Video Surveillance

Facebook Twitter
The day when you’ll be able to hold up your phone and identify a stranger through a viewfinder is getting closer. Google’s Goggles, a mobile app for visual search, has a facial recognition version unreleased to the public, while Israeli startup Face.com’s technology can tag people’s faces in Facebook photos. Facebook even released a basic version of face detection last night, although it doesn’t have recognition. So in a world where technology chips away at our ability to remain anonymous, how does one reclaim some semblance of control? It turns out there’s actually a pretty simple way around the facial recognition technology available in the market today, according to Adam Harvey, a graduate student at NYU’s ITP (the same program that produced Foursquare chief executive Dennis Crowley and that Twitter’s location guru Raffi Krikorian taught at).

How to camouflage yourself from facial recognition technology

How to camouflage yourself from facial recognition technology
In Iraq and Afghanistan, the U.S. military depends on an array of drones to snoop on and stalk insurgents. Now it looks as if insurgents are tapping into those same drones’ broadcasts, to see what the flying robot spies see. If true — and widespread — it’s potentially one of the most serious military security breaches in years. “U.S. military personnel in Iraq discovered the problem late last year when they apprehended a Shiite militant whose laptop contained files of intercepted drone video feeds,” Wall Street Journal reports. Insurgents Intercept Drone Video in King-Size Security Breach (Updated, with Video) | Danger Room Insurgents Intercept Drone Video in King-Size Security Breach (Updated, with Video) | Danger Room
1973 NSA cryptography lectures For those with an interest in cryptography, and secure communication generally, a series of recently declassified lectures from the American National Security Agency are well worth reading. The moderately-to-heavily redacted documents from 1973 cover a number of engaging subjects. The first volume covers the importance and practicalities of secure communications, codes, one time pads, encryption systems for voice communication, various bits of specific American communication equipment, TEMPEST attacks (described as “the most serious technical security problem [the NSA] currently face[s] in the COMSEC world”), and more. The second volume includes lecture on operational security, issues around the number of sending and receiving stations, public (commercial) cryptography, the destruction of cryptographic equipment in emergency situations, and more. 1973 NSA cryptography lectures
Hist_US_COMSEC_Boak_NSA_1973
Insurgents Hack U.S. Drones Insurgents Hack U.S. Drones Updated Dec. 17, 2009 11:59 p.m. ET WASHINGTON -- Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.
Official site for programs SkyGrabber (accepting free to air satellite data by digital satellite TV tuner card (DVB-S/DVB-S2)), LanGrabber (save YouTube video), Tuner4PC (software for satellite internet) SkyGrabber SkyGrabber is offline satellite internet downloader.SkyGrabber allows to accept satellite internet data, assemble it in files (avi,mp3,mp4,etc.) and save files onto your hard disk. The program has user-friendly interface, diverse filter system and satellite provider manager inside. DVB-S2 HD TV tuner USB for PC Official site for programs SkyGrabber (accepting free to air satellite data by digital satellite TV tuner card (DVB-S/DVB-S2)), LanGrabber (save YouTube video), Tuner4PC (software for satellite internet)
Technical explanation of Predator drone hack published Boing Boing