Category Archives: internet

Turn off your computer and your phone

Tony Dokoupil writes: Before he launched the most viral video in Internet history, Jason Russell was a half-hearted Web presence. His YouTube account was dead, and his Facebook and Twitter pages were a trickle of kid pictures and home-garden updates. The Web wasn’t made “to keep track of how much people like us,” he thought, and when his own tech habits made him feel like “a genius, an addict, or a megalomaniac,” he unplugged for days, believing, as the humorist Andy Borowitz put it in a tweet that Russell tagged as a favorite, “it’s important to turn off our computers and do things in the real world.”

But this past March Russell struggled to turn off anything. He forwarded a link to “Kony 2012,” his deeply personal Web documentary about the African warlord Joseph Kony. The idea was to use social media to make Kony famous as the first step to stopping his crimes. And it seemed to work: the film hurtled through cyberspace, clocking more than 70 million views in less than a week. But something happened to Russell in the process. The same digital tools that supported his mission seemed to tear at his psyche, exposing him to nonstop kudos and criticisms, and ending his arm’s-length relationship with new media.

He slept two hours in the first four days, producing a swirl of bizarre Twitter updates. He sent a link to “I Met the Walrus,” a short animated interview with John Lennon, urging followers to “start training your mind.” He sent a picture of his tattoo, TIMSHEL, a biblical word about man’s choice between good and evil. At one point he uploaded and commented on a digital photo of a text message from his mother. At another he compared his life to the mind-bending movie Inception, “a dream inside a dream.”

On the eighth day of his strange, 21st-century vortex, he sent a final tweet — a quote from Martin Luther King Jr.: “If you can’t fly, then run, if you can’t run, then walk, if you can’t walk, then crawl, but whatever you do, you have to keep moving forward” — and walked back into the real world. He took off his clothes and went to the corner of a busy intersection near his home in San Diego, where he repeatedly slapped the concrete with both palms and ranted about the devil. This too became a viral video.

Afterward Russell was diagnosed with “reactive psychosis,” a form of temporary insanity. It had nothing to do with drugs or alcohol, his wife, Danica, stressed in a blog post, and everything to do with the machine that kept Russell connected even as he was breaking apart. “Though new to us,” Danica continued, “doctors say this is a common experience,” given Russell’s “sudden transition from relative anonymity to worldwide attention — both raves and ridicules.” More than four months later, Jason is out of the hospital, his company says, but he is still in recovery. His wife took a “month of silence” on Twitter. Jason’s social-media accounts remain dark.

Questions about the Internet’s deleterious effects on the mind are at least as old as hyperlinks. But even among Web skeptics, the idea that a new technology might influence how we think and feel — let alone contribute to a great American crack-up — was considered silly and naive, like waving a cane at electric light or blaming the television for kids these days. Instead, the Internet was seen as just another medium, a delivery system, not a diabolical machine. It made people happier and more productive. And where was the proof otherwise?

Now, however, the proof is starting to pile up. The first good, peer-reviewed research is emerging, and the picture is much gloomier than the trumpet blasts of Web utopians have allowed. The current incarnation of the Internet — portable, social, accelerated, and all-pervasive — may be making us not just dumber or lonelier but more depressed and anxious, prone to obsessive-compulsive and attention-deficit disorders, even outright psychotic. Our digitized minds can scan like those of drug addicts, and normal people are breaking down in sad and seemingly new ways. [Continue reading…]

Facebooktwittermail

How a lone grad student scooped the government and what it means for your online privacy

By Peter Maass, ProPublica, June 28, 2012

June 28: This story has been corrected.

This story was co-published with Wired.

Jonathan Mayer had a hunch.

A gifted computer scientist, Mayer suspected that online advertisers might be getting around browser settings that are designed to block tracking devices known as cookies. If his instinct was right, advertisers were following people as they moved from one website to another even though their browsers were configured to prevent this sort of digital shadowing. Working long hours at his office, Mayer ran a series of clever tests in which he purchased ads that acted as sniffers for the sort of unauthorized cookies he was looking for. He hit the jackpot, unearthing one of the biggest privacy scandals of the past year: Google was secretly planting cookies on a vast number of iPhone browsers. Mayer thinks millions of iPhones were targeted by Google.

