• https://www.activistpost.com, By Katitza Rodriguez
This is the first post in a series highlighting the problems and flaws in the proposed UN Cybercrime Convention. Check out our detailed analysis on the criminalization of security research activities under the proposed convention.
Federal 'Guidelines' have already been secretly adopted for a Digital ID program that will start off as 'voluntary' but only the most gullible Americans would believe that's anything but temporary.
CSS, also known as IMSI catchers, are among law enforcement's most closely-guarded secret surveillance tools. They act like real cell phone towers, "tricking" mobile devices into connecting to them, designed to intercept the information that ph
There are clues from Microsoft's latest moves on Windows 11 that reveal what Microsoft is really up to. Do you really believe Microsoft released features like Windows Recall Screenshots and Keylogging because of user demand? Or Microsoft is releasing
As individuals begin to believe they are being ignored, feelings of paranoia, isolation, and distrust arise, causing a breakdown in interpersonal relationships and community trust.
• John & Nisha Whitehead - The Rutherford Institute
If you want a glimpse of the next stage of America's transformation into a police state, look no further than how Israel - a long-time recipient of hundreds of billions of dollars in foreign aid from the U.S. - uses its high-tech military tactics,
Biometric security company Facewatch, which provides facial recognition software to shops across the UK, is facing a lawsuit after its system wrongly flagged a 19-year-old girl as a shoplifter.
The proposal mandates that users of communication apps must agree to have all images and videos they send automatically scanned and potentially reported to the EU and police.
Smart Cities claim that the use of technology and the Internet of Things (IoT) are solutions to improve everything from critical infrastructure and public safety to efficiencies in city energy use.
Alex Jones covers a recent Tucker Carlson episode entitled Erik Prince: CIA Corruption, Killer Drones, and Government Surveillance and he goes over the history of cell phone spying and what needs to be done to stop it.
According to "thousands of pages of Twitter Files and documents," these efforts were part of a broader strategy to manage how information is disseminated and consumed on social media under the guise of combating 'misinformation' and foreign p
• https://www.activistpost.com, By Joel R. McConvey
A major report in the Washington Post has found that law enforcement officers in U.S. several cities where facial recognition tech is banned for police have asked neighboring forces to search face databases for them.
I will explain what differentiates a standard or what I call a Normie phone from these specialized phones called De-Googled phones. By their name, you can see that Google is removed. But that is not about removing a few apps. Neither can you de-Googl
Pop superstar Taylor Swift had her concert in Paris guarded by AI-powered video surveillance as the city prepares for heightened security risks during the Summer Olympics 2024.
Australia's federal government has earmarked AU$288.1 million (US$190.9 million) for the national digital identity program which will begin its rollout in July.
• By Matthew Guariglia, Brendan Gilligan, Cindy Cohn
A bombshell report from WIRED reveals that two days after the U.S. Congress renewed and expanded the mass-surveillance authority Section 702 of the Foreign Intelligence Surveillance Act...
• John & Nisha Whitehead - The Rutherford Institute
The spirit of the Constitution, drafted by men who chafed against the heavy-handed tyranny of an imperial ruler, would suggest that one's home is a fortress, safe from almost every kind of intrusion.
Watch Streaming Broadcast Live:
LRN.fm
DLive
Live Chat Telegram
Share this page with your friends
on your favorite social network: