Join Erik Fisher and Kim Reynolds live for the Social Media Marketing Talk Show as we explore New Facebook Live Video Tools with David Foster, New Instagram Business Tools with Jeff Sieh and more breaking social media marketing news of the week!Join the discussion here: https://www.crowdcast.io/e/smelive5-11-18/register
The EU’s code of conduct on countering illegal online hate speech was first presented in 2016 and initially had four major internet platforms that participated – Facebook, Microsoft, Twitter, and YouTube. Snapchat is the seventh major IT platform to join the EU’s non-binding ethics regulations to fight illegal online hate speech.
Privacy researcher Lukasz Olejnik disagreed, noting that the change carried large ramifications for the affected users. “Moving around one and a half billion users into other jurisdictions is not a simple copy-and-paste exercise,” he said.
Facebook To Offer Users Opt-Outs That Comply With New European Privacy Rules
As we reported earlier this week, a federal judge in California ruled that Facebook could be sued in a class-action lawsuit brought by users in Illinois who say the social media company improperly used facial recognition to upload photographs.
Recent research and clinical psychologists now suggest that some adolescents are engaging in a newer form of self-aggression — digital self-harm. They’re anonymously posting mean and derogatory comments about themselves on social media.
According to a survey published late last year in the Journal of Adolescent Health, teens are bullying themselves online as a way to manage feelings of sadness and self-hatred and to gain attention from their friends.
“We were alarmed to learn that 6 percent of the youth who participated in our study engaged in some form of digital self-harm,” says Sameer Hinduja, co-author of the study and a professor of criminology at Florida Atlantic University. He is also the co-director of the Cyberbullying Research Center.
“Because teens’ online and offline worlds overlap, digital self-harm is a concern for some youth, making online self-harm an emerging area of research,” says, Susan Swearer, a professor of psychology at the University of Nebraska, Lincoln
Because the advent of social media has changed the way many teens form and experience relationships, normal adolescent feelings of insecurity, anxiety and loneliness can become magnified as they scroll through their peers’ social media reels. Hinduja says some teens cope with that distress by turning their angst on themselves online.
It is important to note that bot accounts do not always clearly identify themselves as such in their profiles, and any bot classification system inevitably carries some risk of error. The Botometer system has been documented and validated in an array of academicpublications, and researchers from the Center conducted a number of independent validation measures of its results.8
In 2014 Tim Berners-Lee, inventor of the World Wide Web, proposed an online ‘Magna Carta’ to protect the Internet, as a neutral system, from government and corporate manipulation. He was responding after revelations that British and US spy agencies were carrying out mass surveillance programmes; the Cambridge Analytica scandal makes his proposal as relevant as ever.
Luciano Floridi, professor of Philosophy and Ethics of Information at the Oxford Internet Institute, explains that grey power is not ordinary socio-political or military power. It is not the ability to directly influence others, but rather the power to influence those who influence power. To see grey power, you need only look at the hundreds of high-level instances of revolving-door staffing patterns between Google and European governmentsand the U.S. Department of State.
And then there is ‘surveillance capitalism’. Shoshana Zuboff, Professor Emerita at Harvard Business School, proposes that surveillance capitalism is ‘a new logic of accumulation’. The incredible evolution of computer processing power, complex algorithms and leaps in data storage capabilities combine to make surveillance capitalism possible. It is the process of accumulation by dispossession of the data that people produce.
The respected security technologist Bruce Schneier recently applied the insights of surveillance capitalism to the Cambridge Analytica/Facebook crisis.
For Schneier, ‘regulation is the only answer.’ He cites the EU’s General Data Protection Regulation coming into effect next month, which stipulates that users must consent to what personal data can be saved and how it is used.
Apps like WhatsApp, Facebook, Snapchat, Instagram, Twitter, LinkedIn, Viber
Felix Krause described in 2017 that when a user grants an app access to their camera and microphone, the app could do the following:
Access both the front and the back camera.
Record you at any time the app is in the foreground.
Take pictures and videos without telling you.
Upload the pictures and videos without telling you.
Upload the pictures/videos it takes immediately.
Run real-time face recognition to detect facial features or expressions.
Livestream the camera on to the internet.
Detect if the user is on their phone alone, or watching together with a second person.
Upload random frames of the video stream to your web service and run a proper face recognition software which can find existing photos of you on the internet and create a 3D model based on your face.
For instance, here’s a Find my Phone application which a documentary maker installed on a phone, then let someone steal it. After the person stole it, the original owner spied on every moment of the thief’s life through the phone’s camera and microphone.
Edward Snowden revealed an NSA program called Optic Nerves. The operation was a bulk surveillance program under which they captured webcam images every five minutes from Yahoo users’ video chats and then stored them for future use. It is estimated that between 3% and 11% of the images captured contained “undesirable nudity”.
Hackers can also gain access to your device with extraordinary ease via apps, PDF files, multimedia messages and even emojis.
An application called Metasploit on the ethical hacking platform Kali uses an Adobe Reader 9 (which over 60% of users still use) exploit to open a listener (rootkit) on the user’s computer. You alter the PDF with the program, send the user the malicious file, they open it, and hey presto – you have total control over their device remotely.
Once a user opens this PDF file, the hacker can then:
Install whatever software/app they like on the user’s device.
Use a keylogger to grab all of their passwords.
Steal all documents from the device.
Take pictures and stream videos from their camera.
Capture past or live audio from the microphone.
Upload incriminating images/documents to their PC, and notify the police.
And, if it’s not enough that your phone is tracking you – surveillance cameras in shops and streets are tracking you, too
You might even be on this website, InSeCam, which allows ordinary people online to watch surveillance cameras free of charge. It even allows you to search cameras by location, city, time zone, device manufacturer, and specify whether you want to see a kitchen, bar, restaurant or bedroom.