Posts Tagged ‘surveillance’

CIA hacks

WikiLeaks: Here’s how the CIA hacks your phones, TVs and PCs

The organization released thousands of documents it claims show how the US spy agency can crack open devices from Apple, Samsung, Google and Microsoft.

  https://www.cnet.com/news/wikileaks-cia-hacking-tools-phones-apple-samsung-microsoft-google/

This debate took off when the US Department of Justice sought to require Apple to help it open an encrypted iPhone belonging to one of the San Bernardino shooters. After Apple fought back in court, the FBI said it had obtained another way to access the phone.

Apple, Google and Motorola declined to comment on WikiLeaks’ claims. Samsung didn’t respond to a request for comment.

“The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,” said Moxie Marlinspike, the founder of Signal. “This story isn’t about Signal or WhatsApp, but to the extent that it is, we see it as confirmation that what we’re doing is working.”

Telegram said on its website that the problem lies with operating systems and not encrypted messaging apps and that naming specific encrypted services is “misleading.” WhatsApp declined to comment.

+++++++++++++++++++++++++++++++
more on surveillance in this IMS blog
http://blog.stcloudstate.edu/ims?s=surveillance

cybersecurity grants

Grant program would support state, local cybersecurity

By Mark Rockwell Mar 02, 2017

https://fcw.com/articles/2017/03/02/state-cyber-bill-rockwell.aspx

The proposed legislation, said the lawmakers, would set up a cybersecurity grant program that would provide resources for states to develop and implement effective cyber resiliency plans, including efforts to identify, detect, protect, respond, and recover from cyber threats. It also would encourage development of a stronger cybersecurity workforce.

++++++++++++++++
more on cybersecurity in this IMS blog
http://blog.stcloudstate.edu/ims?s=cybersecurity

cyberwarfare

How to define cyber-enabled economic warfare

By Sean D. Carberry Feb 23, 2017

https://fcw.com/articles/2017/02/23/critical-ceew-cyber-carbery.aspx

“Framework and Terminology for Understanding Cyber-Enabled Economic Warfare,” a new report by Samantha F. Ravich and Annie Fixler for the Foundation for Defense of Democracies.

Cyber-enabled economic warfare is a “hostile strategy involving attack(s) against a nation using cyber technology with the intent to weaken its economy and thereby reduce its political and military power.”

For example, China’s economic theft of intellectual property from the U.S. is considered CEEW, along with Russia’s cyberattack on Estonia and Iran’s Saudi Aramco attack. The authors also contend that the U.S. sanctions on Iran using cyber means to cut off Society for Worldwide Interbank Financial Telecommunication access also falls under CEEW.

http://www.defenddemocracy.org/content/uploads/documents/22217_Cyber_Definitions.pdf

+++++++++++++++++++
more on cybersecurity in this IMS blog
http://blog.stcloudstate.edu/ims?s=cybersecurity

confide app

White House staffers are using this self-destructing messages app to gossip in private — here’s how it works

+++++++++++++++
more on social media in this IMS blog
http://blog.stcloudstate.edu/ims?s=social+media

tech in China

The uncomfortable truth about tech in China

By Steve Kelman https://fcw.com/blogs/lectern/2017/02/kelman-china-innovation.aspx

Only recently, the general view in the U.S. was that the less-free Chinese system created a poor environment for tech innovation. Put somewhat simply, the argument was that in a society without our kind of freedom of speech or unrestricted access to communication such as the Internet, people would miss out on information and ideas that come from a free system and feel more psychologically constrained from venturing off the beaten path with innovative ideas. The Chinese would be limited, in this view, to knock-offs of U.S. technologies.

The government has also cracked down on use of virtual private networks that Chinese, especially young people, have used to “climb the wall” (i.e. find sites outside the “Great Firewall of China”). And recently, there were media complaints that at the top elite universities such as Tsinghua the anti-VPN policy was not being enforced strictly enough.

Clearly, though, Chinese progress has taken place despite these restrictions.

we should not naively assume that all good (or bad) things go together. Maybe freedom of political and cultural expression is not as important as we have thought for advances, say, in information technology. But it still might be more important for development of less technical or scientific ideas such as public policy proposals or cultural expressions.

