{"id":57531,"date":"2018-01-30T21:03:30","date_gmt":"2018-01-30T21:03:30","guid":{"rendered":"http:\/\/zenpundit.com\/?p=57531"},"modified":"2018-02-01T04:23:27","modified_gmt":"2018-02-01T04:23:27","slug":"surveillance","status":"publish","type":"post","link":"https:\/\/zenpundit.com\/?p=57531","title":{"rendered":"Surveillance"},"content":{"rendered":"<p>[ by <strong>Charles Cameron<\/strong> &#8212; gift horse, Trojan horse, back door &#8212; take your pick ]<br \/>\n.<\/p>\n<p><strong>DoubleQuote!<\/strong><\/p>\n<blockquote><p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/zenpundit.com\/wp-content\/uploads\/2018\/01\/QUO-dq-suveillance.png\" alt=\"\" width=\"600\" height=\"628\" class=\"alignnone size-full wp-image-57546\" srcset=\"https:\/\/zenpundit.com\/wp-content\/uploads\/2018\/01\/QUO-dq-suveillance.png 600w, https:\/\/zenpundit.com\/wp-content\/uploads\/2018\/01\/QUO-dq-suveillance-287x300.png 287w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p><\/blockquote>\n<p>**<\/p>\n<p><strong>Liz Sly<\/strong>, reporting from Beirut:<\/p>\n<blockquote><p><a href=\"https:\/\/www.washingtonpost.com\/world\/a-map-showing-the-users-of-fitness-devices-lets-the-world-see-where-us-soldiers-are-and-what-they-are-doing\/2018\/01\/28\/86915662-0441-11e8-aa61-f3391373867e_story.html\">U.S. soldiers are revealing sensitive and dangerous information by jogging<\/a><\/p>\n<p>An interactive map posted on the Internet that shows the whereabouts of people who use fitness devices such as Fitbit also reveals highly sensitive information about the locations and activities of soldiers at U.S. military bases, in what appears to be a major security oversight.<\/p>\n<p>The Global Heat Map, published by the GPS tracking company Strava, uses satellite information to map the locations and movements of subscribers to the company\u2019s fitness service over a two-year period, by illuminating areas of activity. <\/p>\n<p>Strava says it has 27 million users around the world, including people who own widely available fitness devices such as Fitbit and Jawbone, as well as people who directly subscribe to its mobile app. [..]<\/p>\n<p>In war zones and deserts in countries such as Iraq and Syria, the heat map becomes almost entirely dark \u2014 except for scattered pinpricks of activity. Zooming in on those areas brings into focus the locations and outlines of known U.S. military bases, as well as of other unknown and potentially sensitive sites \u2014 presumably because American soldiers and other personnel are using fitness trackers as they move around. [..]<\/p>\n<p>The Pentagon has encouraged the use of Fitbits among military personnel and in 2013 distributed 2,500 of them as part of a pilot program to battle obesity.<\/p><\/blockquote>\n<p>Unanticipated consequences..<\/p>\n<p>**<\/p>\n<p><strong>Amira El Masait<\/strong>, from Rabat:<\/p>\n<blockquote><p><a href=\"https:\/\/www.moroccoworldnews.com\/2018\/01\/239343\/african-union-china-spies-addis-ababa\/\">After Building New AU Headquarters, China Spies on Addis Ababa Facility By Amira El Masaiti<\/a><\/p>\n<p>In 2012, the Chinese government \u201cgraciously offered\u201d African States a gift and constructed the African Union\u2019s headquarters in Addis Ababa. The act of soft diplomacy proved to be a rather self-serving maneuver to spy on the activities and discussions being conducted by leaders of the exclusive continental group.<\/p>\n<p>In Addis Ababa, ministers and heads of states meet twice a year to discuss major continental issues. While strict security measures give the impression that that building is closely monitored and secured, an unseen security threat was present from 2012 until 2017. The threat was from none other than those who built the headquarters: the Chinese. An investigation conducted by \u201cLe Monde Afrique\u201d exposed Chinese espionage efforts.<\/p>\n<p>According to the report, for five years, between midnight and 2 a.m., computer servers were reaching a peak in data transfer activity. A computer scientist noticed the oddity of the situation. The organization\u2019s technical staff later discovered that the AU servers were all connected to servers located in Shanghai.<\/p>\n<p>Every night, the secrets of the AU were being stored more than 8,000 km away by what was thought to be a diplomatic ally of Africa.<\/p>\n<p>The glass tower $200 million complex was gifted to the African Union in 2012. The computer systems were fully equipped by the Chinese, allowing them to open an undocumented portal that gives Chinese administrators access to the AU\u2019s computing system. This \u201cbackdoor\u201d is an intentional fault put into code to allow hackers and intelligence agencies to gain illicit access to information.<\/p><\/blockquote>\n<p>Shoulda looked that gift horse in the mouth..<\/p>\n<blockquote><p>\u201cFollowing this discovery, we have taken some steps to strengthen our cybersecurity,\u201d a AU official told Le Monde.<\/p>\n<p>But at least, \u201cThe Chinese have nothing to listen to. They have never colonized us. They have supported the struggles of independence on the continent and help us economically today,\u201d an AU official told Le Monde anonymously.<\/p>\n<p>Another official believes that, \u201cThey are not alone.\u201d In fact, the US National Security Agency (NSA) and the British intelligence agencies (GCHQ) have had their share of surveillance on the AU building, according to documents which were extracted by Le Monde, in collaboration with The Intercept.<\/p><\/blockquote>\n<p>Aaah!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[ by Charles Cameron &#8212; gift horse, Trojan horse, back door &#8212; take your pick ] . DoubleQuote! ** Liz Sly, reporting from Beirut: U.S. soldiers are revealing sensitive and dangerous information by jogging An interactive map posted on the Internet that shows the whereabouts of people who use fitness devices such as Fitbit also [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[527,329,526,144,45,936,440,1],"tags":[],"class_list":["post-57531","post","type-post","status-publish","format-standard","hentry","category-afghanistan","category-africa","category-charles-cameron","category-china","category-iraq","category-surveillance","category-syria","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/zenpundit.com\/index.php?rest_route=\/wp\/v2\/posts\/57531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zenpundit.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zenpundit.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zenpundit.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zenpundit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=57531"}],"version-history":[{"count":23,"href":"https:\/\/zenpundit.com\/index.php?rest_route=\/wp\/v2\/posts\/57531\/revisions"}],"predecessor-version":[{"id":57560,"href":"https:\/\/zenpundit.com\/index.php?rest_route=\/wp\/v2\/posts\/57531\/revisions\/57560"}],"wp:attachment":[{"href":"https:\/\/zenpundit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=57531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zenpundit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=57531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zenpundit.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=57531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}