Showing posts with label profiling. Show all posts
Showing posts with label profiling. Show all posts

Tuesday, 25 February 2014

The Poisonous Tentacles Of The State.


      We are all aware of the fact that we live under a state surveillance society. Every day we see the apparatus of the overt side of the surveillance, CCTV in all avenues of our lives, we know that we are profiled by where we draw cash, where we spend it, etc.. However we should be very aware that there is another side, the covert surveillance, the snooping in our private affairs unknown to us. Like it or not, the poisonous tentacles of the state reach into all aspects of our private life. Your texts, phone calls, your contacts on social networks and Internet viewing. Without being paranoid, to what extent are our actions, unknown to us, being shaped by agent provocateurs, paid servants of the state?

  
        One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction. It’s time to tell a chunk of that story, complete with the relevant documents.
       Over the last several weeks, I worked with NBC News to publish a series of articles about “dirty trick” tactics used by GCHQ’s previously secret unit, JTRIG (Joint Threat Research Intelligence Group). These were based on four classified GCHQ documents presented to the NSA and the other three partners in the English-speaking “Five Eyes” alliance. Today, we at the Intercept are publishing another new JTRIG document, in full, entitled “The Art of Deception: Training for Online Covert Operations”.
     By publishing these stories one by one, our NBC reporting highlighted some of the key, discrete revelations: the monitoring of YouTube and Blogger, the targeting of Anonymous with the very same DDoS attacks they accuse “hacktivists” of using, the use of “honey traps” (luring people into compromising situations using sex) and destructive viruses. But, here, I want to focus and elaborate on the overarching point revealed by all of these documents: namely, that these agencies are attempting to control, infiltrate, manipulate, and warp online discourse, and in doing so, are compromising the integrity of the internet itself.
Read the full article HERE:

Visit ann arky's home at www.radicalglasgow.me.uk


Friday, 10 January 2014

Fashion And Face Recognition.


      Surveillance is becoming an ever more important and intrusive state tool Today we are surrounded by CCTV, roaming vehicles with cameras continually snapping away at everybody and everything. On top of this we have the various arms of the state and large commercial corporations gleaning personal details form or social habits. Your are profiled for state and commercial purposes, whether you like it or not. The latest venture is face recognition. The following article may be of some use when you think of posting that photo on you favourite social network, or when you next venture in to town. 
      Adam Harvey is a Brooklyn-based artist whose work addresses the impact of surveillance technologies.
      Next year the Janus program, an initiative run by the director of national intelligence, will begin to collect photographs of people’s faces from social media websites and public video feeds. Machines will then use powerful algorithms to pair those photos with existing biometric profiles.
     The Janus program isn’t alone: Facial-recognition technology is quickly becoming a mainstay of commercial and government surveillance systems. While it can provide benefits in automation and security, it is also a threat to privacy. Sophisticated algorithms can already extract information about your gender, age and even mood from a single image, and then link those physical attributes to commercial or government databases.
This powerful surveillance technology is cheap, ubiquitous and unregulated.
      My project, CV Dazzle, explores how fashion can be used as camouflage from face-detection technology, the first step in automated face recognition. The name is derived from a type of World War I naval camouflage called Dazzle, which used cubist-inspired designs to break apart the visual continuity of a battleship and conceal its orientation and size. Likewise, CV Dazzle uses avant-garde hairstyling and makeup designs to break apart the continuity of a face. Since facial-recognition algorithms rely on the identification and spatial relationship of key facial features, like symmetry and tonal contours, one can block detection by creating an “anti-face.”

See helpful diagrams to help fool face recognition technology: 

Visit ann arky's home at www.radicalglasgow.me.uk