|Home||Switchboard||Unix Administration||Red Hat||TCP/IP Networks||Neoliberalism||Toxic Managers|
|May the source be with you, but remember the KISS principle ;-)|
The slide above is courtesy of The Guardian
|News||National Security State||Recommended Links||Big Uncle is Watching You||Nephophobia: avoiding clouds to reclaim bits of your privacy||Search engines privacy||Is Google evil?||"Everything in the Cloud" Utopia|
|Reconciling Human Rights With Total Surveillance||Issues of security and trust in "cloud" env||Facebook as Giant Database about Users||Blocking Facebook||Email security||MTA Log Analyzers||HTTP Servers Log Analyses||Cookie Cutting|
|Potemkin Villages of Computer Security||Privacy is Dead – Get Over It||Total control: keywords in your posts that might trigger surveillance||Cyberstalking||How to collect and analyze your own Web activity metadata||Steganography||Anomaly detection||Notes on Search Engines and Google|
|Malware||Cyberwarfare||Data Stealing Trojans||Flame||Duqu Trojan||Magic Lantern||CIPAV||Google Toolbar|
|Nation under attack meme||Is national security state in the USA gone rogue ?||Search engines privacy||Totalitarian Decisionism & Human Rights: The Re-emergence of Nazi Law||Nineteen Eighty-Four||Edward Snowden as Symbol of Resistance to National Security State||Prizm-related humor||Etc|
"As a totalitarian society, the Soviet Union valued eavesdropping and thus developed ingenious methods to accomplish it."
Americans live in Russia, but think they live in Sweden
You have nothing to fear, if you have nothing to hide
I was always suspicious about the success of "cloud" Web mail services starting with Hotmail. There was something fishy here including the purchase of Hotmail by Microsoft. The problem is that if your emails are being stored "in the cloud" each single email is exposed as if it permanently "in transit". Moreover the collection of email in your Inbox and your email address book are a more valuable set of information than any single email and tells much more about you that any intercepted email can.
Just the set of headers (and your address book) constitute something much more dangerous then a single email. All this talk about NSA or CIA ability to listen to your smartphone microphone or via microphones in your laptop, TV or other devices looks like grossly exaggerated threat. Collection of just headers which can be done automatically and "for the duration of your life" provides much more revealing information. And set of emails voluntarily stored by you on "cloud" provider (is not this stupid ?) is the place over which you've absolutely no control (and as such you should have no expectation of privacy) .
The same is true about your phone calls. The ability to listen to your phone calls in most cases is immaterial. The list of your connections is enough to tell everything about you, may be even better then the content of your conversations via phone. And I doubt that they are doing it without serious reasons and transcribing and analyzing your calls cost serious money.
Typically those guys who suspect that their phones are listened behave more carefully. Putting a cell phone into a metal and metal mesh box completely disables the communication with the tower. Ii such a box has a foam lining it pretty much disables sound too. Both those materials are cheap and widely available.
The same is true about your usage of internet, but here situation is a little bit more complex because there is no guarantee that after Snowden revelation people do not try to distort their browsing provide, It is pretty easy to do using any programmable keyboard, or a scripting language and Expect-like module.
I can see why Brazil and Germany are now concerned about NSA activities. I can't understand why they are not concerned about stupidity of their citizens opening accounts and putting confidential information on the Webmail systems such as Hotmail, Yahoo mail and Gmail (all three are mentioned in Prism slide above ;-). Is not this a new mass form of masochism? Accounts in Hotmail or Gmail has their value, but they are primary useful as spam folders. You can direct all emails from you subscriptions on newspapers, sites and magazines to it. Your real account should always be the account on one of small ISP on your own domain, and possibly using special DNS server. Or, at least, POP3 account on your laptop, which does not store any emails on the server.
As we have all found out, that trust in cloud providers is misplaced, as "cloud" services were systematically abused. So when I read that some high level honcho emails were exfiltrated (directly via broken password, or indirectly or special interface in software) and published the only reaction is -- Ohh God, yet another idiot was caught in this net and now will pay for his transgressions.
If publishing of your email box can cause you embarrassment or more serious harm the only place to keep this mailbox (may be outside the recent week or two) in encrypted thumb drive that is inserted in your laptop/desktop strictly for the period of your working with your email.
|If publishing of your email box can cause you embarrassment or more serious harm the only place to keep this mailbox (may be outside the recent week or two) in encrypted thumb drive that is inserted in your laptop/desktop strictly for the period of your working with your email.|
In a way after Snowden revelations we all now need to learn Aesop language (slang is actually almost in-penetratable to computer analysis, unless they are specifically programmed for the particular one) and be more careful. Many people now understand why Facebook users should be very concerned. Facebook is nothing but an intelligence database about their users. That's their primary business model. So it is users data is what Facebook actually sells. But we now need to understand that Yahoo, Microsoft and Google are no different. But after Snowden revelations the usage of Facebook/Yahoo/Gmail accounts was not affected. Several high profile email leaks happened after Snowden revelations. So it looks like in cyberspace a large number of people is more reckless then they behave in a "normal" environment. In one such profile case -- Podesta emails leak John Podesta even failed to purchase $15 key for two factor authentication for Gmail. Podesta also made a very common and stupid mistake -- clicking on the links in email, especially emails with security alerts is really reckless. It is undesirable even if you can verify that the URL used is not spoofed. And this was the person who was Bill Clinton Chief of Staff (1998-2001) -- so the person as close to trained in computer security professional as one can get. Who at one time has access to highest level of US security clearness and all respective briefing and DNS signing that it entails. As a result of this blunder on October 7, 2016, WikiLeaks started to publish thousands of emails reportedly retrieved from Podesta's private Gmail account, some of which contained controversial material regarding Clinton's positions or campaign strategy.
Social sites, especially "Fecebook" skillfully promote what can be called "exhibitionism orgy" People affected generally get what they deserve, but some teenagers paid with their life for this blunder. Not to say that feeling like each and every your "wall" post is like scrolled on NYC Times square is not very comfortable feeling for anybody except status hungry adolescent girls. To say nothing that due to ubiquity of electronic communications all your life is watched anyway, as if East Germany STASI now became a universal world-wide phenomenon. Actually some details now available via electronic communications (your relocation data via your smartphone) were unavailable to STASI. It’s the digital equivalent of tailing a suspect, See Big Uncle is Watching You.
In a current NSA-inspired debate about the moral consequences of digital technologies, it is important to realize the danger of seamless integration of services under Google (especially within Android) as well as other Internet Oligopolies (I doubt that Microsoft with its Windows 10 is much better). When everyone using an Android smartphone is forced to wear Google's digital straitjacket. This can be a very bad thing, and it make combination of a "regular phone" and a 7 inch tablet much more attractive then smartphone (and available a fraction of the cost).
Smartphones essentially invites snooping on you, especially government snooping as the less type of devices the government need to deal with, the cheaper is such mass collection of information on each citizen. Whether this is done in the name of fighting terrorism, communist agents, or infiltration of Martians does not matter. As long as access to such data is extremely cheap, as is the case with both Android and Apple smartphones, it will be abused by the government and some activities will be done without any court orders. In other words if technical means of snooping are cheap they will be abused. It is a duty of concerned citizens who object this practice to make them more expensive and less effective.
|If technical means of snooping are cheap they will be abused. It is a duty of concerned citizens who object this
practice to make them more expensive and less effective.
First of all we must fight against this strange "self-exposure" mania under which people have become enslaved to and endangered by the "cloud" sites they use. Again this nothing more nothing less then digital masochism.
First of all we must fight against this strange "self-exposure" mania under which people have become enslaved to and endangered by the "cloud" sites they use. Again this nothing more nothing less then digital masochism. But there is another important aspect of this problem which is different from the problem of unhealthy self-revelation zeal that large part of Facebook users demonstrates on the Net.
This second problem is often discussed under the meme Is Google evil ? and it is connected with inevitable corruption of Internet by large Internet oligopolies such as Google, Yahoo, Facebook, etc. And they become oligopolies because we agree to use them as primary sources, for example Google for search, independently whether it is good for all types of searches or not. Actually if you compare the quality of retuned results Google is not good for all searches. Bing often beats Google on searches connected with Windows (and even some pure Linux topics) and duckduckgo.com while not bad in most categories really excels if you search information about Eastern Europe, as well on several political themes (I suspect some searches in Google are censored). In any case after Snowden revelations it does not make sense to use a single search engine. You need to spread your searches over several
|After Snowden revelations it does not make sense to use a single search engine. You need to spread your searches over several with your primary/default search engine being anything but Google. The diversification (including diversification of search engines) is now a duty of concerned Internet users.|
IMHO if you did not put several search providers like say, duckduckgo.com in your browser and don't rotate them periodically, you are making a mistake. First of all you deprive yourself from the possibility to learn strong and weak point of different search engines. The second Google stores all searches, possibly indefinitely despite your ability to delete them from you personal history, so you potentially expose yourself to a larger extent by using a single provider.
And according to PRISM NSA is only one of possibly several agencies that can access your data. Using three engines you create the need to merge and correlate for example three sets of your activities (if you separates searches between different engine by topic), which represent not an easy task. Also if you use VPN there is no guarantee that those activities represent actions of a single person or a group of persons (especially, if you use a local proxy). See Alternative Search Engines to Google
As Eugeny Morozov argued in The Net Delusion The Dark Side of Internet Freedom “Internet solutionism” exemplified by Google, is the dangerous romantic utopia of our age. He regards Google-style "cloud uber alles" push as counter-productive, even dangerous:
...Wouldn’t it be nice if one day, told that Google’s mission is to “organize the world’s information and make it universally accessible and useful,” we would finally read between the lines and discover its true meaning: “to monetize all of the world’s information and make it universally inaccessible and profitable”? With this act of subversive interpretation, we might eventually hit upon the greatest emancipatory insight of all: Letting Google organize all of the world’s information makes as much sense as letting Halliburton organize all of the world’s oil.
The reason why the digital debate feels so empty and toothless is simple: framed as a debate over “the digital” rather than “the political” and “the economic,” it’s conducted on terms that are already beneficial to technology companies. Unbeknownst to most of us, the seemingly exceptional nature of commodities in question – from “information” to “networks” to “the Internet” – is coded into our language.
It’s this hidden exceptionalism that allows Silicon Valley to dismiss its critics as Luddites who, by opposing “technology,” “information” or “the Internet”-- they don’t do plurals in Silicon Valley, for the nuance risks overwhelming their brains – must also be opposed to “progress.”
Internet started as a network of decentralized servers, able to withstand a nuclear attack. Now it probably will eventually return to a similar model on a new level as the danger of cloud providers exceed their usefulness. In any case now it looks like anybody who is greedy enough to use "free" (as in "The only free cheese is in the mouse trap") Gmail instead of getting webmail account via ISP with your own (let it call vanity, but it's your own :-) website is playing with fire. Even if they are nothing to hide, if they use Hotmail of Gmail for anything but spam (aka registrations, newsletters, etc) they are entering a dangerous virtual room with multiple hidden camera that record and store information including all their emails and address book forever. Important email should probably now be limited to regular SMTP accounts with client like Thunderbird (which actually is tremendously better then Gmail Web mail client with its Google+ perversions).
For personal, private information, you need to have your own servers and keep nothing in the "cloud". The network was originally designed to be "peer-to-peer" and the only hold back has been the cost of local infrastructure to do it and the availability of local technical talent to keep those services running. Now cost of hardware is trivial and services are so well known that running them is not a big problem even at home, especially a pre-configured virtual machines with "business" cable ISP account ( $29 per month from Cablevision).
Maybe the huge centralized services like Google and Yahoo have really been temporary anomalies of the adolescence of the Internet and given the breach of trust by governments and by these large corporations the next step will be return on a new level to Internet decentralized roots. Maybe local services can still be no less viable then cloud services. Even email, one of the most popular "in the cloud" services can be split into a small part of pure SMTP delivery (important mails) and bulk mail which can stay on Webmail (but preferably you private ISP, not those monsters like Google, Yahoo or Microsoft). That does not exclude using "free" emails of this troika for storing spam :-). In short we actually don't have to be on Gmail to send or read email. Google search is not the best search engine for everything. Moreover it is not wise to put all eggs in one basket. Microsoft might be as bad, but spreading your searches makes perfect sense. TCP connection to small ISP is as good and if you do not trust ISP you can use you home server with cable provider ISP account.
Where I have concern is if the network itself got partitioned along national borders as a result of NSA snooping, large portions of the net can become unreachable. That would be a balkanization we would end up regretting. It would be far better if we take a preemptive action against this abuse and limit the use of our Gmail, hotmail, Yahoo accounts for "non essential" correspondence, if we spread our search activities among multiple search engines and have our web pages, if any on personal ISP account. We need to enforce some level of privacy ourselves and don't behave like lemmings. Years ago there was similar situation with telephones wiretaps, and before laws preventing abuse of this capability were eventually passed people often used public phones for important calls they wanted to keep private.
In Australia any expectations of privacy isn't legally recognized by the Supreme Court once people voluntarily offered data to the third party. And I think Australians are right. Here is a relevant Slashdot post:
General Counsel of the Office of the Director of National Intelligence Robert S. Litt explained that our expectation of privacy isn't legally recognized by the Supreme Court once we've offered it to a third party.
Thus, sifting through third party data doesn't qualify 'on a constitutional level' as invasive to our personal privacy. This he brought to an interesting point about volunteered personal data, and social media habits. Our willingness to give our information to companies and social networking websites is baffling to the ODNI.
'Why is it that people are willing to expose large quantities of information to private parties but don't want the Government to have the same information?,' he asked."
... ... ...
While Snowden's leaks have provoked Jimmy Carter into labeling this government a sham, and void of a functioning democracy, Litt presented how these wide data collection programs are in fact valued by our government, have legal justification, and all the necessary parameters.
Litt, echoing the president and his boss James Clapper, explained thusly:
"We do not use our foreign intelligence collection capabilities to steal the trade secrets of foreign companies in order to give American companies a competitive advantage. We do not indiscriminately sweep up and store the contents of the communications of Americans, or of the citizenry of any country. We do not use our intelligence collection for the purpose of repressing the citizens of any country because of their political, religious or other beliefs. We collect metadata—information about communications—more broadly than we collect the actual content of communications, because it is less intrusive than collecting content and in fact can provide us information that helps us more narrowly focus our collection of content on appropriate targets. But it simply is not true that the United States Government is listening to everything said by every citizen of any country."
It's great that the U.S. government behaves better than corporations on privacy—too bad it trusts/subcontracts corporations to deal with that privacy—but it's an uncomfortable thing to even be in a position of having to compare the two. This is the point Litt misses, and it's not a fine one.
“Abandon all hope, ye who enter here.”
Maybe Dante had some serious vision.
Technology development create new types of communications as well as new types of government surveillance mechanisms (you can call them "externalities" of new methods of communication). Those externalities, especially low cost of mass surveillance (Wikipedia), unfortunately, bring us closer to the Electronic police state (Wikipedia) or National Security State whether we want it or not. A crucial element of such a state is that its data gathering, sorting and correlation are continuous, cover a large number of citizens and all foreigners and those activities are seldom exposed.
Cloud computing as a technology that presuppose storing the data "offsite" on third party servers have several security problems, and one of them is that it is way too much "surveillance friendly" (Misunderstanding of issues of security and trust). With cloud computing powers that be do not need to do complex job of recreating TCP/IP conversations on router level to capture, say, all the emails or all your SMS. You can access Web-based email mailbox directly with all mails in appropriate mailboxes and spam filtered. Your address book is a bonus ;-). This is huge saving of computational efforts.
It means two things:
Not only the USA government with its Prism program is involved in this activity. British security services are probably even more intrusive. Most governments probably try to do some subset of the above. Two important conclusions we can get are:
It puts you essentially in a situation of a bug under microscope on Big Brother. And please understand that modern storage capabilities are such that it is easy to store several years of at least some of your communications, especially emails.
The same is true about your phone calls metadata, credit card transactions and your activities on major shopping sites such as Amazon, and eBay. But here you can do almost nothing. Still I think our support of "brick" merchants is long overdue. Phones are traditional target of government three letter agencies (WSJ) since the WWII. Smartphones with GPS in addition to land line metadata also provide your current geo location. I do not think you can do much here.
I think our support of "brick" merchants is long overdue. And paying cash in the store in not something that you should try to avoid because credit card returns you 1% of the cost of the purchase. This 1% is actually a privacy tax ;-)
The centralization of searches on Google (and to lesser extent on Bing) are also serious threats to your privacy. Here diversification between three or more search engines might help a bit. Other then that and generally limited your time behind the computer I do not think much can be done. Growth of popularity of Duckduckgo suggests that people are vary of Google monopolizing the search, but it is unclear how big are the advantages. You can also save searches as many searches are recurrent and generally you can benefit from using your personal Web proxy with private cashing DNS server. This way to can "shrink" your radar picture, but that's about it. Search engines are now an integral part of our civilization whether we want it or not.
Collection of your searches for the last several years can pretty precisely outline sphere of your interests. And again technical constrains on storage of data no longer exists: how we can talk about privacy at the age of 3 TB harddrives for $99. There are approximately 314 million of the US citizens and residents, so storing one gigabyte of information for each citizen requires just 400 petabytes. For comparison
Facebook has nothing without people
silly enough to exchange privacy for photosharing
The key problem with social sites is that many people voluntarily post excessive amount of personal data about themselves, including keeping their photo archives online, etc. So while East Germany analog of the Department of Homeland Security called Ministry for State Security (Stasi) needed to recruit people to spy about you, now you yourself serves as a informer voluntarily providing all the tracking information about your activities ;-).
Scientella, palo alto
...Facebook always had a very low opinion of peoples intelligence - and rightly so!
I can tell you Silicon Valley is scared. Facebook's very existence depends upon trusting young persons, their celebrity wannabee parents and other inconsequential people being prepared to give up their private information to Facebook.
Google, now that SOCIAL IS DEAD, at least has their day job also, of paid referral advertising where someone can without divulging their "social" identity, and not linking their accounts, can look for a product on line and see next to it some useful ads.
But Facebook has nothing without people silly enough to exchange privacy for photosharing.
... ... ...
Steve Fankuchen, Oakland CA
Cook, Brin, Gates, Zuckerberg, et al most certainly have lawyers and public relations hacks that have taught them the role of "plausible deniability."
Just as in the government, eventually some low or mid-level flunkie will likely be hung out to dry, when it becomes evident that the institution knew exactly what was going on and did nothing to oppose it. To believe any of these companies care about their users as anything other than cash cows is to believe in the tooth fairy.
The amount of personal data which users of site like Facebook put voluntarily on the Web is truly astonishing. Now anybody using just Google search can get quit substantial information about anybody who actively using social sites and post messages in discussion he/she particulates under his/her own name instead of a nickname. Just try to see what is available about you and most probably your jaw would drop...
Google Toolbar in advanced mode is another common snooping tool about your activities. It send each URL you visit to Google and you can be sure that from Google several three letter agencies get this information as well. After all Google has links to them from the very beginning:
This is probably right time for the users of social sites like Facebook, Google search, and Amazon (that means most of us ;-) to think a little bit more about the risks we are exposing ourselves. We all should became more aware about the risks involved as well as real implications of the catch phase Privacy is Dead – Get Over It.
|This is probably right time for the users of social sites like Facebook, Google search, and Amazon (that means most of us ;-) to think a little bit more about the risks we are exposing ourselves.|
As Peter Ludlow noted in NYT (The Real War on Reality):
If there is one thing we can take away from the news of recent weeks it is this: the modern American surveillance state is not really the stuff of paranoid fantasies; it has arrived.
Citizens of foreign countries have accounts at Facebook and mail accounts in Gmail, hotmail and Yahoo mail are even in less enviable position then the US citizens. They are legitimate prey. No legal protection for them exists, if they use those services. That means that they voluntarily open all the information they posted about themselves to the US government in addition to their own government. And the net is probably more wide then information leaked by NSA contractor Edward Snowden suggests. For any large company, especially a telecom corporation, operating is the USA it might be dangerous to refuse to cooperate (Qwest case).
Former Qwest CEO Joseph Nacchio, convicted of insider trading in April 2007, alleged in appeal documents that the NSA requested that Qwest participate in its wiretapping program more than six months before September 11, 2001. Nacchio recalls the meeting as occurring on February 27, 2001. Nacchio further claims that the NSA cancelled a lucrative contract with Qwest as a result of Qwest's refusal to participate in the wiretapping program. Nacchio surrendered April 14, 2009 to a federal prison camp in Schuylkill, Pennsylvania to begin serving a six-year sentence for the insider trading conviction. The United States Supreme Court denied bail pending appeal the same day.
It is not the case of some special evilness of the US government. It simply is more agile to understand and capitalize on those new technical opportunities. It is also conveniently located at the center of Internet universe with most traffic is flowing via US owned or controlled routers (67% or more). But it goes without saying that several other national governments and a bunch of large corporations also try to mine this new gold throve of private information on citizens. Probably with less sophistication and having less financial resources.
In many cases corporations themselves are interested in partnership with the government. Here is one telling comment:
jrs says on June 8, 2013
Yea in my experience that’s how “public/private partnerships” really work:
- Companies DO need protection FROM the government. An ill-conceived piece of legislation can put a perfectly decent out of business. Building ties with the government is protection.
- Government represents a huge market and eventually becomes one of the top customers for I think most businesses (of course the very fact that a government agency is a main customer is often kept hush hush even within the company and something you are not supposed to speak of as an employee even though you are aware of it)
- Of course not every company proceeds to step 3 -- being basically an arm of the government but ..
That means that not only Chinese citizens already operate on the Internet without any real sense of privacy. Even if you live outside the USA the chances are high that you automatically profiled by the USA instead of or in addition to your own government. Kind of neoliberalism in overdrive mode: looks like we all are already citizens of a global empire (Let's call it " Empire of Peace" ) with the capital in Washington.
It is reasonable to assume that a massive eavesdropping apparatus now tracks at least an "envelope" of every electronic communication you made during your lifetime. No need for somebody reporting about you like in "old" totalitarian state like East Germany with its analog of the Department of Homeland Security called the Ministry for State Security (Stasi). So in this new environment, you are like Russians used to say about dissidents who got under KGB surveillance is always "under the dome". In this sense this is just an old vine in a new bottles. But the global scope and lifetime storage of huge amount of personal information for each and every citizen is something new and was made possible the first time in world history by new technologies.
It goes without saying that records about time, sender and receiver of all your phone calls, emails, Amazon purchases, credit card transactions, and Web activities for the last decade are stored somewhere in a database and not necessary only government computers. And that means that your social circle (the set of people you associate with), books and films that you bought, your favorite websites, etc can be easily deducted from those records.
That brings us to an important question about whether we as consumers should support such ventures as Facebook and Google++ which profile you and after several years have a huge amount of pretty private and pretty damaging information about you, information which can get into wrong hands.
The most constructive approach to NSA is to view it as a large government bureaucracy that expanded to the extent that "quantity turned into quality."
Any large bureaucracy is a political coalition with the primary goal of preserving and enhancing of its own power (and, closely related to power, the level of financing), no matter what are official declarations. And if breaching your privacy helps with this noble goal, they will do it.
Which is what Bush government did after 9/11. The question is how much bureaucratic bloat resulting in classic dynamics of organizational self-aggrandizement and expansionism happened in NSA is open to review. We don't know how much we got in exchange for undermining internet security and the US constitution. But we do know the intelligence establishment happily appropriated billions of dollars, had grown by thousand of employees and got substantial "face lift" and additional power within the executive branch of government. To the extent that sometimes it really looks like a shadow government (with three branches NSA, CIA and FBI). And now they will fight tooth-and nail to protect the fruits of a decade long bureaucratic expansion. It is an Intelligence Church of sorts and like any religious organization they do not need facts to support their doctrine and influence.
Typically there is a high level of infighting and many factions within any large hierarchical organization, typically with cards hold close the west and limited or not awareness about those turf battles of the outsiders. Basically any hierarchical institution corporate, religious, or military will abuse available resources for internal political infighting. And with NSA "big data" push this is either happening or just waiting to happen. This is a danger of any warrantless wiretapping program: it naturally convert itself into a saga of eroding checks and disappearing balances. And this already happened in the past, so in a way it is just act two of the same drama (WhoWhatWhy):
After media revelations of intelligence abuses by the Nixon administration began to mount in the wake of Watergate, NSA became the subject of Congressional ire in the form of the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities—commonly known as the “Church Committee” after its chair, Senator Frank Church (D-ID)—established on January 17, 1975. This ad-hoc investigative body found itself unearthing troves of classified records from the FBI, NSA, CIA and Pentagon that detailed the murky pursuits of each during the first decades of the Cold War. Under the mantle of defeating communism, internal documents confirmed the executive branch’s use of said agencies in some of the most fiendish acts of human imagination (including refined psychological torture techniques), particularly by the Central Intelligence Agency.
The Cold War mindset had incurably infected the nation’s security apparatus, establishing extralegal subversion efforts at home and brutish control abroad. It was revealed that the FBI undertook a war to destroy homegrown movements such as the Black Liberation Movement (including Martin Luther King, Jr.), and that NSA had indiscriminately intercepted the communications of Americans without warrant, even without the President’s knowledge. When confronted with such nefarious enterprises, Congress sought to rein in the excesses of the intelligence community, notably those directed at the American public.
The committee chair, Senator Frank Church, then issued this warning about NSA’s power:
That capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything. Telephone conversations, telegrams, it doesn’t matter. There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know. Such is the capability of this technology. I don’t want to see this country ever go across the bridge. I know the capability that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss. That is the abyss from which there is no return.
The reforms that followed, as enshrined in the Foreign Intelligence Surveillance Act (FISA) of 1978, included the establishment of the Foreign Intelligence Surveillance Court (FISC): a specially-designated panel of judges who are allowed to review evidence before giving NSA a warrant to spy on Americans (only in the case of overseas communication). Hardly a contentious check or balance, FISC rejected zero warrant requests between its inception in 1979 and 2000, only asking that two warrants be “modified” out of an estimated 13,000.
In spite of FISC’s rubberstamping, following 9/11 the Bush administration began deliberately bypassing the court, because even its minimal evidentiary standard was too high a burden of proof for the blanket surveillance they wanted. So began the dragnet monitoring of the American public by tapping the country’s major electronic communication chokepoints in collusion with the nation’s largest telecommunications companies.
When confronted with the criminal conspiracy undertaken by the Bush administration and telecoms, Congress confirmed why it retains the lowest approval rating of any major American institution by “reforming” the statute to accommodate the massive law breaking. The 2008 FISA Amendments Act [FAA] entrenched the policy of mass eavesdropping and granted the telecoms retroactive immunity for their criminality, withdrawing even the negligible individual protections in effect since 1979. Despite initial opposition, then-presidential candidate Barack Obama voted for the act as one of his last deeds in the Senate. A few brave (and unsuccessful) lawsuits later, this policy remains the status quo.
Similarly we should naturally expect that the notion of "terrorist" is very flexible and in certain cases can be equal to "any opponent of regime" (any "dissident" n soviet terms). While I sympathize NYT readers reaction to this incident (see below), I think it is somewhat naive. They forget that they are living under neoliberal regime which like any rule of top 0.01% is afraid of and does not trust its own citizens. So massive surveillance program is a self-preservation measure which allow the neoliberal elite to crush or subvert the opposition at early stages. This is the same situation as existed with Soviet nomenklatura, with the only difference that Soviet nomenklatura was more modest in pushing the USSR as a beacon of progress and bright hope for establishing democratic governance for all mankind ;-). As Ron Paul noted:
Many of us are not so surprised.
Some of us were arguing back in 2001 with the introduction of the so-called PATRIOT Act that it would pave the way for massive US government surveillance—not targeting terrorists but rather aimed against American citizens. We were told we must accept this temporary measure to provide government the tools to catch those responsible for 9/11. That was nearly twelve years and at least four wars ago.
We should know by now that when it comes to government power-grabs, we never go back to the status quo even when the “crisis” has passed. That part of our freedom and civil liberties once lost is never regained. How many times did the PATRIOT Act need renewed? How many times did FISA authority need expanded? Why did we have to pass a law to grant immunity to companies who hand over our personal information to the government?
And while revealed sources of NSA Prism program include Apple, Google, Facebook, Microsoft, Yahoo and others major Internet players, that's probably just a tip of the iceberg. Ask yourself a question, why Amazon and VISA and MasterCard are not on the list? According to The Guardian:
The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian.
The NSA access is part of a previously undisclosed program called Prism, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says.
... ... ...
Microsoft – which is currently running an advertising campaign with the slogan "Your privacy is our priority" – was the first, with collection beginning in December 2007. It was followed by Yahoo in 2008; Google, Facebook and PalTalk in 2009; YouTube in 2010; Skype and AOL in 2011; and finally Apple, which joined the program in 2012. The program is continuing to expand, with other providers due to come online.
Collectively, the companies cover the vast majority of online email, search, video and communications networks
... ... ...
A chart prepared by the NSA, contained within the top-secret document obtained by the Guardian, underscores the breadth of the data it is able to obtain: email, video and voice chat, videos, photos, voice-over-IP (Skype, for example) chats, file transfers, social networking details, and more.
So while the document does not list Amazon, but I would keep fingers crossed.
To be aware about a situation you need to be able to formulate and answer key questions about it. The first and the most important question is whether the government is engaged in cyberstalking of law abiding citizens. Unfortunately the answer is definite yes, as oligarchy needs total control of prols. As a result National Security State rise to prominence as a dominant social organization of neoliberal societies, the societies which characterized by very high level of inequality.
But there are some additional, albeit less important questions. The answers to them determine utility or futility of small changes of our own behavior in view of uncovered evidence. Among possible set of such question I would list the following:
There are also some minor questions about efficiency of "total surveillance approach". Among them:
More people die daily from (1) car accidents and (2) gang violence in one day then people who died due to 9-11 accident. Should not billions or dollars spent by NSA be utilized by different agencies for preventing death toll mentioned above?
Even if NSA algorithms are incredibly clever they can't avoid producing large number of false positives. The question arise how many innocent people are monitored as the result of this externality.
The other part of understand the threat is understanding is what data are collected. The short answer is all your phone records and Internet activity (RT USA):
The National Security Agency is collecting information on the Internet habits of millions of innocent Americans never suspected of criminal involvement, new NSA documents leaked by former intelligence contractor Edward Snowden suggest.
Britain’s Guardian newspaper reported Monday that top-secret documents included in the trove of files supplied by the NSA contractor-turned-leaker Edward Snowden reveal that the US intelligence community obtains and keeps information on American citizens accumulated off the Internet without ever issuing a search warrant or opening an investigation into that person.
The information is obtained using a program codenamed Marina, the documents suggest, and is kept by the government for up to a full year without investigators ever having to explain why the subject is being surveilled.
“Marina has the ability to look back on the last 365 days' worth of DNI metadata seen by the Sigint collection system, regardless whether or not it was tasked for collection,” the Guardian’s James Ball quotes from the documents.
According to a guide for intelligence analysts supplied by Mr. Snowden, “The Marina metadata application tracks a user's browser experience, gathers contact information/content and develops summaries of target.”
"This tool offers the ability to export the data in a variety of formats, as well as create various charts to assist in pattern-of-life development,” it continues.
Ball writes that the program collects “almost anything” a Web user does online, “from browsing history – such as map searches and websites visited – to account details, email activity, and even some account passwords.”
Only days earlier, separate disclosures attributed to Snowden revealed that the NSA was using a massive collection of metadata to create complex graphs of social connections for foreign intelligence purposes, although that program had pulled in intelligence about Americans as well.
After the New York Times broke news of that program, a NSA spokesperson said that “All data queries must include a foreign intelligence justification, period.” As Snowden documents continue to surface, however, it’s becoming clear that personal information pertaining to millions of US citizens is routinely raked in by the NSA and other agencies as the intelligence community collects as much data as possible.
In June, a top-secret document also attributed to Mr. Snowden revealed that the NSA was collecting the telephony metadata for millions of Americans from their telecom providers. The government has defended this practice by saying that the metadata — rough information that does not include the content of communications — is not protected by the US Constitution’s prohibition against unlawful search and seizure.
“Metadata can be very revealing,” George Washington University law professor Orin S. Kerr told the Times this week. “Knowing things like the number someone just dialed or the location of the person’s cellphone is going to allow them to assemble a picture of what someone is up to. It’s the digital equivalent of tailing a suspect.”
According to the Guardian’s Ball, Internet metadata picked up by the NSA is routed to the Marina database, which is kept separate from the servers where telephony metadata is stored.
Only moments after the Guardian wrote of its latest leak on Monday, Jesselyn Radack of the Government Accountability Project read a statement before the European Parliament’s Committee on Civil Liberties, Justice and Home Affairs penned by none other than Snowden himself.
“When I began my work, it was with the sole intention of making possible the debate we see occurring here in this body,” Snowden said.
Snowden, who has been granted temporary asylum in Russia after being charged with espionage in the US, said through Raddack that “The cost for one in my position of returning public knowledge to public hands has been persecution and exile.”
|If the NSA's mining of data traffic is so effective, why weren't Tsarnaev's family's overseas calls predictive
of a bombing at the Boston Marathon?
-Helen Corey WSJ.com
There are limits of this "powerful analytical software" used. First of all Snowden revelations constitute a blow (but not a knockout) for all NSA activities against really serious opponents. Now they are forewarned and that mean forearmed. That simply means that they might start feeding NSA disinformation and that's a tremendous danger for NSA that far outweigh the value of any real information collected.
The main danger for NSA is the deliberate feeding of false information into the collection scream
There is another side of this story. As we mentioned above, even if NSA algorithms are incredibly clever they can't avoid producing large number of false positives taking into account that they are drinking from a fire hose. Especially now when people will try to bury useful signal in noise. And it is not that difficult to replay somebody else Web logs on a periodic basis -- that means that the task of analysis of web logs became not only more complex. It changed. The assumption that that the set of visited sites represents real activity of a particular user is now just a plausible hypothesis. Not more then that.
Inefficiency is another problem. After two year investigation into the post 9/11 intelligence agencies, the Washington Post came to conclusion that they were collecting far more information than anyone can comprehend (aka "drowning is a sea of data"):
Every day, collection systems at the National Security Agency intercept and store 1.7 billions e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases"
Such volume along creates a classic problem of "signal vs. noise" (infoglut). And this is insolvable problem, which became only worse with the availability of more information. In this sense Prism program which deals with already filtered by user information is a great help to NSA (and that means that Goggle, Facebook, Microsoft, Yahoo and fiends are very valuable for NSA partners and will remain partners despite all claims of their top honchos).
Unless special care is exercised by collection everything from the "line" NSA is like drinking from the firehose:
...Infoglut raises disturbing questions regarding new operations of power and control in a world of algorithms." —Jodi Dean, author of Democracy and Other Neoliberal Fantasies
...Andrejevic argues that people prioritize correlation over comprehension - "what" and facts are more important than "why" and reasons.
As Washington Post noted:
Analysts who make sense of document and conversations obtained by foreign and domestic spying share their judgment by publishing 50,000 intelligence reports each year -- a volume so large that many are routinely ignored
In plain English that means that analysts produce reports, lion share of which is never read. The enormity of the database exacerbate the problems. That's why NSA is hunting for email on cloud providers, where they are already filtered from spam, and where processing required is so much less than for the same information intercepted from the wire. Still even with the direct access to user accounts, the volume of data, especially graphic info (pictures), sound and video data, is really huge and that stress the limits of processing capabilities and storage.
Which means that switch to hieroglyphs in communication theoretically creates serious problems in intercepting the data stream. Deciphering a meaning of pictograms used is not that easy. Classic captcha methods can be used to make direct conversion to text impossible. This method was actually widely used in letters in the past (when some words were deliberately replaced by hand written pictures. ). For one thing that approach make it more difficult "keyword-based" searches for relevant information in email as "trigger-words" can be replaced by pictograms. Add to this that the meaning of pictograms can be individualized and you can see that this is an approach close to stenography.
Presence of noise in the channel also makes signal much more difficult to detect. Now you can be sure that any serious opponent will try to disguise the traffic by all means available. So getting a "clean" steam of data for a given IP is now a pipe dream.
Existence of Snowden saga when a single analyst was able to penetrate the system and extract considerable amount information with impunity suggests that the whole Agency is a mess with a lot of incompetents at the helm. Which is typical for large government agencies and large corporations. Still the level of logs collection and monitoring proved to be surprisingly weak, and those are indirect signs of other rot. It looks like the agency does not even know what reports Snowden get into his hands. Unless this is a very clever insider operation, we need to assume that Edward Snowden stole thousands of documents, abused his sysadmin position in the NSA, and was never caught. The fact that he was able to bypass logs tells that the whole place is a complete mess. In other words "The shoemaker’s children go barefoot."
|the level of logs collection and monitoring proved to be surprisingly weak, and those are indirect signs of other rot. It looks like the agency does not even know what reports Snowden get into his hands.|
Here is one relevant comment from The Guardian
Oh NSA......that´s fine that you cannot find something......what did you tell us, the World and the US Congress about the "intelligence" of Edward Snowden and the low access he had?
SNOWDEN SUSPECTED OF BYPASSING ELECTRONIC LOGS
WASHINGTON (AP) -- The U.S. government's efforts to determine which highly classified materials leaker Edward Snowden took from the National Security Agency have been frustrated by Snowden's sophisticated efforts to cover his digital trail by deleting or bypassing electronic logs, government officials told The Associated Press. Such logs would have showed what information Snowden viewed or downloaded.
The government's forensic investigation is wrestling with Snowden's apparent ability to defeat safeguards established to monitor and deter people looking at information without proper permission, said the officials, who spoke on condition of anonymity because they weren't authorized to discuss the sensitive developments publicly.
On the other hand government agencies were never too good in making huge and complex software projects work. And any large software project is a very difficult undertaking in any case, which require talented and dedicated manager at the helm. In large bureaucracies such people are filtered out long before that get to the necessary position. Mostly sycophants, "yes men", or people who can well mask their real identities, prosper.
Even in industry 50% of software projects fail, and anybody who works in the industry knows, that the more complex the project is the higher are chances that it will be mismanaged and its functionality crippled due to architectural defects ("a camel is a horse designed by a committee"). The Conway law also suggest that the structure of software product reflect communication channels in the organization.
With pretty bizarre communication channels in a large hierarchical organization like NSA you can expect huge problems on architectural level. There are also counterexamples to that. Google Earth was initially a project of three letter agencies, which was "donated" to Google. And this is a very good software product. Still it is given that large projects will be over budget. Possibly several times over. But if money is not a problem such system will eventually be completed ("with enough thrust pigs can fly").
|Any large software project is a very difficult undertaking in any case, which require talented and dedicated manager at the helm. In large bureaucracies such people are filtered out long before that get to the necessary position. Mostly sycophants, "yes men", or people who can well mask their real identities, prosper.|
Still there’s no particular reason to think that corruption (major work was probably outsourced) and incompetence (on higher management levels and, especially on architectural level as in "camel is a horse designed by a committee") don't affect the design and functionality of such government project. Now when this activity come under fire some "ad hoc" adjustments might be especially badly thought out and could potentially cripple even the existing functionality. As J. Kirk Wiebe, a NSA insider, noted
"The way the government was going about those digital data flows was poor formed, uninformed. There seen to be more of a desire to contract out and capture money flow then there was a [desire} to actually perform the mission".
See the interview of a trio of former National Security Agency whistle-blowers to USA TODAY ( J. Kirk Wiebe remarks starts at 2:06 and the second half of it continues from 6:10):
In military organizations the problem is seldom with the talent (or lack of thereof) of individual contributors. The problem is with the bureaucracy that is very effective in preventing people from exercising their talents at the service of their country. Such system is deformed in such a way that it hamstrings the men who are serving in it. As a results, more often then not the talents are squandered or misused by patching holes created by incompetence of higher-up or or just pushed aside in the interdepartmental warfare.
In a way, incompetence can be defined as the inability to avoid mistakes which, in a "normal" course of project development could and should be avoided. And that's the nature of military bureaucracy with its strict hierarchy, multiple layer of command and compete lack of accountability on higher levels.
In addition, despite the respectable name of the organization many members of technical staff are amateurs. They never managed to sharpen their technical skills, while at the same time acquiring the skills necessary to survive the bureaucracy. Many do not have basic academic education and are self-taught hackers and/or "grow on the job" type of personnel. Such people often have difficulties seeing "the bigger picture". Typically people at higher level of hierarchy, are simply not experts in software engineering, but more like typical corporate "PowerPoint warriors." They can be very shred managers and accomplished political fighters, but that's it. Death by PowerPoint of good ideas in large bureaucracies is a fact of life.
