Error message

Notice: Undefined offset: 1 in drupal_settings_initialize() (line 759 of /var/lib/drupal-7.28/includes/bootstrap.inc).

News

knowledge == control

De nederlandse overheid gaat een systeem in werking stellen om een risicomodel te kunnen maken van mensen die onder andere belasting fraude plegen.
Hiervoor zullen de volgende gegevens onderschept en geanalyzeerd gaan worden:

- arbeidsgegevens
- boetes en sancties
- fiscale gegevens
- gegevens roerende en onroerende goederen
- handelsgegevens
- huisvestingsgegevens
- identificerende gegevens
- inburgeringsgegevens
- nalevingsgegevens
- onderwijsgegevens
- pensioengegevens
- reïntegratiegegevens
- schuldenlastgegevens
- uitkerings-, toeslagen- en subsidiegegevens -
vergunningen en ontheffingen
- zorgverzekeringsgegevens

"Dit draagt bij aan het draagvlak in de sociale zekerheid en een adequate fraudebestrijding." aldus minister Asscher van Sociale Zaken en Werkgelegenheid.
lijkt meer op een groot profileleringsfestijn van elke burger in nederland...

[links]
http://www.eenvandaag.nl/binnenland/54286/syri_burgers_op_grote_schaal_d...
http://www.volkskrant.nl/dossier-kabinet-rutte-ii/burger-wordt-straks-do...
http://www.rijksoverheid.nl/documenten-en-publicaties/besluiten/2014/10/...

Interference

========= Call for Papers =========

Interference, n:

1. preventing (a process or activity) from continuing or being carried out properly.
2. the combination of two or more electromagnetic waveforms to form a resultant wave in which the displacement is either reinforced or cancelled.

Interference is a gathering of people, perspectives, theories, and actions that share a critical approach to society and technology. It will take place at the Binnenpret in Amsterdam, NL from 15th to the 17th of August 2014. It will be a space where we can meet, debate, share, learn, and find our affinities and oppositions. The event comes as a response to the lack of a common ground for confrontation and discussion over themes like hacking, technology, art and politics that could break out of the existing containers and roles for such concepts and practices.

Interference is not a hacker conference. From a threat to the so-called national security, hacking has become an instrument for reinforcing the status quo. Fed up with yet another recuperation, the aim is to re/contextualize hacking as a conflictual praxis and release it from its technofetishist boundaries. Bypassing the cultural filters, Interference wants to take the technical expertise of the hacking scene out of its isolation to place it within the broader perspective of the societal structures it shapes and is part of.

Interference tries not to define itself. Interference challenges hacker's identity, the internal dynamics of hackerculture and its ethical values. It undermines given identities and rejects given definitions. Interference is a hacking event from an anarchist perspective: it doesn't seek for uniformity on the level of skills or interests, but rather focuses on a shared basis of intuitive resistance and critical attitude towards the techno-social apparatus.

Interference is three days of exploring modes of combining theory and practice, breaking and (re)inventing systems and networks, and playing with the art and politics of everyday life. Topics may or may not include philosophy of technology, spectacle, communication guerrilla, temporary autonomous zones, cybernetics, bureaucratic exploits, the illusions of liberating technologies, speculative software, the creative capitalism joke, the maker society and its enemies, hidden- & self- censorship, and the refusal of the binarity of gender, life, and logic.

Interference welcomes discordians, intervention artists, artificial lifeforms, digital alchemists, oppressed droids, luddite hackers and critical engineers to diverge from the existent, dance with fire-spitting robots, hack the urban environment, break locks, perform ternary voodoo, decentralise and disconnect networks, explore the potential of noise, build botnets, and party all night.

The event is intended to be as self-organised as possible which means you are invited to contribute on your own initiative with your skills and interests. Bring your talk, workshop, debate, performance, opinion, installation, project, critique, the things you're interested in, the things you want to discuss. Especially those not listed above.

Please let us know how you would like to interefere by sending a (brief) abstract of your proposal before June 15 to interference [at] puscii.nl.

Updates and more information can be found on http://interference.io

===================================

1 maart: Puscii Privacy Party @ RooieRat

Het zal niemand zijn ontgaan dat ons internet- en telefoonverkeer gretig wordt afgeluisterd. Met name activisten zijn hiervoor een geliefd doelwit. Maar de online privacyschendingen gaan verder dan alleen aftappende inlichtengendiensten. Ook het grootkapitaal - google, facebook, u kent ze wel - weet ons driftig te volgen en vaak onopgemerkt te profileren. Gelukkig zijn de technieken die hierbij gebruikt worden vaak met enige kennis en de juiste tools redelijk te omzeilen.

