|Home||Switchboard||Unix Administration||Red Hat||TCP/IP Networks||Neoliberalism||Toxic Managers|
|May the source be with you, but remember the KISS principle ;-)|
|News||Social Sites as intelligence collection tools||Recommended Links||Big Uncle is Watching You||Edward Snowden as Symbol of Resistance to National Security State|
|Big Brother is Watching You||Search engines privacy||Email Privacy||Blocking Facebook||Many faces of Facebook||Facebook as Giant Database about Users|
|Nephophobia: avoiding cloud to reclaim bits of your privacy||What Surveillance Valley knows about you||Neoliberalism as a New Form of Corporatism||Nineteen Eighty-Four||Interception of "in-transit" traffic as violation of human rights||Government security paranoia|
|Cyberstalking||Total control: keywords in your posts that might trigger surveillance||The Real War on Reality||How to collect and analyse your own metadata||Humor||Etc|
"None are more enslaved than those who
falsely believe they are free."
It’s not so disturbing that the aggregation occurs, it’s disturbing
that people don’t seem to understand just how “public” the Internet really is.
at The Last Hope conference, 2008
"One thing I find amusing is the absolute terror of Big Brother,
when we’ve all already gone and said, ‘Cuff me,’ to Little Brother,”
-- John Arquilla, an intelligence expert
at the Naval Postgraduate School in Monterey, Calif.
It is important to understand that any networked computer is an insecure computer and it should be treated as such. It’s not so disturbing that that social sites, government, insurance companies, etc collect our data; it’s disturbing that people don’t seem to understand just how “public” the Internet really is and how much their personal information they volunteer. Anybody who answered honestly question about their annual income and other confidential information while registering product (Logitech like to ask this information ;-) or enrolling into some stupid social site like Facebook, is an idiot, plain and simple. And he/'she gets what they deserve. Also if after reading this individual does not suspend his/her Facebook account for at least a month to see whether he/she need it or not, he/she does not care about his privacy one bit. For anybody with IQ above 100 it is clear that Facebook does not serve any useful purpose, other then collecting information about you and reselling it to the higher bidder. That's their business model.
|After revelation of Prism program, an excessive usage of cloud services from a fashionable trend instantly became an indication of a person stupidity.|
The current situation can be described as following:
In other words from the point of view of the completeness of the dossier the government has on you, STASI was an rank amateur. There is no escape form this reality. But you can follow some simple common sense rules to minimize your "footprint", although they do not protect you from "excessive" Internet/communications surveillance:
Minimize. "If you want to be truly secure, I suggest the bromide of a 19th century Boston politician, Martin Lomasney: "Never write if you [can] speak; never speak if you can nod; and never nod if you can wink..." A very tough system to break even with today's advance technology." (quote for discussion at Schneier on Security )
Do not succumb to Internet addition. There are many things in life more pleasurable and even useful than spending hours browsing the Web.
Do not leave your computers up for the night unless they are servers. Switched off computer is pretty safe if "wake-on-LAN" setting in BIOS is disabled. The same is true with smartphones. Putting them into metal box or metal mesh box for the night like some recommend while cuts possibility for them to get a signal from the tower is probably an overkill. For laptops it's really easy to shut them for the night if you associate shut down computer with closing the lid when your laptop is connected to the power source (this is more tricky if you have a dock; then you might need to change it to "not connected to power source" and remove laptop from the dock for the night).
Always disable "wake-on-LAN" setting on your PCs. That's trivial thing but that's important.
Things that should be be discussed by phone, should never be discussed by phone.
Dilute your Internet purchase history. Use single Amazon account for the whole family or share it with a friends (that allow you to cut the price of prime in half but exposé you to risks if you "misunderestimated" your friend or part the ways ;-). It also enforce some discipline on your buying as you know that other people have access to the list of your purchases. In this case it is more difficult to profile single member of household as you need to make some assumption.
Filler browsing and the use of VPN. If you are concerned the your internet browsing can get you in the "unload citizens" category of some sort you might try to use "filler" browsing to dilute the stream of pages you requested and/or use VPN (but you can't use any exotic browser, unless you change the proser identification string, but even this is not enough). Dilution is a trick that is often used in office environment by those who like to play on the edge with enterprise security team (especially if you have nothing to do at night shift). Using single proxy for the whole family also helps to mask your identity (actually router mask all your Web pages requests presenting them as coming from a single Internet address, not from individual (and local) addresses of computers in your household. But if different computers use different browsers (or different version of browsers) pages access can be differentiated by browser type. In any case proxy gives you much finer control and is not that difficult to install and use. Programmable keyboard and some skills in programming in LUA makes injecting "politically correct searches" easy. You can randomize the set of pages too.
Don't succumb to paranoia. Installing spyware on your smartphone is an expensive operation and you generally have much higher changes to get malware from regular criminals than from the government. Especially if you install "free" applications on your smartphone. More often than not, they are not completely free and like is case of using Facebook you trade your privacy for the access to them ;-). Switched off cellphones or computer (with wake-up-LAN disabled) are switched off cell phones, or computer. There is probably not that much value in removing the battery and other "drastic" measures like putting them into Faraday case (BTW plastic bags for electronic parts have metallic coating and might serve serve as a Faraday cage)
If you do not want particular travel to be recorded in tiny details do not use cellphones and pay cash for gas, food, etc. But please understand that when you cross toll bridges your number plate is recorded. And probably not only bridges. So for the government there are many ways to skin the cat, even if the cat is trying to hide.
Regular simple/basic flip phone like Samsung Gusto 3 B311 No Contract Phone (Verizon Wireless) or ZTE Z222 Go Phone (AT&T) is safer than smartphone as there not much memory in each od such phone to allow any hacking (typically 50 MB or less) . This improves your protection, if you are really paranoid at the cost of Internet access from the smarphone. People like myself, who do not really need internet on the phone as they have tablet with G3/G4 for this purpose can also use this approach as such phone usually has chaper plans then smartphones. In any case your call metadata will be recorded anyway. And as Us experience with Iraq insurgetnt had shown, they are probably as revealing as the content of your phone calls.
Never use Gmail/hotmail/yahoo mail for anything of the registrations and spam folder. Get and account at one of ISPs. It will cost you around $5 a month or less. You might also wish to obtain you won domain name. They come with email accounts and web page creation capabilities (might also be useful if you can avoid excessive exhibitionism and limit it to quotes from sources that you like and similar things )
Never store your financial information and other sensitive files on the same computer you browse Internet. Buy additional laptop and use exclusively it for browsing financial sites and creating your tax return (if you do it yourself). That also helps against nasty malware. At least never use the same account -- create and strictly follow the discipline of using different accounts for you regular browsing and for your finances. That's really important.
Periodically change your nicknames if you participate in some "supposedly watched by authorities" forums. Periodically change DHCP address on your provider using ipconfig /release or similar methods. Nicknames that can't be easily found by Internet searches (common words, such as "high speed", "Networker", "not a new Yorker", "Symposium" ) are better than unique one. Look at Guardian forums for inspiration ;-). You can also use VPN to mask your IP but generally your mileage can vary, as the government has tools to void this protection.
Get PGP key and learn to use PGP. This is useful for separating your regular files from your "confidential" files. If something is really confidential never store it on a networked computer. Use paper and non-networked computer for printing it. Some people install DOS for such purpose, but while fun to do, that's probably an overkill, unless are are into retro-computing. Non-networked means does not have any network card, or WiFi; which means old desktop computer). You will not be alone. There was a story published in 2013 by major news agencies (see BBC version ) that Russian government bought some number of electric typewriters for such a switch. See also discussion Soviet Spying on US Selectric Typewriters - Schneier on Security. It might well be that on a governmental level anything secret shouldn't be prepared or communicated on electronic devices.
Switch off you laptp or smartphone if you do not use them and do not want to take any calls. There is no any reason to keep smartphone up when you are travelling in the car. You can use Airplane mode for that too. That suppresses geolocation, but it leaves phone up and thus theoretically still enables voice recording using microphone, although if you smartphone is in the pocket, the quality of such recording will be so dismal that it is virtually useless, unless you want to spend large amount of many on filtering off the noise.
In Australia any expectations of privacy isn't legally recognized by the Supreme Court once people voluntarily offered data to the third party. A this is a very reasonable policy. Here is a relevant Slashdot post:
General Counsel of the Office of the Director of National Intelligence Robert S. Litt explained that our expectation of privacy isn't legally recognized by the Supreme Court once we've offered it to a third party.
Thus, sifting through third party data doesn't qualify 'on a constitutional level' as invasive to our personal privacy. This he brought to an interesting point about volunteered personal data, and social media habits. Our willingness to give our information to companies and social networking websites is baffling to the ODNI.
'Why is it that people are willing to expose large quantities of information to private parties but don't want the Government to have the same information?,' he asked."
... ... ...
While Snowden's leaks have provoked Jimmy Carter into labeling this government a sham, and void of a functioning democracy, Litt presented how these wide data collection programs are in fact valued by our government, have legal justification, and all the necessary parameters.
Litt, echoing the president and his boss James Clapper, explained thusly:
"We do not use our foreign intelligence collection capabilities to steal the trade secrets of foreign companies in order to give American companies a competitive advantage. We do not indiscriminately sweep up and store the contents of the communications of Americans, or of the citizenry of any country. We do not use our intelligence collection for the purpose of repressing the citizens of any country because of their political, religious or other beliefs. We collect metadata—information about communications—more broadly than we collect the actual content of communications, because it is less intrusive than collecting content and in fact can provide us information that helps us more narrowly focus our collection of content on appropriate targets. But it simply is not true that the United States Government is listening to everything said by every citizen of any country."
It's great that the U.S. government behaves better than corporations on privacy—too bad it trusts/subcontracts corporations to deal with that privacy—but it's an uncomfortable thing to even be in a position of having to compare the two. This is the point Litt misses, and it's not a fine one.
In a very profound way Facebook was never a "social site". It was always anti-social site. Facebook exploits people's own sense of vanity and desire to invade other people's privacy. There is no requirement to plaster your life all over the internet.
|In a very profound way Facebook was never a "social site". It was always anti-social site. Facebook exploits and tries to play on people's own sense of vanity and desire to invade other people's privacy. This Facebook induced US epidemic of exhibitionism is really unhealthy. There is no requirement to plaster your life all over the internet.|
Facebook has been a personal information sucking device since its inception. It is a toxic, faceless suburban wasteland which actually makes people more lonely (Suburbanization of Friendships and Solitude)
April 18, 2012
Facebook may be making us lonely, giving users the information age equivalent of a faceless suburban wasteland, claims the fantastic cover story of The Atlantic. Key excerpts:
We were promised a global village; instead we inhabit the drab cul-de-sacs and endless freeways of a vast suburb of information.
At the forefront of all this unexpectedly lonely interactivity is Facebook.
Facebook makes real relationships harder:
That one little phrase, Your real friends—so quaint, so charmingly mothering—perfectly encapsulates the anxieties that social media have produced: the fears that Facebook is interfering with our real friendships, distancing us from each other, making us lonelier; and that social networking might be spreading the very isolation it seemed designed to conquer.
Our omnipresent new technologies lure us toward increasingly superficial connections at exactly the same moment that they make avoiding the mess of human interaction easy. The beauty of Facebook, the source of its power, is that it enables us to be social while sparing us the embarrassing reality of society—the accidental revelations we make at parties, the awkward pauses, the farting and the spilled drinks and the general gaucherie of face-to-face contact. Instead, we have the lovely smoothness of a seemingly social machine. Everything’s so simple: status updates, pictures, your wall.
Finally, FB fosters a retreat into narcissism:
Self-presentation on Facebook is continuous, intensely mediated, and possessed of a phony nonchalance that eliminates even the potential for spontaneity. (“Look how casually I threw up these three photos from the party at which I took 300 photos!”) Curating the exhibition of the self has become a 24/7 occupation.
Facebook users retreat from “messy” human interaction and spend too much of their time curating fantasy avatars of themselves to actually to out and meet real people:
The relentlessness is what is so new, so potentially transformative. Facebook never takes a break. We never take a break. Human beings have always created elaborate acts of self-presentation. But not all the time, not every morning, before we even pour a cup of coffee.
The always-on effects are profound:
What Facebook has revealed about human nature—and this is not a minor revelation—is that a connection is not the same thing as a bond, and that instant and total connection is no salvation, no ticket to a happier, better world or a more liberated version of humanity. Solitude used to be good for self-reflection and self-reinvention. But now we are left thinking about who we are all the time, without ever really thinking about who we are. Facebook denies us a pleasure whose profundity we had underestimated: the chance to forget about ourselves for a while, the chance to disconnect.
One of the deepest and best researched meditations on FB 2012.
Many sites allow now two factor authentication. If you bank and broker do not have two factor authentication, think about changing them to the one that is similar but has one.
As a minimum use different account and non-privileged account on the same laptop for browsing and for financial transtaction
To avoid pilfering of your financial infomation by malware it makes sense to use a special laptop for access to financial sites and preparing tax information. It is easy to configure your workplace at home with two laptops: one for browsing and other similar "non-secure" activate and the other for financial activities. You can switch monitors using a good KVM switch. Generally USB switch such as UGREEN USB Switch Selector is enough. You do not need to switch monitors as there is enough space for two or even for monitor (if you use 4 monitor stand) on most desks.
Never use for such operation a laptop or desktop you children have access to. Good used Dell laptop is only $300 and you losses can be measured in tens thousand of dollars.
|"As a totalitarian society, the Soviet Union valued eavesdropping and thus developed
ingenious methods to accomplish it"
NSA document, cited from
Soviet Spying on
US Selectric Typewriters - Schneier on Security
In any case we should be aware that your Internet communications are under total surveillance. And that does not mean that people in hard boots will come and take you. Just realization of that this under surveillance is enough to change people behaviour. See Inverted Totalitarism:
The key ingredient of classical totalitarism is violence toward opponents. Also in all classic totalitarian states such as Nazi Germany and the USSR, the citizenry were kept mobilized to support the state. Sometimes wipe up to the state of frenzy by ideological purity campaigns or purges. Opponents were sent to concentration camps or exiled. Here the idea different: a passive but thoroughly monitored and thoroughly brainwashed populace is the goal that can be achieve with just two of three component of traditional totalitarism (ideology, propaganda and violence). Ideology and propaganda components are enough. That why the name "inverted totalitarism".
The term "liberal fascism" is also used and is a synonym, but it has "politically incorrect" flavor. The term "managed democracy" is also used, but more rarely.
It goes without saying that inverted totalitarism is much better then classic variants as close acquaintance with Gestapo or KGB is harmful for one's health. And that's what opponents of the regime faced. Here they just ignore the opponents and cut oxygen, in indirect way. Voice of opponents of the regime is just drown in the see of official propaganda and they are never invited to TV programs with significant popularity and influence on public opinion. As Orwell aptly noted "ignorance is strength" ;-). Also people who failed "loyalty test" might be simply remove from position where they can make a difference. Without too much noise. Net result is very similar, but for dissidents in case of inverted totalitarism teeth remain in place.
This includes recordings of phone calls, the content of email messages, entries on Facebook and the history of any internet user's access to websites (Web logs). That does not mean that those data are abused, but they are definitely recorded and some of them are stored for several years. In the article Edward Snowden Is Completely Wrong by Michael Hirsh and Sara Sorcher (Jun 15, 2013, NationalJournal.com) the authors warn:
Another problem for the alarmists: No evidence suggests that the worst fears of people like Snowden have ever been realized. In his interview with The Guardian, which broke the story along with The Washington Post, Snowden warned that the NSA’s accumulation of personal data
"increases every year consistently by orders of magnitude to where it’s getting to the point where you don’t have to have done anything wrong. You simply have to eventually fall under suspicion from somebody.”
In a state with no checks and balances, that is a possibility. But even the American Civil Liberties Union, which has called NSA surveillance “a stone’s throw away from an Orwellian state,” admits it knows of no cases where anything even remotely Orwellian has happened. Nor can any opponent of NSA surveillance point to a Kafkaesque Joseph K. who has appeared in an American courtroom on mysterious charges trumped up from government surveillance. Several civil-liberties advocates, asked to cite a single case of abuse of information, all paused for long seconds and could not cite any.
There is also great misunderstanding about how the NSA system works and whether such abuse could even happen in the future. It’s unclear if the government will be capable of accessing and misusing the vast array of personal data it is accumulating, as Snowden predicts. The NSA appears primarily to use computer algorithms to sift through its database for patterns that may be possible clues to terrorist plots. The government says it is not eavesdropping on our phone calls or voyeuristically reading our e-mails. Instead, it tracks the “metadata” of phone calls—whom we call and when, the duration of those conversations—and uses computer algorithms to trawl its databases for phone patterns or e-mail and search keywords that may be clues to terrorist plots. It can also map networks by linking known operatives with potential new suspects. If something stands out as suspicious, agents are still required by law to obtain a court order to look into the data they have in their storehouses. Officials must show “probable cause” and adhere to the principle of “minimization,” by which the government commits to reducing as much as possible the inadvertent vacuuming up of information on citizens instead of foreigners—the real target of the NSA’s PRISM program. The program, according to Director of National Intelligence James Clapper, has had success. He told NBC that tracking a suspicious communication from Pakistan to a person in Colorado allowed officials to identify a terrorist cell in New York City that wanted to bomb its subway system in the fall of 2009.
Replace the word "terrorist" by the word "dissident" and you will get truer meaning of the collection and mining of metadata by three letter agencies. Here is an insightful post by Chris On February 16, 2010 ( christopherkois.com):
Today, there was an Ask Slashdot Story called: “Did We Lose the Privacy War?” In the story, the user was trying to do things like use NoScript and block Google Analytics, disabling third party cookies, and encrypting IM “to keep data-miners at bay”.
While I think some of these things are a good idea and individually protect against potential threats that may reside on the Internet, in the grand scheme of things, they do not help to protect your privacy on the Internet. The story and the comments on Slashdot that followed remind me of a great talk that was presented by Steve Rambam at the The Last Hope conference in 2008.
Steve Rambam is the Founder and CEO of Pallorium, Inc. Pallorium is a licensed Investigative Agency with offices and affiliates worldwide. In 2008, at The Last Hope conference, Steve Rambam gave a talk called “Privacy is Dead – Get Over It”. I originally heard this talk in 2008, as a podcast that is distributed on The Last Hope website.
This talk is by far one of the best talks I’ve ever heard on the topic of privacy on the Internet. The talk contains information about how an individual person’s information is retrieved, gathered, and correlated to obtain everything about an individual. Even more of a disturbing trend, the aggregation of social networking sites with other data stored by government and other private entities. It’s not so disturbing that the aggregation occurs, it’s disturbing that people don’t seem to understand just how “public” the Internet really is. The amount of information given away on Facebook, MySpace, Twitter, etc. is absolutely amazing. To top it off, an individual has no recourse against an entity collecting information about them. To quote the talk, “the genie is out of the bottle and you can’t stuff it back in.” The talk aims to spread awareness of data gathering on the Internet and how it is used in the past, present, and future.
From the talk: “This is the current state of affairs. There is no more sense of privacy. Not because it’s been ripped away from you in some Orwellian way, but because you flushed it down the toilet”. It’s not just private investigators that use this information, it’s also corporate entities that profit from your information. Take Amazon.com for example, from the talk:
“think for a second what Amazon knows about you: they know where you live, where you work, they know about your finances, they know what you like to read, what music you like to listen to, they know every interest of yours, every like, every dislike… all of things that make you, you. Essentially, they’ve got a database of everyone in America’s soul.”
Rambam points out that EBay, Paypal, and Skype (which is all one company now) have a very similar database of information. Satellite TV/Cable TV/DVR/Tivo all know what you watch on TV, and Tivo is actually selling elements of your data. Furthermore, you don’t know what they have and there is NOTHING that you can do about it.
From the talk:
“What you need to know is that these are “private” companies. Freedom of information does NOT apply. And you’re screwed 2 ways. You go to Choicepoint and you say ‘What’s in your files about me?’. ‘None of your business. It’s our business records. Tough.’ You go to the government and you say ‘This is my Freedom of Information Act request. I know you pulled a Choicepoint report on me. I want to know what was in that report.’ ‘Sorry, we can’t give it to you. It’s a private business record.’ FOIA is dead, buried. It tried to come back to life. Choicepoint hammered a big stake in it’s heart and now it’s gone…”
So, what does this all mean? This isn’t just about people or entities knowing everything there is to know about you: what you do, what you like, where you go, who you talk to, what you buy, what you are interested in buying, interests that you have, etc., etc., etc… It’s how those entities are using the data that they gather. You don’t have to be paranoid to be interested in this. Companies are profiting from the data that they are collecting on you, and you pay them for it. You are paying for their services, but they are still collecting the information and selling it to someone else. In essence, they are “double-dipping” into the profits from selling consumers a product or a service and then, aggregating the data and selling it to advertisers behind the scenes. The advertisers selling you information know more about you then you could ever imagine.
From the talk:
“If you don’t take anything else from my talk today, here’s what I need you to take away. Google is a private company that you have no control over. You have no right and no ability to influence what they gather about you and what they do with that information. And the truth is, most people when they think of Google, they think of a great utility that solved all the problems of finding things on the Internet a few years ago. … Google is photos, blogs, media … Gmail, how many people here use Gmail? … Do you know that your email is searched by bots? … How many of you know that your email is searched, indexed, and categorized? … How many of you care? None of you!
Now the same people, how many would be running out and hiring a lawyer if somebody was opening the mail at your mailbox, reading it, pasting it back shut, and putting it back in the box? Every single one of you. Much worse, but you don’t get it or you don’t care.”
One last quote from the talk that I feel really sums up all of the data collection, mining, and aggregation that many of the Internet Web Services companies do on a daily basis: This quote comes from the EFF, but is referenced in the talk: “This is analogous to AT&T listening to your phone calls all day in order to figure out what to sell you at dinner.”
Steve Rambam does a great job in conveying the current state of affairs. He states the case as to why much of this information can be used in a good way by law enforcement and private investigators to do their job efficiently, but also how the information obtained can and is being abused. The aim of the talk is to make people aware of what data is gathered, what you can do about it (which is not much), and what those entities that are gathering the information are doing with it.
The talk is just over 3 hours. The video is nice so you can see the slides, but you can always download the audio and listen to it on your portable music player.
In his article What Surveillance Valley knows about you (Crooks and Liars) Yasha Levine noted:
Google is very secretive about the exact nature of its for-profit intel operation and how it uses the petabytes of data it collects on us every single day for financial gain. Fortunately, though, we can get a sense of the kind of info that Google and other Surveillance Valley megacorps compile on us, and the ways in which that intel might be used and abused, by looking at the business practices of the “data broker” industry.
Thanks to a series of Senate hearings, the business of data brokerage is finally being understood by consumers, but the industry got its start back in the 1970s as a direct outgrowth of the failure of telemarketing. In its early days, telemarketing had an abysmal success rate: only 2 percent of people contacted would become customers. In his book, “The Digital Perso,” Daniel J. Solove explains what happened next:
To increase the low response rate, marketers sought to sharpen their targeting techniques, which required more consumer research and an effective way to collect, store, and analyze information about consumers. The advent of the computer database gave marketers this long sought-after ability — and it launched a revolution in targeting technology.
Data brokers rushed in to fill the void. These operations pulled in information from any source they could get their hands on — voter registration, credit card transactions, product warranty information, donations to political campaigns and non-profits, court records — storing it in master databases and then analyzing it in all sorts of ways that could be useful to direct-mailing and telemarketing outfits. It wasn’t long before data brokers realized that this information could be used beyond telemarketing, and quickly evolved into a global for-profit intelligence business that serves every conceivable data and intelligence need.
Today, the industry churns somewhere around $200 billion in revenue annually. There are up to 4,000 data broker companies — some of the biggest are publicly traded — and together, they have detailed information on just about every adult in the western world.
No source of information is sacred: transaction records are bought in bulk from stores, retailers and merchants; magazine subscriptions are recorded; food and restaurant preferences are noted; public records and social networks are scoured and scraped. What kind of prescription drugs did you buy? What kind of books are you interested in? Are you a registered voter? To what non-profits do you donate? What movies do you watch? Political documentaries? Hunting reality TV shows?
That info is combined and kept up to date with address, payroll information, phone numbers, email accounts, social security numbers, vehicle registration and financial history. And all that is sliced, isolated, analyzed and mined for data about you and your habits in a million different ways.
The dossiers are not restricted to generic market segmenting categories like “Young Literati” or “Shotguns and Pickups” or “Kids & Cul-de-Sacs,” but often contain the most private and intimate details about a person’s life, all of it packaged and sold over and over again to anyone willing to pay.
Take MEDbase200, a boutique for-profit intel outfit that specializes in selling health-related consumer data. Well, until last week, the company offered its clients a list of rape victims (or “rape sufferers,” as the company calls them) at the low price of $79.00 per thousand. The company claims to have segmented this data set into hundreds of different categories, including stuff like the ailments they suffer, prescription drugs they take and their ethnicity:
These rape sufferers are family members who have reported, or have been identified as individuals affected by specific illnesses, conditions or ailments relating to rape. Medbase200 is the owner of this list. Select from families affected by over 500 different ailments, and/or who are consumers of over 200 different Rx medications. Lists can be further selected on the basis of lifestyle, ethnicity, geo, gender, and much more. Inquire today for more information.
MEDbase promptly took its “rape sufferers” list off line last week after its existence was revealed in a Senate investigation into the activities of the data-broker industry. The company pretended like the list was a huge mistake. A MEDbase rep tried convincing a Wall Street Journal reporter that its rape dossiers were just a “hypothetical list of health conditions/ailments.” The rep promised it was never sold to anyone. Yep, it was a big mistake. We can all rest easy now. Thankfully, MEDbase has hundreds of other similar dossier collections, hawking the most private and sensitive medical information.
For instance, if lists of rape victims aren’t your thing, MEDbase can sell dossiers on people suffering from anorexia, substance abuse, AIDS and HIV, Alzheimer’s Disease, Asperger Disorder, Attention Deficit Hyperactivity Disorder, Bedwetting (Enuresis), Binge Eating Disorder, Depression, Fetal Alcohol Syndrome, Genital Herpes, Genital Warts, Gonorrhea, Homelessness, Infertility, Syphilis… the list goes on and on and on and on.
Normally, such detailed health information would fall under federal law and could not be disclosed or sold without consent. But because these data harvesters rely on indirect sources of information instead of medical records, they’re able to sidestep regulations put in place to protect the privacy of people’s health data.
MEBbase isn’t the only company exploiting these loopholes. By the industry’s own estimates, there are something like 4,000 for-profit intel companies operating in the United States. Many of them sell information that would normally be restricted under federal law. They offer all sorts of targeted dossier collections on every population segments of our society, from the affluent to the extremely vulnerable:
- people with drug addictions
- detailed personal info on police officers and other government employees
- people with bad credit/bankruptcies
- minorities who’ve used payday loan services
- domestic violence shelter locations (normally these addresses would be shielded by law)
- elderly gamblers
If you want to see how this kind of profile data can be used to scam unsuspecting individuals, look no further than a Richard Guthrie, an Iowa retiree who had his life savings siphoned out of his bank account. Their weapon of choice: databases bought from large for-profit data brokers listing retirees who entered sweepstakes and bought lottery tickets.
Here’s a 2007 New York Times story describing the racket:
Mr. Guthrie, who lives in Iowa, had entered a few sweepstakes that caused his name to appear in a database advertised by infoUSA, one of the largest compilers of consumer information. InfoUSA sold his name, and data on scores of other elderly Americans, to known lawbreakers, regulators say.
InfoUSA advertised lists of “Elderly Opportunity Seekers,” 3.3 million older people “looking for ways to make money,” and “Suffering Seniors,” 4.7 million people with cancer or Alzheimer’s disease. “Oldies but Goodies” contained 500,000 gamblers over 55 years old, for 8.5 cents apiece. One list said: “These people are gullible. They want to believe that their luck can change.”
Data brokers argue that cases like Guthrie are an anomaly — a once-in-a-blue-moon tragedy in an industry that takes privacy and legal conduct seriously. But cases of identity thieves and sophistical con-rings obtaining data from for-profit intel businesses abound. Scammers are a lucrative source of revenue. Their money is just as good as anyone else’s. And some of the profile “products” offered by the industry seem tailored specifically to fraud use.
As Royal Canadian Mounted Police Sergeant Yves Leblanc told the New York Times: “Only one kind of customer wants to buy lists of seniors interested in lotteries and sweepstakes: criminals. If someone advertises a list by saying it contains gullible or elderly people, it’s like putting out a sign saying ‘Thieves welcome here.’”
So what is InfoUSA, exactly? What kind of company would create and sell lists customized for use by scammers and cons?
As it turns out, InfoUSA is not some fringe or shady outfit, but a hugely profitable politically connected company. InfoUSA was started by Vin Gupta in the 1970s as a basement operation hawking detailed lists of RV and mobile home dealers. The company quickly expanded into other areas and began providing business intel services to thousands of businesses. By 2000, the company raised more than $30 million in venture capital funding from major Silicon Valley venture capital firms.
By then, InfoUSA boasted of having information on 230 million consumers. A few years later, InfoUSA counted the biggest Valley companies as its clients, including Google, Yahoo, Microsoft and AOL. It got involved not only in raw data and dossiers, but moved into payroll and financial, conducted polling and opinion research, partnered with CNN, vetted employees and provided customized services for law enforcement and all sorts of federal and government agencies: processing government payments, helping states locate tax cheats and even administrating President Bill Clinton “Welfare to Work” program. Which is not surprising, as Vin Gupta is a major and close political supporter of Bill and Hillary Clinton.
In 2008, Gupta was sued by InfoUSA shareholders for inappropriately using corporate funds. Shareholders accused of Gupta of illegally funneling corporate money to fund an extravagant lifestyle and curry political favor. According to the Associated Press, the lawsuit questioned why Gupta used private corporate jets to fly the Clintons on personal and campaign trips, and why Gupta awarded Bill Clinton a $3.3 million consulting gig.
As a result of the scandal, InfoUSA was threatened with delisting from Nasdaq, Gupta was forced out and the company was snapped up for half a billion dollars by CCMP Capital Advisors, a major private equity firm spun off from JP Morgan in 2006. Today, InfoUSA continues to do business under the name Infogroup, and has nearly 4,000 employees working in nine countries.
As big as Infogroup is, there are dozens of other for-profit intelligence businesses that are even bigger: massive multi-national intel conglomerates with revenues in the billions of dollars. Some of them, like Lexis-Nexis and Experian, are well known, but mostly these are outfits that few Americans have heard of, with names like Epsilon, Altegrity and Acxiom.
These for-profit intel behemoths are involved in everything from debt collection to credit reports to consumer tracking to healthcare analysis, and provide all manner of tailored services to government and law enforcement around the world. For instance, Acxiom has done business with most major corporations, and boasts of intel on “500 million active consumers worldwide, with about 1,500 data points per person. That includes a majority of adults in the United States,” according to the New York Times.
This data is analyzed and sliced in increasingly sophisticated and intrusive ways to profile and predict behavior. Merchants are using it customize shopping experience— Target launched a program to figure out if a woman shopper was pregnant and when the baby would be born, “even if she didn’t want us to know.” Life insurance companies are experimenting with predictive consumer intel to estimate life expectancy and determine eligibility for life insurance policies. Meanwhile, health insurance companies are raking over this data in order to deny and challenge the medical claims of their policyholders.
Even more alarming, large employers are turning to for-profit intelligence to mine and monitor the lifestyles and habits of their workers outside the workplace. Earlier this year, the Wall Street Journal described how employers have partnered with health insurance companies to monitor workers for “health-adverse” behavior that could lead to higher medical expenses down the line:
Your company already knows whether you have been taking your meds, getting your teeth cleaned and going for regular medical checkups. Now some employers or their insurance companies are tracking what staffers eat, where they shop and how much weight they are putting on — and taking action to keep them in line.
But companies also have started scrutinizing employees’ other behavior more discreetly. Blue Cross and Blue Shield of North Carolina recently began buying spending data on more than 3 million people in its employer group plans. If someone, say, purchases plus-size clothing, the health plan could flag him for potential obesity — and then call or send mailings offering weight-loss solutions.
…”Everybody is using these databases to sell you stuff,” says Daryl Wansink, director of health economics for the Blue Cross unit. “We happen to be trying to sell you something that can get you healthier.”
“As an employer, I want you on that medication that you need to be on,” says Julie Stone, a HR expert at Towers Watson told the Wall Street Journal.
Companies might try to frame it as a health issue. I mean, what kind of asshole could be ag caring about the wellbeing of their workers? But their ultimate concern has nothing to do with the employee health. It’s all about the brutal bottom line: keeping costs down.
An employer monitoring and controlling your activity outside of work? You don’t have to be union agitator to see the problems with this kind of mindset and where it could lead. Because there are lots of things that some employers might want to know about your personal life, and not only to “keep costs down.” It could be anything: to weed out people based on undesirable habits or discriminate against workers based on sexual orientation, regulation and political beliefs.
It’s not difficult to imagine that a large corporation facing a labor unrest or a unionization drive would be interested in proactively flagging potential troublemakers by pinpointing employees that might be sympathetic to the cause. But the technology and data is already here for wide and easy application: did a worker watch certain political documentaries, donate to environmental non-profits, join an animal rights Facebook group, tweet out support for Occupy Wall Street, subscribe to the Nation or Jacobin, buy Naomi Klein’s “Shock Doctrine”? Or maybe the worker simply rented one of Michael Moore’s films? Run your payroll through one of the massive consumer intel databases and look if there is any matchup. Bound to be plenty of unpleasant surprises for HR!
This has happened in the past, although in a cruder and more limited way. In the 1950s, for instance, some lefty intellectuals had their lefty newspapers and mags delivered to P.O. boxes instead of their home address, worrying that otherwise they’d get tagged as Commie symps. That might have worked in the past. But with the power of private intel companies, today there’s nowhere to hide.
FTC Commissioner Julie Brill has repeatedly voiced concern that unregulated data being amassed by for-profit intel companies would be used to discriminate and deny employment, and to determine consumer access to everything from credit to insurance to housing. “As Big Data algorithms become more accurate and powerful, consumers need to know a lot more about the ways in which their data is used,” she told the Wall Street Journal.
Pam Dixon, executive director of the Privacy World Forum, agrees. Dixon frequently testifies on Capitol Hill to warn about the growing danger to privacy and civil liberties posed by big data and for-profit intelligence. In Congressional testimony back in 2009, Dixon called this growing mountain of data the “modern permanent record” and explained that users of these new intel capabilities will inevitably expand to include not just marketers and law enforcement, but insurance companies, employers, landlords, schools, parents, scammers and stalkers. “The information – like credit reports – will be used to make basic decisions about the ability of individual to travel, participate in the economy, find opportunities, find places to live, purchase goods and services, and make judgments about the importance, worthiness, and interests of individuals.”
Jun 19, 2018 | www.zerohedge.com
A 29-year-old former CIA computer engineer, Joshua Adam Schulte, was indicted Monday by the Department of Justice on charges of masterminding the largest leak of classified information in the spy agency's history .
Schulte, who created malware for the U.S. Government to break into adversaries computers, has been sitting in jail since his August 24, 2017 arrest on unrelated charges of posessing and transporting child pornography - which was discovered in a search of his New York apartment after Schulte was named as the prime suspect in the cyber-breach one week after WikiLeaks published the "Vault 7" series of classified files. Schulte was arrested and jailed on the child porn charges while the DOJ ostensibly built their case leading to Monday's additional charges.
[I]nstead of charging Mr. Schulte in the breach, referred to as the Vault 7 leak, prosecutors charged him last August with possessing child pornography, saying agents had found 10,000 illicit images on a server he created as a business in 2009 while studying at the University of Texas at Austin.
Court papers quote messages from Mr. Schulte that suggest he was aware of the encrypted images of children being molested by adults on his computer, though he advised one user, "Just don't put anything too illegal on there." - New York Times
Monday's DOJ announcement adds new charges related to stealing classified national defense information from the Central Intelligence Agency in 2016 and transmitting it to WikiLeaks ("Organization-1").
The Vault 7 release - a series of 24 documents which began to publish on March 7, 2017 - reveal that the CIA had a wide variety of tools to use against adversaries, including the ability to "spoof" its malware to appear as though it was created by a foreign intelligence agency , as well as the ability to take control of Samsung Smart TV's and surveil a target using a "Fake Off" mode in which they appear to be powered down while eavesdropping.
The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity .
The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from .
UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques . - WikiLeaks
Schulte previously worked for the NSA before joining the CIA, then "left the intelligence community in 2016 and took a job in the private sector," according to a statement reviewed in May by The Washington Post .
Schulte also claimed that he reported "incompetent management and bureaucracy" at the CIA to that agency's inspector general as well as a congressional oversight committee. That painted him as a disgruntled employee, he said, and when he left the CIA in 2016, suspicion fell upon him as "the only one to have recently departed [the CIA engineering group] on poor terms," Schulte wrote. - WaPo
Part of that investigation, reported WaPo, has been analyzing whether the Tor network - which allows internet users to hide their location (in theory) "was used in transmitting classified information."
In other hearings in Schulte's case, prosecutors have alleged that he used Tor at his New York apartment, but they have provided no evidence that he did so to disclose classified information. Schulte's attorneys have said that Tor is used for all kinds of communications and have maintained that he played no role in the Vault 7 leaks. - WaPo
Schulte says he's innocent: " Due to these unfortunate coincidences the FBI ultimately made the snap judgment that I was guilty of the leaks and targeted me," Schulte said. He launched Facebook and GoFundMe pages to raise money for his defense, which despite a $50 million goal, has yet to r eceive a single donation.
me name=The Post noted in May, the Vault 7 release was one of the most significant leaks in the CIA's history , "exposing secret cyberweapons and spying techniques that might be used against the United States, according to current and former intelligence officials."
The CIA's toy chest includes:
- Tools code named " Marble " can misdirect forensic investigators from attributing viruses, trojans and hacking attacks to their agency by inserted code fragments in foreign languages. The tool was in use as recently as 2016. Per the WikiLeaks release:
"The source code shows that Marble has test examples not just in English but also in Chinese, Russian, Korean, Arabic and Farsi. This would permit a forensic attribution double game, for example by pretending that the spoken language of the malware creator was not American English, but Chinese, but then showing attempts to conceal the use of Chinese, drawing forensic investigators even more strongly to the wrong conclusion, --- but there are other possibilities, such as hiding fake error messages."
- iPads / iPhones / Android devices and Smart TV's are all susceptible to hacks and malware. The agency's "Dark Matter" project reveals that the CIA has been bugging "factory fresh" iPhones since at least 2008 through suppliers. Another, " Sonic Screwdriver " allows the CIA to execute code on a Mac laptop or desktop while it's booting up.
- The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB) , which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
- The Obama administration promised to disclose all serious vulnerabilities they found to Apple, Google, Microsoft, and other US-based manufacturers. The US Government broke that commitment.
"Year Zero" documents show that the CIA breached the Obama administration's commitments. Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.
- The Frankfurt consulate is a major CIA hacking base of operations .
In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.
CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover.
- Instant messaging encryption is a joke.
These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.
- The CIA laughs at Anti-Virus / Anti-Malware programs.
CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats , Personal Security Products , Detecting and defeating PSPs and PSP/Debugger/RE Avoidance . For example, Comodo was defeated by CIA malware placing itself in the Window's "Recycle Bin" . While Comodo 6.x has a "Gaping Hole of DOOM" .
You can see the entire Vault7 release here .
A DOJ statement involving the Vault7 charges reads:
"Joshua Schulte, a former employee of the CIA, allegedly used his access at the agency to transmit classified material to an outside organization . During the course of this investigation, federal agents also discovered alleged child pornography in Schulte's New York City residence ," said Manhattan U.S. Attorney Geoffrey S. Berman.
On March 7, 2017, Organization-1 released on the Internet classified national defense material belonging to the CIA (the "Classified Information"). In 2016, SCHULTE, who was then employed by the CIA, stole the Classified Information from a computer network at the CIA and later transmitted it to Organization-1. SCHULTE also intentionally caused damage without authorization to a CIA computer system by granting himself unauthorized access to the system, deleting records of his activities, and denying others access to the system . SCHULTE subsequently made material false statements to FBI agents concerning his conduct at the CIA.
Schulte faces 135 years in prison if convicted on all 13 charges:
- Illegal Gathering of National Defense Information, 18 U.S.C. §§ 793(b) and 2
- Illegal Transmission of Lawfully Possessed National Defense Information, 18 U.S.C. §§ 793(d) and 2
- Illegal Transmission of Unlawfully Possessed National Defense Information, 18 U.S.C. §§ 793(e) and 2
- Unauthorized Access to a Computer To Obtain Classified Information, 18 U.S.C. §§ 1030(a)(1) and 2
- Theft of Government Property, 18 U.S.C. §§ 641 and 2
- Unauthorized Access of a Computer to Obtain Information from a Department or Agency of the United States, 18 U.S.C. §§ 1030(a)(2) and 2
- Causing Transmission of a Harmful Computer Program, Information, Code, or Command, 18 U.S.C. §§ 1030(a)(5) and 2
- Making False Statements, 18 U.S.C. §§ 1001 and 2
- Obstruction of Justice, 18 U.S.C. §§ 1503 and 2
- Receipt of Child Pornography, 18 U.S.C. §§ 2252A(a)(2)(B), (b)(1), and 2
- Possession of Child Pornography, 18 U.S.C. §§ 2252A(a)(5)(B), (b)(2), and 2
- Transportation of Child Pornography, 18 U.S.C. § 2252A(a)(1)
- Criminal Copyright Infringement, 17 U.S.C. § 506(a)(1)(A) and 18 U.S.C. § 2319(b)(1)
Billy the Poet -> Anarchyteez Mon, 06/18/2018 - 22:50 PermalinkA Sentinel -> Billy the Poet Mon, 06/18/2018 - 22:59 Permalink
So Schulte was framed for kiddie porn because he released information about how the CIA can frame innocent people for computer crime.A Sentinel -> CrabbyR Mon, 06/18/2018 - 23:46 Permalink
That seems very likely.
Seems like everyone has kiddy porn magically appear and get discovered after they piss off the deep state bastards.
And the best part is that it's probably just the deep state operatives' own private pedo collections that they use to frame anyone who they don't like.CrabbyR -> A Sentinel Tue, 06/19/2018 - 00:07 Permalink
I was thinking about the advancement of the technology necessary for that. They can do perfect fake stills already.
My thought is that you will soon need to film yourself 24/7 (with timestamps, shared with a blockchain-like verifiably) so that you can disprove fake video evidence by having a filmed alibi.peopledontwanttruth -> Anarchyteez Mon, 06/18/2018 - 22:50 Permalink
good point but creepy to think it can get that badsecretargentman -> peopledontwanttruth Mon, 06/18/2018 - 22:51 Permalink
Funny how all these whistleblowers are being held for child pornography until trial.
