Categories
Quotations

2013.4.5

Much of the information collected by CIFA [Counterintelligence Field Activity] was amassed in a database called Talon, which stands for Threat and Local Observation Notice. Under a classified order data July 20, 2005, and reported in the Washington Post by military affairs blogger William Arkin, CIFA was allowed to collect information about U.S. citizens in Talon if there was reason to believe those citizens were connected to international terrorist activities, narcotics traffic, and foreign intelligence organizations and were a “threat” to DoD installations and personnel (“In other words,” Arkin commented, “some military gumshoe or over-zealous commander just has to decide [that] someone is a ‘threat to’ the military”). CIFA also obtained information about U.S. persons from the NSA and the DIA. As it turned out, however, many of these threatening people were antiwar activists, and the information about them came from monitoring meetings held in churches, libraries, college campuses, and other locations.

Tim Shorrock, Spies for Hire: The Secret World of Intelligence Outsourcing. Pp. 178.
Categories
Quotations

2013.4.5

But perhaps the most important recent development at Facebook is one that has no immediate bearing on the company’s finances. In October, Brad Smallwood, Facebook’s head of monetization analytics—a convoluted, five-dollar title that obscures his importance at the company—took to the stage at a marketers’ conference to announce that Facebook had formed a partnership with Datalogix, a market-analytics firm with purchasing information on about 70 million American homes. Under the agreement between the companies, Facebook would be able to measure whether a user’s exposure to an ad on the site was correlated with that person’s making a purchase at a store.

That type of information is essential for Facebook. Put simply, many corporations are still mired in click-through data, a standard of analysis that fails to fully reflect purchasing activity generated by online advertising. “The click is a terrible predictor of off-line sales,” Smallwood says. “Every research company knows that’s true.”

Still, Smallwood acknowledges, Wall Street continues to view clicks as the critical measure of online-ad performance. “At some level, people have gotten used to the click, and they still want to see the click when they deal with online,” he says. “It’s kind of our job to explain that that is not necessarily the best measure.”

The numbers from the early studies are powerful. Some 70 percent of the campaigns that were measured showed sales equal to three times or more the amount spent for the ads; 49 percent brought in at least five times what the ad had cost.

Kurt Eichenwald, “Facebook Leans In
Categories
Quotations

2013.4.5

The new Home app/UX/quasi-OS is deeply integrated into the Android environment. It takes an effort to shut it down, because Home’s whole premise is to be always on and be the dashboard to your social world. It wants to be the start button for apps that are on your Android device, which in turn will give Facebook a deep insight on what is popular. And of course, it can build an app that mimics the functionality of that popular, fast-growing mobile app. I have seen it done before, both on other platforms and on Facebook.

But there is a bigger worry. The phone’s GPS can send constant information back to the Facebook servers, telling it your whereabouts at any time.

(…)

And most importantly it is Facebook, a company that is known to have played loose-and-easy with consumer privacy and data since its very inception, asking for forgiveness whenever we caught them with its hand in the cookie jar. I don’t think we can be that forgiving or reactive with Facebook on mobile.

Om Malik, “Why Facebook Home bothers me: It destroys any notion of privacy
Categories
Aside Links

Don’t Use Linksys Routers

cleverhacks:

multiple remote root exploits for some of Cisco’s latest consumer-grade gear – and remember, if your router is pwned, it doesn’t matter if all your computers are patched and ultra-secure; your traffic can still be silently MITM’d and your connection hijacked for nefarious purposes.

Ah…another set of router exploits. At least all the major routers that run traffic in the core of the networks are secure from these kinds of vulnerabilities because of high degrees of security-first coding, right?

Categories
Aside Quotations

2013.3.30

The determination by Congress and President Barack Obama’s administration to protect networks of critical U.S. industries from hackers and cyberspies is creating an explosive growth opportunity – for lobbyists.

There were 513 filings by consultants and companies to press Congress on cybersecurity by the end of 2012, up 85 percent from 2011 and almost three times as many as in 2010, according to U.S. Senate filings. Twelve firms have submitted new registrations this year on behalf of companies including Google Inc. (GOOG)’s Motorola Mobility unit, Symantec Corp. (SYMC), United Parcel Service Inc. (UPS) and Ericsson Inc., the U.S. subsidiary of Stockholm-based Telefonaktiebolaget LM Ericsson.

Eric Engleman & Jonathan D. Salant, “Cybersecurity Lobby Surges as Congress Considers New Laws

I’m sure the lobbyists are only there as good patriotic Americans, aiming to best ensure that Americans are kept safe and Congresspeople and Senators (and their associated staff) just get the best information possible. No way that, in the wake of US scaremongering, lobbyists are looking to massively expand ‘security’ projects to the detriment of Americans’ privacy and (almost comically) security interest. Right?