This is the same situation that exists in security departments of large multinationals, so we can extrapolate from that. The word
of Admiral Nelson "If the enemy would know what officer corps will confront them, it will be trembling, like I am". Here is Bill Gross
A few years ago I wrote about the time that our ship (on my watch) was almost cut in half by an auto-piloted tanker at midnight, but never have I divulged the day that the USS Diachenko came within one degree of heeling over during a typhoon in the South China Sea. “Engage emergency ballast,” the Captain roared at yours truly – the one and only chief engineer.
Little did he know that Ensign Gross had slept through his classes at Philadelphia’s damage control school and had no idea what he was talking about. I could hardly find the oil dipstick on my car back in San Diego, let alone conceive of emergency ballast procedures in 50 foot seas.
And so…the ship rolled to starboard, the ship rolled to port, the ship heeled at the extreme to 36 degrees (within 1 degree, as I later read in the ship’s manual, of the ultimate tipping point). One hundred sailors at risk, because of one twenty-three-year-old mechanically challenged officer, and a Captain who should have known better than to trust him.
Huge part of this work is outsourced to various contractors and this is where corruption really creeps in. So the system might be not as powerful as many people automatically assume when they hear the abbreviation of NSA. So in a way when news about such system reaches public it might serve not weakening but strengthening of the capabilities of the system. Moreover, nobody would question the ability of such system to store huge amount of raw or semi-processed data including all metadata for your transactions on the Internet.
Also while it is a large agency with a lot of top mathematic talent, NSA is not NASA and motivation of the people (and probably quality of architectural thinking about software projects involved) is different despite much better financing. While they do have high quality people, like most US agencies in general, large bureaucracies usually are unable to utilize their talent. Mediocrities with sharp elbows, political talent, as well as sociopaths typically rule the show.
That means two things:
So Israel might be in this game too.
So even with huge amount of subcontractors they can chase mostly "big fish". Although one nasty question is why with all those treasure trove of data organized crime is so hard to defeat. Having dataset like this should generally expose all the members of any gang. Or, say, network of blue collar insider traders. So in an indirect way the fact that organized crime not only exists and in some cities even flourish can suggest one of two things:
The presentation claims Prism was introduced to overcome what the NSA regarded as shortcomings of Fisa warrants in tracking suspected foreign terrorists. It noted that the US has a "home-field advantage" due to housing much of the internet's architecture. But the presentation claimed "Fisa constraints restricted our home-field advantage" because Fisa required individual warrants and confirmations that both the sender and receiver of a communication were outside the US. "Fisa was broken because it provided privacy protections to people who were not entitled to them," the presentation claimed. "
It took a Fisa court order to collect on foreigners overseas who were communicating with other foreigners overseas simply because the government was collecting off a wire in the United States. There were too many email accounts to be practical to seek Fisas for all."
... ... ...
A senior administration official said in a statement: "The Guardian and Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. This law does not allow the targeting of any US citizen or of any person located within the United States.
"The program is subject to oversight by the Foreign Intelligence Surveillance Court, the Executive Branch, and Congress. It involves extensive procedures, specifically approved by the court, to ensure that only non-US persons outside the US are targeted, and that minimize the acquisition, retention and dissemination of incidentally acquired information about US persons.
There is also a question of complexity of analysis:
Mass collection of data represent dangers outside activities of three latter agencies. Data collected about you by Google, Facebook, etc are also very dangerous. And they are for sell. Errors in algorithms and bugs in data mining programs can bite some people in a different way then branding them as "terrorists". Such people have no way of knowing why all of a sudden, for example, they are paying a more for insurance, why their credit score is so low no matter what they do, etc.
In no way government in the only one who are using the mass of data collected via Google / Facebook / Yahoo / Microsoft / Verizon / Optonline / AT&T / Comcast, etc. It also can lead to certain subtle types of bias if not error. And there are always problems of intentional misuse of data sets having extremely intimate knowledge about you such as your medical history.
Corporate corruption can lead to those data that are shared with the government can also be shared for money with private actors. Inept use of this unconstitutionally obtained data is a threat to all of us.
Then there can be cases when you can be targeted just because you are critical to the particular area of government policy, for example the US foreign policy. This is "Back in the USSR" situation in full swing, with its prosecution of dissidents. Labeling you as a "disloyal/suspicious element" in one of government "terrorism tracking" databases can have drastic result to your career and you never even realize whats happened. Kind of Internet era McCarthyism .
Obama claims that the government is aware about this danger and tried not to overstep, but he is an interested party in this discussion. In a way all governments over the world are pushed into this shady area by the new technologies that open tremendous opportunities for collecting data and making correlations.
That's why even if you are doing nothing wrong, it is still important to know your enemy, as well as avoid getting into some traps. As we already mentioned several times before, one typical trap is excessive centralization of your email on social sites, including using a single Webmail provider. It is much safer to have mail delivery to your computer via POP3 and to use Thunderbird or other email client. If your computer is a laptop, you achieve, say, 80% of portability that Web-based email providers like Google Gmail offers. That does not mean that you should close your Gmail or Yahoo account. More important is separating email accounts into "important" and "everything else". "Junk mail" can be stored on Web-based email providers without any problems. Personal emails is completely another matter.
Email security is a large and complex subject. It is a typical "bullet vs. armor" type of topic. In this respect the fact the US government were highly alarmed by Snowden revelations is understandable as this shift the balance from dominance of "bullet" by stimulating the development of various "armor" style methods to enhance email privacy. It also undermines/discredits cloud-based email services, especially large one such as Hotmail, Gmail, and Yahoo mail, which are the most important providers of emails.
You can't hide your correspondents so recreation of network of your email correspondents is a fact of life that you can do nothing about. But you can make searching emails for keywords and snooping of the text of your email considerably more difficult. And those methods not necessary means using PGP (actually from NSA point of view using PGP is warning sign that you has something to hide and that increase interest to your mailbox; and this is a pretty logical assumption).
First of all using traditional POP3 account now makes much more sense (although on most ISPs undelivered mail is available via Web interface). In case of email security those who know Linux/Unix have a distinct advantage. Those OSes provide the ability to have a home server that performs most functions of the cloud services at a very moderate cost (essentially the cost of web connection, or an ISP Web account; sometime you need to convert you cable Internet account to "business" to open ports). Open source software for running Webmail on your own server is readily available and while it has its security holes at least they are not as evident as those in Gmail, Hotmail and Yahoo mail. And what is the most important you escape aggregation of your emails on a large provider.
IMHO putting content in attachment, be it gif of a handwritten letter in DOC document, or MP3 file presents serious technical problems for snoopers. First of all any multimedia attachment, such a gif of your handwriting (plus a jpeg of your favorite cat ;-), dramatically increase the necessary storage and thus processing time. Samsung Note 10.1 and Microsoft Surface PRO tablets provide opportunity to add both audio and handwriting files to your letter with minimal effort. If you have those device, use them. Actually this is one of few areas when tablets are really useful. Sending content as a multimedia file makes snooping more difficult for several reasons:
Another important privacy enhancing feature of emails is related to a classic "noise vs. useful signal" problem. In this respect
the existence of spam looks like a blessing. In case of mimicry filtering "signal from noise" became a complex problem. That's why NSA
prefers accessing mail at final destination as we saw from slides published in Guardian. But using local delivery and Thunderbird or
any other mail client make this avenue of snooping easily defeatable. Intercepted on the router, spam can clog arteries of automatic
processing really fast. It also might slightly distort your "network of contacts" So if you switch off ISP provided spam filter
and filter spam locally on your computer, the problem of "useful sig
Subject: Gold Watches
Subject: Join us and Lose 8-12 lbs. in Only 7-10 Days!
Subject: New private social network for Ukrainian available ladies and foreign men.
Subject: Fresh closed social network for Russian attractive girls and foreigners.
Subject: Daily Market Movers Digest
Subject: IMPORTANT - WellsFargo
Subject: New private social network for beautiful Ukrainian women and foreign men.
Subject: Fresh closed social network for Russian sexy women and foreign men.
Subject: (SECURE)Electronic Account Statement 0558932870_06112013
Subject: (SECURE)Electronic Account Statement 0690671601_06112013
Subject: Returned mail: see transcript for details
Subject: Bothered with censorship restrictions on Social networks?
Subject: Delivery Status Notification (Failure) - [AKO Content Violation - SPAM]Are
Subject: (SECURE)Electronic Account Statement 0355009837_06112013
Subject: You need Ukrainian with large breasts that Madame ready to correspond to intimate topics?
Subject: You need a Russian woman with beautiful eyes is ready to correspond to private theme?
Subject: Mail delivery failed: returning message to sender
Subject: Are you bored with censorship limits at Social networks?
Subject: Join us and Lose 8-12 lbs. in Only 7-10 Days!
Subject: Important Activation needed
Subject: WebSayt Sadece 35 Azn
Subject: Join us and Lose 8-12 lbs. in Only 7-10 Days!
Note the line "Subject: Mail delivery failed: returning message to sender". That means that in the spam filter you need to fight with the impersonalization (fake sender) as well. While typically this is easy based on content of "Received:" headers, there are some complex cases, especially with bounced mails and "onetime" identities (when the sender each time assumes a different identity at the same large provider). See also Using “impersonalization” in your email campaigns.
BTW fake erotic spam provides tremendous steganography opportunities. Here is a very simplistic example.
Subject: Do you want a Ukrainian girl with large breasts ready to chat with you on intimate topics?
New closed social network with hot Ukrainian ladies is open. If you want to talk on erotic themes, with sweet women then this is for you!
I dropped my previous girlfriend. Things deteriorates dramatically here and all my plans are now on hold.
So I decided to find a lady friend for regular erotic conversations! And I am now completely satisfied customer.
Give it is try. "http://t.co/FP8AnKQOyV" Free Registration and first three sessions !!!
Does the second paragraph starting with the phrase "I dropped my previous girlfriend..." in the email below contain real information masked in erotic spam, or the message is a regular junk?
Typical spam filter would filter this message out as spam, especially with such a subject line ;-).
You can also play a practical joke imitating spammer activity. Inform a couple of your friends about it and then send similar letter from one of your Gmail account to your friends. Enjoy change in advertisements ;-).
In many cases what you want to send via email, can be done more securely using phone. Avoid unnecessary emails like a plague. And not only because of NSA existence. Snooping into your mailbox is not limited to three-letter agencies.
I always wondered why Facebook -- a cluelessly designed site which imitates AOL, the hack written in PHP which provide no, or very little value to users, other then a poorly integrated environment for personal Web page (simple "vanity fair" pages), blog and email. It is definitely oriented on the most clueless or at least less sophisticated users and that's probably why it has such a level of popularity. They boast almost billion customers, although I suspect that half of those customers check their account only once a month or so. Kind of electronic tombstone to people's vanity...
The interface is second rate and just attests a very mediocre level of software engineering. It is difficult to imagine that serious guys are using Facebook. And those who do use it, usually are of no interest to three letter agencies. Due to this ability of the government to mine Facebook might be a less of a problem then people assume, much less of a problem than mining Hotmail or Gmail.
But that does not mean that Facebook does not have value. Just those entities for whom it provides tremendous value are not users ;-) Like WikiLeaks founder Julian Assange stated Facebook, Google, and Yahoo are actually extremely powerful tools for centralized information gathering that can used by advertisers, merchants, government, financial institutions and other powerful/wealthy players.
Such sites are also very valuable tools for advertisers who try to capitalize of the information about your Facebook or Google profile, Gmail messages content, network of fiends and activities. And this is pretty deep pool of information.
"Facebook in particular is the most appalling spying machine that has ever been invented," Assange said in the interview, which was videotaped and published on the site. "Here we have the world's most comprehensive database about people, their relationships, their names, their addresses, their locations and the communications with each other, their relatives, all sitting within the United States, all accessible ..."
That's why Google, who also lives and dies by advertising revenue put so much efforts at Google+. And promotes so heavily +1 button. They sense the opportunity for additional advertising revenue due to more precise targeting and try to replicate Facebook success on a better technological platform (Facebook is a hack written in PHP -- and writing in PHP tells a lot about real technological level of Mark Zuckerberg and friends).
But government is one think, advertisers is another. The magnitude of online information Facebook has available about each of us for targeted marketing is stunning. In Europe, laws give people the right to know what data companies have about them, but that is not the case in the United States. Here is what Wikipedia writes about Facebook data mining efforts:
"We may use information about you that we collect from other sources, including but not limited to newspapers and Internet sources such as blogs, instant messaging services and other users of Facebook, to supplement your profile."
However, the policy was later updated and now states: "We may use information about you that we collect from other Facebook users to supplement your profile (such as when you are tagged in a photo or mentioned in a status update). In such cases we generally give you the ability to remove the content (such as allowing you to remove a photo tag of you) or limit its visibility on your profile." The terminology regarding the use of collecting information from other sources, such as newspapers, blogs, and instant messaging services, has been removed.
The possibility of data mining by private individuals unaffiliated with Facebook has been a concern, as evidenced by the fact that two Massachusetts Institute of Technology (MIT) students were able to download, using an automated script, over 70,000 Facebook profiles from four schools (MIT, NYU, the University of Oklahoma, and Harvard University) as part of a research project on Facebook privacy published on December 14, 2005. Since then, Facebook has bolstered security protection for users, responding: "We’ve built numerous defenses to combat phishing and malware, including complex automated systems that work behind the scenes to detect and flag Facebook accounts that are likely to be compromised (based on anomalous activity like lots of messages sent in a short period of time, or messages with links that are known to be bad)."
In the United Kingdom, the Trades Union Congress (TUC) has encouraged employers to allow their staff to access Facebook and other social-networking sites from work, provided they proceed with caution.
In September 2007, Facebook drew a fresh round of criticism after it began allowing non-members to search for users, with the intent of opening limited "public profiles" up to search engines such as Google in the following months. Facebook's privacy settings, however, allow users to block their profiles from search engines.
Concerns were also raised on the BBC's Watchdog programme in October 2007 when Facebook was shown to be an easy way in which to collect an individual's personal information in order to facilitate identity theft. However, there is barely any personal information presented to non-friends - if users leave the privacy controls on their default settings, the only personal information visible to a non-friend is the user's name, gender, profile picture, networks, and user name.
A third party site, USocial, was involved in a controversy surrounding the sale of fans and friends. USocial received a cease-and-desist letter from Facebook and has stopped selling friends.
Inability to voluntarily terminate accounts
Facebook had allowed users to deactivate their accounts but not actually remove account content from its servers. A Facebook representative explained to a student from the University of British Columbia that users had to clear their own accounts by manually deleting all of the content including wall posts, friends, and groups. A New York Times article noted the issue, and also raised a concern that emails and other private user data remain indefinitely on Facebook's servers.
... ... ...
Quit Facebook Day
Quit Facebook Day was an online event which took place on May 31, 2010 (coinciding with Memorial Day), in which Facebook users stated that they would quit the social network, due to privacy concerns. It was estimated that 2% of Facebook users coming from the United States would delete their accounts. However, only 33,000 users quit the site.
... ... ...
Facebook has been criticized heavily for 'tracking' users, even when logged out of the site. Australian technologist Nik Cubrilovic discovered that when a user logs out of Facebook, the cookies from that login are still kept in the browser, allowing Facebook to track users on websites that include "social widgets" distributed by the social network. Facebook has denied the claims, saying they have 'no interest' in tracking users or their activity. They also promised after the discovery of the cookies that they would remove them, saying they will no longer have them on the site. A group of users in the United States have sued Facebook for breaching privacy laws.
Read more at Facebook as Giant Database about Users
Google wants to be a sole intermediary between you and Internet. As Rebecca Solnit pointed out (Google eats the world):
Google, the company with the motto "Don't be evil", is rapidly becoming an empire. Not an empire of territory, as was Rome or the Soviet Union, but an empire controlling our access to data and our data itself. Antitrust lawsuits proliferating around the company demonstrate its quest for monopoly control over information in the information age.
Its search engine has become indispensable for most of us, and as Google critic and media professor Siva Vaidhyanathan puts it in his 2012 book The Googlization of Everything,
"[W]e now allow Google to determine what is important, relevant, and true on the Web and in the world. We trust and believe that Google acts in our best interest. But we have surrendered control over the values, methods, and processes that make sense of our information ecosystem."
And that's just the search engine. About three-quarters of a billion people use Gmail, which conveniently gives Google access to the content of their communications (scanned in such a way that they can target ads at you).
Now with Prism-related revelations, those guys are on the defensive as they sense a threat to their franchise. And the threat is quite real: if Google, Microsoft, Yahoo all work for NSA, why not feed them only a proportionate amount of your searches. And why not feed them with "search spam"?
|Now with Prism-related revelations, those guys are on the defensive as they sense a threat to their franchise. And the threat is quite real: if Google, Microsoft, Yahoo all work for NSA, why not feed them only a proportionate amount of your searches. And why not feed them with "search spam"?|
One third to Google and one third to Bing with the rest to https://duckduckgo.com/ (Yahoo uses Bing internally). You can rotate days and hope that the level of integration of searches from multiple providers is a weak point of the program ;-). After all while Google is still better on some searches, Bing comes close on typical searches and is superior in searches about Microsoft Windows and similar Microsoft related themes. It is only fair to diversify providers.
Here is one take from Is Google a threat to privacy from Digital Freedoms
Google’s motto may be ‘don’t be evil’ but people are increasingly unconvinced that it is as good as it says it is. The Guardian is currently running a poll asking users ‘Does Google ‘do evil’?’ and currently the Guardian reading public seems to think yes it does. This is partially about Google's attempt to minimize taxes in the UK but there are other concerns that are much more integral to what Google is about. At its core Google is an information business, so accusations that it is a threat to privacy strike at what it does rather than just its profits.
Facebook’s inventory of data and its revenue from advertising are small potatoes compared to Google. Google took in more than 10 times as much, with an estimated $36.5 billion in advertising revenue in 2011, by analyzing what people sent over Gmail and what they searched on the Web, and then using that data to sell ads. Hundreds of other companies (Yahoo, Microsoft, Amazon to name a few) have also staked claims on people’s online data by depositing cookies or other tracking mechanisms on people’s browsers. If you’ve mentioned anxiety in an e-mail, done a Google search for “stress” or started using an online medical diary that lets you monitor your mood, expect ads for medications and services to treat your anxiety.
In other words stereotyping rules in data aggregation. Your application for credit could be declined not on the basis of your own finances or credit history, but on the basis of aggregate data — what other people whose likes and dislikes are similar to yours have done. If guitar players or divorcing couples are more likely to renege on their credit-card bills, then the fact that you’ve looked at guitar ads or sent an e-mail to a divorce lawyer might cause a data aggregator to classify you as less credit-worthy. When an Atlanta man returned from his honeymoon, he found that his credit limit had been lowered to $3,800 from $10,800. The switch was not based on anything he had done but on aggregate data. A letter from the company told him, “Other customers who have used their card at establishments where you recently shopped have a poor repayment history with American Express.”
Even though laws allow people to challenge false information in credit reports, there are no laws that require data aggregators to reveal what they know about you. If I’ve Googled “diabetes” for my mother or “date rape drugs” for a mystery I’m writing, data aggregators assume those searches reflect my own health and proclivities. Because no laws regulate what types of data these aggregators can collect, they make their own rules.
In another post Frank Schaeffer (Google, Microsoft and Facebook Are More of a Threat to Privacy Than the US Government, June 7, 2013) thinks the Google and other companies actually represent a different threat then the government due to viewing themselves as a special privileged caste:
It’s amazing that there are naive people who worry about government intrusion into our privacy when we already gave away our civil rights to the billionaires in Silicon Valley. The NSA is taking note of our calls and emails, but anyone – me included! — who uses the internet and social media has already sold out our privacy rights to the trillion dollar multinational companies now dominating our lives and – literally – buying and selling us.
The NSA isn’t our biggest worry when it comes to who is using our calls, emails and records for purposes we didn’t intend. We are going to pay forever for trusting Google, Facebook. Microsoft, AOL and all the rest. They and the companies that follow them are the real threat to liberty and privacy.
The government may be wrong in how it is trying to protect us but at least it isn’t literally selling us. Google’s and Facebook’s et al highest purpose is to control our lives, what we buy, sell, like and do for money. Broken as our democracy is we citizens at least still have a voice and ultimately decide on who runs Congress. Google and company answer to no one. They see themselves as an elite and superior to everyone else.
In fact they are part of a business culture that sees itself not only above the law but believes it’s run by superior beings. Google even has its own bus line, closed to the public, so its “genius” employees don’t have to be bothered mingling with us regular folk. A top internet exec just ruined the America’s Cup race by making it so exclusive that so far only four groups have been able to sign up for the next race to be held in San Francisco because all but billionaires are now excluded because this internet genius changed the rules to favor his kind of elite.
Google and Facebook have done little-to-nothing to curb human trafficking pleading free speech as the reason their search engines and social networks have become the new slave ships “carrying” child rape victims to their new masters internationally. That’s just who and what these internet profiteers are.
Face it: the big tech companies aren’t run by nice people even if they do make it pleasant for their workers by letting them skateboard in the hallways and offering them free sushi. They aren’t smarter than anyone else, just lucky to be riding a new tech wave. That wave is cresting.
Lots of us lesser mortals are wondering just what we get from people storing all our private data. For a start we have a generation hooked on a mediated reality. They look at the world through a screen.
In other words these profiteers are selling reality back to us, packaged by them into entertainment. And they want to put a computer on every desk to make sure that no child ever develops an attention span long enough so that they might actually read a book or look up from whatever tech device they are holding. These are the billionaires determined to make real life so boring that you won’t be able to concentrate long enough pee without using an app that makes bodily functions more entertaining.
These guys are also the world’s biggest hypocrites. The New York Times published a story about how some of the top executives in Silicon Valley send their own children to a school that does not allow computers. In “A Silicon Valley School That Doesn’t Compute” (October 22, 2011) the Times revealed that the leaders who run the computer business demand a computer-free, hands-on approach to education for their own children.
This new situation makes usage of Web proxy at home a must. Not to protect yourself ( this is still impossible ), but to control what information you release and to whom. See Squid. It provides powerful means to analyze your Web traffic as well as Web site blocking techniques:
In my experience, Squid’s built-in blocking mechanism or access control is the easiest method to use for implementing web site blocking policy. All you need to do is modify the Squid configuration file.
Before you can implement web site blocking policy, you have to make sure that you have already installed Squid and that it works. You can consult the Squid web site to get the latest version of Squid and a guide for installing it.
To deploy the web-site blocking mechanism in Squid, add the following entries to your Squid configuration file (in my system, it’s called
squid.confand it’s located in the
/etc/squiddirectory):acl bad url_regex "/etc/squid/squid-block.acl" http_access deny bad
/etc/squid/squid-block.aclcontains web sites or words you want to block. You can name the file whatever you like. If a site has the URL or word listed in
squid-block.aclfile, it won’t be accessible to your users. The entries below are found in
squid-block.aclfile used by my clients:.oracle.com .playboy.com.br sex ...
squid-block.aclfile in action, internet users cannot access the following sites:
- Sites that have addresses ending with .oracle.com
- Sites that have addresses ending with .playboy.com.br
- Sites containing the word “sex” in its pages
You should beware that by blocking sites containing the word “sex”, you will also block sites such as Middlesex University, Sussex University, etc. To resolve this problem, you can put those sites in a special file called
You must also put the “no-block” rule before the “block” rule in the Squid configuration file:... acl special_urls url_regex "/etc/squid/squid-noblock.acl" http_access allow admin_ips special_urls acl bad url_regex "/etc/squid/squid-block.acl" http_access deny bad ...
Sometimes you also need to add a no-block file to allow access to useful sites
After editing the ACL files (
squid-noblock.acl), you need to restart Squid. If you install the RPM version, usually there is a script in the
/etc/rc.d/init.ddirectory to help you manage Squid:# /etc/rc.d/init.d/squid reload
To test to see if your Squid blocking mechanism has worked, you can use your browser. Just enter a site whose address is listed on the
squid-block.aclfile in the URL address.
In the example above, I block
.oracle.com, and when I try to access oracle.com, the browser returns an error page.
Vanity fair posting should probably now be severely limited. Self-exposure entails dangers that can became evident only in retrospect. The key problem is that nothing that you post is ever erased. Ever. Limiting your activity in social network to few things that are of real value, or what is necessary for business or professional development, not just vanity fair staff or, God forbid, shady activities is now a must.
And remember that those days information about your searches, books that you bought on Amazon, your friends in Facebook, your connections in LinkedIn, etc are public. If you want to buy a used book without it getting into your database, go to the major city and buy with cash.
Also getting you own email address and simple web site at any hosting site is easy and does not require extraordinary technical sophistication. Prices are starting from $3 per month. Storing your data on Facebook servers might cost you more. See Guide for selecting Web hosting provider with SSH access for some ideas for programmers and system administrators.
In a way the situation with cloud sites providing feeds to spy on the users is a version of autoimmune disease: defense systems are attacking other critical systems instead of rogue agents.
As we mentioned before, technological development has their set of externalities. One side effect of internet technologies and, especially, cloud technologies as well as wide proliferation of smartphones is that they greatly simplify "total surveillance." Previously total surveillance was a very expensive proposition, now it became vey cheap. In a way technological genie is out of the bottle. And it is impossible to put him back. Youtube (funny, it's another site targeted by NSA) contains several informative talks about this issue. From the talk:
“This is the current state of affairs. There is no more sense of privacy. Not because it’s been ripped away from you in some Orwellian way, but because you flushed it down the toilet”.
All-in-all on Internet on one hand provides excellent, unique capability of searching information (and search sites are really amplifiers of human intelligence) , but on the other put you like a bug under microscope. Of course, as so many Internet users exists, the time to store all the information about you is probably less then your lifespan, but considerable part of it can be stored for a long time (measured in years, not months, or days) and some part is stored forever. In other words both government and several large companies and first of all Facebook and Google are constantly profiling you. That's why we can talk about death of privacy.
Add to this a real possibility that malware is installed on your PC (and Google Bar and similar applications are as close to spyware as one can get) and situation became really interesting.
Looking at the headlines about the government’s documents on how to use social networking and it’s surprising that anyone thinks this is a big deal. Undercover Feds on Facebook? Gasp! IRS using social networking to piece together a few facts that illustrate you lied about your taxes? Oooh.
Give me a break. Why wouldn’t the Feds use these tools? They’d be idiots if they didn’t. Repeat after me:
- Privacy is a bit of a joke online and you willingly give it up.
- People share everything on social networks (lunch, vacation plans, whereabouts, drivel no one cares about).
- This information is increasingly public.
Let’s face it; folks are broadcasting everything from the breakfast they eat to their bowel movements to when and where they are on vacation. They use services that track every movement they make (willingly!) on Foursquare and Google Latitude. Why wouldn’t an FBI agent chasing a perp get into some idiot’s network so he can track him everywhere? It’s called efficiency people.
Here are some simple measures that might help, although they can't change the situation:
Use IE "InPrivate" browsing mode as you primary browsing mode. Block cookies from Facebook and, possibly, some other over-snooping" sites of your choice. .
Again, none of those measures change the situation dramatically, but each of them slightly increase the level of your privacy.
For details of NSA collection of Internet traffic and major cloud provider data see Big Brother is Watching You
May 23, 2018 | failedevolution.blogspot.gr
Facebook is hoping that a new alliance with the Atlantic Council -- a leading geopolitical strategy think-tank seen as a de facto PR agency for the U.S. government and NATO military alliance – will not only solve its "fake news" and "disinformation" controversy, but will also help the social media monolith play "a positive role" in ensuring democracy on a global level.
The new partnership will effectively ensure that Atlantic Council will serve as Facebook's "eyes and ears," according to a company press statement. With its leadership comprised of retired military officers, former policymakers, and top figures from the U.S. National Security State and Western business elites, the Atlantic Council's role policing the social network should be viewed as a virtual takeover of Facebook by the imperialist state and the council's extensive list of ultra-wealthy and corporate donors.
The partnership is only the latest in a steady stream of announced plans by the Menlo Park, California-based company to address controversy surrounding its role in the 2016 U.S. presidential election. The company has been mired in scandal stemming from the allegations of "election interference" carried out through the social network – usually pinned on the Russian government and ranging from the use of independent media to the theft of Facebook user data by political consultancy firm Cambridge Analytica.
The announcement should sound alarm bells when one considers the Atlantic Council's list of sponsors – including, but not limited to, war-profiteering defense contractors; agencies aligned with Washington and the Pentagon; Gulf Arab tyrants; major transnational corporations; and such well-loved Western philanthropic brands as Carnegie, Koch, Rockefeller, and Soros. Even the name of the group itself is meant to evoke the North Atlantic Council, the highest political decision-making body of North Atlantic Treaty Organization.
May 15, 2018 | www.nytimes.com
... ... ...
[Vault 7] was the largest loss of classified documents in the agency's history and a huge embarrassment for C.I.A. officials.
Now, the prime suspect in the breach has been identified: a 29-year-old former C.I.A. software engineer who had designed malware used to break into the computers of terrorism suspects and other targets, The New York Times has learned.
Agents with the Federal Bureau of Investigation searched the Manhattan apartment of the suspect, Joshua A. Schulte, one week after WikiLeaks released the first of the C.I.A. documents in March last year, and then stopped him from flying to Mexico on vacation, taking his passport, according to court records and relatives. The search warrant application said Mr. Schulte was suspected of "distribution of national defense information," and agents told the court they had retrieved "N.S.A. and C.I.A. paperwork" in addition to a computer, tablet, phone and other electronics.
But instead of charging Mr. Schulte in the breach, referred to as the Vault 7 leak, prosecutors charged him last August with possessing child pornography, saying agents had found 10,000 illicit images on a server he created as a business in 2009 while studying at the University of Texas at Austin.
Court papers quote messages from Mr. Schulte that suggest he was aware of the encrypted images of children being molested by adults on his computer, though he advised one user, "Just don't put anything too illegal on there."
In September, Mr. Schulte was released on the condition that he not leave New York City, where he lived with a cousin, and keep off computers. He was jailed in December after prosecutors found evidence that he had violated those rules, and he has been held at the Metropolitan Correctional Center in Manhattan since then. He has posted on Facebook under a pseudonym a series of essays critical of the criminal justice system.
It is unclear why, more than a year after he was arrested, he has not been charged or cleared in connection with Vault 7. Leak investigators have had access to electronic audit trails inside the C.I.A. that may indicate who accessed the files that were stolen, and they have had possession of Mr. Schulte's personal data for many months.
... ... ...
According to his family and his LinkedIn page , Mr. Schulte did an internship at the National Security Agency while working on a bachelor's degree in computer engineering. He worked in the C.I.A.'s Engineering Development Group, which designed the hacking tools used by its Center for Cyber Intelligence. He left the agency in November 2016 and moved to New York to work for Bloomberg L.P. as a software engineer.
Most of the government's cyberespionage is carried out by the N.S.A., but the C.I.A. also employs hackers. The leaked Vault 7 documents came from the agency's Engineering Development Group and included descriptions and instructions for the use of agency hacking tools, but only a small amount of the actual computer code for the tools.
.... ... ...
Apr 11, 2018 | www.unz.com
Bill Jones , April 10, 2018 at 9:57 pm GMTAnother step closer to the totalitarian state
The Department of Homeland Security wants to track the comings and goings of journalists, bloggers and other "media influencers" through a database.
Apr 02, 2018 | www.theguardian.com
Are you ready? Here is all the data Facebook and Google have on you Dylan Curran The harvesting of our personal details goes far beyond what many of us could imagine. So I braced myself and had a look
Fri 30 Mar 2018 03.17 EDT First published on Wed 28 Mar 2018 06.00 EDT Share on Facebook Share on Twitter Share via Email
View more sharing options Share on LinkedIn Share on Pinterest Share on Google+ Share on WhatsApp Share on Messenger Close A slice of the data that Facebook keeps on the author: 'This information has millions of nefarious uses.' Photograph: Dylan Curran W ant to freak yourself out? I'm going to show just how much of your information the likes of Facebook and Google store about you without you even realising it. Google knows where you've been
Google stores your location (if you have location tracking turned on) every time you turn on your phone. You can see a timeline of where you've been from the very first day you started using Google on your phone.
Click on this link to see your own data: google.com/maps/timeline?
Here is every place I have been in the last 12 months in Ireland. You can see the time of day that I was in the location and how long it took me to get to that location from my previous one.Facebook Twitter Pinterest 'A Google map of every place I've been in Ireland this year.' Photograph: Dylan Curran Google knows everything you've ever searched – and deleted
Google stores search history across all your devices. That can mean that, even if you delete your search history and phone history on one device, it may still have data saved from other devices .
Click on this link to see your own data: myactivity.google.com/myactivity
ss="rich-link"> Why have we given up our privacy to Facebook and other sites so willingly? Read more Google has an advertisement profile of you
Google creates an advertisement profile based on your information, including your location, gender, age, hobbies, career, interests, relationship status, possible weight (need to lose 10lb in one day?) and income.
Click on this link to see your own data: google.com/settings/ads/Google knows all the apps you use
Google stores information on every app and extension you use. They know how often you use them, where you use them, and who you use them to interact with. That means they know who you talk to on Facebook, what countries are you speaking with, what time you go to sleep.
Click on this link to see your own data: security.google.com/settings/securGoogle has all of your YouTube history
Google stores all of your YouTube history, so they probably know whether you're going to be a parent soon, if you're a conservative, if you're a progressive, if you're Jewish, Christian, or Muslim, if you're feeling depressed or suicidal, if you're anorexic
Click on this link to see your own data: youtube.com/feed/history/sThe data Google has on you can fill millions of Word documents
Google offers an option to download all of the data it stores about you. I've requested to download it and the file is 5.5GB big , which is roughly 3m Word documents.
ass="inline-garnett-quote inline-icon ">
Manage to gain access to someone's Google account? Perfect, you have a diary of everything that person has done
This link includes your bookmarks, emails, contacts, your Google Drive files, all of the above information, your YouTube videos, the photos you've taken on your phone, the businesses you've bought from, the products you've bought through Google
They also have data from your calendar, your Google hangout sessions, your location history, the music you listen to, the Google books you've purchased, the Google groups you're in, the websites you've created, the phones you've owned, the pages you've shared, how many steps you walk in a day
Click on this link to see your own data: google.com/takeoutFacebook has reams and reams of data on you, too
Facebook offers a similar option to download all your information. Mine was roughly 600MB, which is roughly 400,000 Word documents.
This includes every message you've ever sent or been sent, every file you've ever sent or been sent, all the contacts in your phone, and all the audio messages you've ever sent or been sent.
Click here to see your data: https://www.facebook.com/help/131112897028467Facebook Twitter Pinterest 'A snapshot of the data Facebook has saved on me.' Photograph: Dylan Curran Facebook stores everything from your stickers to your login location
Facebook also stores what it thinks you might be interested in based off the things you've liked and what you and your friends talk about (I apparently like the topic "girl").
Somewhat pointlessly, they also store all the stickers you've ever sent on Facebook (I have no idea why they do this. It's just a joke at this stage).
They also store every time you log in to Facebook, where you logged in from, what time, and from what device.
And they store all the applications you've ever had connected to your Facebook account, so they can guess I'm interested in politics and web and graphic design, that I was single between X and Y period with the installation of Tinder, and I got a HTC phone in November.
(Side note, if you have Windows 10 installed, this is a picture of just the privacy options with 16 different sub-menus, which have all of the options enabled by default when you install Windows 10)Facebook Twitter Pinterest Privacy options in Windows 10. Photograph: Dylan Curran They can access your webcam and microphone
The data they collect includes tracking where you are, what applications you have installed, when you use them, what you use them for, access to your webcam and microphone at any time, your contacts, your emails, your calendar, your call history, the messages you send and receive, the files you download, the games you play, your photos and videos, your music, your search history, your browsing history, even what radio stations you listen to.
ss="rich-link"> Facebook told me it would act swiftly on data misuse – in 2015 | Harry Davies Read more Here are some of the different ways Google gets your data
I got the Google Takeout document with all my information, and this is a breakdown of all the different ways they get your information.Facebook Twitter Pinterest 'My Google Takeout document.' Photograph: Dylan Curran
Here's the search history document, which has 90,000 different entries, even showing the images I downloaded and the websites I accessed (I showed the Pirate Bay section to show how much damage this information can do).Facebook Twitter Pinterest 'My search history document has 90,000 different entries.' Photograph: Dylan Curran Google knows which events you attended, and when
Here's my Google Calendar broken down, showing all the events I've ever added, whether I actually attended them, and what time I attended them at (this part is when I went for an interview for a marketing job, and what time I arrived).Facebook Twitter Pinterest 'Here is my Google calendar showing a job interview I attended.' Photograph: Dylan Curran And Google has information you deleted
This is my Google Drive, which includes files I explicitly deleted including my résumé, my monthly budget, and all the code, files and websites I've ever made, and even my PGP private key, which I deleted, that I use to encrypt emails.Facebook Twitter Pinterest Google can know your workout routine
This is my Google Fit, which shows all of the steps I've ever taken, any time I walked anywhere, and all the times I've recorded any meditation/yoga/workouts I've done (I deleted this information and revoked Google Fit's permissions).Facebook Twitter Pinterest And they have years' worth of photos
This is all the photos ever taken with my phone, broken down by year, and includes metadata of when and where I took the photosFacebook Twitter Pinterest Google has every email you ever sent
Every email I've ever sent, that's been sent to me, including the ones I deleted or were categorised as spam.Facebook Twitter Pinterest And there is more
I'll just do a short summary of what's in the thousands of files I received under my Google Activity.
First, every Google Ad I've ever viewed or clicked on, every app I've ever launched or used and when I did it, every website I've ever visited and what time I did it at, and every app I've ever installed or searched for.Facebook Twitter Pinterest 'They have every single Google search I've made since 2009.'
They also have every image I've ever searched for and saved, every location I've ever searched for or clicked on, every news article I've ever searched for or read, and every single Google search I've made since 2009. And then finally, every YouTube video I've ever searched for or viewed, since 2008.
This information has millions of nefarious uses. You say you're not a terrorist. Then how come you were googling Isis? Work at Google and you're suspicious of your wife? Perfect, just look up her location and search history for the last 10 years. Manage to gain access to someone's Google account? Perfect, you have a chronological diary of everything that person has done for the last 10 years.
This is one of the craziest things about the modern age. We would never let the government or a corporation put cameras/microphones in our homes or location trackers on us. But we just went ahead and did it ourselves because – to hell with it! – I want to watch cute dog videos.
• A caption was corrected on 28 March 2018 to replace "privacy options in Facebook" with "privacy options in Windows 10".Dylan Curran is a data consultant and web developer, who does extensive research into spreading technical awareness and improving digital etiquette
Apr 02, 2018 | www.moonofalabama.org
The obvious question came up: Should I buy a smartphone to replace my trusted Ericsson?
I tested several of the current top-of-the-line smartphones - Motorola, Samsung, Apple. They were in the same relative price range as my old Ericsson was at its time. But they lack in usability. They either have a too small screen for their multitude of functions or they are bricks that require an extra pocket.I do not want to give all my data into the hands of some unaccountable billionaires and unknown third parties. I do not want my privacy destroyed.
So no - I decided not to buy a smartphone as replacement for my trusted Ericsson companion.
Here is my new phone:
It is a Chinese product sold in Germany under the Olympia brand. It is a GSM quad-band 'dumb' phone with FM radio and a flashlight. The standby time is 140 hours and talk-time is 3+ hours. The battery is a standardized model and future replacements will be easy to find.
Size and weight are nearly the same as the old Ericsson. The keys are much bigger, illuminated and easier to handle, especially in the dark. It is a robust construction and the sound quality is good.
It cost me €22.00 ($26.40).
Posted by b on April 2, 2018 at 03:28 PM | Permalink
Tian , Apr 2, 2018 3:48:53 PM | 2I'm not convinced the new generation of retro dumb phones aka feature phones do not also have all the same surveillance capabilities as their smart brethren - even though they don't expose those capabilities as features to the end user.John Zelnicker , Apr 2, 2018 4:05:54 PM | 7b - I only scanned your post, but my answer is: NO!Alan Reid , Apr 2, 2018 4:16:20 PM | 9
Don't buy a "smart" phone (or anything else labeled "smart"). They are nothing more than data collectors, part of the Internet of Things that, IMNSHO, is an existential threat to our civilization.