But we have evidence of government officials and Hollyweird being involved in this perversion and they walk among uschunga -> secretargentman Mon, 06/18/2018 - 23:12 Permalink
Those kiddy porn charges are extremely suspect, IMO.A Sentinel -> chunga Mon, 06/18/2018 - 23:42 Permalink
It's so utterly predictable.
The funny* thing is I believe gov, particularly upper levels, is chock full of pedophiles.
* It isn't funny, my contempt for the US gov grows practically by the hour.SybilDefense -> A Sentinel Tue, 06/19/2018 - 00:33 Permalink
I said pretty much the same. I further speculated that it was their own porn that they use for framing operations.cankles' server -> holdbuysell Mon, 06/18/2018 - 22:57 Permalink
Ironically, every single ex gov whistle blower (/pedophile) has the exact same kiddie porn data on their secret server (hidden in plane view at the apartment). Joe CIA probably has a zip drive preloaded with titled data sets like "Podesta's Greatest Hits", "Hillary's Honey bunnies" or "Willy go to the zoo". Like the mix tapes you used to make for a new gal you were trying to date. Depending upon the mood of the agent in charge, 10,000 images of Weiner's "Warm Pizza" playlist magically appear on the server in 3-2-1... Gotcha!
These false fingerprint tactics were all over the trump accusations which started the whole Russia Russia Russia ordeal. And the Russia ordeal was conceptualized in a paid report to Podesta by the Bensenson Group called the Salvage Program when it was appearant that Trump could possible win and the DNC needed ideas on how to throw the voters off at the polls. Russia is coming /Red dawn was #1 or #2 on the list of 7 recommended ploys. The final one was crazy.. If Trump appeared to win the election, imagery of Jesus and an Alien Invasion was to be projected into the skies to cause mass panic and create a demand for free zanex to be handed out to the panic stricken.
Don't forget Black Lives Matters. That was idea #4 of this Bensenson report, to create civil unrest and a race war. Notice how BLM and Antifa manically disappeared after Nov 4. All a ploy by the Dems & the deep state to remain in control of the countrys power.
Back to the topic at hand. Its a wonder he didn't get Seth Riched. Too many porn servers and we will begin to question the legitimacy. Oh wait...
You won't find any kiddie porn on Hillary's or DeNiros laptop. Oh its there. You just will never ever hear about it.BGO Mon, 06/18/2018 - 22:43 Permalink
The Vault 7 release - a series of 24 documents which began to publish on March 7, 2017 - reveal that the CIA had a wide variety of tools to use against adversaries, including the ability to "spoof" its malware to appear as though it was created by a foreign intelligence agency ....
It probably can spoof child porn as well.
Is he charged with copyright infringement for pirating child porn?Never One Roach -> BGO Mon, 06/18/2018 - 22:44 Permalink
The intel community sure has a knack for sussing out purveyors of child pornography. It's probably just a coincidence govt agencies and child pornography are inextricably linked.NotBuyingIt -> BGO Mon, 06/18/2018 - 23:09 Permalink
Sounds like he may be a friend of Uncle Joe Biden whom we know is "very, very friendly" with the children.DoctorFix -> BGO Mon, 06/18/2018 - 23:18 Permalink
It's very easy for a criminal spook to plant child porn on some poor slob's machine - especially when they want to keep him on the hook to sink his ass for something bigger in the future. Who knows... this guy may have done some shit but I'm willing to bet he was entirely targeted by these IC assholes. Facing 135 years in prison... yet that baggy ass cunt Hillary walks free...MadHatt Mon, 06/18/2018 - 22:43 Permalink
Funny how they always seem to have a "sting" operation in progress when there's anyone the DC rats want to destroy but strangely, or not, silent as the grave when one of the special people are fingered.navy62802 -> MadHatt Mon, 06/18/2018 - 23:30 Permalink
Transportation of Child Pornography, 18 U.S.C. § 2252A(a)(1)
Uhh... what? He stole CIA child porn?MadHatt -> navy62802 Tue, 06/19/2018 - 00:29 Permalink
Nah ... that's the shit they planted on him for an excuse to make an arrest.Never One Roach Mon, 06/18/2018 - 22:44 Permalink
If he stole all their hacking apps, wouldn't that be enough to arrest him?_triplesix_ Mon, 06/18/2018 - 22:46 Permalink
That list of federal crimes is almost as long as Comey's list of Hillary Clinton's federal crimes._triplesix_ Mon, 06/18/2018 - 22:46 Permalink
Of all these things the C_A can do, it doesn't take a brain surgeon to realize that planting CP on a computer of someone you don't like would be a piece of cake, comparatively speaking.Giant Meteor -> _triplesix_ Mon, 06/18/2018 - 22:51 Permalink
Of all these things the C_A can do, it doesn't take a brain surgeon to realize that planting CP on a computer of someone you don't like would be a piece of cake, comparatively speaking.PigMan Mon, 06/18/2018 - 22:50 Permalink
It probably comes standard now buried within systems, like a sleeper cell. Just waiting for the right infraction and trigger to be pulled ..ConnectingTheDots Mon, 06/18/2018 - 22:56 Permalink
Did he also leak that the CIA's favorite tactic is to plant kiddie porn on their targets computer?Chupacabra-322 Mon, 06/18/2018 - 23:14 Permalink
The alphabet agencies would never hack someone's computer.
The alphabet agencies would never spy on US citizens (at least not wittingly)
The alphabet agencies would never plant physical evidence.
The alphabet agencies would never lie under oath.
The alphabet agencies would never have an agenda.
The alphabet agencies would never provide the media with false information.
/sZIRPdiggler -> Chupacabra-322 Tue, 06/19/2018 - 00:29 Permalink
The "Spoofing" or Digital Finger Print & Parallel Construction tools that can be used against Governments, Individuals, enemies & adversaries are Chilling.
The CIA can not only hack into anything -- they can download any "evidence" they want onto your phone or computer. Child pornography, national secrets, you name it. Then they can blackmail you, threatening prosecution for whatever crap they have planted, then "found" on your computer. They can also "spoof" the source of such downloads -- for instance, if they want to "prove" that something on your computer (or Donald Trump's computer) came from a "Russian source" -- they can spoof the IP address of a Russian source.
The take-away: no digital evidence the CIA or NSA produces on any subject whatsoever can be trusted. No digital evidence should be acceptable in any case where the government has an interest, because they have the complete ability to fabricate and implant any evidence on any iphone or computer. And worse: they have intentionally created these digital vulnerabilities and pushed them onto the whole world via Microsoft and Google. Government has long been at war with liberty, claiming that we need to give up liberty to be secure. Now we learn that they have been deliberately sabotaging our security, in order to augment their own power. Time to shut down the CIA and all the other spy agencies. They're not keeping us free OR secure, and they're doing it deliberately. Their main function nowadays seems to be lying us into wars against countries that never attacked us, and had no plans to do so.
The Echelon Computer System Catch Everything
The Flagging goes to Notify the Appropriate Alphabet,,,...Key Words Phrases...Algorithms,...It all gets sucked up and chewed on and spat out to the surmised computed correct departments...That simple.
Effective immediately defund, Eliminate & Supeona it's Agents, Officials & Dept. Heads in regard to the Mass Surveillance, Global Espionage Spying network & monitoring of a President Elect by aforementioned Agencies & former President Obama, AG Lynch & DIA James Clapper, CIA John Breanan.
#UMBRAGEmoobra Mon, 06/18/2018 - 23:45 Permalink
Since 911, they've been "protecting" the shit out of us. "protecting" away every last fiber of liberty. Was watching some fact-based media about the CIA's failed plan to install Yeltsin's successor via a Wallstreet banking cartel bet (see, LTCM implosion). The ultimate objectives were to rape and loot post-Soviet Russian resources and enforce regime change. It's such a tired playbook at this point. Who DOESNT know about this sort of affront? Apparently even nobel prize economists cant prevent a nation from failing lol. The ultimate in vanity; our gubmint and its' shadow controllers.ZIRPdiggler Tue, 06/19/2018 - 00:05 Permalink
This is because people who are smart enough to write walware for the CIA send messages in the clear about child porn and are too dumb to encrypt images with a key that would take the lifetime of the universe to break.
Next his mother will be found to have a tax problem and his brother's credit rating zeroed out.
Meanwhile Comey will be found to have been "careless".AGuy -> ZIRPdiggler Tue, 06/19/2018 - 00:36 Permalink
Yeah I don't believe for a second that this guy had anything to do with child porn. Not like Obama and his hotdogs or Clintons at pedo island, or how bout uncle pervie podesta? go after them, goons and spooks. They (intelligence agencies) falsely accuse people of exactly what they are ass-deep in. loses credibility with me when the CIA clowns or NSA fuck ups accuse anyone of child porn; especially one of their former employees who is 'disgruntled'. LOL. another spook railroad job done on a whistleblower. fuck the CIA and all 17 alphabet agencies who spy on us 24/7. Just ask, if you want to snoop on me. I may even tell you what I'm up to because I have nothing that I would hide since, I don't give a shit about you or whether you approve of what I am doing.rgraf Tue, 06/19/2018 - 00:05 Permalink
"Yeah I don't believe for a second that this guy had anything to do with child porn."
Speculation by my part: He was running a Tor server, and the porn originated from other Tor users. If that is the case ( it would be easy for law enforcement to just assume it was his) law enforcement enjoys a quick and easy case.ZIRPdiggler -> rgraf Tue, 06/19/2018 - 00:09 Permalink
They shouldn't be spying, and they shouldn't keep any secrets from the populace. If they weren't doing anything wrong, they have nothing to hide.Blue Steel 309 Tue, 06/19/2018 - 00:53 Permalink
It really doesn't matter if someone wants to hide. That is their right. Only Nazi's like our spy agencies would use the old Gestapo line, "If you have nothing to hide then you have nothing to worry about. Or better yet, you should let me turn your life upside down if you have nothing to hide. " Bullshit! It's none of their fucking business. How bout that? Spooks and secret clowns CAN and DO frame anybody for whatever or murder whomever they wish. So why WOULDNT people be afraid when government goons start sticking their big snouts into their lives??? They can ruin your life for the sake of convenience. Zee Furor is not pleased with your attitude, comrade.
Vault 7 proves that most digital evidence should be inadmissible in court, yet I don't see anyone publishing articles about this problem.
Mar 20, 2017 | www.youtube.com
The mighty CIA has fallen victim to a major breach, with WikiLeaks revealing the true scope of the Agency's ability for cyber-espionage. Its tools seem to be aimed at ordinary citizens – your phone, your car, your TV, even your fridge can become an instrument of surveillance in the hands of the CIA. How does the CIA use these tools, and why do they need them in the first place?
And as WikiLeaks promises even more revelations, how is all of this going to shape the already tense relationship between new president and the intelligence community?
A man who has spent over two decades in the CIA's clandestine service – Gary Berntsen is on SophieCo.
FULL TRANSCRIPT: https://www.rt.com/shows/sophieco/381...Sophie Shevardnadze: Gary Berntsen, former CIA official, welcome to the show, great to have you with us. Now, Vault 7, a major batch of CIA docs revealed by Wikileaks uncovers the agency's cyber tools. We're talking about world's most powerful intelligence agency - how exactly did the CIA lose control of its arsenal of hacking weapons?
Gary Berntsen: First off, I'd like to say that the world has changed a lot in the last several decades, and people are communicating in many different ways and intelligence services, whether they be American or Russian, are covering these communications and their coverage of those communications has evolved. Without commenting on the specific validity of those tools, it was clear that the CIA was surely using contractors to be involved in this process, not just staff officers, and that individuals decided that they had problems with U.S. policy, and have leaked these things to Wikileaks. This is a large problem, for the U.S. community, but just as the U.S. is having problems, the Russia face similar problems. Just this week you had multiple members of the FSB charged with hacking as well, and they have been charged by the U.S. government. So both services who are competitors, face challenges as we've entered a new era of mass communications.
SS: So like you're saying, the leaker or leakers of the CIA docs is presumably a CIA contractor - should the agency be spending more effort on vetting its own officers? Is the process rigorous enough?
GB: Clearly. Look There have been individuals since the dawn of history. Espionage is the second oldest occupation, have conducted spying and espionage operations, and there have been people who have turned against their own side and worked for competitors and worked for those opposing the country or the group that they're working with. It's been a problem from the beginning, and it continues to be a problem, and the U.S. clearly is going to have to do a much better job at vetting those individuals who are given security clearances, without a doubt.
SS: The CIA studied the flaws in the software of devices like iPhones, Androids, Smart TVs, apps like Whatsapp that left them exposed to hacking, but didn't care about patching those up - so, in essence the agency chose to leave Americans vulnerable to cyberattacks, rather than protect them?
GB: I think you have to understand, in this world that we're operating and the number one target of our intelligence community are terrorists. Since the attacks of 9\11, 16 years ago, the obsession of the American intelligence community is to identify those planning terrorist attacks, collecting information on them and being able to defeat them. These individuals are using all these means of communication. I have spoken with many security services around the world, since my retirement back in 2005-2006, a lot of them have had problems covering the communications of somebody's very devices and programs that you've talked about - whether they be narcotraffickers or salafist jihadists, they are all piggybacking off of commercial communications. Therefore the need for modern intelligence services to sort of provide coverage of all means of communications. And there's a price that you pay for that.
SS: One of the most disturbing parts of the leaks is the "Weeping Angel" program - CIA hacking into Samsung Smart TVs to record what's going on even when the TV appears to be turned off. Why are the CIA's tools designed to penetrate devices used by ordinary Western citizens at home?
GB: Look, I wouldn't say it has anything to do with Western homes, because the CIA doesn't do technical operations against American citizens - that's prohibited by the law. If the CIA does anything in the U.S., it does it side-by-side with the FBI, and it does it according to FISA - the Foreign Intelligence and Surveillance Act laws. It's gotta go to the judge to do those things. Those tools are used primarily against the individuals and terrorists that are targeting the U.S. or other foreign entities that we see as a significant threat to the U.S. national security, which is the normal functioning of any intelligence service.
SS: Just like you say, the CIA insists it never uses its investigative tools on American citizens in the US, but, we're wondering, exactly how many terrorist camps in the Middle East have Samsung Smart TVs to watch their favorite shows on? Does it seem like the CIA lost its direction?
GB: Plenty of them.
GB: I've travelled in the Middle East, Samsungs are sold everywhere. Sophie, Samsung TVs are sold all over the world. I've spent a lot of time in the Middle East, I've seen them in Afghanistan, I've seen them everywhere. So, any kind of devices that you can imagine, people are using everywhere. We're in a global economy now.
SS: The CIA has tools to hack iPhones - but they make up only around 15 % of the world's smartphone market. IPhones are not popular among terrorists, but they are among business and political elites - so are they the real target here?
GB: No. The CIA in relative terms to the size of the world is a small organisation. It is an organisation that has roughly 20 or more thousand people - it's not that large in terms of covering a planet with 7 billion people. We have significant threats to the U.S. and to the Western world. We live in an age of super-terrorism, we live in an age when individuals, small groups of people, can leverage technology at a lethal effect. The greatest threats to this planet are not just nuclear, they are bio. The U.S. needs to have as many tools as possible to defend itself against these threats, as does Russia want to have similar types of tools to defend itself. You too, Russian people have suffered from a number of terrible terrorist acts.
SS: Wikileaks suggest the CIA copied the hacking habits of other nations to create a fake electronic trace - why would the CIA need that?
GB: The CIA, as any intelligence service, would look to conduct coverage in the most unobtrusive fashion as possible. It is going to do its operations so that they can collect and collect again and again against terrorist organisations, where and whenever it can, because sometimes threats are not just static, they are continuous.
SS: You know this better, so enlighten me: does the he CIA have the authorisation to create the surveillance tools it had in the first place? Who gives it such authorisation?
GB: The CIA was created in 1947 by the National Security Act of the U.S. and does two different things - it does FI (foreign intelligence) collection and it does CA - covert action. Its rules for collection of intelligence were enshrined in the law that created it, the CIA Act 110, in 1949, but the covert action part of this, where it does active measures, when it gets involved in things - all of those are covered by law. The Presidential finding had to be written, it had to be presented to the President. The President's signs off on those things. Those things are then briefed to members of Congress, or the House Permanent Subcommittee for Intelligence and the Senate Select Committee for Intelligence. We have a very rigorous process of review of the activities of our intelligence communities in the U.S.
SS: But you're talking about the activities in terms of operations. I'm just asking - does CIA need any authorisation or permission to create the tools it has in its arsenal? Or it can just go ahead
GB: Those tools and the creation of collection tools falls under the same laws that allowed the CIA to be established. And that was the 1949 Intelligence Act. And also, subsequently, the laws in 1975. Yes.
SS: So, the CIA programme names are quite colourful, sometimes wacky - "Weeping Angel", "Swamp Monkey", "Brutal Kangaroo" - is there a point to these, is there any logic, or are they completely random? I always wondered...
GB: There's absolutely no point to that, and it's random.
SS:Okay, so how do you come up with those names? Who like, one says: "Monkey" and another one says: "Kangaroo"?...
GB: I'm sure they are computer-generated.
SS: Trump accused Obama of wiretapping him during the campaign Could the CIA have actually spied on the president? It seems like the agency doesn't have the best relationship with Donald Trump - how far can they go?
GB: Let me just say this: the President used the word "wiretapping" but I think it was very clear to us that have been in the intelligence business, that this was a synonym for "surveillance". Because most people are on cellphones, people aren't using landlines anymore, so there's no "wiretapping", okay. These all fall under the Intelligence Surveillance Act, as I stated earlier, this thing existing in the U.S.. It was clear to President Trump and to those in his campaign, after they were elected, and they did a review back that the Obama Administration sought FISA authorisation to do surveillance of the Trump campaign in July and then in October. They were denied in July, they were given approval in October, and in October they did some types of surveillance of the Trump campaign. This is why the President, of course, tweeted, that he had been "wiretapped" - of course "wiretapping" being a synonym for the surveillance against his campaign, which was never heard of in the U.S. political history that I can remember, I can't recall any way of this being done. It's an outrage, and at the same time, Congressional hearings are going to be held and they are going to review all of these things, and they are going to find out exactly what happened and what was done. It's unclear right now, but all we do know - and it has been broken in the media that there were two efforts, and at the second one, the authorisation was given. That would never have been done by the CIA, because they don't do that sort of coverage in the U.S.. That would either be the FBI or the NSA, with legal authorities and those authorities the problem that the Trump administration had is they believed that the information from these things was distributed incorrectly. Any time an American - and this is according to the U.S. law - any time an American is on the wire in the U.S., their names got to be minimized from this and it clearly wasn't done and the Trump administration was put in a bad light because of this.
SS: If what you're saying is true, how does that fall under foreign intelligence? Is that more of the FBI-NSA expertise?
GB: It was FBI and NSA - it was clearly the FBI and the NSA that were involved, it would never have been the CIA doing that, they don't listen to telephones in the U.S., they read the product of other agencies that would provide those things, but clearly, there were individuals on those phone calls that they believed were foreign and were targeting those with potential communications with the Trump campaign. Let's be clear here - General Clapper, the DNI for President Obama, stated before he left office, that there was no, I repeat, no evidence of collusion between the Trump campaign and Russia. This has been something that has been dragged out again, and again, and again, by the media. This is a continuing drumbeat of the mainstream, left-wing media of the U.S., to paint the President in the poorest light, to attempt to discredit Donald Trump.
SS: With the intelligence agencies bringing down Trump's advisors like Michael Flynn - and you said the people behind that were Obama's loyalists - can we talk about the intelligence agencies being too independent from the White House, playing their own politics?
GB: I think part of the problem that we've seen during the handover of power from President Obama to President Trump was that there was a number of holdovers that went from political appointee to career status that had been placed in the NatSec apparatus and certain parts of the intelligence organisations. It is clear that President Trump and his team are determined to remove those people to make sure that there's a continuity of purpose and people aren't leaking information that would put the Administration into a negative light. That's the goal of the administration, to conduct itself consistent with the goals of securing the country from terrorism and other potential threats - whether they be counter-narcotics, or intelligence agencies trying to breach our you know, the information that we hold secure.
SS: Here's a bit of conspiracy theories - could it be that the domestic surveillance agencies like the NSA or the FBI orchestrated the Vault 7 leaks - to damage CIA, stop it from infringing on their turf?
GB :I really don't think so and that is conspiracy thinking. You have to understand something, in the intelligence communities in the U.S., whether it be the CIA and FBI, we've done a lot of cross-fertilizations. When I was in senior position in CIA's counterterrorism center, I had a deputy who was an FBI officer. An office in FBI HQ down in Washington had an FBI lead with a CIA deputy. There's a lot more cooperation than one would think. There are individuals that do assignments in each other's organisations to help foster levels of cooperation. I had members of NSA in my staff when I was at CIA, members of diplomatic security, members of Alcohol, Tobacco and Firearms, and it was run like a task force, so, there's a lot more cooperation than the media presents, they always think that there are these huge major battles between the organisations and that's rarely true.
SS: Generally speaking - is there rivalry between American intel agencies at all? Competition for resources, maybe?
GB: I think, sometimes, between the Bureau and the CIA - the CIA is the dominant agency abroad, and the FBI is the dominant agency in the U.S. What they do abroad, they frequently have to get cleared by us, what we do domestically, we have to get cleared by them, and sometimes there's some friction, but usually, we're able to work this out. It makes for great news, the CIA fighting FBI, but the reality is that there's a lot more cooperation than confrontation. We are all in the business of trying to secure the American homeland and American interests globally.
SS: I'm still thinking a lot about the whole point of having this hacking arsenal for the CIA since you talk on their behalf - the possibility to hack phones, computers, TVs and cars - if the actual terrorist attacks on US soil, like San Bernardino, Orlando are still missed?
GB: Look. There are hundreds of individuals, if not thousands, planning efforts against the U.S. at any time. It can be many-many things. And the U.S. security services, there's the CIA, the FBI, NSA - block many-many of these things, but it is impossible to stop them all. Remember, this is an open society here, in America, with 320 million people, here. We try to foster open economic system, we allow more immigration to America than all countries in the world combined. This is a great political experiment here, but it's also very difficult to police. There are times that the U.S. security services are going to fail. It's inevitable. We just have to try the best we can, do the best job that we can, while protecting the values that attract so many people to the U.S.
SS:The former CIA director John Brennan is saying Trump's order to temporarily ban travel from some Muslim states is not going to help fight terrorism in 'any significant way'. And the countries where the terrorists have previously come from - like Saudi Arabia, or Afghanistan, it's true - aren't on the list. So does he maybe have a point?
GB: John Brennan is acting more like a political operative than a former director of CIA. The countries that Mr. Trump had banned initially, or at least had put a partial, sort of a delay - where states like Somalia, Libya, the Sudan, Iran - places where we couldn't trust local vetting. Remember something, when someone immigrates to the U.S., we have what's called an "immigration packet": they may have to get a chest X-ray to make sure they don't bring any diseases with them, they have to have background check on any place they've ever lived, and in most of these places there are no security forces to do background checks on people that came from Damascus, because parts of Damascus are totally destroyed - there's been warfare. It is actually a very reasonable thing for President Trump to ask for delay in these areas. Look, the Crown-Prince, the Deputy Crown-Prince of Saudi Arabia was just in the United States and met with Donald Trump, and he said he didn't believe it was a "ban on Muslims". This was not a "ban on Muslims", it was an effort to slow down and to create more opportunity to vet those individuals coming from states where there's a preponderance of terrorist organisations operating. A reasonable step by President Trump, something he promised during the campaign, something he's fulfilling. But again, I repeat - America allows more immigration into the U.S., than all countries combined. So, we really don't need to be lectured on who we let in and who we don't let in.
SS: But I still wonder if the Crown-Prince would've had the same comment had Saudi Arabia been on that ban list. Anyways, Michael Hayden, ex-CIA
GB: Wait a second, Sophie - the Saudis have a reasonable form to police their society, and they provide accurate police checks. If they didn't create accurate police checks, we would've given the delay to them as well.
SS: Ok, I got your point. Now, Michael Hayden, ex-CIA and NSA chief, pointed out that the US intelligence enlists agents in the Muslim world with the promise of eventual emigration to America - is Trump's travel ban order going to hurt American intelligence gathering efforts in the Middle East?
GB: No, the question here - there were individuals that worked as translators for us in Afghanistan and Iraq and serving in such roles as translators, they were promised the ability to immigrate to the United States. Unfortunately, some of them were blocked in the first ban that was put down, because individuals who wrote that, didn't consider that. That has been considered in the re-write, that the Trump administration had submitted, which is now being attacked by a judge in Hawaii, and so it was taken into consideration, but the objective here was to help those that helped U.S. forces on the ground, especially those who were translators, in ground combat operations, where they risked their lives alongside American soldiers.
SS: You worked in Afghanistan - you were close to capturing Bin Laden back in 2001 - what kind of spying tools are actually used on the ground by the CIA to catch terrorists?
GB: The CIA as does any intelligence service in the world, is a human business. It's a business where we work with local security forces to strengthen their police and intelligence forces, we attempt to leverage them, we have our own people on the ground that speak the language, we're trying to help build transportation there. There's no "secret sauce" here. There's no super-technology that changes the country's ability to conduct intelligence collections or operations. In Afghanistan the greatest thing that the U.S. has is broad support and assistance to Afghan men and women across the country. We liberated half of the population, and for women were providing education, and when the people see what we were doing: trying to build schools, providing USAID projects - all of these things - this makes the population willing to work with and support the United States. Frequently, members of the insurgence groups will see this and sometimes they do actually cross the lines and cooperate with us. So, it's a full range of American political power, whether it's hard or soft, that is the strength of the American intelligence services - because people in the world actually believe - and correctly so - that American more than generally a force of good in the world.
SS: Gary, thank you so much for this interesting interview and insight into the world of the CIA. We've been talking to Gary Berntsen, former top CIA officer, veteran of the agency, talking about the politics of American intelligence in the Trump era. That's it for this edition of SophieCo, I will see you next time.
Just thinking here in the light of how things are unfolding with the CIA I am wondering since Federal crimes are committed can the FBI investigate the CIA acting as America Federal Law Enforcement.
RedBlowDryer -> GreenPin
I think the US intelligent agencies are harming their country more than any enemy of the US.
There is a reason why JFK wanted to dismantle the CIA. This guy is lying.
CIA needs hacking tools to make it look like it was carried out by another state simply for plausible deniability.
a "force for good in the world"?...sounds like the American white hat-black hat myth...read Naomi Klein's "The Shock Doctrine: The Rise of Disaster Capitalism". This is a detailed litany of America's various kinds of interventions in multiple countries that cold hardly be described as "a force for good in the world"...a force for "America's values" (read with ironically), perhaps
WHO is responsible for the outbreak of chaotic warfare in Libya and Syria?
Should we trust the Saudi vetting services...think of who the September 11 bombers were? Was there another reason they were not on Trump's banned countries list? Too big to mess with, i.e., oil and weapons sales?
Amazing how they justify their destructive behaviour in a way as they are serving America people and doing good around the wold. You can sugar count your crimes against humanity as much as you can, but the reality of today' human misery speaks for itself.
since the United States was founded in 1776, she has been at war during 214 out of her 235 calendar years of existence
interesting, but begs the question "Can we really trust what this guy tells us?" If not, what parts can we trust, and what parts can't we?
You'd have to deconstruct his talking points and I don't know how that is done. Intelligence probably knows how to do that. I noticed he was becoming more zealous on hegemony and exceptionalism as the interview neared the end.
I agree. Bernsten is almost like-ably energetic, but he is, in the end, an uncompromising warrior of the empire.
if Trump is to be controlled--they gotta have some dirt--or threat against his family --it's how they operate---
Mr. Berntsen left out the very important NSC10/2 legislation, which gave the CIA free reign with deniability as the cover. This needs to be repealed. With this legislation, the CIA answers to no one, and goes around the world wrecking havoc with the governments and people where they like. We will never have peace until that legislation is repealed.
This is why interesting books to read about the history of the CIA.
- The Dulles brothers,
- David Talbot: The Devil's Chessboard,
- Fletcher Prouty: The Secret Team.
I applaud former CIA and FBI Gary Bernstein for speaking out on the most powerful intelligence networks on the planet regarding their surveillance activities. Every nation needs intelligence to safeguard but if we go beyond the call of duty and get exposed .this leaves Pres Trump and his Adm with no option but to consider corrective measures with a visit to Langley etc.. Here again the failures of Liberalism are coming up in the wash for cleaning up.
Liberalism has not been running the country for the last 54 years. We have been under a coup government and just got used to it.
Jun 01, 2018 | www.zerohedge.com
Just two weeks after around a dozen Google employees quit and close to 4,000 signed a petition over the company's involvement in a controversial military pilot program known as "Project Maven" - which will use artificial intelligence to speed up analysis of drone footage - Buzzfeed reports that Google Cloud CEO Diane Greene told employees during an internal meeting that the tech company was "not following through" on Maven .As a reminder, Project Maven was to use machine learning to identify vehicles and other objects from drone footage - with the ultimate goal of enabling the automated detection and identification of objects in up to 38 categories - including the ability to track individuals as they come and go from different locations.
Project Maven's objective, according to Air Force Lt. Gen. John N.T. "Jack" Shanahan, director for Defense Intelligence for Warfighter Support in the Office of the Undersecretary of Defense for Intelligence, " is to turn the enormous volume of data available to DoD into actionable intelligence and insights. " - DoD
greenskeeper carl -> vato poco Fri, 06/01/2018 - 18:50 Permalinktoady -> greenskeeper carl Fri, 06/01/2018 - 18:50 Permalink
Well, good for those employees. An computer program figuring out targets to kill? No thanks, I've seen that movie before, several of them.
This does make sense from the pentagon's point of view, though. Drone pilots constantly burning out and having substance abuse problems because of the things they do from the air is bad for business. Just put a computer program in charge, solves that problem. Plus, you don't have to worry about the computer program talking to the media or giving remorseful interviews about the kids they've killed, etc.Rapunzal -> toady Fri, 06/01/2018 - 18:57 Permalink
Remember "don't be evil"?
Neither do they.ClickNLook -> ACP Fri, 06/01/2018 - 19:43 Permalink
Just a joke, they never quit. It's just a whitewash by the MSM. So we can believe in an honest system.beemasters -> greenskeeper carl Fri, 06/01/2018 - 18:50 Permalink
How exactly have they "revolted"?
Did they throw their custom coffee drinks on the floor, talked in squeaky voices to each other, raised their hands in anger, made some incoherent threats toward management in their private conversations, scotched a few more Dilbert cartoons on the outer walls of their cubicles? This kind of revolt?ScratInTheHat -> beemasters Fri, 06/01/2018 - 18:53 Permalink
Google employees rock.
I doubt the management will risk it by doing it secretly. But the military might find ways to reverse engineer whatever Google produces. If they get caught and have to pay damages...hey, it's taxpayers' money anyway they use against the people/humanity. They don't care.dietrolldietroll Fri, 06/01/2018 - 22:06 Permalink
Or Google hires third party to finish the project and doesn't tell their open employees what they are working on.
Correction: Google just created a secret project. Govt money doesn't take "no" for an answer.
May 29, 2018 | www.theamericanconservative.com
Powerful is the man who, with a short series of tweets, can single-handedly send the bluest of the blue-chip stocks into a headlong tumble. For better or for worse, the current occupant of the Oval Office is one such man, tapping into his power with the following missive that crossed the Twitter transom on the morning of March 29:
I have stated my concerns with Amazon long before the Election. Unlike others, they pay little or no taxes to state & local governments, use our Postal System as their Delivery Boy (causing tremendous loss to the U.S.), and are putting many thousands of retailers out of business!
Over the next few trading days, with four subsequent tweets peppered in, Amazon's stock dropped by more than $75 a share, losing a market value of nearly $40 billion. Card carrying-members of the Resistance and Never Trump brigade quickly portrayed the president's scorn as the latest evidence of his "soft totalitarianism" and general disdain for the First Amendment and the free press. They noted that Amazon's CEO and founder, Jeff Bezos, owns the Washington Post -- a leading "perpetrator" of what Trump has called the "opposition party" and "fake news."
Concerns of politically motivated impropriety are not without merit. Trump has repeatedly proven himself unworthy of the benefit of the doubt. As presidential candidate and commander in chief, he has demonstrated an eagerness to use his Twitter account as a bully pulpit in his petty brawls with lawmakers, media personalities, and anyone else who might draw his ire.
And yet, ulterior motives though there may be, knee-jerk dismissals of the president's attack are short-sighted. The president's bluster in this instance is rooted in reality.
Indeed, contra the libertarian ethos that Amazon and its leader purport to embody, the company has not emerged as one of history's preeminent corporate juggernauts through thrift and elbow grease alone. Although the company's harshest critics must concede that Amazon is the world's most consistently competent corporation -- replete with innovation and ingenuity -- the company's unprecedented growth would not be possible without two key ingredients: corporate welfare and tax avoidance.
Amazon has long benefitted from the procurement of taxpayer-funded subsidies, emerging in recent years as the leading recipient of corporate welfare. According to Good Jobs First, a Washington, D.C., organization dedicated to corporate and government accountability, Amazon has, since 2000, received more than $1.39 billion in state and local tax breaks and subsidies for construction of its vast network of warehouses and data centers.
These private-public "partnership" deals are perhaps best illustrated by the sweepstakes for Amazon's second headquarters. Touted as the economic development opportunity of the century, the chosen destination will reap the benefits of 50,000 "high-paying" jobs and $5 billion in construction spending. The possibility of securing an economic development package of this magnitude elicited proposals from 238 North American cities and regions, fomenting what some have called a "bidding war" between mayors, governors, and county executives desperate for economic invigoration.
After a first round deadline of October 19, the pool of applicants was, in mid-January, whittled down to a list of 20. As expected, each finalist offered incentive packages worth more than a billion dollars, with Montgomery County, Maryland, ($8.5 billion) and Newark, New Jersey, ($7 billion) offering the most eye-popping bundles. Proposals utilized a wide array of state and local economic development programs: property tax discounts, infrastructure subsidies, and, in the case of Chicago's proposal, an incentive known as a "personal income-tax diversion." Worth up to $1.32 billion, Amazon employees would still pay their income taxes in full -- but instead of Illinois receiving the money, the tax payments would be funneled directly into the pockets of Amazon itself.
While critics condemn the ostentatious bids of Maryland and New Jersey and decry the "creative" gimmicks of cities such as Chicago, they are equally worried about the details -- or lack thereof -- of the proposals from the other finalists. Despite demands for transparency from local community leaders and journalists, only a handful of cities have released the details of their bids in full, while six finalists -- Indianapolis, Dallas, Northern Virginia, Los Angeles, Pittsburgh, and Raleigh, North Carolina -- have refused to release any of the details from their first-round bids. Viewing themselves as players in a zero-sum game of high-stakes poker, they claim that there is little to gain, but a lot to lose, in making their proposals public.
Such secrecy has, in the second round of bidding, become the rule more than the exception. Although he owns a newspaper with the slogan "Democracy Dies in Darkness," Bezos has required state and local officials involved in negotiations to sign non-disclosure agreements. With the opportunity to revisit and revise their bids (i.e., increase their dollar value), the transition from public spectacle to backroom dealing introduces yet another cause for concern. If the finalists don't apprise citizens of their bids' details, the citizens can't weigh the costs and benefits and determine whether inviting the company into their midst will be a net positive or net negative.
Amazon's pursuit of public tithes and offerings is matched by its relentless obsession with avoiding taxes. Employing a legion of accountants and lawyers, the company has become a master at navigating the tax code and exploiting every loophole. Illegality is not the issue here but rather a tax system that allows mammoth corporations to operate with huge tax advantages not available to mom-and-pop shops on Main Street.
Of course Amazon isn't unique in its desire to avoid the taxman. It is, however, unrivaled in its ability to do so. Last fall's debate concerning the merits of lowering the corporate tax rate from 35 percent to 20 percent was, for Amazon, a moot point. In the five years from 2012 to 2016, Amazon paid an effective federal income tax rate of only 11.4 percent.
The company fared even better in 2017. Despite posting a $5.6 billion profit, Amazon didn't pay a single cent in federal taxes, according to a recent report from the Institute on Taxation and Economic Policy. What's more, Amazon projects it will receive an additional $789 million in kickbacks from last year's tax reform bill.
Even by the standards of mammoth corporations, this is impressive. By way of comparison, Walmart -- no stranger to corporate welfare and tax avoidance -- has paid $64 billion in corporate income tax since 2008. Amazon? Just $1.4 billion.
Amazon's tax-avoidance success can be attributed to two things: avoiding the collection of sales taxes and stashing profits in overseas tax havens. The IRS estimates that Amazon has dodged more than $1.5 billion in taxes by funneling the patents of its intellectual property behind the walls of its European headquarters city, Luxembourg -- a widely used corporate tax haven. Again, nothing illegal here, but there's something wrong with a tax system that allows it.
From day one, Amazon's business model involved legally avoiding any obligation to collect sales taxes, and then using the subsequent pricing advantage to gain market share. It did this by first locating its warehouses in very few states, most of which did not have a sales tax. It then shipped its goods to customers that resided in other states that did have sales tax. This game plan allowed Amazon to avoid what is known as "nexus" in sales-tax states, meaning that those states could not compel it to collect the tax -- a two to 10 percent competitive advantage over its brick-and-mortar counterparts.
Amazon exploited this tax advantage for years until state legislatures -- realizing how much revenue they were losing -- gradually began passing legislation requiring Internet retailers to collect sales taxes for items purchased by their citizens. In 2012, having already benefited from this competitive advantage for more than a decade and a half, Bezos -- under the pretense of a "level playing field" -- began advocating for federal legislation that would require Internet retailers to collect sales tax. No such legislation has been passed.
And despite Bezos's carefully calculated public relations posturing, Amazon's advantage over brick-and-mortar retailers persists: not only does Amazon not collect city and county sales taxes (where applicable) but it also doesn't, with few exceptions, collect sales tax on items sold by third-party distributors on Amazon Marketplace -- sales that account for more than half of Amazon's sales.
It is difficult to overstate how instrumental tax breaks and tax avoidance have been in Amazon's unprecedented growth. As Bezos made clear in his first letter to shareholders in 1997, Amazon's business plan is predicated on amassing long-term market share in lieu of short-term profits. As a result, the company operates on razor-thin margins in some retail categories, while actually taking losses in others.
Amazon has not squandered these competitive advantages. Half of online retail purchases are made through Amazon, and more than half of American households are enrolled in the Amazon Prime program -- a subscription service that engenders platform loyalty and leads to increases in consumer spending.
In fact, Amazon's ascent and tactics have led an increasing number of public policy experts to call for a renewed enforcement of America's antitrust laws. The concern is that Amazon has used its market power to crush smaller competitors with a swath of anti-competitive practices, including predatory pricing and market power advantages stemming from Amazon Marketplace -- Amazon's vast sales platform for third-party retailers.
Such practices may be a boon for consumers and Amazon stockholders, the reasoning goes, but they are only possible because Amazon uses economic power to squeeze its retail partners on pricing at various points in the production line, which harms the health of many other businesses. In fact, some suggest this bullying tendency calls to mind the actions of John D. Rockefeller in his dealings with railroad companies at the turn of the last century.
These monopolistic practices have squeezed local, state, and federal revenue streams in two ways. Not only do these governments forego the collection of needed tax revenue but Amazon's rise has also knocked out many brick-and-mortar competitors that previously had provided streams of tax revenue. By wooing Amazon with taxpayer-funded subsidies and other giveaways, government leaders are, in a very real sense, funding the destruction of their own tax base. There is little evidence that such taxpayer-funded inducements have resulted in a net positive to the states and localities doling out the subsidies.
By forsaking the tenets of free market orthodoxy, forgoing the collection of much-needed tax revenue, and giving big businesses major competitive advantages, state and local governments have generated increasing controversy and political enmity from both ends of the political spectrum. And yet, though bipartisan accusations of crony capitalism and corporate welfare abound, such opposition does little to dissuade state and local governments from loosening the public purse strings in their efforts to woo big corporations such as Amazon.
Daniel Kishi is associate editor of The American Conservative. Follow him on Twitter: @DanielMKishi .
May 23, 2018 | failedevolution.blogspot.gr
Facebook is hoping that a new alliance with the Atlantic Council -- a leading geopolitical strategy think-tank seen as a de facto PR agency for the U.S. government and NATO military alliance – will not only solve its "fake news" and "disinformation" controversy, but will also help the social media monolith play "a positive role" in ensuring democracy on a global level.
The new partnership will effectively ensure that Atlantic Council will serve as Facebook's "eyes and ears," according to a company press statement. With its leadership comprised of retired military officers, former policymakers, and top figures from the U.S. National Security State and Western business elites, the Atlantic Council's role policing the social network should be viewed as a virtual takeover of Facebook by the imperialist state and the council's extensive list of ultra-wealthy and corporate donors.
The partnership is only the latest in a steady stream of announced plans by the Menlo Park, California-based company to address controversy surrounding its role in the 2016 U.S. presidential election. The company has been mired in scandal stemming from the allegations of "election interference" carried out through the social network – usually pinned on the Russian government and ranging from the use of independent media to the theft of Facebook user data by political consultancy firm Cambridge Analytica.
The announcement should sound alarm bells when one considers the Atlantic Council's list of sponsors – including, but not limited to, war-profiteering defense contractors; agencies aligned with Washington and the Pentagon; Gulf Arab tyrants; major transnational corporations; and such well-loved Western philanthropic brands as Carnegie, Koch, Rockefeller, and Soros. Even the name of the group itself is meant to evoke the North Atlantic Council, the highest political decision-making body of North Atlantic Treaty Organization.
May 15, 2018 | www.nytimes.com
... ... ...
[Vault 7] was the largest loss of classified documents in the agency's history and a huge embarrassment for C.I.A. officials.
Now, the prime suspect in the breach has been identified: a 29-year-old former C.I.A. software engineer who had designed malware used to break into the computers of terrorism suspects and other targets, The New York Times has learned.
Agents with the Federal Bureau of Investigation searched the Manhattan apartment of the suspect, Joshua A. Schulte, one week after WikiLeaks released the first of the C.I.A. documents in March last year, and then stopped him from flying to Mexico on vacation, taking his passport, according to court records and relatives. The search warrant application said Mr. Schulte was suspected of "distribution of national defense information," and agents told the court they had retrieved "N.S.A. and C.I.A. paperwork" in addition to a computer, tablet, phone and other electronics.
But instead of charging Mr. Schulte in the breach, referred to as the Vault 7 leak, prosecutors charged him last August with possessing child pornography, saying agents had found 10,000 illicit images on a server he created as a business in 2009 while studying at the University of Texas at Austin.
Court papers quote messages from Mr. Schulte that suggest he was aware of the encrypted images of children being molested by adults on his computer, though he advised one user, "Just don't put anything too illegal on there."
