An article in Muckrock reveals that the California Department of Justice (CDOJ) is using facial recognition cameras to spy on everyone.

The CDOJ spent close to one million dollars ($850K) to install NEC’s NeoFace system everywhere.
According to the article, the CDOJ has been spying on everyone since April 26th., 2016.

What’s even worse is the CDOJ is paying NEC $650,000 every year in ‘support fees’. Which means Calif. taxpayers are paying $650K a year for the privilege of being spied on.
Is it a coincidence that NEC opened up a Biometric Center for Excellence in California and another one in Washington, DC?


California and the NEC call their new system the Integrated Criminal Justice Image System (ICJIS) which is actually run by DHS Fusion Centers!

“The Federal Department of Homeland Security is providing funding to states and localities to help support these Fusion Centers, which are equipped with surveillance, communications, and information technology systems…”

more

Surveillance companies like Axon hope to turn every law enforcement officer into a data-gathering drone for a bodycam surveillance database they privately control. Now ShotSpotter, a listening technology that triangulates gunfire in “urban, high-crime areas,” announced a planned IPO.

Above: ShotSpotter mobile app integrated with Google data, showing Oakland California.
They are also expanding from “urban” neighborhoods to a college campus near you. From the submission:
Our solutions consist of our highly-specialized, cloud-based software integrated with our proprietary, internet-enabled sensors and communication networks. When a potential gunfire incident is detected by our sensors, our software analyzes and validates the data and precisely locates where the incident occurred. An alert containing a location on a map and critical information about the incident is transmitted directly to law enforcement or security personnel through any internet-connected computer and to iPhone® or Android mobile devices.

There is still a lot we don’t know regarding the WikiLeaks exposure of CIA cybersecurity documents this week. Many have suggested the documents may not be true or may have been tampered with before posting. And of course, everyone is wondering what the ramifications of such a revelation will be in terms of the CIA’s ability conduct its spycraft in the future. Some of the spying methods described in the documents may seem impossible, but I can attest that at least on that point, many of the tools described by the 8,000 documents do in fact exist.

According to what has been released so far, the CIA, through its Remote Devices Branch called UMBRAGE, maintains a library of hacking tools it has “stolen” from other groups. It goes on to explain the CIA can use the tools to compromise iOS and Android phones, and smart TVs, turning them into listening devices. It’s interesting to note the documents claim the CIA acquires these tools from others, instead of making them in-house.

That said, in my work as a reviewer of high-end security products, I have run across many of the hacking tools described in the leaked documents. In a few cases, companies have even provided them to me so I could challenge their defenses. I keep them in an air-gapped computer network along with my virus zoo, pulling them out whenever needed for a controlled test.

Full disclosure: I have no idea if I have the same tools the CIA is allegedly using, only that they seem to do many of the same things described by the WikiLeaks documents.

Hacking smart TVs seems to be getting the most attention, though it should come as the least surprising aspect of this. Smart TVs are basically all-in-one computers, only without any of the protections found on actual dedicated computers. That is why so many smart TVs ended up being part of the Mirai botnet.

In some cases, smart TVs seem to have been designed for spying. Vizio, which is one of the most popular manufacturers, recently agreed to pay $2.2 million in fines for secretly recording what people were watching and selling that data to advertisers.

The Vizio hacking tool, which was installed on new systems and allegedly also retrofitted to older TVs connected to the internet, was fairly ingenious. It would take snapshots of several pixels on the screen and then compare that to a database of what was playing. So, blue and blue and red might mean the user was watching the “Fresh off the Boat” sitcom, while black and white and green might line up with a feature movie. It required very little data to be sent from the TV back to the company, with all the high-end big data processing occurring after the data was captured.

Back to the alleged CIA tools. The CIA is supposed to be able to turn certain smart TVs into listening devices, while making it appear like the unit is turned off. I have recently tested a tool like that with a Samsung smart TV. I am not sure if it works with other types of TVs, but the tool I have uses a variant of the Samsung Screen Mirroring, modified to both record sound and keep its presence hidden from users.

As most TVs have no security, paring the hacking tool—which I was running off a Samsung tablet—with a TV is extremely easy. Simply select the TV in range you want to target. From there, I could share my screen with the TV, but the tool reverses this so users can instead see what is on the TV.

But then it gets interesting. By entering silent operation mode, the TV screen goes dark, as if whatever input is selected has no data. It also activates the internal microphone if the TV is equipped for videoconferencing, or uses the device’s speaker system if it’s not—though the sound quality is not nearly as good in the latter case.

From another room, I could clearly hear everything going on in the one with the TV. I even deployed this against a conference room setting, and the people talking in that room had no idea someone was listening in from a nearby office.

Read the rest here

http://ncrenegade.com/editorial/domestic-enemies-only-leave-office-one-way/

Raconteur Report: And Then…?

Posted: May 6, 2017 by gamegetterII in Uncategorized

http://raconteurreport.blogspot.com/2017/05/and-then.html?m=1

jay352's avatarEatgrueldog

“Something ugly is happening to the First Amendment. It is being contorted to enable judges to protest Donald Trump’s presidency. The perennial impulse of judges to manipulate the law to achieve morally and politically desirable ends has only been exacerbated by the felt necessity to “resist” Trump. The result: Legal tests concerning the freedoms of speech and religion that in some cases were already highly dubious are being further deformed and twisted.

Welcome to the rise of fake law. Just as fake news spreads ideologically motivated misinformation with a newsy veneer, fake law brings us judicial posturing, virtue signaling, and opinionating masquerading as jurisprudence. And just as fake news augurs the end of authoritative reporting, fake law portends the diminution of law’s legitimacy and the warping of judges’ self-understanding of their constitutional role”

http://www.weeklystandard.com/fake-law/article/2007934

What’s this?

It  seems that the mainstream of America is finally getting it

They given up…

View original post 308 more words

On The Imbalance Of Political Terror

Posted: May 6, 2017 by gamegetterII in Uncategorized

Suarez: Alternatives To The Face Shot

Posted: May 6, 2017 by gamegetterII in Uncategorized

Skills And Training – SHTF School

Posted: May 6, 2017 by gamegetterII in Uncategorized

h/t WRSA

http://shtfschool.com/basic-survival/skills-and-training/