Category Archives: internet

Human Rights Watch: Turkey’s YouTube block violates free expression

o13-iconHuman Rights Watch: The Turkish government’s decision to close down YouTube by administrative order is a disastrous move for freedom of expression and the right to access information in Turkey. The government similarly closed down Twitter on March 21. The restrictions violate Turkey’s obligations under international human rights law and domestic law.

The closure of YouTube by a decision of Turkey’s Telecommunications Communication Directorate came shortly after two leaked conversations were posted on the site. The conversations purported to be the foreign minister, his undersecretary, the head of the National Intelligence Agency, and deputy chief of staff of the Turkish Armed Forces discussing Turkey’s Syria policy.

“The decision to close down a whole website because of some content is arbitrary, disproportionate, and a flagrant violation of free speech and the right to access information online,” said Emma Sinclair-Webb, senior researcher for Turkey at Human Rights Watch. “The order blocking YouTube should be reversed immediately, and access to Twitter restored without delay.” [Continue reading…]

Facebooktwittermail

The Internet is broken: SEC probes threat from cyber attacks against Wall Street

n13-iconBloomberg reports: The U.S. Securities and Exchange Commission is examining the exposure of stock exchanges, brokerages and other Wall Street firms to cyber-attacks that have been called a threat to financial stability.

The SEC held a roundtable discussion of those risks in Washington today as it weighs a proposal to require stock exchanges to protect their critical technology and tell members about breaches of important systems. More than half of exchanges surveyed globally in 2012 said they experienced a cyber-attack, while 67 percent of U.S. exchanges said a hacker tried to penetrate their systems.

Dennis Fisher writes: Costin Raiu is a cautious man. He measures his words carefully and says exactly what he means, and is not given to hyperbole or exaggeration. Raiu is the driving force behind much of the intricate research into APTs and targeted attacks that Kaspersky Lab’s Global Research and Analysis Team has been doing for the last few years, and he has first-hand knowledge of the depth and breadth of the tactics that top-tier attackers are using.

So when Raiu says he conducts his online activities under the assumption that his movements are being monitored by government hackers, it is not meant as a scare tactic. It is a simple statement of fact.

“I operate under the principle that my computer is owned by at least three governments,” Raiu said during a presentation he gave to industry analysts at the company’s analyst summit here on Thursday.

The comment drew some chuckles from the audience, but Raiu was not joking. Security experts for years have been telling users — especially enterprise users — to assume that their network or PC is compromised. The reasoning is that if you assume you’re owned then you’ll be more cautious about what you do. It’s the technical equivalent of telling a child to behave as if his mother is watching everything he does. It doesn’t always work, but it can’t hurt.

Raiu and his fellow researchers around the world are obvious targets for highly skilled attackers of all stripes. They spend their days analyzing new attack techniques and working out methods for countering them. Intelligence agencies, APT groups and cybercrime gangs all would love to know what researchers know and how they get their information. Just about every researcher has a story about being attacked or compromised at some point. It’s an occupational hazard.

But one of the things that the events of the last year have made clear is that the kind of paranoia and caution that Raiu and others who draw the attention of attackers employ as a matter of course should now be the default setting for the rest of us, as well. As researcher Claudio Guarnieri recently detailed, the Internet itself is compromised. Not this bit or that bit. The entire network. [Continue reading…]

Last year, CSIS reported: After years of guesswork and innumerable attempts to quantify the costly effects of cybercrime on the U.S. and world economies, McAfee engaged one of the world’s preeminent international policy institutions for defense and security, the Center for Strategic and International Studies (CSIS) to build an economic model and methodology to accurately estimate these losses, which can be extended worldwide. “Estimating the Cost of Cybercrime and Cyber Espionage” posits a $100 billion annual loss to the U.S. economy and as many as 508,000 U.S. jobs lost as a result of malicious cyber activity.

Facebooktwittermail

Catherine Crump and Matthew Harwood: The net closes around us

Twice in my life — in the 1960s and the post-9/11 years — I was suddenly aware of clicks and other strange noises on my phone.  In both periods, I’ve wondered what the story was, and then made self-conscious jokes with whoever was on the other end of the line about those who might (or might not) be listening in.  Twice in my life I’ve felt, up close and personal, that ominous, uncomfortable, twitchy sense of being overheard, without ever knowing if it was a manifestation of the paranoia of the times or of realism — or perhaps of both.