In September, Mr. Schulte was released on the condition that he not leave New York City, where he lived with a cousin, and keep off computers. He was jailed in December after prosecutors found evidence that he had violated those rules, and he has been held at the Metropolitan Correctional Center in Manhattan since then. He has posted on Facebook under a pseudonym a series of essays critical of the criminal justice system.
It is unclear why, more than a year after he was arrested, he has not been charged or cleared in connection with Vault 7. Leak investigators have had access to electronic audit trails inside the C.I.A. that may indicate who accessed the files that were stolen, and they have had possession of Mr. Schulte's personal data for many months.
... ... ...
According to his family and his LinkedIn page , Mr. Schulte did an internship at the National Security Agency while working on a bachelor's degree in computer engineering. He worked in the C.I.A.'s Engineering Development Group, which designed the hacking tools used by its Center for Cyber Intelligence. He left the agency in November 2016 and moved to New York to work for Bloomberg L.P. as a software engineer.
Most of the government's cyberespionage is carried out by the N.S.A., but the C.I.A. also employs hackers. The leaked Vault 7 documents came from the agency's Engineering Development Group and included descriptions and instructions for the use of agency hacking tools, but only a small amount of the actual computer code for the tools.
.... ... ...
Apr 11, 2018 | www.unz.com
Bill Jones , April 10, 2018 at 9:57 pm GMTAnother step closer to the totalitarian state
The Department of Homeland Security wants to track the comings and goings of journalists, bloggers and other "media influencers" through a database.
Apr 02, 2018 | www.theguardian.com
Are you ready? Here is all the data Facebook and Google have on you Dylan Curran The harvesting of our personal details goes far beyond what many of us could imagine. So I braced myself and had a look
Fri 30 Mar 2018 03.17 EDT First published on Wed 28 Mar 2018 06.00 EDT Share on Facebook Share on Twitter Share via Email
View more sharing options Share on LinkedIn Share on Pinterest Share on Google+ Share on WhatsApp Share on Messenger Close A slice of the data that Facebook keeps on the author: 'This information has millions of nefarious uses.' Photograph: Dylan Curran W ant to freak yourself out? I'm going to show just how much of your information the likes of Facebook and Google store about you without you even realising it. Google knows where you've been
Google stores your location (if you have location tracking turned on) every time you turn on your phone. You can see a timeline of where you've been from the very first day you started using Google on your phone.
Click on this link to see your own data: google.com/maps/timeline?
Here is every place I have been in the last 12 months in Ireland. You can see the time of day that I was in the location and how long it took me to get to that location from my previous one.Facebook Twitter Pinterest 'A Google map of every place I've been in Ireland this year.' Photograph: Dylan Curran Google knows everything you've ever searched – and deleted
Google stores search history across all your devices. That can mean that, even if you delete your search history and phone history on one device, it may still have data saved from other devices .
Click on this link to see your own data: myactivity.google.com/myactivity
ss="rich-link"> Why have we given up our privacy to Facebook and other sites so willingly? Read more Google has an advertisement profile of you
Google creates an advertisement profile based on your information, including your location, gender, age, hobbies, career, interests, relationship status, possible weight (need to lose 10lb in one day?) and income.
Click on this link to see your own data: google.com/settings/ads/Google knows all the apps you use
Google stores information on every app and extension you use. They know how often you use them, where you use them, and who you use them to interact with. That means they know who you talk to on Facebook, what countries are you speaking with, what time you go to sleep.
Click on this link to see your own data: security.google.com/settings/securGoogle has all of your YouTube history
Google stores all of your YouTube history, so they probably know whether you're going to be a parent soon, if you're a conservative, if you're a progressive, if you're Jewish, Christian, or Muslim, if you're feeling depressed or suicidal, if you're anorexic
Click on this link to see your own data: youtube.com/feed/history/sThe data Google has on you can fill millions of Word documents
Google offers an option to download all of the data it stores about you. I've requested to download it and the file is 5.5GB big , which is roughly 3m Word documents.
ass="inline-garnett-quote inline-icon ">
Manage to gain access to someone's Google account? Perfect, you have a diary of everything that person has done
This link includes your bookmarks, emails, contacts, your Google Drive files, all of the above information, your YouTube videos, the photos you've taken on your phone, the businesses you've bought from, the products you've bought through Google
They also have data from your calendar, your Google hangout sessions, your location history, the music you listen to, the Google books you've purchased, the Google groups you're in, the websites you've created, the phones you've owned, the pages you've shared, how many steps you walk in a day
Click on this link to see your own data: google.com/takeoutFacebook has reams and reams of data on you, too
Facebook offers a similar option to download all your information. Mine was roughly 600MB, which is roughly 400,000 Word documents.
This includes every message you've ever sent or been sent, every file you've ever sent or been sent, all the contacts in your phone, and all the audio messages you've ever sent or been sent.
Click here to see your data: https://www.facebook.com/help/131112897028467Facebook Twitter Pinterest 'A snapshot of the data Facebook has saved on me.' Photograph: Dylan Curran Facebook stores everything from your stickers to your login location
Facebook also stores what it thinks you might be interested in based off the things you've liked and what you and your friends talk about (I apparently like the topic "girl").
Somewhat pointlessly, they also store all the stickers you've ever sent on Facebook (I have no idea why they do this. It's just a joke at this stage).
They also store every time you log in to Facebook, where you logged in from, what time, and from what device.
And they store all the applications you've ever had connected to your Facebook account, so they can guess I'm interested in politics and web and graphic design, that I was single between X and Y period with the installation of Tinder, and I got a HTC phone in November.
(Side note, if you have Windows 10 installed, this is a picture of just the privacy options with 16 different sub-menus, which have all of the options enabled by default when you install Windows 10)Facebook Twitter Pinterest Privacy options in Windows 10. Photograph: Dylan Curran They can access your webcam and microphone
The data they collect includes tracking where you are, what applications you have installed, when you use them, what you use them for, access to your webcam and microphone at any time, your contacts, your emails, your calendar, your call history, the messages you send and receive, the files you download, the games you play, your photos and videos, your music, your search history, your browsing history, even what radio stations you listen to.
ss="rich-link"> Facebook told me it would act swiftly on data misuse – in 2015 | Harry Davies Read more Here are some of the different ways Google gets your data
I got the Google Takeout document with all my information, and this is a breakdown of all the different ways they get your information.Facebook Twitter Pinterest 'My Google Takeout document.' Photograph: Dylan Curran
Here's the search history document, which has 90,000 different entries, even showing the images I downloaded and the websites I accessed (I showed the Pirate Bay section to show how much damage this information can do).Facebook Twitter Pinterest 'My search history document has 90,000 different entries.' Photograph: Dylan Curran Google knows which events you attended, and when
Here's my Google Calendar broken down, showing all the events I've ever added, whether I actually attended them, and what time I attended them at (this part is when I went for an interview for a marketing job, and what time I arrived).Facebook Twitter Pinterest 'Here is my Google calendar showing a job interview I attended.' Photograph: Dylan Curran And Google has information you deleted
This is my Google Drive, which includes files I explicitly deleted including my résumé, my monthly budget, and all the code, files and websites I've ever made, and even my PGP private key, which I deleted, that I use to encrypt emails.Facebook Twitter Pinterest Google can know your workout routine
This is my Google Fit, which shows all of the steps I've ever taken, any time I walked anywhere, and all the times I've recorded any meditation/yoga/workouts I've done (I deleted this information and revoked Google Fit's permissions).Facebook Twitter Pinterest And they have years' worth of photos
This is all the photos ever taken with my phone, broken down by year, and includes metadata of when and where I took the photosFacebook Twitter Pinterest Google has every email you ever sent
Every email I've ever sent, that's been sent to me, including the ones I deleted or were categorised as spam.Facebook Twitter Pinterest And there is more
I'll just do a short summary of what's in the thousands of files I received under my Google Activity.
First, every Google Ad I've ever viewed or clicked on, every app I've ever launched or used and when I did it, every website I've ever visited and what time I did it at, and every app I've ever installed or searched for.Facebook Twitter Pinterest 'They have every single Google search I've made since 2009.'
They also have every image I've ever searched for and saved, every location I've ever searched for or clicked on, every news article I've ever searched for or read, and every single Google search I've made since 2009. And then finally, every YouTube video I've ever searched for or viewed, since 2008.
This information has millions of nefarious uses. You say you're not a terrorist. Then how come you were googling Isis? Work at Google and you're suspicious of your wife? Perfect, just look up her location and search history for the last 10 years. Manage to gain access to someone's Google account? Perfect, you have a chronological diary of everything that person has done for the last 10 years.
This is one of the craziest things about the modern age. We would never let the government or a corporation put cameras/microphones in our homes or location trackers on us. But we just went ahead and did it ourselves because – to hell with it! – I want to watch cute dog videos.
• A caption was corrected on 28 March 2018 to replace "privacy options in Facebook" with "privacy options in Windows 10".Dylan Curran is a data consultant and web developer, who does extensive research into spreading technical awareness and improving digital etiquette
Apr 02, 2018 | www.moonofalabama.org
The obvious question came up: Should I buy a smartphone to replace my trusted Ericsson?
I tested several of the current top-of-the-line smartphones - Motorola, Samsung, Apple. They were in the same relative price range as my old Ericsson was at its time. But they lack in usability. They either have a too small screen for their multitude of functions or they are bricks that require an extra pocket.I do not want to give all my data into the hands of some unaccountable billionaires and unknown third parties. I do not want my privacy destroyed.
So no - I decided not to buy a smartphone as replacement for my trusted Ericsson companion.
Here is my new phone:
It is a Chinese product sold in Germany under the Olympia brand. It is a GSM quad-band 'dumb' phone with FM radio and a flashlight. The standby time is 140 hours and talk-time is 3+ hours. The battery is a standardized model and future replacements will be easy to find.
Size and weight are nearly the same as the old Ericsson. The keys are much bigger, illuminated and easier to handle, especially in the dark. It is a robust construction and the sound quality is good.
It cost me €22.00 ($26.40).
Posted by b on April 2, 2018 at 03:28 PM | Permalink
Tian , Apr 2, 2018 3:48:53 PM | 2I'm not convinced the new generation of retro dumb phones aka feature phones do not also have all the same surveillance capabilities as their smart brethren - even though they don't expose those capabilities as features to the end user.John Zelnicker , Apr 2, 2018 4:05:54 PM | 7b - I only scanned your post, but my answer is: NO!Alan Reid , Apr 2, 2018 4:16:20 PM | 9
Don't buy a "smart" phone (or anything else labeled "smart"). They are nothing more than data collectors, part of the Internet of Things that, IMNSHO, is an existential threat to our civilization.
I just decided to look back at the end of the post. and I see that you took my advice. ;-)Well you have to ask yourself, Do i want to participate in a mass surveillance system for one, Then you have to ask Is their any reason i would accept constant audio recordings being made of my environment, then you have the camera angle to contend... Then your GPS location is a major issue, add the ultrasonic beacon thing and the cell tower triangulation aspect to consider.... the phone you have from 2001 is not anywhere near as proficient at many of these tasks being built well before the 2006 legislation regarding this series of systems... If it were me and i knew all about this stuff, i would pay a hell of a lot more than a new phone is worth to keep the old unit in service for as long as you could... Any new phone is going to do all the above to your privacy and then some the old one is very limited, so how concerned are you with being an open book to who ever has access to your phone from the hidden parts and functions you never get to use? Me? I have seen a ton of serious problems with the uses of the tech being built into the modern smartphones, some models give you lots of functions to use, some give you a basic lite experience, But ALL new devices give the state running the system a HEFTY pack of features you will never know about until it's damage has been done. Take my advice Keep the 2000 model going for as long as you can if you must have a mobile phone. If you WANT to be the target of every nasty thing the state does with this new tech investigator/spy then by all means get one of the smart type, Any new one is just as bad as any other after 2006 legislation changes went into effect. 2001 was a very bad event for this topic... I will not have one after the events that befell me. A high performance radio computer with many types of real world sensors, using a wide spread and near unavoidable network of up link stations is the states most useful weapon. Everyone chooses to have what they have, You can also choose to NOT have, but few choose NOT, many choose the worst option on old values of this sort of choice and never think about the loss they incur to have the NEW gadget for whatever reason they rationalize it.Whorin Piece , Apr 2, 2018 4:21:54 PM | 12Smart phones are destroyers of information sovereignty. With a PC one can save a copy of every page you visit whereas with the smart phone all you can practically do is view things. It pisses me off.nervos belli , Apr 2, 2018 4:23:24 PM | 13
Has anyone noticed how shallow the so called world wide web has gotten these days.,? Search terms which would in the psst throw up hundreds if not thousands of webpages on the subject matter now result in sometimes no more than 3 or 4 entries. Google has stolen the internet of us all. The web is dead. Cunts like zuckerberg should be drop kicked into the long grass.The main espionage equipment in a smartphone or dumbphone is not the application processor and the programs that run on it. It's the GSM/3G/UMTS/LTE/5G chipset which every single one of them obviously has. "We kill with metadata" is the most important aphorism about phones, no matter which kind, ever.psychohistorian | Apr 2, 2018 4:23:43 PM | 15
However, a smartphone gives you lots of convenience which your 22$ chinaphone doesn't give you. A browser when on the road, a book reader, a map device.
You have to take a few precautions, e.g. use LineageOS, install AFWall and XPrivacy. Nothing different from using a PC basically. And you certainly shouldn't shell out 500$ for one. Every dollar/euro above ca. 100 has to be very well justified.
Sure, you can live in the 80s, nothing wrong with that. We lived fine back in those days too, but why not take advantage of some of the improvements since then?
Nice post b. Expresses my sentiments exactly.
I had to take my Nokia X2 out of the plastic bag I keep it in so it doesn't get wet to see what model it was....I keep the battery out and pay T Mobile $10/year to have emergency minutes when I need them....I maintain and use a land line for all my calls.
It is not like these devices couldn't be useful but like the desktop OS world, bloatware is a standard now. I have programmed handheld devices since 1985 and my latest was a MS Windoze10/C# inventory management application with barcodes and such.
Prior to the Nokia I have now I was nursing along a Palm 720p until I couldn't get a carrier to support it anymore. So since the Palm I have consciously gone back to a Weekly Minder type of pocket calendar which I had to use before the online capability came along.
If our world were to change like I want it to by making the tools finance a public utility I might learn to trust more of my life to be held by technology than the 5 eyes already know......Everyone has seen the movie SNOWDEN , correct?.....my Mac laptop had tape over the camera as soon as I brought it home.....I have a nice Nikon Coolpix camera with the GPS turned off and the battery out......grin
visitor , Apr 2, 2018 4:41:50 PM | 18I understand your choice, but you should have looked for a basic phone not just with GSM (2G), but also at least with UMTS (3G).Stephane , Apr 2, 2018 4:49:37 PM | 20
GSM is being wound down, and the frequencies reallocated to LTE (4G).
Many operators in several countries have already switched off their GSM networks (Australia, USA...) This means that in about 3-4 years, you will have real difficulties using your new mobile phone, at least in developed countries; in the Third World, GSM will probably last a bit longer.I have a cheapo Nokia 100 for calls and a YotaPhone 2 as a tablet. The Yota is Russian but I don't mind the FSB 😃 Aldo it has two screens, one being a passive black and white for use in full bright sun light.xor , Apr 2, 2018 4:50:34 PM | 21I think b made a wise decision. Up till now I've also not needed a smart phone and the continious "connection" or being hooked to the "matrix" would not only eat my valuable time away but would also make me feel more bound.aquadraht , Apr 2, 2018 5:19:24 PM | 25
"Another disadvantage of smartphones is enormous amount of personal data they inevitably steal for uncontrolled use by third parties. The technical consultant Dylan Curran studied this:
As soon as an Android smartphone is switched on Google will collect ALL data on every location change and on anything done on the phone. Apple does likewise with its iPhones."
That's the basic privacy nullification. There is also what can be described as the invasive potential. Certain companies, next to intelligence agencies, have made it their business to switch a victims own smart phone into a full blown active spy device. Obviously the victims are particular persons of interests like Dilma Roussef. Whenever a person is having a conversation, talks to himself out loud, has a meeting or is intimate, all sounds and conversations can be recorded next to video when the phone is positioned well. As we know, most people will not or can't part from their beloved smart phone.I can not tell what to do. In fact, when buying a "smartphone", you have to get used that the phone will be discharged during 1 or 1.5 days, you will become dependent to next USB source, or a battery pack (which is somewhat heavy, 1 pound ca. but not too bulky.Jay , Apr 2, 2018 5:59:47 PM | 29
Personally, I am using such a device since 5 yrs ca., first a 4.7" HTC one of my daughters gave me. I soon installed Cyanogenmod (now LineageOS) and threw away all the bloat and especially the Google and Facebook dirt and spyware. I do not have an email account on the brick, rather a browser over which I may access the Web representation of my email account, which is NOT gmail or similar. I do not use Google playstore.
The "killer apps" for me are mainly FBReader, a free ebook reader, VLC for audio and video, and OSMand, an OpenStreetMap client. Some simple calendar, picture etc. apps are on as well. My recent phone is a Samsung S4 mini, bought used for 50€.
This is a minimalistic setup, but makes tracking and spying other than by government agencies difficult. LineageOS is updated nearly every week, so fairly safe against Android malware.
With a "regular" smartphone, you will lack updates after a few years, have a lot of bloat on board you cannot get rid of, be forced to have a Google account for access of the software repository Google playstore, which is deeply integrated into Android. If one does not care to be spied and sniffed not only by the FBI and NSA, but by Brin and Zuckerberg in addition, ok.
Greetings, a^2Provided one has access to good public WiFi: It seems to me that Wifi and a tablet, or laptop (with a good battery) + the use of a virtual proxy network, VPN, which are almost always encrypted, is better than a smartphone. (Of course if the tablet is Android don't use the Chrome web browser.)xor , Apr 2, 2018 6:17:31 PM | 30
Then just buy a 25 euro Samsung or LG flip phone for the talking part of phone use. It won't last 17 years, but one can still get batteries for them.
Of course this approach doesn't work if you don't have solid public WiFi where you'd normally use a smartphone in public.@mh505 #27 Even with a SIM card not linked to your personal ID card it's fairly easy to automatically tie your smartphone to your person whereby you end up in the drag net you try to escape. Not in the least thanks to your close ones whom probably have you listed with your full name + phone number (thus SIM) in their smartphone. And that's even besides you connecting to all kinds of services offered by Google and the likes that know where you personally hang out because of WIFI access points, GPS location (if enabled), connected IP address where someone else connected to who has GPS enabled etc.Piotr Berman , Apr 2, 2018 6:35:20 PM | 32
Unfortunately your list of EU countries that don't require personal ID to purchase a SIM card is incorrect.It depends on the prices in your phone market.Dee Wrench , Apr 2, 2018 9:08:38 PM | 42
In USA it pays to be stupid. The choice I have is to use a smart phone with a monthly charge ca. 100 dollars or a stupid phone with a monthly charge of 8 dollars (or is it 15? and the phone for 8). And if you are old enough you can bear with hardships like memorizing the map of the area were you live, having to check stuff on your own desktop computer before you leave home etc. And the difference in costs can be spent on cigarettes, beer, donations to OxPham, it is your pick.
Concerning surveilance, a stupid phone is used sparingly, so it definitely provides less tracking info.I'm a 53 year old dog and try to keep things simple for myself. Being paranoid about being tracked and watched isn't my thing. I use my smart phone as a phone when I need to talk to an asswipe at work or my only friend to schedule a meetup or the wife unit when she calls. I have limited data so I usually wait until I'm home to view porn and news websites on the pc. I don't do any financial tasks on the phone, rarely text anyone, rarely use the camera, have only a few apps for things like weather and writing myself a note to remember to pick up milk or dog food on the way home from work. My life is so boring and my bank account so empty I'm not worth a bother to "them".
Apr 01, 2018 | www.nakedcapitalism.com
Lambert here: Readers will notice that Auerback seems to assume that Cambridge Analytica's shenanigans with Facebook data shifted votes in 2016 (as do the links to which he cites)*. His post summarizes the political and analytical state of play, but may be usefully read in conjunction with this 2017 post at NC by Marina Bart, who cautioned :
There is no question that modern social media facilitates highly segmented marketing. There is no question that political campaigns can benefit from this. Figuring out who might be receptive to your candidate and their policies, where they vote, and motivating them to go to the polls is fundamental campaign work. But that is not at all the same thing as manipulating people into voting against their interests, which is presumably what is feared (and possibly secretly hoped for) by the fretful Democrats. There is no evidence Cambridge Analytica did any psychological manipulations for Trump.
I'm not saying it's impossible for Big Data highly segmented psychological manipulation to ever work. But it isn't happening now; there's no evidence it will work in the near future; there are many, many obstacles to overcome; and there are two very basic reasons why it cannot be the secret weapon I suspect the Democrats long for.
The most basic one is that voting is not the same as buying stuff . There is no direct connection between casting a vote and getting anything in return, not even the momentary pleasure of buying a candy bar.
(In other words, the current Cambridge Analytical scare is based on a category error.) Of course, from a Wall Street "beauty contest" perspective, what Facebook can actually do may matter less than what people think it can do. From my own perspective, I don't want Facebook's filthy data-gathering proboscis nuzzling my personal affairs at all , regardless of any effect it may have, and that goes for Google, too. Whether I'm an outlier in my revulsion remains to be seen.
NOTE * Indeed, were evidence for this assumption to exist, one would assume it would already have been produced. If it has been, I've missed it, and I do try to keep track.
By Marshall Auerback, a market analyst and commentator. Originally published at Alternet .
Cambridge Analytica's systematic harvesting of Facebook user preferences to create detailed models of voter emotions appears to have played a significant role in the election of Donald Trump and the victory of the "Brexiters" on the referendum on whether the United Kingdom should leave the European Union or not. There is shock and anxiety at the revelations about how a few right-wing ideologues were able to exploit Facebook's database and then use it to justify populist campaigns fronted by publicity hounds of dubious moral and financial principles (Donald Trump, Steve Bannon and Nigel Farage immediately spring to mind).
Whether the Facebook fiasco conclusively proves either Russian involvement in the 2016 election (or the UK's Brexit referendum), or simply highlights the violation of campaign finance laws, is yet to be determined. But what is certainly beyond dispute from the apparently unauthorized use of Facebook's database of some 50 million users is that longstanding Madison Avenue advertising techniques worked equally well when applied to majority voting instead of employee practices or consumer spending. One possible outcome is that centralized repositories like Facebook -- or Google, or Amazon -- could become a ripe target for regulation and/or anti-trust action. Another possibility is that the voluntary participation on which Facebook is built will collapse spontaneously via consumer rejection.
That course of action is currently being advocated by WhatsApp co-founder Brian Acton, who is spearheading a #DeleteFacebook campaign .
In one sense, there is nothing new in what Facebook and Cambridge Analytica have done. Way back in 1957, author Vance Packard's The Hidden Persuaders described how :
"Large-scale efforts are being made, often with impressive success, to channel our unthinking habits, our purchasing decisions, and our thought processes by the use of insights gleaned from psychiatry and the social sciences. Typically these efforts take place beneath our level of awareness, so that the appeals which move us are often, in a sense, 'hidden.'"
But in a world in which we have all become reliant on the internet for our information, our searches and declared preferences are constantly recorded. Therefore an uncanny amount about us can be learned in a manner that is far more centralized and prone to manipulation than traditional forms of advertising. A wave of shrinkage in traditional advertising firms has correspondingly occurred as the robotic, targeted advertising has become the new norm, largely because it is both cheaper and more effective.
Facebook in particular is a social media way of harnessing interpersonal linkages through the net. Its model must be using those links and the information they generate to create value for advertisers. Any user of Facebook (or Amazon) can easily see how fast browsers insert ads related to one's most recent searches. So it becomes manifestly clear that these companies are tracking us for common advertising purposes.
Politics has always looked into the underlying motivations of voters to manage them. But using the data as documented by the Guardian , this went to a new level of political detail in 2016 that fueled the faster cycle of hard-hitting Trump campaigning. Facebook, Google, Amazon, Twitter, etc., have all become huge aggregators of this information. Facebook CEO Mark Zuckerberg's recent apologies notwithstanding , the companies are either being naïve in proclaiming shock that their data can be misused or, more likely, have been so obsessed with building market share and watching their company market caps explode into the hundreds of billions of dollars that they willfully ignored the scope for abuse. Either way, the information seems to have reached a threshold of importance where governments will step in and disrupt the existing mode, especially now that the full power of this database has been recognized and exploited by a successful political candidate, whether via regulation or antitrust measures. Otherwise, the demands will rise for Facebook to give the data to all, because it cannot guarantee that it has been erased everywhere, which has disturbing implications for our privacy (as well as threatening to destroy Facebook's business model, the success of which is predicated on the exclusive use of the data aggregated from the user base).
However much someone like Brian Acton, who was made a billionaire courtesy of Facebook's purchase of his company, might like others to embrace his #DeleteFacebook campaign, that appears problematic, given how successfully the use of Facebook's model operated in the political context. But there is growing international political momentum to strip the " social network " and its targeted advertising model of much of its abilities to record and use customer data. Former President Barack Obama hinted at this at a recent speech at MIT :
"I do think the large platforms -- Google and Facebook being the most obvious, Twitter and others as well, are part of that ecosystem -- have to have a conversation about their business model that recognizes they are a public good as well as a commercial enterprise. They're not just an invisible platform, they're shaping our culture in powerful ways."
Obama did not explicitly state what he had in mind for these companies, but he did suggest that at a minimum, "the government should have 'rules of the road' to create a level playing field." Even if users find they can't do without their daily Facebook fix, Google search, or Amazon shopping spree, the former president is right. A price will be paid as these companies' activities are increasingly scrutinized.
There are defenses that have been mounted in favor of an unregulated market for Big Data, notably by People Analytics, an organization run by Alex Pentland and his colleagues at MIT's Media Lab. Pentland feels the very centralized nature of the aggregated data is what makes these companies such excellent research targets:
"With the advent of big data and machine learning, researchers actually have enough data and sufficient mathematical tools to build predictive mathematical models. If you talk to other people and see what they are doing, you can improve your own performance, and as you talk to more and more people, you continue to do better and better."
What is not to like? Better decision-making, higher productivity, more efficient communication networks: It looks like a win-win all around. Of course, it was under the guise of research that Cambridge Analytica allegedly got the Facebook data in the first place. It can be used as cover for less benign purposes.
Going further, Pentland cleverly invokes a "New Deal on Data" that allows for the "rebalancing of the ownership of data in favor of the individual whose data is collected. People would have the same rights they now have over their physical bodies and their money."
In theory, this allows the individual discretion as to how much he/she will share with corporations and government regulators. Pentland goes on to suggest that, "the economy will be healthier if the relationship between companies and consumers is more respectful, more balanced. I think that's much more sustainable and will prevent disasters."
Pentland's optimism sounds somewhat naïve in the wake of Edward Snowden's revelations, as well as the current Facebook controversy. Of course, anything that further legitimizes this intrusion on our privacy will be welcomed by these entities. How much do we, the owners of our own personal data, actually control it? As far as the government goes, not much, Snowden's revelations (or those of WikiLeaks) illustrated. And surely the current Facebook and Cambridge Analytica imbroglio undercuts this benign picture that Pentland describes of a happy, informed consumer who autonomously shares his data with various companies, with a view toward building a more "balanced" relationship.
On the contrary, the Facebook fiasco highlights that there exists a thoroughly unequal partnership between the aggregators of information and the information owners, making abuse almost inevitable. Indeed, it is highly doubtful that most consumers and users are even aware of the extent to which their habits, thoughts, and overall private space are monitored by these companies (to say nothing of the more obvious government and law enforcement agencies, even if we're not terrorists).
In general, the notion of a level playing field of information or data that the market can freely and efficiently price has been debunked successfully by Nobel Laureates George Akerlof and Joseph Stiglitz. Both have challenged the " efficient market hypothesis ," which holds that market prices or odds reflect all known information, mitigating the need for intrusive government intervention/regulation. If information asymmetry exists, the obvious implication is that there is a need for some form of overriding regulation to rectify this imbalance. This would also seem to apply to Pentland's New Deal on Data.
Edward Snowden has made us question whether the data and corresponding privacy can be adequately safeguarded from more scrutiny by governments. The more relevant question from the point of view of, say, Silicon Valley and its high tech moguls is whether governments will move more aggressively to control the aggregators themselves, and whether the revelations of their abuses will provoke a backlash, which will impact their companies' growth and profitability.
Already, as Reuters reported, " Nordea, the Nordic region's biggest bank, will not let its sustainable funds buy more Facebook shares for the time being." The European Union has fined Facebook €110m "for 'incorrect or misleading' information regarding data sharing between Facebook and WhatsApp" (even though Facebook acquired the latter). And the EU has also proposed that "companies with significant digital revenues in Europe will pay a 3 percent tax on their turnover on various online services in the European Union," legislation that will cover Facebook (as well as Amazon and Google). Although the tax doesn't actually address the issue of the database abuse itself, the Cambridge Analytica scandal has dissipated valuable political capital for these companies, which will make it harder for them to stop these attacks on their business model and underlying profitability.
Indeed, the focus on taxing turnover, as opposed to profits, is telling, because sales records are far more difficult to doctor and conceal via accounting subterfuge than profits. In effect, this is tantamount to the EU stating to these tech giants, "Don't even think about making a transfer payment to Ireland and leaving yourself with an operating loss in our jurisdiction so you can pay no tax."
As the Brexit referendum illustrates, the Facebook and Cambridge Analytica scandal itself goes well beyond the U.S. Consequently, we can expect an attack on all fronts -- the U.S., the EU, and likely Asia as well. At this point it is too early to judge if this will have any impact on the ongoing Mueller investigation, but the economic implications already seem evident. The U.S. equity boom has been partly in reaction to deregulation in banking and elsewhere. The tech industry has largely escaped any kind of regulatory or antitrust scrutiny and has benefited accordingly. As Edward Harrison of the site Credit Writedowns has observed :
"Some of the best performing stocks in the US are the large Internet-centric technology stocks like Facebook. There is even an acronym, FANG, to describe Facebook, Amazon, Netflix and Google. Add Apple and, together, these five stocks account for one quarter of the Nasdaq's total market capitalization. They are huge. And Facebook's data breach represents a threat to them."
Could it be that public indignation at the Facebook profile harvesting scandal will lead to new regulation that could impede the value of some tech-based advertising models? Will it lead to a consumer backlash that slows the growth of the companies themselves? Certainly, it is easier to attack a wealthy and powerful company, if and when it becomes Public Enemy #1, even though many of these politicos will find themselves attacking the instruments of their own political success (or fundraising sources). Facebook or Google would no doubt argue that their platforms are just a facilitation of the communities inherent in the internet and that they have benefited by exploiting first mover advantage . But a centralized, monopolistic exploitation of these interpersonal links is inviting public intervention, especially as the technology can also survive on a distributed, competitive basis. In the eyes of many, these companies are unlikely to escape the opprobrium of helping to allow the Trump disaster to descend upon us. Overseas, they could well be scapegoated if the British economy falters as a result of leaving the European Union. On a broader scale, this scandal may well destroy any last vestiges of "techno-optimism," seeing how it has highlighted the misuses of technology and the human damage it can continue to inflict on us far more profoundly than ever before.
Apr 01, 2018 | www.zerohedge.com
Facebook In Turmoil: Employees In Uproar Over Executive's Leaked Memo
by Tyler Durden Sat, 03/31/2018 - 08:50 858 SHARES
Facebook's problems are just getting worse, and now investors can add worker morale to the (bucket) list of problems as the New York Times reports that employees furious over a leaked 2016 memo from a top executive seeking to justify the company's relentless growth and "questionable" data harvesting - even if it led to terrorists attacks organized on the platform.
VP Andrew "Boz" Bosworth - one of Facebook CEO Mark Zuckerberg's most trusted executives, wrote that connecting people is the greater good even if it " costs someone a life by exposing someone to bullies.
"Maybe someone dies in a terrorist attack coordinated on our tools."
On Friday, the fallout from Bosworth's leaked memo - following several weeks of outrage over the company's data harvesting practices, has Facebook employees in an uproar , according to The Times .
According to two Facebook employees, workers have been calling on internal message boards for a hunt to find those who leak to the media . Some have questioned whether Facebook has been transparent enough with its users and with journalists, said the employees, who asked not to be identified for fear of retaliation. Many are also concerned over what might leak next and are deleting old comments or messages that might come across as controversial or newsworthy , they said. - NYT
One former Facebook employee, Alex Muffett, wrote on Twitter that Bosworth's memo was a "significant" part of his decision to leave the company.
"Between overwork and leadership direction evidenced thusly, I could never stay," wrote Muffett.
"There are some amazing engineers working at Facebook, folks who care deeply about user privacy, security, and how people will use the code that they write," Mr. Muffett said later in a message. "Alas this episode may not help" to achieve more transparent internal product discussion, he said.
Buzzfeed article suppressed?
Following Buzzfeed's Thursday's publication of the "growth at any cost" leak, BuzzFeed reporter Ryan Mac suggested Facebook was censoring the article - tweeting "Interesting that only about 14k views (about 2% of total) for our story have come through Facebook referrals. Facebook's users should be aware of this, so feel free to share it on Facebook."
When Vox 's Matthew Yglesias chimed in to corroborate Mac's observation, Facebook head of news feed Adam Mosseri chimed in to say that the social media giant " 100% do not take any action on stories for being critical of us. "
Mark Zuckerberg responded to Bosworth's letter in a statement essentially disavowing the Boz, while also noting that Facebook changed their entire corporate focus to connect people and "bring them together"...
Boz is a talented leader who says many provocative things. This was one that most people at Facebook including myself disagreed with strongly. We've never believed the ends justify the means .
We recognize that connecting people isn't enough by itself. We also need to work to bring people closer together. We changed our whole mission and company focus to reflect this last year .
Meanwhile, Facebook is rapidly becoming radioactive, inside and out.
The question is when will investors - and especially hedge funds, for whom FB was the second most popular stock as of Dec. 31 - agree, and do what Mark Zuckerberg has been aggressively doing in recent weeks : dump it.0
DillyDilly Sat, 03/31/2018 - 08:52 PermalinkCognitive Dissonance -> Leakanthrophy Sat, 03/31/2018 - 09:00 Permalink
What a waste of fucking lives.Jumanji1959 -> johngaltfla Sat, 03/31/2018 - 09:26 Permalink
This is not a coordinated and concerted effort by Facebook execs to 'grow' the company at any and all costs because stock options must be vested 'in the money' and obscene amounts of 'compensation' are their god given right.
Nope, this is the work of a lone wolf exec VP who was drunk on power and out of control.
<Well, it works for the CIA to explain away their latest domestic terrorism operation or Presidential assassination attempt.>gregga777 -> Jumanji1959 Sat, 03/31/2018 - 09:42 Permalink
Goebbels would be proud of Zuckerbergglenlloyd -> ThanksChump Sat, 03/31/2018 - 11:16 Permalink
Goebbels would be proud of Zuckerberg
Press Statement for Immediate Release:
Today Mark Zuckerberg announced the official name change of FaceBook to GoëbbelsBook.
"Today marks the official change of our corporate name from FaceBook to GoëbbelsBook in honor of the German NSDAP (Nationalsozialistische Deutsche Arbeiterpartei) Reich Minister of Propaganda (1933-1945) Dr. Joseph Goëbbels (29 October 1897 – 1 May 1945). Dr. Goëbbels revolutionary and visionary dream was that of the total surveillance state. We have successfully implemented his concept of the total surveillance state."
"When a client downloads the GoëbbelsBook application it vacuums up everything from their computer and mobile devices. It gobbles up everything they write, all their contacts, their "likes"; in short every action they perform. The application also digitizes all telephone conversations for upload. The application then uploads everything to our corporate servers. We then upload all user data to the "Five Eyes" Gestapo (Geheime Staatspolizei) agencies that are our true original investors and beneficial owners."
"It is truly a proud day for me and all of my servants here at GoëbbelsBook that we have implemented the revolutionary total surveillance state vision of Dr. Joseph Goëbbels. I'm sure that he would be justifiably proud of our accomplishment."Ex-Oligarch -> ThanksChump Sat, 03/31/2018 - 14:05 Permalink
It's a little more complex than just Gramma giving up some data that she volunteers via a form. It's sucking in everything that a user does or says and selling that...everything. Same as Google.
In many cases you will find people who weren't aware that FB was selling user data, it's not really clear, unless you read the TOS fine print it's not clear. Even in the fine print what they do is obscured by the way they write it.
If the announcement of what they do with the data was in big bold letters at the top of FB every time you logged in the participation would be different.
This is one reason that although I've got a FB account I've never provided anything more than the de minimus information to have that account, and I don't spend much if any time on it. It's been weeks since I've logged in to FB.pigpen -> Jumanji1959 Sat, 03/31/2018 - 21:51 Permalink
You may be enjoying the mockery of FB users, but your line of argument ignores reality.
FB users indeed knew that the company was "selling something": advertising. Advertising in the form of "sponsored posts," newsfeed videos, solicitations to "like" an advertiser's page, notifications that someone in your network had liked an advertiser's page, and on and on and on. Every user viewed such advertising while using the service.
And indeed, selling targeted advertising is the dominant business model for providers of free content, messaging, email, webhosting, and a host of other internet services. It is exactly what a reasonable person would expect FB to be doing, based on its public disclosures and statements to the business community, and consistent with privacy laws. Even educated users would not expect the company to be selling its user data to third parties, let alone to government three-letter agencies. No one would expect the phone app to illegally log or record phone and message data for communications outside the app.Cognitive Dissonance -> City_Of_Champyinz Sat, 03/31/2018 - 09:34 Permalink
Jumanji, I live in heart of silicon valley and the goobook employees are so self important and associate working for the goobook surveillance tracking digtal advertising monopolies as a virtuous thing.
Let's call goobook what they are a surveillance tracking company that doesn't share any of the profits from your data with the owner: you.
My solution to these corporate pricks is to cut off their oxygen: digtal advertising and refuse to let them monetize me and others promoting using adblocking on mobile.
My solution is for everybody to immediately download brave browser or equivalent adblocker solution (depending on your tech knowledge).
Brave blocks advertising malware and tracking by DEFAULT on any device and operating system rendering digital advertising model useless.
Whoever controls the browser controls the money.
I use YouTube daily but run it out of brave browser. Zero ads and you can listen with screen off or while browsing other content.
We can destroy the value of digtal advertising by mass adoption of brave browser.
What is digtal advertising worth if ads can't be sent, viewed or tracked?
Let's take down the goobook surveillance tracking censorship monopolies. Install brave or equivalent mobile adblocker immediately.
PigpenThirteenthFloor -> Cognitive Dissonance Sat, 03/31/2018 - 10:28 Permalink
I created a fake FB account, then 'deleted' it when FB demanded I prove who I wasn't.
Does anyone wonder why FB only wants 'real' accounts? Data mining is so much more profitable when you can assure the purchaser the 'data' are grade A number one bleeders/spenders.OverTheHedge -> JoeSoMD Sat, 03/31/2018 - 11:38 Permalink
Facebook = Dillusional Narcissism
Problem is one day you may in fact be targeted for having no 'digital footprint', by the F's running the place. Read "The Circle".snblitz -> Cognitive Dissonance Sat, 03/31/2018 - 15:15 Permalink
Which ties in nicely with the US demanding social media account details with visa applications. You haven't said whether your work is us government based, but it would be pleasingly ironic if it were.
I'm still confused by that, actually: allegedly the NSA has all data, from everywhere, so why ask for the visa applicant's data? Is it too hard to connect physical and digital people, or are they just seeing if you will admit to your online indiscretions?chumbawamba -> KJWqonfo7 Sat, 03/31/2018 - 10:27 Permalink
14 day waiting period on facebook account deletes.
Some years ago I created a facebook account and then deleted it. Deleting it was not easy. When I did the final delete, it stated that all my data would be deleted, and would not be recoverable ever. I was also told I would have to **not** log into my account for 14 days after which everything would be gone. If I did log in during that period the account delete would not occur.
It has been some years and I still live in fear that if I was to "check" if my account still exists by attempting to log into it I will get a "Welcome back" message.
I suppose there are worse things. The account could be active and "owned" by someone else.nmewn -> Cognitive Dissonance Sat, 03/31/2018 - 09:09 Permalink
The CIA put way too much time, money and effort into Facebook to just let it fade away. Hell no, they will double down and figure out a way to keep the concern going, if under a different guise.
-chumblez.Cognitive Dissonance -> nmewn Sat, 03/31/2018 - 09:29 Permalink
But but but...they are listening! They even reformatted so their victims can moar easily delete private information themselves instead of having to dig down through twenty two screens to find it!
And Fuckerberg has a mansion. In Hawaii. With a wall. Because he cares!Philthy_Stacker -> Cognitive Dissonance Sat, 03/31/2018 - 09:51 Permalink
They even reformatted so their victims can moar easily delete private information themselves.....
The funniest part of your comment is the fact people will actually believe their information was 'deleted' because they push a button that said doing so would delete the information.
Riiiiiight. And I have a bridge in Brooklyn for sale that you can get for a steal.GunnerySgtHartman -> DillyDilly Sat, 03/31/2018 - 09:01 Permalink
"people will actually believe their information was 'deleted' "
Well, aside from birth and school records, most data will become 'stale' and worthless to advertisers and agencies. I suspect that your 'old' data will eventually become 'archived' in a storage array somewhere, essentially, statistically more worthless as time goes by. Perhaps, adding to a historical perspective on some future Documentary, about the collapse of Facebook.