Categories
Quotations Writing

“Commercially Friendly” Privacy Rules

Dr. Pentland, an academic adviser to the World Economic Forum’s initiatives on Big Data and personal data, agrees that limitations on data collection still make sense, as long as they are flexible and not a “sledgehammer that risks damaging the public good.”

He is leading a group at the M.I.T. Media Lab that is at the forefront of a number of personal data and privacy programs and real-world experiments. He espouses what he calls “a new deal on data” with three basic tenets: you have the right to possess your data, to control how it is used, and to destroy or distribute it as you see fit.

Personal data, Dr. Pentland says, is like modern money — digital packets that move around the planet, traveling rapidly but needing to be controlled. “You give it to a bank, but there’s only so many things the bank can do with it,” he says.

His M.I.T. group is developing tools for controlling, storing and auditing flows of personal data. Its data store is an open-source version, called openPDS. In theory, this kind of technology would undermine the role of data brokers and, perhaps, mitigate privacy risks. In the search for a deep fat fryer, for example, an audit trail should detect unauthorized use.

Steve Lohr, “Big Data Is Opening Doors, but Maybe Too Many

So, I don’t really get how Pentland’s system is going to work any better than the Platform for Privacy Preferences (P3P) work that was done a decade ago. Spoiler alert: P3P failed. Hard. And it was intended to simultaneously enhance users’ privacy online (by letting them establish controls on how their personal information was accessed and used) whilst simultaneously giving industry something to point to, in order to avoid federal regulation.

There is a prevalent strain of liberalism that assumes that individuals, when empowered, are best suited to control the dissemination of their personal information. However, it assumes that knowledge, time, and resourcing are equal amongst all parties. This clearly isn’t the case, nor is it the case that individuals are going to be able to learn when advertisers and data miners don’t respect privacy settings. In effect: control does not necessarily equal knowledge, nor does it necessarily equal capacity to act given individuals’ often limited fiscal, educational, temporal, or other resources.

Categories
Aside Humour

Cat vs Packing

thefrogman:

[video] [h/t: cineraria]

And in this biology video, we see the white cells of your average packing box surround the intruder, with the effect of excising the hostile specimen from the otherwise healthy host organism/box. It’s amazing how organisms in nature develop extraordinary defences!

Categories
Quotations

2013.3.28

Right now, in Montreal, the very right to protest, that most fundamental right to freedom of expression, is under assault. If we give in, and stay home for fear of these preposterous tickets, we will have lost not just the battle but the war itself. Indeed, the worst part about these tactics is that they work. I know many friends who will no longer go to protests for fear of arrest and a ticket they cannot afford. What a sad state of affairs when the police bully and intimidate citizens out of exercising their right to criticize the government. So go to the demos, go to all the demos, and prove you will not let fear and intimidation win out. If you get a ticket, contest it. The legal resources to ensure you succeed are freely available. And no matter what you do, make sure to go to the demo on the 22nd of April, which I think should be branded as a manif in defence of our civil liberties. If there are enough people in the streets, the cops can’t do a thing. Small crowds are what allow these abuses.

When our police force denies that we have any right to peacefully express our dissent, there is no recourse but to fight tooth and nail to protect our rights. This is far too important an issue to let slide.

Ethan Cox, “‘There is no right to protest’: Montreal police deny Charter rights
Categories
Aside Links

New credit cards vulnerable to electronic pickpockets

Fortunately, only ‘advanced payment cards’ are currently affected by this. Well, and the BC Services Card once it’s in people’s hands and the chip has been activated.

Categories
Quotations

2014.3.26

That smartphones allow us to imprison twice the number of people at half the cost is the kind of cutting-edge innovation that only management consultants and tech entrepreneurs would be excited about. Such breakthroughs would be worth celebrating if they didn’t distract us from the more radical (and simpler) solution to the problem of overcrowded prisons: incarcerating fewer people.

Smart technologies are not just disruptive; they can also preserve the status quo. Revolutionary in theory, they are often reactionary in practice.

Smart technology, thanks to its ubiquity and affordability, offers us the cheapest — and trendiest — fix. But the gleaming aura of disruption-talk that often accompanies such fixes masks their underlying conservatism. Technological innovation does not guarantee political innovation; at times, it might even impede it. The task ahead is to prevent our imagination from being incarcerated by smart technologies. Or should we settle for gamifying ourselves to death?

Evgeny Morozov, “Imprisoned by Innovation