This is precisely the type of privacy violation the Federal Trade Commission aims to protect consumers from, and Google, which claims the cookies were not planted in an unethical way, now reportedly faces a fine of more than $10 million. But the FTC didn’t discover the violation. Mayer is a 25-year-old student working on law and computer science degrees at Stanford University. He shoehorned his sleuthing between classes and homework, working from an office he shares in the Gates Computer Science Building with students from New Zealand and Hong Kong. He doesn’t get paid for his work and he doesn’t get much rest.

If it seems odd that a federal regulator was scooped by a sleep-deprived student, get used to it, because the federal government is often the last to know about digital invasions of your privacy. The largest privacy scandal of the past year, also involving Google, wasn’t discovered by federal regulators, either. A privacy official in Germany forced Google to hand over the hard drives of cars equipped with 360-degree digital cameras that were taking pictures for its Street View program. The Germans discovered that Google wasn’t just shooting photos: The cars downloaded a panoply of sensitive data, including emails and passwords, from open Wi-Fi networks. Google had secretly done the same in the United States, but the FTC, as well as the Federal Communications Commission, which oversees broadcast issues, had no idea until the Germans figured it out.

Nearly every day, and often several times a day, there is fresh news of privacy invasions as companies hone their ability to imperceptibly assemble a vast amount of data about anyone with a smartphone, laptop or credit card. Retailers, search engines, social media sites, news organizations 2014 all want to know as much as they can about their visitors and users so that ads can be targeted as precisely as possible. But data mining, which has become central to the corporate bottom line, can be downright creepy, with companies knowing what you search for, what you buy, which websites you visit, how long you browse 2014 and more. Earlier this year, it was revealed that Target realized a teenage customer was pregnant before her father knew; the firm identifies first-term pregnancies through, among other things, purchases of scent-free products. It’s akin to someone rifling through your wallet, closet or medicine cabinet, but in the digital sphere no one picks your pocket or breaks into your house. The tracking is done mostly without your knowledge and, in many cases, despite your attempts to stop it, as Mayer discovered.

The FTC is the lead agency in the government’s effort to ensure that companies do not cross the still-hazy border between acceptable and unacceptable data collection. But the agency’s ambitions are clipped by a lack of both funding and legal authority, reflecting a broader uncertainty about the role government should play in what is arguably America’s most promising new industry. Companies like Facebook and Google are global brands for which data mining is at the core of present and future profits. How far should they go? Current laws provide few limits, mainly banning data collection from children under 13 and prohibiting the sale of personal medical data. Beyond that, it’s a digital mosh pit, and it’s likely to remain that way because more regulation tends to be regarded by politicians in both parties as meaning fewer jobs. Students will probably continue to beat the FTC to the punch: The agency just has one privacy technologist working in its Division of Privacy and Identity Protection and one in the Division of Financial Practices. “I don’t think it’s controversial to note that they seem to be understaffed,” Mayer said in a phone interview between classes. “I think that’s pretty clear.”

This isn’t the usual sort of story about regulation watered down by intimate ties between government officials and the industry they oversee. Unlike the U.S. Minerals Management Service, where not long ago a number of officials were found to have shared drugs and had sex with representatives of the oil and gas industry, key FTC officials hired by the Obama administration are privacy hawks who worked previously for consumer-rights groups like Public Citizen and the Electronic Frontier Foundation. Under Chairman Jon Liebowitz, a Democrat appointed to the FTC in 2004 and tapped as chairman by President Obama in 2009, the FTC has pushed boundaries; its first privacy technologist, hired shortly after Liebowitz became chairman, was a semifamous activist who made a name for himself by printing fake boarding passes to draw attention to airline security lapses (the FBI, which raided his house, was not pleased). The agency is working with the tech industry to create and voluntarily adopt a Do Not Track option, so that consumers can avoid some intrusive web tracking by advertising firms. And it issued a report this year that called for new legislation to define what data miners can and cannot do.

