Skip to main content

Home/ Dystopias/ Group items tagged anonymity

Rss Feed Group items tagged

Ed Webb

A Cypherpunk's Manifesto - 0 views

  • Privacy is the power to selectively reveal oneself to the world.
  • privacy in an open society requires anonymous transaction systems
  • Privacy in an open society also requires cryptography. If I say something, I want it heard only by those for whom I intend it. If the content of my speech is available to the world, I have no privacy. To encrypt is to indicate the desire for privacy, and to encrypt with weak cryptography is to indicate not too much desire for privacy. Furthermore, to reveal one's identity with assurance when the default is anonymity requires the cryptographic signature.
  • ...4 more annotations...
  • Information expands to fill the available storage space. Information is Rumor's younger, stronger cousin; Information is fleeter of foot, has more eyes, knows more, and understands less than Rumor.
  • We the Cypherpunks are dedicated to building anonymous systems. We are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money.
  • We don't much care if you don't approve of the software we write. We know that software can't be destroyed and that a widely dispersed system can't be shut down.
  • encryption is fundamentally a private act. The act of encryption, in fact, removes information from the public realm. Even laws against cryptography reach only so far as a nation's border and the arm of its violence. Cryptography will ineluctably spread over the whole globe, and with it the anonymous transactions systems that it makes possible
Ed Webb

On the Web's Cutting Edge, Anonymity in Name Only - WSJ.com - 0 views

  • A Wall Street Journal investigation into online privacy has found that the analytical skill of data handlers like [x+1] is transforming the Internet into a place where people are becoming anonymous in name only. The findings offer an early glimpse of a new, personalized Internet where sites have the ability to adjust many things—look, content, prices—based on the kind of person they think you are.
  • The technology raises the prospect that different visitors to a website could see different prices as well. Price discrimination is generally legal, so long as it's not based on race, gender or geography, which can be deemed "redlining."
  • marketplaces for online data sprang up
  • ...3 more annotations...
  • In a fifth of a second, [x+1] says it can access and analyze thousands of pieces of information about a single user
  • When he saw the 3,748 lines of code that passed in an instant between his computer and Capital One's website, Mr. Burney said: "There's a shocking amount of information there."
  • [x+1]'s assessment of Mr. Burney's location and Nielsen demographic segment are specific enough that it comes extremely close to identifying him as an individual—that is, "de- anonymizing" him—according to Peter Eckersley, staff scientist at the Electronic Frontier Foundation, a privacy-advocacy group.
Ed Webb

Glenn Greenwald: How America's Surveillance State Breeds Conformity and Fear | Civil Li... - 0 views

  • The Surveillance State hovers over any attacks that meaningfully challenge state-appropriated power. It doesn’t just hover over it. It impedes it, it deters it and kills it.  That’s its intent. It does that by design.
  • the realization quickly emerged that, allowing government officials to eavesdrop on other people, on citizens, without constraints or oversight, to do so in the dark, is a power that gives so much authority and leverage to those in power that it is virtually impossible for human beings to resist abusing that power.  That’s how potent of a power it is.
  • If a dictator takes over the United States, the NSA could enable it to impose total tyranny, and there would be no way to fight back.
  • ...23 more annotations...
  • Now it’s virtually a religious obligation to talk about the National Security State and its close cousin, the Surveillance State, with nothing short of veneration.
  • The NSA, beginning 2001, was secretly ordered to spy domestically on the communications of American citizens. It has escalated in all sorts of lawless, and now lawful ways, such that it is now an enormous part of what that agency does. Even more significantly, the technology that it has developed is now shared by a whole variety of agencies, including the FBI
  • Now, the Patriot Act is completely uncontroversial. It gets renewed without any notice every three years with zero reforms, no matter which party is in control.
  • hey are two, as I said, established Democrats warning that the Democratic control of the Executive branch is massively abusing this already incredibly broad Patriot Act. And one of the things they are trying to do is extract some basic information from the NSA about what it is they’re doing in terms of the surveillance on the American people.  Because even though they are on the Intelligence Committee, they say they don’t even know the most basic information about what the NSA does including even how many Americans have had their e-mails read or had their telephone calls intercepted by the NSA.
  • "We can’t tell you how many millions of Americans are having their e-mails read by us, and their telephone calls listened in by us, because for us to tell you that would violate the privacy of American citizens."
  • An article in Popular Mechanics in 2004 reported on a study of American surveillance and this is what it said: “There are an estimated 30 million surveillance cameras now deployed in the United States shooting 4 billion hours of footage a week. Americans are being watched. All of us, almost everywhere.” There is a study in 2006 that estimated that that number would quadruple to 100 million cameras -- surveillance cameras -- in the United States within five years largely because of the bonanza of post-9/11 surveilling. 
  • it’s not just the government that is engaged in surveillance, but just as menacingly, corporations, private corporations, engage in huge amounts of surveillance on us. They give us cell phones that track every moment of where we are physically, and then provide that to law enforcement agencies without so much as a search warrant.  Obviously, credit card and banking transactions are reported, and tell anyone who wants to know everything we do. We talk about the scandal of the Bush eavesdropping program that was not really a government eavesdropping program, so much as it was a private industry eavesdropping program. It was done with the direct and full cooperation of AT&T, Sprint, Verizon and the other telecom giants. In fact, when you talk about the American Surveillance State, what you’re really talking about is no longer public government agencies. What you’re talking about is a full-scale merger between the federal government and industry. That is what the Surveillance State is
  • The principle being that there can be no human interaction, especially no human communication, not just for international between foreign nations but by America citizens on American soils that is beyond the reach of the U.S. government.
  • at exactly the same time that the government has been massively expanding its ability to know everything that we’re doing it has simultaneously erected a wall of secrecy around it that prevents us from knowing anything that they’re doing
  • government now operates with complete secrecy, and we have none
  • governments, when they want to give themselves abusive and radical powers, typically first target people who they think their citizens won’t care very much about, because they’ll think they’re not affected by it
  • what has happened in the last three to four years is a radical change in the war on terror. The war on terror has now been imported into United States policy. It is now directed at American citizens on American soil. So rather than simply sending drones to foreign soil to assassinate foreign nationals, we are now sending drones to target and kill American citizens without charges or trial. Rather than indefinitely detaining foreign nationals like Guantanamo, Congress last year enacted, and President Obama signed, the National Defense Authorization Act that permits the detention -- without trial, indefinitely -- of American citizens on U.S. soil.
  • this is what the Surveillance State is designed to do.  It’s justified, in the name of terrorism, of course that’s the packaging in which it’s wrapped, that’s been used extremely, and in all sorts of ways, since 9/11 for domestic application. And that’s being, that’s happening even more. It’s happening in terms of the Occupy movement and the infiltration that federal officials were able to accomplish using Patriot Act authorities. It’s happened with pro-Palestinian activists in the United States and all other dissident groups that have themselves [dealt with] with surveillance and law enforcement used by what was originally the war on terror powers.
  • if the government is able to know what we speak about and know who we’re talking to, know what it is that we’re planning, it makes any kind of activism extremely difficult. Because secrecy and privacy are prerequisites to effective actions.
  • we are training our young citizens to live in a culture where the expect they are always being watched. And we want them to be chilled, we want them to be deterred, we want them not to ever challenge orthodoxy or to explore limits where engaging creativity in any kind. This type of surveillance, by design, breeds conformism.  That’s its purpose. that’s what makes surveillance so pernicious.
  • f you go and speak to communities of American Muslims is you find an incredibly pervasive climate of fear.
  • This climate of fear creates limits around the behavior in which they’re willing to engage in very damaging ways
  • it makes people believe that they’re free even though they’ve been subtly convinced that there are things that they shouldn’t do that they might want to do
  • the psychological effects on East German people endure until today. The way in which they have been trained for decades to understand that there are limits to their life, even once you remove the limits, they’ve been trained that those are not things they need to transgress.
  • Rosa Luxembourg said, “He who does not move does not notice his chains.”
  • You can acculturate people to believing that tyranny is freedom, that their limits are actually emancipations and freedom, that is what this Surveillance State does, by training people  to accept their own conformity that they are actually free, that they no longer even realize the ways in which they’re being limited.
  • important means of subverting this one-way mirror that I’ve described is forcible, radical transparency. It’s one of the reasons I support, so enthusiastically and unqualafiably, groups like Anonymous and WikiLeaks. I want holes to be blown in the wall of secrecy.
  • There are things like the Tor project and other groups that enable people to use the internet without any detection from government authorities. That has the effect of preventing regimes that actually bar their citizens from using the Internet from doing so since you can no longer trace the origins of the Internet user. But it also protects people who live in countries like ours where the government is trying to constantly monitor what we do by sending our communications through multiple proxies around the world that can’t be invaded. There’s really a war taking place: an arms race where the government and these groups are attempting to stay one tactical step ahead of the other. In terms of ability to shield internet communications from the government and the government’s ability to invade them and participating in this war in ways that are supportive of the “good side” are really critical as is veiling yourself from the technology that exists, to make what you do as tight as possible.
Ed Webb