+++++++++++++++++++++
more on virtual networks for civic activities
http://blog.stcloudstate.edu/ims/2014/09/30/disruptive-technologies-from-swarming-to-mesh-networking/

social media and community opinion

Ijcsis, J. of C. S., Suryani, M., Ghani, J., & Suryani, M. (2016). IMPACT OF SOCIAL MEDIA ON CLOSED COMMUNITY BY CONSIDERING OPINION MINING. International Journal of Computer Science and Information Security, 14(11), 944–954. Last retrieved Feburary 6, 2017 from https://www.academia.edu/30936284/IMPACT_OF_SOCIAL_MEDIA_ON_CLOSED_COMMUNITY_BY_CONSIDERING_OPINION_MINING
Mining social media has its potential to extract actionable patterns that can be beneficial for business, users, and consumers. Opinion mining from social media can be a faster and less expensive alternative to traditional survey and polling, on which many sustainability researches are based.
Crowd Capital Theory.
ex-post facto design
my opinion:
format-wise – poorly written. No proofreading by the authors, but also by the peer-previewers.
Academic English does not recognize “get” and “put.” Sometimes, the ideas are not presented clearly. In-text citations need work: e.g. p. 946 “Andrews in 2012 said that may researchers indicate that the info…”; instead of “According to Andrews (2012), numerous researchers indicate the possibility of social network information to be used as a tool for spying.”  Similarly, on page 947: ” (Saxton et al., 2012)” must be “Saxton et al., (2012)”
Verbs are missing: e.g. p. 946 “A case study on effect of social networking sites in emergency departments for patient care.”
p. 953 “in all these study” – adjective / subject disagreement.
content-wise, the article also presents ad-hod information, rather then clearly structured and delinted conclusions: e.g., on page p. 947, the authors announce as the goal of this study ” to investigate the role of “social networks” in creating a positive or negative impact on the social, behavioral and educational aspics of our community.”
None of the three links to the surveys are functional:e.g.,https://docs.google.com/forms/d/1yzVo2SL85iqr7CVRGDZ1bUGKzZPQOo4bBD42 CI9f9e8/viewform?c=0&w=1&usp=mail_form_link

++++++++++++++++
more on social media in this IMS blog
http://blog.stcloudstate.edu/ims?s=social+media

FBI can hack computers

This rule basically gives the FBI power to hack anyone

https://www.facebook.com/NowThisFuture/videos/1249249875165134/

Last-ditch effort to prevent changes to law enforcement hacking rule fails

++++++++++++++++++++
surveillance and privacy in this IMS bloghttp://blog.stcloudstate.edu/ims?s=surveillance

davos class

The Davos Class

http://davosclass.tni.org/

http://civicus.org/index.php/socs-2014-expert-perspectives/586-the-great-divide-exposing-the-davos-class-behind-global-economic-inequality

http://www.occupy.com/tags/davos-classhttps://en.wikipedia.org/wiki/Transnational_capitalist_class

http://www.redpepper.org.uk/who-are-the-davos-class/

http://www.nationalreview.com/corner/439803/scott-walker-davos-class-and-rest-ushttp://itsoureconomy.us/2014/01/exposing-the-davos-class/

State of Corporations – The rise of illegitimate power and the threat to democracy (PDF, 902KB)
Susan George

State of Davos – The camel’s nose in the tents of global governance (PDF, 308KB)
David Sogge

State of Surveillance –The NSA files and the global fightback (PDF, 778KB)
Ben Hayes

State of Empire – How failed foreign policy, new emerging economies, and peoples’ movements are undermining US power(PDF, 526KB)
Phyllis Bennis

https://www.theguardian.com/commentisfree/2016/nov/09/rise-of-the-davos-class-sealed-americas-fate

private versus government

Hayden calls Russian email hack ‘honorable state espionage’

By Matt Leonard Oct 18, 2016

https://fcw.com/articles/2016/10/18/hayden-email-espionage.aspx?

The Department of Homeland Security and the Office of the Director of National Intelligence issued a joint statement earlier this month that condemned Russia for the attacks.

“Do not drop this in the cyber problem box, drop this in the Russia problem box,” Hayden suggested, saying the focus should be on the actor, not the means. “And by the way, that Russian problem box needs a bigger box, there’s a lot of stuff going on.”

Though there are aspects of cybersecurity that only government can handle, most of it will be driven by the private industry, Hayden said. Government can help the private sector by getting out of the way — removing liability, enabling legal protections, sharing information and redoing the classification system.

And since the government too depends on the private sector for security innovation, Hayden said he sides with Apple regarding whether the company should have to create a back door for the FBI to bypass iPhone encryption.

+++++++++++++++++

more on surveillance, government in this IMS blog:

http://blog.stcloudstate.edu/ims?s=surveillance

surveillance and privacy

FBI quietly changes its privacy rules for accessing NSA data on Americans

Classified revisions accepted by secret Fisa court affect NSA data involving Americans’ international emails, texts and phone calls

The FBI has quietly revised its privacy rules for searching data involving Americans’ international communications that was collected by the National Security Agency, US officials have confirmed to the Guardian.

Pro Domo Sua: Are We Puppets in a Wired World? Surveillance and privacy revisited…

More on privacy in this IMS blog:
http://blog.stcloudstate.edu/ims/page/2/?s=privacy&submit=Search

more on surveillance in this IMS blog:
http://blog.stcloudstate.edu/ims/?s=surveillance&submit=Search

1 2