI-Powered Body Cams Give Cops The Power To Google Everything They See
The police body camera industry is the latest to jump on the artificial intelligence bandwagon, bringing new powers and privacy concerns to a controversial technology bolstered by the need to hold police accountable after numerous high-profile killings of unarmed black citizens. Now, that tech is about to get smarter.Last week, Taser, the stun gun company that has recently become an industry leade... [Read More]
Image of PressTV-‘New CIA rules won’t end spying on US citizens’
PressTV-‘New CIA rules won’t end spying on US citizens’
The new privacy guidelines imposed on the CIA by the outgoing administration of US President Barack Obama to restrict domestic surveillance will not limit government eavesdropping on Americans, says Stephen Lendman, a journalist and political analyst in Chicago.“So-called guidelines have been around for the past few decades; it certainly hasn’t stopped the CIA or NSA or FBI about doing anything th... [Read More]
Image of D-Vasive: TEAM MGT is WORKING FEVERISHLY to ADDRESS THE DATA SECURITY THREATS OF TODAY
D-Vasive: TEAM MGT is WORKING FEVERISHLY to ADDRESS THE DATA SECURITY THREATS OF TODAY
Stop Being Spied On!Everyday more and more invasive apps are being released. These invasive apps want to silently turn on your microphone to record your voice as well as turn on your camera to video record your activities. D-Vasive operates in a unique way, allowing you complete control in managing your internal hardware. So that way, when a potential malicious application tries to open your Camer... [Read More]
Image of Researchers Find Backdoors, Bugs In Sony, White Box IP Cameras
Researchers Find Backdoors, Bugs In Sony, White Box IP Cameras
New vulnerabilities discovered by SEC Consult and Cybereason highight increasing IoT threat to enterprises.Two alerts this week about vulnerabilities in widely used IP cameras should help dispel any lingering notions about the Internet of Things (IoT) security threat being largely a consumer problem.One of the alerts was from Austrian security firm SEC Consult, while the other was from Cybereaon.I... [Read More]
Image of Wi-Fi can be turned into IMSI Catcher to Track Cell Phone Users Everywhere
Wi-Fi can be turned into IMSI Catcher to Track Cell Phone Users Everywhere
Here's a new danger to your smartphone security: Your mobile device can be hijacked and tracked without your knowledge.Remember Stingrays?The controversial cell phone spying tool, also known as "IMSI catchers," has long been used by law enforcement to track and monitor mobile users by mimicking a cellphone tower and tricking their devices to connect to them. Sometimes it even intercepts calls and ... [Read More]
Image of DoS urged to probe facial-recognition databases
DoS urged to probe facial-recognition databases
Dozens of American civil rights groups have called on the US Department of Justice to investigate police use of facial-recognition databases, amid rising concerns over privacy violations and the racial exploitation of surveillance technology.In a letter to the department on Tuesday, the American Civil Liberties Union (ACLU), along with 51 other advocacy groups, argued that the use of facial-recogn... [Read More]
Image of Facebook artificial intelligence chief developed SURVEILLANCE systems – The Sun
Facebook artificial intelligence chief developed SURVEILLANCE systems – The Sun
by JASPER HAMILLSOCIAL INTELLIGENCESocial media tech guru helped to devise techniques which could allow computers to spy on humans more effectivelyFacebook’s artificial intelligence chief worked on the development of systems which could one day help computers automatically spy on humans, The Sun Online has learned.Yann LeCun, leader of Mark Zuckerberg’s AI research division, contributed to academi... [Read More]
Image of Google and Microsoft Want Every Company to Scrutinize You with AI » Alex Jones' Infowars
Google and Microsoft Want Every Company to Scrutinize You with AI » Alex Jones' Infowars
When some patients of Dartmouth-Hitchcock Medical Center in New Hampshire step on their bathroom scale at home, Microsoft’s computers know about it. The corporation’s machines also get blood pressure readings taken at home. And they can even listen to calls between nurses and patients to gauge a person’s emotional state. Microsoft’s artificial intelligence software parses that data to try and warn... [Read More]
The Transformative Power of Live Stream Video: It’s Not Black and White | Project Veritas
