STATEN ISLAND DA BOUGHT CLEARVIEW FACE RECOGNITION SOFTWARE WITH CIVIL FORFEITURE CASH

THE STATEN ISLAND district attorney’s use of the highly controversial Clearview face recognition system included attempts to dig up the social media accounts of homicide victims and was paid for with equally controversial asset forfeiture cash, according to city records provided to The Intercept.

Clearview has garnered international attention and intense criticism for its simple premise: What if you could instantly identify anyone in the world with only their picture? Using billions of images scraped from social media sites, Clearview sells police and other governmental agencies the ability to match a photo to a name using face recognition, no search warrant required — a power civil libertarians and privacy advocates say simply places too much unsupervised power in the hands of police.

The use of Clearview by the Staten Island district attorney’s office was first reported by Gothamist, citing city records obtained by the Legal Aid Society. Subsequent records procured via New York State Freedom of Information Law request and provided to The Intercept now confirm the initial concerns about the tool’s largely unsupervised use by prosecutors. According to spokesperson Ryan Lavis, the DA’s office “completely stopped utilizing Clearview as an investigative tool last year.”

Yet the documents provide new information about how Staten Island prosecutors used the notorious face recognition tool and show that the software was paid for with funds furnished by the Justice Department’s Equitable Sharing Program. The program lets state and local police hand seized cash and property over to a federal law enforcement agency, whereupon up to 80 percent of the proceeds are then sent back the original state or local department to pocket.

Keep reading

CDC Tracked Millions of Phones to See If Americans Followed COVID Lockdown Orders

The Centers for Disease Control and Prevention (CDC) bought access to location data harvested from tens of millions of phones in the United States to perform analysis of compliance with curfews, track patterns of people visiting K-12 schools, and specifically monitor the effectiveness of policy in the Navajo Nation, according to CDC documents obtained by Motherboard. The documents also show that although the CDC used COVID-19 as a reason to buy access to the data more quickly, it intended to use it for more general CDC purposes.

Location data is information on a device’s location sourced from the phone, which can then show where a person lives, works, and where they went. The sort of data the CDC bought was aggregated—meaning it was designed to follow trends that emerge from the movements of groups of people—but researchers have repeatedly raised concerns with how location data can be deanonymized and used to track specific people.

The documents reveal the expansive plan the CDC had last year to use location data from a highly controversial data broker. SafeGraph, the company the CDC paid $420,000 for access to one year of data to, includes Peter Thiel and the former head of Saudi intelligence among its investors. Google banned the company from the Play Store in June. 

Keep reading

FBI Conducted Millions of Searches of Americans’ Electronic Data in 2021 without a Warrant

The FBI conducted millions of searches of Americans’ electronic data in 2021 without a warrant, according to a new report released by the Office of the Director of National Intelligence.

The FBI claims it conducted the searches as they sought to curb cyberattacks.

“In the first half of the year, there were a number of large batch queries related to attempts to compromise U.S. critical infrastructure by foreign cyber actors,” according to the report, Bloomberg reported. “These queries, which included approximately 1.9 million query terms related to potential victims — including U.S. persons — accounted for the vast majority of the increase in U.S. person queries conducted by FBI over the prior year.”

The ACLU called the FBI’s warrantless spying an invasion of privacy ‘on an enormous scale.’

Keep reading

10 times the intel community violated the trust of US citizens, lawmakers and allies

No matter where you stand politically, a growing body of facts raises the question: Is there systemic corruption or misfeasance at work inside America’s intelligence agencies? 

By that, I don’t mean people stealing money. I mean officials who are stealing our privacy — using the tools of intelligence-gathering and law-enforcing, which are meant to protect Americans, to instead spy on them, to gather information that isn’t the government’s business (at least not without a court’s approval). And, in some instances, it appears, to punish or silence those with whom they disagree — personal and political foes, in and out of government — rather than to pursue and protect Americans from the country’s real enemies. 

Perhaps more alarming is the growing evidence that suggests some officials at all levels in intelligence and justice agencies are operating in a way that is clearly intended to serve their own political beliefs and interests — not the public’s interests. 

And sometimes, it appears, they operate not just in direct defiance of their superiors but of the Congress, the courts and the very laws of the land as well. (Almost as disturbing, Congress, for its part, seems all too willing to allow all of this to take place, when it becomes known, rather than using its authority to stop the misfeasance, punish the miscreants who lie or stonewall, and protect their constituents.) 

This is not, in my view, a partisan political question.

The evidence leading us to ask such a disturbing question indicates there are forces inside our intelligence agencies that are more persistent and powerful than any single political party or administration. They can usurp the intentions of the many fine intelligence officers serving our country. 

