Facebook has moved more than 1.5 billion users out of reach of European privacy law, despite a promise from Mark Zuckerberg to apply the “spirit” of the legislation globally.
Privacy researcher Lukasz Olejnik disagreed, noting that the change carried large ramifications for the affected users. “Moving around one and a half billion users into other jurisdictions is not a simple copy-and-paste exercise,” he said.
+++++++++++++++++++
Facebook To Offer Users Opt-Outs That Comply With New European Privacy Rules
As we reported earlier this week, a federal judge in California ruled that Facebook could be sued in a class-action lawsuit brought by users in Illinois who say the social media company improperly used facial recognition to upload photographs.
Also on Wednesday, TechCrunch reports that Facebook is investigating a security research report showing that its user data is vulnerable to third-party JavaScript trackers embedded on websites offering the “Login With Facebook” feature.
Recent research and clinical psychologists now suggest that some adolescents are engaging in a newer form of self-aggression — digital self-harm. They’re anonymously posting mean and derogatory comments about themselves on social media.
According to a survey published late last year in the Journal of Adolescent Health, teens are bullying themselves online as a way to manage feelings of sadness and self-hatred and to gain attention from their friends.
“We were alarmed to learn that 6 percent of the youth who participated in our study engaged in some form of digital self-harm,” says Sameer Hinduja, co-author of the study and a professor of criminology at Florida Atlantic University. He is also the co-director of the Cyberbullying Research Center.
“Because teens’ online and offline worlds overlap, digital self-harm is a concern for some youth, making online self-harm an emerging area of research,” says, Susan Swearer, a professor of psychology at the University of Nebraska, Lincoln
Because the advent of social media has changed the way many teens form and experience relationships, normal adolescent feelings of insecurity, anxiety and loneliness can become magnified as they scroll through their peers’ social media reels. Hinduja says some teens cope with that distress by turning their angst on themselves online.
To identify bots, the Center used a tool known as “Botometer,” developed by researchers at the University of Southern California and Indiana University.
It is important to note that bot accounts do not always clearly identify themselves as such in their profiles, and any bot classification system inevitably carries some risk of error. The Botometer system has been documented and validated in an array of academicpublications, and researchers from the Center conducted a number of independent validation measures of its results.8
In 2014 Tim Berners-Lee, inventor of the World Wide Web, proposed an online ‘Magna Carta’ to protect the Internet, as a neutral system, from government and corporate manipulation. He was responding after revelations that British and US spy agencies were carrying out mass surveillance programmes; the Cambridge Analytica scandal makes his proposal as relevant as ever.
Luciano Floridi, professor of Philosophy and Ethics of Information at the Oxford Internet Institute, explains that grey power is not ordinary socio-political or military power. It is not the ability to directly influence others, but rather the power to influence those who influence power. To see grey power, you need only look at the hundreds of high-level instances of revolving-door staffing patterns between Google and European governmentsand the U.S. Department of State.
And then there is ‘surveillance capitalism’. Shoshana Zuboff, Professor Emerita at Harvard Business School, proposes that surveillance capitalism is ‘a new logic of accumulation’. The incredible evolution of computer processing power, complex algorithms and leaps in data storage capabilities combine to make surveillance capitalism possible. It is the process of accumulation by dispossession of the data that people produce.
The respected security technologist Bruce Schneier recently applied the insights of surveillance capitalism to the Cambridge Analytica/Facebook crisis.
For Schneier, ‘regulation is the only answer.’ He cites the EU’s General Data Protection Regulation coming into effect next month, which stipulates that users must consent to what personal data can be saved and how it is used.
Apps like WhatsApp, Facebook, Snapchat, Instagram, Twitter, LinkedIn, Viber
Felix Krause described in 2017 that when a user grants an app access to their camera and microphone, the app could do the following:
Access both the front and the back camera.
Record you at any time the app is in the foreground.
Take pictures and videos without telling you.
Upload the pictures and videos without telling you.
Upload the pictures/videos it takes immediately.
Run real-time face recognition to detect facial features or expressions.
Livestream the camera on to the internet.
Detect if the user is on their phone alone, or watching together with a second person.
Upload random frames of the video stream to your web service and run a proper face recognition software which can find existing photos of you on the internet and create a 3D model based on your face.
For instance, here’s a Find my Phone application which a documentary maker installed on a phone, then let someone steal it. After the person stole it, the original owner spied on every moment of the thief’s life through the phone’s camera and microphone.
The government
Edward Snowden revealed an NSA program called Optic Nerves. The operation was a bulk surveillance program under which they captured webcam images every five minutes from Yahoo users’ video chats and then stored them for future use. It is estimated that between 3% and 11% of the images captured contained “undesirable nudity”.
Hackers can also gain access to your device with extraordinary ease via apps, PDF files, multimedia messages and even emojis.
An application called Metasploit on the ethical hacking platform Kali uses an Adobe Reader 9 (which over 60% of users still use) exploit to open a listener (rootkit) on the user’s computer. You alter the PDF with the program, send the user the malicious file, they open it, and hey presto – you have total control over their device remotely.
Once a user opens this PDF file, the hacker can then:
Install whatever software/app they like on the user’s device.
Use a keylogger to grab all of their passwords.
Steal all documents from the device.
Take pictures and stream videos from their camera.
Capture past or live audio from the microphone.
Upload incriminating images/documents to their PC, and notify the police.
And, if it’s not enough that your phone is tracking you – surveillance cameras in shops and streets are tracking you, too
You might even be on this website, InSeCam, which allows ordinary people online to watch surveillance cameras free of charge. It even allows you to search cameras by location, city, time zone, device manufacturer, and specify whether you want to see a kitchen, bar, restaurant or bedroom.
The anti-fake news bill, which must be approved by parliament, calls for penalising those who create, offer, circulate, print or publish fake news – or publications containing fake news – with a 10-year jail term, a fine of up to 500,000 ringgit (£90,000) or both.
The bill defines fake news as “any news, information, data and reports which is, or are, wholly or partly false whether in the form of features, visuals or audio recordings or in any other form capable of suggesting words or ideas”.
It covers all media and extends to foreigners outside Malaysia if Malaysia or its citizens are affected.
Ek, 35, started Spotify in 2006 because he thought he could stamp out the piracy that had ravaged the music business. He was right.
More than 70 million people now pay Spotify an average of about $5 a month to access 35 million songs, plus playlists and podcasts. In private transactions, investors have valued the company at more than $20 billion.
There’s only one small flaw in the business model: Spotify doesn’t make any money. The service has reported higher losses in three consecutive years despite quadrupling sales. It’s hard to be profitable when music-rights holders collect more than 75¢ on every dollar that comes in.
Pandora Media Inc.hasn’t been profitable in six years as a public company. Deezer SA, a European service once seen as a Spotify rival, called off an initial public offering in 2015. If you don’t remember Grooveshark, MOG, Songza, or Rdio, it’s because they shut down or were bought by larger companies. Meanwhile, the tech giants don’t mind losing money on music if it helps sell other stuff
Ek is optimistic. “The music industry today is quite inefficient when it comes to breaking artists, when it comes to promoting and marketing artists,” he said at the investor presentation. “There is a tremendous opportunity in connecting these 3 million artists we have today with these 160 million-plus users that we have.” The question now is whether investors think he can do that and how much profit he can wring out each time he does.