Info on your birth, school, medical, jobs, driving record ... the authorities already have all that. Facebook is essentially worthless, other than as a phone book with pictures.JoeSoMD -> GunnerySgtHartman Sat, 03/31/2018 - 11:40 Permalink
It's amazing that FB employees were THIS NAIVE about what was going on in that company, thinking it was just about "connecting people." Anyone on the street with half a brain could see what was going on. Grow up and see the world for what it is, people.the_river_fish -> DillyDilly Sat, 03/31/2018 - 11:33 Permalink
I think it is more "being ignorant". To me, being naive implies being "an innocent". These people are hard core coders, computer scientists, network engineers, etc. What they do is figure out how to do outrageously complex technical things, and they are very successful at it. Like most scientists and engineers however, they never stop to ask "should we be doing these things". They stand on the shoulders of the scientist and engineers who came before them and continue to progress the state of their art, but never consider the ethics. I see it all the time at work. Can we develop this new thing? Sure. Should we develop this new thing? That's not my problem - management wants this new thing. They are no different than the guards at a concentration camp herding people to the ovens. I was only following orders.dark fiber Sat, 03/31/2018 - 09:02 Permalink
Alphabet (the parent company of Google) spent the most as a company on Lobbying. Facebook's spend on lobbying increased 5500% since 2009. They spent most lobbying on changes to data privacy.
https://thistimeitisdifferent.com/lobbying-on-data-privacynotfeelinthebern Sat, 03/31/2018 - 09:07 Permalink
Have Zuckerberg and the rest of the asseclowns over there realized how fuccked they really are? It is only a matter of time before class action and individual lawsuits are filed not only against Facebook (fuck that) but them personally, for intentionally and willfully creating a data mining operation disguised as a social network. They will get sued for every penny they have and will be lucky if they don't end up doing time.tedstr Sat, 03/31/2018 - 09:19 Permalink
The people who use this tripe are addicts, and like all addicts need rehab. They couldn't say how many articles are in the US Constitution yet practically know what Oprah eats for breakfast - and it ain't a Weight Watchers diet!Byrond Sat, 03/31/2018 - 09:39 Permalink
I got into the dotcom world in 97 got out in '11. Worked for a bunch of big and small dotcoms. They are all so badly run its hard to describe. rampant greed zero morality.. The VCs just want their 100:1 return. VCs are idiots. some are just stupid many are just illegal accounting fraud capitalizing expenses accelerating revenue recognition over stating audience. People forget that Fb has already had a bunch of exposed numbers "mistakes". Hope it goes to zero.JTPatroit Sat, 03/31/2018 - 09:48 Permalink
From an evolutionary standpoint, humans are extemely adapted to hiding feelings, thoughts, plans, motivations, and intentions. This has enabled our survival for millenia. Our ears don't move toward what or who we're listening to, and we don't have tails or bristling fur or feathers that would display our emotions. Facebook causes us to post all this stuff, then takes ownership and uses it to make a profit any way they can. Social media is not something that we are adapted to, and we're getting stomped on by the companies that engineer it.Nesbiteme Sat, 03/31/2018 - 09:50 Permalink
To me, what is really sad about this whole story is that there is nobody at Facebook - now or previously - who doesn't know that their company makes its money by harvesting data and selling it to anyone with a few bucks in their hand. I believe these employees are all lying when they deny this plain fact.
I believe the same to be true of Google, but of course, Google at least has never denied it, like Facebook is trying to do now that someone in the MSM has bothered to report about it.Smerf Sat, 03/31/2018 - 09:54 Permalink
Anyone here ever work with chickens...the henhouse/chicken analogy is often used with the facebook...when you walk into the henhouse sometimes the hens they aren't expecting visitors and they get all fussy and show their agitation through clucking and squawking and fussing about...but then after a few moments they go back to what they were doing as if nothing ever happened. That about what is going on here. Facebook users and employees will go back to work for their owners in a few more days and it will have been all forgotten.SirBarksAlot Sat, 03/31/2018 - 10:11 Permalink
Since most users of Facebook are gossiping women and deeply closeted homosexuals, I don't see this having a material impact on user growth. It may even suck more of them in.MusicIsYou Sat, 03/31/2018 - 10:13 Permalink
According to Thomas Paine, all the Facebook, Amazon, Google and Tesla are products of the DOD and are losing their hidden government support. That is the real reason that people like Zuckerberg and Soros are divesting.
https://youtu.be/AvKNnuSp2GwLast of the Mi Sat, 03/31/2018 - 10:52 Permalink
People will forget about any Facebook scandal after another scandal surfaces elsewhere in 3, 2, 1 and....... There goes the school of ADHD zombie fish-head people onto another hook, the scandal of the next week. The next scandal will hit the top of the pond and sink, and the fish-head school of people-fish will swim over to it and stare at the scandal to see if it moves. People are grotesquely simple minded.Nuclear Winter Sat, 03/31/2018 - 10:54 Permalink
fb will not recover from massive spying vs people will once again log on to say something snarky, see another picture of their neighbor's cat and above all else get a "like". OMG I'm important!
Soros has billions to funnel through the resistance that is fb for the furtherance of his global agenda. They may be down, but certainly not out.Koba the Dread Sat, 03/31/2018 - 18:59 Permalink
So now the FB employees finally see what the bloodsucking Vampire Zuckerberg and Frankenstein Bosworth really are: the enemy of the people. Time for a mass revolt, pitchforks and torches to burn down the platform.Trogdor Sat, 03/31/2018 - 20:13 Permalink
The Facebook Wall photograph is Photoshoped. While everyone else has written in freehand in chalk, the "Maybe someone dies!?". "Why We Spy So Much?" and "WTF?" posts are set in perfect computer type.
Facebook is a monster of deceit. Why does this article need to lie with Photoshopped photographs? If Facebook thinks we're rubes and yokels, so does this article.
Perhaps they're right.
"We've never believed the ends justify the means ." ~ Zuckerfucker
The Liberal Credo is "THE ENDS JUSTIFY THE MEANS" I can't tell you how many Liberals I've asked this very question and they will flat out tell you that if you have to throw babies into a branch chipper to get what you want, YOU DO IT . Lefties/Communists have always believed in mass murder to get what they want - so - spying on a few million people certainly doesn't give the pause.
Apr 01, 2018 | www.counterpunch.org... ... ...
Users with at least half a brain have long known that Facebook exploits their privacy and was probably from the start a vehicle for full-blown surveillance by our spy agencies. I certainly suspected the latter. In 2009, I wrote up a pitch for an investigative piece about Google, Facebook and their connections to the CIA. I published a piece in Counterpunch about the Google angle, but was never able to report out fully what I suspected about Facebook. In the pitch, I wrote:
If personal data could be collected in more concentrated, focused form, with the additional advantage of efficiently collating social networks, complete with personal photos, habits, activities and itineraries freely provided in a centralized system by the users themselves well, that would be Facebook. The intelligence services' hand in Facebook is not direct, but publicly available records suggest that venture capital was pumped into Facebook from investment firms whose board members cross-pollinate with a company called In-Q-Tel.
Founded in 1999 to research and invest in new digital technologies focused on intelligence gathering, In-Q-Tel was part of the push for the privatization of national security operations that would become endemic under the Bush Administration. Some $25 million in seed money during Google's start-up in 1999 arrived in part from the equity firm Kleiner Perkins Caufield & Byers, which works with In-Q-Tel to develop spy technology. In-Q-Tel-funded companies produced the eye-in-the-sky image database that would become Google Earth. In mid-2005, In-Q-Tel's former director of technology assessment, Rob Painter, joined Google as "senior federal manager," further cementing Google's bond with the intelligence community.
Like Google, Facebook is ambiguous in its privacy policies as to how it will share information with third parties. A former CIA officer, speaking anonymously, confirmed the CIA's interest in Facebook as an intelligence and communications tool, noting that the agency's use of Facebook for operations is "classified." The former CIA officer only went so far as to suggest the CIA may be using the site for communications. "It's a perfect place to hide communications," says the former CIA officer. "You don't need secret, expensive satellite systems anymore when you can hide in plain sight with millions of idiots sending photos and inane messages to each other." When pressed on the subject, the source reiterated: "How it's employed by [the CIA] is classified, and you shouldn't write about it." The Facebook angle for the proposed piece will require further reporting. What's widely known is that the CIA has been using Facebook since 2006 as a recruiting tool for the clandestine services, which marks the first time the CIA has employed online social networking for the hiring of personnel.
Ah, but denial is a powerful drug, one that produces amnesia, and I soon forgot my own reporting and marched as a guinea pig into the Facebook surveillance system. We now know exactly how Facebook shares information with third parties.
Deleting my account, I join an exodus that requires no explanation given the Cambridge Analytica disclosures. Hopefully this is the start of a movement that will drive the company's stock price down where we'll find greasy Mark Zuckerberg begging for a quarter on the corner. Perhaps sooner, someone skilled with demolitions and with access inside the company can blow up the Facebook servers, and we can be done with this menace altogether. More articles by: Christopher Ketcham
Christopher Ketcham is a freelance writer. You can write him at firstname.lastname@example.org or see more of his work at christopherketcham.com .
Apr 01, 2018 | www.theguardian.com
Trump is after Amazon, Congress is after Facebook, and Apple and Google have their problems too. Should the world's top tech firms be worried?
rump is going after Amazon; Congress is after Facebook; Google is too big, and Apple is short of new products. Is it any surprise that sentiment toward the tech industry giants is turning sour? The consequences of such a readjustment, however, may be dire.
Trump lashes out at Amazon and sends stocks tumbling
The past two weeks have been difficult for the tech sector by every measure. Tech stocks have largely driven the year's stock market decline, the largest quarterly drop since 2015.
Facebook saw more than $50bn shaved off its value after the Observer revealed that Cambridge Analytica had harvested millions of people's user data for political profiling. Now users are deleting accounts, and regulators may seek to limit how the company monetizes data, threatening Facebook's business model.
On Monday, the Federal Trade Commission confirmed it was investigating the company's data practices. Additionally, Facebook said it would send a top executive to London to appear in front of UK lawmakers, but it would not send the chief executive, Mark Zuckerberg, who is increasingly seen as isolated and aloof.
Shares of Facebook have declined more than 17% from the close on Friday 16 March to the close on Thursday before the Easter break.
Amazon, meanwhile, long the target of President Trump's ire, saw more than $30bn, or 5%, shaved off its $693bn market capitalization after it was reported that the president was "obsessed" with the company and that he "wondered aloud if there may be any way to go after Amazon with antitrust or competition law".
Shares of Apple, and Google's parent company Alphabet, are also down, dropping on concerns that tech firms now face tighter regulation across the board.
For Apple, there's an additional concern that following poor sales of its $1,000 iPhone X. For Google, there's the prospect not only of tighter regulation on how it sells user date to advertisers, but also the fear of losing an important Android software patent case with the Oracle.
Big tech's critics may be forgiven a moment of schadenfreude. But for shareholders and pension plans, the tarnishing of tech could have serious consequences.
Apple, Amazon and Alphabet make up 10% of the S&P 500 with a combined market capitalization market cap of $2.3tn. Add Microsoft and Facebook, with a combined market value of $1.1tn, and the big five make up 15% of the index.
Overall, technology makes up 25% of the S&P. If tech pops, the thinking goes, so pops the market.
"We're one week into a sell-off after a multi-year run-up," says Eric Kuby of North Star Investment Management. "The big picture is that over the past five years a group of mega cap tech stocks like Nvidia, Netflix, Facebook have gone up anywhere from 260% to 1,800%."
Confess -> Nedward Marbletoe , 1 Apr 2018 16:12The post office is a service for citizens. It operates at a loss. Being able to send a letter across the country in two days for fifty cents is a service our government provides. Amazon is abusing that service. It's whole business model requires government support.Byron Delaney , 1 Apr 2018 15:59Amazon's spending power is garnered simply from its massively overalued stock price. If that falls, down goes Amazon. Facebook is entirely dependent on the postive opinion of active users. If users stop using, down goes Facebook's stock price, and so goes the company. It's extremely fragile. Apple has a short product cycle. If people lose interest in its newest versions, its stock price can tank in one year or so. Google and Microsoft seem quite solid, but are likely overvalued. (Tesla will most likwly go bankrupt, along with many others.) If these stocks continue to lose value, rwtirement funds will get scary, and we could enter recession again almost immediately. Since companies such as Amazon have already degraded the eatablished infrastructure of the economy, there may be no actual recovery. We will need to change drastically in some way. It seems that thw wheels are already turning, and this is where we are going now - with Trump as our leader.lennbob , 1 Apr 2018 15:58'Deutsche Bank analyst Lloyd Walmsley said: "We do not think attacking Amazon will be popular."'PardelLux , 1 Apr 2018 15:54
Lloyd Walmsley hasn't spent much time in Seattle, apparently. The activities of Amazon and Google (but especially Amazon) have all contributed to traffic problems, rising rents and property prices, and gentrification (among other things) that are all making Seattle a less affordable, less attractive place to live. That's why Amazon is looking to establish a 'second headquarters' in another city: they've upset too many people here to be able to expand further in this area without at least encountering significant resistance. People here used to refer to Microsoft as 'the evil empire'; now we use it to refer to Amazon. And when it comes to their original business, books, I and most people I know actively avoid buying from Amazon, choosing instead to shop at the area's many independent book stores.Dear Guardian,Alexander Dunnett , 1 Apr 2018 15:42
why do you still sport the FB, Twitter, Google+, Instagramm, Pinterest etc. buttons below every single article? Why do you have to do their dirty work? I don't do that on my webpages, you don't need to do neither. Please stop it.Not being a Trump supporter, however there is a lot of sense in some of the comments coming from Trump,. Whether he carries through with them , is another subject.Neovercingetorix , 1 Apr 2018 15:20
His comment on Amazon:- " Unlike others, they pay little or no taxes to state or local governments, use our postal system as their delivery boy (causing tremendous loss to the US) and putting many thousands of retailers out of business."
Who can argue against that? Furthermore, the retailers would have paid some tax!
Talk about elephants in the room. What about the elephants who were let out of the room to run amuck ? Should it not have been the case of being wise before the event , rather than after the event?A quasi-battle of the billionaires. With Bezos, there's the immediate political element in Bezos' ownership of the clearly anti-Trump Washington Post, which has gone so far as to become lax in editorial oversight (eg, misspelling and even occasional incomplete articles published in an obvious rush to be first to trash POTUS), but there are other issues. Amazon's impact on physical retail is well-documented, and not so long ago (ie, before Trump "attacked" Amazon"), it was sometimes lamented by those on the American left, and Trump is correct in that critique, provided one believes it is valid in the first place. Amazon does have a lot of data on its customers, including immense expenditure information on huge numbers of people. What kinds of constraints are there in place to protect this data, aside from lawyer-enriching class action suits? Beyond that, there's also online defense procurement, worth hundreds of billions in revenue to Amazon in the years to come, that was included in the modified NDAA last year. Maybe that is on Trump's mind, maybe not, but it should probably be on everyone's mind. Maybe the Sherman Antitrust Act needs to be reinvigorated. It would seem that even Trump's foes should be willing to admit that he gets some things right, but that now seems unacceptable. I mean, look at the almost knee-jerk defense of NAFTA, which way back when used to be criticized by Democrats and unions, but now must be lionized.Byron Delaney , 1 Apr 2018 14:46If Amazon can get cheaper shipping than anyone else and enable manufactuers to sell direct, they can sell more than anyone else as long as consumers only buy according to total price. This means two things. One, all retailers as well as distributors may be put out of business. Two, the success of Amazon may rely almost entirely on shipping costs. American consumers also will need to forego the shopping experience, but if they may do so if they're sarisfied with remaining in their residences, workplaces, and cars most of the time. This is the case in many places. People visit Starbucks drive thrus and eat and drink in their cars. If Amazon owns the food stores such as Whole Foods and Starbucks, it's a done deal. Except for one thing. If this happens, the economy will collapse. That may have already happened. Bezos is no rocket scientist.
Apr 01, 2018 | www.counterpunch.org
Maybe it did expand my audience. I have no idea. About the only proven use I found was being able to get on Tinder to get laid, as you cannot have a Tinder account without a Facebook account. Thereafter I called it Fuckbook.
Mar 29, 2018 | discussion.theguardian.com
aliasboy -> ChomskyReader , 28 Mar 2018 08:45When a friend invited me to join Googlemail over a decade ago, I accepted and used it as an address for any organisation who might store or misuse my data.
Little was I to know that Android would rely on a Gmail address...
Having said that, my AdSense adverts still show me ads that are no way based on my online activity so I wonder if the same people are behind the algorithms here as were predicting the world economy in 2007.
Mar 29, 2018 | discussion.theguardian.combobbo123 , 28 Mar 2018 08:54While I love Wikipedia as a wonderful, creative application of social media, I've always been spooked by Facebook and the like, and consider the "internet of things" (IdiOT) directly intrusive ...Massaniello , 28 Mar 2018 08:46
Does my resistance to the big-bro-data invasion classify me as a Luddite? And how long will it remain technically feasible to opt out of the idiot stuff?I recall a time some 20 or so years ago when many of us thought about and wondered how in the world the Internet could survive if info and interactions were without monetary cost. It seemed like a space within which we could freely move and think and engage. I recall driving down the NJ Turnpike in 1993 Listening intently to a radio news report about the wonders of the upcoming information super highway that was about to bring us all together and overcome violence and racism and sexism and without any tolls. Al Gore himself was encouraging this wondrous new world. We were about to be a part of World Wide Web love fest reminiscent of a 1967 Summer of Love Be-In.
Now we know how the Internet survived. Call it innovation. I call it a police state, engineered by right-wing jerks at Stanford with a little help from their friends at Cal Tech, MIT, and Harvard, and based in Silicon Valley. If that's the way you want it, well that's the way you'll get it.
Mar 29, 2018 | discussion.theguardian.comlaerteg -> hellopixel , 28 Mar 2018 10:13Actually, it's wonderful (though it's also full of lies, propaganda and bs).
But like all too many wonderful things, the greedy and the power hungry despoil it, manipulate it to their own advantage, and use it to exploit others - often under the guise of "security."
A new technology is developed, people start using it, and before they know it, they can't live, work, or perform many daily tasks without it.
Oh, sure, all of us here could stop commenting online. We could abandon social networks. But what about everything else that involves giving up our personal information to a corporation and/or the government that has become part of how things get done in our world?
That's a heck of a lot harder.
Add to that our collective intention since 1980 to weaken government regulation of business' ability to do whatever it wants with our personal information, while increasing government's ability to surveil us and invade our privacy, as well, and you have an internet that is getting less and less wonderful by the day.
Oh, and don't forget those in business and government trying to destroy net neutrality, so some (those who can pay for it) will be more equal than others in their ability to use the internet.
We need to take ownership of our information and data back again and regulate the internet as a utility.
It may not have much affect on who knows what about those of us who have already given away our privacy, but it could protect future generations .
Mar 29, 2018 | discussion.theguardian.com
Bradther , 28 Mar 2018 10:14... Remember to look at the back of the your envelopes containing your personal mail - when it's being scanned by your State it will have it's rear various pencilled initials. At one time the departments in sorting offices were only allowed to deviate mail for twenty minutes but now given that standards have dropped not such constraints exist. That's progress.
Mar 29, 2018 | discussion.theguardian.com
vedvek -> wascallywabbit , 28 Mar 2018 10:06I recommend the new 'Brave' browser - it's primary focus is on privacy. It was created by the former CEO of Mozilla (Firefox) and employs at least one engineer involved in the development of the Tor browser (the one used for super-secure browsing on the dark web). Its snappy performance is also a pleasant surprise.wascallywabbit , 28 Mar 2018 09:4119. One way to limit the amount of data that you are providing is to stop using Google Chrome. It is a browser created by an advertising company specifically to harvest your personal information. If you are logged in to gmail, using google for your searches, watching Youtube and browsing on chrome, then you're making it easy for them. Try Firefox or one of the other browsers out there, use a different search engine, and don't leave your account logged in to google all day.dg000000 -> fishtail75 , 28 Mar 2018 09:30With every financial transaction, banks know the location, value and can estimate the goods I buy. They could run AI algorithms to determine everything about my habits and preferences to spend and sell this insight to shops and websites who could use this it to get me to part with my money easier...but they don't.
Mobile operators poll my mobile phone constantly so always know my location, they know the numbers I call and text so know my social network. They could run AI algorithms to determine where I'll be when, and who I'll likely be with...but they don't.
Mar 29, 2018 | discussion.theguardian.com
Battleweary -> LestWeNeverForget , 28 Mar 2018 11:19Make their day, write something outlandish.
Decades ago, long before mobile phones were invented, we used to get crossed lines on our landline regularly. We could hear other people in the background, and one day a nosy woman listening to our conversation was relaying what we were talking about to her husband, oblivious to the fact we could hear her, so we spiced up the conversation.
I started it by saying, "OK, but down to business, lets talk about next week". We made it sound as if we were planning a heist. She was totally taken in, to the point of asking her husband if she should tell the police! After a few minutes of leading her on, I said," Do you think the nosy bitch listening in on the crossed line got all that? ".
She slammed her phone down.
Mar 29, 2018 | www.theguardian.com
1. Download all the information Google has on you
You may well have downloaded your Facebook data already; it has become something of a trend in recent days. Now take a look at what Google has on you. Go to Google's "Takeout" tool and download your data from the multiple Google products you probably use, such as Gmail, Maps, Search and Drive. You'll get sent a few enormous files that contain information about everything from the YouTube videos you have watched, your search history, your location history and so on. Once you've seen just how much information about you is in the cloud, you may want to go about deleting it. I highly recommend deleting your Google Maps history, for a start, unless you are particularly eager to have a detailed online record of everywhere you have ever been. You may also want to stop Google from tracking your location history. Sign in to Google, open Maps, then click on "timeline" in the menu. At the bottom, there's an option to manage your location history.
... ... ...
10. Never put your kids on the public internet
Maybe it's fine to upload pics to a shared (private) photo album, or mention their day in a group DM. But if it's public, Google can find it. And if Google can find it, it's never going away. How are you going to tell your child in 16 years' time that they can't get a drivers' licence because Daddy put a high-res photo of their iris online when they were two and now they trip alarms from here to Mars?
12. Sometimes it's worth just wiping everything and starting over
Your phone, your tweets, your Facebook account: all of these things are temporary. They will pass. Free yourself from an obsession with digital hoarding.
If you wipe your phone every year, you learn which apps you need and which are just sitting in the background hoovering up data .
If you wipe your Facebook account every year, you learn which friends you actually like and which are just hanging on to your social life like a barnacle.
14. Have as many social-media-free days in the week as you have alcohol-free days
This can be zero if you want, but know that we're judging you.
15. Retrain your brain to focus
Save up your longreads using Instapaper or Pocket and read them without distraction. Don't dip in and out of that 4,000-word article on turtles: read it in one go. Or maybe even try a book!
16. Don't let the algorithms pick what you do
You are not a robot, you are a human being, and exercising your own free will is the greatest strength you have. When that YouTube video ends, don't watch the next one that autoplays. When you pick up your phone in the morning, don't just click on the stories at the top of Apple News or Google Now. Exercise choice! Exercise freedom! Exercise humanity!
17. Do what you want with your data, but guard your friends' info with your life
Yes, you should think twice before granting that fun app you downloaded access to your location or your photo library. Do you trust it not to do weird things with your pictures? Do you know it won't track your every movement? But ultimately, those are your decisions, and they are for you to make. But your friends' data isn't yours, it's theirs, and you are a trusted custodian. Don't think twice before authorising access to your address book, or your friends' profiles: think five or six times, and then don't do it.
18. Finally, remember your privacy is worth protecting
You might not have anything to hide (except your embarrassing Netflix history) but that doesn't mean you should be blase about your privacy.
Increasingly, our inner lives are being reduced to a series of data points; every little thing we do is for sale. As we're starting to see, this nonstop surveillance changes us. It influences the things we buy and the ideas we buy into .
Being more mindful of our online behaviour, then, isn't just important when it comes to protecting our information, it's essential to protecting our individuality.
Frenske 28 Mar 2018 23:58
I always use the wrong birthday when registering for accounts unless it is for financial services and utility which may do credit check or are used in credit checks. If my real name is not required I use a variation on my last name.
Jack Harrison 28 Mar 2018 22:33
Astounding that people are surprised about all this data hoarding and selling.
There's a reason Facebook, Google etc are worth BILLIONS. It ain't because of the ads you ignore or are blocked.
FooBar21 -> cachito11 28 Mar 2018 21:31
"There billions of species on our own very planet that show us daily how life is not about money."
In their case daily life is a constant struggle to evade an endless supply of predators who are always looking to tear them limb to limb or swallow them whole, find whatever scraps of food they can find to avoid starving to death, and compete with conspecifics for the right to procreate. On a good day.
wascallywabbit -> Davinci Woohoo 28 Mar 2018 19:34
Thanks Davinci for the reasoned and balanced response.
I appreciate that it's not necessarily your view, but that there is a lot of history behind it. However, to a European living in a modern democracy, it just seems to be a strange and counter-productive attitude. For example, rather than paying taxes for pooled and equitable public services, many of those services are run as profit-making businesses, thus removing money from the system. It also reinforces class divisions, as the rich can pay, but the poor cannot. As a result, many people cannot pay for medical care, cannot send their children to university, and are forced to buy a car to move around.
Again, I'm not criticising you personally, just the mindset that you mentioned.
fatkevin 28 Mar 2018 19:25
It seems sensible to take steps to 'protect' ourselves from the data hoover that is google or Facebook.
But should it be that way round? These cyborg organisations should frame their technology and services that automatically displays social responsibilities towards those they are currently sucking dry of personal information.
Our data is ours, and not theirs to sell onto or allow political freak shows to 'target' us for the suckers benefit, and not the suckees welfare. Who knows how many abusers have been able to hit on vulnerable family's with children!
The internet is a colourful addictive place that most users have only a limited grasp of its potential, as nicely illustrated by our politicians being dumb to these recent events impact. Capitalist thinking, we know, is incapable of self regulation. Internet orgs therefore need steep guidelines that imposes tight operating practices that ensures the vulnerable (that's you and me) don't have to encounter the likes of these recent catastrophes.
Putting lead into food a century ago was deadly until food standards were criminalised; the same applies to the cyborgian world of the internet.
Mar 29, 2018 | www.zerohedge.com
- Facebook's dirty tricks have been exposed, they will never completely regain the trust of users.
- Alternatives are set to cannibalize the social media model, pioneered by Facebook.
- Costs of security features, auditing information, and loss of ad revenue will make Facebook less profitable.
Finally, Facebook ( FB ) has been exposed for the fraud that it is. There has never been such an inflated market cap based on nothingness, just hype. Steve Jobs successfully hyped up Apple ( AAPL ) but unlike Fakebook, Apple actually makes products, and they have a huge following. Here we will elaborate on several key points that we've been saying for years, but now maybe the market is listening:
- Facebook ( FB ) has a weak underlying business model. Users do not like to see advertisements therefore management will be driven to measures such as grey hat (or even black hat) methods to obtain data and use data in ways in conflict with users.
- Facebook ( FB ) is ultimately and primarily a tool of the intelligence agencies (primarily but not exclusively the CIA) and furthers a larger agenda as part of the DOD's "Information Awareness" program, more than it is a hot business model.
- There are thousands of social media networks , in fact Ning offers users a platform to create their own social network. The only thing unique about Facebook ( FB ) is that it is the most used and trusted network, but that all is hanging on the thin thread of users trust, which has now completely evaporated.
- Mark Zuckerberg is an unethical tricky leader that cannot change , he is detached from reality, has no vision, no understanding of what his customers want, and perhaps most importantly; stole Facebook ( FB ) from Winkelvoss .
- Facebook became spammy in 2010 , the amount of bot manipulation is highly under-reported. Fake accounts are bought and sold in a black market, software is sold that can create fake accounts by the hundreds, thousands.
Based on the above, we believe the real value of Facebook ( FB ) is about $10 - $20 per share. Let's use the 'toplist' format as promoted by Facebook ( FB ) itself:
"Top Reasons Facebook ( FB ) is going down fast"
- Users are abandoning their accounts, deleting them, and it has become 'cool' to delete your Fakebook account. #DeleteFacebook
- Mark Zuckerberg originally referred to his users as "Dumb Fucks" this meme is now being circulated.
- Cambridge Analytica is not unique. This is the underlying model of Facebook's business model (if you can call it a 'model').
- Facebook's IPO disaster was a sign of things to come.
- Lawsuits are just the beginning . People are angry. Cook County is suing for 'fraud' - this is a public government suing Facebook for SERIOUS violations. Fraud isn't something you can just get over. It takes years to make a reputation and minutes to lose it.
- According to Edward Snowden, Facebook is a surveillance company.
- Once the genie is out of the bottle, hard to put back. Perhaps some users didn't think this was going on and others didn't care. But now there's a movement to control how Facebook spies on you.
So if this trend continues - what should investors do? Sell , that's for starters. Contact an attorney who knows Securities if you are a shareholder. That's the good news. Finally, unless you like being tracked in your every move, delete your Facebook ( FB ) account. Because that's the only real remedy. You can't block Zuck:
Remember one thing, Facebook ( FB ) users - you use FB with your consent. This author deleted FB years ago, as have millions of others. If you really like the idea of social network there are hundreds of others. Or set one up yourself for sharing family photos with Grandma. JomSocial can turn any Joomla site into a social media site.
What do the FTC, German government, Cook County Illinois and many others have in common? They are all looking into the abuses of Facebook ( FB ).
Lawsuits are nothing new, one could say that Facebook ( FB ) itself was born out of a lawsuit (with Winkelvoss).
The point here is investors that this is the beginning of a crap storm that has been brewing for years but it didn't metastasize until now.
Facebook is going to zero. If you're long get out now before it drops further. There's nothing supporting the stock except hopers and hot air.
One last thing, Fake News started on Facebook ( FB ) see articles here , here , and here . Since the Trump election there has been a backlash on 'Fake News' sites, which Facebook is #1 . It's a platform for Fake News!
News existed before Fakebook and will continue to exist. Facebook is to the internet was the Laser Disc was to the home movie industry. It's outdated, it's bloated, it's hype - there's nothing there. Move on, drones. Nothing to see here.
Get more Alpha in your portfolio from Alpha Z Advisors . Order Online @ ubuy.me
Mar 29, 2018 | www.zerohedge.com
Smi1ey, Wed, 03/28/2018 - 23:42 Permalink
He's not your dad.
Buck Shot Wed, 03/28/2018 - 23:19 Permalink
As long as there are attention whores, there will be some type of facebook. I tried it for a while until my page was hijacked and someone put a picture of some black girl naked with a big booty under a waterfall as my profile photo. No shit, this really happened. I went from 13 friends to hundreds of friend requests overnight.
People were emailing my wife and asking her if we split up or something. Now I am glad I quit that shit. To some people it is like crack. My neighbor used to post pictures of himself pulling worms out of his garden or when he was in yoga class. I wanted to tell him that no one really gives a fuck.
Mar 28, 2018 | www.zerohedge.com
In response to the Facebook data harvesting scandal, Mozilla has launched an extension for its Firefox Browser which helps you segregate your web activity from Facebook's prying eyes by isolating your identity into a separate "container." This makes it far more difficult for Facebook to track your activity on other websites using third-party cookies.
You can get the extension here .
Upon installation, the extension deletes your Facebook cookies and logs you out of Facebook. The next time you visit the social media giant, it will open in a special blue browser "container" tab - which you can use to safely log in to Facebook and use it like you normally would. If you then click on a link that takes you outside of Facebook, it will load outside of the container.
Should you click on any Facebook Share buttons on other browser tabs it will load them within the Facebook container. You should know that when you're using these buttons information will be sent to Facebook about the website that you shared from .
If you use your Facebook credentials to create an account or log in using your Facebook credentials, it may not work properly and you may not be able to login. Also, because you're logged into Facebook in the container tab, embedded Facebook comments and Like buttons in tabs outside the Facebook container tab will not work. This prevents Facebook from associating information about your activity on websites outside of Facebook to your Facebook identity. So it may look different than what you are used to seeing. - Mozilla.org
Think of it as a condom for Facebook.
Mozilla notes that it "does not collect data from your use of the Facebook Container extension," adding "We only know the number of times the extension is installed or removed."
One Reddit user asks "why not just make every tab an isolated container? "There should be NO REASON for one tab to know or read what another tab (aka cookies) are doing from another domain," states /u/Pro2U
Lo and behold, the Mozilla programmer who created the extension popped into the thread and answered the question:
What you describe is actually possible in Firefox. It's called "First Party Isolation": https://wiki.mozilla.org/Security/FirstPartyIsolation
When we studied various privacy protections, FPI had a higher amount of website breakage reported by users: https://blog.mozilla.org/data/2018/01/26/improving-privacy-without-breaking-the-web/ -/u/groovecoder
So there you have it - if you don't want Facebook harvesting most of your data and tracking you around the web, strap on the Firefox extension and go to town.
boostedhorse Wed, 03/28/2018 - 14:14 PermalinkTemporalist -> boostedhorse Wed, 03/28/2018 - 14:17 Permalink
Firefox is finally fast enough to use as a main browser.Buckaroo Banzai -> Temporalist Wed, 03/28/2018 - 14:20 Permalink
I've been switching between Brave and FF and they are similarly fast because they don't get ad overload.Consuelo -> Buckaroo Banzai Wed, 03/28/2018 - 14:31 Permalink
Condoms fail. Best way to not catch STDs is to not fuck disease-ridden skanks.macholatte -> Ignatius Wed, 03/28/2018 - 14:56 Permalink
Well, if given the choice between McDougal and Stormy I'd probably go with the former - just a tad less skanky, don't you think...?
In Firefox Options - Privacy section you can setup to delete cookies and clear history at every browser exit. Same with Internet explorer. Not sure about Chrome.
You can also accept or deny third party cookies.
Ghostery is a must, especially for ZH
C Cleaner is a nice utility for getting rid of excess crap.
Mar 28, 2018 | www.zerohedge.com"Want To Freak Yourself Out?" Here Is All The Personal Data That Facebook/Google Collect
by Tyler Durden Tue, 03/27/2018 - 13:10 2.8K SHARES
The Cambridge Analytica scandal was never really about Cambridge Analytica.
As we've pointed out, neither Facebook nor Cambridge Analytica have been accused of doing anything explicitly illegal (though one could be forgiven for believing they had, based on the number of lawsuits and official investigations that have been announced).
Instead, the backlash to these revelations - which has been justifiably focused on Facebook - is so severe because the public has been forced to confront for the first time something that many had previously written off as an immutable certainty : That Facebook, Google and the rest of the tech behemoths store reams of personal data, essentially logging everything we do.
In response to demands for more transparency surrounding user data, Facebook and Google are offering users the option to view all of the metadata that Google and Facebook collect.
And as Twitter user Dylan Curran pointed out in a comprehensive twitter thread examining his own data cache, the extent and bulk of the data collected and sorted by both companies is staggering.
Google, Curran said, collected 5.5 gigabytes of data on him - equivalent to some 3 million Microsoft Word documents. Facebook, meanwhile, collected only 600 megabytes - equivalent to roughly 400,000 documents.
Another shocking revelation made by Curran: Even after deleting data like search history and revoking permissions for Google and Facebook applications, Curran still found a comprehensive log of his documents and other files stored on Google drive, his search history, chat logs and other sensitive data about his movements that he had expressly deleted.
What's worse, everything shown is the data cache of one individual. Just imagine how much data these companies hold in total.
... ... ...
Google even saves a log of every log a user has ever viewed or clicked on, every app they've every opened and every image they've every searched for - and every news article they've ever read.
... ... ...
Curran, who joked that he's "probably on an FBI watchlist" following his twitter thread, explained that the data he highlighted - while some of it might seem obscure - could have thousands of potentially compromising applications, including blackmailing a rival or spying on a spouse.
... ... ...
The question now is: Will this transparency actually change user's behavior? Or will Facebook's hollow promises to change be enough to lull its legions of users back into a passive ignorance. As Curran points out, people would be outraged if they discovered the government was monitoring them to this extent. But when Google does it? People hardly bat an eye.
Tags Technology Internet Mobile Application Software Phones & Handheld Devices - NEC Social Media & Networking
CaptainMoonlight Tue, 03/27/2018 - 13:11 PermalinkJ S Bach -> CaptainMoonlight Tue, 03/27/2018 - 13:13 Permalink
Pitchforks out for Zuck.
Honestly though, aside from a well deserved arresting of Zuck and dragging him through the streets for treason, you people using FB have only yourselves to blame if this privacy-attack thing of Facebook's is a surprise to you. It's like suing a cigarette company for the holes in your cheeks and throat.
OK, final edit: I should not have said "you people", I should have said "those people", since most of you ZHers are probably way too smart to have ever been on FB.Adolph.H. -> J S Bach Tue, 03/27/2018 - 13:18 Permalink
I ain't freaked out because I don't use these voyeuristic platforms. Boycotts work, folks. Starve the beasts. It's the only effective weapon we have at this time. Other weapons will come into our hands as our power increases.Hippocratic Oaf -> Adolph.H. Tue, 03/27/2018 - 13:22 Permalink
Dude discovered the moon. I would advocate NOT deleting anything from now on. Just put fake information on your accounts. Just poison the well . Destroy their data quality .
https://www.ponzied.commacholatte -> Hippocratic Oaf Tue, 03/27/2018 - 13:29 Permalink
Aaaaaaaaaaaaannnnd porn. THEY WANT TO SEE OUR PORN!!!tmosley -> Stan522 Tue, 03/27/2018 - 14:08 Permalink
Isn't selling advertising their business model? Don't they collect personal data so they can target market advertising? Don't they bury "opt-in consent" deep inside their user agreements that nobody reads? Haven't they published their methods which have been known for years?
Why is all this such a surprise?
Oh! I get it now. All that was perfectly fine until Trump became POTUS.
It is the absolute right of the State to supervise the formation of public opinion.
- Joseph Goebbelsyrad -> tmosley Tue, 03/27/2018 - 14:10 Permalink
Really amazing to see it all laid out in front of you like that. Wonder if my "deletions" actually got rid of the data?
I'm gonna tape my cell phone to a donkey's nutsack in Afghanistan and let Google run wild!Automatic Choke -> Leakanthrophy Tue, 03/27/2018 - 14:52 Permalink
californiagirl -> SilverDOG Tue, 03/27/2018 - 15:07 Permalink
All right - I'm gonna fess up....I use facebook. I know we all bash on it, and everybody here claims to have never used it, but probably half of you are lying. I have never loaded the facebook ap on my android, and don't play games. (I also don't post pictures of my breakfast....I use it for a few very good groups that share information about hiking and such, and I post a lot of photos of my hikes, sort of like in the old days when you'd invite friends over to show slides).
I downloaded the info zipfile. Yes, it was huge, yes it had every photo and every comment I've ever made on facebook, and yes, they even stored all the messages I send and receive through facebook. But so what, I wasn't surprised by that.... No, they did not have records of my phone calls or phone-text-messages, or any other information that I hadn't given them. So - if you are judicious in what you share, and expect that everything you put on line is fully public (in spite of promises), you are likely ok.
Wow - even split on up/down votes. I didn't think I actually said anything controversial, not sure what the downvotes are for....
I'll add a bit more. In my opinion, facebook is like a fairly boring 24/7 cocktail party. Everybody is jabbering and only half-aware, and it goes on far too long. The best thing to do in a cocktail party is to find somebody who i've been wanting to talk to anyhow, and sit and talk with them. Facebook can serve the same purpose. ALSO - I avoid all the political ranting on facebook....I find it to be inappropriate...leave that for...er...zerohedge. My daddy taught me long ago that you don't discuss religion or politics at a cocktail party, and he was right, so I don't discuss either on facebook.Delving Eye -> californiagirl Tue, 03/27/2018 - 15:15 Permalink
You forgot to mention Apple. Pretty sure they are doing the same. FB has info on everyone unless you have never communicated with a FB user. Same with Google.thisandthat -> Delving Eye Tue, 03/27/2018 - 17:09 Permalink
Why the fuck anybody is on Facebook is beyond me. I value my privacy, which is why I use an avatar and phony name for my relatively small online footprint. Most people don't do that. They seem to want to spill their guts to any and all, as if that gives their life meaning. Idiotic.Tarzan -> thisandthat Tue, 03/27/2018 - 19:24 Permalink
1. This is known for YEARS;
2. My google "archive" (24 "products", because 'services' is so passé now...) amounts to the grand total of...
...a "whooping" less than 1 MB -- 604 kB (uncompressed), tbe! LolCreative_Destruct -> Tarzan Tue, 03/27/2018 - 22:18 Permalink
When Google does it, the Government is doing itCrawdaddy -> Tarzan Tue, 03/27/2018 - 22:34 Permalink
All this such a surprise? NO. Shouldn't be. It's part of their business model and has been since inception. It's been staring everyone in the face all along.
Most of the sheeple have played right into it. I can remember when a typical American's attitude toward attempts to get even the most benign personal info was "none of your damn business." Now everyone shares all of their private lives in massive public view, hoping for a "hit" of attention to satisfy cravings brought on by their Social Validation Addiction.Lorca's Novena -> thisandthat Tue, 03/27/2018 - 22:07 Permalink
zactly - same goes for the rest of the social media top dogs which are really just shadow guv front companies. That is how they got to be top dogs - playin ball with da man.
Da Man: "You job is to be our front man and we'll fund you until we bust our all the legit competition. Then we'll tell our 98% owned media to endlessly tout you as a genius. "
Da bitches : "Der...Ok"
Proof? All those "titans" of industry that magically survived years of burning cash somehow managed to avoid "the hidden hand of the market." Now the fuckers stand atop the "capitalist" system and lecture us about how to run a company. Yeah right. Fuckem.bitzager -> Delving Eye Tue, 03/27/2018 - 17:30 Permalink
Easy kiddo....30 products.... Im sure theres a few here with much less than us.Yogizuna -> Delving Eye Tue, 03/27/2018 - 19:10 Permalink
" Why the fuck anybody is on Facebook is beyond me"
Wrong conclusion, I would rather say:
"Why is the fuck anybody would use real info anywhere online is beyond me." unless it's really necessary: like for banking or trading accounts..Black-Man -> Delving Eye Tue, 03/27/2018 - 20:57 Permalink
It can help people though. For example, when my friends go through the passing of a loved one, human or pet, the feedback can help ease the pain, and I have seen that numerous times in the last 8 years. Since 2010 I have had 6 pets pass away, and "spilling my guts" and getting feedback did help ease the pain. So there are positive aspects to it also. And like with most things in life, moderate usage is best.RabbitOne -> californiagirl Tue, 03/27/2018 - 21:29 Permalink
It's the younger generation who completely trusts the FBI, CIA and NSA along w/ Google and FB. Like there is any difference.Spitball -> Automatic Choke Tue, 03/27/2018 - 15:31 Permalink
Facebook is Santa Claus!
It sees you when you're sleeping,
It knows when you're awake
It set you up to be data-mined
And it knows just what to take!
You better watch out
You better not cry
Better not pout
I'm telling you why
Zuckerberg will harvest your town!
He sees you when you're sleeping
He knows when you're awake
He knows if you've been bad or good,
So jail Zuck 'fore it's too late!Justin Case -> Spitball Tue, 03/27/2018 - 16:18 Permalink
Used the wife"s account a couple of times for the marketplace part of it. As for anything else, NO I don't have an account, nor plan on every making one.
Google, that's a different story. Used it quite extensively, although I'm starting to move away from it slowly.
As far as search engines, google is king. DuckDuckGo.com is my alternative with Firefox as the browser.
Need to ditch Microsoft operating system soon also. Something about giving away Windows 10 felt like Microsoft's in bed with government spying. The automatic updates blow.HilbertSpace -> Spitball Tue, 03/27/2018 - 16:42 Permalink
I've done a lot of hardening, and extensive work on the registry, services and task manager for windows 10. I also use "Windows Firewall Control". Nice program. Catches all connection attempts to internet and a log file so you can see what is connecting and what address and port. The program is an interface for the system firewall. Cortana, explorer, all microsoft office applications, error reporting, back ground task host are the busiest trying to connect. Some exe files that I've deleted, show up again, so now I just block the connection for the.
Windows 7 has telemetry and also patches that install telemetry during updates.
Got Google Chrome? Get rid of it. FireFox is better and Tor Browser even better.Bigly -> HilbertSpace Tue, 03/27/2018 - 17:46 Permalink
I second your comments. I've never used Facebook, but Google has invaded everything. I'm working on getting de-googled, particularly after their recent youtube BS, but that is a tough.