I’m conceptually outraged by mass surveillance, but generally my personal attitude has always been: Go ahead.  Read my email, listen to my phone calls, follow my web searches, check out my location via my cell phone.  My tweets don’t exist — but if they did, I’d say have at ‘em.  I don’t give a damn.

And in some sense, I don’t, even though everyone, including me, is embarrassed by something.  Everyone says something about someone they would rather not have made public (or perhaps have even said).  Everyone has some thing — or sometimes many things — they would rather keep to themselves.

Increasingly, however, as the U.S. surveillance state grows ever more pervasive, domestically and globally, as the corporate version of the same expands exponentially, as prying “eyes” and “ears” of every technological variety proliferate, the question of who exactly we are arises.  What are we without privacy, without a certain kind of unknowability?  What are we when “our” information is potentially anyone’s information?  We may soon find out.  A recent experiment by two Stanford University graduate students who gathered just a few month’s worth of phone metadata on 546 volunteers has, for instance, made mincemeat of President Obama’s claim that the NSA’s massive version of metadata collection “is not looking at people’s names and they’re not looking at content.”  Using only the phone metadata they got, the Stanford researchers “inferred sensitive information about people’s lives, including: neurological and heart conditions, gun ownership, marijuana cultivation, abortion, and participation in Alcoholics Anonymous.”

And that’s just a crude version of what the future holds for all of us.  There are various kinds of extinctions.  That superb environmental reporter Elizabeth Kolbert has just written a powerful book, The Sixth Extinction, about the more usual (if horrifying) kind.  Our developing surveillance world may offer us an example of another kind of extinction: of what we once knew as the private self.  If you want to be chilled to the bone when it comes to this, check out today’s stunning report by the ACLU’s Catherine Crump and Matthew Harwood on where the corporate world is taking your identity. Tom Engelhardt

Invasion of the data snatchers
Big Data and the Internet of Things means the surveillance of everything
By Catherine Crump and Matthew Harwood

Estimates vary, but by 2020 there could be over 30 billion devices connected to the Internet. Once dumb, they will have smartened up thanks to sensors and other technologies embedded in them and, thanks to your machines, your life will quite literally have gone online. 

The implications are revolutionary. Your smart refrigerator will keep an inventory of food items, noting when they go bad. Your smart thermostat will learn your habits and adjust the temperature to your liking. Smart lights will illuminate dangerous parking garages, even as they keep an “eye” out for suspicious activity.

Techno-evangelists have a nice catchphrase for this future utopia of machines and the never-ending stream of information, known as Big Data, it produces: the Internet of Things.  So abstract. So inoffensive. Ultimately, so meaningless.

A future Internet of Things does have the potential to offer real benefits, but the dark side of that seemingly shiny coin is this: companies will increasingly know all there is to know about you.  Most people are already aware that virtually everything a typical person does on the Internet is tracked. In the not-too-distant future, however, real space will be increasingly like cyberspace, thanks to our headlong rush toward that Internet of Things. With the rise of the networked device, what people do in their homes, in their cars, in stores, and within their communities will be monitored and analyzed in ever more intrusive ways by corporations and, by extension, the government.

And one more thing: in cyberspace it is at least theoretically possible to log off.  In your own well-wired home, there will be no “opt out.”

Continue reading

Facebooktwittermail

Yes, we ban: Deconstructing Erdogan’s language

o13-iconZeynep Zileli Rabanea writes: When it comes to being resourceful to overcome challenges, Turks always find a way. They have the humour, quick wittedness, and a soul rebellious enough to make their voice heard. But most importantly they have experience with censorship and bullying intimidation tactics by those in power.

On March 20, Facebook was full of numbers posted by Turkish users. The call was for Twitter users to change their DNS settings to 8.8.8.8 – 8.8.4.4 in order to continue having access to the widely used social media site in Turkey, which had been shut down upon Prime Minister Recep Tayyip Erdogan’s orders. Twitter’s “crime” was being the platform where audio recordings showing corruption in Erdogan’s inner circle were circulating.
With a week left before municipal elections in Turkey, Erdogan’s decision is not a foolish move politically. Erdogan had come to power in the first place by cleverly playing on Turkish people’s sense of pride, and now relies again on the same “us against them” strategy.

Although Erdogan has many critics because of his actions of intimidation, he has just as many supporters who get off on his talks that tap into the country’s long felt inferiority complex against the West, and at home against the western half of Turkey.

