Relevant
Relevant Feed
Bringing context to the space between culture and technology.
1736 Members
See All
We'll be adding more communities soon!
© 2019 Relevant Protocols Inc.
"The normalization of surveillance by a range of widely adopted and readily available technologies have opened the way for insurance companies to insert themselves straight into our homes, cars, and bodies, thus gaining further abilities to assess our lifestyles and adjust our behaviors. In essence, they conflate a form of ...Read More
"The U.S. military could soon spot you in a crowd — not by your face or your gait, but by your unique heartbeat rhythm. The Pentagon recently developed and tested a laser that can scan and distinguish the pitter-patter of your heart from up to 650 feet (200 meters) away."
The data is drawn from inconspicuous cell phone apps, like games and weather apps, that ask the user’s permission to access their location. But the data has been used by DHS to “help identify immigrants who were later arrested,” and by CBP to identify cell activity in places such as ...Read More
"The rise of surveillance capitalism over the last two decades went largely unchallenged. “Digital” was fast, we were told, and stragglers would be left behind. It’s not surprising that so many of us rushed to follow the bustling White Rabbit down his tunnel into a promised We thought that we search Google, but now we understand that Google searches us. We assumed that we use social media to connect, but we learned that connection is how social media uses us. We barely questioned why our new TV or mattress had a privacy ...Read More
"We are told that progress requires human beings to be connected, and that science, medicine and much else that is good demands the kind massive data collection only possible if every thing and person are continuously connected. But connection, and the continuous surveillance that connection makes possible, usher in an era of neocolonial appropriation. In this new era, social life becomes a direct input to capitalist production, and data – the data collected and processed when we are connected – is ...Read More
"So, what would it look like to reject the regime of cheap data, and bring data — the bits of life we coproduce from our bodies with our technologies — back into the web of life? Can we “decolonize data” or reclaim a “data commons,” especially when big data itself ...Read More
"When Morales started working for Ecuador, he was a small contractor with big ambitions. It was precisely the presence of Julian Assange in the Ecuadorian embassy that offered him the chance to develop his business. Witnesses reconstructed how Morales put himself at the service of American intelligence to spy on ...Read More
""These modern-day protest movements are critical to realizing the full potential of American democracy and promises to equality.""
Sorry to post from the Times but: “That kind of mass collection alters the purpose of DNA collection from one of criminal investigation basically to population surveillance, which is basically contrary to our basic notions of a free, trusting, autonomous society,” said Vera Eidelman, a staff lawyer with the American Civil Liberties Union’s Speech, Privacy, and Technology ...Read More
"This tool, called Digital Recognition Network (DRN), is not run by a government, although law enforcement can also access it. Instead, DRN is a private surveillance system crowdsourced by hundreds of repo men who have installed cameras that passively scan, capture, and upload the license plates of every car they ...Read More
"The US military is conducting wide-area surveillance tests across six midwest states using experimental high-altitude balloons, documentsfiled with the Federal Communications Commission (FCC) reveal."
"A quest to identify protesters and police officers has people in both groups desperate to protect their anonymity... Mr. Cheung, a skinny 29-year-old, was grabbed at a mall around noon on July 18, according to his account. Four plainclothes officers waited for him to unlock his phone and then jumped ...Read More
More on the Chinese social point system. " Punishment for dishonesty, or some form thereof, is woven into the DNA of the social credit scheme, which seeks to rank citizens according to their trustworthiness, taking into account whether they have broken the law, spread rumors, or violated any financial contracts. ...Read More
Control Delete: An undercover report from Xinjiang on China's brutal "re-education" of Uighur citizens and the maximum surveillance conditions on which China's ethnic cleansing relies.