In some cases the alternatives are good. Protonmail is excellent and affordable. Signal is a great messenger app.
Opera with scriptsafe and ghostery works well. On a home PC you can use install a good linux distro in a virtual PC and browse through a VPN (Torguard takes crypto as does Primary Internet Access). But I'm still using gdrive (gestapo drive as I like to call all google stuff) because alternatives aren't as good and probably have the same privacy issues.
The real problem is with the smartphone. Unless you are going to go flip phone, you are freaking screwed. Those things suck up your whole life, and if you have an android phone, google play services is basically big brothering all your apps. I'd be highly surprised if our phones aren't logging EVERYTHING that is typed into the virtual keyboard.ZD1 -> HilbertSpace Tue, 03/27/2018 - 17:58 Permalink
Going back to the old clamshell. Smartphones will just get worse, if that's possible....Justin Case -> HilbertSpace Tue, 03/27/2018 - 18:24 Permalink
Brave browser blocks ads and trackers
https://brave.com/Brazen Heist -> HilbertSpace Tue, 03/27/2018 - 19:11 Permalink
A co-worker went on vacation and I showed him a site where he could see his trail in DC, places he went. He acknowledged that is exactly the places he visited. Red lines on a map with his travels.Too funny.Yogizuna -> HilbertSpace Tue, 03/27/2018 - 19:18 Permalink
Take my advice and delete ghostery. It is compromised. And Adblock Plus is too memory intensive. Get uBlock instead and adguard and customize the filters. Much more lightweight and gets the job done.
Nothing but "flip phones" for me since 2008.Laowei Gweilo -> Automatic Choke Tue, 03/27/2018 - 16:13 Permalink
GeoffreyT -> Automatic Choke Tue, 03/27/2018 - 16:49 Permalink
pretty much. i used it, and I'm OK with the risk of this. it's a free website that needs to make money.
use it at your own risk. (e.g. have never used my real name associated with any of those accounts; I never use them to instant message; I have a rule that I never ever use an 'app within an app' if an app interests me I'll download the direct .exe for a different laptop or device (that doesn't have any Google or FB account on it). other small things, that -- sure i'm sure they probably suspect my name and track some info -- but it's mostly pointless shit. especially no app or chat histories tho.
the real idiots are the people mad about this. not Zuck. of course Zuck is gonna Zuck or Google is gonna Google.
p.s. the fact that Twitter thread is 'news' (despite being known for years) shows just how blind and stupid people are.
p.s.s. and to be fair there are some benefits to some of those features. the geo-location stuff can be nefarious, but it also makes searching for local businesses a lot easier, and provides security (e.g. it's helpful that Google knows you always log-in from a certain State cuz then it can block a log-in attempt from Nigeria). again. not saying it's WORTH IT (Don't like it, don't use it) but there is a practical reason for it too.valjoux7750 -> Automatic Choke Tue, 03/27/2018 - 17:26 Permalink
You are ignoring the venality of the sorts of people who will attempt to exploit this information (governments, insurers, real estate agents, HR fucktards - the whole shebang of parasites and ticket-clippers... who are almost entirely made up of C-students).
And you're ignoring Richelieu's maxim:
Give me six lines written by the most honest man: in them, I will find something with which to hang himDaBard51 -> Automatic Choke Tue, 03/27/2018 - 18:56 Permalink
I have an account that I mainly use for finding parts for my car of which there are less than 33k of here in the US. It's Australian.Flatchestynerdette -> Automatic Choke Tue, 03/27/2018 - 22:46 Permalink
Look up who invented "cookies". Andreesen & James Clark, Netscape. http://www.governingwithcode.org/case_studies/pdf/Cookies.pdf
When nine hundred years old you become, look this good you will not.californiagirl -> Leakanthrophy Tue, 03/27/2018 - 14:53 Permalink
I still have my flip phone so I can't received texts, can't google to find anything & have to call 411 to get a number.
I too have Facebook but its on an old windows 7 computer that I also go to just for a group, similar to you but I've never posted a personal picture. Even my kittykat that I had at one time as my icon is one that I've got from bing.com images. Its close enough.
As for Google? They're a search engine. They have your IP address. Of course they're going to keep track of everything you do from that IP address/phone number if you use it. And before bing.com outsourced their search to Google they were a Microsoft search engine. Guess they got lazy. When they did so I went to DuckDuckGo and Yahoo. I know you can't do that on the android phone because its almost hardwired in for Google so the only advice I can give is go back to the flip phone if you want any privacy because sadly....
Google will go out of business selling your information before it never sells your information & then the government will come in and declare Google too big to fail with all that info & sweep it into the NSA late one Friday night while everyone is watching a version of Stormy & her 2 sistersThanksChump -> californiagirl Tue, 03/27/2018 - 16:13 Permalink
Some of you don't get it. If you communicated with a Facebook or Google user, they got all your communications as well. And they probably have Hillary's deleted emails. And if you have a Smart TV, they can watch and listen to you and your kids.californiagirl -> ThanksChump Tue, 03/27/2018 - 16:21 Permalink
No. If you communicate with a Facebook user, then FB has your email address or your phone number . That's not "all your communications". Not your contacts, not your other email addresses, not your other phone numbers.
Don't get me wrong: that's more than I want them to have, but it ain't much in the grand scheme of things.zvzzt -> californiagirl Tue, 03/27/2018 - 16:59 Permalink
You forgot to mention that they have the text of your communications. I never said they had everything if you did not have an account. I don't have Facebook, but family members and family do. They have posted photos and I have communicated via text, email and phone. They have those text messages and emails, and any photos I texted and emailed, even though I never clicked a little box to consent to their terms.Joe Davola -> tmosley Tue, 03/27/2018 - 14:14 Permalink
just did some digging here myself. What I found: minimally 8 Gb of data of all sorts. As a footnote:
I don't have/use: android phone, smart tv, whatsapp/other messenger, almost always use hooktube instead of youtube, VPN, mostly protonmail (especially for personal info), no 'social' media hardly ever login via 'social/google account (hand full of exceptions).
I was a bit surprised they had this much (and kept that much (even though have been a long time skeptic of them)).ejmoosa -> Joe Davola Tue, 03/27/2018 - 14:22 Permalink
tmosley - I'm gonna guess "deletion" doesn't really get rid of the data. Should have asked for it to be wiped with a cloth. Posting all the stuff facebook collected about one's self on twitter - did he do that just to be sure everyone everywhere had seen his laundry.tmosley -> ejmoosa Tue, 03/27/2018 - 14:31 Permalink
Deletion just means YOU no longer have access to it.
I'm sure they will find backups "on accident" when it is convenient. But such a day may not come. I don't think either company is long for this world.
Mar 27, 2018 | www.zerohedge.comAuthored by Mark Jeftovich via EasyDNS.com,
In 1994, Wired magazine ran a short story entitled "Hack the spew" . This was back when Wired was actually cutting edge and not the insufferable Silicon Valley stroke job it became after Conde Naste acquired it. In it our antihero "Stark" finds himself inexplicably recruited as a kind of data scout, looking for viable consumer trends emerging from the fully immersive, all encompassing data field known as "The Spew".
"When a schmo buys something on the I-way it goes into his Profile, and if it happens to be something that he recently saw advertised there, we call that interesting, and when he uses the I-way to phone his friends and family, we Profile Auditors can navigate his social web out to a gazillion fractal iterations, the friends of his friends of his friends of his friends, what they buy and what they watch and if there's a correlation."
The Spew of course, was the near future analogy of where the internet was headed, and when I went looking to link to it for this post, the piece turned out to be written by none other than Neal Stephenson. That means I read "Hack The Spew" and it made an impression on me before I even knew who Stephenson was or perhaps was on his way to becoming. Few would argue that Stephenson has a gift for seeing the general ambience of our oncoming future. Cryptonomicon uncannily anticipated the impetus toward crypto-currencies; the current systemic dysfunction of national sovereignty worldwide was foretold in Snow Crash; so it follows that all this will likely culminate in something that resembles The Diamond Age .
Today, "The Spew" is not equivalent to the Internet itself, but it is more accurately analogous to say the social media platforms like Facebook, Twitter, especially when combined with the twin monopolies of Google and Amazon, collectively are: The Spew.
It is like a global garbage pile of digital flotsam and jetsam, over which peasants scurry around and scour, looking for some morsel here, a crumb there, which can be monetized. If a trend or a trait is detected, even better. Those can be aggregated, syndicated, federated, even rehypothecated and at scale that can yield staggering financial payoffs and perhaps, even steer the course the history.
At least that's the narrative since the Cambridge Analytica scandal blew up in Facebook's face. After a long string of successive privacy fails (a.k.a a pattern of abuse?) this time feels different, as if the chickens are finally coming home to roost for Facebook.Cambridge Analytica is not uniqueEver heard of Kareem Serageldin? Probably not.
To date, he is the only banker to have been sent to prison in connection with the 2008–2009 Global Financial Crisis for his role in issuing fraudulent mortgage-backed securities (at least outside of Iceland ). To be sure, he was a fall guy, a token sacrifice to demonstrate contrition for what was a systemic, institutionalized effort to inflate a bubble whose implosion nearly crashed the entire global financial system.
In this case while Facebook attempted to throw water on this crisis by ceremonially banishing Cambridge Analytica from its system, the longstanding pattern of abuse remains, and is perhaps now, finally, awareness of that is reaching critical mass with the public:
- Facebook scraped your call data from Android phones for years (iPhone's are also vulnerable to privacy intrusions, see below).
- Facebook enables features such as "racial profiling" to advertisers
- Election rigging? Facebook approached major Australian political parties to micro target voters in 2016 election (the Liberals turned them down, Labour took them up)
- And while there were key differences in the way data was used , (not to mention more informed consent) the 2012 Obama re-election campaign used the same data mining features and accessed the same data as the Cambridge Analytica app
- In fact it may be veritably baked into their ecosystem to such a degree that it is almost impossible to develop and create an app on Facebook that doesn't harvest your data
Mark Zuckerberg has issued yet another "Mea Culpa" on CNN, and Facebook will take out full page ads in newspapers to apologize to the public. Yet, by now, "Groveling Zuckerberg apologies" are just part of the Facebook playbook, as Liz Gannes observed back in 2011, after Facebook had just settled with the US Federal Trade Commission over still more privacy violations:
"At this point, Facebook CEO Mark Zuckerberg's pattern on privacy is clear. Launch new stuff that pushes the boundaries of what people consider comfortable. Apologize and assure users that they control their information, but rarely pull back entirely, and usually reintroduce similar features at a later date when people seem more ready for it."
It becomes clear, as Futurist (and easyDNS member) Jesse Hirsh made this point on Steve Pakin's "The Agenda" over the weekend: "Facebook ships with all privacy enhanced settings disabled" -- further, my personal findings are that they use obfuscation to make it harder to disable data sharing settings. You have to jump through hoops to do it.
https://players.brightcove.net/18140038001/HJR5gvfVf_default/index.html?videoId=5757277106001Should you #deleteFacebook?
WhatsApp founder Brian Acton, who became a billionaire when Facebook bought his company hasn't let that dissuade him from telling the world what he thinks of all this:
Should you? Should easyDNS? Here's my take on it:If you are a business: keep your page but don't be reliant on it
There is a difference between a business who uses Facebook as an antennae to provide additional ways to stay in touch with customers and those whose business model is completely dependent on Facebook. We started our Facebook page when we were pulled into the Wikileaks Crisis as a way to stay in touch with our customers while that entire fiasco played out. We maintain it today for the same reason, and people do frequently contact us through that page looking for support.
But some businesses are completely reliant on Facebook to survive. I subscribe to James Schramko's Superfast Business Podcast . A recent episode had the founder of Dogtington Pos t on it, a site I frequented myself in my early days of being a dog owner (our family Husky).
You have to credit the guy with dominating his niche but I couldn't help wondering what would happen to his business if something substantial changed at Facebook, or if some of his readers would feel "used" if they understood some of the myriad tactics some of these sites routinely use, via Facebook, to drive their own affiliate revenues.
It brings to mind 2 things:
- My late friend and one of the original easyDNS customers Atul Chitnis who was among the first to observe "if you're not paying for the product, you are the product"
- My own maxim, which I introduced in the Guerrilla Capitalism Overview that there are two kinds of companies, those that feed on customer ignorance compared to those who prosper via customer savvy . I think it is obvious to all, at least now, that Facebook needs customer ignorance to survive.
(Or as Zuck eloquently observed it back in his dormroom days)YMMV on your personal pages
I read a long time ago "don't put anything on the internet that you wouldn't want to read in the newspapers the next day", and that has served me well as a guide over the years.
My basic assumption is that everything I post to Facebook, including "private" messages are wide open, being harvested, data mined, aggregated, used to target and retarget ads to me, build a profile and otherwise compile a comprehensive dossier, even stuff I've "deleted". (If you've ever watched "Terms and Conditions May Apply" you'll know that Facebook actually keeps the stuff you "delete").
So I never say anything on Facebook or put anything on there that is remotely confidential or proprietary. It's strictly a water cooler. I like it because it enabled me to reconnect with various groups of my friends and peers over the years, from the kids I grew up and went to high school with in Galt, Ontario to the misfits from the London underground music scene in college, to the tech entrepreneurs from the mid-90's on.
Would I use it to send anything to anybody that I found myself hoping that it's never going to leak or be used against me? Uh, no. That would be terribly naive.
So to that end, I'll probably keep my personal Facebook page, even though I sometimes catch myself spending too much time arguing stupid pointless crap (like politics) with people I'd otherwise never associate with. But that's a self-discipline issue, not a data soveriengty issue (although it is now also common knowledg e that Facebook deliberately codes the platform itself to be as addictive as possible)
All that saidAt least #deleteFacebook from your mobile devices
Facebook harvests your contact lists from your mobile devices (don't believe me, go here )
There are people in that list that I do not know. There are phone numbers from people who work for my competitors in there. My daughter's (age 11) cell phone number is in there.
You can "delete" all this here : (but as you know Facebook never actually deletes anything).
Then when you go to "delete" all your contacts you get a message
"We won't be able to tell you when your friends start using Messenger if you delete all your uploaded contact info."
They say that like it's a bad thing. But there is also this curious sentence:
"If you have Continuous Uploading turned on in the Messenger app, your contact info will be uploaded again the next time the app syncs with Facebook servers."
I had deleted the Facebook mobile app from my phone a long time ago. I kept messenger installed because sometimes customers would contact easyDNS or Zoneedit via our Facebook pages for support.
But Writing this I wanted to turn off "continuous uploading" in the app. Despite this Facebook help article not explaining how to do it, while this third party article from 2016 did.
It turned out I had already disabled continuous uploading but I was surprised to find that the messenger app had defaulted permission to access my phone's microphone.
After this exercise I simply deleted the Messenger app from my phone as well.Personal Data Sovereignty is an idea who's time has come
I think it would be safe to assume, that barring some widespread public pushback (such as the one happening right now), this is The New Normal.
People who may have been complacently oblivious to the fact that their social network was pimping them as mere data points are realizing that they don't like it as they have their faces rubbed in one data breach and privacy violation after another.
Given the outrages of Equifax, Facebook et al, we may have arrived at the crossroads and we may only get this choice once.
Do we push back and say "NO", I own my own data, I control who gets it and what happens with it. ?
Or, do we calm down after a few days, or weeks and then it's business as usual. Next year Zuck will apologize for some other new breach of trust ahead of his 2020 presidential bid, while us "shmoes" go ahead and vote for him.
SILVERGEDDON -> cossack55 Tue, 03/27/2018 - 19:03 PermalinkJimbeau Tue, 03/27/2018 - 18:59 Permalink
Don't delete it - just post a bunch of shit house rat bastard crazy stuff on it that makes no sense.
If that don't fuck up their algos and fuck over their validity as a user data seller, try harder.
Doesn't the entity we fear most already have access to all our data? Who is it that we think we are hiding anything from? Just don't be stupid and put any new sensitive info out there, anywhere, if you don't have to... but worrying about the info the the govt already has on you? What would be the point?
Mar 27, 2018 | www.counterpunch.org
Many people who hate and fear Donald Trump feel that only political black magic or some form of trickery can explain his election as US President. They convince themselves that we are the victims of a dark conspiracy rather than that the world we live in is changing, and changing for the worse.
Cambridge Analytica has now joined Russia at the top of a list of conspirators who may have helped Trump defeat Hillary Clinton in 2016. This is satisfactory for Democrats as it shows that they ought to have won, and delegitimises Trump's mandate.
In the Russian and Cambridge Analytica scandals, dodgy characters abound who claim to have a direct line to Putin or Trump, or to have secret information about political opponents or a unique method of swaying the voting intentions of millions of Americans. The most doubtful evidence is treated as credible.
The dossier by the former British intelligence officer Christopher Steele, about Trump's romps in Moscow, struck me when I first read it as hilarious but entirely unbelievable. The US media thought the same when this document was first being hawked around Washington before the election, and refused to publish it. It was only after Trump was elected that that they and the US security agencies claimed to find it in any way credible.
Much of what Cambridge Analytica claimed to be able to do for its clients has an exaggerated ring to it. As with the Steele dossier, several of the Cambridge Analytica documents are unintentionally funny, such as a letter from Aleksandr Kogan, the Russian-American academic researcher, suggesting that finding out if people used crossbows or believed in paganism would be useful traits on which to focus.
We are told that Facebook profiles of more than 50 million users have been "harvested" (a good menacing word in this context, suggesting that the poor old users are being chopped off at the ankles), and that information so garnered could be fed into the Trump campaign to put him over the top on election day. In reality, information gathered from such a large number of people is too generalised or too obvious to be of much use.
What is lacking in these scandals is much real evidence that Russian "meddling" or Cambridge Analytica "harvesting" – supposing all these tales are true – really did much to determine the outcome of the US election. Keep in mind that many very astute and experienced American politicians, backed by billions of dollars, regularly try and fail to decide who will hold political office in the US.
It simply is not very likely that the Kremlin – having shown extraordinary foresight in seeing that Trump stood a chance when nobody else did – was able to exercise significant influence on the US polls. Likewise, for all its bombastic sales pitch, Cambridge Analytica was really a very small player in the e-campaign.
The Russian "meddling" story (again, note the careful choice of words, because "meddling" avoids any claim that the Russian actions had any impact) and the Cambridge Analytica saga are essentially conspiracy theories. They may damage those targeted such as Trump, but they also do harm to his opponents because it means that they do not look deeply enough into the real reasons for their defeat in 2016, or do enough to prevent it happening again.
Since Clinton lost the election by less than 1 per cent of the vote in the crucial swing states of Wisconsin, Michigan and Pennsylvania, almost anything that happened in the campaign can be portrayed as decisive. But there are plenty of common-sense reasons for her defeat which are now being submerged and forgotten, as the Democrats and a largely sympathetic media look to Russian plots and such like to show that Trump won the election unfairly.
It is worth looking again at Hillary Clinton's run-for-office in 2016 to take a more rational view of why she unexpectedly lost. A good place to start is Shattered: Inside Hillary Clinton's Doomed Campaign , by the journalists Jonathan Allen and Amie Parnes, which was published a year ago and is based on interviews with senior campaign staffers.
Ironically, the Clinton campaign manager Robby Mook based his approach on a similar sort of analysis of vast quantities of data about voters that Cambridge Analytica claimed it could use to great effect.
Mook's conviction that this data was a sure guide to where to invest the Democrats' best efforts had disastrous consequences, even though Clinton outspent Trump by 2 to 1. For instance, she did not campaign in Wisconsin after winning the nomination, because her election team thought she was bound to win there. She put too little effort into campaigning in Michigan, though her weakness there was underlined there in March when she lost the primary to Bernie Sanders.
Traditional tools of electioneering such as polls and door-to-door canvassing were discounted by Mook, who was absorbed by his own analytical model of how the election was going. In major swing states, the book says that "he declined to use pollsters to track voter preferences in the final three weeks of the campaign".
Clinton carried a lot of political baggage because she had been demonised by the Republicans for 25 years. She had bad lluck, such the decision of the FBI director, James Comey, to send a letter to Congress about her emails two weeks before the election – but Trump somehow managed to survive even worse disasters, such as boasting of how he groped women.
Opponents of Trump tend to underestimate him because they are convinced that his faults are so evident that he will implode when the electorate find him out. Somehow they never do, or at least not those parts of the electorate which votes for him.
The very scandals that Trump's critics believe will sink him have enabled him dominate the news agenda in a way no American politician has ever done before. The New York Times and CNN may detest him, but they devote an extraordinary proportion of their news output to covering his every action.
The accusation that the Kremlin and companies like Cambridge Analytica put Trump in the White House may do him damage. But I suspect that the damage will mostly be among people who never liked him and would never vote for him.
Perhaps the one thing would have lost Trump the election is if his campaign had truly relied on Cambridge Analytica's data about the political proclivities of pagan crossbow enthusiasts.
Mar 27, 2018 | tech.slashdot.org
To corporate giants like Facebook, leaks to rivals or the media are a cardinal sin. That notion was clear in a new Wired story about Facebook's rocky time over the last two years. The story talks about how Facebook was able to find two leakers who told a Gizmodo reporter about its news operations. But one source for the Wired story highlighted just how concerned employees are about how their company goes after leakers. According to the story, the source, a current Facebook employee, asked a Wired reporter to turn off his phone so Facebook wouldn't be able to use location tracking and see that the two were close to each other for the meeting .
The Wired's 11,000-word wide-ranging piece , for which it spoke with more than 50 current and former Facebook employees, gives us an inside look at how the company has been struggling to curb spread of fake news; battling internal discrimination among employees; and becoming furious when anything leaks to the media. Another excerpt from the story:
The day after Fearnow (a contractor who leaked information to a Gizmodo reporter) took that second screenshot was a Friday. When he woke up after sleeping in, he noticed that he had about 30 meeting notifications from Facebook on his phone. When he replied to say it was his day off, he recalls, he was nonetheless asked to be available in 10 minutes. Soon he was on a video-conference with three Facebook employees, including Sonya Ahuja, the company's head of investigations. According to his recounting of the meeting, she asked him if he had been in touch with Nunez (the Gizmodo reporter, who eventually published this and this ).
He denied that he had been. Then she told him that she had their messages on Gchat, which Fearnow had assumed weren't accessible to Facebook. He was fired. "Please shut your laptop and don't reopen it," she instructed him.
Mar 27, 2018 | yro.slashdot.org
(reuters.com) did not adequately secure the informed consent of its users . From a report: The verdict, from a Berlin regional court, comes as Big Tech faces increasing scrutiny in Germany over its handling of sensitive personal data that enables it to micro-target online advertising. The Federation of German Consumer Organisations (vzvb) said that Facebook's default settings and some of its terms of service were in breach of consumer law, and that the court had found parts of the consent to data usage to be invalid. "Facebook hides default settings that are not privacy-friendly in its privacy center and does not provide sufficient information about it when users register," said Heiko Duenkel, litigation policy officer at the vzvb. "This does not meet the requirement for informed consent."
Mar 27, 2018 | tech.slashdot.org
(recode.net) BeauHD on Monday February 12, 2018 @09:20PM from the shifting-demographics dept. According to new estimates by eMarketer, Facebook users in the 12- to 17-year-old demographic declined by 9.9 percent in 2017 , or about 1.4 million total users. That's almost three times more than the digital measurement firm expected. There were roughly 12.1 million U.S. Facebook users in the 12- to 17-year-old demographic by the end of the year. Recode reports:
There are likely multiple reasons for the decline. Facebook has been losing its "cool" factor for years, and young people have more options than ever for staying in touch with friends and family. Facebook also serves as a digital record keeper -- but many young people don't seem to care about saving their life online, at least not publicly.
That explains why Snapchat and Instagram, which offer features for sharing photos and videos that disappear, are growing in popularity among this demographic. Overall, eMarketer found Facebook lost about 2.8 million U.S. users under 25 last year.
The research firm released Facebook usage estimates for 2018 on Monday, and expects that Facebook will lose about 2.1 million users in the U.S. under the age of 25 this year.
Mar 27, 2018 | tech.slashdot.org
(techcrunch.com) Onavo Protect, the VPN client from the data-security app maker acquired by Facebook back in 2013, has now popped up in the Facebook app itself, under the banner "Protect" in the navigation menu . Clicking through on "Protect" will redirect Facebook users to the "Onavo Protect -- VPN Security" app's listing on the App Store. We're currently seeing this option on iOS only, which may indicate it's more of a test than a full rollout here in the U.S. Marketing Onavo within Facebook itself could lead to a boost in users for the VPN app, which promises to warn users of malicious websites and keep information secure as you browse. But Facebook didn't buy Onavo for its security protections. Instead, Onavo's VPN allow Facebook to monitor user activity across apps, giving Facebook a big advantage in terms of spotting new trends across the larger mobile ecosystem. For example, Facebook gets an early heads up about apps that are becoming breakout hits; it can tell which are seeing slowing user growth; it sees which apps' new features appear to be resonating with their users, and much more. Further reading: Do Not, I Repeat, Do Not Download Onavo, Facebook's Vampiric VPN Service (Gizmodo).
Mar 27, 2018 | yro.slashdot.org
(theverge.com) BeauHD on Friday March 16, 2018 @11:30PM from the violation-of-terms dept. An anonymous reader quotes a report from The Verge: Facebook said late Friday that it had suspended Strategic Communication Laboratories (SCL), along with its political data analytics firm, Cambridge Analytica, for violating its policies around data collection and retention. The companies, which ran data operations for Donald Trump's 2016 presidential election campaign , are widely credited with helping Trump more effectively target voters on Facebook than his rival, Hillary Clinton. While the exact nature of their role remains somewhat mysterious, Facebook's disclosure suggests that the company improperly obtained user data that could have given it an unfair advantage in reaching voters . Facebook said it cannot determine whether or how the data in question could have been used in conjunction with election ad campaigns.
In a blog post, Facebook deputy general counsel Paul Grewal laid out how SCL came into possession of the user data. In 2015, Aleksandr Kogan, a psychology professor at the University of Cambridge, created an app named "thisisyourdigitallife" that promised to predict aspects of users' personalities. About 270,000 people downloaded it and logged in through Facebook, giving Kogan access to information about their city of residence, Facebook content they had liked, and information about their friends. Kogan passed the data to SCL and a man named Christopher Wylie from a data harvesting firm known as Eunoia Technologies, in violation of Facebook rules that prevent app developers from giving away or selling users' personal information. Facebook learned of the violation that year and removed his app from Facebook. It also asked Kogan and his associates to certify that they had destroyed the improperly collected data. Everyone said that they did. The suspension is not permanent, a Facebook spokesman said. But the suspended users would need to take unspecified steps to certify that they would comply with Facebook's terms of service.
Mar 27, 2018 | tech.slashdot.org
(theguardian.com) umafuckit shared this article from The Guardian: The data analytics firm that worked with Donald Trump's election team and the winning Brexit campaign harvested millions of Facebook profiles of U.S. voters , in one of the tech giant's biggest ever data breaches, and used them to build a powerful software program to predict and influence choices at the ballot box... Christopher Wylie, who worked with a Cambridge University academic to obtain the data, told the Observer : "We exploited Facebook to harvest millions of people's profiles . And built models to exploit what we knew about them and target their inner demons. That was the basis the entire company was built on."
Documents seen by the Observer , and confirmed by a Facebook statement, show that by late 2015 the company had found out that information had been harvested on an unprecedented scale . However, at the time it failed to alert users and took only limited steps to recover and secure the private information of more than 50 million individuals... On Friday, four days after the Observer sought comment for this story, but more than two years after the data breach was first reported, Facebook announced that it was suspending Cambridge Analytica and Kogan from the platform, pending further information over misuse of data. Separately, Facebook's external lawyers warned the Observer on Friday it was making "false and defamatory" allegations, and reserved Facebook's legal position...
The evidence Wylie supplied to U.K. and U.S. authorities includes a letter from Facebook's own lawyers sent to him in August 2016, asking him to destroy any data he held that had been collected by GSR, the company set up by Kogan to harvest the profiles... Facebook did not pursue a response when the letter initially went unanswered for weeks because Wylie was travelling, nor did it follow up with forensic checks on his computers or storage, he said. "That to me was the most astonishing thing. They waited two years and did absolutely nothing to check that the data was deleted. All they asked me to do was tick a box on a form and post it back."
Wylie worked with Aleksandr Kogan, the creator of the "thisisyourdigitallife" app, "who has previously unreported links to a Russian university and took Russian grants for research," according to the article. Kogan "had a licence from Facebook to collect profile data, but it was for research purposes only. So when he hoovered up information for the commercial venture, he was violating the company's terms...
"At the time, more than 50 million profiles represented around a third of active North American Facebook users, and nearly a quarter of potential U.S. voters."
Mar 27, 2018 | tech.slashdot.org
(theguardian.com) They had records of a screenshot he'd taken, links he had clicked or hovered over, and they strongly indicated they had accessed chats between him and the journalist, dating back to before he joined the company. "It's horrifying how much they know," he told the Guardian, on the condition of anonymity... "You get on their bad side and all of a sudden you are face to face with Mark Zuckerberg's secret police "... One European Facebook content moderator signed a contract, seen by the Guardian, which granted the company the right to monitor and record his social media activities, including his personal Facebook account, as well as emails, phone calls and internet use. He also agreed to random personal searches of his belongings including bags, briefcases and car while on company premises. Refusal to allow such searches would be treated as gross misconduct...
Some employees switch their phones off or hide them out of fear that their location is being tracked. One current Facebook employee who recently spoke to Wired asked the reporter to turn off his phone so the company would have a harder time tracking if it had been near the phones of anyone from Facebook. Two security researchers confirmed that this would be technically simple for Facebook to do if both people had the Facebook app on their phone and location services switched on. Even if location services aren't switched on, Facebook can infer someone's location from wifi access points.
The article cites a 2012 report that Microsoft read a French blogger's Hotmail account to identify a former employee who had leaked trade secrets . And it also reports that tech companies hire external agencies to surveil their employees. "One such firm, Pinkerton, counts Google and Facebook among its clients." Though Facebook and Google both deny this, "Among other services, Pinkerton offers to send investigators to coffee shops or restaurants near a company's campus to eavesdrop on employees' conversations...
Al Gidari, consulting director of privacy at the Stanford Center for Internet and Society, says that these tools "are common, widespread, intrusive and legal."
Mar 27, 2018 | yro.slashdot.org
(sfgate.com) BeauHD on Friday March 23, 2018 @08:50PM from the rough-week dept. Facebook has had a terrible week. Since it was revealed that political data firm Cambridge Analytica obtained information about 50 million Facebook users , the social media company has been in damage control mode, apologizing for its mistakes and conducting forensic audits to determine exactly what happened. SFGate reports today that Facebook " has been hit with four lawsuits in federal court in San Francisco and San Jose thus far this week." From the report: One lawsuit was filed by a Facebook user who claims the Menlo Park company acted with "absolute disregard" for her personal information after allegedly representing that it wouldn't disclose the data without permission or notice. That lawsuit, filed by Lauren Price of Maryland in San Jose on Tuesday, seeks to be a class action on behalf of up to 50 million people whose data was allegedly collected from Facebook by London-based Cambridge Analytica. The lawsuit says that during the 2016 election, Price was "frequently targeted with political ads while using Facebook." It seeks financial restitution for claims of unfair business practices and negligence. Both Facebook and Cambridge Analytica are named as defendants. Cambridge Analytica also announced today that the company will undergo an independent third-party audit to determine whether it still holds any data covertly obtained from Facebook users. "We take the disturbing recent allegations of unethical practices in our non-U.S. political business very seriously," CEO Alexander Tayler writes . "The Board has launched a full and independent investigation into SCL Elections' past practices, and its findings will be shared publicly."
UPDATE: Eighteen enforcement officers have entered the Cambridge Analytica headquarters in London's West End to search the premises after the data watchdog was granted a warrant to examine its records, reports The Guardian.
Mar 27, 2018 | yro.slashdot.org
(zdnet.com) BeauHD on Tuesday March 06, 2018 @08:20PM from the plot-twist dept. According to newly released documents by the Electronic Frontier Foundation, federal agents would pay Geek Squad employees to flag illegal materials on devices sent in by customers for repairs. "The relationship goes back at least ten years, according to documents released as a result of the lawsuit [ filed last year ]," reports ZDNet. "The agency's Louisville division aim was to maintain a 'close liaison' with Geek Squad management to 'glean case initiations and to support the division's Computer Intrusion and Cyber Crime programs.'" From the report: According to the EFF's analysis of the documents, FBI agents would "show up, review the images or video and determine whether they believe they are illegal content" and seize the device so an additional analysis could be carried out at a local FBI field office. That's when, in some cases, agents would try to obtain a search warrant to justify the access. The EFF's lawsuit was filed in response to a report that a Geek Squad employee was used as an informant by the FBI in the prosecution of child pornography case. The documents show that the FBI would regularly use Geek Squad employees as confidential human sources -- the agency's term for informants -- by taking calls from employees when they found something suspect.
Mar 27, 2018 | yro.slashdot.org
(theintercept.com) it could also help the cybersecurity community discover previously unknown threats . The Intercept: When the mysterious entity known as the " Shadow Brokers " released a tranche of stolen NSA hacking tools to the internet a year ago, most experts who studied the material honed in on the most potent tools, so-called zero-day exploits that could be used to install malware and take over machines. But a group of Hungarian security researchers spotted something else in the data, a collection of scripts and scanning tools the National Security Agency uses to detect other nation-state hackers on the machines it infects. It turns out those scripts and tools are just as interesting as the exploits. They show that in 2013 -- the year the NSA tools were believed to have been stolen by the Shadow Brokers -- the agency was tracking at least 45 different nation-state operations, known in the security community as Advanced Persistent Threats, or APTs. Some of these appear to be operations known by the broader security community -- but some may be threat actors and operations currently unknown to researchers.
The scripts and scanning tools dumped by Shadow Brokers and studied by the Hungarians were created by an NSA team known as Territorial Dispute, or TeDi. Intelligence sources told The Intercept the NSA established the team after hackers, believed to be from China, stole designs for the military's Joint Strike Fighter plane, along with other sensitive data, from U.S. defense contractors in 2007; the team was supposed to detect and counter sophisticated nation-state attackers more quickly, when they first began to emerge online. "As opposed to the U.S. only finding out in five years that everything was stolen, their goal was to try to figure out when it was being stolen in real time," one intelligence source told The Intercept. But their mission evolved to also provide situational awareness for NSA hackers to help them know when other nation-state actors are in machines they're trying to hack.
Mar 27, 2018 | tech.slashdot.org
(medium.com) Onavo Protect , a newly released VPN service from Facebook : I found that Onavo Protect uses a Packet Tunnel Provider app extension, which should consistently run for as long as the VPN is connected, in order to periodically send the following data to Facebook (graph.facebook.com) as the user goes about their day:
When user's mobile device screen is turned on and turned off.
Total daily Wi-Fi data usage in bytes (Even when VPN is turned off).
Total daily cellular data usage in bytes (Even when VPN is turned off).
Periodic beacon containing an "uptime" to indicate how long the VPN has been connected.
Mar 27, 2018 | slashdot.org
(theguardian.com) but behind the cartoonish facade is a ruthless code of secrecy . From a report: They rely on a combination of Kool-Aid, digital and physical surveillance, legal threats and restricted stock units to prevent and detect intellectual property theft and other criminal activity. However, those same tools are also used to catch employees and contractors who talk publicly, even if it's about their working conditions, misconduct or cultural challenges within the company. While Apple's culture of secrecy, which includes making employees sign project-specific NDAs and covering unlaunched products with black cloths, has been widely reported, companies such as Google and Facebook have long put the emphasis on internal transparency.
Zuckerberg hosts weekly meetings where he shares details of unreleased new products and strategies in front of thousands of employees. Even junior staff members and contractors can see what other teams are working on by looking at one of many of the groups on the company's internal version of Facebook. "When you first get to Facebook you are shocked at the level of transparency. You are trusted with a lot of stuff you don't need access to," said Evans, adding that during his induction he was warned not to look at ex-partners' Facebook accounts.
Mar 27, 2018 | tech.slashdot.org
(businessinsider.com) reported this week , speaks volumes of Facebook's core beliefs. Sample this except from Business Insider : Facebook executives waded into a firestorm of criticism on Saturday, after news reports revealed that a data firm with ties to the Trump campaign harvested private information from millions of Facebook users. Several executives took to Twitter to insist that the data leak was not technically a "breach." But critics were outraged by the response and accused the company of playing semantics and missing the point. Washington Post reporter Hamza Shaban: Facebook insists that the Cambridge Analytica debacle wasn't a data breach, but a "violation" by a third party app that abused user data. This offloading of responsibility says a lot about Facebook's approach to our privacy. Observer reporter Carole Cadwalladr, who broke the news about Cambridge Analytica: Yesterday Facebook threatened to sue us. Today we publish this. Meet the whistleblower blowing the lid off Facebook and Cambridge Analytica. [...] Facebook's chief strategy officer wading in. So, tell us @alexstamos (who expressed his displeasure with the use of "breach" in media reports) why didn't you inform users of this "non-breach" after The Guardian first reported the story in December 2015? Zeynep Tufekci: If your business is building a massive surveillance machinery, the data will eventually be used and misused. Hacked, breached, leaked, pilfered, conned, "targeted", "engaged", "profiled", sold.. There is no informed consent because it's not possible to reasonably inform or consent. [...] Facebook's defense that Cambridge Analytica harvesting of FB user data from millions is not technically a "breach" is a more profound and damning statement of what's wrong with Facebook's business model than a "breach." MIT Professor Dean Eckles: Definitely fascinating that Joseph Chancellor, who contributed to collection and contract-violating retention (?) of Facebook user data, now works for Facebook. Amir Efrati, a reporter at the Information: May seem like a small thing to non-reporters but Facebook loses credibility by issuing a Friday night press release to "front-run" publications that were set to publish negative articles about its platform. If you want us to become more suspicious, mission accomplished. Further reading: Facebook's latest privacy debacle stirs up more regulatory interest from lawmakers (TechCrunch).
Mar 27, 2018 | yro.slashdot.org
(arstechnica.com) BeauHD on Sunday March 25, 2018 @10:34AM from the book-of-secrets dept. An anonymous reader quotes a report from Ars Technica: This past week, a New Zealand man was looking through the data Facebook had collected from him in an archive he had pulled down from the social networking site. While scanning the information Facebook had stored about his contacts, Dylan McKay discovered something distressing: Facebook also had about two years worth of phone call metadata from his Android phone , including names, phone numbers, and the length of each call made or received. This experience has been shared by a number of other Facebook users who spoke with Ars, as well as independently by us -- my own Facebook data archive, I found, contained call-log data for a certain Android device I used in 2015 and 2016, along with SMS and MMS message metadata. In response to an email inquiry about this data gathering by Ars, a Facebook spokesperson replied, "The most important part of apps and services that help you make connections is to make it easy to find the people you want to connect with. So, the first time you sign in on your phone to a messaging or social app, it's a widely used practice to begin by uploading your phone contacts." The spokesperson pointed out that contact uploading is optional and installation of the application explicitly requests permission to access contacts. And users can delete contact data from their profiles using a tool accessible via Web browser.
If you granted permission to read contacts during Facebook's installation on Android a few versions ago -- specifically before Android 4.1 (Jelly Bean) -- that permission also granted Facebook access to call and message logs by default. The permission structure was changed in the Android API in version 16. But Android applications could bypass this change if they were written to earlier versions of the API, so Facebook API could continue to gain access to call and SMS data by specifying an earlier Android SDK version. Google deprecated version 4.0 of the Android API in October 2017 -- the point at which the latest call metadata in Facebook user's data was found. Apple iOS has never allowed silent access to call data. You are able to have Facebook delete the data it collects from you, "but it's not clear if this deletes just contacts or if it also purges call and SMS metadata," reports Ars. Generally speaking, if you're concerned about privacy, you shouldn't share your contacts and call-log data with any mobile application.
Mar 26, 2018 | www.veteranstoday.comNow we know they not only kept files on 50 million Americans through Facebook, using the data there to profile fears and emotions, targeting and manipulating millions but when Google added their incredible mass of data, billions of illegally read emails and more, the American people became little more than pawns.
Again we reiterate, Russia didn't do it. It was the tech companies, all working as is now being made public, for Israeli intelligence and the mob. From the Daily Beast, March 20, 2018 by Jamie Ross:
"Facebook has been plunged into crisis over the allegations that Cambridge Analytica misused data from more than 50 million people to help elect Donald Trump. Nearly $40 billion was wiped off Facebook's market value Monday, an emergency meeting is due to be held Tuesday morning, and CEO Mark Zuckerberg has been criticized for remaining silent during what some analysts are describing as a threat to the company's existence.
Zuckerberg has been summoned to the British parliament to give evidence about the how it handles people's personal data. The head of a British inquiry into 'fake news,' Damian Collins, has accused Facebook of previously 'misleading' a parliament committee, adding: 'It is now time to hear from a senior Facebook executive with the sufficient authority to give an accurate account of this catastrophic failure of process.'"
What is being left out is more telling, that Zuckerberg, CEO and founder of Facebook, has long openly worked for Israeli intelligence and that evidence now exists that Israel not only ran the program to rig the American election, as many believe it did in both 2000 and 2004, leading to the destruction of Iraq, but that it did so again in 2016.
Few note the real policies of former Secretary of State Kerry and President Obama, the even handedness in the Middle East and their use of leverage against Israel. Obama never accepted wild claims made against Syria as Trump has and never attacked Damscus.
Evidence of Israel's role in gas attacks in Syria was overwhelming even though Russia was blocked from presenting same to the United Nations time and time again.
But then we hypothesize, what are we speaking of when we talk of Israel? This is where so many back off as anyone who questions Israel is smeared as an "anti-Semite" though the Likudist extremists who run that nation are mostly former Russian gangsters and enemies of Russia's current leadership.
The reason for what appears to be Israeli animosity toward Russia in reality originated when Putin cleaned out the oligarchs that looted Russia for two decades, plunging that nation into poverty and then fleeing to Tel Aviv or New York with endless billions of ill gotten gains. This is real history, not the history written down in books or reported in fake news.
More on happenings in London as reported by Jamie Ross:
"As anger grew toward Cambridge Analytica on Monday after Britain's Channel 4 broadcast a report showing company executives boasting about their extreme propaganda strategies, including filming opponents in compromising situations with Ukrainian sex workers, authorities in the U.K. and the U.S. also questioned whether Facebook mishandled the alleged breach and it's now facing damaging investigations that will further tarnish its brand.
Britain's information commissioner, Elizabeth Denham, confirmed she was applying to the courts for a warrant to search Cambridge Analytica's London offices and said Tuesday morning that she has been left frustrated by the company's reluctance to cooperate with her investigation.
