Posts Tagged ‘privacy’

CIA hacks

WikiLeaks: Here’s how the CIA hacks your phones, TVs and PCs

The organization released thousands of documents it claims show how the US spy agency can crack open devices from Apple, Samsung, Google and Microsoft.

  https://www.cnet.com/news/wikileaks-cia-hacking-tools-phones-apple-samsung-microsoft-google/

This debate took off when the US Department of Justice sought to require Apple to help it open an encrypted iPhone belonging to one of the San Bernardino shooters. After Apple fought back in court, the FBI said it had obtained another way to access the phone.

Apple, Google and Motorola declined to comment on WikiLeaks’ claims. Samsung didn’t respond to a request for comment.

“The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,” said Moxie Marlinspike, the founder of Signal. “This story isn’t about Signal or WhatsApp, but to the extent that it is, we see it as confirmation that what we’re doing is working.”

Telegram said on its website that the problem lies with operating systems and not encrypted messaging apps and that naming specific encrypted services is “misleading.” WhatsApp declined to comment.

+++++++++++++++++++++++++++++++
more on surveillance in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance

cyberwarfare

How to define cyber-enabled economic warfare

By Sean D. Carberry Feb 23, 2017

https://fcw.com/articles/2017/02/23/critical-ceew-cyber-carbery.aspx

“Framework and Terminology for Understanding Cyber-Enabled Economic Warfare,” a new report by Samantha F. Ravich and Annie Fixler for the Foundation for Defense of Democracies.

Cyber-enabled economic warfare is a “hostile strategy involving attack(s) against a nation using cyber technology with the intent to weaken its economy and thereby reduce its political and military power.”

For example, China’s economic theft of intellectual property from the U.S. is considered CEEW, along with Russia’s cyberattack on Estonia and Iran’s Saudi Aramco attack. The authors also contend that the U.S. sanctions on Iran using cyber means to cut off Society for Worldwide Interbank Financial Telecommunication access also falls under CEEW.

http://www.defenddemocracy.org/content/uploads/documents/22217_Cyber_Definitions.pdf

+++++++++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

confide app

White House staffers are using this self-destructing messages app to gossip in private — here’s how it works

+++++++++++++++
more on social media in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media

tech in China

The uncomfortable truth about tech in China

By Steve Kelman https://fcw.com/blogs/lectern/2017/02/kelman-china-innovation.aspx

Only recently, the general view in the U.S. was that the less-free Chinese system created a poor environment for tech innovation. Put somewhat simply, the argument was that in a society without our kind of freedom of speech or unrestricted access to communication such as the Internet, people would miss out on information and ideas that come from a free system and feel more psychologically constrained from venturing off the beaten path with innovative ideas. The Chinese would be limited, in this view, to knock-offs of U.S. technologies.

The government has also cracked down on use of virtual private networks that Chinese, especially young people, have used to “climb the wall” (i.e. find sites outside the “Great Firewall of China”). And recently, there were media complaints that at the top elite universities such as Tsinghua the anti-VPN policy was not being enforced strictly enough.

Clearly, though, Chinese progress has taken place despite these restrictions.

we should not naively assume that all good (or bad) things go together. Maybe freedom of political and cultural expression is not as important as we have thought for advances, say, in information technology. But it still might be more important for development of less technical or scientific ideas such as public policy proposals or cultural expressions.

+++++++++++++++++++++
more on virtual networks for civic activities
https://blog.stcloudstate.edu/ims/2014/09/30/disruptive-technologies-from-swarming-to-mesh-networking/

FBI can hack computers

This rule basically gives the FBI power to hack anyone

https://www.facebook.com/NowThisFuture/videos/1249249875165134/

Last-ditch effort to prevent changes to law enforcement hacking rule fails

++++++++++++++++++++
surveillance and privacy in this IMS bloghttps://blog.stcloudstate.edu/ims?s=surveillance

signal open whisper system

signal app
open whisper system is the company
download from the NPR Marketplace Tech available here:
http://play.podtrac.com/APM-MarketplaceTechReport/play.publicradio.org/rss/d/podcast/marketplace/tech_report/2016/11/16/tech_20161116_pod_64.mp3?siteplayer=true&dl=1

