The hottest Surveillance Substack posts right now

And their main takeaways
Category
Top Culture Topics
The Chris Hedges Report 81 implied HN points 20 Nov 24
  1. Technology in schools can invade student privacy. Many tools are designed for safety but can monitor students in ways they might not agree with.
  2. Surveillance tools can discriminate against students of color and those from poor neighborhoods. They often increase the risk of negative consequences for these groups.
  3. The culture of constant monitoring can stifle curiosity and free expression in classrooms, turning them into places where students just comply rather than learn actively.
All-Source Intelligence Fusion 712 implied HN points 05 Nov 24
  1. The Pentagon deleted public records of a $200 million AI surveillance contract called Project Maven, raising concerns about transparency.
  2. They justified this erasure by citing national security rules that allow withholding information from public databases.
  3. Some agencies, like the CIA, are exempt from certain federal procurement regulations, making it unclear how broadly these rules are applied.
All-Source Intelligence Fusion 590 implied HN points 06 Nov 24
  1. Project Maven is being integrated with the Minotaur Mission System to help border surveillance. This setup is used by the U.S. Coast Guard and Customs and Border Protection.
  2. The Minotaur system combines different types of surveillance data, making it easier to detect illegal activities. It links sensors, cameras, and radar into one automated system.
  3. Amazon Web Services is involved in providing cloud support for Minotaur, highlighting the role of big tech in military surveillance programs.
Noahpinion 18882 implied HN points 27 Feb 24
  1. The rise of new technologies like smartphones and social media has presented democracies with a formidable opponent in the form of techno-totalitarian regimes.
  2. China employs a strategy of 'sharp power' to manipulate foreign entities and influence global affairs, utilizing tactics like espionage, social media manipulation, and economic coercion.
  3. China's unique totalitarian approach extends beyond its borders to control the narrative about China, influence the diaspora, and emphasize supremacy of ethnicity over citizenship, posing a new challenge for democracies and liberal principles.
The Corbett Report 21 implied HN points 18 Nov 24
  1. Digital IDs are being pushed as a way to control and monitor people's actions, starting with tracking and eventually influencing how they buy or sell things. It's about creating a system where everyone is accounted for.
  2. Different approaches are used to convince both left- and right-wing individuals to accept digital IDs. For some, it’s about safety and security, while for others, it plays on fears related to immigration or children’s safety online.
  3. The idea of a digital ID is presented as something beneficial, but it can lead to increased government control and restrictions. There's a fear of losing individual freedom and privacy if everyone accepts these IDs.
Get a weekly roundup of the best Substack posts, by hacker news affinity:
TK News by Matt Taibbi 9504 implied HN points 16 Feb 24
  1. Many reporters who covered the Russiagate story faced backlash and criticism for their reporting.
  2. Various journalists and media figures who exposed illegal surveillance and manufactured intelligence in the Trump-Russia investigation were targeted and discredited by mainstream commentators.
  3. Despite facing pushback, these reporters like Glenn Greenwald, John Solomon, and Lee Smith continued to investigate and report on the inaccuracies surrounding the Trump-Russia collusion narrative.
TK News by Matt Taibbi 8813 implied HN points 07 Feb 24
  1. Financial institutions are using transaction data to monitor for 'extremism indicators' like certain purchases or travel patterns.
  2. Financial surveillance, enhanced by AI, allows institutions to create detailed profiles of individuals and potentially restrict their access to financial services.
  3. The rise of 'political credit scores' may lead to non-illegal behaviors being punished effectively, similar to how speech is censored.
2nd Smartest Guy in the World 3950 implied HN points 20 Jan 24
  1. The global elite at Davos aim to 'Rebuild Trust' through censorship and surveillance.
  2. Davos lacks real debate as participants are vetted for conformity to agenda narratives.
  3. Davos 2024 focused on familiar topics like climate change and stakeholder capitalism.
Thái | Hacker | Kỹ sư tin tặc 3574 implied HN points 24 Jul 23
  1. The central focus of the rescue flight trial is the confrontation between two of the finest Vietnamese police officers.