[ Editor's Note : There appears to have been the classic "fix" in at the British Court by delaying for days the seizure of Cambridge's computer files, giving the needed time to remove any incriminating evidence Jim W. Dean ]
Fears have also been raised that the investigation may have been compromised by the presence of cybersecurity consultants from Stroz Friedberg -- the company hired by Facebook to audit Cambridge Analytica on its behalf -- who were in the London offices on Monday evening, until they were asked to leave by the information commissioner.
Asked if there was a risk of Cambridge Analytica or Facebook destroying evidence, Denham said on Sky News: "As this point we're not satisfied with the cooperation we're getting from Cambridge Analytica, so the next step is for us to apply to the court and to do an audit to get some answers as to whether data was misused and shared inappropriately."
British Parliament Culture Committee Chairman Damian Collins said:
'This is a matter for the authorities. Facebook sent in data analysts and lawyers who they appointed. What they intended to do there, who knows? The concern would have been, were they removing information or evidence which could have been vital to the investigation? It's right they stood down but it's astonishing they were there in the first place.'"
The issue now is one of accepting what is happening for all to see rather than absorbing the fake narrative sold the world. For those unaware, it isn't just millions of Americans but government officials as well, who form their opinions and prejudices against nations, races of people, religions and even ideas themselves.
The are imprinted via fictional television shows like Homeland , whose writers and producers are in actuality as complicit in psychological warfare as those who run Cambridge Analytical, Google or Facebook, the groups now under the public microscope.
As for Mueller and his investigation, it is pure theatre. As for Trump, more theatre as well, a buffoon long shown to be a mob asset, now wielding nukes and threatening the world, holding it hostage to his bad brain chemistry and his criminal handlers.
Gordon Duff is a Marine combat veteran of the Vietnam War that has worked on veterans and POW issues for decades and consulted with governments challenged by security issues. He's a senior editor and chairman of the board of Veterans Today, especially for the online magazine "New Eastern Outlook."
Mar 23, 2018 | www.counterpunch.orgIn the days and weeks following the 2016 presidential elections, reports surfaced about how a small British political consulting firm, Cambridge Analytica, might have played a pivotal role in Donald Trump's surprise victory. The company claimed to have formulated algorithms to influence American voters using individually targeted political advertisements. It reportedly generated personality profiles of millions of individual citizens by collecting up to 5000 data points on each person. Then Cambridge Analytica used these "psychographic" tools to send voters carefully crafted online messages about candidates or hot-button political issues.
Although political consultants have long used "microtargeting" techniques for zeroing in on particular ethnic, religious, age, or income groups, Cambridge Analytica's approach is unusual: The company relies upon individuals' personal data that is harvested from social media apps like Facebook. In the US, such activities are entirely legal. Some described Cambridge Analytica's tools as " mind-reading software " and a " weaponized AI [artificial intelligence] propaganda machine ." However, corporate media outlets such as CNN and the Wall Street Journal often portrayed the company in glowing terms.
Cambridge Analytica is once again in the headlines–but under somewhat different circumstances. Late last week, whistleblower Christopher Wylie went public , explaining how he played an instrumental role in collecting millions of Facebook profiles for Cambridge Analytica. This revelation is significant because until investigative journalist Carole Cadwalladr published her exposé in The Guardian , Cambridge Analytica's then-CEO Alexander Nix had adamantly denied using Facebook data. And although Facebook officials knew that Cambridge Analytica had previously gathered data on millions of users, they did not prohibit the company from advertising until last Friday, as the scandal erupted. To make matters worse, the UK's Channel 4 released undercover footage early this week in which Cambridge Analytica executives boast about using dirty tricks–bribes, entrapment, and "beautiful girls" to mention a few.
The case of Cambridge Analytica brings into focus a brave new world of electoral politics in an algorithmic age–an era in which social media companies like Facebook and Twitter make money by selling ads, but also by selling users' data outright to third parties. Relatively few countries have laws that prevent such practices–and it turns out that the US does not have a comprehensive federal statute protecting individuals' data privacy. This story is significant not only because it demonstrates what can happen when an unorthodox company takes advantage of a lax regulatory environment, but also because it reveals how Internet companies like Facebook have played fast and loose with the personal data of literally billions of users.
From Public Relations to Psychological Warfare
In order to make sense of Cambridge Analytica it is helpful to understand its parent company, SCL Group, which was originally created as the PR firm Strategic Communications Laboratory. It was founded in the early 1990s by Nigel Oakes , a flamboyant UK businessman. By the late 1990s, the company was engaged almost exclusively in political projects. For example, SCL was hired to help burnish the image of Indonesian president Abdurrahman Wahid–but Oakes and SCL employees had to shut down their operations center when SCL's cover was blown by the Wall Street Journal .
In July 2005, SCL underwent a dramatic transformation. It very publicly rebranded itself as a psychological warfare company by taking part in the UK's largest military trade show. SCL's exhibit included a mock operations center featuring dramatic crisis scenarios–a smallpox outbreak in London, a bloody insurgency in a fictitious South Asian country–which were then resolved with the help of the company's psyops techniques. Oakes told a reporter : "We used to be in the business of mindbending for political purposes, but now we are in the business of saving lives." The company's efforts paid off. Over the next ten years, SCL won contracts with the US Defense Department's Combatant Commands, NATO, and Sandia National Labs.
Over the past few years SCL–now known as SCL Group –has transformed itself yet again. It no longer defines itself as a psyops specialist, nor as a political consultancy–now, it calls itself a data analytics company specializing in "behavioral change" programs.
Along the way it created Cambridge Analytica, a subsidiary firm which differs from SCL Group in that it focuses primarily on political campaigns. Its largest investors include billionaire Robert Mercer, co-CEO of hedge fund Renaissance Technologies, who is best known for his advocacy of far-right political causes and his financial support of Breitbart News. Steve Bannon briefly sat on Cambridge Analytica's board of directors.
Cambridge Analytica first received significant media attention in November 2015, shortly after the firm was hired by Republican presidential nominee Ted Cruz's campaign. Although Cruz ultimately failed, Cambridge Analytica's CEO, Alexander Nix, claimed that Cruz's popularity grew largely due to the company's skillful use of aggregated voter data and personality profiling methods.
In August 2016, the Trump campaign hired Cambridge Analytica as part of a desperate effort to challenge Hillary Clinton's formidable campaign machine. Just a few months later, reports revealed that Cambridge Analytica had also played a role in the UK's successful pro-Brexit "Leave.EU" campaign.
Hacking the Citizenry
Cambridge Analytica relies upon "psychographic" techniques that measure the Big Five personality traits borrowed from social psychology: openness, conscientiousness, extroversion, agreeableness and neuroticism.
In the US, Cambridge Analytica developed psychological profiles of millions of Americans by hiring a company called Global Science Research (GSR) to plant free personality quizzes. Users were lured by the prospect of obtaining free personality scores, while Cambridge Analytica collected data–and access to users' Facebook profiles. Last week, The Guardian reported that Cambridge Analytica collected data from more than 300,000 Facebook users in this way. By agreeing to the terms and conditions of the app, those users also agreed to grant GSR (and by extension, Cambridge Analytica) access to the profiles of their Facebook "friends"–totalling approximately 50 million people.
Psychographics uses algorithms to scour voters' Facebook "likes," retweets and other social media data which are aggregated with commercially available information: land registries, automotive data, shopping preferences, club memberships, magazine subscriptions, and religious affiliation. When combined with public records, electoral rolls, and additional information purchased from data brokers such as Acxiom and Experian, Cambridge Analytica has raw material for shaping personality profiles. Digital footprints can be transformed into real people. This is the essence of psychographics: Using software algorithms to scour individual voters' Facebook "likes," retweets and other bits of data gleaned from social media and then combine them with commercially available personal information. Data mining is relatively easy in the US, since it has relatively weak privacy laws compared to South Korea, Singapore, and many EU countries.
In a 2016 presentation , Nix described how such information might be used to influence voter opinions on gun ownership and gun rights. Individual people can be addressed differently according to their personality profiles: "For a highly neurotic and conscientious audinece, the threat of a burglary–and the insurance policy of a gun. . .Conversely, for a closed and agreeable audience: people who care about tradition, and habits, and family."
Despite the ominous sounding nature of psychographics, it is not at all clear that Cambridge Analytica played a decisive role in the 2016 US presidential election. Some charge that the company and its former CEO Alexander Nix, exaggerated Cambridge Analytica's effect on the election's outcome. In February 2017, investigative journalist Kendall Taggart wrote an exposé claiming that more than a dozen former employees of Cambridge Analytica, Trump campaign staffers, and executives at Republican consulting firms denied that psychographics was used at all by the Trump campaign. Taggart concluded: "Rather than a sinister breakthrough in political technology, the Cambridge Analytica story appears to be part of the traditional contest among consultants on a winning political campaign to get their share of the credit–and win future clients." Not a single critic was willing to be identified in the report, apparently fearing retaliation from Robert Mercer and his daughter Rebekah, who is also an investor in the firm.
By no means has Cambridge Analytica limited its work to the US. In fact, it has conducted "influence operations" in several countries around the world.
For example, Cambridge Analytica played a major role in last year's presidential elections in Kenya, which pitted incumbent Uhuru Kenyatta of the right-wing Jubilee Party against Raila Odinga of the opposition Orange Democratic Movement. The Jubilee Party hired Cambridge Analytica in May 2017. Although the company claims to have limited its activities to data collection, earlier this week Mark Turnbull, a managing director for Cambridge Analytica, told undercover reporters a different story . He admitted that the firm secretly managed Kenyatta's entire campaign: "We have rebranded the party twice, written the manifesto, done research, analysis, messaging. I think we wrote all the speeches and we staged the whole thing–so just about every element of this candidate," said Turnbull.
Given the most recent revelations about Cambridge Analytica's planting of fake news stories , it seems likely that the company created persuasive personalized ads based on Kenyans' social media data. Fake Whatsapp and Twitter posts exploded days before the Kenyan elections. It is worth remembering that SCL Group has employed disinformation campaigns for military clients for 25 years, and it seems that Cambridge Analytica has continued this pattern of deception.
The August elections were fraught with accusations of vote tampering, the inclusion of dead people as registered voters, and the murder of Chris Msando , the election commission's technology manager, days before the election. When the dust settled, up to 67 people died in post-election violence–and Kenyatta ultimately emerged victorious. Weeks later, the Kenyan Supreme Court annulled the elections, but when new elections were scheduled for October, Odinga declared that he would boycott.
Given Kenya's recent history of electoral fraud, it is unlikely that Cambridge had much impact on the results. Anthropologist Paul Goldsmith , who has lived in Kenya for 40 years, notes that elections still tend to follow the principle of "who counts the votes," not "who influences the voters."
But the significance of Cambridge Analytica's efforts extends beyond their contribution to electoral outcomes. Kenya is no technological backwater. The world's first mobile money service was launched there in 2007, allowing users to transfer cash and make payments by phone. Homegrown tech firms are creating a "Silicon Savannah" near Nairobi. Two-thirds of Kenya's 48 million people have Internet access. Ten million use Whatsapp; six million use Facebook; two million use Twitter. As Kenyans spend more time in the virtual world, their personal data will become even more widely available since Kenya has no data protection laws.
Goldsmith summarizes the situation nicely:
Cambridge Analytica doesn't need to deliver votes so much as to create the perception that they can produce results. . .Kenya provides an ideal entry point into [Africa]. . .Embedding themselves with ruling elites presents a pivot for exploiting emergent commercial opportunities. . .with an eye on the region's resources and its growing numbers of persuadable youth.
Recent reports reveal that Cambridge Analytica has ongoing operations in Mexico and Brazil (which have general elections scheduled this July and October, respectively). India (which has general elections in about a year) has also been courted by the company, and it is easy to understand why: the country has 400 million smartphone users with more than 250 million on either Facebook or Whatsapp. India's elections are also a potential gold mine. More than half a billion people vote in parliamentary elections, and the expenditures are astonishing: Political parties spent $5 billion in 2014, compared to $6.5 billion in last year's US elections. India also has a massive mandatory ID program based on biometric and demographic data, the largest of its kind in the world.
Cambridge Analytica's global strategy appears focused on expanding its market share in promising markets. Although many people might describe Kenya, Mexico, Brazil, and India as developing countries, each in fact has a rapidly growing high-tech infrastructure, relatively high levels of Internet penetration, and large numbers of social media users. They all have weak or nonexistent Internet privacy laws. Though nominally democratic, each country is politically volatile and has experienced episodic outbursts of extreme political, sectarian, or criminal violence. Finally, these countries have relatively young populations, reflecting perhaps a long-term strategy to normalize a form of political communication that will reap long-term benefits in politically sensitive regions.
The capacity for saturating global voters with charged political messages is growing across much of the world, since the cost of buying Facebook ads, Twitterbots and trolls, bots for Whatsapp and other apps is cheap–and since more people than ever are spending time on social media. Such systems can be managed efficiently by remote control. Unlike the CIA's psyops efforts in the mid-20th century, which required extensive on-the-ground efforts–dropping leaflets from airplanes, bribing local journalists, broadcasting propaganda on megaphones mounted on cars–the new techniques can be deployed from a distance, with minimal cost. Cambridge Analytica relies upon small ground teams to do business with political parties, and partnerships with local business intelligence firms to scope out the competition or provide marketing advice, but most of the work is done from London and New York.
Weaponizing Big Data?
From its beginnings, Cambridge Analytica has declared itself to be a "data-driven" group of analytics experts practicing an improved form of political microtargeting, but there are indications that the firm has broader ambitions.
In March 2017, reports emerged that top executives from SCL Group met with Pentagon officials, including Hriar Cabayan, head of a branch which conducts DoD research and cultural analysis. A decade ago, Cabayan played an instrumental role in launching the precursor to the Human Terrain System , a US Army counterinsurgency effort which embedded anthropologists and other social scientists with US combat brigades in Iraq and Afghanistan.
A few months later, in August 2017, the Associated Press reported that retired US Army General Michael Flynn, who briefly served as National Security Director in the Trump administration, had signed a work agreement with Cambridge Analytica in late 2016, though it is unclear whether he actually did any work for the firm. Flynn pleaded guilty to lying to the FBI about his contacts with Russian operatives in late 2017, when he was working with Trump's transition team. Given his spot in the media limelight, it is easy to forget that he once headed US intelligence operations in Afghanistan, advocating for a big data approach to counterinsurgency that would, among other things, include data collected by Human Terrain Teams.
The connections between Cambridge Analytica/SCL Group and the Pentagon's champions of data-driven counterinsurgency and cyberwarfare may be entirely coincidental, but they do raise several questions: As Cambridge Analytica embarks on its global ventures, is it undertaking projects that are in fact more sinister than its benign-sounding mission of "behavioral change"? And are the company's recent projects in Kenya, India, Mexico, and Brazil simply examples of global market expansion, or are these countries serving as laboratories to test new methods of propaganda dissemination and political polarization for eventual deployment here at home?
Here the lines between military and civilian applications become blurred, not only because ARPANET–the Internet's immediate precursor–was developed by the Pentagon's Advanced Research Projects Agency, but also because the technology can be used for surveillance on a scale that authoritarian regimes of the 20th century could only have dreamed about. As Yasha Levine convincingly argues in his book Surveillance Valley: The Secret Military History of the Internet , the Internet was originally conceived as a counterinsurgency surveillance program.
Neutralizing Facebook's Surveillance Machine
It appears that many people are finally taking note of the digital elephant in the room: Facebook's role in enabling Cambridge Analytica and other propagandists, publicists, and mind-benders to carry out their work–legally and discreetly. As recently noted by Lorenzo Franceschi-Bicchierai in the online journal Motherboard , Cambridge Analytica's data harvesting practices weren't security breaches, they were "par for the course. . .It was a feature, not a bug. Facebook still collects -- and then sells -- massive amounts of data on its users." In other words, every Facebook post or tweet, every g-mail message sent or received, renders citizens vulnerable to forms of digital data collection that can be bought and sold to the highest bidder. The information can be used for all kinds of purposes in an unregulated market: monitoring users' emotional states, manipulating their attitiudes, or disseminating tailor-made propaganda designed to polarize people.
It is telling that Facebook stubbornly refuses to call Cambridge Analytica's actions a "data breach." As Zeynep Tufekci, author of the book Twitter And Tear Gas: The Power and Fragility of Networked Protest puts it, the company's defensive posture reveals much about the social costs of social media. She recently wrote :
"If your business is building a massive surveillance machinery, the data will eventually be used and misused. Hacked, breached, leaked, pilfered, conned, targeted, engaged, profiled, sold. There is no informed consent because it's not possible to reasonably inform or consent."
Cambridge Analytica is significant to the extent that it illuminates new technological controlling processes under construction. In a supercharged media environment in which Facebook, Twitter, and WhatsApp (owned by Facebook) have become the primary means by which literally billions of people consume news, mass producing propaganda has never been easier. With so many people posting so much information about the intimate details of their lives on the Web, coordinated attempts at mass persuasion will almost certainly become more widespread in the future.
In the meantime, there are concrete measures that we can take to rein in Facebook, Amazon, Google, Twitter, and other technology giants. Some of the most lucid suggestions have been articulated by Roger McNamee, a venture capitalist and early Facebook investor. He recommends a multi-pronged approach : demanding that the social media companies' CEOs testify before congressional and parliamentary committees in open sessions; imposing strict regulations on how Internet platforms are used and commercialized; requiring social media companies to report who is sponsoring political and issues-based advertisements; mandating transparency about algorithms ("users deserve to know why they see what they see in their news feeds and search results," says McNamee); requiring social media apps to offer an "opt out" to users; banning digital "bots" that impersonate humans; and creating rules that allow consumers (not corporations) to own their own data.
In a world of diminishing privacy, our vulnerabilities are easily magnified. Experimental psychologists specializing in what they euphemistically call "behavior design" have largely ignored ethics and morality in order to help Silicon Valley companies create digital devices, apps, and other technologies that are literally irresistible to their users. As the fallout from Cambridge Analytica's activities descends upon the American political landscape, we should take advantage of the opportunity to impose meaningful controls on Facebook, Google, Twitter, and other firms that have run roughshod over democratic norms–and notions of individual privacy–in the relentless pursuit of profit. Join the debate on Facebook More articles by: Roberto J. González
Roberto J. González is chair of the anthropology department at San José State University. He has written several books including American Counterinsurgency: Human Science and the Human Terrain and Militarizing Culture: Essays on the Warfare State . He can be reached at email@example.com .
Mar 25, 2018 | www.zerohedge.com
Tonight at 7pm ET/PT, 60 Minutes will air a controversial interview with Stephanie Clifford, aka Stormy Daniels, the adult-film star who says she had an affair with Donald Trump. Daniels will talk to Anderson Cooper about the relationship she says she had with Trump in 2006 and 2007, unveiling details that bring her story up to the present. It will be the first - and so far only - television interview in which she speaks about the alleged relationship.
The 60 Minutes interview will include an examination of the potential legal and political ramifications of the $130,000 payment that Trump's attorney Michael Cohen says he made to Daniels using his own funds. Daniels accepted the money in return for signing a confidentiality agreement, although she recently violated the CA, claiming Trump never signed it.
The president has denied having an affair with Daniels, while Trump's legal team - in this case led by Charles Harder who won a $140MM verdict for Hulk Hogan against Gawker - is seeking to move the case to federal court and claims that Stormy is liable for up to $20 million in damages. This in turn prompted Daniels to launch a crowdfunding campaign to fund her lawsuit against Trump, which at last check had raised over $290K .
Cooper conducted the interview earlier this month, shortly after Cohen obtained a temporary restraining order against Daniels. Meanwhile, Daniels is seeking a ruling that the confidentiality agreement between her and the president is invalid, in part because Mr. Trump never signed it. The president's attorneys are seeking to move the case to federal court and claim Daniels is liable for more than $20 million in damages for violations of the agreement.
On Thursday, the lawyer representing Daniels fired off a tweet with a picture of what appeared to be a compact disc in a safe - hinting that he has video or photographic evidence of Clifford's affair with President Trump.
"If 'a picture is worth a thousand words,' how many words is this worth?????" tweeted lawyer Michael Avenatti.
Avenatti has been a frequent guest on cable news as he promotes Stormy's upcoming 60 minutes tell-all about her alleged affair with President Trump. When CBS Evening News' Julianna Goldman asked Avenatti if he had photos, texts or videos of her alleged relationship with Trump, he replied "No comment," adding that Clifford just "wants to set the record straight." (which you can read more about in her upcoming book, we're sure).
Previewing today's 60 Minutes segment, Avenatti purposefully built up the suspense, tweeting that, among other things, "tonight is not the end – it's the beginning"
And while it is highly unlikely that the Stormy Daniels scandal will escalate into anything of Clinton-Lewinsky proportions, not to mention that Trump has enough other headaches on his hands, here according to The Hill , are seven things to watch for in tonight's interview:
1. Will she give details about the nondisclosure agreement?
Daniels has never spoken publicly about the nondisclosure agreement that purportedly bars her from speaking about her alleged affair with Trump. But a lawsuit filed by Daniels earlier this month confirmed the existence of such a document, arguing that it is invalid because it was never co-signed by Trump himself.
Whether Daniels will discuss the details of the agreement in the "60 Minutes" interview remains to be seen. Her lawsuit seeking to void the contract is still pending, and NDAs often prohibit signatories from speaking about the agreements.
Daniels has hinted that is true of her NDA. During an interview with late-night host Jimmy Kimmel in January, Kimmel pointed out that Daniels would likely be barred from discussing the agreement if it, in fact, existed. "You're so smart, Jimmy," was her cagey response.
2. Will she talk openly about the alleged affair?
Daniels has implied she was paid $130,000 by Trump's personal attorney Michael Cohen weeks before the 2016 presidential election to keep quiet about the alleged affair. Speaking openly about her claims would certainly violate the terms of the disputed NDA, and could subject Daniels to legal penalties.
In court papers filed earlier this month, Trump's lawyers said that Daniels could face up to $20 million in damages for violating the terms of the agreement. One question that remains is whether Daniels could toss out the NDA completely in her "60 Minutes" interview, and provide details about her alleged relationship with the president. The last time she spoke about it was 2011, when she gave an interview to In Touch magazine that wasn't published until this year.
3. Will she mention possible video or photographic evidence?
Avenatti has repeatedly hinted that video or photographic evidence of Daniels's alleged affair with Trump exists. The March 6 lawsuit filed by Daniels to void the nondisclosure agreement with Trump refers to "certain still images and/or text messages which were authored by or relate to" the president. While the NDA reportedly required her to turn over such material and get rid of her own copies, Avenatti has suggested that Daniels may have retained it.
Avenatti hinted this week that he may be in possession of such material, tweeting a cryptic photo of a compact disc inside of what appeared to be a safe. "If 'a picture is worth a thousand words,' how many words is this worth?????" he wrote on Twitter.
4. Will she address whether she was physically threatened?
Avenatti prompted questions earlier this month when he said that Daniels had been threatened with physical harm in connection with the alleged affair with Trump. Asked on MSNBC's "Morning Joe" whether Daniels had been physically threatened, Avenatti bluntly replied, "yes." Exactly who may have threatened Daniels or what the nature of those threats may have been is unclear, and Avenatti has declined to discuss the matter in greater detail. Daniels herself has not addressed any potential physical threats that she may have gotten, leaving open whether she will discuss the topic in the "60 Minutes" interview.
5. Will she discuss whether Trump knew about the $130K payment?
Cohen himself has acknowledged making the payment to Daniels, but has insisted that the money came from his personal funds and that Trump was never made aware of the transaction. White House press secretary Sarah Huckabee Sanders has said she does not believe Trump knew about the payment. But Avenatti has argued otherwise, saying the fact that Cohen used a Trump Organization email address backs up his claim that the real estate mogul was aware of the transaction. In an interview on "Morning Joe" last week, Avenatti also suggested that he had more evidence that Trump knew about the payment. Asked by Willie Geist if his "belief that the president directed this payment is based on more than a hunch," Avenatti simply replied, "yes," but declined to provide any evidence.
6. Why does she want to talk about the affair now?
Daniels's lawsuit claims she expressed interest in discussing the alleged affair publicly in 2016 after The Washington Post published a 2005 "Access Hollywood" tape in which Trump could be heard boasting about groping and kissing women without their permission. It was at this point that Cohen and Trump "aggressively sought to silence Ms. Clifford," according to the lawsuit, which claims that the $130,000 payment and nondisclosure agreement soon followed. But for more than a year after that, Daniels was silent about the alleged affair, and it was only in recent months that the accusations resurfaced. One thing to watch for is whether Daniels addresses her motives in the "60 Minutes" interview, or answers questions about what she hopes will happen next.
7. What happens next?
There may be hints of what Daniels's next steps are in the interview. A planned court hearing for Daniels's lawsuit is still months away. However, whatever Daniels reveals in the interview may force the hand of Trump's own legal team. After news broke that CBS intended to air the "60 Minutes" segment with Daniels, speculation swirled that Trump's lawyers would take legal action seeking to block the broadcast. Such legal action would have been unlikely to proceed, because courts rarely allow such prior restraint of speech, particularly regarding the news media.
But Trump's legal team has already signaled they're willing to fight Daniels on her claims. They reportedly asked for a temporary restraining order against her last month and have asked to transfer the lawsuit from California state court to a federal court in Los Angeles. But how Trump and his lawyers respond to the interview after it airs will be closely watched. Tags Law Crime News Agencies Internet Service Providers Glasses, Spectacles & Contact lenses
Comments Vote up! 7 Vote down! 0
Moustache Rides Sun, 03/25/2018 - 16:02 Permalinkwee-weed up -> Moustache Rides Sun, 03/25/2018 - 16:03 Permalink
Oh, I can't wait to tune into this. Give me a frackin' break.IridiumRebel -> Bes Sun, 03/25/2018 - 16:28 Permalink
Can you EVER imagine the MSM doing this to Slick Willy? Fukin' hypocrites!warsev -> IridiumRebel Sun, 03/25/2018 - 16:23 Permalink
It's 24/7 on the CuntStreamMedia.....like they're gonna find out tonight for the first time?
They probably know already. IT WAS 12 YEARS AGO......serotonindumptruck -> Mustafa Kemal Sun, 03/25/2018 - 16:29 Permalink
What I wonder is just how low CBS can go. Can you imagine the CBS of twenty or thirty years ago wading in the sewer like this?didthatreallyhappen Sun, 03/25/2018 - 16:04 Permalink
Initially, this ridiculous scandal was mildly amusing.
Now, it has become a tedious circus sideshow that serves to distract the masses from much more important issues.
The disgusting fact that Trump chose to throw his dick into this cum-dumpster skank is bad enough, but now that her lawyer apparently has a Trump dick-pic or some other pornographic evidence, he intends to exploit and extort as much publicity and money that he can in an effort to embarrass the POTUS.
Is it any wonder that the USA has become the laughing stock of the world?silverer -> didthatreallyhappen Sun, 03/25/2018 - 16:12 Permalink
bill clinton raped women and the left didn't care. They care now about Trump's mistress?Robert Trip Sun, 03/25/2018 - 16:06 Permalink
Bill squirted in the White House. Trump squirted on his own time.
"Adult film star?"
Interviewed by "I love to suck cocks" Anderson Cooper on 60 Minutes.
They are fit for each other.
Mar 24, 2018 | www.nakedcapitalism.comYves here. Not new to anyone who has been paying attention, but a useful recap with some good observations at the end, despite deploying the cringe-making trope of businesses having DNA. That legitimates the notion that corporations are people.
By Ivan Manokha, a departmental lecturer in the Oxford Department of International Development. He is currently working on power and obedience in the late-modern political economy, particularly in the context of the development of new technologies of surveillance. Originally published at openDemocracy
The current social mobilization against Facebook resembles the actions of activists who, in opposition to neoliberal globalization, smash a McDonald's window during a demonstration.
On March 17, The Observer of London and The New York Times announced that Cambridge Analytica, the London-based political and corporate consulting group, had harvested private data from the Facebook profiles of more than 50 million users without their consent. The data was collected through a Facebook-based quiz app called thisisyourdigitallife, created by Aleksandr Kogan, a University of Cambridge psychologist who had requested and gained access to information from 270,000 Facebook members after they had agreed to use the app to undergo a personality test, for which they were paid through Kogan's company, Global Science Research.
But as Christopher Wylie, a twenty-eight-year-old Canadian coder and data scientist and a former employee of Cambridge Analytica, stated in a video interview , the app could also collect all kinds of personal data from users, such as the content that they consulted, the information that they liked, and even the messages that they posted.
In addition, the app provided access to information on the profiles of the friends of each of those users who agreed to take the test, which enabled the collection of data from more than 50 million.
All this data was then shared by Kogan with Cambridge Analytica, which was working with Donald Trump's election team and which allegedly used this data to target US voters with personalised political messages during the presidential campaign. As Wylie, told The Observer, "we built models to exploit what we knew about them and target their inner demons."
Following these revelations the Internet has been engulfed in outrage and government officials have been quick to react. On March 19, Antonio Tajani President of the European Parliament Antonio Tajani, stated in a twitter message that misuse of Facebook user data "is an unacceptable violation of our citizens' privacy rights" and promised an EU investigation. On March 22, Wylie communicated in a tweet that he accepted an invitation to testify before the US House Intelligence Committee, the US House Judiciary Committee and UK Parliament Digital Committee. On the same day Israel's Justice Ministry informed Facebook that it was opening an investigation into possible violations of Israelis' personal information by Facebook.
While such widespread condemnation of Facebook and Cambridge Analytica is totally justified, what remains largely absent from the discussion are broader questions about the role of data collection, processing and monetization that have become central in the current phase of capitalism, which may be described as 'platform capitalism', as suggested by the Canadian writer and academic Nick Srnicek in his recent book .
Over the last decade the growth of platforms has been spectacular: today, the top 4 enterprises in Forbes's list of most valuable brands are platforms, as are eleven of the top twenty. Most recent IPOs and acquisitions have involved platforms, as have most of the major successful startups. The list includes Apple, Google, Microsoft, Facebook, Twitter, Amazon, eBay, Instagram, YouTube, Twitch, Snapchat, WhatsApp, Waze, Uber, Lyft, Handy, Airbnb, Pinterest, Square, Social Finance, Kickstarter, etc. Although most platforms are US-based, they are a really global phenomenon and in fact are now playing an even more important role in developing countries which did not have developed commercial infrastructures at the time of the rise of the Internet and seized the opportunity that it presented to structure their industries around it. Thus, in China, for example, many of the most valuable enterprises are platforms such as Tencent (owner of the WeChat and QQ messaging platforms) and Baidu (China's search engine); Alibaba controls 80 percent of China's e-commerce market through its Taobao and Tmall platforms, with its Alipay platform being the largest payments platform in China.
The importance of platforms is also attested by the range of sectors in which they are now dominant and the number of users (often numbered in millions and, in some cases, even billions) regularly connecting to their various cloud-based services. Thus, to name the key industries, platforms are now central in Internet search (Google, Yahoo, Bing); social networking (Facebook, LinkedIn, Instagram, Snapchat); Internet auctions and retail (eBay, Taobao, Amazon, Alibaba); on-line financial and human resource functions (Workday, Upwork, Elance, TaskRabbit), urban transportation (Uber, Lyft, Zipcar, BlaBlaCar), tourism (Kayak, Trivago, Airbnb), mobile payment (Square Order, PayPal, Apple Pay, Google Wallet); and software development (Apple's App Store, Google Play Store, Windows App store). Platform-based solutions are also currently being adopted in more traditional sectors, such as industrial production (GE, Siemens), agriculture (John Deere, Monsanto) and even clean energy (Sungevity, SolarCity, EnerNOC).
User Profiling -- Good-Bye to Privacy
These platforms differ significantly in terms of the services that they offer: some, like eBay or Taobao simply allow exchange of products between buyers and sellers; others, like Uber or TaskRabbit, allow independent service providers to find customers; yet others, like Apple or Google allow developers to create and market apps.
However, what is common to all these platforms is the central role played by data, and not just continuous data collection, but its ever more refined analysis in order to create detailed user profiles and rankings in order to better match customers and suppliers or increase efficiency.
All this is done in order to use data to create value in some way another (to monetize it by selling to advertisers or other firms, to increase sales, or to increase productivity). Data has become 'the new oil' of global economy, a new commodity to be bought and sold at a massive scale, and with this development, as a former Harvard Business School professor Shoshana Zuboff has argued , global capitalism has become 'surveillance capitalism'.
What this means is that platform economy is a model of value creation which is completely dependant on continuous privacy invasions and, what is alarming is that we are gradually becoming used to this.
Most of the time platform providers keep track of our purchases, travels, interest, likes, etc. and use this data for targeted advertising to which we have become accustomed. We are equally not that surprised when we find out that, for example, robotic vacuum cleaners collect data about types of furniture that we have and share it with the likes of Amazon so that they can send us advertisements for pieces of furniture that we do not yet possess.
There is little public outcry when we discover that Google's ads are racially biased as, for instance, a Harvard professor Latanya Sweeney found by accident performing a search. We are equally hardly astonished that companies such as Lenddo buy access to people's social media and browsing history in exchange for a credit score. And, at least in the US, people are becoming accustomed to the use of algorithms, developed by private contractors, by the justice system to take decisions on sentencing, which often result in equally unfair and racially biased decisions .
The outrage provoked by the Cambridge Analytica is targeting only the tip of the iceberg. The problem is infinitely larger as there are countless equally significant instances of privacy invasions and data collection performed by corporations, but they have become normalized and do not lead to much public outcry.
Today surveillance is the DNA of the platform economy; its model is simply based on the possibility of continuous privacy invasions using whatever means possible. In most cases users agree, by signing the terms and conditions of service providers, so that their data may be collected, analyzed and even shared with third parties (although it is hardly possible to see this as express consent given the size and complexity of these agreements -- for instance, it took 8 hours and 59 minutes for an actor hired by the consumer group Choice to read Amazon Kindle's terms and conditions). In other instances, as in the case of Kogan's app, the extent of the data collected exceeds what was stated in the agreement.
But what is important is to understand that to prevent such scandals in the future it is not enough to force Facebook to better monitor the use of users' data in order to prevent such leaks as in the case of Cambridge Analytica. The current social mobilization against Facebook resembles the actions of activists who, in opposition to neoliberal globalization, smash a McDonald's window during a demonstration.
What we need is a total redefinition of the right to privacy (which was codified as a universal human right in 1948, long before the Internet), to guarantee its respect, both offline and online.
What we need is a body of international law that will provide regulations and oversight for the collection and use of data.
What is required is an explicit and concise formulation of terms and conditions which, in a few sentences, will specify how users' data will be used.
It is important to seize the opportunity presented by the Cambridge Analytica scandal to push for these more fundamental changes.
Arizona Slim , , March 24, 2018 at 7:38 amSteve H. , , March 24, 2018 at 8:05 am
I am grateful for my spidey sense. Thanks, spidey sense, for ringing the alarm bells whenever I saw one of those personality tests on Facebook. I never took one.Annieb , , March 24, 2018 at 2:02 pm
First they came for
The most efficient strategy is to be non-viable . They may come for you eventually, but someone else gets to be the canary, and you haven't wasted energy in the meantime. TOR users didn't get that figured out.ChrisPacific , , March 25, 2018 at 4:07 pm
Never took the personality test either, but now I now that all of my friends who did unknowingly gave up my personal information too. I read an article somewhere about this over a year ago so it's really old news. Sent the link to a few people who didn't care. But now that they all know that Cambridge Analytical used FB data in support of the Trump campaign it's all over the mainstream and people are upset.HotFlash , , March 24, 2018 at 3:13 pm
You can disable that (i.e., prevent friends from sharing your info with third parties) in the privacy options. But the controls are not easy to find and everything is enabled by default.Octopii , , March 24, 2018 at 8:06 am
I haven't FB'd in years and certainly never took any such test, but if any of my friends, real or FB, did, and my info was shared, can I sue? If not, why not?Samuel Conner , , March 24, 2018 at 8:16 am
Everyone thought I was paranoid as I discouraged them from moving backups to the cloud, using trackers, signing up for grocery store clubs, using real names and addresses for online anything, etc. They thought I was overreacting when I said we need European-style privacy laws in this country. People at work thought my questions about privacy for our new location-based IoT plans were not team-based thinking.
And it turns out after all this that they still think I'm extreme. I guess it will have to get worse.Collins , , March 24, 2018 at 9:14 am
In a first for me, there are surface-mount resistors in the advert at the top of today's NC links page. That is way out of the ordinary; what I usually see are books or bicycle parts; things I have recently purchased or searched.
But a couple of days ago I had a SKYPE conversation with a sibling about a PC I was scavenging for parts, and surface mount resistors (unscavengable) came up. I suspect I have been observed without my consent and am not too happy about it. As marketing, it's a bust; in the conversation I explicitly expressed no interest in such components as I can't install them. I suppose I should be glad for this indication of something I wasn't aware was happening.Samuel Conner , , March 24, 2018 at 10:15 am
Had you used your computer keyboard previously to search for 'surface mount resistors', or was the trail linking you & resistors entirely verbal?Abi , , March 25, 2018 at 3:24 pm
No keyboard search. I never so much as think about surface mount components; the inquiry was raised by my sibling and I responded. Maybe its coincidental, but it seems quite odd.
I decided to click through to the site to generate a few pennies for NC and at least feel like I was punishing someone for snooping on me.ChiGal in Carolina , , March 25, 2018 at 10:12 am
Its been happening to me a lot recently on my Instagram, I don't like pictures or anything, but whenever I have a conversation with someone on my phone, I start seeing ads of what I spoke aboutEureka Springs , , March 24, 2018 at 8:44 am
I thought it came out a while ago that Skype captures and retains all the dialogue and video of convos using it.Pelham , , March 24, 2018 at 9:13 am
What we need is a total redefinition of the right to privacy (which was codified as a universal human right in 1948, long before the Internet), to guarantee its respect, both offline and online.
Are we, readers of this post, or citizens of the USA supposed to think there is anything binding in declarations? Or anything from the UN if at all inconvenient for that matter?
No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.
Platforms like facebook allow individuals to 'spy' on each other and people love it. When I was a kid i always marveled at how some households would leave a police scanner on 24/7. With the net we have this writ large with baby, puppy and tv dinner photos. Not to forget it's a narcissist paradise. I have friends who I've tried to gently over time inject tidbits of info like this article provides for many years and they still just refuse to try and get it. If they looked over their shoulder and saw how many people/entities are literally following them everywhere they go, they would become rabid gun owners (don't tread on me!) overnight, but the invisible hand/eye registers not at all.albert , , March 24, 2018 at 6:27 pm
A side note: If Facebook and other social media were to assume ANY degree of responsibility for content appearing on their platforms, they would be acknowledging their legal liability for ALL content.
Hence they would be legally responsible just as newspapers are. And major newspapers have on-staff lawyers and editors exquisitely attuned to the possibility of libelous content so they can avoid ruinous lawsuits.
If the law were applied as it should be, Facebook and its brethren wouldn't last five minutes before being sued into oblivion.PlutoniumKun , , March 24, 2018 at 9:52 am
" being sued into oblivion ." If only.
Non-liability is a product of the computer age. I remember having to agree with Microsofts policy to absolve them of -any- liability when using their software. If they had their druthers, -no- company would be liable for -anything-. It's called a 'perfect world'.
Companies that host 'social media' should not have to bear any responsibility for their users content. Newspapers employ writers and fact checkers. They are set up to monitor their staff for accuracy (Okay, in theory). So you can sue them and even their journalist employees. Being liable (and not sued) allows them to brag about how truthful they are. Reputations are a valuable commodity these days.
In the case of 'social media' providers, liability falls on the authors of their own comments, which is only fair, in my view. However, I would argue that those 'providers' should -not- be considered 'media' like newspapers, and their members should not be considered 'journalists'.
Also, those providers are private companies, and are free to edit, censor, or delete anything on their site. And of course it's automated. Some conservative Facebook members were complaining about being banned. Apparently, there a certain things you can't say on Facebook.
AFAIC, the bottom line is this: Many folks tend to believe everything they read online. They need to learn the skill of critical thinking. And realize that the Internet can be a vast wasteland; a digital garbage dump.
Why are our leaders so concerned with election meddling? Isn't our propaganda better than the Russians? We certainly pay a lot for it.
. .. . .. -- .saurabh , , March 24, 2018 at 11:43 am
It seems even Elon Musk is now rebelling against Facebook.
Musk Takes Down the Tesla and SpaceX Facebook Pages.
Today, Musk also made fun of Sonos for not being as committed as he was to the anti-Facebook cause after the connected-speaker maker said it would pull ads from the platform -- but only for a week.
"Wow, a whole week. Risky " Musk tweeted.Jim Thomson , , March 25, 2018 at 9:39 am
Musk, like Trump, knows he does not need to advertise because a fawning press will dutifully report on everything he does and says, no matter how dumb.Daniel Mongan , , March 24, 2018 at 10:14 am
This is rich.
I can't resist: It takes a con to know a con.
(not the most insightful comment)JimTan , , March 24, 2018 at 11:12 am
A thoughtful post, thanks for that. May I recommend you take a look at "All You Can Pay" (NationBooks 2015) for a more thorough treatment of the subject, together with a proposal on how to re-balance the equation. Full disclosure, I am a co-author.JCC , , March 24, 2018 at 11:29 am
People are starting to download copies of their Facebook data to get an understanding of how much information is being collected from them.oh , , March 24, 2018 at 1:44 pm
A reminder: https://www.youtube.com/watch?v=iRT9On7qie8
I saw this video back in 2007. It was originally put together by a Sarah Lawrence student who was working on her paper on social media. The ties of all the original investors to IN-Q-Tel scared me off and I decided to stay away from Facebook.
But it isn't just FB. Amazon, Twitter, Google, LinkedIn, Apple, Microsoft and many others do the same, and we are all caught up in it whether we agree to participate or not.
Anyone watch the NCAA Finals and see all the ads from Google about being "The Official Cloud of the NCAA"? They were flat out bragging, more or less, about surveillance of players. for the NCAA.
Platform Capitalism is a mild description, it is manipulation based on Surveillance Capitalism, pure and simple. The Macro pattern of Corporate Power subsuming the State across every area is fascinating to watch, but a little scary.HotFlash , , March 24, 2018 at 3:27 pm
Caveat Emptor: If you watch YouTube, they'll only add to the information that they already have on you!Craig H. , , March 24, 2018 at 12:21 pm
Just substitute "hook" for 'you" in the URL, you get the same video, no ads, and they claim not to track you. YMMVEd , , March 24, 2018 at 2:50 pm
Privacy no longer a social norm, says Facebook founder; Guardian; 10 January 2010
The Right to Privacy; Warren & Brandeis; Harvard Law Review; 15 December 1890
It was amusing that the top Google hit for the Brandeis article was JSTOR which requires us to surrender personal detail to access their site. To hell with that.