Daarom organiseren wij zaterdag 1 maart de Puscii Privacy Party: een dag voor kennisuitwisseling op het gebied van versleuteling, anonimiteit en privacy. Er is geen vooropgezet programma: de bedoeling is om kennis en vragen bij elkaar te brengen, te kijken wat er beschikbaar is, waar interesse in is en daar dan praktisch mee aan de slag te gaan.

Toegang is gratis en iedereen is welkom, ongeacht technische voorkennis.

Voor meer info zie http://www.puscii.nl/blog/content/1-maart-puscii-privacy-party-rooierat

Ludieke actie voor privacy van reizigers onderdrukt

Afgelopen maandagavond hebben zo'n 20 mensen van "Platform 1984" gedemonstreerd voor behoud van privacy in het openbaar vervoer. Omdat met de geplande afschaffing van het papieren kaartje dé laatste manier om enigszins anoniem te reizen verloren gaat, trokken zij met de slogan "inchecken is zoooó 1984" naar het Amsterdam Amstel station.

Met het afschaffen van het papieren kaartje zal de NS in staat zijn van alle reizigers bij te houden waar zij naar toe reizen en hoe vaak zij gebruik maken van het openbaar vervoer. De anonieme chipkaart is namelijk alles behalve anoniem, niet alleen zijn per kaart alle reizen in een database opgeslagen, ook is de kaart aan betalingsgegevens te koppelen en daarmee tot personen te herleiden. Hiermee wordt volgens het Platform "de zoveelste stap gezet richting een controle-samenleving waarin iedere stap die wij zetten, met wie we praten, en wat we zeggen wordt opgeslagen in almaar groeiende databases. Door middel van deze actie willen wij het bewustzijn vergroten over deze gevaarlijke ontwikkeling.”

Platform 1984 was van plan om een doodskist, met daarop het woord ‘Privacy’’, door een intercity trein te dragen van station Amsterdam Amstel naar Utrecht Centraal en zo de privacy ten grave te dragen. “Maar toen wij aankwamen bij station Amsterdam Amstel werden wij opgewacht door 30 politieagenten en NS personeel ,” aldus Nina Peters. “De politie verbood ons de kist mee te nemen in de trein of hem te dragen in het station. Toen wij zonder kist door de trein wilden lopen werd ons verboden flyers uit te delen en met de reizigers in gesprek te gaan, ondanks de duidelijke interesse in onze actie bij een substantieel deel van de reizigers.”

Platform 1984 is een actiegroep die zich ernstig zorgen maakt over de ontwikkelingen rondom privacy. De afgelopen jaren heeft er een enorme erosie plaatsgevonden op het gebied van privacy. Steeds meer data wordt opgeslagen en het is niet duidelijk wat hier in de toekomst mee gaat gebeuren. "We moeten niet willen dat willekeurige organisaties alles over onze privé levens weten", aldus een woordvoerder van het Platform. "Wij zullen ons blijven inzetten op het gebied van privacy, niet alleen binnen het openbaar vervoer maar ook in het algemeen. Want wanneer onze privacy eenmaal is verspeeld, zal deze moeilijk terug te winnen zijn "

Inside the surveillance capital of Europe (UK)

Britain is full of companies involved in the worst kinds of financial activity, the population is terrorised by government-media campaigns, held captive by aggressive borders, and attacked by violent police who kill with impunity. Behind the ‘democratic’ facade is Empire, enforced by ever more complex means. Every day people are scrutinised under intense surveillance and subjected to the highest levels of consumer propaganda. The authorities are enthusiastic advocates of control technology in all of its guises and have long set the benchmarks for others across the globe. There are an estimated 4.5 million CCTV cameras installed across the country: one per 14 people. This tidal wave of CCTV certainly shows no signs of abating, if anything it is gaining momentum, Britain is on the verge of a Closed-Circuit Television transformation – Companies and researchers are pushing the latest development – Digital, or ‘Smart’ CCTV.

This will enable users of CCTV to store much more data in a more flexible format such as DVD, or on computer hard-disk. Manufacturers claim that software used with the Digital CCTV can also automatically identify street crime, such as vandalism and theft even before it is committed. It is expected to be introduced in parts of the country in the next 12 months, and is being touted as a weapon against terrorism, the usual doublespeak of the bosses. It will be used to protect finance and police the zones of capital, to pursue ‘anti-social behaviour’ and maintain curfew on the excluded. As anarchists we re-assert the diverse world of community; we reject the ‘community’ that the social architects, police, law lords and bosses talk of; it is a consumerist fantasy used to keep people obedient.