Tracking The Companies That Track You Online : NPR - 1 views

  • A visit to Dictionary.com resulted in 234 trackers being installed on our test computer, and only 11 of those were installed by Dictionary.com.
  • Every time I have a thought, I take an action online and Google it. So [online tracking] does build up these incredibly rich dossiers. One question is: Is knowing your name the right definition of anonymity? Right now, that is considered anonymous. If they don't know your name, they're not covered by laws that regulate personally identifiable information. And that's what the Federal Trade Commission is considering — that the definition of personal information should be expanded beyond name and Social Security number. Another thing that [online tracking] raises is sensitive information. So if you're looking at gay websites, then you're labeled as gay in some database somewhere and then you're followed around and sold on some exchange as gay, and you just may not want that to happen. So I feel like there are some categories that we as a society may not want collected: our political affiliation, our diseases, our income levels and many other things."
  • you can go to the websites of all of these tracking companies and ask them not to track you — which is absurd, because you'd have to know who they are. There is a list of all of them on the ad industry's webpage, and you can opt out of all of them at the same time. But one thing to know about tracking is they actually put a tracker on your computer saying don't track me. So you're opting in to being tracked for not being tracked
Ed Webb

Obama and the Age of Surveillance | Indypendent Reader - 0 views

  • “Flowing through its servers and routers and stored in near-bottomless databases will be all forms of communication, including the complete contents of private emails, cell phone calls, and Google searches, as well as all sorts of personal data trails—parking receipts, travel itineraries, bookstore purchases, and other digital 'pocket litter.'”
  • To be fair, the US government has given significant contributions to the research and development of free speech and anonymity technologies, such as the Tor Project.[26] Technologies created and fostered by the US government have been invaluable in the fight for freedom all around the globe. After all, it was the US military that created the precursor to the internet, called ARPANET. But without the ability to be accountable for its own crimes, and to protect the rights of those in opposition to its own policies, the US continues its greatest tradition of hypocrisy. The Obama administration lifts up the struggles of those fighting its enemies with one hand, while attacking those who speak up about injustices of US-sponsored regimes with the other. All the while, it is slowly and secretly building up its omni-present police state at home.
Ed Webb

Face Recognition Moves From Sci-Fi to Social Media - NYTimes.com - 0 views

  • the democratization of surveillance — may herald the end of anonymity
    • Ed Webb
       
      Democratization means putting this at the command of citizens, not of unaccountable corporations.
  • facial recognition is proliferating so quickly that some regulators in the United States and Europe are playing catch-up. On the one hand, they say, the technology has great business potential. On the other, because facial recognition works by analyzing and storing people’s unique facial measurements, it also entails serious privacy risks
  • researchers also identified the interests and predicted partial Social Security numbers of some students.
  • ...4 more annotations...
  • marketers could someday use more invasive techniques to identify random people on the street along with, say, their credit scores
  • “You might think it’s cool, or you might think it’s creepy, depending on the context,”
  • many users do not understand that Facebook’s tag suggestion feature involves storing people’s biometric data to re-identify them in later photos
  • Mr. Caspar said last week that he was disappointed with the negotiations with Facebook and that his office was now preparing to take legal action over the company’s biometric database. Facebook told a German broadcaster that its tag suggestion feature complied with European data protection laws. “There are many risks,” Mr. Caspar says. “People should be able to choose if they want to accept these risks, or not accept them.” He offered a suggestion for Americans, “Users in the United States have good reason to raise their voices to get the same right.”
Ed Webb

