Chinese government researchers contributed the data of 2,143 Uighurs to the Allele Frequency Database, an online search platform run by Dr. Kidd that was partly funded by the United States Department of Justice until last year. The database, known as Alfred, contains DNA data from more than 700 populations around the world.
(17. Juli 2009) After a three-year search for a set of data tapes that promised to offer an improved view of the first moonwalk by Neil Armstrong and Buzz Aldrin 40 years ago this month, NASA revealed on Thursday that the tapes were more than likely erased years ago and reused. But the agency then unveiled the next best thing: restored footage based on their best broadcast quality tapes.
(16. Juli 2009) The good news is he found where they went. The bad news is they were part of a batch of 200,000 tapes that were degaussed — magnetically erased — and re-used to save money.
(28. Juni 2009) The Sunday Express can now reveal that the missing tapes containing the original high quality images have been found.
If the visual data can be retrieved, Nasa is set to reveal them to the world as a key plank of celebrations to mark the 40th anniversary of the landings next month.
The tapes show in much more detail than almost anyone has previously seen the surface of the moon beneath the patriotic symbol of the US flag.
Crucially, they could once and for all dispel 40 years of wild conspiracy theories.
(5. August 2005) THE heart-stopping moments when Neil Armstrong took his first tentative steps onto another world are defining images of the 20th century: grainy, fuzzy, unforgettable.
But just 37 years after Apollo 11, it is feared the magnetic tapes that recorded the first moon walk – beamed to the world via three tracking stations, including Parkes’s famous „Dish“ – have gone missing at NASA’s Goddard Space Centre in Maryland.
A desperate search has begun amid concerns the tapes will disintegrate to dust before they can be found.
(6.11.2018) In Jordan, state intelligence officials said they had worked closely with the C.I.A. to thwart more than a dozen terrorist plots in the past several months in the Middle East and Europe.
A classified American military program in Jordan, called Operation Gallant Phoenix, is scooping up data collected in commando raids in Syria and Iraq and funneling it to law enforcement agencies in Europe and Southeast Asia, according to United States military and intelligence officials who described details of the initiative on condition of anonymity because of its secretive nature.
(28.2.2018) Israeli military’s intelligence branch, known as “Unit 8200,” told the Australian authorities about a hidden explosive device destined for an Etihad Airways flight leaving Sydney for Abu Dhabi last July.
Earlier this month, the German weekly Der Spiegel reported on Israel’s role in helping Germany and European countries in combating Islamist terror. It revealed that Israel is part of a covert multinational counter-terrorism operation named “Gallant Phoenix” that gathers intelligence on Islamic State war criminals returning from the Middle East to Europe.
(5.2.2018) Israel is part of a secret counter- terrorism coalition that gathers intelligence on Islamic State combatants returning from the Syrian war to Europe, according to a Sunday report in Der Spiegel magazine.
The intelligence collection and anti-terror campaign is named “Gallant Phoenix” and includes a total of 21 states. Germany, the US and Jordan are part of the coalition that is based in Jordan at the US Joint Special Operations Command.
Fake videos and audio keep getting better, faster and easier to make, increasing the mind-blowing technology’s potential for harm if put in the wrong hands.
Marriott values our guests and understands the importance of protecting personal information. We have taken measures to investigate and address a data security incident involving the Starwood guest reservation database. The investigation has determined that there was unauthorized access to the database, which contained guest information relating to reservations at Starwood properties on or before September 10, 2018. This notice explains what happened, measures we have taken, and some steps you can take in response.
On September 8, 2018, Marriott received an alert from an internal security tool regarding an attempt to access the Starwood guest reservation database. Marriott quickly engaged leading security experts to help determine what occurred. Marriott learned during the investigation that there had been unauthorized access to the Starwood network since 2014. Marriott recently discovered that an unauthorized party had copied and encrypted information, and took steps towards removing it.
Marriott International revealed that hackers had breached its Starwood reservation system and had stolen the personal data of up to 500 million guests.
The assault started as far back as 2014, and was one of the largest known thefts of personal records, second only to a 2013 breach of Yahoo that affected three billion user accounts and larger than a 2017 episode involving the credit bureau Equifax.
An unprecedented number of Americans living outside the U.S. have requested ballots, up seven times over the last midterm election in 2014, according to data from the non-partisan U.S. Vote Foundation, which registers a large portion of overseas voters. The group declined to disclose the number who had requested ballots.
Whom Americans vote for is private. But other information in their state voter files is public information; depending on the state, it can include details like their name, address, phone number and party affiliation and when they voted. The apps try to match the people in a smartphone’s contacts to their voter files, then display some of those details.
The UK government is still polishing its porn filtering law. The latest updates to the law show there’s been some effort put forth to make the law less stupid, but even these additions don’t make the law (or its implementation) much better.