Yet the FTC is ill-equipped to find out, on its own, what companies like Google and Facebook are doing behind the scenes. For instance, ProPublica discovered that the FTC’s Privacy and Identity Protection technologist has a digital hand tied behind his back because the computer in his office has security filters that restrict access to key websites. While Mayer has an ultrafast Internet connection, top-of-the-line computer, an office chair he loves and tasty lunches for free (“Stanford students do not want in any way,” he notes), the FTC technologist uses his personal laptop and, because there is no Wi-Fi at the agency, connects to the Internet by tethering it to his iPhone. He browses the Web at cellphone speed. There are no free lunches.

Continue reading

Facebooktwittermail

Globally, the punishments for dissident bloggers becomes harsher

Jillian York writes: Each time I log in to Facebook, I am presented with the option of visiting the profiles of friends currently in prison. These friends are not incarcerated in my country, the United States, nor are their “crimes” violent or drug-related. All are, rather, victims of political repression, imprisoned in Tehran and Damascus, or in hiding somewhere in Bahrain.

When Hossein Derakhshan (or “Hoder” as he is known to friends) was arrested back in 2009, he was the first blogger I’d met in person to fall victim to such a fate. We’d met the previous summer, at a Global Voices conference in Budapest, to the sound of dance music on a rooftop well past midnight. He was charismatic, and as I learned from many of his friends, conflicted. Just one year later, shortly after his ill-fated return to Iran, he would be arrested and sentenced to 19 years in prison.

Although our meeting had been brief, Hoder’s arrest impacted me pretty intensely. Seeing him largely ignored in the US press – despite previous praise as the “Blogfather” of the Iranian blogosphere – spurred me to speak up; I haven’t been silent since.

It was only a month after Hoder’s arrest that, along with some of the Arab world’s most prominent and respected bloggers, I was welcomed to Beirut for the second “Arabloggers” workshop for my work with Global Voices. It was there that, for the second time, I met Ali Abdulemam, the Bahraini blogger who by that point was well-known – at least in our blogger circles – for the online platform he had founded, Bahrain Online.

Like Hoder, perhaps Ali didn’t realise how brave his actions were. It was only a few months later that Bahrain began to crack down on dissidents. In August, Ali’s home was raided, he and his team arrested and charged with “inciting hatred of the government”. Though they were released not long after, Ali was arrested again the next month and charged with “spreading false information”. While in detention, he was fired from his job, tortured and reportedly denied legal counsel. He was free long enough to see the beginning of Bahrain’s uprising, but by the time the government once again began to crack down on bloggers and activists, he had disappeared.

In June 2011, Ali was tried by a military court in absentia and sentenced to 15 years in prison for allegedly plotting an anti-government coup. He remains in hiding. More recently, my good friend Razan Ghazzawi spent time in prison for her brave work with the Syrian Center for Media and Freedom of Expression, along with a number of her colleagues. Though she has since been released, Razan still faces a trial; her fate remains unknown.

Ali, Razan and Hoder are but three examples illustrating the repression that bloggers face throughout the Middle East and, increasingly, many countries across the globe. From Iran to China, Vietnam and back to Tunisia, the year following the “Arab Spring” and a series of global popular movements has resulted in crackdowns on expression, showing just how terrified governments have become of the voice accorded their citizens via the internet.

Facebooktwittermail

Google continues to dodge questions on Street View private data collection

The New York Times reports: Google has long prided itself on not being a conventional company. But there is one characteristic it apparently shares with the most sclerotic bureaucracy: the willingness of its employees to say, “Not my job.”

The company on Tuesday released a trove of documents related to a federal investigation of its Street View mapping project. Although the project was intended to photograph the world’s streets, from 2007 to 2010 Google gathered unencrypted Internet data from wireless networks, including the content of private communications, as its specially equipped cars passed through neighborhoods.

Among the documents released Tuesday are sworn declarations by nine people — their names and titles redacted but most of whom appear to be Google engineers — who said they were not aware of the data collection either because it was not part of their job or they did not review the project documentation, even when it was provided to them.

Also Tuesday, Google confirmed that the Information Commissioner’s Office in Britain had reopened its investigation of the Street View project and had asked the company for additional information about the data it collected there.

In April, the Federal Communications Commission said Google had “deliberately impeded and delayed” its inquiry into the data collection and assessed the company a $25,000 fine. The documents released Tuesday were originally provided to the F.C.C. as part of its investigation into Street View. Employee names were redacted; in a few cases, nearly the entire document was blacked out.

