(via www.datenform.de —- Netzdatenwelt vs. Alltagslebensraum —- Aram Bartholl)
Page 599 of 631
The Eagle system allows agents to observe network traffic and peer into people’s emails, among other things. In the room, one English-language poster says: “Whereas many Internet interception systems carry out basic filtering on IP address and extract only those communications from the global flow (Lawful Interception), EAGLE Interception system analyses and stores all the communications from the monitored link (Massive interception).” On its website, Amesys says its “strategic nationwide interception” system can detect email from Hotmail, Yahoo and Gmail and see chat conversations on MSN instant messaging and AIM. It says investigators can “request the entire database” of Internet traffic “in real time” by entering keywords, email addresses or the names of file attachments as search queries.
(via smartvote)
IMAGINE a world in which we are assigned a number that indicates how influential we are. This number would help determine whether you receive a job, a hotel-room upgrade or free samples at the supermarket. If your influence score is low, you don’t get the promotion, the suite or the complimentary cookies.
Inkling Trailer (Français) (par wacomeurope)
None of the HP board members own much HP stock so they have little to lose,” he wrote. “But the HP employees, customers, partners and shareholders will suffer.
Carnegie Mellon researchers recently combined Facebook profile pictures and PittPatt‘s facial recognition software to identify supposedly-anonymous pictures from a dating site. Now they’re planning to demo a smartphone app that identifies faces by tapping into cloud-based image databases and recognition software. What’s next?



