Logging Into a Brave New World: How Facial Recognition Just Got Personal

Surprising exactly no one paying attention to the slow erosion of privacy, the US General Services Administration (GSA) has rolled out its shiny new toy: facial recognition technology for accessing login.gov. Yes, that beloved single sign-in service, connecting Americans to federal and state agencies, now wants your face—literally. This gateway, clicked into over 300 million times a year by citizens has decided the most efficient way to keep us all “safe” is by scanning our mugs. How very 2024.

But of course, this little “upgrade” didn’t just appear overnight. Oh no, it dragged itself through bureaucratic purgatory, complete with false starts, delays, and some spicy critique from the Inspector General. Apparently, login.gov had been fibbing about its compliance with Identity Assurance Level 2 (IAL2)—a fancy label for a government-mandated security standard that requires real-deal verification of who you are. Up until now, that “verification” meant having someone eyeball your ID card photo and say, “Yep, that looks about right,” rather than dipping into the biometric surveillance toolkit.

Facial recognition was supposed to make its grand debut last year, but things got complicated when it turned out login.gov wasn’t actually playing by the rules it claimed to follow. The Inspector General, ever the fun police, caught them misrepresenting their tech’s adherence to the IAL2 standard, causing the rollout to stall while everyone scrambled to figure out if they could get away with this. Now, after enough piloting to give a nervous airline passenger a heart attack, login.gov has finally reached compliance, but not without leaving a greasy trail of unanswered questions in its wake.

Keep reading

Battlespace Of The Brain: The Military Conquest To “Master The Human Domain”

In 1970, Zbigniew Brzezinski published his book Between Two Ages: America’s Role in the Technetronic Era.[i]Brzezinski was a futurist who cofounded the globalist Trilateral Commission with David Rockefeller and Jimmy Carter in 1973, and served as national security adviser to Jimmy Carter between 1977 and 1981. Brzezinski understood the impact of science on society:

Speaking of a future at most decades away, an experimenter in intelligence control asserted, “I foresee a time when we shall have the means and therefore, inevitably, the temptation to manipulate the behavior and intellectual functioning of all the people through environmental and biochemical manipulation of the brain.” (Between Two Ages: America’s Role in the Technetronic Era, p. 15)

Another threat, less overt but no less basic, confronts liberal democracy. More directly linked to the impact of technology, it involves the gradual appearance of a more controlled and directed society. Such a society would be dominated by an elite whose claim to political power would rest on allegedly superior scientific know-how. Unhindered by the restraints of traditional liberal values, this elite would not hesitate to achieve its political ends by using the latest modern techniques for influencing public behavior and keeping society under close surveillance and control. (pp. 252–253)

In an August 2017 seminar at Lawrence Livermore National Laboratory’s Center for Global Security Research (CGSR) guest speaker Dr. James Giordano, of Georgetown University Medical Center, offered a sobering view of the calculated war on our brains, the temptation to manipulate the behavior and intellectual functioning of all the people, and the potential for weaponizing neuroscientific discoveries and neurotechnologies.

Dr. Giordano is a professor in the Departments of Neurology and Biochemistry, Chief of the Neuroethics Studies Program, and Co-director of the O’Neill-Pellegrino Program in Brain Science and Global Health Law and Policy at Georgetown University Medical Center in Washington, DC. He is a Senior Researcher and Task Leader of the Working Group on Dual-Use of the EU Human Brain Project, and has served as a Senior Science Advisory Fellow of the Strategic Multilayer Assessment group of the Joint Chiefs of Staff of the Pentagon.

His 2017 briefing, “Brain Science from Bench to Battlefield: The Realities—and Risks—of Neuroweapons,”[ii]explores the potentials of brain science in the context of public/private research for national defense, including using nano-pharmaceutical low-dose toxins or other chemicals as a controlled vector.

Keep reading

Drone swarms targeting US military bases are operated by ‘mother ship’ UFO, claims top Pentagon official

A retired, senior Pentagon official has confirmed that UFO ‘mother ships’ were spotted ‘releasing swarms of smaller craft’ — adding further mystery to the still-unexplained intrusions over multiple US military bases.

