Page 599 of 631

The Eagle system allows agents to observe network traffic and peer into people’s emails, among other things. In the room, one English-language poster says: “Whereas many Internet interception systems carry out basic filtering on IP address and extract only those communications from the global flow (Lawful Interception), EAGLE Interception system analyses and stores all the communications from the monitored link (Massive interception).” On its website, Amesys says its “strategic nationwide interception” system can detect email from Hotmail, Yahoo and Gmail and see chat conversations on MSN instant messaging and AIM. It says investigators can “request the entire database” of Internet traffic “in real time” by entering keywords, email addresses or the names of file attachments as search queries.

(via smartvote)

IMAGINE a world in which we are assigned a number that indicates how influential we are. This number would help determine whether you receive a job, a hotel-room upgrade or free samples at the supermarket. If your influence score is low, you don’t get the promotion, the suite or the complimentary cookies.

(via Customer Retention | Bonkers World)

(via Has Facebook killed the undercover cop? – social networking, social media, Security 2011 Conference, nsw police, networking tools, Mick Keelty, face recognition, Facebook, AFP – CSO | The Resource for Data Security Executives)

Carnegie Mellon researchers recently combined Facebook profile pictures and PittPatt‘s facial recognition software to identify supposedly-anonymous pictures from a dating site. Now they’re planning to demo a smartphone app that identifies faces by tapping into cloud-based image databases and recognition software. What’s next?

« Older posts Newer posts »

© 2026 no-Flux

Theme by Anders NorenUp ↑