  2. The evidence presented includes a video of one officer receiving a bag and call records between the two officers.
  3. The importance of being mindful of the data and metadata we leave behind in our daily lives, as it can potentially be used against us.
Odds and Ends of History 2278 implied HN points 12 Feb 24
  1. AI technology, like the one used in TfL's Tube Station experiment, is rapidly changing and being implemented in various sectors.
  2. AI cameras at stations can have a wide range of uses, from enhancing security to improving passenger welfare and gathering statistical data.
  3. While AI technology offers numerous benefits, there are also concerns about privacy, surveillance, and potential misuse of the technology.
The Dossier 903 implied HN points 19 Jan 24
  1. The conference theme was 'Rebuilding Trust' but no one acknowledged any wrongdoing.
  2. There was no real debate at Davos, just a gathering for the global ruling class to unite behind shared agendas.
  3. China took the spotlight at Davos, while the event faced low American representation and criticism from outside sources.
Discourse Blog 648 implied HN points 16 Jan 24
  1. RFK Jr. is criticized for defending the Kennedy administration's role in FBI surveillance of Martin Luther King Jr.
  2. RFK Jr.'s comments are seen as ignorant and tone-deaf, considering the context and historical significance.
  3. Despite familial loyalty, there is value in acknowledging and admitting when family members have done wrong.
All-Source Intelligence Fusion 854 implied HN points 15 Jan 24
  1. Orbis Operations, led by former CIA officials, accidentally published confidential data agreements.
  2. Anomaly detection techniques used by intelligence agencies and corporations focus on detecting anomalies and insider threats.
  3. National security data brokers like Orbis fuse various data sources for surveillance and intelligence gathering.
The Glenn Meder Newsletter 530 implied HN points 09 Jan 24
  1. Artificial intelligence has advanced rapidly, blurring the line between human and AI interactions.
  2. Big Tech companies like Google and Facebook use AI to manipulate public opinion and influence elections.
  3. AI, in the hands of those seeking power, can be a dangerous tool for control and manipulation of individuals and society.
Space Ambition 99 implied HN points 21 Jun 24
  1. Law enforcement is increasingly using satellite technology to monitor and fight crime. This includes tracking illegal activities like drug trafficking and deforestation, which are hard to spot from the ground.
  2. Drones are becoming important tools for police work. They can quickly gather information in emergencies and help locate missing persons, improving response times and resource use.
  3. Crime investigation in space poses unique challenges. Scientists are researching how things like blood behave differently in low gravity, which could help solve future crimes in space.
All-Source Intelligence Fusion 752 implied HN points 18 Dec 23
  1. CEO of Gig-work Surveillance Firm, Maury Blackman, resigned after years of court battles and exposure of clandestine surveillance.
  2. Premise Data, an analogue of Uber for data-gathering, faced revenue stagnation despite investments and high-profile board members.
  3. Blackman's resignation led to Matt McNabb taking over as CEO, revealing a history of controversial events and legal issues within Premise.
Geopolitical Economy Report 797 implied HN points 21 Sep 23
  1. The US government admitted that the Chinese balloon incident was not related to spying, but likely due to strong winds, debunking the initial accusations.
  2. The media and US government exaggerated the situation, using it to create a Cold War-like propaganda against China, though evidence later proved otherwise.
  3. Despite the claims of surveillance capabilities, subsequent analysis showed that the balloon's sensors were never activated over US territory, making the entire scandal a manufactured crisis.
eugyppius: a plague chronicle 493 implied HN points 17 Feb 24
  1. Germany is implementing wide-ranging measures to restrict speech, travel, and economic activity of political dissidents to control the thought patterns of its people.
  2. The political establishment in Germany is using strategies to maintain power, including targeting opposition groups like Alternative für Deutschland (AfD).
  3. The government in Germany is expanding its control over dissent by planning to use various tools like financial investigations, travel restrictions, and internet censorship to combat right-wing extremism.
