Swiss Police And Military Are Setting Up Roadblocks and Checking Finger Prints Near WEF Summit

The WEF’s annual summit in Davos, Switzerland begins January 16th but there have already been reports of police and military personnel blocking roads and checking fingerprints near Davos.

Disclose.tv was the first to break the story on Twitter and released a video of Swiss police scanning a person’s finger outside of Davos.

The independent news aggregator captioned their video by writing “Police and military have blocked the access roads to Davos, where Klaus Schwab is holding his World Economic Forum summit.People, vehicles, and fingerprints are now being checked.”

Keep reading

Researchers: California’s Digital License Plates Could Allow Hackers to Track Location

Security researchers were able to gain “super administrative access” to Reviver, the sole provider of California’s digital license plates, and track the GPS location of all of vehicles they are associated with.

A team of security researchers successfully obtained “full super administrative access,” which allowed them to perform a slew of tasks involving the company’s user accounts and vehicles, according to a blog post by researcher Sam Curry.

After gaining access, a hacker could track the physical GPS location of all license plates of Reviver customers, as well as change the slogan or personalized message at the bottom of the plates to arbitrary text.

The personalized messages on the license plates involves a feature that allows customers to digitally update the bottom section of their plates to display different messages, such as, “Go Team!” or “looking for a trail.”

Additionally, a hacker could update any vehicle status to “STOLEN,” which would alert authorities.

“An actual attacker could remotely update, track, or delete anyone’s REVIVER plate,” Curry wrote in his blog post, revealing that he and his team had found security vulnerabilities across the automotive industry, not just with Reviver.

Keep reading

The way you walk is apparently as unique as your fingerprint and the UAE wants to use it to track criminals

According to reports out of the United Arab Emirates (UAE), biometrics are gaining an ever more prominent place in local law enforcement’s activities, and the type of technology involved is also getting ever more fine-grained.

Accuracy aside – but apparently, the way you walk – as interpreted by mass surveillance technology – can now be used as an incriminating piece of evidence against you in this country.

As always with these stories, one wonders how in the world the police ever managed to do their job for centuries (as they have done) without relying on invasive and controversial technologies like this – but that is not the question most media outlets are willing to “bother” with just now.

Instead, we’re hearing from one of the Emirates, Dubai, that the thing with biometric surveillance of the population – handily justified as something positive, when there’s a criminal case that can be attached to the practice – has now gone well beyond fingerprinting, facial recognition, and such.

Keep reading

NYC Mayor Eric Adams: “Big Brother is protecting you”

In New York City, political rather than professional considerations seem to be dictating the way the police will proceed in fighting crime, including the degree to which this will include the use of invasive technology.

And Mayor Eric Adams must not have read the book, because, in dystopian form, he has just declared that “Big Brother” is actually the good guy.

Namely, reports suggest the mayor, now a year in office, is well aware of how the city has spiraled into crime – there’s been a whopping increase of 23.5 percent during the past year alone.

This “lawlessness” allegedly came as a consequence of the pandemic measures that among other things exacerbated the problem of homelessness, anti-police protests, and the erosion in morale among the force.

Now Adams, a Democrat, wants to please both his “moderate” supporters by dealing with crime, and the “progressives on the left” who oppose most anything that might resemble backing the police, by doubling down on methods as controversial as facial recognition and surveillance cameras.

The mayor appears to be one of those who believe that law enforcement suddenly has no means to fight crime, even though it has done it before this technology became available. And so the focus of his tenure going forward will be in employing “techniques to more accurately identify common criminal patterns and develop profiles of perpetrators,” Politico sums up the tactic Adams prefers.

While at it, Adams would also like to give “Big Brother” – a symbol of ruthless authoritarian state surveillance – an image makeover.

With this in mind, he accused his fellow politicians of being afraid to “embrace technology” and of instead considering technology-driven surveillance “a boogeyman” – that many will agree it is.

Not Adams.