While each of the employees who provided sworn declarations acknowledged participating in some aspect of Street View, nearly all said they first became aware that the company was collecting Internet data only when it was publicly reported in May 2010.

For example, one person whose job was to review the computer code that operated the data collection program said that while he checked syntax and debugged the code, he had “no recollection of reviewing the Wi-Fi project design document” and that “it was not part of my duties to do so.”

Another said, “I am aware there was a design document prepared for the Wi-Fi collection, but I do not recall reading it.”

Facebooktwittermail

‘Big data’ from social media, elsewhere online redefines trend-watching

The Washington Post reports: From a trading desk in London, Paul Hawtin monitors the fire hose of more than 340 million Twitter posts flying around the world each day to try to assess the collective mood of the populace.

The computer program he uses generates a global sentiment score from 1 to 50 based on how pessimistic or optimistic people seem to be from their online conversations. Hawtin, chief executive of Derwent Capital Markets, buys and trades millions of dollars of stocks for private investors based on that number: When everyone appears happy, he generally buys. When anxiety runs high, he sells short.

Hawtin has seen a gain of more than 7 percent in the first quarter of this year, and his method shows the advantage individuals, companies and governments are gaining as they take hold of the unprecedented amount of data online. Traders such as Hawtin say analyzing mathematical trends on the Web delivers insights and news faster than traditional investment approaches.

The explosion in the use of Google, Facebook, Twitter and other services has resulted in the generation of some 2.5 quintillion bytes each day, according to IBM.

“Big data,” as it has been dubbed by researchers, has become so valuable that the World Economic Forum, in a report published last year, deemed it a new class of economic asset, like oil.

“Business boundaries are being redrawn,” the report said. Companies with the ability to mine the data are becoming the most powerful, it added.

While the human brain cannot comprehend that much information at once, advances in computer power and analytics have made it possible for machines to tease out patterns in topics of conversation, calling habits, purchasing trends, use of language, popularity of sports, spread of disease and other expressions of daily life.

“This is changing the world in a big way. It enables us to watch changes in society in real time and make decisions in a way we haven’t been able to ever before,” said Gary King, a social science professor at Harvard University and a co-founder of Crimson Hexagon, a data analysis firm based in Boston.

The Obama campaign employs rows of people manning computers that monitor Twitter sentiment about the candidates in key states. Google scientists are working with the Centers for Disease Control and Prevention to track the spread of flu around the world by analyzing what people are typing in to search. And the United Nations is measuring inflation through computers that analyze the price of bread advertised in online supermarkets across Latin America.

Many questions about big data remain unanswered. Concerns are being raised about personal privacy and how consumers can ensure that their information is being used fairly. Some worry that savvy technologists could use Twitter or Google to create false trends and manipulate markets.

Even so, sociologists, software engineers, economists, policy analysts and others in nearly every field are jumping into the fray. And nowhere has big data been as transformative as it has been in finance. [Continue reading…]

Facebooktwittermail

The economics of digital sharecropping

Nicholas Carr writes: With a reported 900 million active members, Facebook is, by far, the largest digital-sharecropping operation that the internet has yet produced. About one out of every eight people on the planet sharecrops for Facebook today – and their collective labor is expected to put about a billion dollars of cash into CEO Mark Zuckerberg’s pocket when the company goes public in a few weeks. In a 2006 post, I explained why sharecropping is such a powerful business model for social networks and other online businesses:

One of the fundamental economic characteristics of Web 2.0 is the distribution of production into the hands of the many and the concentration of the economic rewards into the hands of the few. It’s a sharecropping system, but the sharecroppers are generally happy because their interest lies in self-expression or socializing, not in making money, and, besides, the economic value of each of their individual contributions is trivial. It’s only by aggregating those contributions on a massive scale – on a web scale – that the business becomes lucrative. To put it a different way, the sharecroppers operate happily in an attention economy while their overseers operate happily in a cash economy. In this view, the attention economy does not operate separately from the cash economy; it’s simply a means of creating cheap inputs for the cash economy.