All-Source Intelligence Fusion 854 implied HN points 22 Sep 23
  1. Defense Information Systems Agency has a new $2.5 million social media surveillance contract with Dataminr.
  2. Dataminr, associated with Twitter, has been careful to avoid the 'surveillance' label and instead presents itself as an 'alerting' platform.
  3. Despite past commitments, Dataminr continues to provide access to social media data for surveillance purposes.
All-Source Intelligence Fusion 366 implied HN points 15 Feb 24
  1. Orbital Insight CEO Kevin O'Brien moved to the cryptocurrency surveillance firm Chainalysis, leaving behind the collapse and financial struggles of Orbital.
  2. Orbital Insight faced challenges leading to financial decline, including defaulting on rent, a nonfunctional main phone line, and failed attempts at a merger with Privateer Space.
  3. Despite substantial funding and strategic partnerships, Orbital's downfall was partially attributed to market changes, such as Apple's privacy measures affecting their commercial data analysis business.
Zero Day 1283 implied HN points 06 Apr 23
  1. Kim Zetter is working on various projects that are taking longer than expected.
  2. She is co-teaching a course about government surveillance and classified leaks at Johns Hopkins SAIS.
  3. Students in the course show a deep understanding of surveillance nuances and the importance of balancing security with civil liberties.
All-Source Intelligence Fusion 529 implied HN points 15 Sep 23
  1. The Pentagon is transferring its whistleblower-hunting system to Palantir's cloud.
  2. Palantir's Gotham software has been crucial in assisting the Pentagon in finding whistleblowers.
  3. The U.S. military views whistleblowers as insider threats, with Palantir playing a key role in identifying them.
All-Source Intelligence Fusion 344 HN points 18 Oct 23
  1. Lockheed Martin and HawkEye 360 are partnering to track phones and walkie-talkies from space
  2. The UAE military is reportedly a significant customer of this phone tracking technology
  3. HawkEye 360's satellite surveillance capabilities extend to monitoring electromagnetic emissions worldwide
Natto Thoughts 79 implied HN points 27 Mar 24
  1. Chinese hacker groups have historically displayed poor operations security, making mistakes and leaving evidence, despite successfully targeting critical infrastructure.
  2. The leaked i-SOON documents reveal the extensive involvement of private cyber security companies in China, indicating the government's reliance on external expertise.
  3. The effectiveness of the 'name-and-shame' strategy in compelling or deterring behavior of exposed Chinese threat actors appears limited, as seen with cases like Chengdu 404 and Goldsun.
Natto Thoughts 219 implied HN points 27 Oct 23
  1. A lawsuit revealed potential business ties between Chengdu 404 linked to APT41 and Sichuan i-SOON, shedding light on the ecosystem of IT companies in which these hackers operate.
  2. Sichuan i-SOON has strong connections with universities, offers training programs, and possesses qualifications to work for state security, raising questions about its potential involvement in APT activities.
  3. The similarities between Sichuan i-SOON and Chengdu 404, along with i-SOON's capabilities in surveillance-related technologies, suggest a possible link to APT41 activities and other Chinese APT groups like RedHotel/Earth Lusca.
eugyppius: a plague chronicle 159 implied HN points 01 Feb 24
  1. Former CDU politician Hans-Georg Maaßen is under extensive surveillance for criticizing globalism, the Green Party, mass migration, and state media.
  2. German domestic intelligence services are closely monitoring Maaßen's activities, including his social media posts and press statements.
  3. Criticism of the government, Greens, mass migration, and state media can lead to being labeled a 'right-wing extremist' and attract attention from political police.
eugyppius: a plague chronicle 113 implied HN points 18 Mar 24
  1. German domestic intelligence services are targeting political dissidents for 'delegitimising' the state, resembling oppressive practices of the past.
  2. The concept of 'Delegitimisation of the State' has been introduced, restricting certain political dissent akin to past authoritarian regimes.
  3. Criticism and comparisons between the Federal Republic and the DDR are now being monitored by the Federal Office for the Protection of the Constitution (BfV).