I just decided to look back at the end of the post. and I see that you took my advice. ;-)Well you have to ask yourself, Do i want to participate in a mass surveillance system for one, Then you have to ask Is their any reason i would accept constant audio recordings being made of my environment, then you have the camera angle to contend... Then your GPS location is a major issue, add the ultrasonic beacon thing and the cell tower triangulation aspect to consider.... the phone you have from 2001 is not anywhere near as proficient at many of these tasks being built well before the 2006 legislation regarding this series of systems... If it were me and i knew all about this stuff, i would pay a hell of a lot more than a new phone is worth to keep the old unit in service for as long as you could... Any new phone is going to do all the above to your privacy and then some the old one is very limited, so how concerned are you with being an open book to who ever has access to your phone from the hidden parts and functions you never get to use? Me? I have seen a ton of serious problems with the uses of the tech being built into the modern smartphones, some models give you lots of functions to use, some give you a basic lite experience, But ALL new devices give the state running the system a HEFTY pack of features you will never know about until it's damage has been done. Take my advice Keep the 2000 model going for as long as you can if you must have a mobile phone. If you WANT to be the target of every nasty thing the state does with this new tech investigator/spy then by all means get one of the smart type, Any new one is just as bad as any other after 2006 legislation changes went into effect. 2001 was a very bad event for this topic... I will not have one after the events that befell me. A high performance radio computer with many types of real world sensors, using a wide spread and near unavoidable network of up link stations is the states most useful weapon. Everyone chooses to have what they have, You can also choose to NOT have, but few choose NOT, many choose the worst option on old values of this sort of choice and never think about the loss they incur to have the NEW gadget for whatever reason they rationalize it.Whorin Piece , Apr 2, 2018 4:21:54 PM | 12Smart phones are destroyers of information sovereignty. With a PC one can save a copy of every page you visit whereas with the smart phone all you can practically do is view things. It pisses me off.nervos belli , Apr 2, 2018 4:23:24 PM | 13
Has anyone noticed how shallow the so called world wide web has gotten these days.,? Search terms which would in the psst throw up hundreds if not thousands of webpages on the subject matter now result in sometimes no more than 3 or 4 entries. Google has stolen the internet of us all. The web is dead. Cunts like zuckerberg should be drop kicked into the long grass.The main espionage equipment in a smartphone or dumbphone is not the application processor and the programs that run on it. It's the GSM/3G/UMTS/LTE/5G chipset which every single one of them obviously has. "We kill with metadata" is the most important aphorism about phones, no matter which kind, ever.psychohistorian | Apr 2, 2018 4:23:43 PM | 15
However, a smartphone gives you lots of convenience which your 22$ chinaphone doesn't give you. A browser when on the road, a book reader, a map device.
You have to take a few precautions, e.g. use LineageOS, install AFWall and XPrivacy. Nothing different from using a PC basically. And you certainly shouldn't shell out 500$ for one. Every dollar/euro above ca. 100 has to be very well justified.
Sure, you can live in the 80s, nothing wrong with that. We lived fine back in those days too, but why not take advantage of some of the improvements since then?
Nice post b. Expresses my sentiments exactly.
I had to take my Nokia X2 out of the plastic bag I keep it in so it doesn't get wet to see what model it was....I keep the battery out and pay T Mobile $10/year to have emergency minutes when I need them....I maintain and use a land line for all my calls.
It is not like these devices couldn't be useful but like the desktop OS world, bloatware is a standard now. I have programmed handheld devices since 1985 and my latest was a MS Windoze10/C# inventory management application with barcodes and such.
Prior to the Nokia I have now I was nursing along a Palm 720p until I couldn't get a carrier to support it anymore. So since the Palm I have consciously gone back to a Weekly Minder type of pocket calendar which I had to use before the online capability came along.
If our world were to change like I want it to by making the tools finance a public utility I might learn to trust more of my life to be held by technology than the 5 eyes already know......Everyone has seen the movie SNOWDEN , correct?.....my Mac laptop had tape over the camera as soon as I brought it home.....I have a nice Nikon Coolpix camera with the GPS turned off and the battery out......grin
visitor , Apr 2, 2018 4:41:50 PM | 18I understand your choice, but you should have looked for a basic phone not just with GSM (2G), but also at least with UMTS (3G).Stephane , Apr 2, 2018 4:49:37 PM | 20
GSM is being wound down, and the frequencies reallocated to LTE (4G).
Many operators in several countries have already switched off their GSM networks (Australia, USA...) This means that in about 3-4 years, you will have real difficulties using your new mobile phone, at least in developed countries; in the Third World, GSM will probably last a bit longer.I have a cheapo Nokia 100 for calls and a YotaPhone 2 as a tablet. The Yota is Russian but I don't mind the FSB 😃 Aldo it has two screens, one being a passive black and white for use in full bright sun light.xor , Apr 2, 2018 4:50:34 PM | 21I think b made a wise decision. Up till now I've also not needed a smart phone and the continious "connection" or being hooked to the "matrix" would not only eat my valuable time away but would also make me feel more bound.aquadraht , Apr 2, 2018 5:19:24 PM | 25
"Another disadvantage of smartphones is enormous amount of personal data they inevitably steal for uncontrolled use by third parties. The technical consultant Dylan Curran studied this:
As soon as an Android smartphone is switched on Google will collect ALL data on every location change and on anything done on the phone. Apple does likewise with its iPhones."
That's the basic privacy nullification. There is also what can be described as the invasive potential. Certain companies, next to intelligence agencies, have made it their business to switch a victims own smart phone into a full blown active spy device. Obviously the victims are particular persons of interests like Dilma Roussef. Whenever a person is having a conversation, talks to himself out loud, has a meeting or is intimate, all sounds and conversations can be recorded next to video when the phone is positioned well. As we know, most people will not or can't part from their beloved smart phone.I can not tell what to do. In fact, when buying a "smartphone", you have to get used that the phone will be discharged during 1 or 1.5 days, you will become dependent to next USB source, or a battery pack (which is somewhat heavy, 1 pound ca. but not too bulky.Jay , Apr 2, 2018 5:59:47 PM | 29
Personally, I am using such a device since 5 yrs ca., first a 4.7" HTC one of my daughters gave me. I soon installed Cyanogenmod (now LineageOS) and threw away all the bloat and especially the Google and Facebook dirt and spyware. I do not have an email account on the brick, rather a browser over which I may access the Web representation of my email account, which is NOT gmail or similar. I do not use Google playstore.
The "killer apps" for me are mainly FBReader, a free ebook reader, VLC for audio and video, and OSMand, an OpenStreetMap client. Some simple calendar, picture etc. apps are on as well. My recent phone is a Samsung S4 mini, bought used for 50€.
This is a minimalistic setup, but makes tracking and spying other than by government agencies difficult. LineageOS is updated nearly every week, so fairly safe against Android malware.
With a "regular" smartphone, you will lack updates after a few years, have a lot of bloat on board you cannot get rid of, be forced to have a Google account for access of the software repository Google playstore, which is deeply integrated into Android. If one does not care to be spied and sniffed not only by the FBI and NSA, but by Brin and Zuckerberg in addition, ok.
Greetings, a^2Provided one has access to good public WiFi: It seems to me that Wifi and a tablet, or laptop (with a good battery) + the use of a virtual proxy network, VPN, which are almost always encrypted, is better than a smartphone. (Of course if the tablet is Android don't use the Chrome web browser.)xor , Apr 2, 2018 6:17:31 PM | 30
Then just buy a 25 euro Samsung or LG flip phone for the talking part of phone use. It won't last 17 years, but one can still get batteries for them.
Of course this approach doesn't work if you don't have solid public WiFi where you'd normally use a smartphone in public.@mh505 #27 Even with a SIM card not linked to your personal ID card it's fairly easy to automatically tie your smartphone to your person whereby you end up in the drag net you try to escape. Not in the least thanks to your close ones whom probably have you listed with your full name + phone number (thus SIM) in their smartphone. And that's even besides you connecting to all kinds of services offered by Google and the likes that know where you personally hang out because of WIFI access points, GPS location (if enabled), connected IP address where someone else connected to who has GPS enabled etc.Piotr Berman , Apr 2, 2018 6:35:20 PM | 32
Unfortunately your list of EU countries that don't require personal ID to purchase a SIM card is incorrect.It depends on the prices in your phone market.Dee Wrench , Apr 2, 2018 9:08:38 PM | 42
In USA it pays to be stupid. The choice I have is to use a smart phone with a monthly charge ca. 100 dollars or a stupid phone with a monthly charge of 8 dollars (or is it 15? and the phone for 8). And if you are old enough you can bear with hardships like memorizing the map of the area were you live, having to check stuff on your own desktop computer before you leave home etc. And the difference in costs can be spent on cigarettes, beer, donations to OxPham, it is your pick.
Concerning surveilance, a stupid phone is used sparingly, so it definitely provides less tracking info.I'm a 53 year old dog and try to keep things simple for myself. Being paranoid about being tracked and watched isn't my thing. I use my smart phone as a phone when I need to talk to an asswipe at work or my only friend to schedule a meetup or the wife unit when she calls. I have limited data so I usually wait until I'm home to view porn and news websites on the pc. I don't do any financial tasks on the phone, rarely text anyone, rarely use the camera, have only a few apps for things like weather and writing myself a note to remember to pick up milk or dog food on the way home from work. My life is so boring and my bank account so empty I'm not worth a bother to "them".
Apr 01, 2018 | www.nakedcapitalism.com
Lambert here: Readers will notice that Auerback seems to assume that Cambridge Analytica's shenanigans with Facebook data shifted votes in 2016 (as do the links to which he cites)*. His post summarizes the political and analytical state of play, but may be usefully read in conjunction with this 2017 post at NC by Marina Bart, who cautioned :
There is no question that modern social media facilitates highly segmented marketing. There is no question that political campaigns can benefit from this. Figuring out who might be receptive to your candidate and their policies, where they vote, and motivating them to go to the polls is fundamental campaign work. But that is not at all the same thing as manipulating people into voting against their interests, which is presumably what is feared (and possibly secretly hoped for) by the fretful Democrats. There is no evidence Cambridge Analytica did any psychological manipulations for Trump.
I'm not saying it's impossible for Big Data highly segmented psychological manipulation to ever work. But it isn't happening now; there's no evidence it will work in the near future; there are many, many obstacles to overcome; and there are two very basic reasons why it cannot be the secret weapon I suspect the Democrats long for.
The most basic one is that voting is not the same as buying stuff . There is no direct connection between casting a vote and getting anything in return, not even the momentary pleasure of buying a candy bar.
(In other words, the current Cambridge Analytical scare is based on a category error.) Of course, from a Wall Street "beauty contest" perspective, what Facebook can actually do may matter less than what people think it can do. From my own perspective, I don't want Facebook's filthy data-gathering proboscis nuzzling my personal affairs at all , regardless of any effect it may have, and that goes for Google, too. Whether I'm an outlier in my revulsion remains to be seen.
NOTE * Indeed, were evidence for this assumption to exist, one would assume it would already have been produced. If it has been, I've missed it, and I do try to keep track.
By Marshall Auerback, a market analyst and commentator. Originally published at Alternet .
Cambridge Analytica's systematic harvesting of Facebook user preferences to create detailed models of voter emotions appears to have played a significant role in the election of Donald Trump and the victory of the "Brexiters" on the referendum on whether the United Kingdom should leave the European Union or not. There is shock and anxiety at the revelations about how a few right-wing ideologues were able to exploit Facebook's database and then use it to justify populist campaigns fronted by publicity hounds of dubious moral and financial principles (Donald Trump, Steve Bannon and Nigel Farage immediately spring to mind).
Whether the Facebook fiasco conclusively proves either Russian involvement in the 2016 election (or the UK's Brexit referendum), or simply highlights the violation of campaign finance laws, is yet to be determined. But what is certainly beyond dispute from the apparently unauthorized use of Facebook's database of some 50 million users is that longstanding Madison Avenue advertising techniques worked equally well when applied to majority voting instead of employee practices or consumer spending. One possible outcome is that centralized repositories like Facebook -- or Google, or Amazon -- could become a ripe target for regulation and/or anti-trust action. Another possibility is that the voluntary participation on which Facebook is built will collapse spontaneously via consumer rejection.
That course of action is currently being advocated by WhatsApp co-founder Brian Acton, who is spearheading a #DeleteFacebook campaign .
In one sense, there is nothing new in what Facebook and Cambridge Analytica have done. Way back in 1957, author Vance Packard's The Hidden Persuaders described how :
"Large-scale efforts are being made, often with impressive success, to channel our unthinking habits, our purchasing decisions, and our thought processes by the use of insights gleaned from psychiatry and the social sciences. Typically these efforts take place beneath our level of awareness, so that the appeals which move us are often, in a sense, 'hidden.'"
But in a world in which we have all become reliant on the internet for our information, our searches and declared preferences are constantly recorded. Therefore an uncanny amount about us can be learned in a manner that is far more centralized and prone to manipulation than traditional forms of advertising. A wave of shrinkage in traditional advertising firms has correspondingly occurred as the robotic, targeted advertising has become the new norm, largely because it is both cheaper and more effective.
Facebook in particular is a social media way of harnessing interpersonal linkages through the net. Its model must be using those links and the information they generate to create value for advertisers. Any user of Facebook (or Amazon) can easily see how fast browsers insert ads related to one's most recent searches. So it becomes manifestly clear that these companies are tracking us for common advertising purposes.
Politics has always looked into the underlying motivations of voters to manage them. But using the data as documented by the Guardian , this went to a new level of political detail in 2016 that fueled the faster cycle of hard-hitting Trump campaigning. Facebook, Google, Amazon, Twitter, etc., have all become huge aggregators of this information. Facebook CEO Mark Zuckerberg's recent apologies notwithstanding , the companies are either being naïve in proclaiming shock that their data can be misused or, more likely, have been so obsessed with building market share and watching their company market caps explode into the hundreds of billions of dollars that they willfully ignored the scope for abuse. Either way, the information seems to have reached a threshold of importance where governments will step in and disrupt the existing mode, especially now that the full power of this database has been recognized and exploited by a successful political candidate, whether via regulation or antitrust measures. Otherwise, the demands will rise for Facebook to give the data to all, because it cannot guarantee that it has been erased everywhere, which has disturbing implications for our privacy (as well as threatening to destroy Facebook's business model, the success of which is predicated on the exclusive use of the data aggregated from the user base).
However much someone like Brian Acton, who was made a billionaire courtesy of Facebook's purchase of his company, might like others to embrace his #DeleteFacebook campaign, that appears problematic, given how successfully the use of Facebook's model operated in the political context. But there is growing international political momentum to strip the " social network " and its targeted advertising model of much of its abilities to record and use customer data. Former President Barack Obama hinted at this at a recent speech at MIT :
"I do think the large platforms -- Google and Facebook being the most obvious, Twitter and others as well, are part of that ecosystem -- have to have a conversation about their business model that recognizes they are a public good as well as a commercial enterprise. They're not just an invisible platform, they're shaping our culture in powerful ways."
Obama did not explicitly state what he had in mind for these companies, but he did suggest that at a minimum, "the government should have 'rules of the road' to create a level playing field." Even if users find they can't do without their daily Facebook fix, Google search, or Amazon shopping spree, the former president is right. A price will be paid as these companies' activities are increasingly scrutinized.
There are defenses that have been mounted in favor of an unregulated market for Big Data, notably by People Analytics, an organization run by Alex Pentland and his colleagues at MIT's Media Lab. Pentland feels the very centralized nature of the aggregated data is what makes these companies such excellent research targets:
"With the advent of big data and machine learning, researchers actually have enough data and sufficient mathematical tools to build predictive mathematical models. If you talk to other people and see what they are doing, you can improve your own performance, and as you talk to more and more people, you continue to do better and better."
What is not to like? Better decision-making, higher productivity, more efficient communication networks: It looks like a win-win all around. Of course, it was under the guise of research that Cambridge Analytica allegedly got the Facebook data in the first place. It can be used as cover for less benign purposes.
Going further, Pentland cleverly invokes a "New Deal on Data" that allows for the "rebalancing of the ownership of data in favor of the individual whose data is collected. People would have the same rights they now have over their physical bodies and their money."
In theory, this allows the individual discretion as to how much he/she will share with corporations and government regulators. Pentland goes on to suggest that, "the economy will be healthier if the relationship between companies and consumers is more respectful, more balanced. I think that's much more sustainable and will prevent disasters."
Pentland's optimism sounds somewhat naïve in the wake of Edward Snowden's revelations, as well as the current Facebook controversy. Of course, anything that further legitimizes this intrusion on our privacy will be welcomed by these entities. How much do we, the owners of our own personal data, actually control it? As far as the government goes, not much, Snowden's revelations (or those of WikiLeaks) illustrated. And surely the current Facebook and Cambridge Analytica imbroglio undercuts this benign picture that Pentland describes of a happy, informed consumer who autonomously shares his data with various companies, with a view toward building a more "balanced" relationship.
On the contrary, the Facebook fiasco highlights that there exists a thoroughly unequal partnership between the aggregators of information and the information owners, making abuse almost inevitable. Indeed, it is highly doubtful that most consumers and users are even aware of the extent to which their habits, thoughts, and overall private space are monitored by these companies (to say nothing of the more obvious government and law enforcement agencies, even if we're not terrorists).
In general, the notion of a level playing field of information or data that the market can freely and efficiently price has been debunked successfully by Nobel Laureates George Akerlof and Joseph Stiglitz. Both have challenged the " efficient market hypothesis ," which holds that market prices or odds reflect all known information, mitigating the need for intrusive government intervention/regulation. If information asymmetry exists, the obvious implication is that there is a need for some form of overriding regulation to rectify this imbalance. This would also seem to apply to Pentland's New Deal on Data.
Edward Snowden has made us question whether the data and corresponding privacy can be adequately safeguarded from more scrutiny by governments. The more relevant question from the point of view of, say, Silicon Valley and its high tech moguls is whether governments will move more aggressively to control the aggregators themselves, and whether the revelations of their abuses will provoke a backlash, which will impact their companies' growth and profitability.
Already, as Reuters reported, " Nordea, the Nordic region's biggest bank, will not let its sustainable funds buy more Facebook shares for the time being." The European Union has fined Facebook €110m "for 'incorrect or misleading' information regarding data sharing between Facebook and WhatsApp" (even though Facebook acquired the latter). And the EU has also proposed that "companies with significant digital revenues in Europe will pay a 3 percent tax on their turnover on various online services in the European Union," legislation that will cover Facebook (as well as Amazon and Google). Although the tax doesn't actually address the issue of the database abuse itself, the Cambridge Analytica scandal has dissipated valuable political capital for these companies, which will make it harder for them to stop these attacks on their business model and underlying profitability.
Indeed, the focus on taxing turnover, as opposed to profits, is telling, because sales records are far more difficult to doctor and conceal via accounting subterfuge than profits. In effect, this is tantamount to the EU stating to these tech giants, "Don't even think about making a transfer payment to Ireland and leaving yourself with an operating loss in our jurisdiction so you can pay no tax."
As the Brexit referendum illustrates, the Facebook and Cambridge Analytica scandal itself goes well beyond the U.S. Consequently, we can expect an attack on all fronts -- the U.S., the EU, and likely Asia as well. At this point it is too early to judge if this will have any impact on the ongoing Mueller investigation, but the economic implications already seem evident. The U.S. equity boom has been partly in reaction to deregulation in banking and elsewhere. The tech industry has largely escaped any kind of regulatory or antitrust scrutiny and has benefited accordingly. As Edward Harrison of the site Credit Writedowns has observed :
"Some of the best performing stocks in the US are the large Internet-centric technology stocks like Facebook. There is even an acronym, FANG, to describe Facebook, Amazon, Netflix and Google. Add Apple and, together, these five stocks account for one quarter of the Nasdaq's total market capitalization. They are huge. And Facebook's data breach represents a threat to them."
Could it be that public indignation at the Facebook profile harvesting scandal will lead to new regulation that could impede the value of some tech-based advertising models? Will it lead to a consumer backlash that slows the growth of the companies themselves? Certainly, it is easier to attack a wealthy and powerful company, if and when it becomes Public Enemy #1, even though many of these politicos will find themselves attacking the instruments of their own political success (or fundraising sources). Facebook or Google would no doubt argue that their platforms are just a facilitation of the communities inherent in the internet and that they have benefited by exploiting first mover advantage . But a centralized, monopolistic exploitation of these interpersonal links is inviting public intervention, especially as the technology can also survive on a distributed, competitive basis. In the eyes of many, these companies are unlikely to escape the opprobrium of helping to allow the Trump disaster to descend upon us. Overseas, they could well be scapegoated if the British economy falters as a result of leaving the European Union. On a broader scale, this scandal may well destroy any last vestiges of "techno-optimism," seeing how it has highlighted the misuses of technology and the human damage it can continue to inflict on us far more profoundly than ever before.
Apr 01, 2018 | www.zerohedge.com
Facebook In Turmoil: Employees In Uproar Over Executive's Leaked Memo
by Tyler Durden Sat, 03/31/2018 - 08:50 858 SHARES
Facebook's problems are just getting worse, and now investors can add worker morale to the (bucket) list of problems as the New York Times reports that employees furious over a leaked 2016 memo from a top executive seeking to justify the company's relentless growth and "questionable" data harvesting - even if it led to terrorists attacks organized on the platform.
VP Andrew "Boz" Bosworth - one of Facebook CEO Mark Zuckerberg's most trusted executives, wrote that connecting people is the greater good even if it " costs someone a life by exposing someone to bullies.
"Maybe someone dies in a terrorist attack coordinated on our tools."
On Friday, the fallout from Bosworth's leaked memo - following several weeks of outrage over the company's data harvesting practices, has Facebook employees in an uproar , according to The Times .
According to two Facebook employees, workers have been calling on internal message boards for a hunt to find those who leak to the media . Some have questioned whether Facebook has been transparent enough with its users and with journalists, said the employees, who asked not to be identified for fear of retaliation. Many are also concerned over what might leak next and are deleting old comments or messages that might come across as controversial or newsworthy , they said. - NYT
One former Facebook employee, Alex Muffett, wrote on Twitter that Bosworth's memo was a "significant" part of his decision to leave the company.
"Between overwork and leadership direction evidenced thusly, I could never stay," wrote Muffett.
"There are some amazing engineers working at Facebook, folks who care deeply about user privacy, security, and how people will use the code that they write," Mr. Muffett said later in a message. "Alas this episode may not help" to achieve more transparent internal product discussion, he said.
Buzzfeed article suppressed?
Following Buzzfeed's Thursday's publication of the "growth at any cost" leak, BuzzFeed reporter Ryan Mac suggested Facebook was censoring the article - tweeting "Interesting that only about 14k views (about 2% of total) for our story have come through Facebook referrals. Facebook's users should be aware of this, so feel free to share it on Facebook."
When Vox 's Matthew Yglesias chimed in to corroborate Mac's observation, Facebook head of news feed Adam Mosseri chimed in to say that the social media giant " 100% do not take any action on stories for being critical of us. "
Mark Zuckerberg responded to Bosworth's letter in a statement essentially disavowing the Boz, while also noting that Facebook changed their entire corporate focus to connect people and "bring them together"...
Boz is a talented leader who says many provocative things. This was one that most people at Facebook including myself disagreed with strongly. We've never believed the ends justify the means .
We recognize that connecting people isn't enough by itself. We also need to work to bring people closer together. We changed our whole mission and company focus to reflect this last year .
Meanwhile, Facebook is rapidly becoming radioactive, inside and out.
The question is when will investors - and especially hedge funds, for whom FB was the second most popular stock as of Dec. 31 - agree, and do what Mark Zuckerberg has been aggressively doing in recent weeks : dump it.0
DillyDilly Sat, 03/31/2018 - 08:52 PermalinkCognitive Dissonance -> Leakanthrophy Sat, 03/31/2018 - 09:00 Permalink
What a waste of fucking lives.Jumanji1959 -> johngaltfla Sat, 03/31/2018 - 09:26 Permalink
This is not a coordinated and concerted effort by Facebook execs to 'grow' the company at any and all costs because stock options must be vested 'in the money' and obscene amounts of 'compensation' are their god given right.
Nope, this is the work of a lone wolf exec VP who was drunk on power and out of control.
<Well, it works for the CIA to explain away their latest domestic terrorism operation or Presidential assassination attempt.>gregga777 -> Jumanji1959 Sat, 03/31/2018 - 09:42 Permalink
Goebbels would be proud of Zuckerbergglenlloyd -> ThanksChump Sat, 03/31/2018 - 11:16 Permalink
Goebbels would be proud of Zuckerberg
Press Statement for Immediate Release:
Today Mark Zuckerberg announced the official name change of FaceBook to GoëbbelsBook.
"Today marks the official change of our corporate name from FaceBook to GoëbbelsBook in honor of the German NSDAP (Nationalsozialistische Deutsche Arbeiterpartei) Reich Minister of Propaganda (1933-1945) Dr. Joseph Goëbbels (29 October 1897 – 1 May 1945). Dr. Goëbbels revolutionary and visionary dream was that of the total surveillance state. We have successfully implemented his concept of the total surveillance state."
"When a client downloads the GoëbbelsBook application it vacuums up everything from their computer and mobile devices. It gobbles up everything they write, all their contacts, their "likes"; in short every action they perform. The application also digitizes all telephone conversations for upload. The application then uploads everything to our corporate servers. We then upload all user data to the "Five Eyes" Gestapo (Geheime Staatspolizei) agencies that are our true original investors and beneficial owners."
"It is truly a proud day for me and all of my servants here at GoëbbelsBook that we have implemented the revolutionary total surveillance state vision of Dr. Joseph Goëbbels. I'm sure that he would be justifiably proud of our accomplishment."Ex-Oligarch -> ThanksChump Sat, 03/31/2018 - 14:05 Permalink
It's a little more complex than just Gramma giving up some data that she volunteers via a form. It's sucking in everything that a user does or says and selling that...everything. Same as Google.
In many cases you will find people who weren't aware that FB was selling user data, it's not really clear, unless you read the TOS fine print it's not clear. Even in the fine print what they do is obscured by the way they write it.
If the announcement of what they do with the data was in big bold letters at the top of FB every time you logged in the participation would be different.
This is one reason that although I've got a FB account I've never provided anything more than the de minimus information to have that account, and I don't spend much if any time on it. It's been weeks since I've logged in to FB.pigpen -> Jumanji1959 Sat, 03/31/2018 - 21:51 Permalink
You may be enjoying the mockery of FB users, but your line of argument ignores reality.
FB users indeed knew that the company was "selling something": advertising. Advertising in the form of "sponsored posts," newsfeed videos, solicitations to "like" an advertiser's page, notifications that someone in your network had liked an advertiser's page, and on and on and on. Every user viewed such advertising while using the service.
And indeed, selling targeted advertising is the dominant business model for providers of free content, messaging, email, webhosting, and a host of other internet services. It is exactly what a reasonable person would expect FB to be doing, based on its public disclosures and statements to the business community, and consistent with privacy laws. Even educated users would not expect the company to be selling its user data to third parties, let alone to government three-letter agencies. No one would expect the phone app to illegally log or record phone and message data for communications outside the app.Cognitive Dissonance -> City_Of_Champyinz Sat, 03/31/2018 - 09:34 Permalink
Jumanji, I live in heart of silicon valley and the goobook employees are so self important and associate working for the goobook surveillance tracking digtal advertising monopolies as a virtuous thing.
Let's call goobook what they are a surveillance tracking company that doesn't share any of the profits from your data with the owner: you.
My solution to these corporate pricks is to cut off their oxygen: digtal advertising and refuse to let them monetize me and others promoting using adblocking on mobile.
My solution is for everybody to immediately download brave browser or equivalent adblocker solution (depending on your tech knowledge).
Brave blocks advertising malware and tracking by DEFAULT on any device and operating system rendering digital advertising model useless.
Whoever controls the browser controls the money.
I use YouTube daily but run it out of brave browser. Zero ads and you can listen with screen off or while browsing other content.
We can destroy the value of digtal advertising by mass adoption of brave browser.
What is digtal advertising worth if ads can't be sent, viewed or tracked?
Let's take down the goobook surveillance tracking censorship monopolies. Install brave or equivalent mobile adblocker immediately.
PigpenThirteenthFloor -> Cognitive Dissonance Sat, 03/31/2018 - 10:28 Permalink
I created a fake FB account, then 'deleted' it when FB demanded I prove who I wasn't.
Does anyone wonder why FB only wants 'real' accounts? Data mining is so much more profitable when you can assure the purchaser the 'data' are grade A number one bleeders/spenders.OverTheHedge -> JoeSoMD Sat, 03/31/2018 - 11:38 Permalink
Facebook = Dillusional Narcissism
Problem is one day you may in fact be targeted for having no 'digital footprint', by the F's running the place. Read "The Circle".snblitz -> Cognitive Dissonance Sat, 03/31/2018 - 15:15 Permalink
Which ties in nicely with the US demanding social media account details with visa applications. You haven't said whether your work is us government based, but it would be pleasingly ironic if it were.
I'm still confused by that, actually: allegedly the NSA has all data, from everywhere, so why ask for the visa applicant's data? Is it too hard to connect physical and digital people, or are they just seeing if you will admit to your online indiscretions?chumbawamba -> KJWqonfo7 Sat, 03/31/2018 - 10:27 Permalink
14 day waiting period on facebook account deletes.
Some years ago I created a facebook account and then deleted it. Deleting it was not easy. When I did the final delete, it stated that all my data would be deleted, and would not be recoverable ever. I was also told I would have to **not** log into my account for 14 days after which everything would be gone. If I did log in during that period the account delete would not occur.
It has been some years and I still live in fear that if I was to "check" if my account still exists by attempting to log into it I will get a "Welcome back" message.
I suppose there are worse things. The account could be active and "owned" by someone else.nmewn -> Cognitive Dissonance Sat, 03/31/2018 - 09:09 Permalink
The CIA put way too much time, money and effort into Facebook to just let it fade away. Hell no, they will double down and figure out a way to keep the concern going, if under a different guise.
-chumblez.Cognitive Dissonance -> nmewn Sat, 03/31/2018 - 09:29 Permalink
But but but...they are listening! They even reformatted so their victims can moar easily delete private information themselves instead of having to dig down through twenty two screens to find it!
And Fuckerberg has a mansion. In Hawaii. With a wall. Because he cares!Philthy_Stacker -> Cognitive Dissonance Sat, 03/31/2018 - 09:51 Permalink
They even reformatted so their victims can moar easily delete private information themselves.....
The funniest part of your comment is the fact people will actually believe their information was 'deleted' because they push a button that said doing so would delete the information.
Riiiiiight. And I have a bridge in Brooklyn for sale that you can get for a steal.GunnerySgtHartman -> DillyDilly Sat, 03/31/2018 - 09:01 Permalink
"people will actually believe their information was 'deleted' "
Well, aside from birth and school records, most data will become 'stale' and worthless to advertisers and agencies. I suspect that your 'old' data will eventually become 'archived' in a storage array somewhere, essentially, statistically more worthless as time goes by. Perhaps, adding to a historical perspective on some future Documentary, about the collapse of Facebook.
Info on your birth, school, medical, jobs, driving record ... the authorities already have all that. Facebook is essentially worthless, other than as a phone book with pictures.JoeSoMD -> GunnerySgtHartman Sat, 03/31/2018 - 11:40 Permalink
It's amazing that FB employees were THIS NAIVE about what was going on in that company, thinking it was just about "connecting people." Anyone on the street with half a brain could see what was going on. Grow up and see the world for what it is, people.the_river_fish -> DillyDilly Sat, 03/31/2018 - 11:33 Permalink
I think it is more "being ignorant". To me, being naive implies being "an innocent". These people are hard core coders, computer scientists, network engineers, etc. What they do is figure out how to do outrageously complex technical things, and they are very successful at it. Like most scientists and engineers however, they never stop to ask "should we be doing these things". They stand on the shoulders of the scientist and engineers who came before them and continue to progress the state of their art, but never consider the ethics. I see it all the time at work. Can we develop this new thing? Sure. Should we develop this new thing? That's not my problem - management wants this new thing. They are no different than the guards at a concentration camp herding people to the ovens. I was only following orders.dark fiber Sat, 03/31/2018 - 09:02 Permalink
Alphabet (the parent company of Google) spent the most as a company on Lobbying. Facebook's spend on lobbying increased 5500% since 2009. They spent most lobbying on changes to data privacy.
https://thistimeitisdifferent.com/lobbying-on-data-privacynotfeelinthebern Sat, 03/31/2018 - 09:07 Permalink
Have Zuckerberg and the rest of the asseclowns over there realized how fuccked they really are? It is only a matter of time before class action and individual lawsuits are filed not only against Facebook (fuck that) but them personally, for intentionally and willfully creating a data mining operation disguised as a social network. They will get sued for every penny they have and will be lucky if they don't end up doing time.tedstr Sat, 03/31/2018 - 09:19 Permalink
The people who use this tripe are addicts, and like all addicts need rehab. They couldn't say how many articles are in the US Constitution yet practically know what Oprah eats for breakfast - and it ain't a Weight Watchers diet!Byrond Sat, 03/31/2018 - 09:39 Permalink
I got into the dotcom world in 97 got out in '11. Worked for a bunch of big and small dotcoms. They are all so badly run its hard to describe. rampant greed zero morality.. The VCs just want their 100:1 return. VCs are idiots. some are just stupid many are just illegal accounting fraud capitalizing expenses accelerating revenue recognition over stating audience. People forget that Fb has already had a bunch of exposed numbers "mistakes". Hope it goes to zero.JTPatroit Sat, 03/31/2018 - 09:48 Permalink
From an evolutionary standpoint, humans are extemely adapted to hiding feelings, thoughts, plans, motivations, and intentions. This has enabled our survival for millenia. Our ears don't move toward what or who we're listening to, and we don't have tails or bristling fur or feathers that would display our emotions. Facebook causes us to post all this stuff, then takes ownership and uses it to make a profit any way they can. Social media is not something that we are adapted to, and we're getting stomped on by the companies that engineer it.Nesbiteme Sat, 03/31/2018 - 09:50 Permalink
To me, what is really sad about this whole story is that there is nobody at Facebook - now or previously - who doesn't know that their company makes its money by harvesting data and selling it to anyone with a few bucks in their hand. I believe these employees are all lying when they deny this plain fact.
I believe the same to be true of Google, but of course, Google at least has never denied it, like Facebook is trying to do now that someone in the MSM has bothered to report about it.Smerf Sat, 03/31/2018 - 09:54 Permalink
Anyone here ever work with chickens...the henhouse/chicken analogy is often used with the facebook...when you walk into the henhouse sometimes the hens they aren't expecting visitors and they get all fussy and show their agitation through clucking and squawking and fussing about...but then after a few moments they go back to what they were doing as if nothing ever happened. That about what is going on here. Facebook users and employees will go back to work for their owners in a few more days and it will have been all forgotten.SirBarksAlot Sat, 03/31/2018 - 10:11 Permalink
Since most users of Facebook are gossiping women and deeply closeted homosexuals, I don't see this having a material impact on user growth. It may even suck more of them in.MusicIsYou Sat, 03/31/2018 - 10:13 Permalink
According to Thomas Paine, all the Facebook, Amazon, Google and Tesla are products of the DOD and are losing their hidden government support. That is the real reason that people like Zuckerberg and Soros are divesting.
https://youtu.be/AvKNnuSp2GwLast of the Mi Sat, 03/31/2018 - 10:52 Permalink
People will forget about any Facebook scandal after another scandal surfaces elsewhere in 3, 2, 1 and....... There goes the school of ADHD zombie fish-head people onto another hook, the scandal of the next week. The next scandal will hit the top of the pond and sink, and the fish-head school of people-fish will swim over to it and stare at the scandal to see if it moves. People are grotesquely simple minded.Nuclear Winter Sat, 03/31/2018 - 10:54 Permalink
fb will not recover from massive spying vs people will once again log on to say something snarky, see another picture of their neighbor's cat and above all else get a "like". OMG I'm important!
Soros has billions to funnel through the resistance that is fb for the furtherance of his global agenda. They may be down, but certainly not out.Koba the Dread Sat, 03/31/2018 - 18:59 Permalink
So now the FB employees finally see what the bloodsucking Vampire Zuckerberg and Frankenstein Bosworth really are: the enemy of the people. Time for a mass revolt, pitchforks and torches to burn down the platform.Trogdor Sat, 03/31/2018 - 20:13 Permalink
The Facebook Wall photograph is Photoshoped. While everyone else has written in freehand in chalk, the "Maybe someone dies!?". "Why We Spy So Much?" and "WTF?" posts are set in perfect computer type.
Facebook is a monster of deceit. Why does this article need to lie with Photoshopped photographs? If Facebook thinks we're rubes and yokels, so does this article.
Perhaps they're right.
"We've never believed the ends justify the means ." ~ Zuckerfucker
The Liberal Credo is "THE ENDS JUSTIFY THE MEANS" I can't tell you how many Liberals I've asked this very question and they will flat out tell you that if you have to throw babies into a branch chipper to get what you want, YOU DO IT . Lefties/Communists have always believed in mass murder to get what they want - so - spying on a few million people certainly doesn't give the pause.
Apr 01, 2018 | www.counterpunch.org... ... ...
Users with at least half a brain have long known that Facebook exploits their privacy and was probably from the start a vehicle for full-blown surveillance by our spy agencies. I certainly suspected the latter. In 2009, I wrote up a pitch for an investigative piece about Google, Facebook and their connections to the CIA. I published a piece in Counterpunch about the Google angle, but was never able to report out fully what I suspected about Facebook. In the pitch, I wrote:
If personal data could be collected in more concentrated, focused form, with the additional advantage of efficiently collating social networks, complete with personal photos, habits, activities and itineraries freely provided in a centralized system by the users themselves well, that would be Facebook. The intelligence services' hand in Facebook is not direct, but publicly available records suggest that venture capital was pumped into Facebook from investment firms whose board members cross-pollinate with a company called In-Q-Tel.
Founded in 1999 to research and invest in new digital technologies focused on intelligence gathering, In-Q-Tel was part of the push for the privatization of national security operations that would become endemic under the Bush Administration. Some $25 million in seed money during Google's start-up in 1999 arrived in part from the equity firm Kleiner Perkins Caufield & Byers, which works with In-Q-Tel to develop spy technology. In-Q-Tel-funded companies produced the eye-in-the-sky image database that would become Google Earth. In mid-2005, In-Q-Tel's former director of technology assessment, Rob Painter, joined Google as "senior federal manager," further cementing Google's bond with the intelligence community.
Like Google, Facebook is ambiguous in its privacy policies as to how it will share information with third parties. A former CIA officer, speaking anonymously, confirmed the CIA's interest in Facebook as an intelligence and communications tool, noting that the agency's use of Facebook for operations is "classified." The former CIA officer only went so far as to suggest the CIA may be using the site for communications. "It's a perfect place to hide communications," says the former CIA officer. "You don't need secret, expensive satellite systems anymore when you can hide in plain sight with millions of idiots sending photos and inane messages to each other." When pressed on the subject, the source reiterated: "How it's employed by [the CIA] is classified, and you shouldn't write about it." The Facebook angle for the proposed piece will require further reporting. What's widely known is that the CIA has been using Facebook since 2006 as a recruiting tool for the clandestine services, which marks the first time the CIA has employed online social networking for the hiring of personnel.
Ah, but denial is a powerful drug, one that produces amnesia, and I soon forgot my own reporting and marched as a guinea pig into the Facebook surveillance system. We now know exactly how Facebook shares information with third parties.
Deleting my account, I join an exodus that requires no explanation given the Cambridge Analytica disclosures. Hopefully this is the start of a movement that will drive the company's stock price down where we'll find greasy Mark Zuckerberg begging for a quarter on the corner. Perhaps sooner, someone skilled with demolitions and with access inside the company can blow up the Facebook servers, and we can be done with this menace altogether. More articles by: Christopher Ketcham
Christopher Ketcham is a freelance writer. You can write him at firstname.lastname@example.org or see more of his work at christopherketcham.com .
Apr 01, 2018 | www.theguardian.com
Trump is after Amazon, Congress is after Facebook, and Apple and Google have their problems too. Should the world's top tech firms be worried?
rump is going after Amazon; Congress is after Facebook; Google is too big, and Apple is short of new products. Is it any surprise that sentiment toward the tech industry giants is turning sour? The consequences of such a readjustment, however, may be dire.
Trump lashes out at Amazon and sends stocks tumbling
The past two weeks have been difficult for the tech sector by every measure. Tech stocks have largely driven the year's stock market decline, the largest quarterly drop since 2015.