It’s no secret that the Vietnamese government is no fan of the open internet. All the way back in 2002 we wrote about the government requiring people to register just to create a website. That same year we were writing about people being arrested for posting criticism of the government. In 2008, we wrote about the Vietnamese government banning „subversive“ blogs as well. With the rise of social media, Vietnam has shifted its focus there. In 2013, it banned news reporting on social media, saying it should be for personal use only. In 2014, we wrote about how the government was abusing Facebook’s own reporting tools to shut down dissenters from using the site. And at the beginning of this year, we wrote about how the government now employed around 10,000 people whose only job was to monitor the internet for dissent.
And now it’s going to get even worse — to a degree that might even lead some of the big internet companies to leave Vietnam entirely. And we have the NSA (partially) to blame.
(16.8.2016) We’ve already made it quite clear where we stand on Peter Thiel financing a number of lawsuits against Gawker Media as some sort of retaliation for some articles he didn’t like. Lots of people who really hate Gawker don’t seem to care how problematic Thiel’s actions are, but you should be concerned, even if you dislike Gawker — in part, because many of the lawsuits Thiel appears to be backing are clearly bogus and just designed to bankrupt the company, which happened a couple months ago.
This week is the auction to see who ends up with Gawker, and Thiel is taking a weird victory lap with a silly and misleading oped in the NY Times where he argues that this was really all about making a stand for privacy and has nothing to do with shitting on the First Amendment. There’s a lot in the article that’s bullshit, and it deserves a thorough debunking, so here we go.
(18.10.2018) Palantir is discussing with investment banks Credit Suisse and Morgan Stanley plans to go public as soon as the second half of 2019, the people said. Some bankers have told the firm it could go public with a valuation of as much as $41 billion—depending in part on the timing—or twice what it was most recently…
(14. November 2002) Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend — all these transactions and communications will go into what the Defense Department describes as “a virtual, centralized grand database.“
To this computerized dossier on your private life from commercial sources, add every piece of information that government has about you — passport application, driver’s license and bridge toll records, judicial and divorce records, complaints from nosy neighbors to the F.B.I., your lifetime paper trail plus the latest hidden camera surveillance — and you have the supersnoop’s dream: a “Total Information Awareness“ about every U.S. citizen.
(29.5.2018) The William Safire column, „You Are a Suspect,” was published in the Times in 2002—two years before Facebook was created. And Safire isn’t talking about social networks or digital advertising—he’s discussing Total Information Awareness, a US Defense Advanced Research Projects Agency (Darpa) program that proposed mining vast amounts of Americans’ data to identify potential national security threats. The virtual grand database was to belong to the Department of Defense, which would use it to identify behavior patterns that would help to predict emerging terrorist threats.
Because of the time and effort that will be involved in getting Solid off the group, Berners-Lee is not only taking a sabbatical from MIT, he is also reducing his involvement in the World Wide Web Consortium (W3C). On top of this, he has created startup called inrupt, the mission of which is „to ensure that Solid becomes widely adopted by developers, businesses, and eventually… everyone; that it becomes part of the fabric of the web“.
The proposal from Raffi Krikorian, the Democratic National Committee’s chief technology officer and a former Uber executive, would allow Democrats and Republicans alike to combat misinformation by serving those people accurate information.
(April 2018) In the past few decades, methods of communication have dramatically changed. The development of new technology, especially the birth of the internet, has transformed the way individuals communicate with each other and increased the amount of information that can be collected by several orders of magnitude. In particular, communications – emails, instant messages, calls, social media posts, web searches, requests to visit a website – may transit multiple countries before reaching their destination. The dispersion of communications across the internet vastly increases the opportunities for communications and data to be intercepted by foreign governments, who may then share them with other governments.
As methods of communications have dramatically changed, so too has intelligence gathering. Intelligence agencies have developed increasingly advanced ways of accessing, acquiring, storing, analysing and disseminating information. In particular, they have developed methods for acquiring communications and data traveling the internet.
The data was exposed via rsync, a common file transfer protocol used to mirror or backup large data sets. The rsync server was not restricted by IP or user, and the data set was downloadable to any rsync client that connected to the rsync port.
He’s a rarity in the industry: a security sleuth who doesn’t hack. Instead, he searches communication ports and the internet’s hive of connected devices to find information inadvertently made public. His discoveries have included medical records, airport security files, hotel bookings, a terrorist screening database and 87 million Mexican voter registration records. Once the sensitive information has been secured, he publicly discloses that the data had been revealed.
Mr. Vickery found Level One’s data through an exposed backup server.
Anyone going through the southwestern gate of prestigious Peking University can now have their face scanned by a camera instead of showing their ID card to security guards under a trial run of the system that started on Wednesday.
Many of the top universities in China restrict – and even ban – members of the public from visiting their campuses, and students and staff are often required to produce proof of identity before they can enter.
Street crime prediction “has already achieved results in Europe and the United States,” said Mami Kajita, who established the data-analysis company Singular Perturbations Inc. last year in hopes of developing a Japanese version of the methods used in the United States.
US justices say law enforcement needs a warrant to follow your digital footprints.