Facebook’s most recent financial filing provides a great illustration of the “two economies” that underpin digital sharecropping. As Techcrunch noted, Facebook reported that it earned an average of $1.21 in revenue from each of its members during the first quarter of this year. [Continue reading…]

Facebooktwittermail

How Facebook is poisoning human relationships

Stephen Marche writes: Yvette Vickers, a former Playboy playmate and B-movie star, best known for her role in Attack of the 50 Foot Woman, would have been 83 last August, but nobody knows exactly how old she was when she died. According to the Los Angeles coroner’s report, she lay dead for the better part of a year before a neighbor and fellow actress, a woman named Susan Savage, noticed cobwebs and yellowing letters in her mailbox, reached through a broken window to unlock the door, and pushed her way through the piles of junk mail and mounds of clothing that barricaded the house. Upstairs, she found Vickers’s body, mummified, near a heater that was still running. Her computer was on too, its glow permeating the empty space.

The Los Angeles Times posted a story headlined “Mummified Body of Former Playboy Playmate Yvette Vickers Found in Her Benedict Canyon Home,” which quickly went viral. Within two weeks, by Technorati’s count, Vickers’s lonesome death was already the subject of 16,057 Facebook posts and 881 tweets. She had long been a horror-movie icon, a symbol of Hollywood’s capacity to exploit our most basic fears in the silliest ways; now she was an icon of a new and different kind of horror: our growing fear of loneliness. Certainly she received much more attention in death than she did in the final years of her life. With no children, no religious group, and no immediate social circle of any kind, she had begun, as an elderly woman, to look elsewhere for companionship. Savage later told Los Angeles magazine that she had searched Vickers’s phone bills for clues about the life that led to such an end. In the months before her grotesque death, Vickers had made calls not to friends or family but to distant fans who had found her through fan conventions and Internet sites.

Vickers’s web of connections had grown broader but shallower, as has happened for many of us. We are living in an isolation that would have been unimaginable to our ancestors, and yet we have never been more accessible. Over the past three decades, technology has delivered to us a world in which we need not be out of contact for a fraction of a moment. In 2010, at a cost of $300 million, 800 miles of fiber-optic cable was laid between the Chicago Mercantile Exchange and the New York Stock Exchange to shave three milliseconds off trading times. Yet within this world of instant and absolute communication, unbounded by limits of time or space, we suffer from unprecedented alienation. We have never been more detached from one another, or lonelier. In a world consumed by ever more novel modes of socializing, we have less and less actual society. We live in an accelerating contradiction: the more connected we become, the lonelier we are. We were promised a global village; instead we inhabit the drab cul-de-sacs and endless freeways of a vast suburb of information.

At the forefront of all this unexpectedly lonely interactivity is Facebook, with 845 million users and $3.7 billion in revenue last year. The company hopes to raise $5 billion in an initial public offering later this spring, which will make it by far the largest Internet IPO in history. Some recent estimates put the company’s potential value at $100 billion, which would make it larger than the global coffee industry — one addiction preparing to surpass the other. Facebook’s scale and reach are hard to comprehend: last summer, Facebook became, by some counts, the first Web site to receive 1 trillion page views in a month. In the last three months of 2011, users generated an average of 2.7 billion “likes” and comments every day. On whatever scale you care to judge Facebook — as a company, as a culture, as a country — it is vast beyond imagination.

Despite its immense popularity, or more likely because of it, Facebook has, from the beginning, been under something of a cloud of suspicion. The depiction of Mark Zuckerberg, in The Social Network, as a bastard with symptoms of Asperger’s syndrome, was nonsense. But it felt true. It felt true to Facebook, if not to Zuckerberg. The film’s most indelible scene, the one that may well have earned it an Oscar, was the final, silent shot of an anomic Zuckerberg sending out a friend request to his ex-girlfriend, then waiting and clicking and waiting and clicking — a moment of superconnected loneliness preserved in amber. We have all been in that scene: transfixed by the glare of a screen, hungering for response.

When you sign up for Google+ and set up your Friends circle, the program specifies that you should include only “your real friends, the ones you feel comfortable sharing private details with.” That one little phrase, Your real friends — so quaint, so charmingly mothering — perfectly encapsulates the anxieties that social media have produced: the fears that Facebook is interfering with our real friendships, distancing us from each other, making us lonelier; and that social networking might be spreading the very isolation it seemed designed to conquer. [Continue reading…]

Facebooktwittermail

Victims of Kony2012 slam Invisible Children

The Guardian reports: It had been viewed more than 77m times around the world, but not by those who know the Joseph Kony best: his victims in northern Uganda.