Facebook saw more than $50bn shaved off its value after the Observer revealed that Cambridge Analytica had harvested millions of people's user data for political profiling. Now users are deleting accounts, and regulators may seek to limit how the company monetizes data, threatening Facebook's business model.
On Monday, the Federal Trade Commission confirmed it was investigating the company's data practices. Additionally, Facebook said it would send a top executive to London to appear in front of UK lawmakers, but it would not send the chief executive, Mark Zuckerberg, who is increasingly seen as isolated and aloof.
Shares of Facebook have declined more than 17% from the close on Friday 16 March to the close on Thursday before the Easter break.
Amazon, meanwhile, long the target of President Trump's ire, saw more than $30bn, or 5%, shaved off its $693bn market capitalization after it was reported that the president was "obsessed" with the company and that he "wondered aloud if there may be any way to go after Amazon with antitrust or competition law".
Shares of Apple, and Google's parent company Alphabet, are also down, dropping on concerns that tech firms now face tighter regulation across the board.
For Apple, there's an additional concern that following poor sales of its $1,000 iPhone X. For Google, there's the prospect not only of tighter regulation on how it sells user date to advertisers, but also the fear of losing an important Android software patent case with the Oracle.
Big tech's critics may be forgiven a moment of schadenfreude. But for shareholders and pension plans, the tarnishing of tech could have serious consequences.
Apple, Amazon and Alphabet make up 10% of the S&P 500 with a combined market capitalization market cap of $2.3tn. Add Microsoft and Facebook, with a combined market value of $1.1tn, and the big five make up 15% of the index.
Overall, technology makes up 25% of the S&P. If tech pops, the thinking goes, so pops the market.
"We're one week into a sell-off after a multi-year run-up," says Eric Kuby of North Star Investment Management. "The big picture is that over the past five years a group of mega cap tech stocks like Nvidia, Netflix, Facebook have gone up anywhere from 260% to 1,800%."
Confess -> Nedward Marbletoe , 1 Apr 2018 16:12The post office is a service for citizens. It operates at a loss. Being able to send a letter across the country in two days for fifty cents is a service our government provides. Amazon is abusing that service. It's whole business model requires government support.Byron Delaney , 1 Apr 2018 15:59Amazon's spending power is garnered simply from its massively overalued stock price. If that falls, down goes Amazon. Facebook is entirely dependent on the postive opinion of active users. If users stop using, down goes Facebook's stock price, and so goes the company. It's extremely fragile. Apple has a short product cycle. If people lose interest in its newest versions, its stock price can tank in one year or so. Google and Microsoft seem quite solid, but are likely overvalued. (Tesla will most likwly go bankrupt, along with many others.) If these stocks continue to lose value, rwtirement funds will get scary, and we could enter recession again almost immediately. Since companies such as Amazon have already degraded the eatablished infrastructure of the economy, there may be no actual recovery. We will need to change drastically in some way. It seems that thw wheels are already turning, and this is where we are going now - with Trump as our leader.lennbob , 1 Apr 2018 15:58'Deutsche Bank analyst Lloyd Walmsley said: "We do not think attacking Amazon will be popular."'PardelLux , 1 Apr 2018 15:54
Lloyd Walmsley hasn't spent much time in Seattle, apparently. The activities of Amazon and Google (but especially Amazon) have all contributed to traffic problems, rising rents and property prices, and gentrification (among other things) that are all making Seattle a less affordable, less attractive place to live. That's why Amazon is looking to establish a 'second headquarters' in another city: they've upset too many people here to be able to expand further in this area without at least encountering significant resistance. People here used to refer to Microsoft as 'the evil empire'; now we use it to refer to Amazon. And when it comes to their original business, books, I and most people I know actively avoid buying from Amazon, choosing instead to shop at the area's many independent book stores.Dear Guardian,Alexander Dunnett , 1 Apr 2018 15:42
why do you still sport the FB, Twitter, Google+, Instagramm, Pinterest etc. buttons below every single article? Why do you have to do their dirty work? I don't do that on my webpages, you don't need to do neither. Please stop it.Not being a Trump supporter, however there is a lot of sense in some of the comments coming from Trump,. Whether he carries through with them , is another subject.Neovercingetorix , 1 Apr 2018 15:20
His comment on Amazon:- " Unlike others, they pay little or no taxes to state or local governments, use our postal system as their delivery boy (causing tremendous loss to the US) and putting many thousands of retailers out of business."
Who can argue against that? Furthermore, the retailers would have paid some tax!
Talk about elephants in the room. What about the elephants who were let out of the room to run amuck ? Should it not have been the case of being wise before the event , rather than after the event?A quasi-battle of the billionaires. With Bezos, there's the immediate political element in Bezos' ownership of the clearly anti-Trump Washington Post, which has gone so far as to become lax in editorial oversight (eg, misspelling and even occasional incomplete articles published in an obvious rush to be first to trash POTUS), but there are other issues. Amazon's impact on physical retail is well-documented, and not so long ago (ie, before Trump "attacked" Amazon"), it was sometimes lamented by those on the American left, and Trump is correct in that critique, provided one believes it is valid in the first place. Amazon does have a lot of data on its customers, including immense expenditure information on huge numbers of people. What kinds of constraints are there in place to protect this data, aside from lawyer-enriching class action suits? Beyond that, there's also online defense procurement, worth hundreds of billions in revenue to Amazon in the years to come, that was included in the modified NDAA last year. Maybe that is on Trump's mind, maybe not, but it should probably be on everyone's mind. Maybe the Sherman Antitrust Act needs to be reinvigorated. It would seem that even Trump's foes should be willing to admit that he gets some things right, but that now seems unacceptable. I mean, look at the almost knee-jerk defense of NAFTA, which way back when used to be criticized by Democrats and unions, but now must be lionized.Byron Delaney , 1 Apr 2018 14:46If Amazon can get cheaper shipping than anyone else and enable manufactuers to sell direct, they can sell more than anyone else as long as consumers only buy according to total price. This means two things. One, all retailers as well as distributors may be put out of business. Two, the success of Amazon may rely almost entirely on shipping costs. American consumers also will need to forego the shopping experience, but if they may do so if they're sarisfied with remaining in their residences, workplaces, and cars most of the time. This is the case in many places. People visit Starbucks drive thrus and eat and drink in their cars. If Amazon owns the food stores such as Whole Foods and Starbucks, it's a done deal. Except for one thing. If this happens, the economy will collapse. That may have already happened. Bezos is no rocket scientist.
Apr 01, 2018 | www.counterpunch.org
Maybe it did expand my audience. I have no idea. About the only proven use I found was being able to get on Tinder to get laid, as you cannot have a Tinder account without a Facebook account. Thereafter I called it Fuckbook.
Mar 29, 2018 | discussion.theguardian.com
aliasboy -> ChomskyReader , 28 Mar 2018 08:45When a friend invited me to join Googlemail over a decade ago, I accepted and used it as an address for any organisation who might store or misuse my data.
Little was I to know that Android would rely on a Gmail address...
Having said that, my AdSense adverts still show me ads that are no way based on my online activity so I wonder if the same people are behind the algorithms here as were predicting the world economy in 2007.
Mar 29, 2018 | discussion.theguardian.combobbo123 , 28 Mar 2018 08:54While I love Wikipedia as a wonderful, creative application of social media, I've always been spooked by Facebook and the like, and consider the "internet of things" (IdiOT) directly intrusive ...Massaniello , 28 Mar 2018 08:46
Does my resistance to the big-bro-data invasion classify me as a Luddite? And how long will it remain technically feasible to opt out of the idiot stuff?I recall a time some 20 or so years ago when many of us thought about and wondered how in the world the Internet could survive if info and interactions were without monetary cost. It seemed like a space within which we could freely move and think and engage. I recall driving down the NJ Turnpike in 1993 Listening intently to a radio news report about the wonders of the upcoming information super highway that was about to bring us all together and overcome violence and racism and sexism and without any tolls. Al Gore himself was encouraging this wondrous new world. We were about to be a part of World Wide Web love fest reminiscent of a 1967 Summer of Love Be-In.
Now we know how the Internet survived. Call it innovation. I call it a police state, engineered by right-wing jerks at Stanford with a little help from their friends at Cal Tech, MIT, and Harvard, and based in Silicon Valley. If that's the way you want it, well that's the way you'll get it.
Mar 29, 2018 | discussion.theguardian.comlaerteg -> hellopixel , 28 Mar 2018 10:13Actually, it's wonderful (though it's also full of lies, propaganda and bs).
But like all too many wonderful things, the greedy and the power hungry despoil it, manipulate it to their own advantage, and use it to exploit others - often under the guise of "security."
A new technology is developed, people start using it, and before they know it, they can't live, work, or perform many daily tasks without it.
Oh, sure, all of us here could stop commenting online. We could abandon social networks. But what about everything else that involves giving up our personal information to a corporation and/or the government that has become part of how things get done in our world?
That's a heck of a lot harder.
Add to that our collective intention since 1980 to weaken government regulation of business' ability to do whatever it wants with our personal information, while increasing government's ability to surveil us and invade our privacy, as well, and you have an internet that is getting less and less wonderful by the day.
Oh, and don't forget those in business and government trying to destroy net neutrality, so some (those who can pay for it) will be more equal than others in their ability to use the internet.
We need to take ownership of our information and data back again and regulate the internet as a utility.
It may not have much affect on who knows what about those of us who have already given away our privacy, but it could protect future generations .
Mar 29, 2018 | discussion.theguardian.com
Bradther , 28 Mar 2018 10:14... Remember to look at the back of the your envelopes containing your personal mail - when it's being scanned by your State it will have it's rear various pencilled initials. At one time the departments in sorting offices were only allowed to deviate mail for twenty minutes but now given that standards have dropped not such constraints exist. That's progress.
Mar 29, 2018 | discussion.theguardian.com
vedvek -> wascallywabbit , 28 Mar 2018 10:06I recommend the new 'Brave' browser - it's primary focus is on privacy. It was created by the former CEO of Mozilla (Firefox) and employs at least one engineer involved in the development of the Tor browser (the one used for super-secure browsing on the dark web). Its snappy performance is also a pleasant surprise.wascallywabbit , 28 Mar 2018 09:4119. One way to limit the amount of data that you are providing is to stop using Google Chrome. It is a browser created by an advertising company specifically to harvest your personal information. If you are logged in to gmail, using google for your searches, watching Youtube and browsing on chrome, then you're making it easy for them. Try Firefox or one of the other browsers out there, use a different search engine, and don't leave your account logged in to google all day.dg000000 -> fishtail75 , 28 Mar 2018 09:30With every financial transaction, banks know the location, value and can estimate the goods I buy. They could run AI algorithms to determine everything about my habits and preferences to spend and sell this insight to shops and websites who could use this it to get me to part with my money easier...but they don't.
Mobile operators poll my mobile phone constantly so always know my location, they know the numbers I call and text so know my social network. They could run AI algorithms to determine where I'll be when, and who I'll likely be with...but they don't.
Mar 29, 2018 | discussion.theguardian.com
Battleweary -> LestWeNeverForget , 28 Mar 2018 11:19Make their day, write something outlandish.
Decades ago, long before mobile phones were invented, we used to get crossed lines on our landline regularly. We could hear other people in the background, and one day a nosy woman listening to our conversation was relaying what we were talking about to her husband, oblivious to the fact we could hear her, so we spiced up the conversation.
I started it by saying, "OK, but down to business, lets talk about next week". We made it sound as if we were planning a heist. She was totally taken in, to the point of asking her husband if she should tell the police! After a few minutes of leading her on, I said," Do you think the nosy bitch listening in on the crossed line got all that? ".
She slammed her phone down.
Mar 29, 2018 | www.theguardian.com
1. Download all the information Google has on you
You may well have downloaded your Facebook data already; it has become something of a trend in recent days. Now take a look at what Google has on you. Go to Google's "Takeout" tool and download your data from the multiple Google products you probably use, such as Gmail, Maps, Search and Drive. You'll get sent a few enormous files that contain information about everything from the YouTube videos you have watched, your search history, your location history and so on. Once you've seen just how much information about you is in the cloud, you may want to go about deleting it. I highly recommend deleting your Google Maps history, for a start, unless you are particularly eager to have a detailed online record of everywhere you have ever been. You may also want to stop Google from tracking your location history. Sign in to Google, open Maps, then click on "timeline" in the menu. At the bottom, there's an option to manage your location history.
... ... ...
10. Never put your kids on the public internet
Maybe it's fine to upload pics to a shared (private) photo album, or mention their day in a group DM. But if it's public, Google can find it. And if Google can find it, it's never going away. How are you going to tell your child in 16 years' time that they can't get a drivers' licence because Daddy put a high-res photo of their iris online when they were two and now they trip alarms from here to Mars?
12. Sometimes it's worth just wiping everything and starting over
Your phone, your tweets, your Facebook account: all of these things are temporary. They will pass. Free yourself from an obsession with digital hoarding.
If you wipe your phone every year, you learn which apps you need and which are just sitting in the background hoovering up data .
If you wipe your Facebook account every year, you learn which friends you actually like and which are just hanging on to your social life like a barnacle.
14. Have as many social-media-free days in the week as you have alcohol-free days
This can be zero if you want, but know that we're judging you.
15. Retrain your brain to focus
Save up your longreads using Instapaper or Pocket and read them without distraction. Don't dip in and out of that 4,000-word article on turtles: read it in one go. Or maybe even try a book!
16. Don't let the algorithms pick what you do
You are not a robot, you are a human being, and exercising your own free will is the greatest strength you have. When that YouTube video ends, don't watch the next one that autoplays. When you pick up your phone in the morning, don't just click on the stories at the top of Apple News or Google Now. Exercise choice! Exercise freedom! Exercise humanity!
17. Do what you want with your data, but guard your friends' info with your life
Yes, you should think twice before granting that fun app you downloaded access to your location or your photo library. Do you trust it not to do weird things with your pictures? Do you know it won't track your every movement? But ultimately, those are your decisions, and they are for you to make. But your friends' data isn't yours, it's theirs, and you are a trusted custodian. Don't think twice before authorising access to your address book, or your friends' profiles: think five or six times, and then don't do it.
18. Finally, remember your privacy is worth protecting
You might not have anything to hide (except your embarrassing Netflix history) but that doesn't mean you should be blase about your privacy.
Increasingly, our inner lives are being reduced to a series of data points; every little thing we do is for sale. As we're starting to see, this nonstop surveillance changes us. It influences the things we buy and the ideas we buy into .
Being more mindful of our online behaviour, then, isn't just important when it comes to protecting our information, it's essential to protecting our individuality.
Frenske 28 Mar 2018 23:58
I always use the wrong birthday when registering for accounts unless it is for financial services and utility which may do credit check or are used in credit checks. If my real name is not required I use a variation on my last name.
Jack Harrison 28 Mar 2018 22:33
Astounding that people are surprised about all this data hoarding and selling.
There's a reason Facebook, Google etc are worth BILLIONS. It ain't because of the ads you ignore or are blocked.
FooBar21 -> cachito11 28 Mar 2018 21:31
"There billions of species on our own very planet that show us daily how life is not about money."
In their case daily life is a constant struggle to evade an endless supply of predators who are always looking to tear them limb to limb or swallow them whole, find whatever scraps of food they can find to avoid starving to death, and compete with conspecifics for the right to procreate. On a good day.
wascallywabbit -> Davinci Woohoo 28 Mar 2018 19:34
Thanks Davinci for the reasoned and balanced response.
I appreciate that it's not necessarily your view, but that there is a lot of history behind it. However, to a European living in a modern democracy, it just seems to be a strange and counter-productive attitude. For example, rather than paying taxes for pooled and equitable public services, many of those services are run as profit-making businesses, thus removing money from the system. It also reinforces class divisions, as the rich can pay, but the poor cannot. As a result, many people cannot pay for medical care, cannot send their children to university, and are forced to buy a car to move around.
Again, I'm not criticising you personally, just the mindset that you mentioned.
fatkevin 28 Mar 2018 19:25
It seems sensible to take steps to 'protect' ourselves from the data hoover that is google or Facebook.
But should it be that way round? These cyborg organisations should frame their technology and services that automatically displays social responsibilities towards those they are currently sucking dry of personal information.
Our data is ours, and not theirs to sell onto or allow political freak shows to 'target' us for the suckers benefit, and not the suckees welfare. Who knows how many abusers have been able to hit on vulnerable family's with children!
The internet is a colourful addictive place that most users have only a limited grasp of its potential, as nicely illustrated by our politicians being dumb to these recent events impact. Capitalist thinking, we know, is incapable of self regulation. Internet orgs therefore need steep guidelines that imposes tight operating practices that ensures the vulnerable (that's you and me) don't have to encounter the likes of these recent catastrophes.
Putting lead into food a century ago was deadly until food standards were criminalised; the same applies to the cyborgian world of the internet.
Mar 29, 2018 | www.zerohedge.com
- Facebook's dirty tricks have been exposed, they will never completely regain the trust of users.
- Alternatives are set to cannibalize the social media model, pioneered by Facebook.
- Costs of security features, auditing information, and loss of ad revenue will make Facebook less profitable.
Finally, Facebook ( FB ) has been exposed for the fraud that it is. There has never been such an inflated market cap based on nothingness, just hype. Steve Jobs successfully hyped up Apple ( AAPL ) but unlike Fakebook, Apple actually makes products, and they have a huge following. Here we will elaborate on several key points that we've been saying for years, but now maybe the market is listening:
- Facebook ( FB ) has a weak underlying business model. Users do not like to see advertisements therefore management will be driven to measures such as grey hat (or even black hat) methods to obtain data and use data in ways in conflict with users.
- Facebook ( FB ) is ultimately and primarily a tool of the intelligence agencies (primarily but not exclusively the CIA) and furthers a larger agenda as part of the DOD's "Information Awareness" program, more than it is a hot business model.
- There are thousands of social media networks , in fact Ning offers users a platform to create their own social network. The only thing unique about Facebook ( FB ) is that it is the most used and trusted network, but that all is hanging on the thin thread of users trust, which has now completely evaporated.
- Mark Zuckerberg is an unethical tricky leader that cannot change , he is detached from reality, has no vision, no understanding of what his customers want, and perhaps most importantly; stole Facebook ( FB ) from Winkelvoss .
- Facebook became spammy in 2010 , the amount of bot manipulation is highly under-reported. Fake accounts are bought and sold in a black market, software is sold that can create fake accounts by the hundreds, thousands.
Based on the above, we believe the real value of Facebook ( FB ) is about $10 - $20 per share. Let's use the 'toplist' format as promoted by Facebook ( FB ) itself:
"Top Reasons Facebook ( FB ) is going down fast"
- Users are abandoning their accounts, deleting them, and it has become 'cool' to delete your Fakebook account. #DeleteFacebook
- Mark Zuckerberg originally referred to his users as "Dumb Fucks" this meme is now being circulated.
- Cambridge Analytica is not unique. This is the underlying model of Facebook's business model (if you can call it a 'model').
- Facebook's IPO disaster was a sign of things to come.
- Lawsuits are just the beginning . People are angry. Cook County is suing for 'fraud' - this is a public government suing Facebook for SERIOUS violations. Fraud isn't something you can just get over. It takes years to make a reputation and minutes to lose it.
- According to Edward Snowden, Facebook is a surveillance company.
- Once the genie is out of the bottle, hard to put back. Perhaps some users didn't think this was going on and others didn't care. But now there's a movement to control how Facebook spies on you.
So if this trend continues - what should investors do? Sell , that's for starters. Contact an attorney who knows Securities if you are a shareholder. That's the good news. Finally, unless you like being tracked in your every move, delete your Facebook ( FB ) account. Because that's the only real remedy. You can't block Zuck:
Remember one thing, Facebook ( FB ) users - you use FB with your consent. This author deleted FB years ago, as have millions of others. If you really like the idea of social network there are hundreds of others. Or set one up yourself for sharing family photos with Grandma. JomSocial can turn any Joomla site into a social media site.
What do the FTC, German government, Cook County Illinois and many others have in common? They are all looking into the abuses of Facebook ( FB ).
Lawsuits are nothing new, one could say that Facebook ( FB ) itself was born out of a lawsuit (with Winkelvoss).
The point here is investors that this is the beginning of a crap storm that has been brewing for years but it didn't metastasize until now.
Facebook is going to zero. If you're long get out now before it drops further. There's nothing supporting the stock except hopers and hot air.
One last thing, Fake News started on Facebook ( FB ) see articles here , here , and here . Since the Trump election there has been a backlash on 'Fake News' sites, which Facebook is #1 . It's a platform for Fake News!
News existed before Fakebook and will continue to exist. Facebook is to the internet was the Laser Disc was to the home movie industry. It's outdated, it's bloated, it's hype - there's nothing there. Move on, drones. Nothing to see here.
Get more Alpha in your portfolio from Alpha Z Advisors . Order Online @ ubuy.me
Mar 29, 2018 | www.zerohedge.com
Smi1ey, Wed, 03/28/2018 - 23:42 Permalink
He's not your dad.
Buck Shot Wed, 03/28/2018 - 23:19 Permalink
As long as there are attention whores, there will be some type of facebook. I tried it for a while until my page was hijacked and someone put a picture of some black girl naked with a big booty under a waterfall as my profile photo. No shit, this really happened. I went from 13 friends to hundreds of friend requests overnight.
People were emailing my wife and asking her if we split up or something. Now I am glad I quit that shit. To some people it is like crack. My neighbor used to post pictures of himself pulling worms out of his garden or when he was in yoga class. I wanted to tell him that no one really gives a fuck.
Mar 28, 2018 | www.zerohedge.com
In response to the Facebook data harvesting scandal, Mozilla has launched an extension for its Firefox Browser which helps you segregate your web activity from Facebook's prying eyes by isolating your identity into a separate "container." This makes it far more difficult for Facebook to track your activity on other websites using third-party cookies.
You can get the extension here .
Upon installation, the extension deletes your Facebook cookies and logs you out of Facebook. The next time you visit the social media giant, it will open in a special blue browser "container" tab - which you can use to safely log in to Facebook and use it like you normally would. If you then click on a link that takes you outside of Facebook, it will load outside of the container.
Should you click on any Facebook Share buttons on other browser tabs it will load them within the Facebook container. You should know that when you're using these buttons information will be sent to Facebook about the website that you shared from .
If you use your Facebook credentials to create an account or log in using your Facebook credentials, it may not work properly and you may not be able to login. Also, because you're logged into Facebook in the container tab, embedded Facebook comments and Like buttons in tabs outside the Facebook container tab will not work. This prevents Facebook from associating information about your activity on websites outside of Facebook to your Facebook identity. So it may look different than what you are used to seeing. - Mozilla.org
Think of it as a condom for Facebook.
Mozilla notes that it "does not collect data from your use of the Facebook Container extension," adding "We only know the number of times the extension is installed or removed."
One Reddit user asks "why not just make every tab an isolated container? "There should be NO REASON for one tab to know or read what another tab (aka cookies) are doing from another domain," states /u/Pro2U
Lo and behold, the Mozilla programmer who created the extension popped into the thread and answered the question:
What you describe is actually possible in Firefox. It's called "First Party Isolation": https://wiki.mozilla.org/Security/FirstPartyIsolation
When we studied various privacy protections, FPI had a higher amount of website breakage reported by users: https://blog.mozilla.org/data/2018/01/26/improving-privacy-without-breaking-the-web/ -/u/groovecoder
So there you have it - if you don't want Facebook harvesting most of your data and tracking you around the web, strap on the Firefox extension and go to town.
boostedhorse Wed, 03/28/2018 - 14:14 PermalinkTemporalist -> boostedhorse Wed, 03/28/2018 - 14:17 Permalink
Firefox is finally fast enough to use as a main browser.Buckaroo Banzai -> Temporalist Wed, 03/28/2018 - 14:20 Permalink
I've been switching between Brave and FF and they are similarly fast because they don't get ad overload.Consuelo -> Buckaroo Banzai Wed, 03/28/2018 - 14:31 Permalink
Condoms fail. Best way to not catch STDs is to not fuck disease-ridden skanks.macholatte -> Ignatius Wed, 03/28/2018 - 14:56 Permalink
Well, if given the choice between McDougal and Stormy I'd probably go with the former - just a tad less skanky, don't you think...?
In Firefox Options - Privacy section you can setup to delete cookies and clear history at every browser exit. Same with Internet explorer. Not sure about Chrome.
You can also accept or deny third party cookies.
Ghostery is a must, especially for ZH
C Cleaner is a nice utility for getting rid of excess crap.
Mar 28, 2018 | www.zerohedge.com"Want To Freak Yourself Out?" Here Is All The Personal Data That Facebook/Google Collect
by Tyler Durden Tue, 03/27/2018 - 13:10 2.8K SHARES
The Cambridge Analytica scandal was never really about Cambridge Analytica.
As we've pointed out, neither Facebook nor Cambridge Analytica have been accused of doing anything explicitly illegal (though one could be forgiven for believing they had, based on the number of lawsuits and official investigations that have been announced).
Instead, the backlash to these revelations - which has been justifiably focused on Facebook - is so severe because the public has been forced to confront for the first time something that many had previously written off as an immutable certainty : That Facebook, Google and the rest of the tech behemoths store reams of personal data, essentially logging everything we do.
In response to demands for more transparency surrounding user data, Facebook and Google are offering users the option to view all of the metadata that Google and Facebook collect.
And as Twitter user Dylan Curran pointed out in a comprehensive twitter thread examining his own data cache, the extent and bulk of the data collected and sorted by both companies is staggering.
Google, Curran said, collected 5.5 gigabytes of data on him - equivalent to some 3 million Microsoft Word documents. Facebook, meanwhile, collected only 600 megabytes - equivalent to roughly 400,000 documents.
Another shocking revelation made by Curran: Even after deleting data like search history and revoking permissions for Google and Facebook applications, Curran still found a comprehensive log of his documents and other files stored on Google drive, his search history, chat logs and other sensitive data about his movements that he had expressly deleted.
What's worse, everything shown is the data cache of one individual. Just imagine how much data these companies hold in total.
... ... ...
Google even saves a log of every log a user has ever viewed or clicked on, every app they've every opened and every image they've every searched for - and every news article they've ever read.
... ... ...
Curran, who joked that he's "probably on an FBI watchlist" following his twitter thread, explained that the data he highlighted - while some of it might seem obscure - could have thousands of potentially compromising applications, including blackmailing a rival or spying on a spouse.
... ... ...
The question now is: Will this transparency actually change user's behavior? Or will Facebook's hollow promises to change be enough to lull its legions of users back into a passive ignorance. As Curran points out, people would be outraged if they discovered the government was monitoring them to this extent. But when Google does it? People hardly bat an eye.
Tags Technology Internet Mobile Application Software Phones & Handheld Devices - NEC Social Media & Networking
CaptainMoonlight Tue, 03/27/2018 - 13:11 PermalinkJ S Bach -> CaptainMoonlight Tue, 03/27/2018 - 13:13 Permalink
Pitchforks out for Zuck.
Honestly though, aside from a well deserved arresting of Zuck and dragging him through the streets for treason, you people using FB have only yourselves to blame if this privacy-attack thing of Facebook's is a surprise to you. It's like suing a cigarette company for the holes in your cheeks and throat.
OK, final edit: I should not have said "you people", I should have said "those people", since most of you ZHers are probably way too smart to have ever been on FB.Adolph.H. -> J S Bach Tue, 03/27/2018 - 13:18 Permalink
I ain't freaked out because I don't use these voyeuristic platforms. Boycotts work, folks. Starve the beasts. It's the only effective weapon we have at this time. Other weapons will come into our hands as our power increases.Hippocratic Oaf -> Adolph.H. Tue, 03/27/2018 - 13:22 Permalink
Dude discovered the moon. I would advocate NOT deleting anything from now on. Just put fake information on your accounts. Just poison the well . Destroy their data quality .
https://www.ponzied.commacholatte -> Hippocratic Oaf Tue, 03/27/2018 - 13:29 Permalink
Aaaaaaaaaaaaannnnd porn. THEY WANT TO SEE OUR PORN!!!tmosley -> Stan522 Tue, 03/27/2018 - 14:08 Permalink
Isn't selling advertising their business model? Don't they collect personal data so they can target market advertising? Don't they bury "opt-in consent" deep inside their user agreements that nobody reads? Haven't they published their methods which have been known for years?
Why is all this such a surprise?
Oh! I get it now. All that was perfectly fine until Trump became POTUS.
It is the absolute right of the State to supervise the formation of public opinion.
- Joseph Goebbelsyrad -> tmosley Tue, 03/27/2018 - 14:10 Permalink
Really amazing to see it all laid out in front of you like that. Wonder if my "deletions" actually got rid of the data?
I'm gonna tape my cell phone to a donkey's nutsack in Afghanistan and let Google run wild!Automatic Choke -> Leakanthrophy Tue, 03/27/2018 - 14:52 Permalink
californiagirl -> SilverDOG Tue, 03/27/2018 - 15:07 Permalink
All right - I'm gonna fess up....I use facebook. I know we all bash on it, and everybody here claims to have never used it, but probably half of you are lying. I have never loaded the facebook ap on my android, and don't play games. (I also don't post pictures of my breakfast....I use it for a few very good groups that share information about hiking and such, and I post a lot of photos of my hikes, sort of like in the old days when you'd invite friends over to show slides).
I downloaded the info zipfile. Yes, it was huge, yes it had every photo and every comment I've ever made on facebook, and yes, they even stored all the messages I send and receive through facebook. But so what, I wasn't surprised by that.... No, they did not have records of my phone calls or phone-text-messages, or any other information that I hadn't given them. So - if you are judicious in what you share, and expect that everything you put on line is fully public (in spite of promises), you are likely ok.
Wow - even split on up/down votes. I didn't think I actually said anything controversial, not sure what the downvotes are for....
I'll add a bit more. In my opinion, facebook is like a fairly boring 24/7 cocktail party. Everybody is jabbering and only half-aware, and it goes on far too long. The best thing to do in a cocktail party is to find somebody who i've been wanting to talk to anyhow, and sit and talk with them. Facebook can serve the same purpose. ALSO - I avoid all the political ranting on facebook....I find it to be inappropriate...leave that for...er...zerohedge. My daddy taught me long ago that you don't discuss religion or politics at a cocktail party, and he was right, so I don't discuss either on facebook.Delving Eye -> californiagirl Tue, 03/27/2018 - 15:15 Permalink
You forgot to mention Apple. Pretty sure they are doing the same. FB has info on everyone unless you have never communicated with a FB user. Same with Google.thisandthat -> Delving Eye Tue, 03/27/2018 - 17:09 Permalink
Why the fuck anybody is on Facebook is beyond me. I value my privacy, which is why I use an avatar and phony name for my relatively small online footprint. Most people don't do that. They seem to want to spill their guts to any and all, as if that gives their life meaning. Idiotic.Tarzan -> thisandthat Tue, 03/27/2018 - 19:24 Permalink
1. This is known for YEARS;
2. My google "archive" (24 "products", because 'services' is so passé now...) amounts to the grand total of...
...a "whooping" less than 1 MB -- 604 kB (uncompressed), tbe! LolCreative_Destruct -> Tarzan Tue, 03/27/2018 - 22:18 Permalink
When Google does it, the Government is doing itCrawdaddy -> Tarzan Tue, 03/27/2018 - 22:34 Permalink
All this such a surprise? NO. Shouldn't be. It's part of their business model and has been since inception. It's been staring everyone in the face all along.
Most of the sheeple have played right into it. I can remember when a typical American's attitude toward attempts to get even the most benign personal info was "none of your damn business." Now everyone shares all of their private lives in massive public view, hoping for a "hit" of attention to satisfy cravings brought on by their Social Validation Addiction.Lorca's Novena -> thisandthat Tue, 03/27/2018 - 22:07 Permalink
zactly - same goes for the rest of the social media top dogs which are really just shadow guv front companies. That is how they got to be top dogs - playin ball with da man.
Da Man: "You job is to be our front man and we'll fund you until we bust our all the legit competition. Then we'll tell our 98% owned media to endlessly tout you as a genius. "
Da bitches : "Der...Ok"
Proof? All those "titans" of industry that magically survived years of burning cash somehow managed to avoid "the hidden hand of the market." Now the fuckers stand atop the "capitalist" system and lecture us about how to run a company. Yeah right. Fuckem.bitzager -> Delving Eye Tue, 03/27/2018 - 17:30 Permalink
Easy kiddo....30 products.... Im sure theres a few here with much less than us.Yogizuna -> Delving Eye Tue, 03/27/2018 - 19:10 Permalink
" Why the fuck anybody is on Facebook is beyond me"
Wrong conclusion, I would rather say:
"Why is the fuck anybody would use real info anywhere online is beyond me." unless it's really necessary: like for banking or trading accounts..Black-Man -> Delving Eye Tue, 03/27/2018 - 20:57 Permalink
It can help people though. For example, when my friends go through the passing of a loved one, human or pet, the feedback can help ease the pain, and I have seen that numerous times in the last 8 years. Since 2010 I have had 6 pets pass away, and "spilling my guts" and getting feedback did help ease the pain. So there are positive aspects to it also. And like with most things in life, moderate usage is best.RabbitOne -> californiagirl Tue, 03/27/2018 - 21:29 Permalink
It's the younger generation who completely trusts the FBI, CIA and NSA along w/ Google and FB. Like there is any difference.Spitball -> Automatic Choke Tue, 03/27/2018 - 15:31 Permalink
Facebook is Santa Claus!
It sees you when you're sleeping,
It knows when you're awake
It set you up to be data-mined
And it knows just what to take!
You better watch out
You better not cry
Better not pout
I'm telling you why
Zuckerberg will harvest your town!
He sees you when you're sleeping
He knows when you're awake
He knows if you've been bad or good,
So jail Zuck 'fore it's too late!Justin Case -> Spitball Tue, 03/27/2018 - 16:18 Permalink
Used the wife"s account a couple of times for the marketplace part of it. As for anything else, NO I don't have an account, nor plan on every making one.
Google, that's a different story. Used it quite extensively, although I'm starting to move away from it slowly.
As far as search engines, google is king. DuckDuckGo.com is my alternative with Firefox as the browser.
Need to ditch Microsoft operating system soon also. Something about giving away Windows 10 felt like Microsoft's in bed with government spying. The automatic updates blow.HilbertSpace -> Spitball Tue, 03/27/2018 - 16:42 Permalink
I've done a lot of hardening, and extensive work on the registry, services and task manager for windows 10. I also use "Windows Firewall Control". Nice program. Catches all connection attempts to internet and a log file so you can see what is connecting and what address and port. The program is an interface for the system firewall. Cortana, explorer, all microsoft office applications, error reporting, back ground task host are the busiest trying to connect. Some exe files that I've deleted, show up again, so now I just block the connection for the.
Windows 7 has telemetry and also patches that install telemetry during updates.
Got Google Chrome? Get rid of it. FireFox is better and Tor Browser even better.Bigly -> HilbertSpace Tue, 03/27/2018 - 17:46 Permalink
I second your comments. I've never used Facebook, but Google has invaded everything. I'm working on getting de-googled, particularly after their recent youtube BS, but that is a tough.
In some cases the alternatives are good. Protonmail is excellent and affordable. Signal is a great messenger app.
Opera with scriptsafe and ghostery works well. On a home PC you can use install a good linux distro in a virtual PC and browse through a VPN (Torguard takes crypto as does Primary Internet Access). But I'm still using gdrive (gestapo drive as I like to call all google stuff) because alternatives aren't as good and probably have the same privacy issues.
The real problem is with the smartphone. Unless you are going to go flip phone, you are freaking screwed. Those things suck up your whole life, and if you have an android phone, google play services is basically big brothering all your apps. I'd be highly surprised if our phones aren't logging EVERYTHING that is typed into the virtual keyboard.ZD1 -> HilbertSpace Tue, 03/27/2018 - 17:58 Permalink
Going back to the old clamshell. Smartphones will just get worse, if that's possible....Justin Case -> HilbertSpace Tue, 03/27/2018 - 18:24 Permalink
Brave browser blocks ads and trackers
https://brave.com/Brazen Heist -> HilbertSpace Tue, 03/27/2018 - 19:11 Permalink
A co-worker went on vacation and I showed him a site where he could see his trail in DC, places he went. He acknowledged that is exactly the places he visited. Red lines on a map with his travels.Too funny.Yogizuna -> HilbertSpace Tue, 03/27/2018 - 19:18 Permalink
Take my advice and delete ghostery. It is compromised. And Adblock Plus is too memory intensive. Get uBlock instead and adguard and customize the filters. Much more lightweight and gets the job done.
Nothing but "flip phones" for me since 2008.Laowei Gweilo -> Automatic Choke Tue, 03/27/2018 - 16:13 Permalink
GeoffreyT -> Automatic Choke Tue, 03/27/2018 - 16:49 Permalink
pretty much. i used it, and I'm OK with the risk of this. it's a free website that needs to make money.
use it at your own risk. (e.g. have never used my real name associated with any of those accounts; I never use them to instant message; I have a rule that I never ever use an 'app within an app' if an app interests me I'll download the direct .exe for a different laptop or device (that doesn't have any Google or FB account on it). other small things, that -- sure i'm sure they probably suspect my name and track some info -- but it's mostly pointless shit. especially no app or chat histories tho.
the real idiots are the people mad about this. not Zuck. of course Zuck is gonna Zuck or Google is gonna Google.
p.s. the fact that Twitter thread is 'news' (despite being known for years) shows just how blind and stupid people are.
p.s.s. and to be fair there are some benefits to some of those features. the geo-location stuff can be nefarious, but it also makes searching for local businesses a lot easier, and provides security (e.g. it's helpful that Google knows you always log-in from a certain State cuz then it can block a log-in attempt from Nigeria). again. not saying it's WORTH IT (Don't like it, don't use it) but there is a practical reason for it too.valjoux7750 -> Automatic Choke Tue, 03/27/2018 - 17:26 Permalink
You are ignoring the venality of the sorts of people who will attempt to exploit this information (governments, insurers, real estate agents, HR fucktards - the whole shebang of parasites and ticket-clippers... who are almost entirely made up of C-students).
And you're ignoring Richelieu's maxim:
Give me six lines written by the most honest man: in them, I will find something with which to hang himDaBard51 -> Automatic Choke Tue, 03/27/2018 - 18:56 Permalink
I have an account that I mainly use for finding parts for my car of which there are less than 33k of here in the US. It's Australian.Flatchestynerdette -> Automatic Choke Tue, 03/27/2018 - 22:46 Permalink
Look up who invented "cookies". Andreesen & James Clark, Netscape. http://www.governingwithcode.org/case_studies/pdf/Cookies.pdf
When nine hundred years old you become, look this good you will not.californiagirl -> Leakanthrophy Tue, 03/27/2018 - 14:53 Permalink
I still have my flip phone so I can't received texts, can't google to find anything & have to call 411 to get a number.
I too have Facebook but its on an old windows 7 computer that I also go to just for a group, similar to you but I've never posted a personal picture. Even my kittykat that I had at one time as my icon is one that I've got from bing.com images. Its close enough.
As for Google? They're a search engine. They have your IP address. Of course they're going to keep track of everything you do from that IP address/phone number if you use it. And before bing.com outsourced their search to Google they were a Microsoft search engine. Guess they got lazy. When they did so I went to DuckDuckGo and Yahoo. I know you can't do that on the android phone because its almost hardwired in for Google so the only advice I can give is go back to the flip phone if you want any privacy because sadly....
Google will go out of business selling your information before it never sells your information & then the government will come in and declare Google too big to fail with all that info & sweep it into the NSA late one Friday night while everyone is watching a version of Stormy & her 2 sistersThanksChump -> californiagirl Tue, 03/27/2018 - 16:13 Permalink
Some of you don't get it. If you communicated with a Facebook or Google user, they got all your communications as well. And they probably have Hillary's deleted emails. And if you have a Smart TV, they can watch and listen to you and your kids.californiagirl -> ThanksChump Tue, 03/27/2018 - 16:21 Permalink
No. If you communicate with a Facebook user, then FB has your email address or your phone number . That's not "all your communications". Not your contacts, not your other email addresses, not your other phone numbers.
Don't get me wrong: that's more than I want them to have, but it ain't much in the grand scheme of things.zvzzt -> californiagirl Tue, 03/27/2018 - 16:59 Permalink
You forgot to mention that they have the text of your communications. I never said they had everything if you did not have an account. I don't have Facebook, but family members and family do. They have posted photos and I have communicated via text, email and phone. They have those text messages and emails, and any photos I texted and emailed, even though I never clicked a little box to consent to their terms.Joe Davola -> tmosley Tue, 03/27/2018 - 14:14 Permalink
just did some digging here myself. What I found: minimally 8 Gb of data of all sorts. As a footnote:
I don't have/use: android phone, smart tv, whatsapp/other messenger, almost always use hooktube instead of youtube, VPN, mostly protonmail (especially for personal info), no 'social' media hardly ever login via 'social/google account (hand full of exceptions).
