In 2002, still reeling from the dot-com crash, Google realized they’d been harvesting a very valuable raw material — your behavior.
surveillance
‘Intelligent Education’ and China’s Grand AI Experiment
Seven schools in China have installed facial recognition technology in classrooms to monitor — and score — their students. At The Disconnect, Yujie Xue reports on this “intelligent education” initiative.
Camera Above the Classroom
Hoping to use AI to boost its education system, China’s government has installed facial recognition technology in pilot schools to monitor its students in the classroom.
Searching for Insights from Her Father’s Delusions
When a journalist tries to understand her father’s claims of CIA surveillance, she learns to see her digital world in a very different light.
Big Bother Is Watching
“Slack tracks and catalogs everything that passes through it, and that is supposed to be a perk. But if the little guy can find anything in the archive, so can his risk-mitigating boss.”
Technology, Privacy, and Searchable Text
The Defense Department, through its Defense Advanced Research Projects Agency (DARPA), started funding academic and commercial research into speech recognition in the early 1970s. What emerged were several systems to turn speech into text, all of which slowly but gradually improved as they were able to work with more data and at faster speeds. In a brief […]
The Art of Authenticity: A Conversation with PostSecret’s Frank Warren
“I feel like PostSecret is almost like an anti-Facebook. It’s the true story that you would normally never share in a public arena.”
How to Remain Happy While the Entire World Is Tracking You
The question that I’m asking myself is, when are we going to stop sharing, and how far are we going to go to allow ourselves to monitor and surveil each other in kind of a coveillance? I believe that there’s no end to how much we can track each other—how far we’re going to self-track, […]
How Moammar Gadhafi’s regime built a surveillance network called the Electric Army that captured all Internet traffic going in and out of Libya, and how dissidents fought back. Gwaider’s favored method, like that of Kevin Mitnick, the famous American hacker he admired, was “social engineering,” which meant tricking the victims into giving up access themselves. […]