One of Erdogan’s talents is knowing how to play on the weaknesses of his public. This was exactly the message in a speech delivered one week before the elections: “Twitter, schmitter! We will wipe out all of these… The International community can say this or that. I don’t care at all. Everyone will see how powerful the Republic of Turkey is.”

A statement which received cheers from a frenzied audience. [Continue reading…]

Facebooktwittermail

Erdogan blocks Twitter. #ErdoganBlockedTwitter now trending — in Turkey

Hurriyet Daily News reports: The number of messages tweeted by users in Turkey has not dropped since access to Twitter was banned, statistics have shown. What’s more, the hashtags #TwitterisblockedinTurkey and #TurkeyBlockedTwitter became trending topics worldwide only a few hours after Prime Minister Recep Tayyip Erdoğan announced his intention to “wipe out” the microblogging website.

According a report from Twitturk, which records the statistics of Turkish Twitter users, over half a million tweets were posted in just 10 hours, despite the ban.

That number would mark no sharp fall from the average number of tweets posted in the country, which is around 1.8 million per day.

“I don’t care what the international community says. Everyone will witness the power of the Turkish Republic’s state,” Erdoğan said when he announced the ban.

Everyone is now witnessing the power of the state and the fact that it is less than Turkey’s prime minister seems to have imagined.

What that seems to imply is that when Erdoğan issued his order, no one around him had the guts to tell him it wouldn’t work.

Either that, or they purposefully set him up, knowing that this show of strength would quickly become a very public display of his impotence.

Facebooktwittermail

Hours after Erdoğan’s threat, Turkish gov’t restricts access to Twitter

Erdogan "We Will Root Out Twitter" & the historical pigeon carrier symbolising other social media formsToday’s Zaman reports: Hours after Turkish Prime Minister Tayyip Erdoğan threatened to shut down Twitter and other social media platforms, government has restricted access to Twitter in most parts of the country, citing a court ruling on Thursday.

During a rally, Erdoğan said he did not care about the international response, his latest outburst in an increasingly bitter election campaign.

Hours after his threat, the Turkish government rushed to partially restrict access to Twitter, sparking public outrage on social media as people sought ways to avoid the restriction.

Thousands of tweets flooded in Twitter, vehemently criticizing the government ban. With partial ban on Twitter, Turkey now stands along with countries such as N.Korea, China, Saudi Arabia, Iran and Russia on internet freedom. [Continue reading…]

Facebooktwittermail

Facebook’s DeepFace will soon be analyzing your face

n13-iconPolicyMic: Facebook is officially one step closer to becoming Big Brother. Last week, the company announced a new, startlingly accurate photo recognition program, ominously called DeepFace.

The program can compare two photos and determine whether they are of the same person with 97.25% accuracy — just a hair below the 97.53% facial recognition rate of actual human beings.

DeepFace goes way beyond Facebook’s current facial recognition that suggests tags for images. [Continue reading…]

Facebooktwittermail

U.S. listed as enemy of the internet

a13-iconReporters Without Borders: Natalia Radzina of Charter97, a Belarusian news website whose criticism of the government is often censored, was attending an OSCE-organized conference in Vienna on the Internet and media freedom in February 2013 when she ran into someone she would rather not have seen: a member of the Operations and Analysis Centre, a Belarusian government unit that coordinates Internet surveillance and censorship. It is entities like this, little known but often at the heart of surveillance and censorship systems in many countries, that Reporters Without Borders is spotlighting in this year’s Enemies of the Internet report, which it is releasing, as usual, on World Day Against Cyber-Censorship (12 March).

Identifying government units or agencies rather than entire governments as Enemies of the Internet allows us to draw attention to the schizophrenic attitude towards online freedoms that prevails in in some countries. Three of the government bodies designated by Reporters Without Borders as Enemies of the Internet are located in democracies that have traditionally claimed to respect fundamental freedoms: the Centre for Development of Telematics in India, the Government Communications Headquarters (GCHQ) in the United Kingdom, and the National Security Agency (NSA) in the United States.

The NSA and GCHQ have spied on the communications of millions of citizens including many journalists. They have knowingly introduced security flaws into devices and software used to transmit requests on the Internet. And they have hacked into the very heart of the Internet using programmes such as the NSA’s Quantam Insert and GCHQ’s Tempora. The Internet was a collective resource that the NSA and GCHQ turned into a weapon in the service of special interests, in the process flouting freedom of information, freedom of expression and the right to privacy.

