Rolling Stone - The Darknet: Is the Government Destroying "the Wild West of the Internet?" 5-15min

The Darknet (sometimes called the Dark Web) works on the Tor browser, free software that masks your location and activity. Originally designed by the Naval Research Lab, Tor receives 60 percent of its backing from the State Department and the Department of Defense to act as a secure network for government agencies as well as dissidents fighting oppressive regimes. It is a privacy tool that has been used for both good and evil. Over the past decade, Tor has empowered activists to spread news during the Arab Spring; it has helped domestic-violence victims hide from online stalkers; and it has allowed ordinary citizens to surf without advertisers tracking them. But at the same time, the Darknet, which Tor enables, has become the primary cove for criminals like Ross Ulbricht, imprisoned founder of Silk Road; the hackers behind the recent Ashley Madison attacks; and the international crew busted by the feds in July. As an instrument for both activists and criminals, Tor presents an increasingly difficult problem for law enforcement to solve — exacerbating the hapless game of whack-a-mole facing those who try to bring law to the most lawless part of the Net. And the battle over the Darknet's future could decide the fate of online privacy in the U.S. and abroad. ... Since its inception in 1923, the NRL has been the military's most esteemed research and development lab, inventing everything from radar to GPS. In 1995, Syverson and his colleagues conceived a way to make online communications as secure as possible. The idea was to provide a means for anyone — including government employees and agents — to share intelligence without revealing their identities or locations. With funding from the Department of Defense, Syverson brought on two scruffy graduates from the Massachusetts Institute of Technology, Roger Dingledine and Nick Mathewson, to help bring his vision to life.

BuzzFeed - The Ticket Machine 5-15min

Officer Rickey Antoine is known around town as the man who gave his own mother a traffic ticket. She was driving 42 miles an hour in a 30 zone, out by the high school football stadium, the story goes. “She said, ‘Boy, quit playin’ with me,’” Antoine recalled. But Sadie Mae Antoine’s son makes no exceptions. His mom drove away with a ticket, Antoine said, and she didn’t cook him chicken dinner for the next couple months. ... The unit also caused the city’s yearly revenue from fines to soar, from $750,000 in 2006 up to as high as $2.1 million in 2012 before settling, most recently, at $1.5 million. ... But people who cannot afford to pay their fines — which can run to a thousand dollars or more — often wind up behind bars, leading to a great disparity in the consequences of traffic tickets on people’s lives.

The New Yorker - The Detectives Who Never Forget A Face 24min

London has more than eight million residents; unless somebody recognizes a suspect, CCTV footage is effectively useless. Investigators circulated photographs of the man with the mustache, but nobody came forward with information. So they turned to a tiny unit that had recently been established by London’s Metropolitan Police Service. In Room 901 of New Scotland Yard, the police had assembled half a dozen officers who shared an unusual talent: they all had a preternatural ability to recognize human faces. ... Most police precincts have an officer or two with a knack for recalling faces, but the Met (as the Metropolitan Police Service is known) is the first department in the world to create a specialized unit. The team is called the super-recognizers, and each member has taken a battery of tests, administered by scientists, to establish this uncanny credential. Glancing at a pixelated face in a low-resolution screen grab, super-recognizers can identify a crook with whom they had a chance encounter years earlier, or whom they recognize from a mug shot. ... By some estimates, as many as a million CCTV cameras are installed in London, making it the most surveilled metropolis on the planet. ... Prosopagnosics often have strange stories about how they cope with their condition. The subjects had their own curious tales about being on the other end of the spectrum. They not only recognized character actors in movies—they recognized the extras, too. In social situations, prosopagnosics often smiled blandly and behaved as if they had previously encountered everyone they met, rather than risk offending acquaintances. Russell’s subjects described the opposite adaptation: they often pretended that they were meeting for the first time people whom they knew they’d met before.