That changed on Tuesday night when thousands flocked to watch Kony 2012, the video made by a US charity urging a grassroots campaign against the fugitive warlord that has gone viral.

The film was projected on to an ersatz cinema screen fashioned from a white sheet, held up by metal poles, in a town park. The reaction? Puzzlement, then anger, which boiled over into scuffles and stone-throwing that sent organisers fleeing for cover.

There was particular criticism of the Stop Kony campaign’s use of merchandise, such as bracelets and T-shirts, which victims said they find offensive.

“People were very angry about the film,” said Victor Ochen, director of a local charity, the African Youth Initiative Network (Ayinet), which arranged the screening. “They were all saying, ‘This is not about us, it does not reflect our lives’.”

Ochen said he had wanted to provide an opportunity for victims to see the film made by the charity Invisible Children, mindful that less than 2% of Ugandans have internet access.

The video, posted on YouTube on 5 March and narrated by one of Invisible Children’s founders, Jason Russell, had drawn the support of celebrities including George Clooney and Angelina Jolie, but provoked criticism for oversimplifying the conflict and not making clear that Kony was driven out of Uganda several years ago.

Before sunset on Tuesday two metal rods were hammered into dry dirt and grass and a white sheet hoisted to create an open-air cinema in the mayor’s gardens in the centre of Lira, 220 miles north of the capital, Kampala.

Word about the “premiere” spread on local radio, drawing a crowd on foot and bicycle that grew over several hours and was estimated at more than 35,000 by Ochen, though others put it at more like 5,000.

The expectant, excited spectators, many of whom cannot speak English, included victims who have been left scarred and maimed by Kony’s atrocities.

But Ochen, whose own father and brother were abducted by Kony’s Lord’s Resistance Army (LRA), said on Wednesday: “Reacting to the film, there was a strong sense that the video was definitely not produced for an African audience, and that it was not sensitive enough to the victims.

“It was very hurtful for them and their families to see posters, bracelets and buttons, all looking like slick campaign ads of the person most responsible for their shattered lives. One young man who lost four brothers and one of his arms said afterwards: ‘How can anybody expect me to wear a T-shirt with Kony’s name on it?'”

He added: “For all the victims, the attempt to make Kony famous so as to prop up public support for his apprehension is laudable but the way this goal is pursued in the video is inappropriate and ignores their feelings.

“That fame is not what Kony deserves for causing so much suffering was one overwhelming reaction. People were asking: Why give such criminals celebrity status? Why not prioritise addressing the plight of the victims whose sufferings are visible?”

The screening ended amid jeers and scuffles, with some angry viewers throwing stones. Ayinet has decided to suspend planning screenings of Kony 2012 in other parts of northern Uganda indefinitely due to the hostile reaction.

Facebooktwittermail

Cybersecurity bill is broad enough to use against WikiLeaks and The Pirate Bay

The Electronic Frontier Foundation says: Congress is doing it again: they’re proposing overbroad regulations that could have dire consequences for our Internet ecology. The Cyber Intelligence Sharing and Protection Act of 2011 (H.R. 3523), introduced by Rep. Mike Rogers and Rep. Dutch Ruppersberger, allows companies or the government1 free rein to bypass existing laws in order to monitor communications, filter content, or potentially even shut down access to online services for “cybersecurity purposes.” Companies are encouraged to share data with the government and with one another, and the government can share data in return. The idea is to facilitate detection of and defense against a serious cyber threat, but the definitions in the bill go well beyond that. The language is so broad it could be used as a blunt instrument to attack websites like The Pirate Bay or WikiLeaks. Join EFF in calling on Congress to stop the Rogers’ cybersecurity bill.

Under the proposed legislation, a company that protects itself or other companies against “cybersecurity threats” can “use cybersecurity systems to identify and obtain cyber threat information to protect the rights and property” of the company under threat. But because “us[ing] cybersecurity systems” is incredibly vague, it could be interpreted to mean monitoring email, filtering content, or even blocking access to sites. A company acting on a “cybersecurity threat” would be able to bypass all existing laws, including laws prohibiting telcos from routinely monitoring communications, so long as it acted in “good faith.”