The mass surveillance methods employed in these three countries, many of them exposed by NSA whistleblower Edward Snowden, are all the more intolerable because they will be used and indeed are already being used by authoritarians countries such as Iran, China, Turkmenistan, Saudi Arabia and Bahrain to justify their own violations of freedom of information. How will so-called democratic countries will able to press for the protection of journalists if they adopt the very practices they are criticizing authoritarian regimes for? [Continue reading…]

Facebooktwittermail

Can we trust an Internet that’s become a weapon of governments?

f13-iconMIT Technology Review: Security experts have been warning for some time that computer networks are not secure from intruders. But in 2013, we learned that the mayhem has become strategic. Governments now write computer viruses. And if they can’t, they can purchase them. A half-dozen boutique R&D houses, like Italy’s Hacking Team, develop computer vulnerabilities and openly market them to government attackers.

Criminals use common computer weaknesses to infect as many machines as possible. But governments assemble large research teams and spend millions patiently pursuing narrow objectives. ­Costin Raiu, who investigates such “advanced persistent threats” as director of research and analysis for anti-virus company Kaspersky Lab, says he logs on to his computer assuming he is not alone. “I operate under the principle that my computer is owned by at least three governments,” he says.

That is a threat mainstream technology companies are grappling with. The U.S. government circumvented Google’s security measures and secretly collected customer data. British spies scooped up millions of webcam images from Yahoo. In December, on Microsoft’s official blog, the company’s top lawyer, Brad Smith, said he had reason to view surreptitious “government snooping” as no different from criminal malware. Microsoft, along with Google and Yahoo, has responded by greatly widening its use of encryption (see “The Year of Encryption”).

“We’re living in a very interesting time, where companies are becoming unwilling pawns in cyberwarfare,” says Menny Barzilay, a former Israeli intelligence officer now working in IT security for the Bank Hapoalim Group, in Tel Aviv. In this new context, nobody can say where the responsibilities of a company may end and those of a nation might begin. Should a commercial bank be expected to expend resources to defend itself when its attacker is a country? “This is not a ‘maybe’ situation. This is happening right now,” says Barzilay. “And this is just the beginning.” [Continue reading…]

Facebooktwittermail

Compare the NSA’s Facebook malware denial to its own secret documents

f13-iconRyan Gallagher writes: On Wednesday, Glenn Greenwald and I revealed new details about the National Security Agency’s efforts to radically expand its ability to hack into computers and networks across the world. The story has received a lot of attention, and one detail in particular has sparked controversy: specifically, that the NSA secretly pretended to be a fake Facebook server in order to covertly infect targets with malware “implants” used for surveillance.

This revelation apparently infuriated Facebook founder Mark Zuckerberg so much that he got on the phone to President Barack Obama to complain about it. “I’ve been so confused and frustrated by the repeated reports of the behavior of the US government,” Zuckerberg wrote in a blog post Thursday. “When our engineers work tirelessly to improve security, we imagine we’re protecting you against criminals, not our own government.”

That wasn’t all. Wired ran a piece saying that the NSA’s widespread use of its malware tools “acts as implicit permission to others, both nation-state and criminal.” Slate noted that the NSA’s hacking platform appears to be “becoming a bit more like the un-targeted dragnets everyone has been so upset about.” Meanwhile, Ars Technica wrote that the surveillance technology we exposed “poses a risk to the entire Internet.”

In response, the NSA has attempted to quell the backlash by putting out a public statement dismissing what it called “inaccurate” media reports. The agency denied that it was “impersonating U.S. social media or other websites” and said that it had not “infected millions of computers around the world with malware.” The statement follows a trend that has repeatedly been seen in the aftermath of major disclosures from documents turned over by NSA whistleblower Edward Snowden, in which the NSA or one of its implicated allies issues a carefully worded non-denial denial that on the face of it seems to refute an allegation but on closer inspection does not refute it at all. [Continue reading…]

Facebooktwittermail

Blackwater in Ukraine? No, it was Alpha

Yesterday I laid out a timeline suggesting how the Blackwater-in-Ukraine story may have evolved. I did not, however, attempt to identify the armed men in the video that has kept this rumor alive in social media.

Thanks to a reader who said that the Ukrainian press identified the armed men as “Спецназ (Alpha) СБУ,” I have been able to piece together the story.

The elite Alpha special operations unit is attached to the Security Service of Ukraine.