On average, each person in the UK is said to be recorded 300 times a day, as end-to-end CCTV security from the borders unfurl. Most, if not all, transport networks are covered by the viewing apparatus of the State. Every city and almost every town centre is covered by cameras operated by local authorities. They view most shops, pubs and cafes, which usually all have their own surveillance systems anyway. Most of the motorways and many roads are covered in cameras, numberplate recognition cameras were introduced in 1997, and many places have cameras which detect speed & road-tax payment automatically. CCTV is said to bring about an average 5 per cent reduction in crime, however a study in 1999 revealed that crime rose 9 per cent and the clear-up rate fell 4 per cent after cameras were installed in Glasgow.

One application of Digital CCTV is ‘Intelligent Pedestrian Surveillance’ (IPS) marketed by IPSOTEK. This image analysis software will alert CCTV operators when a potentially suspicious event occurs. The program was the product of 10 years of research and collaboration between 6 European countries in an EU funded project. IPS technology is connected to a sophisticated pattern recognition programme called ‘Cromatica’, in which CCTV cameras detect unusual activity by recognising patterns pre-programmed into the computer’s memory. The software compares images from each CCTV camera in use, with pictures of the space devoid of any activity, analysing each pixel to pick out those that differ between the two images. People’s movements are reduced to a series of pixels and compared to a pre-defined set of patterns, or ‘algorithms’. Clusters of pixels which could be objects or people are tracked in real time, using computer vision techniques that record and examine patterns of behaviour. There were trials of the software in late 2004, in London’s Mile End underground station and Liverpool St. station. People using these stations were not told about the project. A London Underground spokesperson who oversaw the installation at the stations said: “…this puts it on another plane. It means that you don’t have to look at a screen all of the time,” Indeed it seems likely this is just the beginning, Ken Moore, director of IPSOTEK, said: “This technology will do for CCTV what computers did for accountancy in the Sixties and Seventies.”

IPSOTEK states that its systems are easy to integrate with other biometric technologies (Gait recognition, Facial Geometry recognition. etc.) as well as Smart cards/RF ID. They boast that they can provide a level of surveillance far superior and more cost effective than provided by human operators alone. One of the technical minds behind the company, Sergio Velastin, of Kingston University, London, spent a decade developing the mathematical algorithms for IPS.

Some of the features of IPS are:

Detecting Intrusions – When something enters an area of view that has been pre-defined as ‘off-limits’, the operators are alerted to the unauthorised entry.

Evaluating Density – The software is able to monitor the amount of people, congestion, abnormal pedestrian flows (i.e people walking against the flow of crowd, unusually slow or quick pace etc.).

Abandoned Packages – The system can alert operators to any object that is not defined within its limits.

Loitering – The system can detect people who spend a long time in one camera view, even if fairly active.

‘Abnormal’ Behaviour – Graffiti, vandalism, overcrowding and other ‘suspicious’ behaviour.

If the technology is successful it could begin to end the weakness that has long dogged CCTV, that there are too many cameras and not enough people to keep track of them. In the U.K, with the sheer proliferation of CCTV cameras, they are becoming increasingly difficult to manage. Besides being a tedious task, watching mostly inactive CCTV monitors also demands a higher level of concentration than many people can manage. The IPS system can work with up to 1,024 cameras at once.

In a recent survey of hundreds of U.S. & U.K. security executives, intelligent surveillance / smart CCTV was one of the top items in demand, and many other companies are working on similar technologies. IPSOTEK is involved in Chicago, where trials will be funded by a $5 million grant from the US Department of Homeland Security. Chicago hopes to have the new technology installed by spring 2006, along with 250 state-of-the-art cameras.

IPSOTEK stands to make a lot of money in digital policing. Unless we actively fight against this technology, and attack the companies and individuals behind it, it will only be a matter of time before we have smart CCTV on our streets, in our public places, and working environment. Anyone involved in the management, development or finance of these kinds of control technologies is a target.

