Google eavesdropping tool installed on computers without permission

Google does not care about you, your privacy, your family, or your safety. They exist to make money. They are NOT a benign helpful utility, they sold you out a long time ago. Everything you do on the web is open for bidding like a cattle rancher’s auction. All your movements, clicks, actions, subs, and more are sold on the open market. They sold you out.

Source link:

http://www.theguardian.com/technology/2015/jun/23/google-eavesdropping-tool-installed-computers-without-permission

Quoted from the source:

“Privacy campaigners and open source developers are up in arms over the secret installing of Google software which is capable of listening in on conversations held in front of a computer.  First spotted by open source developers, the Chromium browser – the open source basis for Google’s Chrome – began remotely installing audio-snooping code that was capable of listening to users.  It was designed to support Chrome’s new “OK, Google” hotword detection – which makes the computer respond when you talk to it – but was installed, and, some users have claimed, it is activated on computers without their permission.  “Without consent, Google’s code had downloaded a black box of code that – according to itself – had turned on the microphone and was actively listening to your room,” said Rick Falkvinge, the Pirate party founder, in a blog post. “Which means that your computer had been stealth configured to send what was being said in your room to somebody else, to a private company in another country, without your consent or knowledge, an audio transmission triggered by … an unknown and unverifiable set of conditions.”

Tags / Keywords:
#stop #redflex #news #world #NSA  #red #flex #LAPD #police #spy #news #tech #technology #tracking  #sellout #violation #freedom #deletefacebook #privacy #marketing #bigdata #user #profile #capitalism #fascisim #neocons #ladder climbing #narcism #stocks #money #business #ticker

Advertisements

Former red light camera CEO pleads guilty to bribery, fraud in Ohio

ONE MORE REASON TO STOP REDFLEX AND THE IMPENDING SURVEILLANCE STATE

Source link: http://arstechnica.com/tech-policy/2015/06/former-red-light-camera-ceo-pleads-guilty-to-bribery-fraud-in-ohio/

Quoted from the above site:

Former red light camera CEO pleads guilty to bribery, fraud in Ohio

Redflex ex-CEO Karen Finley also to plead guilty in Chicago case in August 2015.

A former CEO of Redflex, the embattled red light camera vendor, has pleaded guilty to bribery and wire fraud in Columbus and Cincinnati, Ohio. In December 2013, Ars reported on red light cameras nationwide, and in particular, Redflex’s four cameras in the central California town of Modesto.

Karen Finley was indicted on related charges in August 2014 in Chicago. She pleaded not guilty, and had been set to go to trial in October 2015. But new court filings show she is now scheduled to change her plea in August 2015.

As prosecutors wrote in a statement on Friday:

From December 2005 to February 2013, Finley served as CEO of a red light camera enforcement company. As part of her plea agreement, Finley admitted that, between 2005 and 2013, she participated in a scheme in which the company made campaign contributions to elected public officials in the cities of Columbus and Cincinnati through a consultant retained by the company. According to admissions made in connection with her plea, Finley and others, including another executive of the company, agreed to provide the conduit campaign contributions with the understanding that the elected public officials would assist the company in obtaining or retaining municipal contracts, including a photo red light enforcement contract with the City of Columbus. Finley also admitted she and her co-conspirators concealed the true nature and source of the payments by the consultant’s submission and the company’s payment of false invoices for “consulting services,” which funds the consultant then provided to the campaigns of the elected public officials.

Tags / Keywords:

#stop #redflex #news #world #NSA  #red #flex #LAPD #police #spy #news #tech #technology #tracking  #sellout #violation #freedom #deletefacebook #privacy #marketing #bigdata #user #profile #capitalism #fascisim #neocons #ladder climbing #narcism #stocks #money #business #ticker #votecoin

Facebook denies fresh allegation that it DOES collect the text you decided against posting

Facebook sold you out people. Voting next year may be a total charade, but you can vote with your actions, your speech, and how you spend your money. So cas your righteous vote today. Delete your facebook, and stop participating in a system that sold you our and it violating the general privacy of users and non-users.

Original source link:

http://www.information-age.com/technology/information-management/123459286/facebook-denies-fresh-allegation-it-does-collect-text-you-decided-against-posting

Excerpt:

Facebook collects all content that is typed into its website, even if it is not posted, a tech consultant has claimed.