The reason for their appearance outside the regional administrative building in Donetsk was given in the following local press report, Преступности.Нет (English version):

In Donetsk day 3 March during the seizure of the regional state administration of protesters attacked the ex-Governor of area Andrey shishatskiy.

It is reported by channel «Donbass» on his Youtube page.

So, the footage shows a group of people, among them people with the Russian flag in his hands, and beat former Governor of Donetsk region Shishatskiy.

According to the TV company, beat it from the attackers, interferes with the police and the special forces of the security service of Ukraine covers of his departure.

As is known, today the building of the Donetsk regional Council were captured by a group of Pro-Russian activists, who declared about the illegitimacy of Kyiv and declared himself the new authorities in Donetsk region.

This is the video showing former Governor Shishatskiy being attacked. Although the Alpha unit is not shown, they can be seen in another news report on the same incident.

alpha-donetsk

Before any of the dozens of copies of the video labelled “USA military mercenary BlackWater in Ukraine (Donetsk)” appeared on YouTube, the same video had been posted with this title: “Alpha” – Donetsk. 03/03/2014. The video’s description says: “After the Russian provocations, Special Forces of Alpha security appeared in Donetsk.”

No mention of Blackwater.

Facebooktwittermail

Turkish government seeks legal power to shut down any website in four hours

o13-iconSemih Idiz writes: Prime Minister Recep Tayyip Erdogan has tried hard to bring the Turkish media under government control, succeeding to a significant extent by getting crony businessmen to buy major national dailies and television channels.

Turkey has nevertheless remained an open society to a large extent with regard to the flow of information to the public, due not only to the independent portion of the media that continues to resist government pressures but also the Internet, and particularly social media.

It is no surprise then that the Internet should have become the bane of Erdogan’s life, particularly after taped conversations implicating him and members of his government in massive corruption allegations started appearing on video sharing sites.

Kadri Gursel’s March 7 post for Al-Monitor gives details about a voice recording leaked in this way, which has provided more fodder for his political rivals just as his Justice and Development Party (AKP) heads for crucial local elections at the end of this month.

Erdogan’s troubles with social media began after last summer’s Gezi Park protests in Istanbul, and the following nationwide anti-government riots during which many people were mobilized through Twitter, the social networking service.

“There is now a scourge called Twitter. The biggest lies can be found there. This thing called social media is currently the worst menace to society,” Erdogan complained bitterly on June 2, 2013.

Aware of the growing political threat to itself from social media, the Erdogan government introduced a draconian Internet law that effectively allows the head of Turkish Telecommunications Directorate (TIB), a government appointee, to close down any Internet site in four hours. [Continue reading…]

Facebooktwittermail

Erdogan says Turkey may ban Facebook, YouTube over wiretaps

n13-iconReuters reports: Prime Minister Tayyip Erdogan has threatened to ban Facebook and YouTube in Turkey in an attempt to stop political foes anonymously posting audio recordings purportedly exposing corruption and other malpractices in his inner circle.

In the latest recording, released on YouTube late Thursday, Erdogan is purportedly heard berating a newspaper owner over the telephone about an article and suggesting the journalists be sacked, in comments that will further stoke concerns over media freedom and Erdogan’s authoritarian style of leadership.

Erdogan, who rejects any accusations of corruption, blames U.S.-based Turkish Muslim preacher Fethullah Gulen, a former ally, for the wiretaps which he says have been “fabricated”. Gulen, who denies any involvement, has many followers in Turkey, especially in the police and judiciary. [Continue reading…]

Facebooktwittermail

Ukrainian activists work to counter Russian narrative on social networks

a13-iconRobert Mackey reports: Faced with what they call misleading reports on Russian state television that ethnic-nationalist violence is sweeping Ukraine, Internet-savvy Ukrainian activists drew attention on Sunday to video and images posted online that showed street protests in support of the new government in Kiev, and acts of violence instigated by men waving the Russian flag.

Video uploaded to the Euromaidan protest movement’s YouTube channel showed demonstrators in the eastern city of Dnipropetrovsk singing Ukraine’s national anthem on Sunday, one day after the Russian flag was raised there by ethnic Russians.