Pattern recognition systems, which are vital to digital/smart CCTV, are also key to understanding biometrics analysis, which are typically, computer programs, that recognise, cross-match, classify and cluster information. Biometric technologies are automated methods of identifying individuals based on mass profiling: Fingerprinting; DNA analysis; Speech analysis; Gait recognition; Iris recognition; Facial geometry recognition. Most iris pattern recognition systems are based on software created by John Daugman of Cambridge University. An image of an iris, with all the tiny pits, ridges and strings of tissue that make it unique, is turned into a series of three-dimensional contour maps. This information is compressed into a code of 1′s and 0′s just 2048 digits long. This code can be stored or checked against existing records in databases or smart cards. Iris scans are faster and more accurate than any other computerised means of identifying people, such as fingerprint, face or voice recognition. Getting the public to accept the intrusion of eye scans is critical to the companies behind the technology, and the governments who want to use it. The problem is the sheer number of people to be identified, and the vast amount of IT work involved, plus the ability of the technology itself. There is an upper limit to the reliability of iris scans, there are so many environmental variables: scans can be affected by lighting conditions and body temperature, so much so that a system can fail to match two scans of the same iris taken under different conditions. Even so, according to the UK government, in their recent biometric tests for the national ID project there were no false matches in over two million tests. Not long ago similar claims were made for facial geometry recognition software, which has still to make its mark, due to the limitations of the software.

According to a Hitachi Data Systems survey, 65% of European Information Technology directors wanted iris recognition and finger-print scanning introduced into the workplace in the near future, with most of them wanting the technology implemented within the next two years. 54% of those IT directors expected staff to resist the introduction.

All governments are constantly looking at better identification systems to monitor all physical and virtual territory, they want to control and survey all migration, all phone access, all internet. Technologically controlled societies formed under the pretext of fighting terror, illegal immigration and drug-dealing.

The authorities view biometrics as crucial to track and maintain a hold on their citizens movements and activities, through immense databases of credit history, biological profile, and social security. In the UK and across the whole of Europe, State/Capital is pushing for Identity Smart Cards. Smart cards are similar to existing credit cards, except they have an inbuilt computer chip, which has the ability to store and manipulate large amounts of data. In an ID system that combines smart card and biometric technologies, a stored biometric template (Iris, DNA) is compared to the ‘live’ image and/or the ‘enrolled’ image captured when the subject was first processed in the system. Frequently smart cards are contactless, and can interact intelligently with readers up to 10 metres away. This kind of wireless technology, known as RF ID, Wi-Fi or Bluetooth uses short-range signals which allow electronic devices to communicate with each other.

RF ID is a technology developed by a group of electronics manufacturers that allows any sort of electronic equipment to make its own connections without wires, cables or any direct interaction with a user. RF ID devices use a technique called spread-spectrum frequency hopping to prevent interference, and by sending out very weak signals of 1 milliwatt. To compare, a mobile phone can transmit a signal of 3 watts. A RF ID device will use 79 individual, randomly chosen frequencies 1,600 times every second, meaning that a lot of devices can make use of a limited slice of the radio spectrum. This technology has the capacity to completely change our living environments. The convergence of these three types of technology – RF ID, Biometrics, Smart Cards – is like the push for the – Phone, Camera, Email device- It’s all about multi-functionality, miniaturization and flexibility – the companies behind it are envisaging totally integrated global consumer environments, with user profiling and the whole range of social control and domestication applications.

Many RF ID gadgets are open to wireless hacking. There are software tools available and in development, that allow data to be stolen through the air from laptops, mobile phones, PDA’s and even smart cards. A person can use the programs to identify nearby devices that use wireless protocol.

A virus that spreads from one cell phone to another has been created by a security group called 29.a, it transmits itself to phones that have a Bluetooth connection. Unlike most computer worms, it does not exploit a vulnerability in the operating system, it exploits the way the phone is supposed to work. Bluetooth transceivers automatically contact each other when they come into range, and the operating system is designed so that files can be exchanged over the Bluetooth connection. A combination of Bluetooth connections and increasingly sophisticated cell phone software could eventually lead to a good environment for malicious phone viruses capable of bugging calls and deleting the phonebooks, calendars and diaries stored on smart phones. Because it is possible to manipulate the networks of the convergence technologies in this way, groups and individuals will still be able to subvert the system. Using traditional techniques and sophisticated cracking/cloning measures, the black market in identities will survive.

Unless an individual has been identified by the authorities as a threat, surveillance technologies are no help. They are more devices for social control, they let a government & corporation track you and know more about you.

They will not stop the fascists or fanatics, those who blow up trains or carry out other horrific attacks against working class people, the addicts of right-wing ideologies who think human beings dispensable to the force of history. These people have more in common with our authoritarian overseers than they ever could anarchists.