More on the app in the Codebreaker podcast

++++++++++++++++++++++++++++
more on cybersecurity in this blog:
https://blog.stcloudstate.edu/ims?s=cybersecurity
More on civil disobedience in this blog:
https://blog.stcloudstate.edu/ims?s=civil

 

private versus government

Hayden calls Russian email hack ‘honorable state espionage’

By Matt Leonard Oct 18, 2016

https://fcw.com/articles/2016/10/18/hayden-email-espionage.aspx?

The Department of Homeland Security and the Office of the Director of National Intelligence issued a joint statement earlier this month that condemned Russia for the attacks.

“Do not drop this in the cyber problem box, drop this in the Russia problem box,” Hayden suggested, saying the focus should be on the actor, not the means. “And by the way, that Russian problem box needs a bigger box, there’s a lot of stuff going on.”

Though there are aspects of cybersecurity that only government can handle, most of it will be driven by the private industry, Hayden said. Government can help the private sector by getting out of the way — removing liability, enabling legal protections, sharing information and redoing the classification system.

And since the government too depends on the private sector for security innovation, Hayden said he sides with Apple regarding whether the company should have to create a back door for the FBI to bypass iPhone encryption.

+++++++++++++++++

more on surveillance, government in this IMS blog:

https://blog.stcloudstate.edu/ims?s=surveillance

ALA resources for social media in libraries

Social media basics: Engaging your library users

http://www.ala.org/news/press-releases/2014/10/social-media-basics-engaging-your-library-users

Managing Traditional & Social Media for Libraries

http://www.ala.org/pla/onlinelearning/webinars/archive/media

Use of Social Media in the Library

http://www.ala.org/alcts/confevents/upcoming/webinar/121014

Social media has the potential to facilitate much closer relationships between libraries and their patrons. Current usage of social media by the library community generally remains ad hoc and somewhat experimental, but the uptake of these tools is accelerating, and they will likely play an increasingly important role in library service provision and outreach in the future. Taylor & Francis has produced a white paper that analyzes current practices relating social media’s use in the library and how this differs by librarian job role. The sample was taken from academic librarians around the world, which also allows us to examine differences by geographic location. The goal: to establish how librarians are currently using social media in their roles, the most useful social media tools and best applications for these tools in a library setting.

bit.ly/LibrarySM
http://www.tandf.co.uk/journals/access/white-paper-social-media.pdf
http://downloads.alcts.ala.org/ce/141012socialmedialibrary_Slides.pdf

Academic Libraries

http://www.ala.org/news/state-americas-libraries-report-2014/academic-libraries

Learn to plan and strategize for ‘A More Effective Social Media Presence’ in new workshop

http://www.ala.org/news/press-releases/2012/08/learn-plan-and-strategize-more-effective-social-media-presence-new-workshop

Using social media to find collaboration, coordination and focus

http://www.ala.org/news/press-releases/2012/11/using-social-media-find-collaboration-coordination-and-focus promotes http://store.elsevier.com/Managing-Social-Media-in-Libraries/Troy-Swanson/isbn-9781780633770/

Rethinking social media to organize information and communities, popular eCourse returns!

http://www.ala.org/news/member-news/2016/02/rethinking-social-media-organize-information-and-communities-popular-ecourse

explores a variety of social media tools in terms of how they can be used to organize information and communities. Together, you will survey and use a variety of social media tools, such as Delicious, Diigo, Facebook, Goodreads, Google Hangouts, LibraryThing, Pinterest, Storify, Twitter, and more! You will also explore how social media tools can be used to organize and disseminate information and how they can be used to foster and sustain communities of learning.