I was a bit surprised they had this much (and kept that much (even though have been a long time skeptic of them)).ejmoosa -> Joe Davola Tue, 03/27/2018 - 14:22 Permalink
tmosley - I'm gonna guess "deletion" doesn't really get rid of the data. Should have asked for it to be wiped with a cloth. Posting all the stuff facebook collected about one's self on twitter - did he do that just to be sure everyone everywhere had seen his laundry.tmosley -> ejmoosa Tue, 03/27/2018 - 14:31 Permalink
Deletion just means YOU no longer have access to it.
I'm sure they will find backups "on accident" when it is convenient. But such a day may not come. I don't think either company is long for this world.
Mar 27, 2018 | www.zerohedge.comAuthored by Mark Jeftovich via EasyDNS.com,
In 1994, Wired magazine ran a short story entitled "Hack the spew" . This was back when Wired was actually cutting edge and not the insufferable Silicon Valley stroke job it became after Conde Naste acquired it. In it our antihero "Stark" finds himself inexplicably recruited as a kind of data scout, looking for viable consumer trends emerging from the fully immersive, all encompassing data field known as "The Spew".
"When a schmo buys something on the I-way it goes into his Profile, and if it happens to be something that he recently saw advertised there, we call that interesting, and when he uses the I-way to phone his friends and family, we Profile Auditors can navigate his social web out to a gazillion fractal iterations, the friends of his friends of his friends of his friends, what they buy and what they watch and if there's a correlation."
The Spew of course, was the near future analogy of where the internet was headed, and when I went looking to link to it for this post, the piece turned out to be written by none other than Neal Stephenson. That means I read "Hack The Spew" and it made an impression on me before I even knew who Stephenson was or perhaps was on his way to becoming. Few would argue that Stephenson has a gift for seeing the general ambience of our oncoming future. Cryptonomicon uncannily anticipated the impetus toward crypto-currencies; the current systemic dysfunction of national sovereignty worldwide was foretold in Snow Crash; so it follows that all this will likely culminate in something that resembles The Diamond Age .
Today, "The Spew" is not equivalent to the Internet itself, but it is more accurately analogous to say the social media platforms like Facebook, Twitter, especially when combined with the twin monopolies of Google and Amazon, collectively are: The Spew.
It is like a global garbage pile of digital flotsam and jetsam, over which peasants scurry around and scour, looking for some morsel here, a crumb there, which can be monetized. If a trend or a trait is detected, even better. Those can be aggregated, syndicated, federated, even rehypothecated and at scale that can yield staggering financial payoffs and perhaps, even steer the course the history.
At least that's the narrative since the Cambridge Analytica scandal blew up in Facebook's face. After a long string of successive privacy fails (a.k.a a pattern of abuse?) this time feels different, as if the chickens are finally coming home to roost for Facebook.Cambridge Analytica is not uniqueEver heard of Kareem Serageldin? Probably not.
To date, he is the only banker to have been sent to prison in connection with the 2008–2009 Global Financial Crisis for his role in issuing fraudulent mortgage-backed securities (at least outside of Iceland ). To be sure, he was a fall guy, a token sacrifice to demonstrate contrition for what was a systemic, institutionalized effort to inflate a bubble whose implosion nearly crashed the entire global financial system.
In this case while Facebook attempted to throw water on this crisis by ceremonially banishing Cambridge Analytica from its system, the longstanding pattern of abuse remains, and is perhaps now, finally, awareness of that is reaching critical mass with the public:
- Facebook scraped your call data from Android phones for years (iPhone's are also vulnerable to privacy intrusions, see below).
- Facebook enables features such as "racial profiling" to advertisers
- Election rigging? Facebook approached major Australian political parties to micro target voters in 2016 election (the Liberals turned them down, Labour took them up)
- And while there were key differences in the way data was used , (not to mention more informed consent) the 2012 Obama re-election campaign used the same data mining features and accessed the same data as the Cambridge Analytica app
- In fact it may be veritably baked into their ecosystem to such a degree that it is almost impossible to develop and create an app on Facebook that doesn't harvest your data
Mark Zuckerberg has issued yet another "Mea Culpa" on CNN, and Facebook will take out full page ads in newspapers to apologize to the public. Yet, by now, "Groveling Zuckerberg apologies" are just part of the Facebook playbook, as Liz Gannes observed back in 2011, after Facebook had just settled with the US Federal Trade Commission over still more privacy violations:
"At this point, Facebook CEO Mark Zuckerberg's pattern on privacy is clear. Launch new stuff that pushes the boundaries of what people consider comfortable. Apologize and assure users that they control their information, but rarely pull back entirely, and usually reintroduce similar features at a later date when people seem more ready for it."
It becomes clear, as Futurist (and easyDNS member) Jesse Hirsh made this point on Steve Pakin's "The Agenda" over the weekend: "Facebook ships with all privacy enhanced settings disabled" -- further, my personal findings are that they use obfuscation to make it harder to disable data sharing settings. You have to jump through hoops to do it.
https://players.brightcove.net/18140038001/HJR5gvfVf_default/index.html?videoId=5757277106001Should you #deleteFacebook?
WhatsApp founder Brian Acton, who became a billionaire when Facebook bought his company hasn't let that dissuade him from telling the world what he thinks of all this:
Should you? Should easyDNS? Here's my take on it:If you are a business: keep your page but don't be reliant on it
There is a difference between a business who uses Facebook as an antennae to provide additional ways to stay in touch with customers and those whose business model is completely dependent on Facebook. We started our Facebook page when we were pulled into the Wikileaks Crisis as a way to stay in touch with our customers while that entire fiasco played out. We maintain it today for the same reason, and people do frequently contact us through that page looking for support.
But some businesses are completely reliant on Facebook to survive. I subscribe to James Schramko's Superfast Business Podcast . A recent episode had the founder of Dogtington Pos t on it, a site I frequented myself in my early days of being a dog owner (our family Husky).
You have to credit the guy with dominating his niche but I couldn't help wondering what would happen to his business if something substantial changed at Facebook, or if some of his readers would feel "used" if they understood some of the myriad tactics some of these sites routinely use, via Facebook, to drive their own affiliate revenues.
It brings to mind 2 things:
- My late friend and one of the original easyDNS customers Atul Chitnis who was among the first to observe "if you're not paying for the product, you are the product"
- My own maxim, which I introduced in the Guerrilla Capitalism Overview that there are two kinds of companies, those that feed on customer ignorance compared to those who prosper via customer savvy . I think it is obvious to all, at least now, that Facebook needs customer ignorance to survive.
(Or as Zuck eloquently observed it back in his dormroom days)YMMV on your personal pages
I read a long time ago "don't put anything on the internet that you wouldn't want to read in the newspapers the next day", and that has served me well as a guide over the years.
My basic assumption is that everything I post to Facebook, including "private" messages are wide open, being harvested, data mined, aggregated, used to target and retarget ads to me, build a profile and otherwise compile a comprehensive dossier, even stuff I've "deleted". (If you've ever watched "Terms and Conditions May Apply" you'll know that Facebook actually keeps the stuff you "delete").
So I never say anything on Facebook or put anything on there that is remotely confidential or proprietary. It's strictly a water cooler. I like it because it enabled me to reconnect with various groups of my friends and peers over the years, from the kids I grew up and went to high school with in Galt, Ontario to the misfits from the London underground music scene in college, to the tech entrepreneurs from the mid-90's on.
Would I use it to send anything to anybody that I found myself hoping that it's never going to leak or be used against me? Uh, no. That would be terribly naive.
So to that end, I'll probably keep my personal Facebook page, even though I sometimes catch myself spending too much time arguing stupid pointless crap (like politics) with people I'd otherwise never associate with. But that's a self-discipline issue, not a data soveriengty issue (although it is now also common knowledg e that Facebook deliberately codes the platform itself to be as addictive as possible)
All that saidAt least #deleteFacebook from your mobile devices
Facebook harvests your contact lists from your mobile devices (don't believe me, go here )
There are people in that list that I do not know. There are phone numbers from people who work for my competitors in there. My daughter's (age 11) cell phone number is in there.
You can "delete" all this here : (but as you know Facebook never actually deletes anything).
Then when you go to "delete" all your contacts you get a message
"We won't be able to tell you when your friends start using Messenger if you delete all your uploaded contact info."
They say that like it's a bad thing. But there is also this curious sentence:
"If you have Continuous Uploading turned on in the Messenger app, your contact info will be uploaded again the next time the app syncs with Facebook servers."
I had deleted the Facebook mobile app from my phone a long time ago. I kept messenger installed because sometimes customers would contact easyDNS or Zoneedit via our Facebook pages for support.
But Writing this I wanted to turn off "continuous uploading" in the app. Despite this Facebook help article not explaining how to do it, while this third party article from 2016 did.
It turned out I had already disabled continuous uploading but I was surprised to find that the messenger app had defaulted permission to access my phone's microphone.
After this exercise I simply deleted the Messenger app from my phone as well.Personal Data Sovereignty is an idea who's time has come
I think it would be safe to assume, that barring some widespread public pushback (such as the one happening right now), this is The New Normal.
People who may have been complacently oblivious to the fact that their social network was pimping them as mere data points are realizing that they don't like it as they have their faces rubbed in one data breach and privacy violation after another.
Given the outrages of Equifax, Facebook et al, we may have arrived at the crossroads and we may only get this choice once.
Do we push back and say "NO", I own my own data, I control who gets it and what happens with it. ?
Or, do we calm down after a few days, or weeks and then it's business as usual. Next year Zuck will apologize for some other new breach of trust ahead of his 2020 presidential bid, while us "shmoes" go ahead and vote for him.
SILVERGEDDON -> cossack55 Tue, 03/27/2018 - 19:03 PermalinkJimbeau Tue, 03/27/2018 - 18:59 Permalink
Don't delete it - just post a bunch of shit house rat bastard crazy stuff on it that makes no sense.
If that don't fuck up their algos and fuck over their validity as a user data seller, try harder.
Doesn't the entity we fear most already have access to all our data? Who is it that we think we are hiding anything from? Just don't be stupid and put any new sensitive info out there, anywhere, if you don't have to... but worrying about the info the the govt already has on you? What would be the point?
Mar 27, 2018 | www.counterpunch.org
Many people who hate and fear Donald Trump feel that only political black magic or some form of trickery can explain his election as US President. They convince themselves that we are the victims of a dark conspiracy rather than that the world we live in is changing, and changing for the worse.
Cambridge Analytica has now joined Russia at the top of a list of conspirators who may have helped Trump defeat Hillary Clinton in 2016. This is satisfactory for Democrats as it shows that they ought to have won, and delegitimises Trump's mandate.
In the Russian and Cambridge Analytica scandals, dodgy characters abound who claim to have a direct line to Putin or Trump, or to have secret information about political opponents or a unique method of swaying the voting intentions of millions of Americans. The most doubtful evidence is treated as credible.
The dossier by the former British intelligence officer Christopher Steele, about Trump's romps in Moscow, struck me when I first read it as hilarious but entirely unbelievable. The US media thought the same when this document was first being hawked around Washington before the election, and refused to publish it. It was only after Trump was elected that that they and the US security agencies claimed to find it in any way credible.
Much of what Cambridge Analytica claimed to be able to do for its clients has an exaggerated ring to it. As with the Steele dossier, several of the Cambridge Analytica documents are unintentionally funny, such as a letter from Aleksandr Kogan, the Russian-American academic researcher, suggesting that finding out if people used crossbows or believed in paganism would be useful traits on which to focus.
We are told that Facebook profiles of more than 50 million users have been "harvested" (a good menacing word in this context, suggesting that the poor old users are being chopped off at the ankles), and that information so garnered could be fed into the Trump campaign to put him over the top on election day. In reality, information gathered from such a large number of people is too generalised or too obvious to be of much use.
What is lacking in these scandals is much real evidence that Russian "meddling" or Cambridge Analytica "harvesting" – supposing all these tales are true – really did much to determine the outcome of the US election. Keep in mind that many very astute and experienced American politicians, backed by billions of dollars, regularly try and fail to decide who will hold political office in the US.
It simply is not very likely that the Kremlin – having shown extraordinary foresight in seeing that Trump stood a chance when nobody else did – was able to exercise significant influence on the US polls. Likewise, for all its bombastic sales pitch, Cambridge Analytica was really a very small player in the e-campaign.
The Russian "meddling" story (again, note the careful choice of words, because "meddling" avoids any claim that the Russian actions had any impact) and the Cambridge Analytica saga are essentially conspiracy theories. They may damage those targeted such as Trump, but they also do harm to his opponents because it means that they do not look deeply enough into the real reasons for their defeat in 2016, or do enough to prevent it happening again.
Since Clinton lost the election by less than 1 per cent of the vote in the crucial swing states of Wisconsin, Michigan and Pennsylvania, almost anything that happened in the campaign can be portrayed as decisive. But there are plenty of common-sense reasons for her defeat which are now being submerged and forgotten, as the Democrats and a largely sympathetic media look to Russian plots and such like to show that Trump won the election unfairly.
It is worth looking again at Hillary Clinton's run-for-office in 2016 to take a more rational view of why she unexpectedly lost. A good place to start is Shattered: Inside Hillary Clinton's Doomed Campaign , by the journalists Jonathan Allen and Amie Parnes, which was published a year ago and is based on interviews with senior campaign staffers.
Ironically, the Clinton campaign manager Robby Mook based his approach on a similar sort of analysis of vast quantities of data about voters that Cambridge Analytica claimed it could use to great effect.
Mook's conviction that this data was a sure guide to where to invest the Democrats' best efforts had disastrous consequences, even though Clinton outspent Trump by 2 to 1. For instance, she did not campaign in Wisconsin after winning the nomination, because her election team thought she was bound to win there. She put too little effort into campaigning in Michigan, though her weakness there was underlined there in March when she lost the primary to Bernie Sanders.
Traditional tools of electioneering such as polls and door-to-door canvassing were discounted by Mook, who was absorbed by his own analytical model of how the election was going. In major swing states, the book says that "he declined to use pollsters to track voter preferences in the final three weeks of the campaign".
Clinton carried a lot of political baggage because she had been demonised by the Republicans for 25 years. She had bad lluck, such the decision of the FBI director, James Comey, to send a letter to Congress about her emails two weeks before the election – but Trump somehow managed to survive even worse disasters, such as boasting of how he groped women.
Opponents of Trump tend to underestimate him because they are convinced that his faults are so evident that he will implode when the electorate find him out. Somehow they never do, or at least not those parts of the electorate which votes for him.
The very scandals that Trump's critics believe will sink him have enabled him dominate the news agenda in a way no American politician has ever done before. The New York Times and CNN may detest him, but they devote an extraordinary proportion of their news output to covering his every action.
The accusation that the Kremlin and companies like Cambridge Analytica put Trump in the White House may do him damage. But I suspect that the damage will mostly be among people who never liked him and would never vote for him.
Perhaps the one thing would have lost Trump the election is if his campaign had truly relied on Cambridge Analytica's data about the political proclivities of pagan crossbow enthusiasts.
Mar 27, 2018 | tech.slashdot.org
To corporate giants like Facebook, leaks to rivals or the media are a cardinal sin. That notion was clear in a new Wired story about Facebook's rocky time over the last two years. The story talks about how Facebook was able to find two leakers who told a Gizmodo reporter about its news operations. But one source for the Wired story highlighted just how concerned employees are about how their company goes after leakers. According to the story, the source, a current Facebook employee, asked a Wired reporter to turn off his phone so Facebook wouldn't be able to use location tracking and see that the two were close to each other for the meeting .
The Wired's 11,000-word wide-ranging piece , for which it spoke with more than 50 current and former Facebook employees, gives us an inside look at how the company has been struggling to curb spread of fake news; battling internal discrimination among employees; and becoming furious when anything leaks to the media. Another excerpt from the story:
The day after Fearnow (a contractor who leaked information to a Gizmodo reporter) took that second screenshot was a Friday. When he woke up after sleeping in, he noticed that he had about 30 meeting notifications from Facebook on his phone. When he replied to say it was his day off, he recalls, he was nonetheless asked to be available in 10 minutes. Soon he was on a video-conference with three Facebook employees, including Sonya Ahuja, the company's head of investigations. According to his recounting of the meeting, she asked him if he had been in touch with Nunez (the Gizmodo reporter, who eventually published this and this ).
He denied that he had been. Then she told him that she had their messages on Gchat, which Fearnow had assumed weren't accessible to Facebook. He was fired. "Please shut your laptop and don't reopen it," she instructed him.
Mar 27, 2018 | yro.slashdot.org
(reuters.com) did not adequately secure the informed consent of its users . From a report: The verdict, from a Berlin regional court, comes as Big Tech faces increasing scrutiny in Germany over its handling of sensitive personal data that enables it to micro-target online advertising. The Federation of German Consumer Organisations (vzvb) said that Facebook's default settings and some of its terms of service were in breach of consumer law, and that the court had found parts of the consent to data usage to be invalid. "Facebook hides default settings that are not privacy-friendly in its privacy center and does not provide sufficient information about it when users register," said Heiko Duenkel, litigation policy officer at the vzvb. "This does not meet the requirement for informed consent."
Mar 27, 2018 | tech.slashdot.org
(recode.net) BeauHD on Monday February 12, 2018 @09:20PM from the shifting-demographics dept. According to new estimates by eMarketer, Facebook users in the 12- to 17-year-old demographic declined by 9.9 percent in 2017 , or about 1.4 million total users. That's almost three times more than the digital measurement firm expected. There were roughly 12.1 million U.S. Facebook users in the 12- to 17-year-old demographic by the end of the year. Recode reports:
There are likely multiple reasons for the decline. Facebook has been losing its "cool" factor for years, and young people have more options than ever for staying in touch with friends and family. Facebook also serves as a digital record keeper -- but many young people don't seem to care about saving their life online, at least not publicly.
That explains why Snapchat and Instagram, which offer features for sharing photos and videos that disappear, are growing in popularity among this demographic. Overall, eMarketer found Facebook lost about 2.8 million U.S. users under 25 last year.
The research firm released Facebook usage estimates for 2018 on Monday, and expects that Facebook will lose about 2.1 million users in the U.S. under the age of 25 this year.
Mar 27, 2018 | tech.slashdot.org
(techcrunch.com) Onavo Protect, the VPN client from the data-security app maker acquired by Facebook back in 2013, has now popped up in the Facebook app itself, under the banner "Protect" in the navigation menu . Clicking through on "Protect" will redirect Facebook users to the "Onavo Protect -- VPN Security" app's listing on the App Store. We're currently seeing this option on iOS only, which may indicate it's more of a test than a full rollout here in the U.S. Marketing Onavo within Facebook itself could lead to a boost in users for the VPN app, which promises to warn users of malicious websites and keep information secure as you browse. But Facebook didn't buy Onavo for its security protections. Instead, Onavo's VPN allow Facebook to monitor user activity across apps, giving Facebook a big advantage in terms of spotting new trends across the larger mobile ecosystem. For example, Facebook gets an early heads up about apps that are becoming breakout hits; it can tell which are seeing slowing user growth; it sees which apps' new features appear to be resonating with their users, and much more. Further reading: Do Not, I Repeat, Do Not Download Onavo, Facebook's Vampiric VPN Service (Gizmodo).
Mar 27, 2018 | yro.slashdot.org
(theverge.com) BeauHD on Friday March 16, 2018 @11:30PM from the violation-of-terms dept. An anonymous reader quotes a report from The Verge: Facebook said late Friday that it had suspended Strategic Communication Laboratories (SCL), along with its political data analytics firm, Cambridge Analytica, for violating its policies around data collection and retention. The companies, which ran data operations for Donald Trump's 2016 presidential election campaign , are widely credited with helping Trump more effectively target voters on Facebook than his rival, Hillary Clinton. While the exact nature of their role remains somewhat mysterious, Facebook's disclosure suggests that the company improperly obtained user data that could have given it an unfair advantage in reaching voters . Facebook said it cannot determine whether or how the data in question could have been used in conjunction with election ad campaigns.
In a blog post, Facebook deputy general counsel Paul Grewal laid out how SCL came into possession of the user data. In 2015, Aleksandr Kogan, a psychology professor at the University of Cambridge, created an app named "thisisyourdigitallife" that promised to predict aspects of users' personalities. About 270,000 people downloaded it and logged in through Facebook, giving Kogan access to information about their city of residence, Facebook content they had liked, and information about their friends. Kogan passed the data to SCL and a man named Christopher Wylie from a data harvesting firm known as Eunoia Technologies, in violation of Facebook rules that prevent app developers from giving away or selling users' personal information. Facebook learned of the violation that year and removed his app from Facebook. It also asked Kogan and his associates to certify that they had destroyed the improperly collected data. Everyone said that they did. The suspension is not permanent, a Facebook spokesman said. But the suspended users would need to take unspecified steps to certify that they would comply with Facebook's terms of service.
Mar 27, 2018 | tech.slashdot.org
(theguardian.com) umafuckit shared this article from The Guardian: The data analytics firm that worked with Donald Trump's election team and the winning Brexit campaign harvested millions of Facebook profiles of U.S. voters , in one of the tech giant's biggest ever data breaches, and used them to build a powerful software program to predict and influence choices at the ballot box... Christopher Wylie, who worked with a Cambridge University academic to obtain the data, told the Observer : "We exploited Facebook to harvest millions of people's profiles . And built models to exploit what we knew about them and target their inner demons. That was the basis the entire company was built on."
Documents seen by the Observer , and confirmed by a Facebook statement, show that by late 2015 the company had found out that information had been harvested on an unprecedented scale . However, at the time it failed to alert users and took only limited steps to recover and secure the private information of more than 50 million individuals... On Friday, four days after the Observer sought comment for this story, but more than two years after the data breach was first reported, Facebook announced that it was suspending Cambridge Analytica and Kogan from the platform, pending further information over misuse of data. Separately, Facebook's external lawyers warned the Observer on Friday it was making "false and defamatory" allegations, and reserved Facebook's legal position...
The evidence Wylie supplied to U.K. and U.S. authorities includes a letter from Facebook's own lawyers sent to him in August 2016, asking him to destroy any data he held that had been collected by GSR, the company set up by Kogan to harvest the profiles... Facebook did not pursue a response when the letter initially went unanswered for weeks because Wylie was travelling, nor did it follow up with forensic checks on his computers or storage, he said. "That to me was the most astonishing thing. They waited two years and did absolutely nothing to check that the data was deleted. All they asked me to do was tick a box on a form and post it back."
Wylie worked with Aleksandr Kogan, the creator of the "thisisyourdigitallife" app, "who has previously unreported links to a Russian university and took Russian grants for research," according to the article. Kogan "had a licence from Facebook to collect profile data, but it was for research purposes only. So when he hoovered up information for the commercial venture, he was violating the company's terms...
"At the time, more than 50 million profiles represented around a third of active North American Facebook users, and nearly a quarter of potential U.S. voters."
Mar 27, 2018 | tech.slashdot.org
(theguardian.com) They had records of a screenshot he'd taken, links he had clicked or hovered over, and they strongly indicated they had accessed chats between him and the journalist, dating back to before he joined the company. "It's horrifying how much they know," he told the Guardian, on the condition of anonymity... "You get on their bad side and all of a sudden you are face to face with Mark Zuckerberg's secret police "... One European Facebook content moderator signed a contract, seen by the Guardian, which granted the company the right to monitor and record his social media activities, including his personal Facebook account, as well as emails, phone calls and internet use. He also agreed to random personal searches of his belongings including bags, briefcases and car while on company premises. Refusal to allow such searches would be treated as gross misconduct...
Some employees switch their phones off or hide them out of fear that their location is being tracked. One current Facebook employee who recently spoke to Wired asked the reporter to turn off his phone so the company would have a harder time tracking if it had been near the phones of anyone from Facebook. Two security researchers confirmed that this would be technically simple for Facebook to do if both people had the Facebook app on their phone and location services switched on. Even if location services aren't switched on, Facebook can infer someone's location from wifi access points.
The article cites a 2012 report that Microsoft read a French blogger's Hotmail account to identify a former employee who had leaked trade secrets . And it also reports that tech companies hire external agencies to surveil their employees. "One such firm, Pinkerton, counts Google and Facebook among its clients." Though Facebook and Google both deny this, "Among other services, Pinkerton offers to send investigators to coffee shops or restaurants near a company's campus to eavesdrop on employees' conversations...
Al Gidari, consulting director of privacy at the Stanford Center for Internet and Society, says that these tools "are common, widespread, intrusive and legal."
Mar 27, 2018 | yro.slashdot.org
(sfgate.com) BeauHD on Friday March 23, 2018 @08:50PM from the rough-week dept. Facebook has had a terrible week. Since it was revealed that political data firm Cambridge Analytica obtained information about 50 million Facebook users , the social media company has been in damage control mode, apologizing for its mistakes and conducting forensic audits to determine exactly what happened. SFGate reports today that Facebook " has been hit with four lawsuits in federal court in San Francisco and San Jose thus far this week." From the report: One lawsuit was filed by a Facebook user who claims the Menlo Park company acted with "absolute disregard" for her personal information after allegedly representing that it wouldn't disclose the data without permission or notice. That lawsuit, filed by Lauren Price of Maryland in San Jose on Tuesday, seeks to be a class action on behalf of up to 50 million people whose data was allegedly collected from Facebook by London-based Cambridge Analytica. The lawsuit says that during the 2016 election, Price was "frequently targeted with political ads while using Facebook." It seeks financial restitution for claims of unfair business practices and negligence. Both Facebook and Cambridge Analytica are named as defendants. Cambridge Analytica also announced today that the company will undergo an independent third-party audit to determine whether it still holds any data covertly obtained from Facebook users. "We take the disturbing recent allegations of unethical practices in our non-U.S. political business very seriously," CEO Alexander Tayler writes . "The Board has launched a full and independent investigation into SCL Elections' past practices, and its findings will be shared publicly."
UPDATE: Eighteen enforcement officers have entered the Cambridge Analytica headquarters in London's West End to search the premises after the data watchdog was granted a warrant to examine its records, reports The Guardian.
Mar 27, 2018 | yro.slashdot.org
(zdnet.com) BeauHD on Tuesday March 06, 2018 @08:20PM from the plot-twist dept. According to newly released documents by the Electronic Frontier Foundation, federal agents would pay Geek Squad employees to flag illegal materials on devices sent in by customers for repairs. "The relationship goes back at least ten years, according to documents released as a result of the lawsuit [ filed last year ]," reports ZDNet. "The agency's Louisville division aim was to maintain a 'close liaison' with Geek Squad management to 'glean case initiations and to support the division's Computer Intrusion and Cyber Crime programs.'" From the report: According to the EFF's analysis of the documents, FBI agents would "show up, review the images or video and determine whether they believe they are illegal content" and seize the device so an additional analysis could be carried out at a local FBI field office. That's when, in some cases, agents would try to obtain a search warrant to justify the access. The EFF's lawsuit was filed in response to a report that a Geek Squad employee was used as an informant by the FBI in the prosecution of child pornography case. The documents show that the FBI would regularly use Geek Squad employees as confidential human sources -- the agency's term for informants -- by taking calls from employees when they found something suspect.
Mar 27, 2018 | yro.slashdot.org
(theintercept.com) it could also help the cybersecurity community discover previously unknown threats . The Intercept: When the mysterious entity known as the " Shadow Brokers " released a tranche of stolen NSA hacking tools to the internet a year ago, most experts who studied the material honed in on the most potent tools, so-called zero-day exploits that could be used to install malware and take over machines. But a group of Hungarian security researchers spotted something else in the data, a collection of scripts and scanning tools the National Security Agency uses to detect other nation-state hackers on the machines it infects. It turns out those scripts and tools are just as interesting as the exploits. They show that in 2013 -- the year the NSA tools were believed to have been stolen by the Shadow Brokers -- the agency was tracking at least 45 different nation-state operations, known in the security community as Advanced Persistent Threats, or APTs. Some of these appear to be operations known by the broader security community -- but some may be threat actors and operations currently unknown to researchers.
The scripts and scanning tools dumped by Shadow Brokers and studied by the Hungarians were created by an NSA team known as Territorial Dispute, or TeDi. Intelligence sources told The Intercept the NSA established the team after hackers, believed to be from China, stole designs for the military's Joint Strike Fighter plane, along with other sensitive data, from U.S. defense contractors in 2007; the team was supposed to detect and counter sophisticated nation-state attackers more quickly, when they first began to emerge online. "As opposed to the U.S. only finding out in five years that everything was stolen, their goal was to try to figure out when it was being stolen in real time," one intelligence source told The Intercept. But their mission evolved to also provide situational awareness for NSA hackers to help them know when other nation-state actors are in machines they're trying to hack.
Mar 27, 2018 | tech.slashdot.org
(medium.com) Onavo Protect , a newly released VPN service from Facebook : I found that Onavo Protect uses a Packet Tunnel Provider app extension, which should consistently run for as long as the VPN is connected, in order to periodically send the following data to Facebook (graph.facebook.com) as the user goes about their day:
When user's mobile device screen is turned on and turned off.
Total daily Wi-Fi data usage in bytes (Even when VPN is turned off).
Total daily cellular data usage in bytes (Even when VPN is turned off).
Periodic beacon containing an "uptime" to indicate how long the VPN has been connected.
Mar 27, 2018 | slashdot.org
(theguardian.com) but behind the cartoonish facade is a ruthless code of secrecy . From a report: They rely on a combination of Kool-Aid, digital and physical surveillance, legal threats and restricted stock units to prevent and detect intellectual property theft and other criminal activity. However, those same tools are also used to catch employees and contractors who talk publicly, even if it's about their working conditions, misconduct or cultural challenges within the company. While Apple's culture of secrecy, which includes making employees sign project-specific NDAs and covering unlaunched products with black cloths, has been widely reported, companies such as Google and Facebook have long put the emphasis on internal transparency.
Zuckerberg hosts weekly meetings where he shares details of unreleased new products and strategies in front of thousands of employees. Even junior staff members and contractors can see what other teams are working on by looking at one of many of the groups on the company's internal version of Facebook. "When you first get to Facebook you are shocked at the level of transparency. You are trusted with a lot of stuff you don't need access to," said Evans, adding that during his induction he was warned not to look at ex-partners' Facebook accounts.
Mar 27, 2018 | tech.slashdot.org
(businessinsider.com) reported this week , speaks volumes of Facebook's core beliefs. Sample this except from Business Insider : Facebook executives waded into a firestorm of criticism on Saturday, after news reports revealed that a data firm with ties to the Trump campaign harvested private information from millions of Facebook users. Several executives took to Twitter to insist that the data leak was not technically a "breach." But critics were outraged by the response and accused the company of playing semantics and missing the point. Washington Post reporter Hamza Shaban: Facebook insists that the Cambridge Analytica debacle wasn't a data breach, but a "violation" by a third party app that abused user data. This offloading of responsibility says a lot about Facebook's approach to our privacy. Observer reporter Carole Cadwalladr, who broke the news about Cambridge Analytica: Yesterday Facebook threatened to sue us. Today we publish this. Meet the whistleblower blowing the lid off Facebook and Cambridge Analytica. [...] Facebook's chief strategy officer wading in. So, tell us @alexstamos (who expressed his displeasure with the use of "breach" in media reports) why didn't you inform users of this "non-breach" after The Guardian first reported the story in December 2015? Zeynep Tufekci: If your business is building a massive surveillance machinery, the data will eventually be used and misused. Hacked, breached, leaked, pilfered, conned, "targeted", "engaged", "profiled", sold.. There is no informed consent because it's not possible to reasonably inform or consent. [...] Facebook's defense that Cambridge Analytica harvesting of FB user data from millions is not technically a "breach" is a more profound and damning statement of what's wrong with Facebook's business model than a "breach." MIT Professor Dean Eckles: Definitely fascinating that Joseph Chancellor, who contributed to collection and contract-violating retention (?) of Facebook user data, now works for Facebook. Amir Efrati, a reporter at the Information: May seem like a small thing to non-reporters but Facebook loses credibility by issuing a Friday night press release to "front-run" publications that were set to publish negative articles about its platform. If you want us to become more suspicious, mission accomplished. Further reading: Facebook's latest privacy debacle stirs up more regulatory interest from lawmakers (TechCrunch).
Mar 27, 2018 | yro.slashdot.org
(arstechnica.com) BeauHD on Sunday March 25, 2018 @10:34AM from the book-of-secrets dept. An anonymous reader quotes a report from Ars Technica: This past week, a New Zealand man was looking through the data Facebook had collected from him in an archive he had pulled down from the social networking site. While scanning the information Facebook had stored about his contacts, Dylan McKay discovered something distressing: Facebook also had about two years worth of phone call metadata from his Android phone , including names, phone numbers, and the length of each call made or received. This experience has been shared by a number of other Facebook users who spoke with Ars, as well as independently by us -- my own Facebook data archive, I found, contained call-log data for a certain Android device I used in 2015 and 2016, along with SMS and MMS message metadata. In response to an email inquiry about this data gathering by Ars, a Facebook spokesperson replied, "The most important part of apps and services that help you make connections is to make it easy to find the people you want to connect with. So, the first time you sign in on your phone to a messaging or social app, it's a widely used practice to begin by uploading your phone contacts." The spokesperson pointed out that contact uploading is optional and installation of the application explicitly requests permission to access contacts. And users can delete contact data from their profiles using a tool accessible via Web browser.
If you granted permission to read contacts during Facebook's installation on Android a few versions ago -- specifically before Android 4.1 (Jelly Bean) -- that permission also granted Facebook access to call and message logs by default. The permission structure was changed in the Android API in version 16. But Android applications could bypass this change if they were written to earlier versions of the API, so Facebook API could continue to gain access to call and SMS data by specifying an earlier Android SDK version. Google deprecated version 4.0 of the Android API in October 2017 -- the point at which the latest call metadata in Facebook user's data was found. Apple iOS has never allowed silent access to call data. You are able to have Facebook delete the data it collects from you, "but it's not clear if this deletes just contacts or if it also purges call and SMS metadata," reports Ars. Generally speaking, if you're concerned about privacy, you shouldn't share your contacts and call-log data with any mobile application.
Mar 26, 2018 | www.veteranstoday.comNow we know they not only kept files on 50 million Americans through Facebook, using the data there to profile fears and emotions, targeting and manipulating millions but when Google added their incredible mass of data, billions of illegally read emails and more, the American people became little more than pawns.
Again we reiterate, Russia didn't do it. It was the tech companies, all working as is now being made public, for Israeli intelligence and the mob. From the Daily Beast, March 20, 2018 by Jamie Ross:
"Facebook has been plunged into crisis over the allegations that Cambridge Analytica misused data from more than 50 million people to help elect Donald Trump. Nearly $40 billion was wiped off Facebook's market value Monday, an emergency meeting is due to be held Tuesday morning, and CEO Mark Zuckerberg has been criticized for remaining silent during what some analysts are describing as a threat to the company's existence.
Zuckerberg has been summoned to the British parliament to give evidence about the how it handles people's personal data. The head of a British inquiry into 'fake news,' Damian Collins, has accused Facebook of previously 'misleading' a parliament committee, adding: 'It is now time to hear from a senior Facebook executive with the sufficient authority to give an accurate account of this catastrophic failure of process.'"
What is being left out is more telling, that Zuckerberg, CEO and founder of Facebook, has long openly worked for Israeli intelligence and that evidence now exists that Israel not only ran the program to rig the American election, as many believe it did in both 2000 and 2004, leading to the destruction of Iraq, but that it did so again in 2016.
Few note the real policies of former Secretary of State Kerry and President Obama, the even handedness in the Middle East and their use of leverage against Israel. Obama never accepted wild claims made against Syria as Trump has and never attacked Damscus.
Evidence of Israel's role in gas attacks in Syria was overwhelming even though Russia was blocked from presenting same to the United Nations time and time again.
But then we hypothesize, what are we speaking of when we talk of Israel? This is where so many back off as anyone who questions Israel is smeared as an "anti-Semite" though the Likudist extremists who run that nation are mostly former Russian gangsters and enemies of Russia's current leadership.
The reason for what appears to be Israeli animosity toward Russia in reality originated when Putin cleaned out the oligarchs that looted Russia for two decades, plunging that nation into poverty and then fleeing to Tel Aviv or New York with endless billions of ill gotten gains. This is real history, not the history written down in books or reported in fake news.
More on happenings in London as reported by Jamie Ross:
"As anger grew toward Cambridge Analytica on Monday after Britain's Channel 4 broadcast a report showing company executives boasting about their extreme propaganda strategies, including filming opponents in compromising situations with Ukrainian sex workers, authorities in the U.K. and the U.S. also questioned whether Facebook mishandled the alleged breach and it's now facing damaging investigations that will further tarnish its brand.
Britain's information commissioner, Elizabeth Denham, confirmed she was applying to the courts for a warrant to search Cambridge Analytica's London offices and said Tuesday morning that she has been left frustrated by the company's reluctance to cooperate with her investigation.
[ Editor's Note : There appears to have been the classic "fix" in at the British Court by delaying for days the seizure of Cambridge's computer files, giving the needed time to remove any incriminating evidence Jim W. Dean ]
Fears have also been raised that the investigation may have been compromised by the presence of cybersecurity consultants from Stroz Friedberg -- the company hired by Facebook to audit Cambridge Analytica on its behalf -- who were in the London offices on Monday evening, until they were asked to leave by the information commissioner.
Asked if there was a risk of Cambridge Analytica or Facebook destroying evidence, Denham said on Sky News: "As this point we're not satisfied with the cooperation we're getting from Cambridge Analytica, so the next step is for us to apply to the court and to do an audit to get some answers as to whether data was misused and shared inappropriately."
British Parliament Culture Committee Chairman Damian Collins said:
'This is a matter for the authorities. Facebook sent in data analysts and lawyers who they appointed. What they intended to do there, who knows? The concern would have been, were they removing information or evidence which could have been vital to the investigation? It's right they stood down but it's astonishing they were there in the first place.'"
The issue now is one of accepting what is happening for all to see rather than absorbing the fake narrative sold the world. For those unaware, it isn't just millions of Americans but government officials as well, who form their opinions and prejudices against nations, races of people, religions and even ideas themselves.
The are imprinted via fictional television shows like Homeland , whose writers and producers are in actuality as complicit in psychological warfare as those who run Cambridge Analytical, Google or Facebook, the groups now under the public microscope.
As for Mueller and his investigation, it is pure theatre. As for Trump, more theatre as well, a buffoon long shown to be a mob asset, now wielding nukes and threatening the world, holding it hostage to his bad brain chemistry and his criminal handlers.
Gordon Duff is a Marine combat veteran of the Vietnam War that has worked on veterans and POW issues for decades and consulted with governments challenged by security issues. He's a senior editor and chairman of the board of Veterans Today, especially for the online magazine "New Eastern Outlook."
Mar 23, 2018 | www.counterpunch.orgIn the days and weeks following the 2016 presidential elections, reports surfaced about how a small British political consulting firm, Cambridge Analytica, might have played a pivotal role in Donald Trump's surprise victory. The company claimed to have formulated algorithms to influence American voters using individually targeted political advertisements. It reportedly generated personality profiles of millions of individual citizens by collecting up to 5000 data points on each person. Then Cambridge Analytica used these "psychographic" tools to send voters carefully crafted online messages about candidates or hot-button political issues.
Although political consultants have long used "microtargeting" techniques for zeroing in on particular ethnic, religious, age, or income groups, Cambridge Analytica's approach is unusual: The company relies upon individuals' personal data that is harvested from social media apps like Facebook. In the US, such activities are entirely legal. Some described Cambridge Analytica's tools as " mind-reading software " and a " weaponized AI [artificial intelligence] propaganda machine ." However, corporate media outlets such as CNN and the Wall Street Journal often portrayed the company in glowing terms.
Cambridge Analytica is once again in the headlines–but under somewhat different circumstances. Late last week, whistleblower Christopher Wylie went public , explaining how he played an instrumental role in collecting millions of Facebook profiles for Cambridge Analytica. This revelation is significant because until investigative journalist Carole Cadwalladr published her exposé in The Guardian , Cambridge Analytica's then-CEO Alexander Nix had adamantly denied using Facebook data. And although Facebook officials knew that Cambridge Analytica had previously gathered data on millions of users, they did not prohibit the company from advertising until last Friday, as the scandal erupted. To make matters worse, the UK's Channel 4 released undercover footage early this week in which Cambridge Analytica executives boast about using dirty tricks–bribes, entrapment, and "beautiful girls" to mention a few.