We are not data for machines. Our social environment does not require the ordering, organizing, coercive force. These technologies are yet another aspect of automated capitalist repression, of the absolute negation of self-management, of self-reliance, of autonomy. We are not merely the flows of finance. We refuse to be processed, or submit to the authority of the digital. We are a statistic that cannot be compiled, we reject this consumer society of inhuman values and quantified poverty. We do not want this technology extending into all areas of our societies. We can come up with viable alternatives to endless surveillance, incarceration and inhumanity, we can stop this cycle of degradation and prison.

Clearly, that solution is to destroy this capitalist system of competition and property, straight away.

Against the Control Software – Against Biometrics & Surveillance

Bristol, UK: Arson attack on company who put cctv in schools (UK)

last night fire erupted in the tranquillity of bristols well-to-do redland area, targeting a marked vehicle of Standfast Ltd. besides the usual functions that led us to attack a company invested in “security” (as always, securing the sanctity of private property in mass society) one of their many cctv contracts in bristol, bath, avon, somerset and gloucestershire is both state and private schools, where as you can read in the newspapers even the toilets are no escape from the cameras.

daily submission under impersonal institutions rarely comes naturally. after the nuclear family, the education system at all stages is instrumental in adapting the free child to the civilized world of workplaces, malls and (other) prisons that todays youth are destined for. constant surveillance has proven a most effective step in this domesticating process, kids learning to selfregulate under the assumption that they’re permanently being watched, and this has been made to seem normal by reality tv, the saturation of control technology in the dead synthetic urban enviroment (supplied by the likes of Standfast Ltd.), and the atomised crowd of a generation filled with selfish fear of punishment or repremand.

but it is often still the young people who are least destroyed by this onslaught and who still find themselves impelled to refuse the system (like the riots last summer and scattered moments of revolt everyday since and before). this is just a reminder – WHEN YOU HIT A LENS IT WILL BREAK LIKE ANYTHING ELSE! so shouts to youth rebellion against society, the claimants of the recent attack on security vehicles in nottingham, and everyone else committed to the timeless crime of freedom!

strength for Gustavo Quiroga, held in immigration detention after the Delta squat eviction in Thessaloniki, and for the Gremlin Alley resisters in cardiff!
strength for the anarchists non-cooperating with the grand jury in the american northwest, and for the ones who fled from it!
strength for the street fighters held for the march29 battles in Barcelona, and Carolina whos accused of burning a Starbucks that inspiring day!

anarchy here, now and always — yours in war, counter-surveillance cores.

counter-surveillance cores

Nederland vanaf 1 februari een dictatuur

 

 

Wat betekent dit voor u?

 

 

Datahonger: de Nederlandse geheime dienst wil alles weten

Begin juni begon de grote stroom van onthullingen over de aftapactiviteiten van de Amerikaanse inlichtingendienst NSA en zijn Britse zusje GCHQ. De NSA blijkt 'directe toegang' te hebben tot servers van grote technologiebedrijven, tapt enorme hoeveelheden data af om daar vervolgens in te zoeken en plaatst backdoors in encryptie-algoritmen - en dan weten we ongetwijfeld nog lang niet alles. 

In Nederland wordt er schande van gesproken, ook door politici. "We moeten voorkomen dat data gericht en ongericht wordt verzameld door datastofzuigers", zei PvdA-Kamerlid Jeroen Recourt afgelopen woensdag nog in de Tweede Kamer. Zijn VVD-collega Klaas Dijkhoff zei in hetzelfde Kamerdebat dat de overheid 'terughoudend' moet omgaan met spionageprogramma's. "De vraag moet niet zijn wat je te verbergen hebt", aldus Dijkhoff. In plaats daarvan zou de vraag volgens hem moeten zijn hoeveel de overheid zou moeten willen weten. 

Het is opvallend dat kamerleden om het hardst roepen om de praktijken van de NSA en de GCHQ te veroordelen, terwijl nauwelijks wordt gesproken over de vergaande, concrete plannen die Nederland lijkt te hebben om, net als de NSA, internetverkeer te onderscheppen, te verzamelen en vervolgens gericht te doorzoeken. De overheid heeft dat niet als zodanig aangekondigd, maar wanneer verschillende overwegingen en plannen bij elkaar worden gepakt, wordt duidelijk welke kant Nederland op wil: de kant van meer surveillance. De komende pagina's leggen we uit wat we nu weten - en wat nog niet.

Lees verder op: Tweakers.net


Subscribe to News