Keyword: datamining
-
1980s technology is not adequate for the purpose of running for election
-
China need not try to interfere with the 2024 election. Joe Biden has partnered with the Communist China owned TikTok. TikTok is a data mining operation masquerading as social media. Consumer Reports: A Consumer Reports investigation finds that TikTok, one of the country’s most popular apps, is partnering with a growing number of other companies to hoover up data about people as they travel across the internet. That includes people who don’t have TikTok accounts.ABC NewsA ban on TikTok in the United States or a sale of the app by its Chinese owner, ByteDance, will not resolve national security concerns...
-
The email account of the U.S. ambassador to China was hacked by Chinese hackers on a mission to attack several American and global targets in recent weeks, including another account at the State Department, according to reports.China-based hackers breached the email account of US Ambassador to China Nicholas Burns as part of a recent targeted intelligence-gathering campaign, three US officials familiar with the matter told CNN.The hackers also accessed the email account of Daniel Kritenbrink, the assistant secretary of State for East Asia, who recently traveled with Secretary of State Antony Blinken to China, the people said.The State Department did...
-
@RepThomasMassie FBI Director Wray admits the government has been working in conjunction with financial institutions like Bank of America to mine personal data such as gun purchase records for law abiding citizens, with no warrants or subpoenas involved.
-
In 1928, the late Supreme Court Justice Louis D. Brandeis characterized the values underlying the Fourth Amendment to the U.S. Constitution as embracing the uniquely American right, and the right most valued by civilized persons, which he called the right to be let alone. Today we call it the right to privacy. He also warned that the greatest dangers...
-
After applying to more than 300 jobs in the last six months without a single bite, Will no longer bothers to read job descriptions or research companies. It's just a waste of time at this point, said Will, whose real name is withheld but known to Insider. He spends six to 10 hours a day on LinkedIn churning out applications, but says that he and his peers with similar credentials — master's degrees and MBAs from top schools — are having no luck getting interviews. "I'm seeing all of these articles about how companies cannot recruit people fast enough and...
-
One of the biggest social media platforms in the world has allegedly been spying on the private messages and personal data of users who believe that voter fraud took place in the 2020 election, and has subsequently been handing this information over to the FBI. According to the New York Post, the alleged surveillance operation by Facebook and its coordination with the government was confirmed by several anonymous sources in the Department of Justice (DOJ). The sources allege that employees at Facebook have been red-flagging any suspicious private messages over the last 19 months, sending the information directly to the...
-
A report published at the end of May by NRK, the Norwegian Broadcasting Corporation, notes that the official statistics bureau of Norway will soon track most grocery store purchases made in the Scandinavian country, a development that should serve as a warning to Americans about the growing trend in Western nations to expand surveillance and tracking of everyday citizens. In an article titled “Statistics Norway demands to know exactly what Norwegians buy in the grocery store,” reporter Martin Gundersen wrote that Statistics Norway has “ordered the grocery chains NorgesGruppen, Coop, Bunnpris and Rema 1000 to share all their receipt data...
-
The "Tech Executive-1" in John Durham's indictment of a Democratic cybersecurity lawyer testified in a lawsuit that he had invoked his Fifth Amendment rights when asked to testify by the special counsel. Rodney Joffe, former senior vice president at Neustar, coordinated in 2016 with Clinton campaign lawyer Michael Sussmann, who was indicted last year for allegedly concealing his clients, including Hillary Clinton's campaign and Joffe, from the FBI in September 2016 when he pushed debunked claims of a secret back channel between the Trump Organization and Russia's Alfa Bank. Alfa Bank filed a "John Doe" lawsuit and deposed Joffe in...
-
The Biden campaign paid nearly $20,000 to a cybersecurity firm at the center of Special Counsel John Durham’s investigation into the origins of the Trump-Russia probe. The campaign paid Neustar Information Services in 2020 for accounting and compliance work, according to Federal Election Commission records. According to Durham, Neustar’s chief technology officer, Rodney Joffe, accessed sensitive web traffic data that the company maintained on behalf of the White House executive office in order to collect "derogatory" information about Donald Trump. Joffe allegedly provided the information to Hillary Clinton campaign lawyer Michael Sussmann, who in turn gave it to the CIA...
-
WASHINGTON (AP) — The latest filing from special counsel John Durham in his investigation into the origins of the Trump-Russia probe has been seized on by the conservative media and Donald Trump himself as vindication of the former president’s oft-repeated claims that he was “spied” on. One headline said Durham had alleged that the campaign of Hillary Clinton paid to “infiltrate” servers at Trump Tower and the White House — though that verb is not used in the filing — and Trump suggested that Democrats had been caught “illegally spying” in a scandal worse than Watergate. Neither claim is exactly...