The activists also shared photographs on Twitter of young men volunteering to defend Ukraine against the threatened Russian invasion in the same city, and a rally in support of the interim government in Zaporizhzhya and Odessa, where pro-Russia demonstrators had also gathered the day before. [Continue reading…]

Facebooktwittermail

Big data has outpaced our legal system’€™s ability to control it

f13-iconNeil Richards writes: These days, everyone seems to be talking about “big data.” Engineers, researchers, lawyers, executives and self-trackers all tout the surprising insights they can get from applying math to large data sets. The rhetoric of big data is often overblown, exaggerated and contradictory, but there’s an element of truth to the claim that data science is helping us to know more about our world, our society and ourselves.

Data scientists use big data to deliver personalized ads to Internet users, to make better spell checkers and search engines, to predict weather patterns, perform medical research, learn about customers, set prices and plan traffic flow patterns. Big data can also fight crime, whether through the use of automated license-plate readers or, at least theoretically, through the collection of vast amounts of “metadata” about our communications and associations by the National Security Agency.

Big data allows us to know more, to predict and to influence others. This is its power, but it’s also its danger. The entities that can harness the power of math applied to large sets of personal information can do things that used to be impossible. Many of these new uses are good, but some of them aren’t. For example, if our “personalized prices” can be based on our race or sex, or if our college admissions are based on things like ZIP code or car ownership, we might want to think more deeply about the kinds of big decisions our big data can be used for. We’re creating a society based on data, and we need to make sure that we create a society that we want to live in. [Continue reading…]

Facebooktwittermail

Watch: Zeynep Tufekci on social media-fueled protest style from Arab Spring to Gezi protests in Turkey

a13-iconWhat can we learn from the protest wave of the last years? How does social media impact the capacity for collective action? Does social media contribute to blunting movement impacts by facilitating horizontal, non-institutional and “leaderless” movements? How do these movements compare with their predecessors like the civil-rights or anti-colonial movements? In this talk Zeynep Tufekci — assistant professor at the University of North Carolina, a faculty associate at Berkman Center for Internet & Society, and a fellow at the Center for Information Technology Policy at Princeton University — discusses these questions by drawing from research on a variety of social movements including the “Arab Spring”, European indignados movements, Occupy and Turkey’s Gezi protests. (October 15, 2013, Berkman Center for Internet & Society, Harvard University.)

Facebooktwittermail

How people are becoming the property of technology companies

o13-iconFollowing Facebook’s $19 billion dollar acquisition of WhatsApp, Reuven Cohen writes: In November 2013, a survey of smartphone owners found that WhatsApp was the leading social messaging app in countries including Spain, Switzerland, Germany and Japan. Yet at 450 million users and growing, there is a strong likelihood that both Facebook and WhatsApp share the majority of the same user base. So what’s driving the massive valuation? One answer might be users attention. Unlike many other mobile apps, WhatsApp users actually use this service on an ongoing daily or even hourly basis.

“Attention,” write Thomas Mandel and Gerard Van der Leun in their 1996 book Rules of the Net, ”is the hard currency of cyberspace.” This has never been truer.

WhatsApp’s value may not have much to do with the disruption of the telecom world as much as a looming battle for Internet users rapidly decreasing attention spans. A study back in 2011 uncovered the reality for most mobile apps. Most people never use an app more than once. According to the study, 26% of the time customers never give the app a second try. With an ever-increasing number of apps competing for users attention, the only real metric that matters is whether or not they actual use it. Your attention may very well be the fundamental value behind Facebook’s purchase.

In a 1997 Wired article, author Michael H. Goldhaber describes the shift towards the so called Attention Economy; “Attention has its own behavior, its own dynamics, its own consequences. An economy built on it will be different than the familiar material-based one.” writes Goldhaber.

His thesis is that as the Internet becomes an increasingly strong presence in the overall economy and our daily lives, the flow of attention will not only anticipate the flow of money, but also eventually replace it altogether. Fast-forward 17 years and his thesis has never been more true.

As we become ever more bombarded with information, the value of this information decreases. Just look at the improvements made to Facebook’s news feed over the years. In an attempt to make its news feed more useful, the company has implement-advanced algorithms that attempt to tailor the flow of information to your specific interests. The better Facebook gets at keeping your attention, the more valuable you become. Yes, you are the product. [Continue reading…]

To the extent that corporations are in the business of corralling, controlling, and effectively claiming ownership of people’s attention, the only way of finding freedom in such a world will derive from each individual’s effort to cultivate their own powers of autonomous attention.

