zenpundit.com » surveillance

Archive for the ‘surveillance’ Category

Fire cats and canine surveillance systems

Saturday, September 7th, 2019

[ by Charles Cameron — following on from Cats as 16th century weapons, foxes as Old Testament precursors ]
.

And here you go again — bringing us up to date with an associative memory leap..

The cat as 16th century offensive weapon, the dog as contemporary defense — alert at all times, and
vociferous when detecting suspicious activity!

Thanks to @EMluvsPibbles

Invisibility, Jeff Sharlet’s The Family, and the goddess Kubjikaa

Saturday, August 31st, 2019

[ by Charles Cameron — it’s like a waterfall ]
.

It’s like a waterfall: you stumble on an idea that comes from the mouth of Doug Coe, describing the principle behind the influence of The Family, of which he was the long-time leader —

— and it turns out the same principle is referenced in an article on surveillance in Defense One

— only to re-emerge in Dr Mark SG Dyczkowski‘s work on the tradition, philosophy and practice of the goddess Kubjikaa.

**

There’s clearly a principle at work here that could find application in many fields, contexts, silos — and the concatenation of such instances is itself a demonstration of the value of silo-breaking thinking.

FWIW, I wouldn’t have so much as heard of the Goddess Kubjikaa were it not for my half-century friendship with Mark Dyczkowski, to whom I owe so much, and into the waters of whose scholarship so deep I have dipped no more than a toe.

0

Surveillance

Tuesday, January 30th, 2018

[ by Charles Cameron — gift horse, Trojan horse, back door — take your pick ]
.

DoubleQuote!

**

Liz Sly, reporting from Beirut:

U.S. soldiers are revealing sensitive and dangerous information by jogging

An interactive map posted on the Internet that shows the whereabouts of people who use fitness devices such as Fitbit also reveals highly sensitive information about the locations and activities of soldiers at U.S. military bases, in what appears to be a major security oversight.

The Global Heat Map, published by the GPS tracking company Strava, uses satellite information to map the locations and movements of subscribers to the company’s fitness service over a two-year period, by illuminating areas of activity.

Strava says it has 27 million users around the world, including people who own widely available fitness devices such as Fitbit and Jawbone, as well as people who directly subscribe to its mobile app. [..]

In war zones and deserts in countries such as Iraq and Syria, the heat map becomes almost entirely dark — except for scattered pinpricks of activity. Zooming in on those areas brings into focus the locations and outlines of known U.S. military bases, as well as of other unknown and potentially sensitive sites — presumably because American soldiers and other personnel are using fitness trackers as they move around. [..]

The Pentagon has encouraged the use of Fitbits among military personnel and in 2013 distributed 2,500 of them as part of a pilot program to battle obesity.

Unanticipated consequences..

**

Amira El Masait, from Rabat:

After Building New AU Headquarters, China Spies on Addis Ababa Facility By Amira El Masaiti

In 2012, the Chinese government “graciously offered” African States a gift and constructed the African Union’s headquarters in Addis Ababa. The act of soft diplomacy proved to be a rather self-serving maneuver to spy on the activities and discussions being conducted by leaders of the exclusive continental group.

In Addis Ababa, ministers and heads of states meet twice a year to discuss major continental issues. While strict security measures give the impression that that building is closely monitored and secured, an unseen security threat was present from 2012 until 2017. The threat was from none other than those who built the headquarters: the Chinese. An investigation conducted by “Le Monde Afrique” exposed Chinese espionage efforts.

According to the report, for five years, between midnight and 2 a.m., computer servers were reaching a peak in data transfer activity. A computer scientist noticed the oddity of the situation. The organization’s technical staff later discovered that the AU servers were all connected to servers located in Shanghai.

Every night, the secrets of the AU were being stored more than 8,000 km away by what was thought to be a diplomatic ally of Africa.

The glass tower $200 million complex was gifted to the African Union in 2012. The computer systems were fully equipped by the Chinese, allowing them to open an undocumented portal that gives Chinese administrators access to the AU’s computing system. This “backdoor” is an intentional fault put into code to allow hackers and intelligence agencies to gain illicit access to information.

Shoulda looked that gift horse in the mouth..

“Following this discovery, we have taken some steps to strengthen our cybersecurity,” a AU official told Le Monde.

But at least, “The Chinese have nothing to listen to. They have never colonized us. They have supported the struggles of independence on the continent and help us economically today,” an AU official told Le Monde anonymously.

Another official believes that, “They are not alone.” In fact, the US National Security Agency (NSA) and the British intelligence agencies (GCHQ) have had their share of surveillance on the AU building, according to documents which were extracted by Le Monde, in collaboration with The Intercept.

Aaah!

Orwell, Fascism, &c – we need our own red lines, but where?

Wednesday, August 16th, 2017

[ by Charles Cameron — how far gone are we — from a sorta leftist-centrist-don’t-really-fit-labels POV? ]
.

I’m not sure what exactly JM was responding to here, there have been too many pointers..

**

I for one don’t think Charlottesville stacks up against Kristallnacht, and am wary of the words Fascism and Nazi. I wholeheartedly agree with JM Berger in his piece today, Calling them Nazis:

There’s an increasingly common argument online against referring to the alt-right by its chosen name. “Call them Nazis” is the refrain. If you haven’t said it yourself, you’ve probably seen other people saying it.

While this approach may be understandable and may suit certain rhetorical purposes, it’s a grave mistake for journalists and experts who substantively study and cover the movement to embrace this approach.

JM continues:

The alt-right category is extremely important to understanding what’s happening in this movement. Nazis are only part of this movement, or more correctly neo-Nazis, since most of them aren’t German nationalists. If neo-Nazis were America’s only problem, it would be a much smaller problem.

**

My concern here is with a somewhat different angle, and not specifically with the Charlottesville clashes. I’m noting the widespread tendency to suggest we’re already in Brownshirt territory, if not deeper in than that, and I think it may be a bit premature.

IMO, we need to be cautious in where we draw the lines that say, beyond here is Fascism, or Nazism, it seems to me: exaggeration only serves to discredit those who indulge.

There are real problems, both with overt swastika-wavers and with those who support or merely tolerate them. Which way the wind will blow over the coming few years, however, is yet to be seen.

**

However, getting back to Orwell

— it does seem to me that scooping up more than a million IP addresses of epople who may have an interest in protesting Trump gies way beyond some kind of Orwell Limit.

Orwell kept his resistance movement cellular and basically unnowable: datamining the web blows an enormous hole in that strategy.

I’d have to say that with today’s news about DOJ vs DisruptJ20, one of my personal Orwell Red Lines has been crossed.

Of a non-comparative use of the DoubleQuotes method

Tuesday, August 25th, 2015

[ by Charles Cameron — further thoughts on the advantages of seeing double ]
.

I’ve said before that when I was at The Arlington Institute, my boss used to ask me to watch out for “early indicators”, and joked that in my book, two is the first number — I don’t see an “indicator” until I see a pattern emerging.

Putting it bluntly, one point is pointless — things could go anywhere from there. Two points suggest a line, a link, a connection — a possible, maybe even plausible, trend.

And so it is with the two photos above. Here the point is not to compare and contrast the two images of surveillance cameras wearing party hats, but to see that they represent a class — the presence of two concrete instances strongly implies the higher level abstraction: hah! they’re watching us!

It’s that sense I have of two being the beginning of thought that makes me so fond of the DoubleQuotes format — and of Arthur Koestler‘s insight, which I’m always quoting, about creation occurring at the intersection of two spheres..

koestler-model

If I’m a fundamentalist about anything, it’s the notion that it takes two to tango!


Switch to our mobile site