The case of Cambridge Analytica brings into focus a brave new world of electoral politics in an algorithmic age–an era in which social media companies like Facebook and Twitter make money by selling ads, but also by selling users' data outright to third parties. Relatively few countries have laws that prevent such practices–and it turns out that the US does not have a comprehensive federal statute protecting individuals' data privacy. This story is significant not only because it demonstrates what can happen when an unorthodox company takes advantage of a lax regulatory environment, but also because it reveals how Internet companies like Facebook have played fast and loose with the personal data of literally billions of users.
From Public Relations to Psychological Warfare
In order to make sense of Cambridge Analytica it is helpful to understand its parent company, SCL Group, which was originally created as the PR firm Strategic Communications Laboratory. It was founded in the early 1990s by Nigel Oakes , a flamboyant UK businessman. By the late 1990s, the company was engaged almost exclusively in political projects. For example, SCL was hired to help burnish the image of Indonesian president Abdurrahman Wahid–but Oakes and SCL employees had to shut down their operations center when SCL's cover was blown by the Wall Street Journal .
In July 2005, SCL underwent a dramatic transformation. It very publicly rebranded itself as a psychological warfare company by taking part in the UK's largest military trade show. SCL's exhibit included a mock operations center featuring dramatic crisis scenarios–a smallpox outbreak in London, a bloody insurgency in a fictitious South Asian country–which were then resolved with the help of the company's psyops techniques. Oakes told a reporter : "We used to be in the business of mindbending for political purposes, but now we are in the business of saving lives." The company's efforts paid off. Over the next ten years, SCL won contracts with the US Defense Department's Combatant Commands, NATO, and Sandia National Labs.
Over the past few years SCL–now known as SCL Group –has transformed itself yet again. It no longer defines itself as a psyops specialist, nor as a political consultancy–now, it calls itself a data analytics company specializing in "behavioral change" programs.
Along the way it created Cambridge Analytica, a subsidiary firm which differs from SCL Group in that it focuses primarily on political campaigns. Its largest investors include billionaire Robert Mercer, co-CEO of hedge fund Renaissance Technologies, who is best known for his advocacy of far-right political causes and his financial support of Breitbart News. Steve Bannon briefly sat on Cambridge Analytica's board of directors.
Cambridge Analytica first received significant media attention in November 2015, shortly after the firm was hired by Republican presidential nominee Ted Cruz's campaign. Although Cruz ultimately failed, Cambridge Analytica's CEO, Alexander Nix, claimed that Cruz's popularity grew largely due to the company's skillful use of aggregated voter data and personality profiling methods.
In August 2016, the Trump campaign hired Cambridge Analytica as part of a desperate effort to challenge Hillary Clinton's formidable campaign machine. Just a few months later, reports revealed that Cambridge Analytica had also played a role in the UK's successful pro-Brexit "Leave.EU" campaign.
Hacking the Citizenry
Cambridge Analytica relies upon "psychographic" techniques that measure the Big Five personality traits borrowed from social psychology: openness, conscientiousness, extroversion, agreeableness and neuroticism.
In the US, Cambridge Analytica developed psychological profiles of millions of Americans by hiring a company called Global Science Research (GSR) to plant free personality quizzes. Users were lured by the prospect of obtaining free personality scores, while Cambridge Analytica collected data–and access to users' Facebook profiles. Last week, The Guardian reported that Cambridge Analytica collected data from more than 300,000 Facebook users in this way. By agreeing to the terms and conditions of the app, those users also agreed to grant GSR (and by extension, Cambridge Analytica) access to the profiles of their Facebook "friends"–totalling approximately 50 million people.
Psychographics uses algorithms to scour voters' Facebook "likes," retweets and other social media data which are aggregated with commercially available information: land registries, automotive data, shopping preferences, club memberships, magazine subscriptions, and religious affiliation. When combined with public records, electoral rolls, and additional information purchased from data brokers such as Acxiom and Experian, Cambridge Analytica has raw material for shaping personality profiles. Digital footprints can be transformed into real people. This is the essence of psychographics: Using software algorithms to scour individual voters' Facebook "likes," retweets and other bits of data gleaned from social media and then combine them with commercially available personal information. Data mining is relatively easy in the US, since it has relatively weak privacy laws compared to South Korea, Singapore, and many EU countries.
In a 2016 presentation , Nix described how such information might be used to influence voter opinions on gun ownership and gun rights. Individual people can be addressed differently according to their personality profiles: "For a highly neurotic and conscientious audinece, the threat of a burglary–and the insurance policy of a gun. . .Conversely, for a closed and agreeable audience: people who care about tradition, and habits, and family."
Despite the ominous sounding nature of psychographics, it is not at all clear that Cambridge Analytica played a decisive role in the 2016 US presidential election. Some charge that the company and its former CEO Alexander Nix, exaggerated Cambridge Analytica's effect on the election's outcome. In February 2017, investigative journalist Kendall Taggart wrote an exposé claiming that more than a dozen former employees of Cambridge Analytica, Trump campaign staffers, and executives at Republican consulting firms denied that psychographics was used at all by the Trump campaign. Taggart concluded: "Rather than a sinister breakthrough in political technology, the Cambridge Analytica story appears to be part of the traditional contest among consultants on a winning political campaign to get their share of the credit–and win future clients." Not a single critic was willing to be identified in the report, apparently fearing retaliation from Robert Mercer and his daughter Rebekah, who is also an investor in the firm.
By no means has Cambridge Analytica limited its work to the US. In fact, it has conducted "influence operations" in several countries around the world.
For example, Cambridge Analytica played a major role in last year's presidential elections in Kenya, which pitted incumbent Uhuru Kenyatta of the right-wing Jubilee Party against Raila Odinga of the opposition Orange Democratic Movement. The Jubilee Party hired Cambridge Analytica in May 2017. Although the company claims to have limited its activities to data collection, earlier this week Mark Turnbull, a managing director for Cambridge Analytica, told undercover reporters a different story . He admitted that the firm secretly managed Kenyatta's entire campaign: "We have rebranded the party twice, written the manifesto, done research, analysis, messaging. I think we wrote all the speeches and we staged the whole thing–so just about every element of this candidate," said Turnbull.
Given the most recent revelations about Cambridge Analytica's planting of fake news stories , it seems likely that the company created persuasive personalized ads based on Kenyans' social media data. Fake Whatsapp and Twitter posts exploded days before the Kenyan elections. It is worth remembering that SCL Group has employed disinformation campaigns for military clients for 25 years, and it seems that Cambridge Analytica has continued this pattern of deception.
The August elections were fraught with accusations of vote tampering, the inclusion of dead people as registered voters, and the murder of Chris Msando , the election commission's technology manager, days before the election. When the dust settled, up to 67 people died in post-election violence–and Kenyatta ultimately emerged victorious. Weeks later, the Kenyan Supreme Court annulled the elections, but when new elections were scheduled for October, Odinga declared that he would boycott.
Given Kenya's recent history of electoral fraud, it is unlikely that Cambridge had much impact on the results. Anthropologist Paul Goldsmith , who has lived in Kenya for 40 years, notes that elections still tend to follow the principle of "who counts the votes," not "who influences the voters."
But the significance of Cambridge Analytica's efforts extends beyond their contribution to electoral outcomes. Kenya is no technological backwater. The world's first mobile money service was launched there in 2007, allowing users to transfer cash and make payments by phone. Homegrown tech firms are creating a "Silicon Savannah" near Nairobi. Two-thirds of Kenya's 48 million people have Internet access. Ten million use Whatsapp; six million use Facebook; two million use Twitter. As Kenyans spend more time in the virtual world, their personal data will become even more widely available since Kenya has no data protection laws.
Goldsmith summarizes the situation nicely:
Cambridge Analytica doesn't need to deliver votes so much as to create the perception that they can produce results. . .Kenya provides an ideal entry point into [Africa]. . .Embedding themselves with ruling elites presents a pivot for exploiting emergent commercial opportunities. . .with an eye on the region's resources and its growing numbers of persuadable youth.
Recent reports reveal that Cambridge Analytica has ongoing operations in Mexico and Brazil (which have general elections scheduled this July and October, respectively). India (which has general elections in about a year) has also been courted by the company, and it is easy to understand why: the country has 400 million smartphone users with more than 250 million on either Facebook or Whatsapp. India's elections are also a potential gold mine. More than half a billion people vote in parliamentary elections, and the expenditures are astonishing: Political parties spent $5 billion in 2014, compared to $6.5 billion in last year's US elections. India also has a massive mandatory ID program based on biometric and demographic data, the largest of its kind in the world.
Cambridge Analytica's global strategy appears focused on expanding its market share in promising markets. Although many people might describe Kenya, Mexico, Brazil, and India as developing countries, each in fact has a rapidly growing high-tech infrastructure, relatively high levels of Internet penetration, and large numbers of social media users. They all have weak or nonexistent Internet privacy laws. Though nominally democratic, each country is politically volatile and has experienced episodic outbursts of extreme political, sectarian, or criminal violence. Finally, these countries have relatively young populations, reflecting perhaps a long-term strategy to normalize a form of political communication that will reap long-term benefits in politically sensitive regions.
The capacity for saturating global voters with charged political messages is growing across much of the world, since the cost of buying Facebook ads, Twitterbots and trolls, bots for Whatsapp and other apps is cheap–and since more people than ever are spending time on social media. Such systems can be managed efficiently by remote control. Unlike the CIA's psyops efforts in the mid-20th century, which required extensive on-the-ground efforts–dropping leaflets from airplanes, bribing local journalists, broadcasting propaganda on megaphones mounted on cars–the new techniques can be deployed from a distance, with minimal cost. Cambridge Analytica relies upon small ground teams to do business with political parties, and partnerships with local business intelligence firms to scope out the competition or provide marketing advice, but most of the work is done from London and New York.
Weaponizing Big Data?
From its beginnings, Cambridge Analytica has declared itself to be a "data-driven" group of analytics experts practicing an improved form of political microtargeting, but there are indications that the firm has broader ambitions.
In March 2017, reports emerged that top executives from SCL Group met with Pentagon officials, including Hriar Cabayan, head of a branch which conducts DoD research and cultural analysis. A decade ago, Cabayan played an instrumental role in launching the precursor to the Human Terrain System , a US Army counterinsurgency effort which embedded anthropologists and other social scientists with US combat brigades in Iraq and Afghanistan.
A few months later, in August 2017, the Associated Press reported that retired US Army General Michael Flynn, who briefly served as National Security Director in the Trump administration, had signed a work agreement with Cambridge Analytica in late 2016, though it is unclear whether he actually did any work for the firm. Flynn pleaded guilty to lying to the FBI about his contacts with Russian operatives in late 2017, when he was working with Trump's transition team. Given his spot in the media limelight, it is easy to forget that he once headed US intelligence operations in Afghanistan, advocating for a big data approach to counterinsurgency that would, among other things, include data collected by Human Terrain Teams.
The connections between Cambridge Analytica/SCL Group and the Pentagon's champions of data-driven counterinsurgency and cyberwarfare may be entirely coincidental, but they do raise several questions: As Cambridge Analytica embarks on its global ventures, is it undertaking projects that are in fact more sinister than its benign-sounding mission of "behavioral change"? And are the company's recent projects in Kenya, India, Mexico, and Brazil simply examples of global market expansion, or are these countries serving as laboratories to test new methods of propaganda dissemination and political polarization for eventual deployment here at home?
Here the lines between military and civilian applications become blurred, not only because ARPANET–the Internet's immediate precursor–was developed by the Pentagon's Advanced Research Projects Agency, but also because the technology can be used for surveillance on a scale that authoritarian regimes of the 20th century could only have dreamed about. As Yasha Levine convincingly argues in his book Surveillance Valley: The Secret Military History of the Internet , the Internet was originally conceived as a counterinsurgency surveillance program.
Neutralizing Facebook's Surveillance Machine
It appears that many people are finally taking note of the digital elephant in the room: Facebook's role in enabling Cambridge Analytica and other propagandists, publicists, and mind-benders to carry out their work–legally and discreetly. As recently noted by Lorenzo Franceschi-Bicchierai in the online journal Motherboard , Cambridge Analytica's data harvesting practices weren't security breaches, they were "par for the course. . .It was a feature, not a bug. Facebook still collects -- and then sells -- massive amounts of data on its users." In other words, every Facebook post or tweet, every g-mail message sent or received, renders citizens vulnerable to forms of digital data collection that can be bought and sold to the highest bidder. The information can be used for all kinds of purposes in an unregulated market: monitoring users' emotional states, manipulating their attitiudes, or disseminating tailor-made propaganda designed to polarize people.
It is telling that Facebook stubbornly refuses to call Cambridge Analytica's actions a "data breach." As Zeynep Tufekci, author of the book Twitter And Tear Gas: The Power and Fragility of Networked Protest puts it, the company's defensive posture reveals much about the social costs of social media. She recently wrote :
"If your business is building a massive surveillance machinery, the data will eventually be used and misused. Hacked, breached, leaked, pilfered, conned, targeted, engaged, profiled, sold. There is no informed consent because it's not possible to reasonably inform or consent."
Cambridge Analytica is significant to the extent that it illuminates new technological controlling processes under construction. In a supercharged media environment in which Facebook, Twitter, and WhatsApp (owned by Facebook) have become the primary means by which literally billions of people consume news, mass producing propaganda has never been easier. With so many people posting so much information about the intimate details of their lives on the Web, coordinated attempts at mass persuasion will almost certainly become more widespread in the future.
In the meantime, there are concrete measures that we can take to rein in Facebook, Amazon, Google, Twitter, and other technology giants. Some of the most lucid suggestions have been articulated by Roger McNamee, a venture capitalist and early Facebook investor. He recommends a multi-pronged approach : demanding that the social media companies' CEOs testify before congressional and parliamentary committees in open sessions; imposing strict regulations on how Internet platforms are used and commercialized; requiring social media companies to report who is sponsoring political and issues-based advertisements; mandating transparency about algorithms ("users deserve to know why they see what they see in their news feeds and search results," says McNamee); requiring social media apps to offer an "opt out" to users; banning digital "bots" that impersonate humans; and creating rules that allow consumers (not corporations) to own their own data.
In a world of diminishing privacy, our vulnerabilities are easily magnified. Experimental psychologists specializing in what they euphemistically call "behavior design" have largely ignored ethics and morality in order to help Silicon Valley companies create digital devices, apps, and other technologies that are literally irresistible to their users. As the fallout from Cambridge Analytica's activities descends upon the American political landscape, we should take advantage of the opportunity to impose meaningful controls on Facebook, Google, Twitter, and other firms that have run roughshod over democratic norms–and notions of individual privacy–in the relentless pursuit of profit. Join the debate on Facebook More articles by: Roberto J. González
Roberto J. González is chair of the anthropology department at San José State University. He has written several books including American Counterinsurgency: Human Science and the Human Terrain and Militarizing Culture: Essays on the Warfare State . He can be reached at email@example.com .
Mar 25, 2018 | www.zerohedge.com
Tonight at 7pm ET/PT, 60 Minutes will air a controversial interview with Stephanie Clifford, aka Stormy Daniels, the adult-film star who says she had an affair with Donald Trump. Daniels will talk to Anderson Cooper about the relationship she says she had with Trump in 2006 and 2007, unveiling details that bring her story up to the present. It will be the first - and so far only - television interview in which she speaks about the alleged relationship.
The 60 Minutes interview will include an examination of the potential legal and political ramifications of the $130,000 payment that Trump's attorney Michael Cohen says he made to Daniels using his own funds. Daniels accepted the money in return for signing a confidentiality agreement, although she recently violated the CA, claiming Trump never signed it.
The president has denied having an affair with Daniels, while Trump's legal team - in this case led by Charles Harder who won a $140MM verdict for Hulk Hogan against Gawker - is seeking to move the case to federal court and claims that Stormy is liable for up to $20 million in damages. This in turn prompted Daniels to launch a crowdfunding campaign to fund her lawsuit against Trump, which at last check had raised over $290K .
Cooper conducted the interview earlier this month, shortly after Cohen obtained a temporary restraining order against Daniels. Meanwhile, Daniels is seeking a ruling that the confidentiality agreement between her and the president is invalid, in part because Mr. Trump never signed it. The president's attorneys are seeking to move the case to federal court and claim Daniels is liable for more than $20 million in damages for violations of the agreement.
On Thursday, the lawyer representing Daniels fired off a tweet with a picture of what appeared to be a compact disc in a safe - hinting that he has video or photographic evidence of Clifford's affair with President Trump.
"If 'a picture is worth a thousand words,' how many words is this worth?????" tweeted lawyer Michael Avenatti.
Avenatti has been a frequent guest on cable news as he promotes Stormy's upcoming 60 minutes tell-all about her alleged affair with President Trump. When CBS Evening News' Julianna Goldman asked Avenatti if he had photos, texts or videos of her alleged relationship with Trump, he replied "No comment," adding that Clifford just "wants to set the record straight." (which you can read more about in her upcoming book, we're sure).
Previewing today's 60 Minutes segment, Avenatti purposefully built up the suspense, tweeting that, among other things, "tonight is not the end – it's the beginning"
And while it is highly unlikely that the Stormy Daniels scandal will escalate into anything of Clinton-Lewinsky proportions, not to mention that Trump has enough other headaches on his hands, here according to The Hill , are seven things to watch for in tonight's interview:
1. Will she give details about the nondisclosure agreement?
Daniels has never spoken publicly about the nondisclosure agreement that purportedly bars her from speaking about her alleged affair with Trump. But a lawsuit filed by Daniels earlier this month confirmed the existence of such a document, arguing that it is invalid because it was never co-signed by Trump himself.
Whether Daniels will discuss the details of the agreement in the "60 Minutes" interview remains to be seen. Her lawsuit seeking to void the contract is still pending, and NDAs often prohibit signatories from speaking about the agreements.
Daniels has hinted that is true of her NDA. During an interview with late-night host Jimmy Kimmel in January, Kimmel pointed out that Daniels would likely be barred from discussing the agreement if it, in fact, existed. "You're so smart, Jimmy," was her cagey response.
2. Will she talk openly about the alleged affair?
Daniels has implied she was paid $130,000 by Trump's personal attorney Michael Cohen weeks before the 2016 presidential election to keep quiet about the alleged affair. Speaking openly about her claims would certainly violate the terms of the disputed NDA, and could subject Daniels to legal penalties.
In court papers filed earlier this month, Trump's lawyers said that Daniels could face up to $20 million in damages for violating the terms of the agreement. One question that remains is whether Daniels could toss out the NDA completely in her "60 Minutes" interview, and provide details about her alleged relationship with the president. The last time she spoke about it was 2011, when she gave an interview to In Touch magazine that wasn't published until this year.
3. Will she mention possible video or photographic evidence?
Avenatti has repeatedly hinted that video or photographic evidence of Daniels's alleged affair with Trump exists. The March 6 lawsuit filed by Daniels to void the nondisclosure agreement with Trump refers to "certain still images and/or text messages which were authored by or relate to" the president. While the NDA reportedly required her to turn over such material and get rid of her own copies, Avenatti has suggested that Daniels may have retained it.
Avenatti hinted this week that he may be in possession of such material, tweeting a cryptic photo of a compact disc inside of what appeared to be a safe. "If 'a picture is worth a thousand words,' how many words is this worth?????" he wrote on Twitter.
4. Will she address whether she was physically threatened?
Avenatti prompted questions earlier this month when he said that Daniels had been threatened with physical harm in connection with the alleged affair with Trump. Asked on MSNBC's "Morning Joe" whether Daniels had been physically threatened, Avenatti bluntly replied, "yes." Exactly who may have threatened Daniels or what the nature of those threats may have been is unclear, and Avenatti has declined to discuss the matter in greater detail. Daniels herself has not addressed any potential physical threats that she may have gotten, leaving open whether she will discuss the topic in the "60 Minutes" interview.
5. Will she discuss whether Trump knew about the $130K payment?
Cohen himself has acknowledged making the payment to Daniels, but has insisted that the money came from his personal funds and that Trump was never made aware of the transaction. White House press secretary Sarah Huckabee Sanders has said she does not believe Trump knew about the payment. But Avenatti has argued otherwise, saying the fact that Cohen used a Trump Organization email address backs up his claim that the real estate mogul was aware of the transaction. In an interview on "Morning Joe" last week, Avenatti also suggested that he had more evidence that Trump knew about the payment. Asked by Willie Geist if his "belief that the president directed this payment is based on more than a hunch," Avenatti simply replied, "yes," but declined to provide any evidence.
6. Why does she want to talk about the affair now?
Daniels's lawsuit claims she expressed interest in discussing the alleged affair publicly in 2016 after The Washington Post published a 2005 "Access Hollywood" tape in which Trump could be heard boasting about groping and kissing women without their permission. It was at this point that Cohen and Trump "aggressively sought to silence Ms. Clifford," according to the lawsuit, which claims that the $130,000 payment and nondisclosure agreement soon followed. But for more than a year after that, Daniels was silent about the alleged affair, and it was only in recent months that the accusations resurfaced. One thing to watch for is whether Daniels addresses her motives in the "60 Minutes" interview, or answers questions about what she hopes will happen next.
7. What happens next?
There may be hints of what Daniels's next steps are in the interview. A planned court hearing for Daniels's lawsuit is still months away. However, whatever Daniels reveals in the interview may force the hand of Trump's own legal team. After news broke that CBS intended to air the "60 Minutes" segment with Daniels, speculation swirled that Trump's lawyers would take legal action seeking to block the broadcast. Such legal action would have been unlikely to proceed, because courts rarely allow such prior restraint of speech, particularly regarding the news media.
But Trump's legal team has already signaled they're willing to fight Daniels on her claims. They reportedly asked for a temporary restraining order against her last month and have asked to transfer the lawsuit from California state court to a federal court in Los Angeles. But how Trump and his lawyers respond to the interview after it airs will be closely watched. Tags Law Crime News Agencies Internet Service Providers Glasses, Spectacles & Contact lenses
Comments Vote up! 7 Vote down! 0
Moustache Rides Sun, 03/25/2018 - 16:02 Permalinkwee-weed up -> Moustache Rides Sun, 03/25/2018 - 16:03 Permalink
Oh, I can't wait to tune into this. Give me a frackin' break.IridiumRebel -> Bes Sun, 03/25/2018 - 16:28 Permalink
Can you EVER imagine the MSM doing this to Slick Willy? Fukin' hypocrites!warsev -> IridiumRebel Sun, 03/25/2018 - 16:23 Permalink
It's 24/7 on the CuntStreamMedia.....like they're gonna find out tonight for the first time?
They probably know already. IT WAS 12 YEARS AGO......serotonindumptruck -> Mustafa Kemal Sun, 03/25/2018 - 16:29 Permalink
What I wonder is just how low CBS can go. Can you imagine the CBS of twenty or thirty years ago wading in the sewer like this?didthatreallyhappen Sun, 03/25/2018 - 16:04 Permalink
Initially, this ridiculous scandal was mildly amusing.
Now, it has become a tedious circus sideshow that serves to distract the masses from much more important issues.
The disgusting fact that Trump chose to throw his dick into this cum-dumpster skank is bad enough, but now that her lawyer apparently has a Trump dick-pic or some other pornographic evidence, he intends to exploit and extort as much publicity and money that he can in an effort to embarrass the POTUS.
Is it any wonder that the USA has become the laughing stock of the world?silverer -> didthatreallyhappen Sun, 03/25/2018 - 16:12 Permalink
bill clinton raped women and the left didn't care. They care now about Trump's mistress?Robert Trip Sun, 03/25/2018 - 16:06 Permalink
Bill squirted in the White House. Trump squirted on his own time.
"Adult film star?"
Interviewed by "I love to suck cocks" Anderson Cooper on 60 Minutes.
They are fit for each other.
Mar 24, 2018 | www.nakedcapitalism.comYves here. Not new to anyone who has been paying attention, but a useful recap with some good observations at the end, despite deploying the cringe-making trope of businesses having DNA. That legitimates the notion that corporations are people.
By Ivan Manokha, a departmental lecturer in the Oxford Department of International Development. He is currently working on power and obedience in the late-modern political economy, particularly in the context of the development of new technologies of surveillance. Originally published at openDemocracy
The current social mobilization against Facebook resembles the actions of activists who, in opposition to neoliberal globalization, smash a McDonald's window during a demonstration.
On March 17, The Observer of London and The New York Times announced that Cambridge Analytica, the London-based political and corporate consulting group, had harvested private data from the Facebook profiles of more than 50 million users without their consent. The data was collected through a Facebook-based quiz app called thisisyourdigitallife, created by Aleksandr Kogan, a University of Cambridge psychologist who had requested and gained access to information from 270,000 Facebook members after they had agreed to use the app to undergo a personality test, for which they were paid through Kogan's company, Global Science Research.
But as Christopher Wylie, a twenty-eight-year-old Canadian coder and data scientist and a former employee of Cambridge Analytica, stated in a video interview , the app could also collect all kinds of personal data from users, such as the content that they consulted, the information that they liked, and even the messages that they posted.
In addition, the app provided access to information on the profiles of the friends of each of those users who agreed to take the test, which enabled the collection of data from more than 50 million.
All this data was then shared by Kogan with Cambridge Analytica, which was working with Donald Trump's election team and which allegedly used this data to target US voters with personalised political messages during the presidential campaign. As Wylie, told The Observer, "we built models to exploit what we knew about them and target their inner demons."
Following these revelations the Internet has been engulfed in outrage and government officials have been quick to react. On March 19, Antonio Tajani President of the European Parliament Antonio Tajani, stated in a twitter message that misuse of Facebook user data "is an unacceptable violation of our citizens' privacy rights" and promised an EU investigation. On March 22, Wylie communicated in a tweet that he accepted an invitation to testify before the US House Intelligence Committee, the US House Judiciary Committee and UK Parliament Digital Committee. On the same day Israel's Justice Ministry informed Facebook that it was opening an investigation into possible violations of Israelis' personal information by Facebook.
While such widespread condemnation of Facebook and Cambridge Analytica is totally justified, what remains largely absent from the discussion are broader questions about the role of data collection, processing and monetization that have become central in the current phase of capitalism, which may be described as 'platform capitalism', as suggested by the Canadian writer and academic Nick Srnicek in his recent book .
Over the last decade the growth of platforms has been spectacular: today, the top 4 enterprises in Forbes's list of most valuable brands are platforms, as are eleven of the top twenty. Most recent IPOs and acquisitions have involved platforms, as have most of the major successful startups. The list includes Apple, Google, Microsoft, Facebook, Twitter, Amazon, eBay, Instagram, YouTube, Twitch, Snapchat, WhatsApp, Waze, Uber, Lyft, Handy, Airbnb, Pinterest, Square, Social Finance, Kickstarter, etc. Although most platforms are US-based, they are a really global phenomenon and in fact are now playing an even more important role in developing countries which did not have developed commercial infrastructures at the time of the rise of the Internet and seized the opportunity that it presented to structure their industries around it. Thus, in China, for example, many of the most valuable enterprises are platforms such as Tencent (owner of the WeChat and QQ messaging platforms) and Baidu (China's search engine); Alibaba controls 80 percent of China's e-commerce market through its Taobao and Tmall platforms, with its Alipay platform being the largest payments platform in China.
The importance of platforms is also attested by the range of sectors in which they are now dominant and the number of users (often numbered in millions and, in some cases, even billions) regularly connecting to their various cloud-based services. Thus, to name the key industries, platforms are now central in Internet search (Google, Yahoo, Bing); social networking (Facebook, LinkedIn, Instagram, Snapchat); Internet auctions and retail (eBay, Taobao, Amazon, Alibaba); on-line financial and human resource functions (Workday, Upwork, Elance, TaskRabbit), urban transportation (Uber, Lyft, Zipcar, BlaBlaCar), tourism (Kayak, Trivago, Airbnb), mobile payment (Square Order, PayPal, Apple Pay, Google Wallet); and software development (Apple's App Store, Google Play Store, Windows App store). Platform-based solutions are also currently being adopted in more traditional sectors, such as industrial production (GE, Siemens), agriculture (John Deere, Monsanto) and even clean energy (Sungevity, SolarCity, EnerNOC).
User Profiling -- Good-Bye to Privacy
These platforms differ significantly in terms of the services that they offer: some, like eBay or Taobao simply allow exchange of products between buyers and sellers; others, like Uber or TaskRabbit, allow independent service providers to find customers; yet others, like Apple or Google allow developers to create and market apps.
However, what is common to all these platforms is the central role played by data, and not just continuous data collection, but its ever more refined analysis in order to create detailed user profiles and rankings in order to better match customers and suppliers or increase efficiency.
All this is done in order to use data to create value in some way another (to monetize it by selling to advertisers or other firms, to increase sales, or to increase productivity). Data has become 'the new oil' of global economy, a new commodity to be bought and sold at a massive scale, and with this development, as a former Harvard Business School professor Shoshana Zuboff has argued , global capitalism has become 'surveillance capitalism'.
What this means is that platform economy is a model of value creation which is completely dependant on continuous privacy invasions and, what is alarming is that we are gradually becoming used to this.
Most of the time platform providers keep track of our purchases, travels, interest, likes, etc. and use this data for targeted advertising to which we have become accustomed. We are equally not that surprised when we find out that, for example, robotic vacuum cleaners collect data about types of furniture that we have and share it with the likes of Amazon so that they can send us advertisements for pieces of furniture that we do not yet possess.
There is little public outcry when we discover that Google's ads are racially biased as, for instance, a Harvard professor Latanya Sweeney found by accident performing a search. We are equally hardly astonished that companies such as Lenddo buy access to people's social media and browsing history in exchange for a credit score. And, at least in the US, people are becoming accustomed to the use of algorithms, developed by private contractors, by the justice system to take decisions on sentencing, which often result in equally unfair and racially biased decisions .
The outrage provoked by the Cambridge Analytica is targeting only the tip of the iceberg. The problem is infinitely larger as there are countless equally significant instances of privacy invasions and data collection performed by corporations, but they have become normalized and do not lead to much public outcry.
Today surveillance is the DNA of the platform economy; its model is simply based on the possibility of continuous privacy invasions using whatever means possible. In most cases users agree, by signing the terms and conditions of service providers, so that their data may be collected, analyzed and even shared with third parties (although it is hardly possible to see this as express consent given the size and complexity of these agreements -- for instance, it took 8 hours and 59 minutes for an actor hired by the consumer group Choice to read Amazon Kindle's terms and conditions). In other instances, as in the case of Kogan's app, the extent of the data collected exceeds what was stated in the agreement.
But what is important is to understand that to prevent such scandals in the future it is not enough to force Facebook to better monitor the use of users' data in order to prevent such leaks as in the case of Cambridge Analytica. The current social mobilization against Facebook resembles the actions of activists who, in opposition to neoliberal globalization, smash a McDonald's window during a demonstration.
What we need is a total redefinition of the right to privacy (which was codified as a universal human right in 1948, long before the Internet), to guarantee its respect, both offline and online.
What we need is a body of international law that will provide regulations and oversight for the collection and use of data.
What is required is an explicit and concise formulation of terms and conditions which, in a few sentences, will specify how users' data will be used.
It is important to seize the opportunity presented by the Cambridge Analytica scandal to push for these more fundamental changes.
Arizona Slim , , March 24, 2018 at 7:38 amSteve H. , , March 24, 2018 at 8:05 am
I am grateful for my spidey sense. Thanks, spidey sense, for ringing the alarm bells whenever I saw one of those personality tests on Facebook. I never took one.Annieb , , March 24, 2018 at 2:02 pm
First they came for
The most efficient strategy is to be non-viable . They may come for you eventually, but someone else gets to be the canary, and you haven't wasted energy in the meantime. TOR users didn't get that figured out.ChrisPacific , , March 25, 2018 at 4:07 pm
Never took the personality test either, but now I now that all of my friends who did unknowingly gave up my personal information too. I read an article somewhere about this over a year ago so it's really old news. Sent the link to a few people who didn't care. But now that they all know that Cambridge Analytical used FB data in support of the Trump campaign it's all over the mainstream and people are upset.HotFlash , , March 24, 2018 at 3:13 pm
You can disable that (i.e., prevent friends from sharing your info with third parties) in the privacy options. But the controls are not easy to find and everything is enabled by default.Octopii , , March 24, 2018 at 8:06 am
I haven't FB'd in years and certainly never took any such test, but if any of my friends, real or FB, did, and my info was shared, can I sue? If not, why not?Samuel Conner , , March 24, 2018 at 8:16 am
Everyone thought I was paranoid as I discouraged them from moving backups to the cloud, using trackers, signing up for grocery store clubs, using real names and addresses for online anything, etc. They thought I was overreacting when I said we need European-style privacy laws in this country. People at work thought my questions about privacy for our new location-based IoT plans were not team-based thinking.
And it turns out after all this that they still think I'm extreme. I guess it will have to get worse.Collins , , March 24, 2018 at 9:14 am
In a first for me, there are surface-mount resistors in the advert at the top of today's NC links page. That is way out of the ordinary; what I usually see are books or bicycle parts; things I have recently purchased or searched.
But a couple of days ago I had a SKYPE conversation with a sibling about a PC I was scavenging for parts, and surface mount resistors (unscavengable) came up. I suspect I have been observed without my consent and am not too happy about it. As marketing, it's a bust; in the conversation I explicitly expressed no interest in such components as I can't install them. I suppose I should be glad for this indication of something I wasn't aware was happening.Samuel Conner , , March 24, 2018 at 10:15 am
Had you used your computer keyboard previously to search for 'surface mount resistors', or was the trail linking you & resistors entirely verbal?Abi , , March 25, 2018 at 3:24 pm
No keyboard search. I never so much as think about surface mount components; the inquiry was raised by my sibling and I responded. Maybe its coincidental, but it seems quite odd.
I decided to click through to the site to generate a few pennies for NC and at least feel like I was punishing someone for snooping on me.ChiGal in Carolina , , March 25, 2018 at 10:12 am
Its been happening to me a lot recently on my Instagram, I don't like pictures or anything, but whenever I have a conversation with someone on my phone, I start seeing ads of what I spoke aboutEureka Springs , , March 24, 2018 at 8:44 am
I thought it came out a while ago that Skype captures and retains all the dialogue and video of convos using it.Pelham , , March 24, 2018 at 9:13 am
What we need is a total redefinition of the right to privacy (which was codified as a universal human right in 1948, long before the Internet), to guarantee its respect, both offline and online.
Are we, readers of this post, or citizens of the USA supposed to think there is anything binding in declarations? Or anything from the UN if at all inconvenient for that matter?
No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.
Platforms like facebook allow individuals to 'spy' on each other and people love it. When I was a kid i always marveled at how some households would leave a police scanner on 24/7. With the net we have this writ large with baby, puppy and tv dinner photos. Not to forget it's a narcissist paradise. I have friends who I've tried to gently over time inject tidbits of info like this article provides for many years and they still just refuse to try and get it. If they looked over their shoulder and saw how many people/entities are literally following them everywhere they go, they would become rabid gun owners (don't tread on me!) overnight, but the invisible hand/eye registers not at all.albert , , March 24, 2018 at 6:27 pm
A side note: If Facebook and other social media were to assume ANY degree of responsibility for content appearing on their platforms, they would be acknowledging their legal liability for ALL content.
Hence they would be legally responsible just as newspapers are. And major newspapers have on-staff lawyers and editors exquisitely attuned to the possibility of libelous content so they can avoid ruinous lawsuits.
If the law were applied as it should be, Facebook and its brethren wouldn't last five minutes before being sued into oblivion.PlutoniumKun , , March 24, 2018 at 9:52 am
" being sued into oblivion ." If only.
Non-liability is a product of the computer age. I remember having to agree with Microsofts policy to absolve them of -any- liability when using their software. If they had their druthers, -no- company would be liable for -anything-. It's called a 'perfect world'.
Companies that host 'social media' should not have to bear any responsibility for their users content. Newspapers employ writers and fact checkers. They are set up to monitor their staff for accuracy (Okay, in theory). So you can sue them and even their journalist employees. Being liable (and not sued) allows them to brag about how truthful they are. Reputations are a valuable commodity these days.
In the case of 'social media' providers, liability falls on the authors of their own comments, which is only fair, in my view. However, I would argue that those 'providers' should -not- be considered 'media' like newspapers, and their members should not be considered 'journalists'.
Also, those providers are private companies, and are free to edit, censor, or delete anything on their site. And of course it's automated. Some conservative Facebook members were complaining about being banned. Apparently, there a certain things you can't say on Facebook.
AFAIC, the bottom line is this: Many folks tend to believe everything they read online. They need to learn the skill of critical thinking. And realize that the Internet can be a vast wasteland; a digital garbage dump.
Why are our leaders so concerned with election meddling? Isn't our propaganda better than the Russians? We certainly pay a lot for it.
. .. . .. -- .saurabh , , March 24, 2018 at 11:43 am
It seems even Elon Musk is now rebelling against Facebook.
Musk Takes Down the Tesla and SpaceX Facebook Pages.
Today, Musk also made fun of Sonos for not being as committed as he was to the anti-Facebook cause after the connected-speaker maker said it would pull ads from the platform -- but only for a week.
"Wow, a whole week. Risky " Musk tweeted.Jim Thomson , , March 25, 2018 at 9:39 am
Musk, like Trump, knows he does not need to advertise because a fawning press will dutifully report on everything he does and says, no matter how dumb.Daniel Mongan , , March 24, 2018 at 10:14 am
This is rich.
I can't resist: It takes a con to know a con.
(not the most insightful comment)JimTan , , March 24, 2018 at 11:12 am
A thoughtful post, thanks for that. May I recommend you take a look at "All You Can Pay" (NationBooks 2015) for a more thorough treatment of the subject, together with a proposal on how to re-balance the equation. Full disclosure, I am a co-author.JCC , , March 24, 2018 at 11:29 am
People are starting to download copies of their Facebook data to get an understanding of how much information is being collected from them.oh , , March 24, 2018 at 1:44 pm
A reminder: https://www.youtube.com/watch?v=iRT9On7qie8
I saw this video back in 2007. It was originally put together by a Sarah Lawrence student who was working on her paper on social media. The ties of all the original investors to IN-Q-Tel scared me off and I decided to stay away from Facebook.
But it isn't just FB. Amazon, Twitter, Google, LinkedIn, Apple, Microsoft and many others do the same, and we are all caught up in it whether we agree to participate or not.
Anyone watch the NCAA Finals and see all the ads from Google about being "The Official Cloud of the NCAA"? They were flat out bragging, more or less, about surveillance of players. for the NCAA.
Platform Capitalism is a mild description, it is manipulation based on Surveillance Capitalism, pure and simple. The Macro pattern of Corporate Power subsuming the State across every area is fascinating to watch, but a little scary.HotFlash , , March 24, 2018 at 3:27 pm
Caveat Emptor: If you watch YouTube, they'll only add to the information that they already have on you!Craig H. , , March 24, 2018 at 12:21 pm
Just substitute "hook" for 'you" in the URL, you get the same video, no ads, and they claim not to track you. YMMVEd , , March 24, 2018 at 2:50 pm
Privacy no longer a social norm, says Facebook founder; Guardian; 10 January 2010
The Right to Privacy; Warren & Brandeis; Harvard Law Review; 15 December 1890
It was amusing that the top Google hit for the Brandeis article was JSTOR which requires us to surrender personal detail to access their site. To hell with that.
The part I like about the Brandeis privacy story is the motivation was some Manhattan rich dicks thought the gossip writers snooping around their wedding party should mind their own business. (Apparently whether this is actually true or just some story made up by somebody being catty at Brandeis has been the topic of gigabytes of internet flame wars but I can't ever recall seeing any of those.)Craig H. , , March 24, 2018 at 3:42 pm
" Two young psychologists are central to the Cambridge Analytica story. One is Michal Kosinski, who devised an app with a Cambridge University colleague, David Stillwell, that measures personality traits by analyzing Facebook "likes." It was then used in collaboration with the World Well-Being Project, a group at the University of Pennsylvania's Positive Psychology Center that specializes in the use of big data to measure health and happiness in order to improve well-being. The other is Aleksandr Kogan, who also works in the field of positive psychology and has written papers on happiness, kindness, and love (according to his résumé, an early paper was called "Down the Rabbit Hole: A Unified Theory of Love"). He ran the Prosociality and Well-being Laboratory, under the auspices of Cambridge University's Well-Being Institute.
