A ballot initiative approved by District of Columbia voters in 2014 allows adults 21 and older to possess 2 ounces of pot and to give it away. Although local law generally is respected, marijuana possession for almost any reason remains a federal crime.
Whether through “voluntary” corporate wellness programs, smart badges that record voices and GPS locations, or surveillance apps in their mobile phones and personal computers, Americans are offering up more and more personal data at work. Most of them don’t have much idea of where that data goes, or how it will be used — and there aren’t that many limits on what employers can find out about their employees, or what they can do with the data. The more people who opt in now, the harder it will be to opt out in the future.
And it’s about to get much worse.
Automated License Plate Readers (ALPRs) may be the most common mass surveillance technology in use by local law enforcement around the country—but they’re not always used in the same way.
“And this next point can’t be overemphasized: the intel cycle paradigm shifted after 9/11 from priority- and event-driven collection to event-driven data retrieval, with collection as an ongoing, environmental condition. (For a fairly deep dive into this, see my 2015 commentary on the big-data focus of the Jade Helm exercise.)”
Built by Danvers-based CyPhy Works, the Persistent Aerial Reconnaissance and Communications drones, or PARC for short, are tethered to the ground with thin wires, letting police survey the crowd with cameras equipped with long-distance zoom, electro-optical and infrared capabilities.
“The wire provides power so it can stay up for days, and days, and days, it doesn’t have to come down,” Perry Stoll, CyPhy Works vice president of product and software told the Herald. “It can send unhackable, secure communication up and down the tether as well. It’s perfect for public safety and security where it has to be up for a while.”
“The Texas Privacy Act restricts making recordings on private property but Hurst police told NBC 5 they were not recording in this case.”
“Not content with having a fleet of insecure surveillance drones, the state of Connecticut wants a fleet of insecure weaponized drones. What could possibly go wrong?”
“I wrote about that “great leap forward” back in February. When the entire intelligence community became connected via its “intelligence Internet,” equipped with cloud technology provided by Jeff Bezos, the ability of IC personnel outside of NSA to retrieve unmasked data accelerated dramatically. The main thing that fell away was the literal need to put down an audit trail of positive permissions in order to do it.
The vulnerability of the FISA unmasking system has for a long time been the administrative arrangements, which allow for legal justification to be, in effect, checked in a box, or added in a perfunctory way after the fact. Since sometime in 2015, when the cloud-enabled intel Internet was up and running for all 17 agencies, the formal nod to even that perfunctory arrangement became little more than an annoying paperwork drill – for anyone who has the user permissions to retrieve unmasked data. It’s as if you, as a privileged system user, had to fill out a form and certify what you were doing with the results of your next Google search.”
CT politicians deciding if they should become the first in America to allow police to use drones outfitted with deadly weapons.
Answer is expected to be “Hell yeah….. do it for the children”.
“Americans should not be forced to submit to criminal face recognition searches merely because they want to drive a car. They shouldn’t have to worry their data will be misused by unethical government officials with unchecked access to face recognition databases. And they shouldn’t have to fear that their every move will be tracked if face recognition is linked to the networks of surveillance cameras that blanket many cities.”
“This could lead forensic investigators into wrongly concluding that CIA hacks were carried out by the Kremlin, the Chinese government, Iran, North Korea or Arabic-speaking terror groups such as ISIS.”