Facebooktwittermail

It’s time to rethink our nightmares about surveillance

f13-iconThis is an excerpt from Zeynep Tufekci’s article at Matter — but don’t just read this, read her whole piece: I was in Philadelphia when the protests in Istanbul exploded, at a gathering called Data-Crunched Democracy, hosted by the Annenberg School for Communication at the University of Pennsylvania. It was supposed to be exciting, and a little contentious. But I’m also a scholar of social movements and new technologies. I’d visited Tahrir, the heart of the Egyptian uprising, and Zuccotti Square, the birthplace of the Occupy movement. And now new technology was helping to power protests in Istanbul, my hometown. The epicenter, Gezi Park, is just a few blocks from the hospital where I was born.

So there I was, at a conference I had been looking forward to for months, sitting in the back row, tweeting about tear gas in Istanbul.

A number of high-level staff from the data teams of the Obama and Romney campaigns were there, which meant that a lot of people who probably did not like me very much were in the room. A few months earlier, in an op-ed in the New York Times, I’d argued that richer data for the campaigns could mean poorer democracy for the rest of us. Political campaigns now know an awful lot about American voters, and they will use that to tailor the messages we see — to tell us the things we want to hear about their policies and politicians, while obscuring messages we may dislike.

Of course, these tactics are as old as politics. But the digital era has brought new ways of implementing them. Pointing this out had earned me little love from the campaigns. The former data director on the Obama campaign, writing later in the Times, caricatured and then dismissed my concerns. He claimed that people thought he was “sifting through their garbage for discarded pages from their diaries” — a notion he described as a “bunch of malarkey.” He’s right: Political campaigns don’t rummage through trashcans. They don’t have to. The information they want is online, and they most certainly sift through it.

What we do know about their use of “big data” — the common shorthand for the massive amounts of data now available on everyone — is worrisome. In 2012, again in the Times, reporter Charles Duhigg revealed that Target can often predict when a female customer is pregnant, often in the first 20 weeks of pregnancy, and sometimes even before she has told anyone. This is valuable information, because childbirth is a time of big change, including changes in consumption patterns. It’s an opportunity for brands to get a hook into you — a hook that may last decades, as over-worked parents tend to return to the same brands out of habit. Duhigg recounted how one outraged father, upset at the pregnancy- and baby-related coupons Target had mailed to his teenage daughter, visited his local store and demanded to see the manager. He got an apology, but later apologized himself: His daughter, it turned out, was pregnant. By analyzing changes in her shopping — which could be as subtle as changes in her choice in moisturizers, or the purchase of certain supplements — Target had learned that she was expecting before he did.

Personalized marketing is not new. But so much more can be done with the data now available to corporations and governments. In one recent study, published in the Proceedings of the National Academy of Sciences, researchers showed that mere knowledge of the things that a person has “liked” on Facebook can be used to build a highly accurate profile of the subject, including their “sexual orientation, ethnicity, religious and political views, personality traits, intelligence, happiness, use of addictive substances, parental separation, age, and gender.” In a separate study, another group of researchers were able to infer reasonably reliable scores on certain traits — psychopathy, narcissism, and Machiavellianism — from Facebook status updates. A third team showed that social media data, when analyzed the right way, contains evidence of the onset of depression.

Remember, these researchers did not ask the people they profiled a single question. It was all done by modeling. All they had to do was parse the crumbs of data that we drop during our online activities. And the studies that get published are likely the tip of the iceberg: The data is almost always proprietary, and the companies that hold it do not generally tell us what they do with it.

When the time for my panel arrived, I highlighted a recent study in Nature on voting behavior. By altering a message designed to encourage people to vote so that it came with affirmation from a person’s social network, rather than being impersonal, the researchers had shown that they could persuade more people to participate in an election. Combine such nudges with psychological profiles, drawn from our online data, and a political campaign could achieve a level of manipulation that exceeds that possible via blunt television adverts.

How might they do it in practice? Consider that some people are prone to voting conservative when confronted with fearful scenarios. If your psychological profile puts you in that group, a campaign could send you a message that ignites your fears in just the right way. And for your neighbor who gets mad at scaremongering? To her, they’ll present a commitment to a minor policy that the campaign knows she’s interested in — and make it sound like it’s a major commitment. It’s all individualized. It’s all opaque. You don’t see what she sees, and she doesn’t see what you see.

Given the small margins by which elections get decided — a fact well understood by the political operatives who filled the room — I argued that it was possible that minor adjustments to Facebook or Google’s algorithms could tilt an election. [Continue reading…]

Facebooktwittermail