The broad language around what constitutes a cybersecurity threat leaves the door wide open for abuse. For example, the bill defines “cyber threat intelligence” and “cybersecurity purpose” to include “theft or misappropriation of private or government information, intellectual property, or personally identifiable information.”

Yes, intellectual property. It’s a little piece of SOPA wrapped up in a bill that’s supposedly designed to facilitate detection of and defense against cybersecurity threats. The language is so vague that an ISP could use it to monitor communications of subscribers for potential infringement of intellectual property. An ISP could even interpret this bill as allowing them to block accounts believed to be infringing, block access to websites like The Pirate Bay believed to carry infringing content, or take other measures provided they claimed it was motivated by cybersecurity concerns.

Facebooktwittermail

Everyone’s trying to track what you do on the Web: here’s how to stop them

Alan Henry writes: It’s no secret that there’s big money to be made in violating your privacy. Companies will pay big bucks to learn more about you, and service providers on the web are eager to get their hands on as much information about you as possible.

So what do you do? How do you keep your information out of everyone else’s hands? Here’s a guide to surfing the web while keeping your privacy intact.

The adage goes, “If you’re not paying for a service, you’re the product, not the customer,” and it’s never been more true. Every day more news breaks about a new company that uploads your address book to their servers, skirts in-browser privacy protection, and tracks your every move on the web to learn as much about your browsing habits and activities as possible. In this post, we’ll explain why you should care, and help you lock down your surfing so you can browse in peace.

Your personal information is valuable. More valuable than you might think. When we originally published our guide to stop Facebook from tracking you around the web, some people cried “So what if they track me? I’m not that important/I have nothing to hide/they just want to target ads to me and I’d rather have targeted ads over useless ones!” To help explain why this is short-sighted and a bit naive, let me share a personal story.

Before I joined the Lifehacker team, I worked at a company that traded in information. Our clients were huge companies and one of the services we offered was to collect information about people, their demographics, income, and habits, and then roll it up so they could get a complete picture about who you are and how to convince you to buy their products. In some cases, we designed web sites and campaigns to convince you to provide even more information in exchange for a coupon, discount, or the simple promise of other of those. It works very, very well.

The real money is in taking your data and shacking up with third parties to help them come up with new ways to convince you to spend money, sign up for services, and give up more information. Relevant ads are nice, but the real value in your data exists where you won’t see it until you’re too tempted by the offer to know where it came from, whether it’s a coupon in your mailbox or a new daily deal site with incredible bargains tailored to your desires. It all sounds good until you realize the only thing you have to trade for such “exciting” bargains is everything personal about you: your age, income, family’s ages and income, medical history, dietary habits, favorite web sites, your birthday…the list goes on. It would be fine if you decided to give up this information for a tangible benefit, but you may never see a benefit aside from an ad, and no one’s including you in the decision. Here’s how to take back that control. [Continue reading…]

Facebooktwittermail

U.S. government looks to mine social media to combat terrorist attacks, uprisings

The Associated Press reports: The U.S. government is seeking software that can mine social media to predict everything from future terrorist attacks to foreign uprisings, according to requests posted online by federal law enforcement and intelligence agencies.

Hundreds of intelligence analysts already sift overseas Twitter and Facebook posts to track events such as the Arab Spring. But in a formal “request for information” from potential contractors, the FBI recently outlined its desire for a digital tool to scan the entire universe of social media — more data than humans could ever crunch.

The Department of Defense and the Office of the Director of National Intelligence also have solicited the private sector for ways to automate the process of identifying emerging threats and upheavals using the billions of posts people around the world share every day.

“Social media has emerged to be the first instance of communication about a crisis, trumping traditional first responders that included police, firefighters, EMT, and journalists,” the FBI wrote in its request. “Social media is rivaling 911 services in crisis response and reporting.”

The proposals already have raised privacy concerns among advocates who worry that such monitoring efforts could have a chilling effect on users. Ginger McCall, director of the open government project at the Washington, D.C.-based Electronic Privacy Information Center, said the FBI has no business monitoring legitimate free speech without a narrow, targeted law enforcement purpose.

“Any time that you have to worry about the federal government following you around peering over your shoulder listening to what you’re saying, it’s going to affect the way you speak and the way that you act,” McCall said.