Despite its prominence in research on well-being, Kosinski's work, Cadwalladr points out, drew a great deal of interest from British and American intelligence agencies and defense contractors, including overtures from the private company running an intelligence project nicknamed "Operation KitKat" because a correlation had been found between anti-Israeli sentiments and liking Nikes and KitKats. Several of Kosinski's co-authored papers list the US government's Defense Advanced Research Projects Agency, or DARPA, as a funding source. His résumé boasts of meetings with senior figures at two of the world's largest defense contractors, Boeing and Microsoft, both companies that have sponsored his research. He ran a workshop on digital footprints and psychological assessment for the Singaporean Ministry of Defense.
For his part, Aleksandr Kogan established a company, Global Science Research, that contracted with SCL, using Facebook data to map personality traits for its work in elections (Kosinski claims that Kogan essentially reverse-engineered the app that he and Stillwell had developed). Kogan's app harvested data on Facebook users who agreed to take a personality test for the purposes of academic research (though it was, in fact, to be used by SCL for non-academic ends). But according to Wylie, the app also collected data on their entire -- and nonconsenting -- network of friends. Once Cambridge Analytica and SCL had won contracts with the State Department and were pitching to the Pentagon, Wylie became alarmed that this illegally-obtained data had ended up at the heart of government, along with the contractors who might abuse it.
This apparently bizarre intersection of research on topics like love and kindness with defense and intelligence interests is not, in fact, particularly unusual. It is typical of the kind of dual-use research that has shaped the field of social psychology in the US since World War II.
Much of the classic, foundational research on personality, conformity, obedience, group polarization, and other such determinants of social dynamics -- while ostensibly civilian -- was funded during the cold war by the military and the CIA. The cold war was an ideological battle, so, naturally, research on techniques for controlling belief was considered a national security priority. This psychological research laid the groundwork for propaganda wars and for experiments in individual "mind control."
The pioneering figures from this era -- for example, Gordon Allport on personality and Solomon Asch on belief conformity -- are still cited in NATO psy-ops literature to this day .."
This is an issue which has frustrated me greatly. In spite of the fact that the country's leading psychologist (at the very least one of them -- ex-APA president Seligman) has been documented taking consulting fees from Guantanamo and Black Sites goon squads, my social science pals refuse to recognize any corruption at the core of their so-called replicated quantitative research.
I have asked more than five people to point at the best critical work on the Big 5 Personality theory and they all have told me some variant of "it is the only way to get consistent numbers". Not one has ever retreated one step or been receptive to the suggestion that this might indicate some fallacy in trying to assign numbers to these properties.
They eat their own dog food all the way and they seem to be suffering from a terrible malnutrition. At least the anthropologists have Price . (Most of that book can be read for free in installments at Counterpunch.)
Mar 25, 2018 | www.eurasiafuture.com"CA was able to provide the campaign with predictive analytics based on more than 5,000 data points on every voter in the United States. From there, CA's team of political consultants and psychologists guided the campaign on what to say and how to say it to specific groups of voters."
This is a vocal acknowledgement from Trump's data guru that he was able to change the behaviour of American voters in favour of a Trump victory in the presidential election, but unfortunately, the American deep state blamed Russia for hacking American democracy – a claim which is totally baseless and untrue. In a total disingenuous move, American mainstream media tried to link-up CA with WikiLeaks. While CA did contact Wikileaks, Julian Assange is on the record as rebuffing CA's advances.
American warmongers within the deep state worked for a Hillary Clinton victory through their control of American mainstream media, but they nevertheless failed to elect her. As a result, Clinton's team blamed her loss on Russia, in order to accelerate hostility towards Moscow and to apply pressure on President Trump so that he could not establish friendly relations with Russia. They have succeeded in this regard as Trump surrendered to the war hungry deep state. That being said, the fight within the deep state between FBI and CIA also helped Trump to use the situation in his favour, as the FBI investigated Clinton after emails leaks scandal.
The CIA blamed Russia for hacking Hillary Clinton's DNC emails and allegedly passing them to Wikileaks. The purpose of this blame was to influence the FBI investigation against her. To a degree they succeeded. While she did not go to jail, she ended up losing the election. US intelligence agencies propagated a myth that Wikileaks worked for Russia, but it is a fact that Russia has no links with Wikileaks.
... ... ...Recently Russian President Vladimir Putin held up a mirror to western global manipulator elite and addressed their baseless 'blame campaign' against Russia. Speaking with NBC news anchor Megyn Kelly, Putin said, "We're holding discussions with our American friends and partners, people who represent the government, by the way, and when they claim that some Russians interfered in the US elections, we tell them and we did so fairly recently at a very level, 'But you are constantly interfering in our political life'. Can you imagine, they don't even deny it, you know what they told us last time? They said, 'Yes, we do interfere but we are entitled to do it because we are spreading democracy and you're not, and you can't do it'. Does this seem like a civilized and modern approach to international affairs? At the level of the Russian government and the level of Russian President, there has never been any interference in the internal political process of the United States."
President Putin further explained, "Not long ago President Trump said something, he said that if Russia goal was to sow chaos it has succeeded, but that's not the result, that's the result of your political system; the internal struggle, the disorder, and division. Russia has nothing to do with it. Whatsoever we have nothing to do with it all. Get your own affairs in order first and the way the question's been framed as I mentioned –that you can interfere anywhere you want because you bring democracy but we can't –that's what causes conflicts. You have to show your partners respect and they will respect you."
President Putin's statement clearly indicates that it is the USA who is behind the effort to hack democracy and bring about regime changes throughout the world with the aim to install puppet regimes in targeted states. Cambridge Analytica and its mother company SCL are working for the strategic interests of the USA and its western partner NATO in order to achieve these regime change ambitions. Hence, this is the reason that Facebook after the publication of my previous article, suspended the CA/SCL group from its social media network by saying, "Protecting people's information is at the heart of everything we do, and we require the same from people who operate apps on Facebook. In 2015, we learned that a psychology professor at the University of Cambridge named Dr. Aleksandr Kogan lied to us and violated our Platform Policies by passing data from an app that was using Facebook Login to SCL/Cambridge Analytica, a firm that does political, government and military work around the globe. He also passed that data to Christopher Wylie of Eunoia Technologies, Inc."
Mar 25, 2018 | www.eurasiafuture.com
Manipulating democracy -- brainwashing the public for a large fee
Cambridge Analytica, the data harvesting firm that worked for the Trump campaign, is in the midst of a scandal that should make everyone who cares about a clean political process demand major investigations of anyone who has procured the services of the company, major prosecutions of those who have violated laws across multiple nations and a wholesale revitalisation of electoral laws to prevent politicians from ever again procuring the services of unethical companies like Cambridge Analytica.
Days ago, whistleblower Christopher Wylie went public about his time working for Cambridge Analytica and specifically about how the firm illegally obtained the public and private data, including the private messages of 50 million Facebook users. He also exposed how Cambridge Analytica used this data to run highly scientific social manipulation campaigns in order to effectively brainwash the public in various countries to support a certain political candidate or faction.
Cambridge Analytica's dubious methods were used to meddle in the US election after the Trump campaign paid Cambridge Analytica substantial sums of money for their services. The firm also meddled in the last two Kenyan Presidential elections, elections in Nigeria, elections in Czech Republic, elections in Argentina, elections in India, the Brexit campaign, UK Premier Theresa May's recently election and now stands accused of working with the disgraced former Pakistani Premier Nawaz Sharif in an attempt to reverse his judicial ban on holding public office, while helping his PML-N party win the forthcoming general election.
Beyond the scandalous use of personal data from Facebook users and the illegal access to people's private messages, Cambridge Analytica has now been exposed as a company that, by the hidden-camera admission of its CEO Alexander Nix, engages in nefarious, illegal and outrageous activities across the globe.
The UK Broadcaster Channel 4 just released a video of Cambridge Analytica's CEO and Managing DIrector Mark Turnbull in a conversation with an undercover reporter posing as a Sri Lankan businessman interested in meddling in domestic elections. During the conversation Nix boasted of Cambridge Analytica's history of using entrapment, bribery and intimidation against the political opponents of its wealthy clients. Furthermore, Nix boasted about his firm's ability to procure Ukrainian prostitutes as a means to entrap adversaries while also procuring the services of "Israeli spies" as part of dirty smear operations.
The activities that Nix boasted of using in the past and then offered to a prospective client are illegal in virtually every country in the world. But for Nix and his world of ultra-rich clients, acting as though one is above the law is the rule rather than the exception. Thus far, Cambridge Analaytica has been able to escape justice throughout the world both for its election meddling, data harvesting, data theft and attempts to slander politicians through calculated bribery and entrapment schemes.
One person who refused to be tempted by Cambridge Analytica was Julian Assange. Alexander Nix personally wrote to Julian Assange asking for direct access to information possessed by Wikileaks and Assange refused. This is a clear example of journalistic ethics and personal integrity on the part of Assange. Justice must be done
Cambridge Analytica stands accused of doing everything and more that the Russian state was accused of doing in respect of meddling in the 2016 US Presidential election. While meetings and conversations that Trump campaign officials, including Steve Bannon had with Cambridge Analyatica big wigs were not recorded, any information as to what was said during these exchanges should be thoroughly investigated by law enforcement and eventually made public for the sake of restoring transparency to politics.
Just as the Hillary Clinton campaign openly conspired to deprive Bernie Sanders of the Democratic Party's nomination, so too did Donald Trump's campaign pay Cambridge Analytica to conspire against the American voters using a calculated psychological manipulation campaign that was made possible through the use of unethically obtained and stolen data.
While Facebook claims it was itself misled and consequently victimised by Cambridge Analytica and has subsequently banned the firm from its platform, many, including Edward Snowden have alleged that Facebook knew full well what Cambridge Analytica was doing with the data retrieved from its Facebook apps. Already, the markets have reacted to the news and the verdict is not favourble in terms of the public perception of Facebook as an ethical company. Facebook's share prices are down over 7% on the S&P 500. This represents the biggest tumble in the price of Facebook share prices since 2014. Moreover, the plunge has knocked Facebook out of the coveted big five companies atop the S&P 500. Furthermore, Alex Stamos, Facebook's security director has announced that he will soon leave the company.
The Trump myth and Russia myth exposed
Donald Trump has frequently boasted of his expert campaigning skills as being the reason he won an election that few thought he could have ever won. While Trump was a far more charismatic and exciting platform speaker than his rival Hillary Clinton, it seems that for the Trump campaign, Trump ultimately needed to rely on the expensive and nefarious services of Cambridge Analytica in order to manipulate the minds of American voters and ultimately trick them into voting for him. It is impossible to say whether Trump would have still won his election without Cambridge Analaytica's services, but the fact they were used, should immediately raise the issue of Trump's suitability for office.
Ultimately, the Trump campaign did conspire to meddle in the election, only it was not with Russia or Russians with whom the campaign conspired, it was with the British firm Cambridge Analytica. Thus one sees that both the narrative about Trump the electoral "genius" and the narrative about Trump the Kremlin puppet are both false. The entire time, the issue of Trump campaign election meddling was one between a group of American millionaires and billionaires and a sleaze infested British firm.
Worse than Watergate
In 1972, US President Richard Nixon conspired to cover-up a beak-in at the offices of his political opponents at the Watergate Complex. The scandal ultimately led to Nixon's resignation in 1974. What the Trump campaign did with Cambridge Analytica is far more scandalous than the Watergate break-in and cover-up. Where Nixon's cronies broke into offices to steal information from the Democratic party, Trump's paid cyber-thugs at Cambridge Analytica broke in to the private data of 50 million people, the vast majority of whom were US citizens.
Richard Nixon, like Donald Trump, was ultimately driven by a love of power throughout his life. Just as Trump considered running for President for decades, so too did Nixon try to run in 1960 and lost to John Fitzgerald Kennedy, while he also failed to become governor of California in 1962 election. By 1968 he finally got into the White House at the height of the Vietnam War. When time came for his re-election, Nixon's team weren't going to take any chances and hence the Watergate break-in was orchestrated to dig up dirt on Nixon's opponent. As it turned out Nixon won the 1972 by a comfortable margin, meaning that the Watergate break-in was probably largely in vain.
Likewise, Trump may well have won in 2016 even without Cambridge Analytica, but in his quest for power, Trump has resorted to dealing with a company whose practices have done far more damage to the American people than the Watergate break-in.
New laws are needed
While existing laws will likely be sufficient to bring the fiends at Cambridge Analytica to justice, while also determining the role that Trump campaign officials, up to and including Trump played in the scandal, new laws must be enshrined across the globe in order to put the likes of Cambridge Analytica out of business for good.
The following proposals must be debated widely and ideally implemented at the soonest possible date:
-- A total ban on all forms of data mining/harvesting for political purposes.
-- A total ban on the use of algorithms and artificial intelligence in any political campaign or for any political purpose.
-- A mandatory seizing of the assets of any company involved in data mining/harvesting for political purposes, after which point such a company would be forcibly shut down permanently.
-- A mandatory seizing of the assets of any company involved in the use of artificial intelligence or algorithms in the course of a public political campaign.
-- A total ban on the use of internet based platforms, including social media by political candidates and their direct associates for anything that could reasonably be classified as a misinformation and/or manipulation scheme.
-- A total ban on politicians using third party data firms or advertising firms during elections. All such advertising and analysis must be devised by advisers employed directly by or volunteering for an individual candidate or his or her party political organisation.
-- A total ban on any individual working for a political campaign, who derives at least half of his or her income from employment, ownership and/or shares in a company whose primary purpose is to deliver news and analysis.
-- A total ban on anyone paid by a political candidate to promote his or her election from an ownership or major share holding role in any company whose primary purpose is to deliver news and analysis until 2 years after the said election.
If all of these laws were implemented along with thorough campaign finance reform initiatives, only then can anything remotely resembling fair elections take place.
The elites eat their own
While many of the media outlets who have helped to publish the revelations of whistleblower Christopher Wylie continue to defame Russia without any evidence about Russian linkage to the 2016 US election (or any other western vote for that matter), these outlets are nevertheless exposing the true meddling scandal surrounding the Trump campaign which has the effect of destroying the Russia narrative.
In this sense, a divided elite are turning against themselves. While the billionaire property tycoon Donald Trump can hardly be described as anything but a privileged figure who moved in elite public circles for most of his life, his personal style, rhetoric and attitude towards fellow elites has served to alienate Trump from many. Thus, there is a desire on the part of the mainstream media to expose a scandal surrounding Trump in a manner that would be unthinkable in respect of exposing a cause less popular among western elites, for example the brutal treatment of Palestine by the Zionist regime.
In this sense, Trump's own unwillingness or lack of desire to endear himself to fellow elites and instead present himself as a 'man of the people', might be his penultimate undoing. His rich former friends are now his rich present day enemies and many ordinary voters will be completely aghast at his involvement with Cambridge Analytica, just as many Republicans who voted for Nixon, became converts to the anti-Nixon movement once the misdeeds and dishonesty of Richard Nixon were made public. Many might well leave the 'Trump train' and get on board the 'political ethics express'.
This scandal ultimately has nothing to do with one's opinion on Trump or his policies, let alone any of the other politicians who have hired Cambridge Analytica. The issue is that a company engaged in the most nefarious, dangerous, sleazy and wicked behaviour in the world, is profiting from their destruction of political institutions that ought to be based on open policy debates rather than public manipulation, brainwashing and artificial intelligence.
The issue is also one of privacy. 50 million people have been exploited by an unethical company and what's more is that the money from the Trump campaign helped to empower this unethical company. This is therefore as unfair to non-voters as it is to voters. Cambridge Analytica must be shut down and all companies like it must restrict the scope of their operations or else face the same consequence.
Mar 25, 2018 | www.zerohedge.com
veritas semper -> Four chan Sun, 03/25/2018 - 14:05 Permalink
Look at this great interview with Adam Garrie. This is a must watch video.
This scandal is HUUUGE
He discusses Cambridge Analytica involvement in basically all elections, involvement of Facebook and its Sugar daddy, UK ,US gov. How they tried to co-opt Mr.Assange and he said FO.
How UK tries to cover it up . There is a whistleblower and soon more ,it seems
Mar 25, 2018 | www.moonofalabama.orgPeter AU 1 , Mar 25, 2018 1:23:38 PM | 4James 1Peter AU 1 , Mar 25, 2018 2:31:01 PM | 10
I ran onto something about that when researching SCL/Cambridge Analytica
The Mercer/Cambridge Analytica US wing of SCL put a lot of funding into the leave campaign which was undeclared. Like a political campaign, donations above a threshold have to be declared.
Threshold for declaring donations I think was around 3 to 7000 and CA put in over 300 000.james 6
I have been researching SCL the last few days now. It is starting to look as though, rather than being political mercenary's working for whoever pays, they seem to back nationalist leaning groups or individuals. They have a political or geo-political agenda but not sure what at the moment. Always anti Russia. Involved in operations in most of the ex soviet countries to create a hatred of ethnic Russians and I think will work with non nationalist types who are very anti Russia.
Mar 25, 2018 | www.zerohedge.com
by Tyler Durden Sun, 03/25/2018 - 13:00 371 SHARES
Julian Assange fired off a tweet Friday afternoon reminding people of the time Mark Zuckerberg called his users "Dumb fucks" because they trusted him with their private information.
Zuck: Yeah so if you ever need info about anyone at Harvard
Zuck: Just ask.
Zuck: I have over 4,000 emails, pictures, addresses, SNS
[Redacted Friend's Name]: What? How'd you manage that one?
Zuck: People just submitted it.
Zuck: I don't know why.
Zuck: They "trust me"
Zuck: Dumb fucks.
The exchange, originally published by Business Insider 's editor-in-chief Nicholas Carlson in 2010, was an early instant messenger conversation then 19-year-old Zuckerberg had with a college friend shortly after he launched "The Facebook" in his dorm room.
And this does appear to reflect Mark's own views of privacy, which seem to be that people shouldn't care about it as much as they do -- an attitude that very much reflects the attitude of his generation.
After all, here's what early Facebook engineering boss, Harvard alum, and Zuckerberg confidant Charlie Cheever said in David Kirkpatrick's brilliantly-reported upcoming book The Facebook Effect.
"I feel Mark doesn't believe in privacy that much, or at least believes in privacy as a stepping stone. Maybe he's right, maybe he's wrong."
Kirkpatrick had this to say about Facebook COO Sheryl Sandberg in his book:
"Mark really does believe very much in transparency and the vision of an open society and open world, and so he wants to push people that way . I think he also understands that the way to get there is to give people granular control and comfort . He hopes you'll get more open, and he's kind of happy to help you get there. So for him, it's more of a means to an end . For me, I'm not as sure."
Zuckerberg reportedly hacked into people's email using their TheFacebook passwords...
At one point early on on Facebook history, Zuckerberg - nervous about an upcoming report in the Harvard Crimson , used "TheFacebook" login data of Crimson staff to crack into their Harvard email accounts to see if the paper was going to include a claim that he had stolen an idea for a TheFacebook feature called "Visualize Your Buddy."
Tim and Elisabeth decided to drop John's claims from the story. But, this time, they decided to go ahead and publish a story on ConnectU's claims against Facebook.
Mark Zuckerberg was not content to wait until the morning to find out if the Crimson would include John's accusations in its story.
Instead, he decided to access the email accounts of Crimson editors and review their emails. How did he do this? Here's how Mark described his hack to a friend:
Mark used his site, TheFacebook.com, to look up members of the site who identified themselves as members of the Crimson . Then he examined a log of failed logins to see if any of the Crimson members had ever entered an incorrect password into TheFacebook.com. If the cases in which they had entered failed logins, Mark tried to use them to access the Crimson members' Harvard email accounts. He successfully accessed two of them.
In other words, Mark appears to have used private login data from TheFacebook to hack into the separate email accounts of some TheFacebook users.
In one account he accessed, Mark saw an email from Crimson writer Tim McGinn to Cameron, Tyler, and Divya. Another email Mark read was this one, from Crimson managing editor Elisabeth Theodore to Tim McGinn:
From: Elisabeth Susan Theodore
To: Timothy John McGinn
Subject: Re: Follow-up
OK, he did seem very sleazy. And I thought that some of his answers to the questions were not very direct or open. I also thought that his reaction to the website was very very weird . But, even if it's true so what? It's an [redacted] thing to do but it's not illegal, right? - Business Insider
Lo and behold, Mark's cavalier attitude towards Facebook user data is costing him billions at a time he's actively shedding shares as part of a $12 billion liquidation which started last September .
Mar 23, 2018 | www.strategic-culture.org
Now, at last, a real "election influence" scandal -- and, laughably, it's got nothing to do with Russia. The protagonists are none other than the "all-American" US social media giant Facebook and a British data consultancy firm with the academic-sounding name Cambridge Analytica.
Facebook's chief executive Mark Zuckerberg is being called upon by British and European parliamentarians to explain his company's role in a data-mining scandal in which up to 50 million users of the social media platform appear to have had their private information exploited for electioneering purposes.
Exploited, that is, without their consent or knowledge. Facebook is being investigated by US federal authorities for alleged breach of privacy and, possibly, electoral laws. Meanwhile, Cambridge Analytica looks less an academic outfit and more like a cheap marketing scam.
Zuckerberg has professed "shock" that his company may have unwittingly been involved in betraying the privacy of its users. Some two billion people worldwide are estimated to use the social media networking site to share personal data, photos, family news and so on, with "friends".
Now it transpires that at least one firm, London-based Cambridge Analytica, ran a profitable business by harvesting the publicly available data on Facebook for electioneering purposes for which it was contracted to do. The harvested information was then used to help target election campaigning.
Cambridge Analytica was reportedly contracted by the Trump campaign for the 2016 presidential election. It was also used during the Brexit referendum campaign in 2016 when Britons voted to leave the European Union.
This week the British news outlet Channel 4 broadcast a stunning investigation in which chief executives at Cambridge Analytica were filmed secretly boasting about how their firm helped win the US presidential election for Donald Trump.
More criminally, the data company boss, Alexander Nix, also revealed that they were prepared to gather information which could be used for blackmailing and bribing politicians, including with the use of online sex traps.
The repercussions from the scandal have been torrid. Following the Channel 4 broadcast, Cambridge Analytica has suspended its chief executive pending further investigation. British authorities have sought a warrant to search the company's computer servers.
Moreover, Zuckerberg's Facebook has seen $50 billion wiped of its stock value in a matter of days. What is at issue is the loss of confidence among its ordinary citizen-users about how their personal data is vulnerable to third party exploitation without their consent.
Cambridge Analytica is just the tip of an iceberg. The issue has raised concerns that other third parties, including criminal identity-theft gangs, are also mining Facebook as a mammoth marketing resource. A resource that is free to exploit because of the way that ordinary users willingly publish their personal profiles.
The open, seemingly innocent nature of Facebook connecting millions of people -- a "place where friends meet" as its advertising jingle goes -- could turn out to be an ethical nightmare over privacy abuse.
Other social media companies like Amazon, Google, WhatsApp and Twitter are reportedly apprehensive about the consequences of widespread loss of confidence among consumers in privacy security. One of the biggest economic growth areas over the past decade -- social media -- could turn out to be another digital bubble that bursts spectacularly due to the latest Facebook scandal.
But one other, perhaps more, significant fallout from the scandal is the realistic perspective it provides on the so-called "Russiagate" debacle.
For well over a year now, the US and European corporate news media have been peddling claims about how Russian state agents allegedly "interfered" in several national elections.
The Russian authorities have consistently rejected the alleged "influence campaigns" as nothing but a fabrication to slander Russia. Moscow has repeatedly asked for evidence to verify the relentless claims -- and none has been presented.
The US congress has carried out two probes into "Russiagate" without much to show for their laborious endeavors. A special counsel headed up by former FBI chief Robert Mueller has spent millions of taxpayer dollars to produce a flimsy indictment list of 19 Russian individuals who are said to have run influence campaigns out of a nondescript "troll farm" in St Petersburg.
It still remains unclear and unconvincing how, or if, the supposed Russian hackers were linked to the Russian state, and how they had any impact on the voting intentions of millions of Americans.
Alternatively, there is plausible reason to believe that the so-called Russian troll farm in St Petersburg, the Internet Research Agency, may have been nothing other than a dingy marketing vehicle, trying to use the internet like thousands of other firms around the world hustling for advertising business. Firms like Cambridge Analytica.
The whole Russiagate affair has been a storm in a teacup, and Mueller seems to be desperate to produce some, indeed any, result for his inquisitorial extravaganza.
The amazing thing to behold is how the alleged Russian "influence campaign" narrative has become an accepted truth, propagated and repeated by Western governments and media without question.
Pentagon defense strategy papers, European Union policy documents, NATO military planning, among others, have all cited alleged "Russian interference" in American and European elections as "evidence" of Moscow's "malign" geopolitical agenda.
The purported Russiagate allegations have led to a grave deepening of Cold War tensions between Western states and Russia to the point where an all-out war is at risk of breaking out.
Last week, the Trump administration slapped more sanctions on Russian individuals and state security services for "election meddling".
No proof or plausible explanation has ever been provided to substantiate the allegations of a Russian state "influence campaign'. The concept largely revolves around innuendo and a deplorable prejudice against Russia based on irrational Cold War-style Russophobia.
However, one possible beneficial outcome from the latest revelations of an actual worldwide Facebook election-influence campaign, driven by an ever-so British data consultancy, is that the scandal puts the claims against Russia into stark, corrective perspective.
A perspective which shows that the heap of official Western claims against Russia of "influencing elections" is in actual fact negligible if not wholly ridiculous.
It's a mountain versus a hill of beans. A tornado versus a storm in a teacup. Time to get real on how Western citizens are being really manipulated by their own consumer-capitalist cultures.Tags: Facebook Russiagate
Mar 23, 2018 | www.zerohedge.com
All 1,472 employees of Facebook, Inc. reportedly burst out in uncontrollable laughter Wednesday following Albuquerque resident Jason Herrick's attempts to protect his personal information from exploitation on the social-networking site.
" Look, he's clicking 'Friends Only' for his e-mail address. Like that's going to make a difference! " howled infrastructure manager Evan Hollingsworth, tears streaming down his face, to several of his doubled-over coworkers.
" Oh, sure, by all means, Jason, 'delete' that photo. Man, this is so rich ."
According to internal sources, the entire staff of Facebook was left gasping for air minutes later when the "hilarious" Herrick believed he had actually blocked third-party ads.
Source: The Onion
Mar 22, 2018 | www.zerohedge.com
by George Washington Wed, 03/21/2018 - 23:09 206 SHARES
By Yasha Levine, Surveillance Valley .
Levine's investigative reporting on the connection between the Silicon Valley tech giants and the military-intelligence community has been praised by high-level NSA whistleblower Thomas Drake, and many others. [See my interviews of Drake here:
- NSA Started Spying On Journalists in 2002 In Order to Make Sure They Didn't Report On Mass Surveillance
"Google has partnered with the United States Department of Defense to help the agency develop artificial intelligence for analyzing drone footage, a move that set off a firestorm among employees of the technology giant when they learned of Google's involvement." -- Gizmodo / March 6, 2018
Gizmodo's report on Google's work for the Pentagon has been making headlines all day. It's also thrown the normally placid halls of Google's Mountain View HQ into chaos. Seems that Googlers can't believe that their awesome company would get involved in something as heinous as helping the Pentagon increase its drone targeting capability.
But the fact that Google helps the military build more efficient systems of surveillance and death shouldn't be surprising, especially not to Google employees. The truth is that Google has spent the last 15 years selling souped-up versions of its information technology to military and intelligence agencies, local police departments, and military contractors of all size and specialization -- including outfits that sell predictive policing tech deployed in cities across America today.
As I outline in my book Surveillance Valley , it started in 2003 with customized Google search solutions for data hosted by the CIA and NSA. The company's military contracting work then began to expand in a major way after 2004, when Google cofounder Sergey Brin pushed for buying Keyhole, a mapping startup backed by the CIA and the NGA, a sister agency to the NSA that handles spy satellite intelligence.
Spooks loved Keyhole because of the "video game-like" simplicity of its virtual maps. They also appreciated the ability to layer visual information over other intelligence. The sky was the limit. Troop movements, weapons caches, real-time weather and ocean conditions, intercepted emails and phone call intel, cell phone locations -- whatever intel you had with a physical location could be thrown onto a map and visualized. Keyhole gave an intelligence analyst, a commander in the field, or an air force pilot up in the air the kind of capability that we now take for granted: using digital mapping services on our computers and mobile phones to look up restaurants, cafes, museums, traffic conditions, and subway routes. "We could do these mashups and expose existing legacy data sources in a matter of hours, rather than weeks, months, or years," an NGA official gushed about Keyhole -- the company that we now know as Google Earth.
Military commanders weren't the only ones who liked Keyhole's ability to mash up data. So did Google cofounder Sergey Brin.
The purchase of Keyhole was a major milestone for Google, marking the moment the company stopped being a purely consumer-facing Internet company and began integrating with the US government. While Google's public relations team did its best to keep the company wrapped in a false aura of geeky altruism, company executives pursued an aggressive strategy to become the Lockheed Martin of the Internet Age. "We're functionally more than tripling the team each year," a Google exec who ran Google Federal, the company's military sales division, said in 2008.
It was true. With insiders plying their trade, Google's expansion into the world of military and intelligence contracting took off.
What kind of work?
Here are just a few data points from Surveillance Valley :
- "In 2007, it partnered with Lockheed Martin to design a visual intelligence system for the NGA that displayed US military bases in Iraq and marked out Sunni and Shiite neighborhoods in Baghdad -- important information for a region that had experienced a bloody sectarian insurgency and ethnic cleansing campaign between the two groups."
- "In 2008, Google won a contract to run the servers and search technology that powered the CIA's Intellipedia, an intelligence database modeled after Wikipedia that was collaboratively edited by the NSA, CIA, FBI, and other federal agencies."
- "In 2010, as a sign of just how deeply Google had integrated with US intelligence agencies, it won a no-bid exclusive $27 million contract to provide the NGA with "geospatial visualization services," effectively making the Internet giant the "eyes" of America's defense and intelligence apparatus."
- "In 2008, Google entered into a three-way partnership with the NGA and a quasi-government company called GeoEye to launch a spy satellite called GeoEye-1. The new satellite, which was funded in large part by the NGA, delivered extremely high-resolution images for the exclusive use of NGA and Google."
- A few years ago it started working with PredPol, a California-based predictive policing startup. "PredPol did more than simply license Google's technology to render the mapping sys- tem embedded in its product but also worked with Google to develop customized functionality, including 'building additional bells and whistles and even additional tools for law enforcement.'"
More from the book:
"Google has been tightlipped about the details and scope of its contracting business. It does not list this revenue in a separate column in quarterly earnings reports to investors, nor does it provide the sum to reporters. But an analysis of the federal contracting database maintained by the US government, combined with information gleaned from Freedom of Information Act requests and published periodic reports on the company's military work, reveals that Google has been doing brisk business selling Google Search, Google Earth, and Google Enterprise (now known as G Suite) products to just about every major military and intelligence agency: navy, army, air force, Coast Guard, DARPA, NSA, FBI, DEA, CIA, NGA, and the State Department. Sometimes Google sells directly to the government, but it also works with established contractors like Lockheed Martin, Raytheon, Northrop Grumman, and SAIC (Science Applications International Corporation), a California-based intelligence mega-contractor that has so many former NSA employees working for it that it is known in the business as 'NSA West.'"
-- Yasha Levine
Want to know more?
Read "Surveillance Valley: The Secret Military History of the Internet"
Mar 22, 2018 | turcopolier.typepad.com
Jack 21 March 2018 at 05:45 PMTTG should love this article. Only difference is that in the writer's view the Trump campaign was far more effective than the Russian trolls.
https://www.zerohedge.com/news/2018-03-21/it-wasnt-russia-it-was-obama-based-social-media-mining-beat-hillaryThe reason Hillary Clinton did not win despite the media and social media companies doing everything they could to rig the election in her favor is because Facebook double dipped and allowed Cambridge Analytica to use their surveying tools to collect user data on tens of millions of users. This data was then used to target tens of millions of users with political advertising using Facebook's ad platform based on psycholgoical profiles from data they bought or acquired from Facebook.
Facebook is basically responsible for feeding the analytics system that enabled Cambridge Analytica and the Trump campaign to be so targeted and effective with a minimal budget.....
That's what happened, that's how Trump won. It wasn't the Russians, it was our own social media companies who sold our data to the Trump campaign which they then likely used to convince liberals not to vote in swing states.
It's both horrifying, and cleverly brilliant at the same time.
The funny thing is, Obama did something similar in 2012 and liberals celebrated. Not so funny when the other team takes your trick and executes it more effectively now is it?
Mar 21, 2018 | www.nakedcapitalism.com
Readers report that Facebook keeps asking them to reactivate their accounts. Wolf confirms that and adds critically important point in his post: you can never escape Facebook. Facebook continues to sell your data even if you have "deleted" your account.
I doubt enough people are aware of that issue. Having delete mean delete, as in Facebook wipes your data entirely, should become a key demand in the row over Facebook's information "sharing" policies.
By Wolf Richter, a San Francisco based executive, entrepreneur, start up specialist, and author, with extensive international work experience. Originally published at Wolf Street
Things at Facebook came to a head, following the disclosure that personal data from 50 million of its users had been given to a sordid outfit in the UK, Cambridge Analytica, whose business model is to manipulate elections by hook or crook around the world, and which is now getting vivisected by UK and US authorities.
The infamous "person familiar with the matter" told Bloomberg that the Federal Trade Commission has opened an investigation into whether Facebook violated a consent decree dating back to 2011, when Facebook settled similar allegations -- giving user data to third parties without user's knowledge or consent. Bloomberg:
Under the 2011 settlement, Facebook agreed to get user consent for certain changes to privacy settings as part of a settlement of federal charges that it deceived consumers and forced them to share more personal information than they intended. That complaint arose after the company changed some user settings without notifying its customers, according to an FTC statement at the time.
If Facebook is found to be in violation of the consent decree, the FTC can extract a fine of $40,000 per day, per violation. Given the 50 million victims spread over so many days, this could be some real money, so to speak.
Facebook said in a statement, cited by Bloomberg, that it rejected "any suggestion of violation of the consent decree." It also said with tone-deaf Facebook hilarity, "Privacy and data protections are fundamental to every decision we make."
That Facebook is collecting every little bit of personal data it can from its users and their contacts and how they react to certain things, their preferences, their choices, physical appearance -- photos, I mean come on -- clues about their personalities, and the like has been known from day one. That's part of its business model. It's not a secret.
That third parties have access to this data has also been known at least since 2011. Advertisers also have had access to certain types of data to target their ads.
And yet, Facebook's user base has grown. More than ever, people put their entire lives on Facebook -- maybe not the kids, as they've become enamored with other platforms, but their moms. Babies are on Facebook long before they have any idea what Facebook is. There's a generation growing up that has been on Facebook since birth.
When the Equifax hack occurred last year -- which Equifax disclosed graciously and partially months after the fact on September 7 -- the personal data of what has now grown to 145.5 million consumers was stolen. This included names, birth dates, Social Security numbers, addresses, and "in some instances," driver's license numbers, and other data.
This shocked the world that pays attention to this because the data breach could unleash a tsunami of identity theft. But most consumers who saw it in the media simply shrugged and went on. They could have put a credit freeze on their accounts with the credit bureaus, thus making it nearly impossible for someone else to get a loan or credit card in their name (identity theft). But few consumers put a credit freeze on their accounts. Many consumers still don't know what Equifax is or what it does, and when you discuss the situation, they think you're spouting off conspiracy theories.
But there is a difference between credit bureaus such as Equifax and social media platforms such as Facebook.
With credit bureaus, consumers have no choice. They're forced to be part of the credit-bureau data bases. Their data is collected, and there is nothing they can do about it. Consumer protection should be the number one priority. When companies get hacked and this consumer data gets stolen, there should be harsh punishments against these companies if they're found to have been negligent. Arthur Andersen comes to mind.
But with Facebook and other social media platforms, there is no coercion. Consumers submit their most private data voluntarily -- nay, eagerly. They jump through hoops to share this stuff with the rest of the world. So maybe they only want to share it with x and not with y, but heck, they're uploading it to the Internet. What do they expect?
And there is another difference between Equifax and Facebook: Equifax was hacked and the data was stolen . Facebook gave away the data as part of its business model.
But they do have a major trait in common: An aggrieved consumer cannot delete the data these outfits have collected on that consumer. While Facebook allows you to "delete" items and "delete" your account, the data stays behind on the server. It's available for all purposes; it's just not publicly viewable.
So now there's a hue and cry in the media about Facebook, put together by reporters who are still active on Facebook and who have no intention of quitting Facebook. There has been no panicked rush to "delete" accounts. There has been no massive movement to quit Facebook forever. Facebook does what it does because it does it, and because it's so powerful that it can do it. A whole ecosystem around it depends on the consumer data it collects.
Yes, there will be the usual ceremonies that Equifax also went through: CEO Zuckerberg may get to address the Judiciary Committee in Congress. The questions thrown at him for public consumption will be pointed. But behind the scenes, away from the cameras, there will be the usual backslapping between lawmakers and corporations. Publicly, there will be some wrist-slapping and some lawsuits, and all this will be settled and squared away in due time. Life will go on. Facebook will continue to collect the data because consumers continue to surrender their data to Facebook voluntarily. And third parties will continue to have access to this data.
With Facebook, consumers are in total control: They can just refuse to open an account. And if they have already opened an account, they can delete the app on their mobile devices, clean the cache on their computers, and swear to not ever again sign back in. If enough consumers do that, the whole construct would come down.
The only act that would change anything is if consumers massively and forever abandon Facebook and platforms like it, and never-ever sign on again. That would bulldoze the whole problem away. But that's not going to happen because consumers don't want it to happen.
So as far as I'm concerned, people who are still active on Facebook cannot be helped. They should just enjoy the benefits of having their lives exposed to the world and serving as a worthy tool and resource for corporate interests, political shenanigans, election manipulators, jealous exes, and other facts of life.
Meanwhile, these dang trillions are flying by so fast, they're hard to see. Read US Gross National Debt Spikes $1.2 Trillion in 6 Months, Hits $21 Trillion
Mar 21, 2018 | www.zerohedge.com
As it turns out, Ulbricht's lawyers were on to something.
In a blockbuster report published Tuesday in the Intercept, reporter Sam Biddle cited several documents included in the massive cache of stolen NSA documents that showed that the agency has been tracking bitcoin users since 2013, and has potentially been funneling some of this information to other federal agencies. Or, as Biddle puts it, maybe the conspiracy theorists were right.
It turns out the conspiracy theorists were onto something. Classified documents provided by whistleblower Edward Snowden show that the National Security Agency indeed worked urgently to target Bitcoin users around the world - and wielded at least one mysterious source of information to "help track down senders and receivers of Bitcoins," according to a top-secret passage in an internal NSA report dating to March 2013. The data source appears to have leveraged the NSA's ability to harvest and analyze raw, global internet traffic while also exploiting an unnamed software program that purported to offer anonymity to users, according to other documents.
Using its ability to siphon data directly from the fiber-optic cables, the NSA managed to develop a system for tracing transactions that went well beyond simple blockchain analysis. The agency relied on a program called MONKEYROCKET , a sham Internet-anonymizing service that, according to the documents, was primarily deployed in Asia, Africa and South America with the intention of thwarting terrorists.
The documents indicate that "tracking down" Bitcoin users went well beyond closely examining Bitcoin's public transaction ledger, known as the Blockchain, where users are typically referred to through anonymous identifiers; the tracking may also have involved gathering intimate details of these users' computers.
The NSA collected some Bitcoin users' password information, internet activity, and a type of unique device identification number known as a MAC address, a March 29, 2013 NSA memo suggested. In the same document, analysts also discussed tracking internet users' internet addresses, network ports, and timestamps to identify "BITCOIN Targets."
The NSA's budding Bitcoin spy operation looks to have been enabled by its unparalleled ability to siphon traffic from the physical cable connections that form the internet and ferry its traffic around the planet. As of 2013, the NSA's Bitcoin tracking was achieved through program code-named OAKSTAR, a collection of covert corporate partnerships enabling the agency to monitor communications, including by harvesting internet data as it traveled along fiber optic cables that undergird the internet.