4channers Hunt Down Detroit Couple Taunting Dying Girl While Reddit Donates to the Vict... - 0 views

  • I love how fast the internet acts on shit like this.This article was posted at 2:30 today. The husband apologized by 6:30. lol
  •  
    Mutual coercion, or simply coercion? Who polices taste? Do we applaud the actions of 4channers and other lulz-seeking internet vigilantes?
Ed Webb

Why Doesn't Anyone Pay Attention Anymore? | HASTAC - 0 views

  • We also need to distinguish what scientists know about human neurophysiology from our all-too-human discomfort with cultural and social change.  I've been an English professor for over twenty years and have heard how students don't pay attention, can't read a long novel anymore, and are in decline against some unspecified norm of an idealized past quite literally every year that I have been in this profession. In fact, how we educators should address this dire problem was the focus of the very first faculty meeting I ever attended.
  • Whenever I hear about attentional issues in debased contemporary society, whether blamed on television, VCR's, rock music, or the desktop, I assume that the critic was probably, like me, the one student who actually read Moby Dick and who had little awareness that no one else did.
  • This is not really a discussion about the biology of attention; it is about the sociology of change.
  • ...3 more annotations...
  • The brain is always changed by what it does.  That's how we learn, from infancy on, and that's how a baby born in New York has different cultural patterns of behavior, language, gesture, interaction, socialization, and attention than a baby born the same day in Beijing. That's as true for the historical moment into which we are born as it is for the geographical location.  Our attention is shaped by all we do, and reshaped by all we do.  That is what learning is.  The best we can do as educators is find ways to improve our institutions of learning to help our kids be prepared for their future--not for our past.
  • I didn't find the article nearly as stigmatizing and retrograde as I do the knee-jerk Don't Tread on Me reactions of everyone I've seen respond--most of which amount to foolish technolibertarian celebrations of the anonymous savior Technology (Cathy, you don't do that there, even if you also have nothing good to say about the NYT piece).If anything, the article showed that these kids (like all of us!) are profoundly distressed by today's media ecology. They seem to have a far more subtle perspective on things than most others. Frankly I'm a bit gobstopped that everyone hates this article so much. As for the old chestnut that "we need new education for the information age," it's worth pointing out that there was no formal, standardized education system before the industrial age. Compulsory education is a century old experiment. And yes, it ought to be discarded. But that's a frightening prospect for almost everyone, including those who advocate for it. I wonder how many of the intelligentsia who raise their fists and cry, "We need a different education system!" still partake of the old system for their own kids. We don't in my house, for what it's worth, and it's a huge pain in the ass.
  • Cathy -- I really appreciate the distinctions you make between the "the biology of attention" and "the sociology of change." And I agree that more complex and nuanced conversations about technology's relationship to attention, diverstion, focus, and immersion will be more productive (than either nostalgia or utopic futurism). For example, it seems like a strange oversight (in the NYT piece) to bemoan the ability of "kids these days" to focus, read immersively, or Pay Attention, yet report without comment that these same kids can edit video for hours on end -- creative, immersive work which, I would imagine, requires more than a little focus. It seems that perhaps the question is not whether we can still pay attention or focus, but what those diverse forms of immersion within different media (will) look like.
  •  
    I recommend both this commentary and the original NYT piece to which it links and on which it comments.
Ed Webb