In December 2013, it was reported that Facebook plants code in browsers that returns metadata every time somebody types out a status update or comment but deletes it before posting.

At the time, Facebook maintained that it only received information indicating whether somebody had deleted an update or comment before posting it, and not exactly what the text said.

>See also: Twitter CFO’s leaked email to Snapchat CEO reveals telling insight into Facebook and mobile monetisation

However, Príomh Ó hÚigínn, a tech consultant based in Ireland, has claimed this is not the case after inspecting Facebook’s network traffic through a developer tool and screencasting software.

‘I realised that any text I put into the status update box was sent to Facebook’s servers, even if I did not click the post button,’ he wrote on his blog yesterday.

Referring to the GIF he created below, he found that a HTTP post request was sent to Facebook each time he wrote out a status, containing the exact text he entered.

– See more at: http://www.information-age.com/technology/information-management/123459286/facebook-denies-fresh-allegation-it-does-collect-text-you-decided-against-posting#sthash.tMMMFtVJ.dpuf”

REDFLEX TAGS

TAGS: operation jade helm 15 #operationjadehelm #news #world #NSA  #redflex #LAPD #police #spy #news #tech #technology #tracking #redflex #sellout #violation #freedom #deletefacebook #privacy #marketing #bigdata #user #profile #capitalism #fascisim #neocons #ladder climbing #narcism #stocks #money #business #ticker

Top websites secretly track your device fingerprint

Source: http://www.kuleuven.be/english/news/2013/several-top-websites-use-device-fingerprinting-to-secretly-track-users

Excerpt:

A new study by KU Leuven-iMinds researchers has uncovered that 145 of the Internet’s 10,000 top websites use hidden scripts to extract a device fingerprint from users’ browsers. Device fingerprinting circumvents legal restrictions imposed on the use of cookies and ignores the Do Not Track HTTP header. The findings suggest that secret tracking is more widespread than previously thought.

Top websites secretly track your device fingerprint

© Shutterstock

Device fingerprinting, also known as browser fingerprinting, is the practice of collecting properties of PCs, smartphones and tablets to identify and track users. These properties include the screen size, the versions of installed software and plugins, and the list of installed fonts. A 2010 study by the Electronic Frontier Foundation (EFF) showed that, for the vast majority of browsers, the combination of these properties is unique, and thus functions as a ‘fingerprint’ that can be used to track users without relying on cookies. Device fingerprinting targets either Flash, the ubiquitous browser plugin for playing animations, videos and sound files, or JavaScript, a common programming language for web applications.

This is the first comprehensive effort to measure the prevalence of device fingerprinting on the Internet. The team of KU Leuven-iMinds researchers analysed the Internet’s top 10,000 websites and discovered that 145 of them (almost 1.5%) use Flash-based fingerprinting. Some Flash objects included questionable techniques such as revealing a user’s original IP address when visiting a website through a third party (a so-called proxy).

The study also found that 404 of the top 1 million sites use JavaScript-based fingerprinting, which allows sites to track non-Flash mobile phones and devices. The fingerprinting scripts were found to be probing a long list of fonts – sometimes up to 500 – by measuring the width and the height of secretly-printed strings on the page.

Do Not Track

The researchers identified a total of 16 new providers of device fingerprinting, only one of which had been identified in prior research. In another surprising finding, the researchers found that users are tracked by these device fingerprinting technologies even if they explicitly request not to be tracked by enabling the Do Not Track (DNT) HTTP header.

The researchers also evaluated Tor Browser and Firegloves, two privacy-enhancing tools offering fingerprinting resistance. New vulnerabilities – some of which give access to users’ identity – were identified.

Device fingerprinting can be used for various security-related tasks, including fraud detection, protection against account hijacking and anti-bot and anti-scraping services. But it is also being used for analytics and marketing purposes via fingerprinting scripts hidden in advertising banners and web widgets.

To detect websites using device fingerprinting technologies, the researchers developed a tool called FPDetective. The tool crawls and analyses websites for suspicious scripts. This tool will be freely available at http://homes.esat.kuleuven.be/~gacar/fpdetective/ for other researchers to use and build upon.