Keep reading

AMERICAN PHONE-TRACKING FIRM DEMO’D SURVEILLANCE POWERS BY SPYING ON CIA AND NSA

IN THE MONTHS leading up to Russia’s invasion of Ukraine, two obscure American startups met to discuss a potential surveillance partnership that would merge the ability to track the movements of billions of people via their phones with a constant stream of data purchased directly from Twitter. According to Brendon Clark of Anomaly Six — or “A6” — the combination of its cellphone location-tracking technology with the social media surveillance provided by Zignal Labs would permit the U.S. government to effortlessly spy on Russian forces as they amassed along the Ukrainian border, or similarly track Chinese nuclear submarines. To prove that the technology worked, Clark pointed A6’s powers inward, spying on the National Security Agency and CIA, using their own cellphones against them.

Virginia-based Anomaly Six was founded in 2018 by two ex-military intelligence officers and maintains a public presence that is scant to the point of mysterious, its website disclosing nothing about what the firm actually does. But there’s a good chance that A6 knows an immense amount about you. The company is one of many that purchases vast reams of location data, tracking hundreds of millions of people around the world by exploiting a poorly understood fact: Countless common smartphone apps are constantly harvesting your location and relaying it to advertisers, typically without your knowledge or informed consent, relying on disclosures buried in the legalese of the sprawling terms of service that the companies involved count on you never reading. Once your location is beamed to an advertiser, there is currently no law in the United States prohibiting the further sale and resale of that information to firms like Anomaly Six, which are free to sell it to their private sector and governmental clientele. For anyone interested in tracking the daily lives of others, the digital advertising industry is taking care of the grunt work day in and day out — all a third party need do is buy access.

Keep reading

Adults and Children Continuously Targeted for Data Extraction, Surveillance and Censorship

It isn’t an exaggeration to say that not a single day goes by without a new data exploit, hack, breach, leak, or scandal involving censorship by private companies and government agencies. Of course, this is all compounded even further by the fact that more devices contain more sensors that connect to the internet than ever before, offering many new methods for targeting groups and individuals. It has been estimated that by 2030 there could be 125 billion devices — potentially 15 per user — that in some way will comprise the ever-expanding Internet of Things ecosystem.

Amid this sea of two-way data traffic, we have a massive amount of targeted advertising and personally identifiable information extraction that has shown very often to all be done without users’ consent. If there is consent at all, it very likely is through lenthy and confusing Terms and Conditions that almost no one reads in their entirety. Worse still is the proven targeting of children’s data. Lawmakers continue to attempt to rein in these consumer-unfriendly practices, but their current proposals will likely do more harm than good. At this point it should be obvious that even if legislative measures are effectively created, such a waiting game only leaves all of us, including our kids, increasingly vulnerable at any given moment. People want – and deserve – to become personally responsible for their own security and privacy.

Fortunately, there are residential proxy providers on the opposing side that understand the rising awareness by the public of these data violations and creepy intrusions. These companies are doing everything they can to offer the tools necessary for individuals to protect their family’s data and privacy, while also offering increasing freedom to reach the websites that we do want to visit.

Keep reading

Find Out and Fix What Big Data Says About You

I thought I knew all about the information that consumer reporting agencies were collecting on me. Then I discovered The Work Number—a database that reports every paycheck I’ve received from my company, with net and gross amounts, going back to my hire date six years ago.

Another consumer reporting agency shows the results of a 2016 echocardiogram. (It was normal.) Yet another tracks insurance claims on my home and car. If I’d made too many returns at retail stores or bounced a check at a casino, that could show up in a database as well.

“Any data point that someone can track, there’s going to be a bureau or someone gathering information and selling that information,” says Matthew Loker, a consumer protection attorney in Arroyo Grande, California.

Unfortunately, not all the information being reported is accurate—and mistakes can have serious consequences. Loker says one of his clients lost a lucrative job offer because an employment screening company confused her with a drug smuggler. By the time the error was fixed, the position was filled. Other people have been denied insurance, apartments, bank accounts, and government benefits because of database errors.

But discovering and correcting mistakes is no small task.

Keep reading

White House, IRS, CDC, and many other US government websites sending data to Big Tech via Google tracking code

Most of the major US federal government websites and numerous state and local government websites are sending real-time surveillance data back to Google as users browse their websites. Even websites where users are submitting sensitive or personal information, such as the Federal Bureau of Investigation’s (FBI’s) tips page and the Internal Revenue Service (IRS) website, contain tracking code that sends real-time visitor data back to Google.

Most of these government websites contain tracking code from the web traffic analytics tool Google Analytics. This code collects detailed user data which is sent to Google’s servers, analyzed, and presented to website owners via an online dashboard.

Google Analytics automatically collects data on the pages visited, the time and duration of each visit, and other visitor data (such as the device, browser, operating system, and screen resolution of visitors). It can also be configured to collect data on more specific actions such as when users click or tap specific links, download content, or fill out forms.

Some government websites also have code from other Google services (such as DoubleClick, Google Adsense, Google Maps, Google Play, and YouTube) and other tech giants (such as Facebook, Microsoft, and Twitter) embedded on some of their pages.

The US government openly admits to using Google Analytics tracking code on 400 executive branch domains and 5,700 total websites. It even displays this surveillance data publicly via a real-time online dashboard which also tracks visitors with Google Analytics.

Keep reading