His statements come amid the release of 50 pages of Air Force records related to provocative ‘drone’ incursions, that one general calls ‘Close Encounters at Langley.’

For at least 17 nights last December, swarms of noisy, small UFOs were seen at dusk ‘moving at rapid speeds’ and displaying ‘flashing red, green, and white lights’ penetrating the highly restricted airspace above Langley Air Force Base in Virginia.

Senior ex-Pentagon security official Chris Mellon told DailyMail.com that the episode was ‘part of a much larger pattern affecting numerous national security installations.’

‘Two of the notable aspects,’ he said, ‘are the fact our drone signal-jamming devices have proven ineffective and these craft are making no effort to remain concealed.’

‘In fact, in some instances,’ as Mellon took pains to emphasize, ‘it is clear they want to be seen as though taunting us.’

Keep reading

Invisible text that AI chatbots understand and humans can’t? Yep, it’s a thing.

What if there was a way to sneak malicious instructions into Claude, Copilot, or other top-name AI chatbots and get confidential data out of them by using characters large language models can recognize and their human users can’t? As it turns out, there was—and in some cases still is.

The invisible characters, the result of a quirk in the Unicode text encoding standard, create an ideal covert channel that can make it easier for attackers to conceal malicious payloads fed into an LLM. The hidden text can similarly obfuscate the exfiltration of passwords, financial information, or other secrets out of the same AI-powered bots. Because the hidden text can be combined with normal text, users can unwittingly paste it into prompts. The secret content can also be appended to visible text in chatbot output.

The result is a steganographic framework built into the most widely used text encoding channel.

“Mind-blowing”

“The fact that GPT 4.0 and Claude Opus were able to really understand those invisible tags was really mind-blowing to me and made the whole AI security space much more interesting,” Joseph Thacker, an independent researcher and AI engineer at Appomni, said in an interview. “The idea that they can be completely invisible in all browsers but still readable by large language models makes [attacks] much more feasible in just about every area.”

To demonstrate the utility of “ASCII smuggling”—the term used to describe the embedding of invisible characters mirroring those contained in the American Standard Code for Information Interchange—researcher and term creator Johann Rehberger created two proof-of-concept (POC) attacks earlier this year that used the technique in hacks against Microsoft 365 Copilot. The service allows Microsoft users to use Copilot to process emails, documents, or any other content connected to their accounts. Both attacks searched a user’s inbox for sensitive secrets—in one case, sales figures and, in the other, a one-time passcode.

When found, the attacks induced Copilot to express the secrets in invisible characters and append them to a URL, along with instructions for the user to visit the link. Because the confidential information isn’t visible, the link appeared benign, so many users would see little reason not to click on it as instructed by Copilot. And with that, the invisible string of non-renderable characters covertly conveyed the secret messages inside to Rehberger’s server. Microsoft introduced mitigations for the attack several months after Rehberger privately reported it. The POCs are nonetheless enlightening.

Keep reading

Open AI Wants to Build Data Centres That Would Consume More Electricity Per Year Than the Whole of the U.K.

Over the past few months, the newswires have been hot with stories about the large-scale data centres that will be required to meet the needs of the forthcoming revolution in Artificial Intelligence (AI). How much electricity will these new data centres consume and what does that mean for the electricity demand forecasts underpinning the plans for Net Zero?

Recent Date Centre Announcements

To give a flavour of the scale of data centre developments that are coming, it is helpful to look at recent announcements from large tech companies. Back in March, it was announced that Amazon had bought a 960MW data centre that is powered by an adjacent nuclear power station. In April, Mark Zuckerberg CEO of Meta that owns Facebook and Instagram said energy requirements may hold back the build out of AI data centres. He also talked about building data centres that would consume 1GW of power.

Last month, Oracle chairman Larry Ellison announced that Oracle was designing a data centre that would consume more than 1GW that would be powered by three small modular nuclear reactors (SMRs). Then Microsoft also got in on the act when it announced it had done a deal with U.S. utility Constellation to restart the 835MW Three Mile Island (TMI) Unit 1 nuclear power plant to power its data centres. Anxious not to be left out, Sundar Pichai, CEO of Google said they too were working on 1GW data centres and saw money being invested in SMRs.

