Recent Posts

Categories

Search Site Blog

 

wired home security systems

These devices, called Stingrays, lets the government search large geographical areas for a particular cell phone signal. In the process however, the devices collect information on thousands of other cell phone signals belonging to unassociated people, which happen to also be located in the same area. More recently local law enforcement personnel have used the device in order to avoid limitation provided in the Constitution including the requirement the issuance of individualized warrants Cox. While in the novel 1984 surveillance of the population is presented as something the government puts into place to control the society for the governments benefit, the reality in today’s world is that data mining of social network pages, email, location information, individual search histories and data bases that include information of interrelated people goes beyond governmental involvement. Termed participatory surveillance, individuals using sites such as Facebook voluntarily provide personal information about themselves in a profile and knowingly give permission for other sites to access their profiles in order to gain access to news, weather, and other information or even to be able to play games online. Most social networking sites ask their users to provide these kinds of details. This information commonly appears in casual digital conversations within given social networking communication platforms. Consequently, personal information about people is not something necessarily hidden that must be uncovered or retrieved using exotic technologies, human agents or advanced bugging equipment. People themselves are knowingly publishing this information on public websites accessible by almost anyone with internet access and often available without cost. Additionally, the devices that gather information about others that may subsequently be used for covert surveillance today are not relegated to government alone, as presented in the novel 1984. Anyone, including children, who owns a cell phone, tablet, or notebook computer generally has access to still and video cameras, microphones used for recording purposes and other technologies used for to capture images and visual and audio footage included as part of these types of mobile technology platforms.

Posted by Anonymous at 3:19PM | (8 comments)

home automation and security

Considering just the camera part, a security audit is needed to identify weak points, and how to address them one by one with the optimal number and placement of cameras. Apart from physical security, one issue with wireless cameras, and in particular IP cameras is whether they can be accessed from an external network, how frequently vulnerabilities are patched so the window of available exploits remaining viable is short, and how to secure the vast amount of data generated, all to ensure that someone isn’t using it to monitor a range of targets over time to learn patterns/routines. One often sees comments about unexplained “voices” over the camera two way speaker speaking to the kid when the parents are away, and the suspicion that if that’s the case, someone is also watching. This focus on security is missing from this write up. Eyespyfx features free software called MyWebcam broadcaster, which will let you use any USB or built in webcam as a security camera. The software allows users to broadcast a private or public feed, watch it remotely via a web browser or mobile device, and take time lapse photos at set intervals.

Posted by Anonymous at 3:19PM | (4 comments)

wired home security systems

”One thing many in the industry do caution about, however, is not to let the medium swallow the message. “There are a lot of things the industry is starting to focus on as enhancement to the core offerings; but it is important not to get caught up in buzzwords or even the technology itself, but what it enables the customer to do,” says Greg Blackett, senior product manager, Tyco Security Products, Toronto, Canada. “It is still very early days. The end goal is to enhance the existing products and make them more intelligent and help the customer reduce false alarms and bring their total security experience to the next level. But Inder Reddy, Honeywell Security and Fire, says there are actually two schools of thought on where monitoring may be headed. “Some customers have absolutely said ‘We want to leverage our expertise so we are going to get out of the monitoring business and focus on customer service. ’ But as software becomes more and more the way to do things, you could make the case that SaaS types of services are much more scalable and you don’t need to be so large to have economies of scale. For the moment it seems that a lot of active central stations are looking to outsource to wholesale and reapply that cash to grow their RMR business. ”Pam Petrow, Vector Security, also senses change in the wind. “Consumers’ willingness to take on responsibility for some aspects of monitoring will continue to change the industry. Whether it is a DIY with 100 percent self monitoring, or some subset of events the customer self monitors, this will impact the next evolution of monitoring.

Posted by Anonymous at 3:19PM | (8 comments)