The part I like about the Brandeis privacy story is the motivation was some Manhattan rich dicks thought the gossip writers snooping around their wedding party should mind their own business. (Apparently whether this is actually true or just some story made up by somebody being catty at Brandeis has been the topic of gigabytes of internet flame wars but I can't ever recall seeing any of those.)Craig H. , , March 24, 2018 at 3:42 pm
" Two young psychologists are central to the Cambridge Analytica story. One is Michal Kosinski, who devised an app with a Cambridge University colleague, David Stillwell, that measures personality traits by analyzing Facebook "likes." It was then used in collaboration with the World Well-Being Project, a group at the University of Pennsylvania's Positive Psychology Center that specializes in the use of big data to measure health and happiness in order to improve well-being. The other is Aleksandr Kogan, who also works in the field of positive psychology and has written papers on happiness, kindness, and love (according to his résumé, an early paper was called "Down the Rabbit Hole: A Unified Theory of Love"). He ran the Prosociality and Well-being Laboratory, under the auspices of Cambridge University's Well-Being Institute.
Despite its prominence in research on well-being, Kosinski's work, Cadwalladr points out, drew a great deal of interest from British and American intelligence agencies and defense contractors, including overtures from the private company running an intelligence project nicknamed "Operation KitKat" because a correlation had been found between anti-Israeli sentiments and liking Nikes and KitKats. Several of Kosinski's co-authored papers list the US government's Defense Advanced Research Projects Agency, or DARPA, as a funding source. His résumé boasts of meetings with senior figures at two of the world's largest defense contractors, Boeing and Microsoft, both companies that have sponsored his research. He ran a workshop on digital footprints and psychological assessment for the Singaporean Ministry of Defense.
For his part, Aleksandr Kogan established a company, Global Science Research, that contracted with SCL, using Facebook data to map personality traits for its work in elections (Kosinski claims that Kogan essentially reverse-engineered the app that he and Stillwell had developed). Kogan's app harvested data on Facebook users who agreed to take a personality test for the purposes of academic research (though it was, in fact, to be used by SCL for non-academic ends). But according to Wylie, the app also collected data on their entire -- and nonconsenting -- network of friends. Once Cambridge Analytica and SCL had won contracts with the State Department and were pitching to the Pentagon, Wylie became alarmed that this illegally-obtained data had ended up at the heart of government, along with the contractors who might abuse it.
This apparently bizarre intersection of research on topics like love and kindness with defense and intelligence interests is not, in fact, particularly unusual. It is typical of the kind of dual-use research that has shaped the field of social psychology in the US since World War II.
Much of the classic, foundational research on personality, conformity, obedience, group polarization, and other such determinants of social dynamics -- while ostensibly civilian -- was funded during the cold war by the military and the CIA. The cold war was an ideological battle, so, naturally, research on techniques for controlling belief was considered a national security priority. This psychological research laid the groundwork for propaganda wars and for experiments in individual "mind control."
The pioneering figures from this era -- for example, Gordon Allport on personality and Solomon Asch on belief conformity -- are still cited in NATO psy-ops literature to this day .."
This is an issue which has frustrated me greatly. In spite of the fact that the country's leading psychologist (at the very least one of them -- ex-APA president Seligman) has been documented taking consulting fees from Guantanamo and Black Sites goon squads, my social science pals refuse to recognize any corruption at the core of their so-called replicated quantitative research.
I have asked more than five people to point at the best critical work on the Big 5 Personality theory and they all have told me some variant of "it is the only way to get consistent numbers". Not one has ever retreated one step or been receptive to the suggestion that this might indicate some fallacy in trying to assign numbers to these properties.
They eat their own dog food all the way and they seem to be suffering from a terrible malnutrition. At least the anthropologists have Price . (Most of that book can be read for free in installments at Counterpunch.)
Mar 25, 2018 | www.eurasiafuture.com"CA was able to provide the campaign with predictive analytics based on more than 5,000 data points on every voter in the United States. From there, CA's team of political consultants and psychologists guided the campaign on what to say and how to say it to specific groups of voters."
This is a vocal acknowledgement from Trump's data guru that he was able to change the behaviour of American voters in favour of a Trump victory in the presidential election, but unfortunately, the American deep state blamed Russia for hacking American democracy – a claim which is totally baseless and untrue. In a total disingenuous move, American mainstream media tried to link-up CA with WikiLeaks. While CA did contact Wikileaks, Julian Assange is on the record as rebuffing CA's advances.
American warmongers within the deep state worked for a Hillary Clinton victory through their control of American mainstream media, but they nevertheless failed to elect her. As a result, Clinton's team blamed her loss on Russia, in order to accelerate hostility towards Moscow and to apply pressure on President Trump so that he could not establish friendly relations with Russia. They have succeeded in this regard as Trump surrendered to the war hungry deep state. That being said, the fight within the deep state between FBI and CIA also helped Trump to use the situation in his favour, as the FBI investigated Clinton after emails leaks scandal.
The CIA blamed Russia for hacking Hillary Clinton's DNC emails and allegedly passing them to Wikileaks. The purpose of this blame was to influence the FBI investigation against her. To a degree they succeeded. While she did not go to jail, she ended up losing the election. US intelligence agencies propagated a myth that Wikileaks worked for Russia, but it is a fact that Russia has no links with Wikileaks.
... ... ...Recently Russian President Vladimir Putin held up a mirror to western global manipulator elite and addressed their baseless 'blame campaign' against Russia. Speaking with NBC news anchor Megyn Kelly, Putin said, "We're holding discussions with our American friends and partners, people who represent the government, by the way, and when they claim that some Russians interfered in the US elections, we tell them and we did so fairly recently at a very level, 'But you are constantly interfering in our political life'. Can you imagine, they don't even deny it, you know what they told us last time? They said, 'Yes, we do interfere but we are entitled to do it because we are spreading democracy and you're not, and you can't do it'. Does this seem like a civilized and modern approach to international affairs? At the level of the Russian government and the level of Russian President, there has never been any interference in the internal political process of the United States."
President Putin further explained, "Not long ago President Trump said something, he said that if Russia goal was to sow chaos it has succeeded, but that's not the result, that's the result of your political system; the internal struggle, the disorder, and division. Russia has nothing to do with it. Whatsoever we have nothing to do with it all. Get your own affairs in order first and the way the question's been framed as I mentioned –that you can interfere anywhere you want because you bring democracy but we can't –that's what causes conflicts. You have to show your partners respect and they will respect you."
President Putin's statement clearly indicates that it is the USA who is behind the effort to hack democracy and bring about regime changes throughout the world with the aim to install puppet regimes in targeted states. Cambridge Analytica and its mother company SCL are working for the strategic interests of the USA and its western partner NATO in order to achieve these regime change ambitions. Hence, this is the reason that Facebook after the publication of my previous article, suspended the CA/SCL group from its social media network by saying, "Protecting people's information is at the heart of everything we do, and we require the same from people who operate apps on Facebook. In 2015, we learned that a psychology professor at the University of Cambridge named Dr. Aleksandr Kogan lied to us and violated our Platform Policies by passing data from an app that was using Facebook Login to SCL/Cambridge Analytica, a firm that does political, government and military work around the globe. He also passed that data to Christopher Wylie of Eunoia Technologies, Inc."
Mar 25, 2018 | www.eurasiafuture.com
Manipulating democracy -- brainwashing the public for a large fee
Cambridge Analytica, the data harvesting firm that worked for the Trump campaign, is in the midst of a scandal that should make everyone who cares about a clean political process demand major investigations of anyone who has procured the services of the company, major prosecutions of those who have violated laws across multiple nations and a wholesale revitalisation of electoral laws to prevent politicians from ever again procuring the services of unethical companies like Cambridge Analytica.
Days ago, whistleblower Christopher Wylie went public about his time working for Cambridge Analytica and specifically about how the firm illegally obtained the public and private data, including the private messages of 50 million Facebook users. He also exposed how Cambridge Analytica used this data to run highly scientific social manipulation campaigns in order to effectively brainwash the public in various countries to support a certain political candidate or faction.
Cambridge Analytica's dubious methods were used to meddle in the US election after the Trump campaign paid Cambridge Analytica substantial sums of money for their services. The firm also meddled in the last two Kenyan Presidential elections, elections in Nigeria, elections in Czech Republic, elections in Argentina, elections in India, the Brexit campaign, UK Premier Theresa May's recently election and now stands accused of working with the disgraced former Pakistani Premier Nawaz Sharif in an attempt to reverse his judicial ban on holding public office, while helping his PML-N party win the forthcoming general election.
Beyond the scandalous use of personal data from Facebook users and the illegal access to people's private messages, Cambridge Analytica has now been exposed as a company that, by the hidden-camera admission of its CEO Alexander Nix, engages in nefarious, illegal and outrageous activities across the globe.
The UK Broadcaster Channel 4 just released a video of Cambridge Analytica's CEO and Managing DIrector Mark Turnbull in a conversation with an undercover reporter posing as a Sri Lankan businessman interested in meddling in domestic elections. During the conversation Nix boasted of Cambridge Analytica's history of using entrapment, bribery and intimidation against the political opponents of its wealthy clients. Furthermore, Nix boasted about his firm's ability to procure Ukrainian prostitutes as a means to entrap adversaries while also procuring the services of "Israeli spies" as part of dirty smear operations.
The activities that Nix boasted of using in the past and then offered to a prospective client are illegal in virtually every country in the world. But for Nix and his world of ultra-rich clients, acting as though one is above the law is the rule rather than the exception. Thus far, Cambridge Analaytica has been able to escape justice throughout the world both for its election meddling, data harvesting, data theft and attempts to slander politicians through calculated bribery and entrapment schemes.
One person who refused to be tempted by Cambridge Analytica was Julian Assange. Alexander Nix personally wrote to Julian Assange asking for direct access to information possessed by Wikileaks and Assange refused. This is a clear example of journalistic ethics and personal integrity on the part of Assange. Justice must be done
Cambridge Analytica stands accused of doing everything and more that the Russian state was accused of doing in respect of meddling in the 2016 US Presidential election. While meetings and conversations that Trump campaign officials, including Steve Bannon had with Cambridge Analyatica big wigs were not recorded, any information as to what was said during these exchanges should be thoroughly investigated by law enforcement and eventually made public for the sake of restoring transparency to politics.
Just as the Hillary Clinton campaign openly conspired to deprive Bernie Sanders of the Democratic Party's nomination, so too did Donald Trump's campaign pay Cambridge Analytica to conspire against the American voters using a calculated psychological manipulation campaign that was made possible through the use of unethically obtained and stolen data.
While Facebook claims it was itself misled and consequently victimised by Cambridge Analytica and has subsequently banned the firm from its platform, many, including Edward Snowden have alleged that Facebook knew full well what Cambridge Analytica was doing with the data retrieved from its Facebook apps. Already, the markets have reacted to the news and the verdict is not favourble in terms of the public perception of Facebook as an ethical company. Facebook's share prices are down over 7% on the S&P 500. This represents the biggest tumble in the price of Facebook share prices since 2014. Moreover, the plunge has knocked Facebook out of the coveted big five companies atop the S&P 500. Furthermore, Alex Stamos, Facebook's security director has announced that he will soon leave the company.
The Trump myth and Russia myth exposed
Donald Trump has frequently boasted of his expert campaigning skills as being the reason he won an election that few thought he could have ever won. While Trump was a far more charismatic and exciting platform speaker than his rival Hillary Clinton, it seems that for the Trump campaign, Trump ultimately needed to rely on the expensive and nefarious services of Cambridge Analytica in order to manipulate the minds of American voters and ultimately trick them into voting for him. It is impossible to say whether Trump would have still won his election without Cambridge Analaytica's services, but the fact they were used, should immediately raise the issue of Trump's suitability for office.
Ultimately, the Trump campaign did conspire to meddle in the election, only it was not with Russia or Russians with whom the campaign conspired, it was with the British firm Cambridge Analytica. Thus one sees that both the narrative about Trump the electoral "genius" and the narrative about Trump the Kremlin puppet are both false. The entire time, the issue of Trump campaign election meddling was one between a group of American millionaires and billionaires and a sleaze infested British firm.
Worse than Watergate
In 1972, US President Richard Nixon conspired to cover-up a beak-in at the offices of his political opponents at the Watergate Complex. The scandal ultimately led to Nixon's resignation in 1974. What the Trump campaign did with Cambridge Analytica is far more scandalous than the Watergate break-in and cover-up. Where Nixon's cronies broke into offices to steal information from the Democratic party, Trump's paid cyber-thugs at Cambridge Analytica broke in to the private data of 50 million people, the vast majority of whom were US citizens.
Richard Nixon, like Donald Trump, was ultimately driven by a love of power throughout his life. Just as Trump considered running for President for decades, so too did Nixon try to run in 1960 and lost to John Fitzgerald Kennedy, while he also failed to become governor of California in 1962 election. By 1968 he finally got into the White House at the height of the Vietnam War. When time came for his re-election, Nixon's team weren't going to take any chances and hence the Watergate break-in was orchestrated to dig up dirt on Nixon's opponent. As it turned out Nixon won the 1972 by a comfortable margin, meaning that the Watergate break-in was probably largely in vain.
Likewise, Trump may well have won in 2016 even without Cambridge Analytica, but in his quest for power, Trump has resorted to dealing with a company whose practices have done far more damage to the American people than the Watergate break-in.
New laws are needed
While existing laws will likely be sufficient to bring the fiends at Cambridge Analytica to justice, while also determining the role that Trump campaign officials, up to and including Trump played in the scandal, new laws must be enshrined across the globe in order to put the likes of Cambridge Analytica out of business for good.
The following proposals must be debated widely and ideally implemented at the soonest possible date:
-- A total ban on all forms of data mining/harvesting for political purposes.
-- A total ban on the use of algorithms and artificial intelligence in any political campaign or for any political purpose.
-- A mandatory seizing of the assets of any company involved in data mining/harvesting for political purposes, after which point such a company would be forcibly shut down permanently.
-- A mandatory seizing of the assets of any company involved in the use of artificial intelligence or algorithms in the course of a public political campaign.
-- A total ban on the use of internet based platforms, including social media by political candidates and their direct associates for anything that could reasonably be classified as a misinformation and/or manipulation scheme.
-- A total ban on politicians using third party data firms or advertising firms during elections. All such advertising and analysis must be devised by advisers employed directly by or volunteering for an individual candidate or his or her party political organisation.
-- A total ban on any individual working for a political campaign, who derives at least half of his or her income from employment, ownership and/or shares in a company whose primary purpose is to deliver news and analysis.
-- A total ban on anyone paid by a political candidate to promote his or her election from an ownership or major share holding role in any company whose primary purpose is to deliver news and analysis until 2 years after the said election.
If all of these laws were implemented along with thorough campaign finance reform initiatives, only then can anything remotely resembling fair elections take place.
The elites eat their own
While many of the media outlets who have helped to publish the revelations of whistleblower Christopher Wylie continue to defame Russia without any evidence about Russian linkage to the 2016 US election (or any other western vote for that matter), these outlets are nevertheless exposing the true meddling scandal surrounding the Trump campaign which has the effect of destroying the Russia narrative.
In this sense, a divided elite are turning against themselves. While the billionaire property tycoon Donald Trump can hardly be described as anything but a privileged figure who moved in elite public circles for most of his life, his personal style, rhetoric and attitude towards fellow elites has served to alienate Trump from many. Thus, there is a desire on the part of the mainstream media to expose a scandal surrounding Trump in a manner that would be unthinkable in respect of exposing a cause less popular among western elites, for example the brutal treatment of Palestine by the Zionist regime.
In this sense, Trump's own unwillingness or lack of desire to endear himself to fellow elites and instead present himself as a 'man of the people', might be his penultimate undoing. His rich former friends are now his rich present day enemies and many ordinary voters will be completely aghast at his involvement with Cambridge Analytica, just as many Republicans who voted for Nixon, became converts to the anti-Nixon movement once the misdeeds and dishonesty of Richard Nixon were made public. Many might well leave the 'Trump train' and get on board the 'political ethics express'.
This scandal ultimately has nothing to do with one's opinion on Trump or his policies, let alone any of the other politicians who have hired Cambridge Analytica. The issue is that a company engaged in the most nefarious, dangerous, sleazy and wicked behaviour in the world, is profiting from their destruction of political institutions that ought to be based on open policy debates rather than public manipulation, brainwashing and artificial intelligence.
The issue is also one of privacy. 50 million people have been exploited by an unethical company and what's more is that the money from the Trump campaign helped to empower this unethical company. This is therefore as unfair to non-voters as it is to voters. Cambridge Analytica must be shut down and all companies like it must restrict the scope of their operations or else face the same consequence.
Mar 25, 2018 | www.zerohedge.com
veritas semper -> Four chan Sun, 03/25/2018 - 14:05 Permalink
Look at this great interview with Adam Garrie. This is a must watch video.
This scandal is HUUUGE
He discusses Cambridge Analytica involvement in basically all elections, involvement of Facebook and its Sugar daddy, UK ,US gov. How they tried to co-opt Mr.Assange and he said FO.
How UK tries to cover it up . There is a whistleblower and soon more ,it seems
Mar 25, 2018 | www.moonofalabama.orgPeter AU 1 , Mar 25, 2018 1:23:38 PM | 4James 1Peter AU 1 , Mar 25, 2018 2:31:01 PM | 10
I ran onto something about that when researching SCL/Cambridge Analytica
The Mercer/Cambridge Analytica US wing of SCL put a lot of funding into the leave campaign which was undeclared. Like a political campaign, donations above a threshold have to be declared.
Threshold for declaring donations I think was around 3 to 7000 and CA put in over 300 000.james 6
I have been researching SCL the last few days now. It is starting to look as though, rather than being political mercenary's working for whoever pays, they seem to back nationalist leaning groups or individuals. They have a political or geo-political agenda but not sure what at the moment. Always anti Russia. Involved in operations in most of the ex soviet countries to create a hatred of ethnic Russians and I think will work with non nationalist types who are very anti Russia.
Mar 25, 2018 | www.zerohedge.com
by Tyler Durden Sun, 03/25/2018 - 13:00 371 SHARES
Julian Assange fired off a tweet Friday afternoon reminding people of the time Mark Zuckerberg called his users "Dumb fucks" because they trusted him with their private information.
Zuck: Yeah so if you ever need info about anyone at Harvard
Zuck: Just ask.
Zuck: I have over 4,000 emails, pictures, addresses, SNS
[Redacted Friend's Name]: What? How'd you manage that one?
Zuck: People just submitted it.
Zuck: I don't know why.
Zuck: They "trust me"
Zuck: Dumb fucks.
The exchange, originally published by Business Insider 's editor-in-chief Nicholas Carlson in 2010, was an early instant messenger conversation then 19-year-old Zuckerberg had with a college friend shortly after he launched "The Facebook" in his dorm room.
And this does appear to reflect Mark's own views of privacy, which seem to be that people shouldn't care about it as much as they do -- an attitude that very much reflects the attitude of his generation.
After all, here's what early Facebook engineering boss, Harvard alum, and Zuckerberg confidant Charlie Cheever said in David Kirkpatrick's brilliantly-reported upcoming book The Facebook Effect.
"I feel Mark doesn't believe in privacy that much, or at least believes in privacy as a stepping stone. Maybe he's right, maybe he's wrong."
Kirkpatrick had this to say about Facebook COO Sheryl Sandberg in his book:
"Mark really does believe very much in transparency and the vision of an open society and open world, and so he wants to push people that way . I think he also understands that the way to get there is to give people granular control and comfort . He hopes you'll get more open, and he's kind of happy to help you get there. So for him, it's more of a means to an end . For me, I'm not as sure."
Zuckerberg reportedly hacked into people's email using their TheFacebook passwords...
At one point early on on Facebook history, Zuckerberg - nervous about an upcoming report in the Harvard Crimson , used "TheFacebook" login data of Crimson staff to crack into their Harvard email accounts to see if the paper was going to include a claim that he had stolen an idea for a TheFacebook feature called "Visualize Your Buddy."
Tim and Elisabeth decided to drop John's claims from the story. But, this time, they decided to go ahead and publish a story on ConnectU's claims against Facebook.
Mark Zuckerberg was not content to wait until the morning to find out if the Crimson would include John's accusations in its story.
Instead, he decided to access the email accounts of Crimson editors and review their emails. How did he do this? Here's how Mark described his hack to a friend:
Mark used his site, TheFacebook.com, to look up members of the site who identified themselves as members of the Crimson . Then he examined a log of failed logins to see if any of the Crimson members had ever entered an incorrect password into TheFacebook.com. If the cases in which they had entered failed logins, Mark tried to use them to access the Crimson members' Harvard email accounts. He successfully accessed two of them.
In other words, Mark appears to have used private login data from TheFacebook to hack into the separate email accounts of some TheFacebook users.
In one account he accessed, Mark saw an email from Crimson writer Tim McGinn to Cameron, Tyler, and Divya. Another email Mark read was this one, from Crimson managing editor Elisabeth Theodore to Tim McGinn:
From: Elisabeth Susan Theodore
To: Timothy John McGinn
Subject: Re: Follow-up
OK, he did seem very sleazy. And I thought that some of his answers to the questions were not very direct or open. I also thought that his reaction to the website was very very weird . But, even if it's true so what? It's an [redacted] thing to do but it's not illegal, right? - Business Insider
Lo and behold, Mark's cavalier attitude towards Facebook user data is costing him billions at a time he's actively shedding shares as part of a $12 billion liquidation which started last September .
Mar 23, 2018 | www.strategic-culture.org
Now, at last, a real "election influence" scandal -- and, laughably, it's got nothing to do with Russia. The protagonists are none other than the "all-American" US social media giant Facebook and a British data consultancy firm with the academic-sounding name Cambridge Analytica.
Facebook's chief executive Mark Zuckerberg is being called upon by British and European parliamentarians to explain his company's role in a data-mining scandal in which up to 50 million users of the social media platform appear to have had their private information exploited for electioneering purposes.
Exploited, that is, without their consent or knowledge. Facebook is being investigated by US federal authorities for alleged breach of privacy and, possibly, electoral laws. Meanwhile, Cambridge Analytica looks less an academic outfit and more like a cheap marketing scam.
Zuckerberg has professed "shock" that his company may have unwittingly been involved in betraying the privacy of its users. Some two billion people worldwide are estimated to use the social media networking site to share personal data, photos, family news and so on, with "friends".
Now it transpires that at least one firm, London-based Cambridge Analytica, ran a profitable business by harvesting the publicly available data on Facebook for electioneering purposes for which it was contracted to do. The harvested information was then used to help target election campaigning.
Cambridge Analytica was reportedly contracted by the Trump campaign for the 2016 presidential election. It was also used during the Brexit referendum campaign in 2016 when Britons voted to leave the European Union.
This week the British news outlet Channel 4 broadcast a stunning investigation in which chief executives at Cambridge Analytica were filmed secretly boasting about how their firm helped win the US presidential election for Donald Trump.
More criminally, the data company boss, Alexander Nix, also revealed that they were prepared to gather information which could be used for blackmailing and bribing politicians, including with the use of online sex traps.
The repercussions from the scandal have been torrid. Following the Channel 4 broadcast, Cambridge Analytica has suspended its chief executive pending further investigation. British authorities have sought a warrant to search the company's computer servers.
Moreover, Zuckerberg's Facebook has seen $50 billion wiped of its stock value in a matter of days. What is at issue is the loss of confidence among its ordinary citizen-users about how their personal data is vulnerable to third party exploitation without their consent.
Cambridge Analytica is just the tip of an iceberg. The issue has raised concerns that other third parties, including criminal identity-theft gangs, are also mining Facebook as a mammoth marketing resource. A resource that is free to exploit because of the way that ordinary users willingly publish their personal profiles.
The open, seemingly innocent nature of Facebook connecting millions of people -- a "place where friends meet" as its advertising jingle goes -- could turn out to be an ethical nightmare over privacy abuse.
Other social media companies like Amazon, Google, WhatsApp and Twitter are reportedly apprehensive about the consequences of widespread loss of confidence among consumers in privacy security. One of the biggest economic growth areas over the past decade -- social media -- could turn out to be another digital bubble that bursts spectacularly due to the latest Facebook scandal.
But one other, perhaps more, significant fallout from the scandal is the realistic perspective it provides on the so-called "Russiagate" debacle.
For well over a year now, the US and European corporate news media have been peddling claims about how Russian state agents allegedly "interfered" in several national elections.
The Russian authorities have consistently rejected the alleged "influence campaigns" as nothing but a fabrication to slander Russia. Moscow has repeatedly asked for evidence to verify the relentless claims -- and none has been presented.
The US congress has carried out two probes into "Russiagate" without much to show for their laborious endeavors. A special counsel headed up by former FBI chief Robert Mueller has spent millions of taxpayer dollars to produce a flimsy indictment list of 19 Russian individuals who are said to have run influence campaigns out of a nondescript "troll farm" in St Petersburg.
It still remains unclear and unconvincing how, or if, the supposed Russian hackers were linked to the Russian state, and how they had any impact on the voting intentions of millions of Americans.
Alternatively, there is plausible reason to believe that the so-called Russian troll farm in St Petersburg, the Internet Research Agency, may have been nothing other than a dingy marketing vehicle, trying to use the internet like thousands of other firms around the world hustling for advertising business. Firms like Cambridge Analytica.
The whole Russiagate affair has been a storm in a teacup, and Mueller seems to be desperate to produce some, indeed any, result for his inquisitorial extravaganza.
The amazing thing to behold is how the alleged Russian "influence campaign" narrative has become an accepted truth, propagated and repeated by Western governments and media without question.
Pentagon defense strategy papers, European Union policy documents, NATO military planning, among others, have all cited alleged "Russian interference" in American and European elections as "evidence" of Moscow's "malign" geopolitical agenda.
The purported Russiagate allegations have led to a grave deepening of Cold War tensions between Western states and Russia to the point where an all-out war is at risk of breaking out.
Last week, the Trump administration slapped more sanctions on Russian individuals and state security services for "election meddling".
No proof or plausible explanation has ever been provided to substantiate the allegations of a Russian state "influence campaign'. The concept largely revolves around innuendo and a deplorable prejudice against Russia based on irrational Cold War-style Russophobia.
However, one possible beneficial outcome from the latest revelations of an actual worldwide Facebook election-influence campaign, driven by an ever-so British data consultancy, is that the scandal puts the claims against Russia into stark, corrective perspective.
A perspective which shows that the heap of official Western claims against Russia of "influencing elections" is in actual fact negligible if not wholly ridiculous.
It's a mountain versus a hill of beans. A tornado versus a storm in a teacup. Time to get real on how Western citizens are being really manipulated by their own consumer-capitalist cultures.Tags: Facebook Russiagate
Mar 23, 2018 | www.zerohedge.com
All 1,472 employees of Facebook, Inc. reportedly burst out in uncontrollable laughter Wednesday following Albuquerque resident Jason Herrick's attempts to protect his personal information from exploitation on the social-networking site.
" Look, he's clicking 'Friends Only' for his e-mail address. Like that's going to make a difference! " howled infrastructure manager Evan Hollingsworth, tears streaming down his face, to several of his doubled-over coworkers.
" Oh, sure, by all means, Jason, 'delete' that photo. Man, this is so rich ."
According to internal sources, the entire staff of Facebook was left gasping for air minutes later when the "hilarious" Herrick believed he had actually blocked third-party ads.
Source: The Onion
Mar 22, 2018 | www.zerohedge.com
by George Washington Wed, 03/21/2018 - 23:09 206 SHARES
By Yasha Levine, Surveillance Valley .
Levine's investigative reporting on the connection between the Silicon Valley tech giants and the military-intelligence community has been praised by high-level NSA whistleblower Thomas Drake, and many others. [See my interviews of Drake here:
- NSA Started Spying On Journalists in 2002 In Order to Make Sure They Didn't Report On Mass Surveillance
"Google has partnered with the United States Department of Defense to help the agency develop artificial intelligence for analyzing drone footage, a move that set off a firestorm among employees of the technology giant when they learned of Google's involvement." -- Gizmodo / March 6, 2018
Gizmodo's report on Google's work for the Pentagon has been making headlines all day. It's also thrown the normally placid halls of Google's Mountain View HQ into chaos. Seems that Googlers can't believe that their awesome company would get involved in something as heinous as helping the Pentagon increase its drone targeting capability.
But the fact that Google helps the military build more efficient systems of surveillance and death shouldn't be surprising, especially not to Google employees. The truth is that Google has spent the last 15 years selling souped-up versions of its information technology to military and intelligence agencies, local police departments, and military contractors of all size and specialization -- including outfits that sell predictive policing tech deployed in cities across America today.
As I outline in my book Surveillance Valley , it started in 2003 with customized Google search solutions for data hosted by the CIA and NSA. The company's military contracting work then began to expand in a major way after 2004, when Google cofounder Sergey Brin pushed for buying Keyhole, a mapping startup backed by the CIA and the NGA, a sister agency to the NSA that handles spy satellite intelligence.
Spooks loved Keyhole because of the "video game-like" simplicity of its virtual maps. They also appreciated the ability to layer visual information over other intelligence. The sky was the limit. Troop movements, weapons caches, real-time weather and ocean conditions, intercepted emails and phone call intel, cell phone locations -- whatever intel you had with a physical location could be thrown onto a map and visualized. Keyhole gave an intelligence analyst, a commander in the field, or an air force pilot up in the air the kind of capability that we now take for granted: using digital mapping services on our computers and mobile phones to look up restaurants, cafes, museums, traffic conditions, and subway routes. "We could do these mashups and expose existing legacy data sources in a matter of hours, rather than weeks, months, or years," an NGA official gushed about Keyhole -- the company that we now know as Google Earth.
Military commanders weren't the only ones who liked Keyhole's ability to mash up data. So did Google cofounder Sergey Brin.
The purchase of Keyhole was a major milestone for Google, marking the moment the company stopped being a purely consumer-facing Internet company and began integrating with the US government. While Google's public relations team did its best to keep the company wrapped in a false aura of geeky altruism, company executives pursued an aggressive strategy to become the Lockheed Martin of the Internet Age. "We're functionally more than tripling the team each year," a Google exec who ran Google Federal, the company's military sales division, said in 2008.
It was true. With insiders plying their trade, Google's expansion into the world of military and intelligence contracting took off.
What kind of work?
Here are just a few data points from Surveillance Valley :
- "In 2007, it partnered with Lockheed Martin to design a visual intelligence system for the NGA that displayed US military bases in Iraq and marked out Sunni and Shiite neighborhoods in Baghdad -- important information for a region that had experienced a bloody sectarian insurgency and ethnic cleansing campaign between the two groups."
- "In 2008, Google won a contract to run the servers and search technology that powered the CIA's Intellipedia, an intelligence database modeled after Wikipedia that was collaboratively edited by the NSA, CIA, FBI, and other federal agencies."
- "In 2010, as a sign of just how deeply Google had integrated with US intelligence agencies, it won a no-bid exclusive $27 million contract to provide the NGA with "geospatial visualization services," effectively making the Internet giant the "eyes" of America's defense and intelligence apparatus."
- "In 2008, Google entered into a three-way partnership with the NGA and a quasi-government company called GeoEye to launch a spy satellite called GeoEye-1. The new satellite, which was funded in large part by the NGA, delivered extremely high-resolution images for the exclusive use of NGA and Google."
- A few years ago it started working with PredPol, a California-based predictive policing startup. "PredPol did more than simply license Google's technology to render the mapping sys- tem embedded in its product but also worked with Google to develop customized functionality, including 'building additional bells and whistles and even additional tools for law enforcement.'"
More from the book:
"Google has been tightlipped about the details and scope of its contracting business. It does not list this revenue in a separate column in quarterly earnings reports to investors, nor does it provide the sum to reporters. But an analysis of the federal contracting database maintained by the US government, combined with information gleaned from Freedom of Information Act requests and published periodic reports on the company's military work, reveals that Google has been doing brisk business selling Google Search, Google Earth, and Google Enterprise (now known as G Suite) products to just about every major military and intelligence agency: navy, army, air force, Coast Guard, DARPA, NSA, FBI, DEA, CIA, NGA, and the State Department. Sometimes Google sells directly to the government, but it also works with established contractors like Lockheed Martin, Raytheon, Northrop Grumman, and SAIC (Science Applications International Corporation), a California-based intelligence mega-contractor that has so many former NSA employees working for it that it is known in the business as 'NSA West.'"
-- Yasha Levine
Want to know more?
Read "Surveillance Valley: The Secret Military History of the Internet"
Mar 22, 2018 | turcopolier.typepad.com
Jack 21 March 2018 at 05:45 PMTTG should love this article. Only difference is that in the writer's view the Trump campaign was far more effective than the Russian trolls.
https://www.zerohedge.com/news/2018-03-21/it-wasnt-russia-it-was-obama-based-social-media-mining-beat-hillaryThe reason Hillary Clinton did not win despite the media and social media companies doing everything they could to rig the election in her favor is because Facebook double dipped and allowed Cambridge Analytica to use their surveying tools to collect user data on tens of millions of users. This data was then used to target tens of millions of users with political advertising using Facebook's ad platform based on psycholgoical profiles from data they bought or acquired from Facebook.
Facebook is basically responsible for feeding the analytics system that enabled Cambridge Analytica and the Trump campaign to be so targeted and effective with a minimal budget.....
That's what happened, that's how Trump won. It wasn't the Russians, it was our own social media companies who sold our data to the Trump campaign which they then likely used to convince liberals not to vote in swing states.
It's both horrifying, and cleverly brilliant at the same time.
The funny thing is, Obama did something similar in 2012 and liberals celebrated. Not so funny when the other team takes your trick and executes it more effectively now is it?
Mar 21, 2018 | www.nakedcapitalism.com
Readers report that Facebook keeps asking them to reactivate their accounts. Wolf confirms that and adds critically important point in his post: you can never escape Facebook. Facebook continues to sell your data even if you have "deleted" your account.
I doubt enough people are aware of that issue. Having delete mean delete, as in Facebook wipes your data entirely, should become a key demand in the row over Facebook's information "sharing" policies.
By Wolf Richter, a San Francisco based executive, entrepreneur, start up specialist, and author, with extensive international work experience. Originally published at Wolf Street
Things at Facebook came to a head, following the disclosure that personal data from 50 million of its users had been given to a sordid outfit in the UK, Cambridge Analytica, whose business model is to manipulate elections by hook or crook around the world, and which is now getting vivisected by UK and US authorities.
The infamous "person familiar with the matter" told Bloomberg that the Federal Trade Commission has opened an investigation into whether Facebook violated a consent decree dating back to 2011, when Facebook settled similar allegations -- giving user data to third parties without user's knowledge or consent. Bloomberg:
Under the 2011 settlement, Facebook agreed to get user consent for certain changes to privacy settings as part of a settlement of federal charges that it deceived consumers and forced them to share more personal information than they intended. That complaint arose after the company changed some user settings without notifying its customers, according to an FTC statement at the time.
If Facebook is found to be in violation of the consent decree, the FTC can extract a fine of $40,000 per day, per violation. Given the 50 million victims spread over so many days, this could be some real money, so to speak.
Facebook said in a statement, cited by Bloomberg, that it rejected "any suggestion of violation of the consent decree." It also said with tone-deaf Facebook hilarity, "Privacy and data protections are fundamental to every decision we make."
That Facebook is collecting every little bit of personal data it can from its users and their contacts and how they react to certain things, their preferences, their choices, physical appearance -- photos, I mean come on -- clues about their personalities, and the like has been known from day one. That's part of its business model. It's not a secret.
That third parties have access to this data has also been known at least since 2011. Advertisers also have had access to certain types of data to target their ads.
And yet, Facebook's user base has grown. More than ever, people put their entire lives on Facebook -- maybe not the kids, as they've become enamored with other platforms, but their moms. Babies are on Facebook long before they have any idea what Facebook is. There's a generation growing up that has been on Facebook since birth.
When the Equifax hack occurred last year -- which Equifax disclosed graciously and partially months after the fact on September 7 -- the personal data of what has now grown to 145.5 million consumers was stolen. This included names, birth dates, Social Security numbers, addresses, and "in some instances," driver's license numbers, and other data.
This shocked the world that pays attention to this because the data breach could unleash a tsunami of identity theft. But most consumers who saw it in the media simply shrugged and went on. They could have put a credit freeze on their accounts with the credit bureaus, thus making it nearly impossible for someone else to get a loan or credit card in their name (identity theft). But few consumers put a credit freeze on their accounts. Many consumers still don't know what Equifax is or what it does, and when you discuss the situation, they think you're spouting off conspiracy theories.
But there is a difference between credit bureaus such as Equifax and social media platforms such as Facebook.
With credit bureaus, consumers have no choice. They're forced to be part of the credit-bureau data bases. Their data is collected, and there is nothing they can do about it. Consumer protection should be the number one priority. When companies get hacked and this consumer data gets stolen, there should be harsh punishments against these companies if they're found to have been negligent. Arthur Andersen comes to mind.
But with Facebook and other social media platforms, there is no coercion. Consumers submit their most private data voluntarily -- nay, eagerly. They jump through hoops to share this stuff with the rest of the world. So maybe they only want to share it with x and not with y, but heck, they're uploading it to the Internet. What do they expect?
And there is another difference between Equifax and Facebook: Equifax was hacked and the data was stolen . Facebook gave away the data as part of its business model.
But they do have a major trait in common: An aggrieved consumer cannot delete the data these outfits have collected on that consumer. While Facebook allows you to "delete" items and "delete" your account, the data stays behind on the server. It's available for all purposes; it's just not publicly viewable.
So now there's a hue and cry in the media about Facebook, put together by reporters who are still active on Facebook and who have no intention of quitting Facebook. There has been no panicked rush to "delete" accounts. There has been no massive movement to quit Facebook forever. Facebook does what it does because it does it, and because it's so powerful that it can do it. A whole ecosystem around it depends on the consumer data it collects.
Yes, there will be the usual ceremonies that Equifax also went through: CEO Zuckerberg may get to address the Judiciary Committee in Congress. The questions thrown at him for public consumption will be pointed. But behind the scenes, away from the cameras, there will be the usual backslapping between lawmakers and corporations. Publicly, there will be some wrist-slapping and some lawsuits, and all this will be settled and squared away in due time. Life will go on. Facebook will continue to collect the data because consumers continue to surrender their data to Facebook voluntarily. And third parties will continue to have access to this data.
With Facebook, consumers are in total control: They can just refuse to open an account. And if they have already opened an account, they can delete the app on their mobile devices, clean the cache on their computers, and swear to not ever again sign back in. If enough consumers do that, the whole construct would come down.
The only act that would change anything is if consumers massively and forever abandon Facebook and platforms like it, and never-ever sign on again. That would bulldoze the whole problem away. But that's not going to happen because consumers don't want it to happen.
So as far as I'm concerned, people who are still active on Facebook cannot be helped. They should just enjoy the benefits of having their lives exposed to the world and serving as a worthy tool and resource for corporate interests, political shenanigans, election manipulators, jealous exes, and other facts of life.
Meanwhile, these dang trillions are flying by so fast, they're hard to see. Read US Gross National Debt Spikes $1.2 Trillion in 6 Months, Hits $21 Trillion
Mar 21, 2018 | www.zerohedge.com
As it turns out, Ulbricht's lawyers were on to something.
In a blockbuster report published Tuesday in the Intercept, reporter Sam Biddle cited several documents included in the massive cache of stolen NSA documents that showed that the agency has been tracking bitcoin users since 2013, and has potentially been funneling some of this information to other federal agencies. Or, as Biddle puts it, maybe the conspiracy theorists were right.
It turns out the conspiracy theorists were onto something. Classified documents provided by whistleblower Edward Snowden show that the National Security Agency indeed worked urgently to target Bitcoin users around the world - and wielded at least one mysterious source of information to "help track down senders and receivers of Bitcoins," according to a top-secret passage in an internal NSA report dating to March 2013. The data source appears to have leveraged the NSA's ability to harvest and analyze raw, global internet traffic while also exploiting an unnamed software program that purported to offer anonymity to users, according to other documents.
Using its ability to siphon data directly from the fiber-optic cables, the NSA managed to develop a system for tracing transactions that went well beyond simple blockchain analysis. The agency relied on a program called MONKEYROCKET , a sham Internet-anonymizing service that, according to the documents, was primarily deployed in Asia, Africa and South America with the intention of thwarting terrorists.
The documents indicate that "tracking down" Bitcoin users went well beyond closely examining Bitcoin's public transaction ledger, known as the Blockchain, where users are typically referred to through anonymous identifiers; the tracking may also have involved gathering intimate details of these users' computers.
The NSA collected some Bitcoin users' password information, internet activity, and a type of unique device identification number known as a MAC address, a March 29, 2013 NSA memo suggested. In the same document, analysts also discussed tracking internet users' internet addresses, network ports, and timestamps to identify "BITCOIN Targets."
The NSA's budding Bitcoin spy operation looks to have been enabled by its unparalleled ability to siphon traffic from the physical cable connections that form the internet and ferry its traffic around the planet. As of 2013, the NSA's Bitcoin tracking was achieved through program code-named OAKSTAR, a collection of covert corporate partnerships enabling the agency to monitor communications, including by harvesting internet data as it traveled along fiber optic cables that undergird the internet.
Specifically, the NSA targeted Bitcoin through MONKEYROCKET, a sub-program of OAKSTAR, which tapped network equipment to gather data from the Middle East, Europe, South America, and Asia, according to classified descriptions. As of spring 2013, MONKEYROCKET was "the sole source of SIGDEV for the BITCOIN Targets," the March 29, 2013 NSA report stated, using the term for signals intelligence development, "SIGDEV," to indicate the agency had no other way to surveil Bitcoin users. The data obtained through MONKEYROCKET is described in the documents as "full take" surveillance, meaning the entirety of data passing through a network was examined and at least some entire data sessions were stored for later analysis.
Naturally, once the NSA got involved, the notion of anonymity - whether with bitcoin, or even some of the privacy-oriented coins like Zcash - was completely crushed.
Emin Gun Sirer, associate professor and co-director of the Initiative for Cryptocurrencies and Contracts at Cornell University, told The Intercept that financial privacy "is something that matters incredibly" to the Bitcoin community, and expects that "people who are privacy conscious will switch to privacy-oriented coins" after learning of the NSA's work here. Despite Bitcoin's reputation for privacy, Sirer added, "when the adversary model involves the NSA, the pseudonymity disappears. You should really lower your expectations of privacy on this network."
Green, who co-founded and currently advises a privacy-focused Bitcoin competitor named Zcash, echoed those sentiments, saying that the NSA's techniques make privacy features in any digital currencies like Ethereum or Ripple "totally worthless" for those targeted.
While bitcoin appeared to be the NSA's top target, it wasn't the agency's only priority. The NSA also used its unparalleled surveillance powers to take down Liberty Reserve - a kind of proto-ICO that was involved in money laundering. Though the company was based in Costa Rica, the Department of Justice partnered with the IRS and Department of Homeland Security to arrest its founder and hand him a 20-year prison sentence.