Keep reading

Governments are Still Free to Use the Pegasus Software Without Human Rights Safeguards in Place

In September 2022, Szabolcs Panyi, a Hungarian investigative journalist with Direkt36, published a story on how the Pegasus software was brought to Hungary. The report demonstrates how easily governments can exploit surveillance technologies without human rights safeguards in place.

Panyi — also a target of Pegasus — explained the circumstances under which Pegasus was brought to Hungary and the National Security Service’s (NSS) role in the transaction. Direkt36 revealed in 2021 that journalists and politicians in Hungary could have been tapped with the tool.

According to Direkt36, the National Security Service commissioned Communication Technologies Ltd. in 2017 to acquire the spy software developed by the Israeli company NSO Group. According to sources familiar with the circumstances of the transaction, the spyware was purchased for HUF 3 billion (approx. EUR 7.45 million). The investigation found that the whole transaction remained secret because, in October 2017, Parliament’s National Security Committee voted unanimously and without question to exempt the purchase of the spy software from public procurement.

Keep reading

You’d Better Watch Out: The Surveillance State Is Making a List, And You’re On It

You’d better watch out—you’d better not pout—you’d better not cry—‘cos I’m telling you why: this Christmas, it’s the Surveillance State that’s making a list and checking it twice, and it won’t matter whether you’ve been bad or good.

You’ll be on this list whether you like it or not.

Mass surveillance is the Deep State’s version of a “gift” that keeps on giving…back to the Deep State.

Geofencing dragnets. Fusion centers. Smart devices. Behavioral threat assessments. Terror watch lists. Facial recognition. Snitch tip lines. Biometric scanners. Pre-crime. DNA databases. Data mining. Precognitive technology. Contact tracing apps.

What these add up to is a world in which, on any given day, the average person is now monitored, surveilled, spied on and tracked in more than 20 different ways by both government and corporate eyes and ears.

Big Tech wedded to Big Government has become Big Brother.

Every second of every day, the American people are being spied on by a vast network of digital Peeping Toms, electronic eavesdroppers and robotic snoops.

This creepy new era of government/corporate spying—in which we’re being listened to, watched, tracked, followed, mapped, bought, sold and targeted—has been made possible by a global army of techno-tyrants, fusion centers and Peeping Toms.

Consider just a small sampling of the tools being used to track our movements, monitor our spending, and sniff out all the ways in which our thoughts, actions and social circles might land us on the government’s naughty list, whether or not you’ve done anything wrong.

Keep reading

World Health Organization meets to discuss granting of increased surveillance powers under pandemic treaty

The unelected global health agency the World Health Organization (WHO) is currently meeting to consider a draft version of a controversial international pandemic treaty that will give the WHO increased surveillance powers.

The new surveillance powers are detailed in Article 10 (“Strengthening and sustaining capacities for pandemic prevention, preparedness, response and recovery of health systems”) and Article 17 (“One Health”) of the draft treaty. They include requirements for the WHO’s member states to “build and reinforce surveillance systems” across both the public and private sector and to strengthen the WHO’s “One Health surveillance systems.”

In its fact sheet on One Health, the WHO cites Covid-19 as one of the main drivers for expanding its One Health approach and notes that the COVID-19 pandemic “put a spotlight on the need for a global framework for improved surveillance and a more holistic, integrated system.”

While the draft treaty doesn’t mention contact tracing and testing, these were two of the main surveillance tools that were used to track the spread of Covid-19 during the pandemic and create a mass surveillance dragnet. Not only did this result in many citizens being forced to use surveillance apps and devices but the data was often abused by governments and third parties.

Not only does this treaty grant the WHO new surveillance powers but it also recognizes “the central role of WHO” and deems it to be “the directing and coordinating authority on international health work.”

We obtained a copy of the draft international pandemic treaty for you here.

Keep reading

FBI Director pushes for “lawful access” to encrypted messages

FBI Director Christopher Wray last month spoke before the US Senate Homeland Security and Governmental Affairs Committee, and, among the many topics dedicated to “threats to the homeland,” he addressed that of encryption.

