Posts Tagged privacy

Yahoo eyes billboard that can spy on drivers inside their cars

By

 

Yahoo, under fire over this week’s revelation that it helped the federal government spy on its users, has applied for two related patents describing a camera-equipped billboard that can spy on drivers.

The patent applications, submitted in March 2015 and made public by the U.S. Patent and Trademark Office on Thursday, describe a billboard that has sensors including cameras, microphones and even retina scanners built in or positioned nearby.

“Image or video data may be processed to determine whether any individuals looked directly at the advertising content (e.g., using image recognition and/or eye tracking techniques),” said the patent documents, which use much of the same language in describing the technology.

Verbal reactions by passersby could be collected via microphones. “Audio data captured by one or more microphones may be processed using speech recognition techniques to identify keywords relating to the advertising that are spoken by members of the audience,” the documents said. “Image data or motion/proximity sensor data may be processed to determine whether any members of the audience paused or slowed down near the advertising content, from which it may be inferred that the pause or slowing was in response to the advertising content.”

The invention, which of course is not guaranteed to appear on roadsides, represents an attempt to bring online-style targeted advertising to billboard ads.

“Advertising in public places (e.g., roadside billboards, public transit, etc.) continues to be an important channel for advertisers even though it does not offer the kind of individual targeting by which online techniques are characterized,” the patent documents said.

“Many roadside billboards are still static printed images that must be manually installed and remain in place for long periods of time relative to the lifespan of an online ad. Some billboards have been implemented as large screens that display a fixed rotation of images… but while these billboards represent a step in the direction of the digital age, they lag far behind their online counterparts in a number of respects.”

The billboard could identify individual drivers via data from mobile devices, vehicle-navigation systems, cell towers, mobile apps and images, the documents said.

User databases would add demographic information about particular people in range of the billboard.

The system would also employ cameras and image-recognition software to identify the makes and models of vehicles to gather information about the “socioeconomic status” of people driving past. “The demographics of motorists during rush hour on a weekday in Silicon Valley can be expected to be very different from the demographics of mid-afternoon traffic in that same location on a weekend or Friday evening traffic headed into San Francisco,” the documents said.

While the patent documents describe individual targeting of advertising, the idea is to serve up ads that will appeal to as many people passing by as possible. The technology aims to create an “aggregate audience profile” of traffic passing a billboard at a particular time. That profile would be used to market space on billboards, with the space sold to advertisers in an auction process similar to that for online ads.

Yahoo is not the first company to pursue “smart” billboards. Clear Channel, a billboard-advertising company, earlier this year rolled out a program that links billboard ads to aggregate demographic information about passing motorists gathered by third party partners via the motorists’ mobile devices. Clear Channel’s “Radar” billboard-ad program does not, according to the company’s marketing material, use the cameras, microphones and other sensors described by Yahoo in its patent applications.

Read more: http://www.siliconbeat.com/2016/10/06/yahoo-eyes-billboard-that-can-spy-on-drivers-inside-their-cars/

Photo: Yahoo headquarters in Sunnyvale (LiPo Ching/Bay Area News Group)

Tags: , ,

NSA Collects “Untargeted” Texts, Controls “Unconnected” Computers

Written by  Joe Wolverton, II, J.D. 

NSA Collects "Untargeted" Texts, Controls "Unconnected" Computers

 Every day, people wake up to find that the walls of the surveillance state seem taller than they were the day before. In truth, the walls have been this imposing for years, but the blueprints leaked by Edward Snowden reveal the dizzying height of the structure being built while we pay attention to other things.

On January 16, the British newspaper The Guardian published a new page of the blueprint, and the information printed on it is disturbing.

According to top-secret documents, the National Security Agency has collected almost 200 million text messages a day from across the globe, using them to extract data including a person’s location, contact networks, and credit card details. 

Investigators from The Guardian and Britain’s Channel 4 News discovered these details of the NSA’s dragnet surveillance practices during a search of documents provided by Edward Snowden.

Perhaps the most offensive word used in The Guardian report is “untargeted.” Untargeted is another way of saying unconstitutional, which is a word probably not heard very often at the NSA.

When the NSA casts its massive surveillance net into the sea of global electronic communication without having first identified a target and without first having established probable cause to believe that target is breaking the law, then the NSA violates the fundamental civil liberties of everyone caught in its snare.