Facebooktwittermail

Facebook is using you

Lori Andrews writes: Last week, Facebook filed documents with the government that will allow it to sell shares of stock to the public. It is estimated to be worth at least $75 billion. But unlike other big-ticket corporations, it doesn’t have an inventory of widgets or gadgets, cars or phones. Facebook’s inventory consists of personal data — yours and mine.

Facebook makes money by selling ad space to companies that want to reach us. Advertisers choose key words or details — like relationship status, location, activities, favorite books and employment — and then Facebook runs the ads for the targeted subset of its 845 million users. If you indicate that you like cupcakes, live in a certain neighborhood and have invited friends over, expect an ad from a nearby bakery to appear on your page. The magnitude of online information Facebook has available about each of us for targeted marketing is stunning. In Europe, laws give people the right to know what data companies have about them, but that is not the case in the United States.

Facebook made $3.2 billion in advertising revenue last year, 85 percent of its total revenue. Yet Facebook’s inventory of data and its revenue from advertising are small potatoes compared to some others. Google took in more than 10 times as much, with an estimated $36.5 billion in advertising revenue in 2011, by analyzing what people sent over Gmail and what they searched on the Web, and then using that data to sell ads. Hundreds of other companies have also staked claims on people’s online data by depositing software called cookies or other tracking mechanisms on people’s computers and in their browsers. If you’ve mentioned anxiety in an e-mail, done a Google search for “stress” or started using an online medical diary that lets you monitor your mood, expect ads for medications and services to treat your anxiety.

Ads that pop up on your screen might seem useful, or at worst, a nuisance. But they are much more than that. The bits and bytes about your life can easily be used against you. Whether you can obtain a job, credit or insurance can be based on your digital doppelgänger — and you may never know why you’ve been turned down.

Material mined online has been used against people battling for child custody or defending themselves in criminal cases. LexisNexis has a product called Accurint for Law Enforcement, which gives government agents information about what people do on social networks. The Internal Revenue Service searches Facebook and MySpace for evidence of tax evaders’ income and whereabouts, and United States Citizenship and Immigration Services has been known to scrutinize photos and posts to confirm family relationships or weed out sham marriages. Employers sometimes decide whether to hire people based on their online profiles, with one study indicating that 70 percent of recruiters and human resource professionals in the United States have rejected candidates based on data found online. A company called Spokeo gathers online data for employers, the public and anyone else who wants it. The company even posts ads urging “HR Recruiters — Click Here Now!” and asking women to submit their boyfriends’ e-mail addresses for an analysis of their online photos and activities to learn “Is He Cheating on You?”

Facebooktwittermail

Twitter commits social suicide

What does Twitter call restrictions on free speech? They are “different ideas about the contours of freedom of expression.”

And what about censorship? It’s “the ability to reactively withhold content.”

Although I imagine George Orwell would have been adept at using this character-restricted medium, I also imagine he would have viewed it with contempt — and now even more so, as Twitter like every other corporate entity puts its commercial interests in front of everything else.

Mark Gibbs writes: In what can only have been a fit corporate insanity, Twitter announced that they have the ability to filter tweets to conform to the demands of various countries.

Thus, in France and Germany it is illegal to broadcast pro-Nazi sentiments and Twitter will presumably be able to block such content and inform the poster why it was blocked.

Quite obviously, Twitter’s management believe that there’s some kind of value in being able to filter in this way but given that over the course of 2011 the number of tweets per second (tps) ranged from a high of almost 9,000 tps down to just under 4,000 tps, any filtering has got to be computer-driven.

So, consider this tweet:

@FactsorDie Nazi Germany led the first public anti-smoking campaign.

Could that be considered to be pro-Nazi? How will a program accurately make that determination?

What concerns me is that if the algorithm Twitter uses registers a false positive (i.e. determines that the tweet is pro-Nazi when it isn’t) and the tweet has any time sensitivity to it then that attribute will be completely nullified by the time the tweet makes it out of tweet-jail if it ever does.

On the other hand if the software makes a false negative (i.e. determines that the tweet is NOT pro-Nazi when it is) then the filtering is useless and Twitter will be held accountable by every political group with an axe to grind.

Facebooktwittermail