The findings will be presented at the 20th ACM Conference on Computer and Communications Security this November in Berlin.”

Judge: IP-Address Doesn’t Identify a Movie Pirate

Source link: http://www.reuters.com/article/2015/04/10/us-food-agriculture-glyphosate-idUSKBN0N029H20150410

The filmmakers behind the action movie “Manny” have filed hundreds of lawsuits against BitTorrent pirates this year, but not all have been successful. In a prominent ruling Florida District Court Judge Ursula Ungaro refused to issue a subpoena, arguing that IP-address evidence is not enough to show who has downloaded a pirated movie.

ip-addressWhile relatively underreported, many U.S. district courts are still swamped with lawsuits against alleged film pirates.

One of the newcomers this year are the makers of the action movie Manny. Over the past few months “Manny Film” has filed 215 lawsuits across several districts.

Like all copyright holders, the makers of the film rely on IP-addresses as evidence. They then ask the courts to grant a subpoena, forcing Internet providers to hand over the personal details of the associated account holders.

In most cases the courts sign off on these requests, but in Florida this isn’t as straightforward.

When District Court Judge Ursula Ungaro was assigned a Manny Film case she asked the company to explain how an IP-address can pinpoint the actual person who downloaded a pirated film. In addition, she asked them to show that geolocation tools are good enough to prove that the alleged pirate resides in the Court’s district.

In a detailed reply the filmmakers argued that IP-addresses can identify the defendant and that a refusal to grant a subpoena would set a “dangerous precedent.” Manny Film further stated that “all other courts” disagreed with the notion that an IP-address is not a person.

This last remark didn’t go down well with Judge Ungaro. In an order handed down this week she cites various cases where courts ruled that IP-addresses don’t always identify the alleged offenders.

“Due to the risk of ‘false positives,’ an allegation that an IP address is registered to an individual is not sufficient in and of itself to support a claim that the individual is guilty of infringement,” wrote the Judge citing a 2012 case, one of many examples.”

A cautionary tale of online privacy: How to keep your identity private!

A cautionary tale of online privacy: How to keep your identity private!

Modern surveillance state: 5 CREEPIEST Ways Tinder Stalkers Can Find You

Tags…

#redflex #privacy #stalker #google #police #spy #news #tech #technology #tracking #sellout #violation #freedom #deletefacebook #facebookruinedtheinternet #rights #USA #camera #violation #snooping #nwo

FBI really doesn’t want anyone to know about “stingray” use by local cops

From source:

FBI really doesn’t want anyone to know about “stingray” use by local cops
Memo: Cops must tell FBI about all public records requests on fake cell towers.

by Cyrus Farivar – Feb 10, 2015 4:46am PST

Paul Jacobson

Feds’ position on decoy cell-site towers continues anti-privacy theme.
If you’ve ever filed a public records request with your local police department to learn more about how cell-site simulators are used in your community—chances are good that the FBI knows about it. And the FBI will attempt to “prevent disclosure” of such information.

Not only can these devices, commonly known as “stingrays,” be used to determine a phone’s location, but they can also intercept calls and text messages. During the act of locating a phone, stingrays also sweep up information about nearby phones. Last fall, Ars reported on how a handful of cities across America are currently upgrading to new hardware that can target 4G LTE phones.

The newest revelation about the FBI comes from a June 2012 letter written by the law enforcement agency to the Minnesota Bureau of Criminal Apprehension. It was first acquired and published by the Minneapolis Star Tribune in December 2014—similar language likely exists between the FBI and other local authorities that use stingrays.

As the letter states:

In the event that the Minnesota Bureau of Criminal Apprehension receives a request pursuant to the Freedom of Information Act (5 USC 552) or an equivalent state or local law, the civil or criminal discovery process, or other judicial, legislative, or administrative process, to disclose information concerning the Harris Corporation [REDACTED] the Minnesota Bureau of Criminal Apprehension will immediately notify the FBI of any such request telephonically and in writing in order to allow sufficient time for the FBI to seek to prevent disclosure through appropriate channels.

How a stingray works:

TAGS: #redflex #LAPD #police #spy #news #tech #technology #tracking #redflex #sellout #violation #freedom