-
Hillary Clinton refused to answer questions about allegations that her allies spied on the Trump campaign as the controversy continued to engulf her Tuesday. Exclusive pictures and video obtained by DailyMail.com show a stoney faced Clinton silently waving away repeated questions of whether she spied on Donald Trump. She refused to say when or if she planned to comment. Clinton was arriving at her daughter Chelsea’s Manhattan apartment mid morning. Wearing a blue coat and black pants, she looked strained behind her black face mask as she stoically ran the gauntlet of questions. The former first lady and secretary of...
-
Clinton, 74, is being accused of hiring a tech term to infiltrate servers at Trump Tower and the White House during the 2016 campaign. According to a recently-released filing, the aim was to try and smear Trump by linking him to Russia. Clinton's campaign repeatedly accused Trump of using a secret server to communicate with Russians, although the claim has never been proven. A growing chorus of Democrats believe 2016 presidential candidate Hillary Clinton should be questioned by special advisor John Durham for her alleged role in the Russian secret server scandal in a poll conducted before bombshell revelations that...
-
China is turning a major part of its internal Internet data surveillance network outward, mining Western social media, including Facebook and Twitter, to equip its government agencies, military and police with information on foreign targets, according to a Washington Post review of hundreds of Chinese bidding documents, contracts and company filings.... ...The software primarily targets China’s domestic Internet users and media, but a Washington Post review of bidding documents and contracts for over 300 Chinese government projects since the beginning of 2020 include orders for software designed to collect data on foreign targets from sources such as Twitter, Facebook and...
-
A federal law passed in February 2012 to help middle class families by creating jobs and cutting payroll taxes included a section mandating the creation of a nationwide interoperable broadband communications system for law enforcement and first responders. The system, which is being created under the direction of the First Responder Network Authority (FirstNet), seeks to create a nationwide broadband network capable of being used for a variety of law enforcement purposes including remote surveillance, mobile biometric applications like field fingerprint scanning and facial recognition, as well as automated license plate reading. The system is currently in a pilot phase...
-
Posted in ubiwar Tagged intelligence, terrorism SNIPPET: "Friends of this blog and others, Palantir Technologies, are profiled in a new article by Siobhan Gorman in the Wall Street Journal, How Team of Geeks Cracked Spy Trade: From a Silicon Valley office strewn with bean-bag chairs, a group of twenty-something software engineers is building an unlikely following of terrorist hunters at US spy agencies."
-
President Obama's re-election team has already been lauded for its mastery of data and organziation, but a feature in today's The New York Times looks at another secret, and more subtle, weapon: Behavioral science. Reporter Benedict Carey talks to some of the members of the campaign's "COBS" team, an informal group of unpaid advisors who shared their knowledge on the latest academic research and theories on how to influence the public's knowledge behavior. Publicly, the group—which it gave itself the name of "consortium of behavioral scientists"—where just friendly volunteers offering advice. None of the social scientists and psychologists who took...
-
WASHINGTON — The Biden administration on Tuesday rolled out what it said is a new strategy to counter domestic terrorism: a series of changes to elevate the federal government's response to an urgent problem, with renewed efforts to deter, detect and prosecute those who would use violence in pursuit of political aims.SNIPIn a statement Tuesday morning, President Joe Biden said, "[O]n my first day in office I directed my national security team to confront the rise in domestic terrorism with the necessary resources and resolve. Today, I am releasing the first-ever National Strategy for Countering Domestic Terrorism. SNIPThe new strategy...
-
I was just logging in to youtube and after entering my password I got a prompt similar to the password prompt that said to enter my Android PIN to verify it is me. I thought "No way" and entered a bogus number. I used 1692 and it logged me in. Is there nothing that youtube (google) does not want to know?
-
The post office’s law enforcement arm has faced intense congressional scrutiny in recent weeks over its Internet Covert Operations Program (iCOP), which tracks social media posts of Americans and shares that information with other law enforcement agencies. Yet the program is much broader in scope than previously known and includes analysts who assume fake identities online, use sophisticated intelligence tools and employ facial recognition software, according to interviews and documents reviewed by Yahoo News.Among the tools used by the analysts is Clearview AI, a facial recognition software that scrapes images off public websites, a practice that has raised the ire...
|
|
|