The Fourth Amendment to the Constitution is very clear:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Regardless of their arguments — and the opinions of secret courts that rubber stamp their petitions — the NSA may not legally collect and collate the text messages of millions of “untargeted” persons without at the same time violating the Fourth Amendment.

This is the very essence of tyranny and claims of “national security” remove neither the sting nor the seriousness of what is happening in our once-free Republic of laws.

So, why would the NSA want this immense trove of personal data? Reading the Snowden cache, The Guardian reports:

The NSA has made extensive use of its vast text message database to extract information on people’s travel plans, contact books, financial transactions and more — including of individuals under no suspicion of illegal activity.

There it is again: “individuals under no suspicion of illegal activity.” Every time readers see that phrase or a similar one, they should understand that the program being described is an assault on their basic rights and a substantial step toward shackling every one of them with invisible electronic restraints.

Not only is the NSA brazen enough to conduct such offensive operations, but they give them equally audacious titles. The text message collection program is called “Prefer” and is set out in a memo titled, “SMS Text Messages: A Goldmine to Exploit.”

A goldmine. The personal communications of millions of innocent men and women is considered nothing more than a motherlode to the federal agents who understand the inestimable worth of their haul.

Millions of potentially embarrassing private messages make it much much easier for a government bent on consolidating absolute control to coerce citizens to cooperate in constructing the walls of their own prison.

So, upon hearing that the NSA has eyes on everything done in the virtual world, many respond that the best way to keep out of sight is to stay off the Internet. That would seem like sound advice, if it weren’t for Quantum.

According to a story published January 14 in the New York Times, the NSA has installed software on almost 100,000 computers that gives the agency access to those computers, even when not connected to a wider network.

Typically, the NSA will upload the malicious software through the target computer’s Internet connection, but Quantum is a “secret technology” that allows the snoops to “enter and alter data” on computers that aren’t connected to a network. The Times article explains:

The technology, which the agency has used since at least 2008, relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. In some cases, they are sent to a briefcase-size relay station that intelligence agencies can set up miles away from the target.

So much for the safe harbor of staying off the Internet. For its part, the NSA is very proud of the program. It removes the barrier of network connection that once kept them from watching everybody. Using the the radio frequency secretly installed in the computer, the NSA can upload and download anything it wants to and from the target device.

If readers are interested in whether the hardware they own is known to have been hacked by the NSA, the German magazine Der Spiegel has published the NSA’s list of “hardware products that can secretly transmit and receive digital signals from computers.

Ironically, the technology enabling the offline surveillance is actually less sophisticated than many of the other tools used by the NSA to keep everyone under watch. The Times article describes one of the products the NSA deploys to conduct surveillance on computers not connected to a network.

One, called Cottonmouth I, looks like a normal USB plug but has a tiny transceiver buried in it. According to the catalog, it transmits information swept from the computer “through a covert channel” that allows “data infiltration and exfiltration.” Another variant of the technology involves tiny circuit boards that can be inserted in a laptop computer — either in the field or when they are shipped from manufacturers — so that the computer is broadcasting to the N.S.A. even while the computer’s user enjoys the false confidence that being walled off from the Internet constitutes real protection.

Why should we care that the NSA is reading our texts, tapping our computers, and surreptitiously sending and receiving data from computers not connected to the Internet? If we haven’t done anything wrong, we have nothing to fear. Right?

Wrong.

All men are endowed by their Creator with the right to be free from unwarranted searches and seizures. When the government takes away these rights, then there is no liberty, regardless of the pretexts of the powerful.

While it’s true that most Americans have “done nothing wrong” criminally speaking, it is equally true that most of us have done many embarrassing things that we would prefer not to have put in a file for future use by political enemies — inside or outside the government. What are these possible peccadilloes? Think bad credit, poor scholastic performance, Web surfing habits, sensitive medical diagnoses, etc.

Besides, the fact is that there is no evidence that the government’s constant surveillance and deprivation of liberty have made the “homeland” any safer. What, then, is the true purpose of the surveillance?

It isn’t security. Demanding freedom in exchange for safety is the economy of tyrants. When the federal government — or any government — robs citizens of their basic civil rights, then that government has become despotic by definition.

The question remains: Will Americans simply sit and watch as the walls get higher and the electronic chains get tighter?

Tags: , ,