Web_Analytics_Part1–Turning_Numbers_Into_Action–1-20-2011 from Paul Signorelli

In age of Social Media U.S. libraries encourage users to choose privacy

http://www.ala.org/news/news/pressreleases2010/april2010/privacy_pio

User-Generated Content in Library Discovery Systems

http://www.ala.org/advocacy/user-generated-content-library-discovery-systems

With the widespread use of library technology that incorporates social media components, intelligent objects, and knowledge-sharing tools comes the ability of libraries to provide greater opportunities for patron engagement in those discovery systems through user-generated content.  These features may include the ability of users to contribute commentary such as reviews, simple point-and-click rating systems (e.g. one star to five stars), or to engage in extensive discussions or other social interactions. This kind of content could transform authoritative files, alter information architecture, and change the flow of information within the library discovery system.

Privacy Shifting

http://www.ala.org/transforminglibraries/future/trends/privacy

Across generations, concerns for privacy may dissipate with time as specific technologies take hold or as people become aware of a technology’s benefits and value those over their value for privacy.

Library Privacy Guidelines for Students in K-12 Schools

http://www.ala.org/advocacy/library-privacy-guidelines-students-k-12-schools

my note: excellent blueprint for similar activities / policies at higher ed.

students privacy and social media

http://wpri.com/2015/11/14/bill-seeks-to-shield-students-social-media-info/

The proposed social media privacy law, scheduled to be considered by the state Senate Wednesday, bars any institution from asking or requiring an applicant or enrolled student to disclose a user name or password for a personal social media account.

Under the bill, a student could also not be prevented from participating in extracurricular activities if they refuse to disclose social media accounts or provide a list of contacts associated with those accounts.

+++++++++
more on privacy in this IMS blog:

https://blog.stcloudstate.edu/ims?s=privacy

classroom discussions on privacy

Dear colleagues,

the topics of privacy pertaining technology is becoming ubiquitous.
If you feel that the content of your class material can benefit of such discussions, please let us know.

Please have  some titles, which can help you brainstorm topics for discussions in your classes:

Power, Privacy, and the Internet
https://blog.stcloudstate.edu/ims/2015/12/03/power-privacy-internet/

Privacy groups slam Department of Homeland Security social media proposal
https://blog.stcloudstate.edu/ims/2016/08/24/dhs-social-media-proposal/

FBI quietly changes its privacy rules for accessing NSA data on Americans
https://blog.stcloudstate.edu/ims/2016/03/09/surveillance-and-privacy/

Facebook canceled a student’s internship after he highlighted a massive privacy issue
https://blog.stcloudstate.edu/ims/2015/08/17/facebook-and-privacy/

Samsung’s Privacy Policy Warns Customers Their Smart TVs Are Listening
https://blog.stcloudstate.edu/ims/2015/02/10/privacy-smart-devices/

Teenagers, The Internet, And Privacy
https://blog.stcloudstate.edu/ims/2014/11/05/teenagers-the-internet-and-privacy/

Online privacy: It’s time for a new security paradigm
https://blog.stcloudstate.edu/ims/2014/09/25/online-privacy-its-time-for-a-new-security-paradigm/

On social media, privacy, etc.
https://blog.stcloudstate.edu/ims/2014/03/14/on-social-media-privacy-etc/

Hacking the Future: Privacy, Identity, and Anonymity On the Web
https://blog.stcloudstate.edu/ims/2013/12/03/hacking-the-future-privacy-identity-and-anonymity-on-the-web/

Are We Puppets in a Wired World?
https://blog.stcloudstate.edu/ims/2013/10/23/pro-domo-sua-are-we-puppets-in-a-wired-world-surveillance-and-privacy-revisited/

How Teens Deal With Privacy and Mobile Apps
https://blog.stcloudstate.edu/ims/2013/08/28/how-teens-deal-with-privacy-and-mobile-apps/

If you seek  more tangible, hands-on assistance with similar and/or any topics regarding technology, please do not hesitate to contact us.

1 6 7 8 9 10 11