His remarks on this are carried by the FBI website under the heading, “Lawful Access.” Wray opens by saying that the agency is a strong advocate of “wide and consistent” encryption use.

The FBI chief goes on with platitudes, and not particularly sincere ones (considering his statements that followed): protecting online data and privacy is a top priority, and encryption a key element.

But…

“Encryption without lawful access, though, does have a negative effect on law enforcement’s ability to protect the public,” Wray says, and thus continues the FBI’s long-since established stance that strong encryption prevents law enforcement from performing their duties.

Keep reading

A Peek Inside the FBI’s Unprecedented January 6 Geofence Dragnet

The FBI’s biggest-ever investigation included the biggest-ever haul of phones from controversial geofence warrants, court records show. A filing in the case of one of the January 6 suspects, David Rhine, shows that Google initially identified 5,723 devices as being in or near the US Capitol during the riot. Only around 900 people have so far been charged with offenses relating to the siege.

The filing suggests that dozens of phones that were in airplane mode during the riot, or otherwise out of cell service, were caught up in the trawl. Nor could users erase their digital trails later. In fact, 37 people who attempted to delete their location data following the attacks were singled out by the FBI for greater scrutiny.

Geofence search warrants are intended to locate anyone in a given area using digital services. Because Google’s Location History system is both powerful and widely used, the company is served about 10,000 geofence warrants in the US each year. Location History leverages GPS, Wi-Fi, and Bluetooth signals to pinpoint a phone within a few yards. Although the final location is still subject to some uncertainty, it is usually much more precise than triangulating signals from cell towers. Location History is turned off by default, but around a third of Google users switch it on, enabling services like real-time traffic prediction. 

The geofence warrants served on Google shortly after the riot remained sealed. But lawyers for Rhine, a Washington man accused of various federal crimes on January 6, recently filed a motion to suppress the geofence evidence. The motion, which details the warrant’s process and scale, was first reported by journalist Marcy Wheeler on her blog, Emptywheel

In a statement, a Google spokesperson defended the company’s handling of geofence warrants.

“We have a rigorous process for geofence warrants that is designed to protect the privacy of our users while supporting the important work of law enforcement,” the company said. “When Google receives legal demands, we examine them closely for legal validity and constitutional concerns, including overbreadth, consistent with developing case law. If a request asks for too much information, we work to narrow it. We routinely push back on overbroad demands, including overbroad geofence demands, and in some cases, we object to producing any information at all.”

Google requires a three-step process for geofence warrants to narrow their scope to only those most likely to be guilty of a crime. In the first and broadest step, the FBI asked Google to identify all devices in a 4-acre area, including the Capitol and its immediate surroundings, between 2 pm and 6:30 pm on January 6. Google initially found 5,653 active devices that “were or could have been” within the geofence at that time. When Google added in data from devices that only connected to its servers later that day, or the next, the number increased to 5,723. (Location History works in airplane mode because phones can continue to receive GPS satellite signals.)

Keep reading

Massachusetts Department of Public Health SECRETELY Colluded With Google To Auto-Install Contact-Tracing SPYWARE On Your Phone

The Massachusetts Department of Public Health is facing a class action lawsuit after colluding with Google to repeatedly auto-install contact-tracing spyware on the smartphones of over a million Massachusetts residents without their permission or consent.

According to a class action lawsuit filed by the New Civil Liberties Alliance, a nonpartisan nonprofit civil rights organization, the Department of Public Health rolled out the contact tracing app it worked with Google to create in April 2021.

“The App causes an Android mobile device to constantly connect and exchange information with other nearby devices via Bluetooth and creates a record of such other connections. If a user opts in and reports being infected with COVID-19, an exposure notification is sent to other individuals on the infected user’s connection record,” the NCLA explains in the complaint, Wright v. Massachusetts Department of Public Health.

Initially, the app which obtains users private locations and health information was voluntarily installed.

Keep reading