The Economist - Big data, meet Big Brother China invents the digital totalitarian state 9min

Despite years of economic growth, popular discontent at widespread corruption has grown stronger. A series of scandals about everything from shoddy housing to out-of-date vaccines has led to public cynicism about companies and the government’s ability to enforce rules. Social-credit scoring aims to change that by cracking down on the corrupt officials and companies that plague Chinese life. And it aims to keep a closer track on public opinion. In a society with few outlets for free expression, big data might paradoxically help make institutions more accountable. ... But it could also vastly increase snooping and social control. In other countries there have been many scare stories about Big Data leading to Big Brother. Most have proven false. But China is different. It is a one-party state, with few checks on its power, a tradition of social control and, in President Xi Jinping, a leader even more prone to authoritarianism than his immediate predecessors. The extent of social-credit scoring will depend on what the government intends, whether the technology works and how the party responds to public concerns. ... China treats personal information differently from the West. In democracies, laws limit what companies may do with it and the extent to which governments can get their hands on it. Such protections are imperfect everywhere. But in China they do not exist. The national-security law and the new cyber-security law give the government unrestricted access to almost all personal data.

The New York Times - Cyberwar for Sale 24min

On average, an American office worker sends and receives roughly 120 emails per day, a number that grows with each passing year. The ubiquity and utility of email has turned it into a fine-grained record of our day-to-day lives, rich with mundane and potentially embarrassing details, stored in a perpetual archive, accessible from anywhere on earth and protected, in some cases, by nothing more than a single password. In the case of Violeta Lagunes, her email login represented a point of vulnerability, a seam where the digital walls protecting her campaign were at the mercy of her human judgment — specifically, whether she could determine if a message from an apparently reputable source was real or fake. ... Not only will a working email password yield years of intraoffice chatter, invoices, credit-card bills and confidential memos; it can often be leveraged into control of other personal accounts — Twitter, Facebook, Amazon — and even access to company servers and internet domains.

The Atlantic - Inside LAX's New Anti-Terrorism Intelligence Unit 17min

In the summer of 2014, Anthony McGinty and Michelle Sosa were hired by Los Angeles World Airports to lead a unique, new classified intelligence unit on the West Coast. After only two years, their global scope and analytic capabilities promise to rival the agencies of a small nation-state. Their roles suggest an intriguing new direction for infrastructure protection in an era when threats are as internationally networked as they are hard to predict. ... their current operation falls somewhere between a start-up and a think tank. Because she came from an intelligence background, Sosa had an eye for big-picture narratives; McGinty’s 25 years as a street detective and war veteran gave him tactical insights and a deep knowledge of police culture. Together, the two of them have brought classified in-house intelligence analysis to one of the world’s busiest airports ... Their work promises to propel the city’s aging airport to the forefront of today’s conversations about what it means to protect critical infrastructure and, in the process, to redefine where true power lies in the 21st-century metropolis. ... More than 50,000 badged employees report to work there each day, many with direct access to the airfield—and thus to the vulnerable aircraft waiting upon it. More than 100,000 passenger vehicles use the airport’s roads and parking lots every day, and, in 2015 alone, LAX hosted 75 million passengers in combined departures and arrivals.

Fast Company - We're All Being Recorded. Who Reaps The Rewards? 13min

Consider the number of networked cameras that capture data about you as you go about your day. Surveillance cameras are mounted in offices, stores, public transportation; on city streets, ATM machines, and car dashboards. You or your neighbors may have installed cameras to watch over your front door; you may have a webcam watching over your valuables—perhaps even your children. Security cameras are virtually everywhere, installed both to provide a record if a crime is committed and to deter people from committing a crime in the first place. Based on an exhaustive survey of the number of such cameras in one English county in 2011, it was estimated there were 2 million surveillance cameras in the United Kingdom alone—about one camera for every thirty people. ... Generalizing this to the rest of the world, there are about 100 million cameras watching public spaces, all day and all night. Yet, this is only one-tenth of the 1 billion cameras on smartphones. Within the next few years, there will be one networked camera for every single person on the planet. ... If technology continues to follow Moore’s Law, doubling the computing power available at the same price every 18 months, we will very likely be sharing the world with roughly 1 trillion sensors by 2020, in line with projections from Bosch, HP, IBM, and others. ... If everything is recorded, will it encourage "better" behavior? And how will the lack of any recording be interpreted?