Finally, Sam Altman of OpenAI, the creator of ChatGPT has trumped them all by pitching the idea of 5GW data centres to the White House. Altman has been heard talking of building five to seven of these leviathans.

Bloomberg, usually a driver of the Net Zero band wagon, has reluctantly admitted that there’s not enough clean energy – nuclear or otherwise – to satisfy AI’s voracious appetite and gas will have to fill the gap. America’s national security and energy security is eclipsing climate concerns.

This admission is important because it acknowledges that such important infrastructure cannot rely upon the vicissitudes of the weather. These data centres need a source of electricity that is reliable and always available. It would be absurd to think that a ChatGPT user will want to receive a message saying their request cannot be processed because it is not windy enough.

Keep reading

Swedish Police Want to Fight Crime with Live Facial Recognition

The Swedish police want to use facial recognition in real time to crack down on serious crimes.

Government investigators have already drafted a bill that will make it possible to use the technology. The regulation, however, still needs to be completed before it can be tabled, National Police Chief Petra Lundh told publicly funded radio broadcaster Sveriges Radio last week.

Lundh also noted that the legislation must comply with the EU AI Act and could potentially be temporary until crime rates settle down.

Sweden has been experiencing a flood of gang-related attacks, including firearms and explosives, leading the Scandinavian country to crown itself with the title of highest per capita gun violence rate in the European Union. Police Chief Lundh believes law enforcement agencies could use cameras to find suspects.

“It is not unusual that we have a picture of the likely perpetrator, but then we cannot find him or her,” Lundh says.

The suggestion has already been met with criticism. The technology could make incorrect matches for people with dark skin leading to perceptions that the AI is racist, says lawyer Kristofer Stahre.

“I am worried about what consequences it may have for the Swedish people,” he says.

The Swedish government has been working on expanding the use of biometric data in policing on other fronts.

Keep reading

In a rare disclosure, the Pentagon provides an update on the X-37B spaceplane

After more than nine months in an unusual, highly elliptical orbit, the US military’s X-37B spaceplane will soon begin dipping its wings into Earth’s atmosphere to lower its altitude before eventually coming back to Earth for a runway landing, the Space Force said Thursday.

The aerobraking maneuvers will use a series of passes through the uppermost fringes of the atmosphere to gradually reduce its speed with aerodynamic drag while expending minimal fuel. In orbital mechanics, this reduction in velocity will bring the apogee, or high point, of the X-37B’s orbit closer to Earth.

Bleeding energy

The Space Force called the aerobraking a “novel space maneuver” and said its purpose was to allow the X-37B to “safely dispose of its service module components in accordance with recognized standards for space debris mitigation.”

While the reusable Boeing-built X-37B spaceplane is designed to land like an aircraft on a runway, the service module, mounted to the rear of the vehicle, carries additional payloads. At the end of the mission, the X-37B jettisons the disposable service module before reentry. The Space Force doesn’t want this section of the spacecraft to remain in its current high-altitude orbit and become a piece of space junk.

“Once the aerobrake maneuver is complete, the X-37B will resume its test and experimentation objectives until they are accomplished, at which time the vehicle will deorbit and execute a safe return as it has during its six previous missions,” the Space Force said.

The Space Force has identified mobility in orbit as a key focus for its next-generation space missions. This would allow satellites to more freely move between altitudes and orbital inclinations than they can today. Commanders don’t want a spacecraft’s movements to be constrained by the amount of fuel it carries, allowing satellites to “maneuver without regret.”

Space Force leaders have discussed in-orbit refueling, more efficient propulsion technologies, and other ways to achieve this end. Aerobraking is another way to lower a spacecraft’s orbit without using precious propellant.

“This first-of-a-kind maneuver from the X-37B is an incredibly important milestone for the United States Space Force as we seek to expand our aptitude and ability to perform in this challenging domain,” said Gen. Chance Saltzman, the Space Force’s chief of space operations.