(18.4.2009) starting this month, the Federal Bureau of Investigation will join 15 states that collect DNA samples from those awaiting trial and will collect DNA from detained immigrants — the vanguard of a growing class of genetic registrants.
The F.B.I., with a DNA database of 6.7 million profiles, expects to accelerate its growth rate from 80,000 new entries a year to 1.2 million by 2012
(28.4.2018) They tracked their suspect through his family tree.
Police said they checked the crime scene DNA against one of the genealogy sites that have lately become popular — databases filled with the profiles of people who have volunteered their genetic codes in the hope of discovering their relatives and ancestors. GEDmatch, a free service, confirmed that police used it to identify DeAngelo.
The rational panic we see in the flurry of emails we’ve all been getting, with subject lines of varying degrees of grief, and often with plaintive appeals to re-join previously vibrant subscriber communities now being split apart by regulatory pressure, reveals fundamental defects in the regulation’s implementation. As does the blocking of EU users by terrified entities afraid that doing so is the only way to cope with the GDPR’s troubling scope.
The GDPR’s list of infirmities is long, ranging from its complexity and corresponding ambiguity, to some notably expensive requirements, to the lack of harmonization among crucial aspects of member states‘ local implementations, to the failure of many of these member states to produce these local regulations at any point usefully in advance of today, and to the GDPR’s untested global reach. And they fairly raise the concern that the GDPR is poorly tailored to its overall policy purpose.
The company said it could increase the overall efficiency of the workers by manipulating the frequency and length of break times to reduce mental stress.
Hangzhou Zhongheng Electric is just one example of the large-scale application of brain surveillance devices to monitor people’s emotions and other mental activities in the workplace, according to scientists and companies involved in the government-backed projects.
Oleg Syromolotov said that together with foreigners the Russian terrorist database „has long contained more than 100,000 people“
(3.4.2018) The House of Lords Communications Committee has opened an inquiry exploring the possibility of internet regulation in the UK, seeking input around issues such as the legal liability of online platforms for the content they host and how they moderate it, and how user data is protected.
The inquiry comes as platforms such as Facebook continue to draw public hostility for its role in enabling the activities of Cambridge Analytica, the data science firm at the heart of ongoing allegations of exploiting the data of Facebook users to influence the EU referendum campaign and the 2016 US presidential election.
Der Bundesnachrichtendienst, von jeher eine Behörde mit eigenen Entwicklern und höchst eigenen Aufgabenstellungen, hat zur gleichen Zeit ein Pilotprojekt begonnen mit der amerikanischen Firma Palantir. Die wurde mit Hilfe des Investmentfonds In-Q-Tel der amerikanischen CIA aus der Taufe gehoben und bedient seither Sicherheitsbehörden in den Vereinigten Staaten und anderen Ländern. Vor allem mit dem Versprechen, der Zusammenführung von Informationen aus ganz unterschiedlichen Quellen. Der Auftrag des deutschen Auslandsgeheimdienstes war sicher nicht unmaßgeblich dafür, dass inzwischen auch eine deutsche Tochter namens Palantir Technologies GmbH existiert. Die ihren Sitz in Wiesbaden hat und es – quasi vor Ort – inzwischen auch geschafft hat, aus dem hessischen Innenministerium einen Auftrag an Land zu ziehen.
(24.3.2018) Dass Cambridge Analytica die persönlichen Daten von etwa 50 Millionen Facebook-Nutzern abgegriffen hat, ist unter Datenschutzaspekten natürlich äußerst bedenklich. Doch der Riesenaufruhr, den die gleichzeitige Veröffentlichung des Vorfalls in der New York Times und im Guardian ausgelöst hat, geht auf finstere Beweggründe zurück. Die Medien schüren den Skandal, um ein Klima zu schaffen, das die Unterdrückung von politischem Widerstand im größten sozialen Netzwerk der Welt begünstigt. Dabei werden sie von den Geheimdiensten und führenden Kongressabgeordneten der Demokratischen Partei unterstützt.
Two weeks ago we promised to take a hard look at the information apps can use when you connect them to Facebook as well as other data practices. Today, we want to update you on the changes we’re making to better protect your Facebook information. We expect to make more changes over the coming months — and will keep you updated on our progress. Here are the details of the nine most important changes we are making.
To restore privacy, we must stop surveillance before it even asks for consent.
Finally, don’t forget the software in your own computer. If it is the non-free software of Apple, Google or Microsoft, it spies on you regularly. That’s because it is controlled by a company that won’t hesitate to spy on you. Companies tend to lose their scruples when that is profitable. By contrast, free (libre) software is controlled by its users. That user community keeps the software honest.
Zuckerberg told Reuters in a phone interview that Facebook already complies with many parts of the law ahead of its implementation in May. He said the company wanted to extend privacy guarantees worldwide in spirit, but would make exceptions, which he declined to describe.
Modi is the most popular politician on Indian social media. His app has been downloaded more than five million times, and his Twitter account has 41.4 million followers.
Alderson alleged that whenever a user created a profile on Modi’s Android app, it shared their personal data without their consent.