The March 15, 2013 NSA report detailed progress on MONKEYROCKET's Bitcoin surveillance and noted that American spies were also working to crack Liberty Reserve, a far seedier predecessor. Unlike Bitcoin, for which facilitating drug deals and money laundering was incidental to bigger goals, Liberty Reserve was more or less designed with criminality in mind. Despite being headquartered in Costa Rica, the site was charged with running a $6 billion "laundering scheme" and triple-teamed by the U.S. Department of Justice, Homeland Security, and the IRS, resulting in a 20-year conviction for its Ukrainian founder. As of March 2013 -- just two months before the Liberty Reserve takedown and indictment -- the NSA considered the currency exchange its No. 2 target, second only to Bitcoin. The indictment and prosecution of Liberty Reserve and its staff made no mention of help from the NSA.
Of course, several of the agency's defenders argued that the notion that the NSA would use these programs to spy on innocuous bitcoin users is "pernicious", according to one expert source.
The hypothesis that the NSA would "launch an entire operation overseas under false pretenses" just to track targets is "pernicious," said Matthew Green, assistant professor at the Johns Hopkins University Information Security Institute. Such a practice could spread distrust of privacy software in general, particularly in areas like Iran where such tools are desperately needed by dissidents. This "feeds a narrative that the U.S. is untrustworthy," said Green. "That worries me."
But forget bitcoin: the notion that the NSA has been illegally feeding intelligence to other federal intelligence and law enforcement agencies has been a watershed issue for civil libertarians, with implications far beyond cryptocurrency money laundering . The process, known as "parallel construction", would, if definitive proof could ever be obtained by a defense attorney, render an entire case as inadmissible.
Civil libertarians and security researchers have long been concerned that otherwise inadmissible intelligence from the agency is used to build cases against Americans though a process known as "parallel construction": building a criminal case using admissible evidence obtained by first consulting other evidence, which is kept secret, out of courtrooms and the public eye. An earlier investigation by The Intercept, drawing on court records and documents from Snowden, found evidence the NSA's most controversial forms of surveillance, which involve warrantless bulk monitoring of emails and fiber optic cables, may have been used in court via parallel construction.
The timing of the Intercept's report is also interesting. We reported last year that a Russian national named Alexander Vinnick, the alleged mastermind of a $4 billion bitcoin-based money laundering operation, had been arrested following an indictment that levied 21 counts of money laundering and other crimes that could land him in a US prison for up to 55 years.
And given the justice system's treatment of other cryptocurrency-related criminals, the notion that Vinnick might spend multiple decades in prison is not beyond the realm of possibility. Of course, if the case against him is built on illegally obtained evidence, one would think his defense team would want to know.
Heavily redacted versions of the Snowden documents are available on the Intercept's website.
wee-weed up -> J S Bach Tue, 03/20/2018 - 19:05 PermalinkBaron von Bud -> Coinista Tue, 03/20/2018 - 20:25 Permalink
"NSA Has Been Tracking Bitcoin Users Since 2013, New Snowden Documents Reveal"
Yep, I knew it! I've been trying to tell the crypto-enthusiasts that the gov't is on their trail, but they are in utter denial. They think their tech is superior. Sad mistake.
So again I ask... can you say... "Poof it's gone!"Baron von Bud -> lookslikecraptome Tue, 03/20/2018 - 22:41 Permalink
I don't believe the NSA knows the content of crypto transactions due to packet data encryption. They do likely know the identities of frequent Bitcoin users via traffic tracking. Infrequent users very unlikely. That's what the IT programmer in me says. But we're talking Ed Snowden who knows a lot about networks and encryption. This suggests that NSA has a man-in-the-middle attack.NiggaPleeze -> Coinista Tue, 03/20/2018 - 21:50 Permalink
Nobody cracked TOR and the code is open source. Identities were determined via the host site communications not in TOR transit. The govt does have https keys - isp told me. But software encrypted data in packets - no they don't. TOR and OpenPGP are very good to have with govts and social media getting more abusive collecting/selling any data that will bring a buck.
Well, NSA developed TOR. Then they developed bitcoin to work on TOR. How much you want to bet they have infiltrated every single exchange?
They are watching you. Five eyes.
Mar 20, 2018 | telegraph.co.uk
T he data analysis firm at the centre of a privacy scandal came under more pressure on Monday when Channel 4 broadcast footage of Cambridge Analytica's chief executive discussing using bribes, former spies and Ukrainian women to entrap politicians.
It emerged as the Information Commissioner said she was seeking a warrant to search its computers and servers as part of investigation into the use of personal data of Facebook users.
The controversy wiped billions of dollars off Facebook's value as its founder, Mark Zuckerberg, faced questions on both sides of the Atlantic about how a private company was able to gather personal information of 50 million users.
Trouble for Cambridge Analytica deepened...
Mar 20, 2018 | www.moonofalabama.org
karlof1 , Mar 19, 2018 7:34:36 PM | 56Well, there seems to be a new wrinkle in the Skripal hoax, Adam Garrie muses :karlof1 , Mar 19, 2018 7:51:59 PM | 58
"... whether the still evidence free accusations that Russia was behind the poisoning of a former double-agent on UK soil, are not related to the breaking of the Cambridge Analytica scandal. The revelations from Christopher Wylie were published by the New York Times and The Observer (an off-shoot of The Guardian) on the 17th of March, just three days after the British Prime Minister announced that she has found Russia guilty of murder, in spite of failing to produce any real evidence. Logic would dictate that it took far more than three days to produce and edit the piece about Wylie's revelations."
Assange, Snowden and others join Garrie in saying the real investigation ought to be of Cambridge. Assange also notes on his Twitter the massive mining the Obama campaign did via Facebook in 2012--an action it appears Cambridge copied for Trump's campaign. Given the info on Assange's Twitter, Cambridge and Facebook are both up to their necks in the illegal mining of personal data and worse.Add to my @56--
Snowden on "Social Media" companies :
"Businesses that make money by collecting and selling detailed records of private lives were once plainly described as "surveillance companies." Their rebranding as "social media" is the most successful deception since the Department of War became the Department of Defense."
And an observation about the reports of Russian election ballot box stuffing -- none of the reports I've seen say for which candidate the stuffing was for. Clearly, Putin didn't need any help, so I suspect US/UK embassy staffers going around and trying to help their liberal candidates get at least 1% of the vote. Russia's election authority did announce there were irregularities including the stuffing, a fact omitted from the items I read, which all implied it was Putin's team that did the deed.
Mar 18, 2018 | www.zerohedge.com
NSA whistleblower and former CIA employee Edward Snowden slammed Facebook in a Saturday tweet following the suspension of Strategic Communication Laboratories (SCL) and its political data analytics firm, Cambridge Analytica, over what Facebook says was imporoper use of collected data.
In a nutshell, in 2015 Cambridge Analytica bought data from a University of Cambridge psychology professor, Dr. Aleksandr Kogan, who had developed an app called "thisisyourdigitallife" that vacuumed up loads of information on users and their contacts. After making Kogan and Cambridge Analytica promise to delete the data the app had gathered, Facebook received reports (from sources they would not identify) which claimed that not all the data had been deleted - which led the social media giant to delete Cambridge Analytica and parent company SCL's accounts.
"By passing information on to a third party, including SCL/Cambridge Analytica and Christopher Wylie of Eunoia Technologies, he violated our platform policies. When we learned of this violation in 2015, we removed his app from Facebook and demanded certifications from Kogan and all parties he had given data to that the information had been destroyed. Cambridge Analytica, Kogan and Wylie all certified to us that they destroyed the data." - Facebook
Of note, Cambridge Analytica worked for Ted Cruz and Ben Carson during the 2016 election before contracting with the Trump campaign. Cruz stopped using CA after their data modeling failed to identify likely supporters.
Cambridge Analytica has vehemently denied any wrongdoing in a statement.
In response to the ban, Edward Snowden fired off two tweets on Saturday criticizing Facebook, and claimed social media companies were simply "surveillance companies" who engaged in a "successful deception" by rebranding themselves.
Snowden isn't the first big name to call out Silicon Valley companies over their data collection and monitoring practices, or their notorious intersection with the U.S. Government.
In his 2014 book: When Google Met WikiLeaks , Julian Assange describes Google's close relationship with the NSA and the Pentagon.
Around the same time, Google was becoming involved in a program known as the "Enduring Security Framework" (ESF), which entailed the sharing of information between Silicon Valley tech companies and Pentagon-affiliated agencies "at network speed." Emails obtained in 2014 under Freedom of Information requests show Schmidt and his fellow Googler Sergey Brin corresponding on first-name terms with NSA chief General Keith Alexander about ESF Reportage on the emails focused on the familiarity in the correspondence: "General Keith . . . so great to see you . . . !" Schmidt wrote. But most reports overlooked a crucial detail. " Your insights as a key member of the Defense Industrial Base," Alexander wrote to Brin, "are valuable to ensure ESF's efforts have measurable impact." - Julian Assange
Kim Dotcom has also opined on social media's close ties to the government, tweeting in February "Unfortunately all big US Internet companies are in bed with the deep state. Google, Facebook, YouTube, Twitter, etc. are all providing backdoors to your data."
In 2013, the Washington Post and The Guardian revealed that the NSA has backdoor access to all major Silicon Valley social media firms, including Microsoft, Yahoo, Google, Facebook, PalTalk, AOL, Skype, YouTube, and Apple - all through the notorious PRISM program which began in 2007 under the Protect America Act. PRISM's existence was leaked by Edward Snowden before he entered into ongoing asylum in Moscow. Microsoft was the first company to join the PRISM program.
The NSA has the ability to pull any sort of data it likes from these companies, but it claims that it does not try to collect it all. The PRISM program goes above and beyond the existing laws that state companies must comply with government requests for data, as it gives the NSA direct access to each company's servers -- essentially letting the NSA do as it pleases. - The Verge
After PRISM's existence was leaked by Snowden, the Director of National Intelligence issued a statment which stated that the only people targed by the programs are "outside the United States," and that the program "does not allow" the targeting of citizens within US borders.
In 2006, Wired magazine published evidence from a retired AT&T communications technician, Mark Klein, that revealed a secret room used to "split" internet data at a San Francisco office as part of the NSA's bulk data collection techniques used on millions of Americans.
During the course of that work, he learned from a co-worker that similar cabins were being installed in other cities, including Seattle, San Jose, Los Angeles and San Diego, he said.
The split circuits included traffic from peering links connecting to other internet backbone providers, meaning that AT&T was also diverting traffic routed from its network to or from other domestic and international providers , Klein said. - Wired
"They are collecting everything on everybody," Klein said.
HRH of Aquitaine 2.0 Sun, 03/18/2018 - 17:22 PermalinkMusicIsYou Sun, 03/18/2018 - 17:44 Permalink
He is right. If you didn't hear about the speech given by Tommy Robinson on Speaker's Corner in Hyde Park, watch it here: https://youtu.be/LWk-amymTXAabgary1 Sun, 03/18/2018 - 17:49 Permalink
Well look on the bright side, only idiots are placing their most vital thoughts, and innovations on Facebook or any social media for that matter. So basically big brother has acres of databases full of idiotic things. Believe me, if it can take humans a step into the future, its not on the web. So basically big brother is mining through vast amounts of useless data. Here's your sign!Usura Sun, 03/18/2018 - 17:57 Permalink
We are giving away our privacy and thus our freedom for convenience sake.
We need to stop that.
Get off the mobile devises, the social media sites and use cash.
Anything that leaves a digital footprint can be tracked.
Citizen Four, the Ed Snowden documentary, explains how invasive the surveillance on innocent people by the national security agencies really is.
The data for that surveillance is supplied by the tech cos, telecoms and banks.GreatUncle Sun, 03/18/2018 - 18:12 Permalink
I have often wondered if the VC money for these tech companies came from MOSAD.WTFUD -> navy62802 Sun, 03/18/2018 - 17:27 Permalink
only people targed by the programs are "outside the United States,"
So every sovereign nation around the world allow their citizens rights to be violated.
Just a little point there when you consider who or what is running your country.navy62802 -> WTFUD Sun, 03/18/2018 - 17:41 Permalink
Started up with 3 geeks and morphed into a Deep State Wet Dream.thatthingcanfly -> navy62802 Sun, 03/18/2018 - 17:51 Permalink
I think it was "deep state" from the very beginning ... not an original idea from Zuckerberg and his estranged friends.Oldwood -> thatthingcanfly Sun, 03/18/2018 - 17:57 Permalink
Not a doubt in your mind, huh?
If you actually worked for the Navy for any period of time, you should know that this government cannot tie its own shoes. No way are any of your whacked-out conspiracy theories even remotely possible.
Yes, Zuckerberg and the Winkelvoss twins came up with Facebook for social reasons. The government spy agencies, who know a good opportunity to use someone else's invention to serve their own ends when they see one, co-opted it. It really doesn't have to be any more complicated than that.navy62802 -> thatthingcanfly Sun, 03/18/2018 - 18:22 Permalink
The fact of WHO did this is irrelevant. What matters is that we should have understood what this meant from the begining. Many did, many more did not. We complain of being treated like sheep, bleeting all the way to our pens.
What we must accept is that there are many who could care less about liberty, happy to live in a cell, as long as th econveniences continue to poor in.
I wonder how livestock feel about living in a pen while receiving free food and healthcare? I wonder if given the choice of freedom or feed lot, which way they would go. I think we see the answer in the inner cities of our nation (and others).JPMorgan Sun, 03/18/2018 - 17:22 Permalink
I know. If only I had worked for the navy for a period of time ...VWAndy Sun, 03/18/2018 - 17:22 Permalink
Totally agree, but that could be said for any US based company.
Google, Microsoft, Yahoo, Facebook, Twitter, Snap... take your pick, bets are you using one of them.HRH of Aquitaine 2.0 Sun, 03/18/2018 - 17:22 Permalink
Ya Think! FFS.WTFUD Sun, 03/18/2018 - 17:25 Permalink
He is right. If you didn't hear about the speech given by Tommy Robinson on Speaker's Corner in Hyde Park, watch it here: https://youtu.be/LWk-amymTXANumbersUsa Sun, 03/18/2018 - 17:26 Permalink
All your information are ours!me or you Sun, 03/18/2018 - 17:27 Permalink
Heads up! in case you're interested:
The Heroic Story of Andrew Jackson That "They (jew)" Don't Want You to Know
http://tomatobubble.com/andrew_the_great.htmlRKae Sun, 03/18/2018 - 17:30 Permalink
I think all of us are very aware of that.
There is not new on his comments.CoCosAB Sun, 03/18/2018 - 17:32 Permalink
It's all well and good to be disgusted by surveillance, but it's ever-encroaching, and soon you won't be able to function without complying. Privacy will be impossible, except for the elite for whom privacy will be another luxury that they get which you don't. Sort of like a gun.ExPat2018 Sun, 03/18/2018 - 17:33 Permalink
SLAVES don't give a shit about that...Labworks Sun, 03/18/2018 - 17:39 Permalink
One thing about FB .Google etc et
Its all run by KIKESI am Groot Sun, 03/18/2018 - 17:41 Permalink
Social media is cooperating with the government.
Mass spy program.
Get out if you have any brains left2rigged2fail Sun, 03/18/2018 - 17:44 Permalink
I initially thought Snowden was a traitor. But over careful examination, he exposed lying by Brennan and Clapper, unwarranted surveillance of Americans and lot of complete lies told by the government to We The People.MusicIsYou Sun, 03/18/2018 - 17:44 Permalink
Dtube of bitchute
Brazen Heist Sun, 03/18/2018 - 17:47 Permalink
Well look on the bright side, only idiots are placing their most vital thoughts, and innovations on Facebook or any social media for that matter. So basically big brother has acres of databases full of idiotic things. Believe me, if it can take humans a step into the future, its not on the web. So basically big brother is mining through vast amounts of useless data. Here's your sign!swamp Sun, 03/18/2018 - 17:47 Permalink
Some of us are impervious to their lies and deception.
They're going to have to try much harder. Not everybody is a fucking fool as they had hoped.
In fact, once you cross a certain threshold, it becomes fun to slice through their shitty propaganda, like a hot knife through lard.
ExPat2018 -> swamp Sun, 03/18/2018 - 17:49 Permalink
It is also a brain washing machine.ExPat2018 Sun, 03/18/2018 - 17:48 Permalink
In the case of Americans. what brains??pparalegal Sun, 03/18/2018 - 17:48 Permalink
The people can turn this around on (((((((((them)))))))))) but its hard to get 200-300 million to work together.
You could flood their services with threats and crap and make DHS, FBI, go nuts.abgary1 Sun, 03/18/2018 - 17:49 Permalink
I make them work for their paychecks. I love sending encrypted kitty videos from my Google account.ExPat2018 -> abgary1 Sun, 03/18/2018 - 18:17 Permalink
We are giving away our privacy and thus our freedom for convenience sake.
We need to stop that.
Get off the mobile devises, the social media sites and use cash.
Anything that leaves a digital footprint can be tracked.
Citizen Four, the Ed Snowden documentary, explains how invasive the surveillance on innocent people by the national security agencies really is.
The data for that surveillance is supplied by the tech cos, telecoms and banks.ExPat2018 -> abgary1 Sun, 03/18/2018 - 18:21 Permalink
you forgot to end the sentence. IN THE USAExPat2018 Sun, 03/18/2018 - 17:54 Permalink
You live in the USA, kid? how much do you pay for monthly internet?
I pay 19 euros a month for unlimited fiber optic broadband and 10 euros a month for 4G+ LTE UNLIMITED for my tablet and smartphone.
user2011 Sun, 03/18/2018 - 17:54 Permalink
Fuck social media
Last year as a test I sent as friend in the USA a 128GB microSDcard filled with documents., UNDER a POSTAGE STAMP using Snail Mail
Not at all detectable.
Went thru with flying colours
You know how many documents that is? A LOTExPat2018 -> user2011 Sun, 03/18/2018 - 17:55 Permalink
Tape over the user facing camera, don't use finger print to unlock, and dont do voice search, it will buy you a bit more time before they can profile u completely. Of course, stay away from FB. Install no script addon to your Firefox browser.Alexander De Large Sun, 03/18/2018 - 17:56 Permalink
Don't use any of them even though my Galaxy S8 has all of them I have disabled them.Usura Sun, 03/18/2018 - 17:57 Permalink
Good.Bill Melater Sun, 03/18/2018 - 18:06 Permalink
I have often wondered if the VC money for these tech companies came from MOSAD.ExPat2018 Sun, 03/18/2018 - 18:08 Permalink
Of course it is. It is also a fabulous tool for wannabe terrorists and spies of all kind - not just Russians.smacker -> ExPat2018 Sun, 03/18/2018 - 18:17 Permalink
Wolf Blitzer and CNN accuse Russia of influencing Russian election.GreatUncle Sun, 03/18/2018 - 18:12 Permalink
LOL :-)ExPat2018 -> GreatUncle Sun, 03/18/2018 - 18:16 Permalink
only people targed by the programs are "outside the United States,"
So every sovereign nation around the world allow their citizens rights to be violated.
Just a little point there when you consider who or what is running your country.opsyn Sun, 03/18/2018 - 18:16 Permalink
I live outside of the USA since 1989.
The USA govt tried to push my IP to comply with torrents sites and they told them to go to hell.
hahahCaptain Nemo d Sun, 03/18/2018 - 18:18 Permalink
That's where I'm counting on. Years of showing middle finger for every potential partner related to potential use of this surveillance media. I wanna piss everyone off big time, make myself active target, and to see what happens.MusicIsYou Sun, 03/18/2018 - 18:23 Permalink
far beyond the scant details you voluntarily post
How many fell for the voluntarily send us your scantily-clad details for out record scam?
Picture this: a civilization muzzled for decades upon decades by political correctness, the pressures building inside people not being able to spout off at the mouth. Then along comes the internet and socials where people can imagine they're anonymously blabbing away at the keyboard. My point is that most people mean very little of what they put on the web, it's just that the dam broke with the onset of the web. That's another reason data collection is useless.
Mar 15, 2018 | www.washingtonpost.com
Julian Assange is editor of WikiLeaks.
Mike Pompeo, in his first speech as director of the CIA, chose to declare war on free speech rather than on the United States' actual adversaries. He went after WikiLeaks, where I serve as editor, as a "non-state hostile intelligence service." In Pompeo's worldview, telling the truth about the administration can be a crime -- as Attorney General Jeff Sessions quickly underscored when he described my arrest as a "priority." News organizations reported that federal prosecutors are weighing whether to bring charges against members of WikiLeaks, possibly including conspiracy, theft of government property and violating the Espionage Act.
All this speech to stifle speech comes in reaction to the first publication in the start of WikiLeaks' "Vault 7" series. Vault 7 has begun publishing evidence of remarkable CIA incompetence and other shortcomings. This includes the agency's creation, at a cost of billions of taxpayer dollars, of an entire arsenal of cyber viruses and hacking programs -- over which it promptly lost control and then tried to cover up the loss. These publications also revealed the CIA's efforts to infect the public's ubiquitous consumer products and automobiles with computer viruses.
When the director of the CIA, an unelected public servant, publicly demonizes a publisher such as WikiLeaks as a "fraud," "coward" and "enemy," it puts all journalists on notice, or should. Pompeo's next talking point, unsupported by fact, that WikiLeaks is a "non-state hostile intelligence service," is a dagger aimed at Americans' constitutional right to receive honest information about their government. This accusation mirrors attempts throughout history by bureaucrats seeking, and failing, to criminalize speech that reveals their own failings.
President Theodore Roosevelt understood the danger of giving in to those "foolish or traitorous persons who endeavor to make it a crime to tell the truth about the Administration when the Administration is guilty of incompetence or other shortcomings." Such "endeavor is itself a crime against the nation," Roosevelt wrote. President Trump and his officials should heed that advice .
The custom software program was secretly built last year to comply with a classified US government directive. The program scanned hundreds of millions of Yahoo Mail accounts, according to revelations first reported by Reuters.
It is not known whether the directive, which was sent to the company's legal team, came from the National Security Agency or the FBI, according to the two former Yahoo employees. It is also not known what the intelligence officials were seeking, except wanting the company to search for a set of characters, which could mean a phrase in an email or an attachment.
The former employees said Yahoo CEO Marissa Mayer's decision to follow the directive angered some senior executive and led to the departure of Alex Stamos, the company's chief information officer.
When Stamos discovered Mayer had authorized the program, he told his subordinates that he had been left out of a decision that hurt users' security, the sources said. Due to a programming flaw, he told them, hackers could have accessed the stored emails.
Yahoo said in a statement issued to Reuters about the intelligence demand that it "is a law abiding company, and complies with the laws of the United States."
Surveillance experts told Reuters this is the first case to surface of an US internet company agreeing to a spy agency's demand by searching all arriving messages, as opposed to requests for stored messages or scanning a small number of accounts in real time.
Mar 09, 2018 | www.defenddemocracy.pressThose Who Controlled the Past Should Not Control the Future
by Norman SolomonDaniel Ellsberg has a message that managers of the warfare state don't want people to hear.
March 09, 2018
"If you have information that bears on deception or illegality in pursuing wrongful policies or an aggressive war," he said in a statement released last week, "don't wait to put that out and think about it, consider acting in a timely way at whatever cost to yourself . Do what Katharine Gun did."
If you don't know what Katharine Gun did, chalk that up to the media power of the war system.
Ellsberg's video statement went public as this month began, just before the 15th anniversary of when a British newspaper, the Observer , revealed a secret NSA memo – thanks to Katharine Gun. At the UK's intelligence agency GCHQ, about 100 people received the same email memo from the National Security Agency on the last day of January 2003, seven weeks before the invasion of Iraq got underway. Only Katharine Gun, at great personal risk, decided to leak the document.
If more people had taken such risks in early 2003, the Iraq War might have been prevented. If more people were willing to take such risks in 2018, the current military slaughter in several nations, mainly funded by U.S. taxpayers, might be curtailed if not stopped. Blockage of information about past whistleblowing deprives the public of inspiring role models.
That's the kind of reality George Orwell was referring to when he wrote: "Who controls the past controls the future; who controls the present controls the past."
Fifteen years ago, "I find myself reading on my computer from the Observer the most extraordinary leak, or unauthorized disclosure, of classified information that I'd ever seen," Ellsberg recalled, "and that definitely included and surpassed my own disclosure of top-secret information, a history of US decision-making in Vietnam years earlier." The Pentagon Papers whistleblower instantly recognized that, in the Observer article, "I was looking at something that was clearly classified much higher than top secret . It was an operational cable having to do with how to conduct communications intelligence."
What Ellsberg read in the newspaper story "was a cable from the NSA asking GCHQ to help in the intercepting of communications, and that implied both office and home communications, of every member of the Security Council of the UN.
Now, why would NSA need GCHQ to do that? Because a condition of having the UN headquarters and the Security Council in the US in New York was that the US intelligence agencies promised or were required not to conduct intelligence on members of the UN. Well, of course they want that. So, they rely on their allies, their buddies in the British GCHQ, to commit these criminal acts for them. And with this clearly I thought someone very high in access in Britain intelligence services must dissent from what was already clear the path to an illegal war. "
... ... ...
* Norman Solomon is co-founder of RootsAction.org and founding director of the Institute for Public Accuracy . His books include War Made Easy: How Presidents and Pundits Keep Spinning Us to Death .
Mar 08, 2018 | ronpaulinstitute.orgBest Buy's Geek Squad has been discovered acting as undercover FBI informants, snooping on their customers' computers and reporting anything that looks amiss to the FBI...for cash payments!
And Google is teaming up with the Pentagon to help it better analyze drone footage for targeting and other purposes.
While once it seemed the big tech firms would provide us protection against the ever-prying eyes of the national security state, it seems now they have become arms of the national security state. We look at this troubling phenomenon in today's Liberty Report:
... ... ...
Mar 08, 2018 | turcopolier.typepad.com
David Habakkuk , 08 March 2018 at 10:28 AMPT and all,
More material on the British end of the conspiracy.
Commenting on an earlier piece by PT, I suggested that a key piece of evidence pointing to 'Guccifer 2.0' being a fake personality created by the conspirators in their attempt to disguise the fact that the materials from the DNC published by 'WikiLeaks' were obtained by a leak rather than a hack had to do with the involvement of the former GCHQ person Matt Tait.
(See http://turcopolier.typepad.com/sic_semper_tyrannis/2018/02/pieces-of-the-coup-puzzle-fall-into-place-by-publius-tacitus.html .)
To recapitulate: Back in June 2016, hard on the heels of the claim by Dmitri Alperovitch of 'CrowdStrike' to have identified clinching evidence making the GRU prime suspects, Tait announced that, although initially unconvinced, he had found a 'smoking gun' in the 'metadata' of the documents released by 'Guccifer 2.0.'
A key part of this was the use by someone modifying a document of 'Felix Edmundovich' – the name and patronymic of Dzerzhinsky, the Lithuanian-Polish noble who created the Soviet secret police.
As I noted, Tait was generally identified as a former GCHQ employee who now ran a consultancy called 'Capital Alpha Security.' However, checking Companies House records revealed that he had filed 'dormant accounts' for the company. So it looks as though the company was simply a 'front', designed to fool 'useful idiots' into believing he was an objective analyst.
As I also noted in those comments, Tait writes the 'Lawfare' blog, one of whose founders, Benjamin Wittes, looks as though he may himself have been involved in the conspiracy up to the hilt. Furthermore, a secure income now appears to have been provided to replace that from the non-existent consultancy, in the shape of a position at the 'Robert S. Strauss Center for International Security and Law', run by Robert Chesney, a co-founder with Wittes of 'Lawfare.'
A crucial part of the story, however, is that the notion of GRU responsibility for the supposed 'hacks' appears to be part of a wider 'narrative' about the supposed 'Gerasimov Doctrine.' From the 'View from Langley' provided to Bret Stephens by CIA Director Mike Pompeo at the 'Aspen Security Forum' last July:
'I hearken back to something called the Gerasimov doctrine from the early 70s, he's now the head of the – I'm a Cold War guy, forgive me if I mention Soviet Union. He's now the head of the Russian army and his idea was that you can win wars without firing a single shot or with firing very few shots in ways that are decidedly not militaristic, and that's what's happened. What changes is the costs; to effectuate change through cyber and through RT and Sputnik, their news outlets, and through other soft means; has just really been lowered, right. It used to be it was expensive to run an ad on a television station now you simply go online and propagate your message. And so they have they have found an effective tool, an easy way to go reach into our systems, and into our culture to achieve the outcomes they are looking for.'
(See https://aspensecurityforum.org/wp-content/uploads/2017/07/The-View-from-Langley.pdf .)
What has however become clear in recent days is that the 'Gerasimov Doctrine' was not invented by its supposed author, but by a British academic, Mark Galeotti, who has now confessed – although in a way clearly designed to maintain as much of the 'narrative' as possible.
Three days ago, an article by Galleoti appeared in 'Foreign Policy' entitled 'I'm Sorry for Creating the "Gerasimov Doctrine": I was the first to write about Russia's infamous high-tech military strategy. One small problem: it doesn't exist.'
(See http://foreignpolicy.com/2018/03/05/im-sorry-for-creating-the-gerasimov-doctrine/ .)
A key paragraph:
'Gerasimov was actually talking about how the Kremlin understands what happened in the "Arab Spring" uprisings, the "color revolutions" against pro-Moscow regimes in Russia's neighborhood, and in due course Ukraine's "Maidan" revolt. The Russians honestly – however wrongly – believe that these were not genuine protests against brutal and corrupt governments, but regime changes orchestrated in Washington, or rather, Langley. This wasn't a "doctrine" as the Russians understand it, for future adventures abroad: Gerasimov was trying to work out how to fight, not promote, such uprisings at home.'
The translation of the original article by Gerasimov with annotations by Galeotti which provoked the whole hysteria turns out to be a classic example of what I am inclined to term 'bad Straussianism.'
(See https://inmoscowsshadows.wordpress.com/2014/07/06/the-gerasimov-doctrine-and-russian-non-linear-war/ .)
What Strauss would have called the 'exoteric' meaning of the article quite clearly has to do with defensive strategies aimed at combatting the kind of Western 'régime change' projects about which people like those who write for 'Lawfare' are so enthusiastic. But Galeotti tells us that this is, at least partially, a cover for an 'esoteric' meaning, which has to do with offensive actions in Ukraine and similar places.
Having now read the text of the article, I can see a peculiar irony in it. In a section entitled 'You Can't Generate Ideas On Command', Gerasimov suggests that 'The state of Russian military science today cannot be compared with the flowering of military-theoretical thought in our country on the eve of World War II.'
According to the 'exoteric' meaning of the article, it is not possible to blame anyone in particular for this situation. But Gerasimov goes on on to remark that, while at the time of that flowering there were 'no people with higher degrees' or 'academic schools or departments', there were 'extraordinary personalities with brilliant ideas', who he terms 'fanatics in the best sense of the word.'
Again, Galeotti discounts the suggestion that nobody is to blame, assuming an 'esoteric meaning', and remarking: 'Ouch. Who is he slapping here?'
Actually, Gerasimov refers by name to two, utterly different figures, who certainly were 'extraordinarily personalities with brilliant ideas.'
If Pompeo had even the highly amateurish grasp of the history of debates among Soviet military theorists that I have managed to acquire he would be aware that one of the things which was actually happening in the 'Seventies was the rediscovery of the ideas of Alexander Svechin.
Confirming my sense that this has continued on, Gerasimov ends by using Svechin to point up an intractable problem: it can be extraordinarily difficult to anticipate the conditions of a war, and crucial not to impose a standardised template likely to be inappropriate, but one has to make some kinds of prediction in order to plan.
Immediately after the passage which Galeotti interprets as a dig at some colleague, Gerasimov elaborates his reference to 'extraordinary people with brilliant ideas' by referring to an anticipation of a future war, which proved prescient, from a very different figure to Svechin:
'People like, for instance, Georgy Isserson, who, despite the views he formed in the prewar years, published the book "New Forms Of Combat." In it, this Soviet military theoretician predicted: "War in general is not declared. It simply begins with already developed military forces. Mobilization and concentration is not part of the period after the onset of the state of war as was the case in 1914 but rather, unnoticed, proceeds long before that." The fate of this "prophet of the Fatherland" unfolded tragically. Our country paid in great quantities of blood for not listening to the conclusions of this professor of the General Staff Academy.'
Unlike Svechin, whom I have read, I was unfamiliar with Isserson. A quick Google search, however, unearthed a mass of material in American sources – including, by good fortune, an online text of a 2010 study by Dr Richard Harrison entitled 'Architect of Soviet Victory in World War II: The Life and Theories of G.S. Isserson', and a presentation summarising the volume.
Ironically, Svechin and Isserson were on opposite sides of fundamental divides. So the former, an ethnic Russian from Odessa, was one of the 'genstabisty', the former Tsarist General Staff officers who sided with the Bolsheviks and played a critical role in teaching the Red Army how to fight. Meanwhile Isserson was a very different product of the 'borderlands' – the son of a Jewish doctor, brought up in Kaunas, with a German Jewish mother from what was then Königsberg, giving him an easy facility with German-language sources.
The originator of the crucial concept of 'operational' art – the notion that in modern industrial war, the ability to handle a level intermediate between strategy and tactics was critical to success – was actually Svechin.
Developing the ambivalence of Clausewitz, however, he stressed that both the offensive and the defensive had their places, and that the key to success was to know which was appropriate when and also to be able rapidly to change from one to the other. His genuflections to Marxist-Leninist dogma, moreover, were not such as to take in any of Dzerzhinsky's people.
By contrast, Isserson was unambiguously committed to the offensive strand in the Clausewitzian tradition, and a Bolshevik 'true believer' (although he married the daughter of a dispossessed ethnically Russian merchant, who had their daughter baptised without his knowledge.)
As Harrison brings out, Isserson's working through of the problems of offensive 'operational art' would be critical to the eventual success of the Red Army against Hitler. However, the specific text to which he refers was, ironically, a warning of precisely one of the problems implicit in the single-minded reliance on the offensive: the possibility that one could be left with no good options confronting an antagonist similarly oriented – as turned out to be the case.
As Gerasimov intimates, while unlike Svechin, executed in 1938, Isserson survived the Stalin years, he was another of the victims of Dzerzhinsky's heirs. Arrested shortly before his warnings were vindicated by the German attack on 22 June 1941, he would spend the war in the Gulag and only return to normal life after Stalin's death.
So I think that the actual text of Gerasimov's article reinforces a point I have made previously. The 'evidence' identified by Tait is indeed a 'smoking gun.' But it emphatically does not point towards the GRU.
Meanwhile, another moral of the tale is that Americans really should stop being taken in by charlatan Brits like Galeotti, Tait, and Steele.
Mar 07, 2018 | www.theamericanconservative.com
b. March 7, 2018 at 2:21 pmWe have come a long way from the reactionary and authoritarian chants of "if you have done nothing wrong, you have nothing to hide" in the lead-up and then wake of the sarcastically name PATRIOT Act.
Surveillance and monitoring are, like all other "national securities" spending, primarily profit extraction driven public-private "partnerships", but the major point here always was "if you build it, they will use it".
That, too, is the foundational criticism driving Global Zero and the insistence that Article IV of the Non-Proliferation Treaty be honored by all signatory nuclear powers.
The basic principle of any evolutionary stable open society based on checks and balances is that no self-inflating institutions and power centers are permissible – whether that is inbred, networked multi-generational wealth, incorporated power such as financial institutions, or specific government institutions, such as the military, the "intelligence" agencies etc.
Of course, the whole idea of having secret courts applying secret law in secret decisions without adversary parties, and no mandatory disclosure after the fact, is also fundamentally incompatible with the idea of transparency and accountability, without which free speech and elections are little more than a travelling circus and a vehicle for advertising profit.
Mar 02, 2018 | www.zerohedge.com
milanolarry Fri, 03/02/2018 - 02:37 PermalinkHelena Bonham-Carter -> milanolarry Fri, 03/02/2018 - 02:39 Permalink
When I upgraded the Tor in my Android, it requested access to my phone hardware no. and all communication records. I was just wondering why the developers of Tor needed this information. Now, I think I have the answer.JPMorgan Fri, 03/02/2018 - 03:02 Permalink
The legitimate Tor application for Android ("Orbot") doesn't do that. You either downloaded a second-party Tor impostor app, or you have some OS problem with your phone.
Google doesn't need Tor's help, or anyone's help, to collect data directly from your phone on behalf of the USG.Helena Bonham-Carter -> JPMorgan Fri, 03/02/2018 - 03:15 Permalink
It's was either born out of a need for something secure for INTERNAL USE ONLY (and it got out)... or it's a big cluster fuck for those seeking online privacy.
I don't really know enough about how Tor works to make a informed opinion.
It was born our of a need for internal use, but not internal use only. In fact, it required external users to provide cover for internal users.
Mar 02, 2018 | turcopolier.typepad.com
Richardstevenhack 01 March 2018 at 04:50 PMI find it absurd that anyone is making it news that foreign governments are trying to find ways to manipulate White House connected officials. Surely this is the nature of the beast. Both in the US and in foreign governments. Why would anyone expect anything different. Ah, yes, because everyone in the US government is supposed to be honest, honorable, and of impeccable character (and brilliant to boot) - whereas anyone in a foreign government is a scumbag capable only of nefarious intentions and criminal methods.
Well, the latter might be true - but it's also true of the former.
As for SIGINT leaks, I suspect anyone in any government who isn't assuming their most encrypted conversations are immediately revealed to the NSA are idiots. If they don't know how it's being done, I would imagine they've already ordered their intelligence people to find out how. In the meantime, they're resigned to speaking over any communication link only information that isn't "Eyes Only" military technology secrets.
And even that isn't necessarily true. Yesterday Putin revealed no less than FIVE major Russian military breakthroughs in a speech.
So, yes, our leakers are revealing our SIGINT capabilities - without revealing how it's done. But since Snowden, my guess is most foreign government officials have already been told by their intelligence people that nothing they say is really secure unless it's face to face in a SCIF.
I have a meme I use in computer security: "You can haz better security, you can haz worse security. But you cannot haz 'security'. There is no security. Deal." It would behoove most people to take that to heart.
However, the Colonel is certainly correct in that our leakers appear intent to reveal our secrets for political purposes - and they should be arrested and imprisoned for that.
Mar 02, 2018 | www.zerohedge.com
Thom Paine Fri, 03/02/2018 - 03:12 PermalinkHelena Bonham-Carter -> Thom Paine Fri, 03/02/2018 - 03:17 Permalink
For fun I often run NORDvpn which apparently keeps no records, and you can even use its double VPN if you want (vpn in vpn tunnel),
You think that protects you? - well not really - each browser has a 'finger print' - the way you set up your browser, with add-ons etc gives it a finger print - so your setup maybe equivalent to 1 in 10,000 globally - and if they narrow down your location, maybe 1 in 5 and so on.
And don't search with Google
I think that by "apparently keeps no records" you mean "supposedly keeps no records".
Chances that their VPN server has not been infiltrated by the spy agencies of 12 countries:
Chances that Click&Clean, an "innovative and totally free solution for your PC", is not spying on you:
Turing-complete languages available to write a keylogger that runs inside your browser with JS off:
Jan 19, 2016 | www.itproportal.com
Signaling networks enable the exchange of information that sets up, controls and terminates phone calls.
Signaling System No. 7, or SS7, is widely used by mobile companies to enable subscribers to communicate with anyone, anywhere. The central nervous system of a mobile operator's network, it contains mission-critical real-time data such as a subscriber's identity, status, location, and technology, providing the operator with the ability to manage communications, as well as bill subscribers for the services they provide.
As each network component in a core network uses SS7 to interface with other network components, any vulnerability related to the SS7 protocol could severely threaten the trust and privacy of subscribers.
Gaining access to the information it holds and using it for commercial or nefarious ends can prove very valuable to the right person. So when you consider that the SS7 network has more users worldwide than the Internet, it's perhaps little surprise that operators and subscribers alike are seriously concerned about its security.
Using SS7 to exploit the mobile network
Designed for use as a 'trusted network', it has since transpired that the network is not as secure as was once believed. Indeed, vulnerabilities in SS7 were being publicly discussed as long ago as 2008.
Telecom engineers had warned of possible risks and even top government officials were voicing concern about its security after a German researcher was able to demonstrate how the protocol could be used to determine the location of a mobile phone.
It wasn't until 2013, however, that the issue gained wider public attention when it was revealed that an SS7 network had been exploited for purposes of illicit information gathering.
Subsequent incidents have since revealed that unauthorised access to the network is not only possible but far simpler to achieve than was once believed. Networks are vulnerable to fraud and misuse, with loopholes in the SS7 protocol being used to steal money, listen in on conversations, monitor messages, determine a subscriber's location, manipulate network and subscriber data, and generally disrupt services.
In the past, safety protocols around an SS7 network's hosts and communications channels involved physical security, making it almost impossible to obtain access through a remote unauthorised host. Today though, while the process of placing voice calls in modern mobile networks still relies on SS7 technology dating back to the 70s, the deployment of new signalling transport protocols known as SIGTRAN allow SS7 to run over IP.
Unfortunately, while this move offers the advantages of greater bandwidth, redundancy, reliability, and access to IP-based functions and applications, it has also opened up new points of vulnerability.
With the right technical skill and intent, it's possible for someone to use SS7 to exploit the mobile network and its users.
Examples of exploitations
IMSI (International Mobile Subscriber Identity) is a unique subscriber identification used by mobile network operators, and is generally considered to be secure and confidential. Using the target subscriber's number, however, an attacker could exploit an SS7 vulnerability to obtain the subscriber's IMSI as part of a routine SMS delivery protocol.
By using the IMSI in conjunction with the current Mobile Switching Centre (MSC) and Visitor Location Register (VLR) address - also obtainable via an SS7 vulnerability - an attacker can leverage data commonly used for real-time tariffing of a subscriber's incoming calls to determine the subscriber's location to within a few hundred metres.
The combination of IMSI and current MSC/VLR address can also be used to block a subscriber from receiving incoming calls and text messages by registering the handset in a spoofed coverage zone; an experience similar to being a roaming subscriber registered on a different network.
More worryingly, a spoofed MSC/VLR zone can allow attackers to intercept incoming SMS messages, from which they can gain critical personal information and sensitive data such as one-time mobile banking passwords, two-factor authentication interactions, and password resets for various services including email accounts or social networks.
Similarly, it's possible to intercept incoming voice calls and illegally monitor conversations, or redirect calls to expensive international numbers or pay-per-use schemes where voice traffic can be monetised.
Of considerable concern to many, USSD (Unstructured Supplementary Service Data) commands are widely used by subscribers in some markets as a means of communicating directly with the automated billing or payment services offered by mobile network providers or those partners offering monetary transactions and banking services.
Attackers are able to use USSD commands to spoof transactions such as authorising purchases or transferring funds between accounts. And, by intercepting incoming SMS messages confirming the transactions, they can go undetected for some time.
Building and implementing solutions
With potential threats to the SS7 network coming from a growing number of sources including hackers and fraudsters with criminal intent, operators are under increasing pressure to protect the privacy of thei