Keep reading

The U.S. Government Is Dramatically Expanding The Use Of Facial Recognition Technology

Do you want to live in a society where you are required to have your face scanned wherever you go?  If not, you may want to speak up now while you still can.  As you will see below, the U.S. government is aggressively expanding the use of facial recognition technology for identification verification purposes.  For now, the use of facial recognition technology will be optional.  But as we have seen before, once a voluntary option is adopted by enough people our leaders have a way of making it mandatory.  Of course it isn’t just our government that is pushing facial recognition technology.  It is popping up throughout our society, and given enough time it would literally be everywhere.

Login.gov is billed as “a single sign-on solution for US government websites”, and now users of Login.gov will be given the option to use facial recognition technology to verify their identities

An online hub for Americans to access benefits and services across the federal government is giving its users a new option to sign on.

The General Services Administration will begin offering facial recognition technology as an option for users of Login.gov, a one-stop for government-provided public services, to verify their identities.

GSA’s Technology Transformation Services announced Wednesday it will allow Login.gov users to verify their identity online through facial technology that meets standards set by the National Institute of Standards and Technology’s 800-63-3 Identity Assurance Level 2 (IAL2) guidelines.

We are being told that this will help reduce identity theft and fraud, and I don’t know anyone that likes identity theft and fraud.

But do we really want to live in a dystopian world where our faces are constantly being scanned all the time?

I certainly don’t.

Keep reading

Ancient Construction Technology Discovered Under a Neolithic House

A groundbreaking discovery in Denmark has revealed evidence of an advanced technological structure dating back 5,000 years. While excavating a Neolithic site on the island of Falster, archaeologists uncovered a stone-paved root cellar for storing produce beneath an ancient dwelling. This significant find has challenged existing understandings of Neolithic life in Scandinavia, where early agricultural communities were thought to have employed simpler preservation methods.

The excavation, led by researchers from the Museum Lolland-Falster and Aarhus University, has been documented in a detailed study published in Radiocarbon.

The site at Nygårdsvej 3, was uncovered during construction work for a railway. It has proven to be an archaeological gold mine, well, as regards ancient architecture is concerned. Archaeologists identified two phases of house construction, both attributed to the Funnel Beaker Culture (also known as TRB or Trichterbecherkultur). This culture, which emerged around 4000 BC, marked the region’s shift from a hunter-gatherer society to a more sedentary lifestyle centered on agriculture and animal husbandry.

The houses discovered at the site followed a common architectural design of the period, known as the Mossby-type, which featured large double-span roofs supported by posts. The first house phase, made between 3080 and 2780 BC, had 38 postholes, while the second phase contained 35.

The floors of the houses were made from compacted loam, a mixture of sand and clay that provided a durable and stable surface. This is a construction material still in use in various parts of the world today.

Keep reading

Protective Nets To Shield F-22s Eyed For Airbase Swarmed By Mystery Drones

U.S. Air Force officials at Langley Air Force Base in Virginia are looking at installing anti-drone nets to help protect F-22 Raptor stealth fighters on the flightline. This comes nearly a year after the base was subjected to waves of still-mysterious drone incursions, which The War Zone was first to report. It also underscores the U.S. military’s continued lag when it comes to responding to the very real threats posed by uncrewed aerial systems, at home and aboard, and particular hurdles to doing so domestically.

Langley’s 633rd Contracting Squadron put out a notice on October 4 asking for information about potential counter-drone netting that could be installed around up to 42 existing open-ended sunshade-type shelters at the base. Langley, now technically part of Joint Base Langley-Eustis, is one of a select few bases to host F-22s and is a key component of the Air Force’s posture to defend the U.S. homeland.

The 633rd “is in the process of determining the acquisition strategy to obtain non-personal services for the Unmanned Ariel Services (UAS) Netting for East Ramp Metal Sunshades,” according to the contracting notice. “The intention of the netting is to deter and ultimately prevent the intrusion of UAS’s near airmen and aircraft. This initial sunshade netting installation on the metal sunshade (bay Alpha 1) shall serve as a proof of concept for the remaining sunshades.”

The “netting should be capable of disabling a Group 1/ “Small” Unmanned Aerial Systems (UAS), such as the DJI Matrice 300 RTK, while remaining attached,” the notice explains. Per the U.S. military’s definitions, drones in Group 1 can have weights of up to 20 pounds, fly up to 1,200 feet, and reach speeds of up to 100 knots.

Keep reading