Specifically, the NSA targeted Bitcoin through MONKEYROCKET, a sub-program of OAKSTAR, which tapped network equipment to gather data from the Middle East, Europe, South America, and Asia, according to classified descriptions. As of spring 2013, MONKEYROCKET was "the sole source of SIGDEV for the BITCOIN Targets," the March 29, 2013 NSA report stated, using the term for signals intelligence development, "SIGDEV," to indicate the agency had no other way to surveil Bitcoin users. The data obtained through MONKEYROCKET is described in the documents as "full take" surveillance, meaning the entirety of data passing through a network was examined and at least some entire data sessions were stored for later analysis.
Naturally, once the NSA got involved, the notion of anonymity - whether with bitcoin, or even some of the privacy-oriented coins like Zcash - was completely crushed.
Emin Gun Sirer, associate professor and co-director of the Initiative for Cryptocurrencies and Contracts at Cornell University, told The Intercept that financial privacy "is something that matters incredibly" to the Bitcoin community, and expects that "people who are privacy conscious will switch to privacy-oriented coins" after learning of the NSA's work here. Despite Bitcoin's reputation for privacy, Sirer added, "when the adversary model involves the NSA, the pseudonymity disappears. You should really lower your expectations of privacy on this network."
Green, who co-founded and currently advises a privacy-focused Bitcoin competitor named Zcash, echoed those sentiments, saying that the NSA's techniques make privacy features in any digital currencies like Ethereum or Ripple "totally worthless" for those targeted.
While bitcoin appeared to be the NSA's top target, it wasn't the agency's only priority. The NSA also used its unparalleled surveillance powers to take down Liberty Reserve - a kind of proto-ICO that was involved in money laundering. Though the company was based in Costa Rica, the Department of Justice partnered with the IRS and Department of Homeland Security to arrest its founder and hand him a 20-year prison sentence.
The March 15, 2013 NSA report detailed progress on MONKEYROCKET's Bitcoin surveillance and noted that American spies were also working to crack Liberty Reserve, a far seedier predecessor. Unlike Bitcoin, for which facilitating drug deals and money laundering was incidental to bigger goals, Liberty Reserve was more or less designed with criminality in mind. Despite being headquartered in Costa Rica, the site was charged with running a $6 billion "laundering scheme" and triple-teamed by the U.S. Department of Justice, Homeland Security, and the IRS, resulting in a 20-year conviction for its Ukrainian founder. As of March 2013 -- just two months before the Liberty Reserve takedown and indictment -- the NSA considered the currency exchange its No. 2 target, second only to Bitcoin. The indictment and prosecution of Liberty Reserve and its staff made no mention of help from the NSA.
Of course, several of the agency's defenders argued that the notion that the NSA would use these programs to spy on innocuous bitcoin users is "pernicious", according to one expert source.
The hypothesis that the NSA would "launch an entire operation overseas under false pretenses" just to track targets is "pernicious," said Matthew Green, assistant professor at the Johns Hopkins University Information Security Institute. Such a practice could spread distrust of privacy software in general, particularly in areas like Iran where such tools are desperately needed by dissidents. This "feeds a narrative that the U.S. is untrustworthy," said Green. "That worries me."
But forget bitcoin: the notion that the NSA has been illegally feeding intelligence to other federal intelligence and law enforcement agencies has been a watershed issue for civil libertarians, with implications far beyond cryptocurrency money laundering . The process, known as "parallel construction", would, if definitive proof could ever be obtained by a defense attorney, render an entire case as inadmissible.
Civil libertarians and security researchers have long been concerned that otherwise inadmissible intelligence from the agency is used to build cases against Americans though a process known as "parallel construction": building a criminal case using admissible evidence obtained by first consulting other evidence, which is kept secret, out of courtrooms and the public eye. An earlier investigation by The Intercept, drawing on court records and documents from Snowden, found evidence the NSA's most controversial forms of surveillance, which involve warrantless bulk monitoring of emails and fiber optic cables, may have been used in court via parallel construction.
The timing of the Intercept's report is also interesting. We reported last year that a Russian national named Alexander Vinnick, the alleged mastermind of a $4 billion bitcoin-based money laundering operation, had been arrested following an indictment that levied 21 counts of money laundering and other crimes that could land him in a US prison for up to 55 years.
And given the justice system's treatment of other cryptocurrency-related criminals, the notion that Vinnick might spend multiple decades in prison is not beyond the realm of possibility. Of course, if the case against him is built on illegally obtained evidence, one would think his defense team would want to know.
Heavily redacted versions of the Snowden documents are available on the Intercept's website.
wee-weed up -> J S Bach Tue, 03/20/2018 - 19:05 PermalinkBaron von Bud -> Coinista Tue, 03/20/2018 - 20:25 Permalink
"NSA Has Been Tracking Bitcoin Users Since 2013, New Snowden Documents Reveal"
Yep, I knew it! I've been trying to tell the crypto-enthusiasts that the gov't is on their trail, but they are in utter denial. They think their tech is superior. Sad mistake.
So again I ask... can you say... "Poof it's gone!"Baron von Bud -> lookslikecraptome Tue, 03/20/2018 - 22:41 Permalink
I don't believe the NSA knows the content of crypto transactions due to packet data encryption. They do likely know the identities of frequent Bitcoin users via traffic tracking. Infrequent users very unlikely. That's what the IT programmer in me says. But we're talking Ed Snowden who knows a lot about networks and encryption. This suggests that NSA has a man-in-the-middle attack.NiggaPleeze -> Coinista Tue, 03/20/2018 - 21:50 Permalink
Nobody cracked TOR and the code is open source. Identities were determined via the host site communications not in TOR transit. The govt does have https keys - isp told me. But software encrypted data in packets - no they don't. TOR and OpenPGP are very good to have with govts and social media getting more abusive collecting/selling any data that will bring a buck.
Well, NSA developed TOR. Then they developed bitcoin to work on TOR. How much you want to bet they have infiltrated every single exchange?
They are watching you. Five eyes.
Mar 20, 2018 | telegraph.co.uk
T he data analysis firm at the centre of a privacy scandal came under more pressure on Monday when Channel 4 broadcast footage of Cambridge Analytica's chief executive discussing using bribes, former spies and Ukrainian women to entrap politicians.
It emerged as the Information Commissioner said she was seeking a warrant to search its computers and servers as part of investigation into the use of personal data of Facebook users.
The controversy wiped billions of dollars off Facebook's value as its founder, Mark Zuckerberg, faced questions on both sides of the Atlantic about how a private company was able to gather personal information of 50 million users.
Trouble for Cambridge Analytica deepened...
Mar 20, 2018 | www.moonofalabama.org
karlof1 , Mar 19, 2018 7:34:36 PM | 56Well, there seems to be a new wrinkle in the Skripal hoax, Adam Garrie muses :karlof1 , Mar 19, 2018 7:51:59 PM | 58
"... whether the still evidence free accusations that Russia was behind the poisoning of a former double-agent on UK soil, are not related to the breaking of the Cambridge Analytica scandal. The revelations from Christopher Wylie were published by the New York Times and The Observer (an off-shoot of The Guardian) on the 17th of March, just three days after the British Prime Minister announced that she has found Russia guilty of murder, in spite of failing to produce any real evidence. Logic would dictate that it took far more than three days to produce and edit the piece about Wylie's revelations."
Assange, Snowden and others join Garrie in saying the real investigation ought to be of Cambridge. Assange also notes on his Twitter the massive mining the Obama campaign did via Facebook in 2012--an action it appears Cambridge copied for Trump's campaign. Given the info on Assange's Twitter, Cambridge and Facebook are both up to their necks in the illegal mining of personal data and worse.Add to my @56--
Snowden on "Social Media" companies :
"Businesses that make money by collecting and selling detailed records of private lives were once plainly described as "surveillance companies." Their rebranding as "social media" is the most successful deception since the Department of War became the Department of Defense."
And an observation about the reports of Russian election ballot box stuffing -- none of the reports I've seen say for which candidate the stuffing was for. Clearly, Putin didn't need any help, so I suspect US/UK embassy staffers going around and trying to help their liberal candidates get at least 1% of the vote. Russia's election authority did announce there were irregularities including the stuffing, a fact omitted from the items I read, which all implied it was Putin's team that did the deed.
Mar 18, 2018 | www.zerohedge.com
NSA whistleblower and former CIA employee Edward Snowden slammed Facebook in a Saturday tweet following the suspension of Strategic Communication Laboratories (SCL) and its political data analytics firm, Cambridge Analytica, over what Facebook says was imporoper use of collected data.
In a nutshell, in 2015 Cambridge Analytica bought data from a University of Cambridge psychology professor, Dr. Aleksandr Kogan, who had developed an app called "thisisyourdigitallife" that vacuumed up loads of information on users and their contacts. After making Kogan and Cambridge Analytica promise to delete the data the app had gathered, Facebook received reports (from sources they would not identify) which claimed that not all the data had been deleted - which led the social media giant to delete Cambridge Analytica and parent company SCL's accounts.
"By passing information on to a third party, including SCL/Cambridge Analytica and Christopher Wylie of Eunoia Technologies, he violated our platform policies. When we learned of this violation in 2015, we removed his app from Facebook and demanded certifications from Kogan and all parties he had given data to that the information had been destroyed. Cambridge Analytica, Kogan and Wylie all certified to us that they destroyed the data." - Facebook
Of note, Cambridge Analytica worked for Ted Cruz and Ben Carson during the 2016 election before contracting with the Trump campaign. Cruz stopped using CA after their data modeling failed to identify likely supporters.
Cambridge Analytica has vehemently denied any wrongdoing in a statement.
In response to the ban, Edward Snowden fired off two tweets on Saturday criticizing Facebook, and claimed social media companies were simply "surveillance companies" who engaged in a "successful deception" by rebranding themselves.
Snowden isn't the first big name to call out Silicon Valley companies over their data collection and monitoring practices, or their notorious intersection with the U.S. Government.
In his 2014 book: When Google Met WikiLeaks , Julian Assange describes Google's close relationship with the NSA and the Pentagon.
Around the same time, Google was becoming involved in a program known as the "Enduring Security Framework" (ESF), which entailed the sharing of information between Silicon Valley tech companies and Pentagon-affiliated agencies "at network speed." Emails obtained in 2014 under Freedom of Information requests show Schmidt and his fellow Googler Sergey Brin corresponding on first-name terms with NSA chief General Keith Alexander about ESF Reportage on the emails focused on the familiarity in the correspondence: "General Keith . . . so great to see you . . . !" Schmidt wrote. But most reports overlooked a crucial detail. " Your insights as a key member of the Defense Industrial Base," Alexander wrote to Brin, "are valuable to ensure ESF's efforts have measurable impact." - Julian Assange
Kim Dotcom has also opined on social media's close ties to the government, tweeting in February "Unfortunately all big US Internet companies are in bed with the deep state. Google, Facebook, YouTube, Twitter, etc. are all providing backdoors to your data."
In 2013, the Washington Post and The Guardian revealed that the NSA has backdoor access to all major Silicon Valley social media firms, including Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple - all through the notorious PRISM program which began in 2007 under the Protect America Act. PRISM's existence was leaked by Edward Snowden before he entered into ongoing asylum in Moscow. Microsoft was the first company to join the PRISM program.
The NSA has the ability to pull any sort of data it likes from these companies, but it claims that it does not try to collect it all. The PRISM program goes above and beyond the existing laws that state companies must comply with government requests for data, as it gives the NSA direct access to each company's servers -- essentially letting the NSA do as it pleases. - The Verge
After PRISM's existence was leaked by Snowden, the Director of National Intelligence issued a statment which stated that the only people targed by the programs are "outside the United States," and that the program "does not allow" the targeting of citizens within US borders.
In 2006, Wired magazine published evidence from a retired AT&T communications technician, Mark Klein, that revealed a secret room used to "split" internet data at a San Francisco office as part of the NSA's bulk data collection techniques used on millions of Americans.
During the course of that work, he learned from a co-worker that similar cabins were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego, he said.
The split circuits included traffic from peering links connecting to other internet backbone providers, meaning that AT&T was also diverting traffic routed from its network to or from other domestic and international providers , Klein said. - Wired
"They are collecting everything on everybody," Klein said.
HRH of Aquitaine 2.0 Sun, 03/18/2018 - 17:22 PermalinkMusicIsYou Sun, 03/18/2018 - 17:44 Permalink
He is right. If you didn't hear about the speech given by Tommy Robinson on Speaker's Corner in Hyde Park, watch it here: https://youtu.be/LWk-amymTXAabgary1 Sun, 03/18/2018 - 17:49 Permalink
Well look on the bright side, only idiots are placing their most vital thoughts, and innovations on Facebook or any social media for that matter. So basically big brother has acres of databases full of idiotic things. Believe me, if it can take humans a step into the future, its not on the web. So basically big brother is mining through vast amounts of useless data. Here's your sign!Usura Sun, 03/18/2018 - 17:57 Permalink
We are giving away our privacy and thus our freedom for convenience sake.
We need to stop that.
Get off the mobile devises, the social media sites and use cash.
Anything that leaves a digital footprint can be tracked.
Citizen Four, the Ed Snowden documentary, explains how invasive the surveillance on innocent people by the national security agencies really is.
The data for that surveillance is supplied by the tech cos, telecoms and banks.GreatUncle Sun, 03/18/2018 - 18:12 Permalink
I have often wondered if the VC money for these tech companies came from MOSAD.WTFUD -> navy62802 Sun, 03/18/2018 - 17:27 Permalink
only people targed by the programs are "outside the United States,"
So every sovereign nation around the world allow their citizens rights to be violated.
Just a little point there when you consider who or what is running your country.navy62802 -> WTFUD Sun, 03/18/2018 - 17:41 Permalink
Started up with 3 geeks and morphed into a Deep State Wet Dream.thatthingcanfly -> navy62802 Sun, 03/18/2018 - 17:51 Permalink
I think it was "deep state" from the very beginning ... not an original idea from Zuckerberg and his estranged friends.Oldwood -> thatthingcanfly Sun, 03/18/2018 - 17:57 Permalink
Not a doubt in your mind, huh?
If you actually worked for the Navy for any period of time, you should know that this government cannot tie its own shoes. No way are any of your whacked-out conspiracy theories even remotely possible.
Yes, Zuckerberg and the Winkelvoss twins came up with Facebook for social reasons. The government spy agencies, who know a good opportunity to use someone else's invention to serve their own ends when they see one, co-opted it. It really doesn't have to be any more complicated than that.navy62802 -> thatthingcanfly Sun, 03/18/2018 - 18:22 Permalink
The fact of WHO did this is irrelevant. What matters is that we should have understood what this meant from the begining. Many did, many more did not. We complain of being treated like sheep, bleeting all the way to our pens.
What we must accept is that there are many who could care less about liberty, happy to live in a cell, as long as th econveniences continue to poor in.
I wonder how livestock feel about living in a pen while receiving free food and healthcare? I wonder if given the choice of freedom or feed lot, which way they would go. I think we see the answer in the inner cities of our nation (and others).JPMorgan Sun, 03/18/2018 - 17:22 Permalink
I know. If only I had worked for the navy for a period of time ...VWAndy Sun, 03/18/2018 - 17:22 Permalink
Totally agree, but that could be said for any US based company.
Google, Microsoft, Yahoo, Facebook, Twitter, Snap... take your pick, bets are you using one of them.HRH of Aquitaine 2.0 Sun, 03/18/2018 - 17:22 Permalink
Ya Think! FFS.WTFUD Sun, 03/18/2018 - 17:25 Permalink
He is right. If you didn't hear about the speech given by Tommy Robinson on Speaker's Corner in Hyde Park, watch it here: https://youtu.be/LWk-amymTXANumbersUsa Sun, 03/18/2018 - 17:26 Permalink
All your information are ours!me or you Sun, 03/18/2018 - 17:27 Permalink
Heads up! in case you're interested:
The Heroic Story of Andrew Jackson That "They (jew)" Don't Want You to Know
http://tomatobubble.com/andrew_the_great.htmlRKae Sun, 03/18/2018 - 17:30 Permalink
I think all of us are very aware of that.
There is not new on his comments.CoCosAB Sun, 03/18/2018 - 17:32 Permalink
It's all well and good to be disgusted by surveillance, but it's ever-encroaching, and soon you won't be able to function without complying. Privacy will be impossible, except for the elite for whom privacy will be another luxury that they get which you don't. Sort of like a gun.ExPat2018 Sun, 03/18/2018 - 17:33 Permalink
SLAVES don't give a shit about that...Labworks Sun, 03/18/2018 - 17:39 Permalink
One thing about FB .Google etc et
Its all run by KIKESI am Groot Sun, 03/18/2018 - 17:41 Permalink
Social media is cooperating with the government.
Mass spy program.
Get out if you have any brains left2rigged2fail Sun, 03/18/2018 - 17:44 Permalink
I initially thought Snowden was a traitor. But over careful examination, he exposed lying by Brennan and Clapper, unwarranted surveillance of Americans and lot of complete lies told by the government to We The People.MusicIsYou Sun, 03/18/2018 - 17:44 Permalink
Dtube of bitchute
Brazen Heist Sun, 03/18/2018 - 17:47 Permalink
Well look on the bright side, only idiots are placing their most vital thoughts, and innovations on Facebook or any social media for that matter. So basically big brother has acres of databases full of idiotic things. Believe me, if it can take humans a step into the future, its not on the web. So basically big brother is mining through vast amounts of useless data. Here's your sign!swamp Sun, 03/18/2018 - 17:47 Permalink
Some of us are impervious to their lies and deception.
They're going to have to try much harder. Not everybody is a fucking fool as they had hoped.
In fact, once you cross a certain threshold, it becomes fun to slice through their shitty propaganda, like a hot knife through lard.
ExPat2018 -> swamp Sun, 03/18/2018 - 17:49 Permalink
It is also a brain washing machine.ExPat2018 Sun, 03/18/2018 - 17:48 Permalink
In the case of Americans. what brains??pparalegal Sun, 03/18/2018 - 17:48 Permalink
The people can turn this around on (((((((((them)))))))))) but its hard to get 200-300 million to work together.
You could flood their services with threats and crap and make DHS, FBI, go nuts.abgary1 Sun, 03/18/2018 - 17:49 Permalink
I make them work for their paychecks. I love sending encrypted kitty videos from my Google account.ExPat2018 -> abgary1 Sun, 03/18/2018 - 18:17 Permalink
We are giving away our privacy and thus our freedom for convenience sake.
We need to stop that.
Get off the mobile devises, the social media sites and use cash.
Anything that leaves a digital footprint can be tracked.
Citizen Four, the Ed Snowden documentary, explains how invasive the surveillance on innocent people by the national security agencies really is.
The data for that surveillance is supplied by the tech cos, telecoms and banks.ExPat2018 -> abgary1 Sun, 03/18/2018 - 18:21 Permalink
you forgot to end the sentence. IN THE USAExPat2018 Sun, 03/18/2018 - 17:54 Permalink
You live in the USA, kid? how much do you pay for monthly internet?
I pay 19 euros a month for unlimited fiber optic broadband and 10 euros a month for 4G+ LTE UNLIMITED for my tablet and smartphone.
user2011 Sun, 03/18/2018 - 17:54 Permalink
Fuck social media
Last year as a test I sent as friend in the USA a 128GB microSDcard filled with documents., UNDER a POSTAGE STAMP using Snail Mail
Not at all detectable.
Went thru with flying colours
You know how many documents that is? A LOTExPat2018 -> user2011 Sun, 03/18/2018 - 17:55 Permalink
Tape over the user facing camera, don't use finger print to unlock, and dont do voice search, it will buy you a bit more time before they can profile u completely. Of course, stay away from FB. Install no script addon to your Firefox browser.Alexander De Large Sun, 03/18/2018 - 17:56 Permalink
Don't use any of them even though my Galaxy S8 has all of them I have disabled them.Usura Sun, 03/18/2018 - 17:57 Permalink
Good.Bill Melater Sun, 03/18/2018 - 18:06 Permalink
I have often wondered if the VC money for these tech companies came from MOSAD.ExPat2018 Sun, 03/18/2018 - 18:08 Permalink
Of course it is. It is also a fabulous tool for wannabe terrorists and spies of all kind - not just Russians.smacker -> ExPat2018 Sun, 03/18/2018 - 18:17 Permalink
Wolf Blitzer and CNN accuse Russia of influencing Russian election.GreatUncle Sun, 03/18/2018 - 18:12 Permalink
LOL :-)ExPat2018 -> GreatUncle Sun, 03/18/2018 - 18:16 Permalink
only people targed by the programs are "outside the United States,"
So every sovereign nation around the world allow their citizens rights to be violated.
Just a little point there when you consider who or what is running your country.opsyn Sun, 03/18/2018 - 18:16 Permalink
I live outside of the USA since 1989.
The USA govt tried to push my IP to comply with torrents sites and they told them to go to hell.
hahahCaptain Nemo d Sun, 03/18/2018 - 18:18 Permalink
That's where I'm counting on. Years of showing middle finger for every potential partner related to potential use of this surveillance media. I wanna piss everyone off big time, make myself active target, and to see what happens.MusicIsYou Sun, 03/18/2018 - 18:23 Permalink
far beyond the scant details you voluntarily post
How many fell for the voluntarily send us your scantily-clad details for out record scam?
Picture this: a civilization muzzled for decades upon decades by political correctness, the pressures building inside people not being able to spout off at the mouth. Then along comes the internet and socials where people can imagine they're anonymously blabbing away at the keyboard. My point is that most people mean very little of what they put on the web, it's just that the dam broke with the onset of the web. That's another reason data collection is useless.
Mar 15, 2018 | www.washingtonpost.com
Julian Assange is editor of WikiLeaks.
Mike Pompeo, in his first speech as director of the CIA, chose to declare war on free speech rather than on the United States' actual adversaries. He went after WikiLeaks, where I serve as editor, as a "non-state hostile intelligence service." In Pompeo's worldview, telling the truth about the administration can be a crime -- as Attorney General Jeff Sessions quickly underscored when he described my arrest as a "priority." News organizations reported that federal prosecutors are weighing whether to bring charges against members of WikiLeaks, possibly including conspiracy, theft of government property and violating the Espionage Act.
All this speech to stifle speech comes in reaction to the first publication in the start of WikiLeaks' "Vault 7" series. Vault 7 has begun publishing evidence of remarkable CIA incompetence and other shortcomings. This includes the agency's creation, at a cost of billions of taxpayer dollars, of an entire arsenal of cyber viruses and hacking programs -- over which it promptly lost control and then tried to cover up the loss. These publications also revealed the CIA's efforts to infect the public's ubiquitous consumer products and automobiles with computer viruses.
When the director of the CIA, an unelected public servant, publicly demonizes a publisher such as WikiLeaks as a "fraud," "coward" and "enemy," it puts all journalists on notice, or should. Pompeo's next talking point, unsupported by fact, that WikiLeaks is a "non-state hostile intelligence service," is a dagger aimed at Americans' constitutional right to receive honest information about their government. This accusation mirrors attempts throughout history by bureaucrats seeking, and failing, to criminalize speech that reveals their own failings.
President Theodore Roosevelt understood the danger of giving in to those "foolish or traitorous persons who endeavor to make it a crime to tell the truth about the Administration when the Administration is guilty of incompetence or other shortcomings." Such "endeavor is itself a crime against the nation," Roosevelt wrote. President Trump and his officials should heed that advice .
The custom software program was secretly built last year to comply with a classified US government directive. The program scanned hundreds of millions of Yahoo Mail accounts, according to revelations first reported by Reuters.
It is not known whether the directive, which was sent to the company's legal team, came from the National Security Agency or the FBI, according to the two former Yahoo employees. It is also not known what the intelligence officials were seeking, except wanting the company to search for a set of characters, which could mean a phrase in an email or an attachment.
The former employees said Yahoo CEO Marissa Mayer's decision to follow the directive angered some senior executive and led to the departure of Alex Stamos, the company's chief information officer.
When Stamos discovered Mayer had authorized the program, he told his subordinates that he had been left out of a decision that hurt users' security, the sources said. Due to a programming flaw, he told them, hackers could have accessed the stored emails.
Yahoo said in a statement issued to Reuters about the intelligence demand that it "is a law abiding company, and complies with the laws of the United States."
Surveillance experts told Reuters this is the first case to surface of an US internet company agreeing to a spy agency's demand by searching all arriving messages, as opposed to requests for stored messages or scanning a small number of accounts in real time.
Mar 09, 2018 | www.defenddemocracy.pressThose Who Controlled the Past Should Not Control the Future
by Norman SolomonDaniel Ellsberg has a message that managers of the warfare state don't want people to hear.
March 09, 2018
"If you have information that bears on deception or illegality in pursuing wrongful policies or an aggressive war," he said in a statement released last week, "don't wait to put that out and think about it, consider acting in a timely way at whatever cost to yourself . Do what Katharine Gun did."
If you don't know what Katharine Gun did, chalk that up to the media power of the war system.
Ellsberg's video statement went public as this month began, just before the 15th anniversary of when a British newspaper, the Observer , revealed a secret NSA memo – thanks to Katharine Gun. At the UK's intelligence agency GCHQ, about 100 people received the same email memo from the National Security Agency on the last day of January 2003, seven weeks before the invasion of Iraq got underway. Only Katharine Gun, at great personal risk, decided to leak the document.
If more people had taken such risks in early 2003, the Iraq War might have been prevented. If more people were willing to take such risks in 2018, the current military slaughter in several nations, mainly funded by U.S. taxpayers, might be curtailed if not stopped. Blockage of information about past whistleblowing deprives the public of inspiring role models.
That's the kind of reality George Orwell was referring to when he wrote: "Who controls the past controls the future; who controls the present controls the past."
Fifteen years ago, "I find myself reading on my computer from the Observer the most extraordinary leak, or unauthorized disclosure, of classified information that I'd ever seen," Ellsberg recalled, "and that definitely included and surpassed my own disclosure of top-secret information, a history of US decision-making in Vietnam years earlier." The Pentagon Papers whistleblower instantly recognized that, in the Observer article, "I was looking at something that was clearly classified much higher than top secret . It was an operational cable having to do with how to conduct communications intelligence."
What Ellsberg read in the newspaper story "was a cable from the NSA asking GCHQ to help in the intercepting of communications, and that implied both office and home communications, of every member of the Security Council of the UN.
Now, why would NSA need GCHQ to do that? Because a condition of having the UN headquarters and the Security Council in the US in New York was that the US intelligence agencies promised or were required not to conduct intelligence on members of the UN. Well, of course they want that. So, they rely on their allies, their buddies in the British GCHQ, to commit these criminal acts for them. And with this clearly I thought someone very high in access in Britain intelligence services must dissent from what was already clear the path to an illegal war. "
... ... ...
* Norman Solomon is co-founder of RootsAction.org and founding director of the Institute for Public Accuracy . His books include War Made Easy: How Presidents and Pundits Keep Spinning Us to Death .
Mar 08, 2018 | ronpaulinstitute.orgBest Buy's Geek Squad has been discovered acting as undercover FBI informants, snooping on their customers' computers and reporting anything that looks amiss to the FBI...for cash payments!
And Google is teaming up with the Pentagon to help it better analyze drone footage for targeting and other purposes.
While once it seemed the big tech firms would provide us protection against the ever-prying eyes of the national security state, it seems now they have become arms of the national security state. We look at this troubling phenomenon in today's Liberty Report:
... ... ...
Mar 08, 2018 | turcopolier.typepad.com
David Habakkuk , 08 March 2018 at 10:28 AMPT and all,
More material on the British end of the conspiracy.
Commenting on an earlier piece by PT, I suggested that a key piece of evidence pointing to 'Guccifer 2.0' being a fake personality created by the conspirators in their attempt to disguise the fact that the materials from the DNC published by 'WikiLeaks' were obtained by a leak rather than a hack had to do with the involvement of the former GCHQ person Matt Tait.
(See http://turcopolier.typepad.com/sic_semper_tyrannis/2018/02/pieces-of-the-coup-puzzle-fall-into-place-by-publius-tacitus.html .)
To recapitulate: Back in June 2016, hard on the heels of the claim by Dmitri Alperovitch of 'CrowdStrike' to have identified clinching evidence making the GRU prime suspects, Tait announced that, although initially unconvinced, he had found a 'smoking gun' in the 'metadata' of the documents released by 'Guccifer 2.0.'
A key part of this was the use by someone modifying a document of 'Felix Edmundovich' – the name and patronymic of Dzerzhinsky, the Lithuanian-Polish noble who created the Soviet secret police.
As I noted, Tait was generally identified as a former GCHQ employee who now ran a consultancy called 'Capital Alpha Security.' However, checking Companies House records revealed that he had filed 'dormant accounts' for the company. So it looks as though the company was simply a 'front', designed to fool 'useful idiots' into believing he was an objective analyst.
As I also noted in those comments, Tait writes the 'Lawfare' blog, one of whose founders, Benjamin Wittes, looks as though he may himself have been involved in the conspiracy up to the hilt. Furthermore, a secure income now appears to have been provided to replace that from the non-existent consultancy, in the shape of a position at the 'Robert S. Strauss Center for International Security and Law', run by Robert Chesney, a co-founder with Wittes of 'Lawfare.'
A crucial part of the story, however, is that the notion of GRU responsibility for the supposed 'hacks' appears to be part of a wider 'narrative' about the supposed 'Gerasimov Doctrine.' From the 'View from Langley' provided to Bret Stephens by CIA Director Mike Pompeo at the 'Aspen Security Forum' last July:
'I hearken back to something called the Gerasimov doctrine from the early 70s, he's now the head of the – I'm a Cold War guy, forgive me if I mention Soviet Union. He's now the head of the Russian army and his idea was that you can win wars without firing a single shot or with firing very few shots in ways that are decidedly not militaristic, and that's what's happened. What changes is the costs; to effectuate change through cyber and through RT and Sputnik, their news outlets, and through other soft means; has just really been lowered, right. It used to be it was expensive to run an ad on a television station now you simply go online and propagate your message. And so they have they have found an effective tool, an easy way to go reach into our systems, and into our culture to achieve the outcomes they are looking for.'
(See https://aspensecurityforum.org/wp-content/uploads/2017/07/The-View-from-Langley.pdf .)
What has however become clear in recent days is that the 'Gerasimov Doctrine' was not invented by its supposed author, but by a British academic, Mark Galeotti, who has now confessed – although in a way clearly designed to maintain as much of the 'narrative' as possible.
Three days ago, an article by Galleoti appeared in 'Foreign Policy' entitled 'I'm Sorry for Creating the "Gerasimov Doctrine": I was the first to write about Russia's infamous high-tech military strategy. One small problem: it doesn't exist.'
(See http://foreignpolicy.com/2018/03/05/im-sorry-for-creating-the-gerasimov-doctrine/ .)
A key paragraph:
'Gerasimov was actually talking about how the Kremlin understands what happened in the "Arab Spring" uprisings, the "color revolutions" against pro-Moscow regimes in Russia's neighborhood, and in due course Ukraine's "Maidan" revolt. The Russians honestly – however wrongly – believe that these were not genuine protests against brutal and corrupt governments, but regime changes orchestrated in Washington, or rather, Langley. This wasn't a "doctrine" as the Russians understand it, for future adventures abroad: Gerasimov was trying to work out how to fight, not promote, such uprisings at home.'
The translation of the original article by Gerasimov with annotations by Galeotti which provoked the whole hysteria turns out to be a classic example of what I am inclined to term 'bad Straussianism.'
(See https://inmoscowsshadows.wordpress.com/2014/07/06/the-gerasimov-doctrine-and-russian-non-linear-war/ .)
What Strauss would have called the 'exoteric' meaning of the article quite clearly has to do with defensive strategies aimed at combatting the kind of Western 'régime change' projects about which people like those who write for 'Lawfare' are so enthusiastic. But Galeotti tells us that this is, at least partially, a cover for an 'esoteric' meaning, which has to do with offensive actions in Ukraine and similar places.
Having now read the text of the article, I can see a peculiar irony in it. In a section entitled 'You Can't Generate Ideas On Command', Gerasimov suggests that 'The state of Russian military science today cannot be compared with the flowering of military-theoretical thought in our country on the eve of World War II.'
According to the 'exoteric' meaning of the article, it is not possible to blame anyone in particular for this situation. But Gerasimov goes on on to remark that, while at the time of that flowering there were 'no people with higher degrees' or 'academic schools or departments', there were 'extraordinary personalities with brilliant ideas', who he terms 'fanatics in the best sense of the word.'
Again, Galeotti discounts the suggestion that nobody is to blame, assuming an 'esoteric meaning', and remarking: 'Ouch. Who is he slapping here?'
Actually, Gerasimov refers by name to two, utterly different figures, who certainly were 'extraordinarily personalities with brilliant ideas.'
If Pompeo had even the highly amateurish grasp of the history of debates among Soviet military theorists that I have managed to acquire he would be aware that one of the things which was actually happening in the 'Seventies was the rediscovery of the ideas of Alexander Svechin.
Confirming my sense that this has continued on, Gerasimov ends by using Svechin to point up an intractable problem: it can be extraordinarily difficult to anticipate the conditions of a war, and crucial not to impose a standardised template likely to be inappropriate, but one has to make some kinds of prediction in order to plan.
Immediately after the passage which Galeotti interprets as a dig at some colleague, Gerasimov elaborates his reference to 'extraordinary people with brilliant ideas' by referring to an anticipation of a future war, which proved prescient, from a very different figure to Svechin:
'People like, for instance, Georgy Isserson, who, despite the views he formed in the prewar years, published the book "New Forms Of Combat." In it, this Soviet military theoretician predicted: "War in general is not declared. It simply begins with already developed military forces. Mobilization and concentration is not part of the period after the onset of the state of war as was the case in 1914 but rather, unnoticed, proceeds long before that." The fate of this "prophet of the Fatherland" unfolded tragically. Our country paid in great quantities of blood for not listening to the conclusions of this professor of the General Staff Academy.'
Unlike Svechin, whom I have read, I was unfamiliar with Isserson. A quick Google search, however, unearthed a mass of material in American sources – including, by good fortune, an online text of a 2010 study by Dr Richard Harrison entitled 'Architect of Soviet Victory in World War II: The Life and Theories of G.S. Isserson', and a presentation summarising the volume.
Ironically, Svechin and Isserson were on opposite sides of fundamental divides. So the former, an ethnic Russian from Odessa, was one of the 'genstabisty', the former Tsarist General Staff officers who sided with the Bolsheviks and played a critical role in teaching the Red Army how to fight. Meanwhile Isserson was a very different product of the 'borderlands' – the son of a Jewish doctor, brought up in Kaunas, with a German Jewish mother from what was then Königsberg, giving him an easy facility with German-language sources.
The originator of the crucial concept of 'operational' art – the notion that in modern industrial war, the ability to handle a level intermediate between strategy and tactics was critical to success – was actually Svechin.
Developing the ambivalence of Clausewitz, however, he stressed that both the offensive and the defensive had their places, and that the key to success was to know which was appropriate when and also to be able rapidly to change from one to the other. His genuflections to Marxist-Leninist dogma, moreover, were not such as to take in any of Dzerzhinsky's people.
By contrast, Isserson was unambiguously committed to the offensive strand in the Clausewitzian tradition, and a Bolshevik 'true believer' (although he married the daughter of a dispossessed ethnically Russian merchant, who had their daughter baptised without his knowledge.)
As Harrison brings out, Isserson's working through of the problems of offensive 'operational art' would be critical to the eventual success of the Red Army against Hitler. However, the specific text to which he refers was, ironically, a warning of precisely one of the problems implicit in the single-minded reliance on the offensive: the possibility that one could be left with no good options confronting an antagonist similarly oriented – as turned out to be the case.
As Gerasimov intimates, while unlike Svechin, executed in 1938, Isserson survived the Stalin years, he was another of the victims of Dzerzhinsky's heirs. Arrested shortly before his warnings were vindicated by the German attack on 22 June 1941, he would spend the war in the Gulag and only return to normal life after Stalin's death.
So I think that the actual text of Gerasimov's article reinforces a point I have made previously. The 'evidence' identified by Tait is indeed a 'smoking gun.' But it emphatically does not point towards the GRU.
Meanwhile, another moral of the tale is that Americans really should stop being taken in by charlatan Brits like Galeotti, Tait, and Steele.
Mar 07, 2018 | www.theamericanconservative.com
b. March 7, 2018 at 2:21 pmWe have come a long way from the reactionary and authoritarian chants of "if you have done nothing wrong, you have nothing to hide" in the lead-up and then wake of the sarcastically name PATRIOT Act.
Surveillance and monitoring are, like all other "national securities" spending, primarily profit extraction driven public-private "partnerships", but the major point here always was "if you build it, they will use it".
That, too, is the foundational criticism driving Global Zero and the insistence that Article IV of the Non-Proliferation Treaty be honored by all signatory nuclear powers.
The basic principle of any evolutionary stable open society based on checks and balances is that no self-inflating institutions and power centers are permissible – whether that is inbred, networked multi-generational wealth, incorporated power such as financial institutions, or specific government institutions, such as the military, the "intelligence" agencies etc.
Of course, the whole idea of having secret courts applying secret law in secret decisions without adversary parties, and no mandatory disclosure after the fact, is also fundamentally incompatible with the idea of transparency and accountability, without which free speech and elections are little more than a travelling circus and a vehicle for advertising profit.
Mar 02, 2018 | www.zerohedge.com
milanolarry Fri, 03/02/2018 - 02:37 PermalinkHelena Bonham-Carter -> milanolarry Fri, 03/02/2018 - 02:39 Permalink
When I upgraded the Tor in my Android, it requested access to my phone hardware no. and all communication records. I was just wondering why the developers of Tor needed this information. Now, I think I have the answer.JPMorgan Fri, 03/02/2018 - 03:02 Permalink
The legitimate Tor application for Android ("Orbot") doesn't do that. You either downloaded a second-party Tor impostor app, or you have some OS problem with your phone.
Google doesn't need Tor's help, or anyone's help, to collect data directly from your phone on behalf of the USG.Helena Bonham-Carter -> JPMorgan Fri, 03/02/2018 - 03:15 Permalink
It's was either born out of a need for something secure for INTERNAL USE ONLY (and it got out)... or it's a big cluster fuck for those seeking online privacy.
I don't really know enough about how Tor works to make a informed opinion.
It was born our of a need for internal use, but not internal use only. In fact, it required external users to provide cover for internal users.
Mar 02, 2018 | turcopolier.typepad.com
Richardstevenhack 01 March 2018 at 04:50 PMI find it absurd that anyone is making it news that foreign governments are trying to find ways to manipulate White House connected officials. Surely this is the nature of the beast. Both in the US and in foreign governments. Why would anyone expect anything different. Ah, yes, because everyone in the US government is supposed to be honest, honorable, and of impeccable character (and brilliant to boot) - whereas anyone in a foreign government is a scumbag capable only of nefarious intentions and criminal methods.
Well, the latter might be true - but it's also true of the former.
As for SIGINT leaks, I suspect anyone in any government who isn't assuming their most encrypted conversations are immediately revealed to the NSA are idiots. If they don't know how it's being done, I would imagine they've already ordered their intelligence people to find out how. In the meantime, they're resigned to speaking over any communication link only information that isn't "Eyes Only" military technology secrets.
And even that isn't necessarily true. Yesterday Putin revealed no less than FIVE major Russian military breakthroughs in a speech.
So, yes, our leakers are revealing our SIGINT capabilities - without revealing how it's done. But since Snowden, my guess is most foreign government officials have already been told by their intelligence people that nothing they say is really secure unless it's face to face in a SCIF.
I have a meme I use in computer security: "You can haz better security, you can haz worse security. But you cannot haz 'security'. There is no security. Deal." It would behoove most people to take that to heart.
However, the Colonel is certainly correct in that our leakers appear intent to reveal our secrets for political purposes - and they should be arrested and imprisoned for that.
Mar 02, 2018 | www.zerohedge.com
Thom Paine Fri, 03/02/2018 - 03:12 PermalinkHelena Bonham-Carter -> Thom Paine Fri, 03/02/2018 - 03:17 Permalink
For fun I often run NORDvpn which apparently keeps no records, and you can even use its double VPN if you want (vpn in vpn tunnel),
You think that protects you? - well not really - each browser has a 'finger print' - the way you set up your browser, with add-ons etc gives it a finger print - so your setup maybe equivalent to 1 in 10,000 globally - and if they narrow down your location, maybe 1 in 5 and so on.
And don't search with Google
I think that by "apparently keeps no records" you mean "supposedly keeps no records".
Chances that their VPN server has not been infiltrated by the spy agencies of 12 countries:
Chances that Click&Clean, an "innovative and totally free solution for your PC", is not spying on you:
Turing-complete languages available to write a keylogger that runs inside your browser wi