Today is a dark day in American history. An unbelievable series of reactionary  events has just happened. We’ll have to wrestle with the consequences of these  events for a long time while deciding what sort of world we want to live in. There  is a toxic culture of fear and we are witnessing unbelievable back-to-back  violence. We are often driven by narratives, rather than fac... [Read More]
Image of Yahoo! Just Exposed One of the FBI's Most Secretive Tricks to Unethically Obtaining Your Info
Yahoo! Just Exposed One of the FBI's Most Secretive Tricks to Unethically Obtaining Your Info
By Claire BernishFor the first time since the implementation of the USA Freedom Act, Yahoo! published three National Security Letters — perhaps the most secretive and contentious method the FBI has for obtaining information on individuals — after the lifting of repressive and equally-contentious gag orders.Mainstays of the USA PATRIOT Act, National Security Letters (NSLs) generally request custome... [Read More]
Image of Facial recognition will soon end your anonymity - MarketWatch
Facial recognition will soon end your anonymity - MarketWatch
Nearly 250 million video surveillance cameras have been installed throughout the world, and chances are you’ve been seen by several of them today. Most people barely notice their presence anymore — on the streets, inside stores, and even within our homes. We accept the fact that we are constantly being recorded because we expect this to have virtually no impact on our lives. But this balance may s... [Read More]
Image of New Surveillance System May Let Cops Use All of the Cameras
New Surveillance System May Let Cops Use All of the Cameras
The 30 million or so surveillance cameras peering into nearly every corner of American life might freak you out a bit, but you could always tell yourself that no one can access them all. Until now. Computer scientists have created a way of letting law enforcement tap any camera that isn’t password protected so they can determine where to send help or how to respond to a crime. “It’s a w... [Read More]
Image of Hackers can steal your fingerprint from a PHOTO: Copycat print could be used by criminals to fool security systems
Hackers can steal your fingerprint from a PHOTO: Copycat print could be used by criminals to fool security systems
A hacker known as Starbug told attendees of the Chaos Computer Club’s (CCC) 31st annual congress in Hamburg, Germany, that the copied print could be used for 'biometric authentication'. [Read More]
Image of Is nearsightedness an epidemic? - WTOP.com
Is nearsightedness an epidemic? - WTOP.com
For Christine Wildsoet, a professor of vision science and optometry at the University of California--Berkeley, the coffee shop hosts some of the worst offenders. There are the new moms chatting while their babies are parked in front of iPads, and the dads reading while their toddlers play games on cellphones. "I just don't know what the implications of new technology [are] going to be" on kids'... [Read More]
Tobii EyeX for Windows Demo - Eye Movement Tracking
Tobii EyeX for Windows provides a complete out-of-the-box experience with a wealth of applications adapted for eye tracking. It makes your interaction with the computer simpler and more natural. With eye tracking at its core, Tobii EyeX for Windows is minimizing mouse and keyboard use, and removes several of the steps between thought and action. Everything happens rapidly and effortlessly, with th... [Read More]
Pizza Hut Restaurants Subconscious Menu with Tobii Eye Tracking - YouTube
Pizza Hut Restaurants, in partnership with Tobii, has developed a digital menu that could change the dining experience forever. Pizza Hut restaurants are launching a creepy new interactive menu which will watch patrons’ eyes to determine what they’d like on their pies. Touting the automated menu as “the future of dining,” the pizza chain says they “have developed the world’s first Subconscio... [Read More]
Image of Court Rules Police Can Force Users to Unlock iPhones With Fingerprints, But Not Passcodes - Mac Rumors
Court Rules Police Can Force Users to Unlock iPhones With Fingerprints, But Not Passcodes - Mac Rumors
A Circuit Court judge in Virginia has ruled that fingerprints are not protected by the Fifth Amendment, a decision that has clear privacy implications for fingerprint-protected devices like newer iPhones and iPads. According to Judge Steven C. Fucci, while a criminal defendant can't be compelled to hand over a passcode to police officers for the purpose of unlocking a cellular device, law enfor... [Read More]