The Web Means the End of Forgetting - NYTimes.com - 1 views

  • for a great many people, the permanent memory bank of the Web increasingly means there are no second chances — no opportunities to escape a scarlet letter in your digital past. Now the worst thing you’ve done is often the first thing everyone knows about you.
  • a collective identity crisis. For most of human history, the idea of reinventing yourself or freely shaping your identity — of presenting different selves in different contexts (at home, at work, at play) — was hard to fathom, because people’s identities were fixed by their roles in a rigid social hierarchy. With little geographic or social mobility, you were defined not as an individual but by your village, your class, your job or your guild. But that started to change in the late Middle Ages and the Renaissance, with a growing individualism that came to redefine human identity. As people perceived themselves increasingly as individuals, their status became a function not of inherited categories but of their own efforts and achievements. This new conception of malleable and fluid identity found its fullest and purest expression in the American ideal of the self-made man, a term popularized by Henry Clay in 1832.
  • the dawning of the Internet age promised to resurrect the ideal of what the psychiatrist Robert Jay Lifton has called the “protean self.” If you couldn’t flee to Texas, you could always seek out a new chat room and create a new screen name. For some technology enthusiasts, the Web was supposed to be the second flowering of the open frontier, and the ability to segment our identities with an endless supply of pseudonyms, avatars and categories of friendship was supposed to let people present different sides of their personalities in different contexts. What seemed within our grasp was a power that only Proteus possessed: namely, perfect control over our shifting identities. But the hope that we could carefully control how others view us in different contexts has proved to be another myth. As social-networking sites expanded, it was no longer quite so easy to have segmented identities: now that so many people use a single platform to post constant status updates and photos about their private and public activities, the idea of a home self, a work self, a family self and a high-school-friends self has become increasingly untenable. In fact, the attempt to maintain different selves often arouses suspicion.
  • ...20 more annotations...
  • All around the world, political leaders, scholars and citizens are searching for responses to the challenge of preserving control of our identities in a digital world that never forgets. Are the most promising solutions going to be technological? Legislative? Judicial? Ethical? A result of shifting social norms and cultural expectations? Or some mix of the above?
  • These approaches share the common goal of reconstructing a form of control over our identities: the ability to reinvent ourselves, to escape our pasts and to improve the selves that we present to the world.
  • many technological theorists assumed that self-governing communities could ensure, through the self-correcting wisdom of the crowd, that all participants enjoyed the online identities they deserved. Wikipedia is one embodiment of the faith that the wisdom of the crowd can correct most mistakes — that a Wikipedia entry for a small-town mayor, for example, will reflect the reputation he deserves. And if the crowd fails — perhaps by turning into a digital mob — Wikipedia offers other forms of redress
  • In practice, however, self-governing communities like Wikipedia — or algorithmically self-correcting systems like Google — often leave people feeling misrepresented and burned. Those who think that their online reputations have been unfairly tarnished by an isolated incident or two now have a practical option: consulting a firm like ReputationDefender, which promises to clean up your online image. ReputationDefender was founded by Michael Fertik, a Harvard Law School graduate who was troubled by the idea of young people being forever tainted online by their youthful indiscretions. “I was seeing articles about the ‘Lord of the Flies’ behavior that all of us engage in at that age,” he told me, “and it felt un-American that when the conduct was online, it could have permanent effects on the speaker and the victim. The right to new beginnings and the right to self-definition have always been among the most beautiful American ideals.”
  • In the Web 3.0 world, Fertik predicts, people will be rated, assessed and scored based not on their creditworthiness but on their trustworthiness as good parents, good dates, good employees, good baby sitters or good insurance risks.
  • “Our customers include parents whose kids have talked about them on the Internet — ‘Mom didn’t get the raise’; ‘Dad got fired’; ‘Mom and Dad are fighting a lot, and I’m worried they’ll get a divorce.’ ”
  • as facial-recognition technology becomes more widespread and sophisticated, it will almost certainly challenge our expectation of anonymity in public
  • Ohm says he worries that employers would be able to use social-network-aggregator services to identify people’s book and movie preferences and even Internet-search terms, and then fire or refuse to hire them on that basis. A handful of states — including New York, California, Colorado and North Dakota — broadly prohibit employers from discriminating against employees for legal off-duty conduct like smoking. Ohm suggests that these laws could be extended to prevent certain categories of employers from refusing to hire people based on Facebook pictures, status updates and other legal but embarrassing personal information. (In practice, these laws might be hard to enforce, since employers might not disclose the real reason for their hiring decisions, so employers, like credit-reporting agents, might also be required by law to disclose to job candidates the negative information in their digital files.)
  • research group’s preliminary results suggest that if rumors spread about something good you did 10 years ago, like winning a prize, they will be discounted; but if rumors spread about something bad that you did 10 years ago, like driving drunk, that information has staying power
  • many people aren’t worried about false information posted by others — they’re worried about true information they’ve posted about themselves when it is taken out of context or given undue weight. And defamation law doesn’t apply to true information or statements of opinion. Some legal scholars want to expand the ability to sue over true but embarrassing violations of privacy — although it appears to be a quixotic goal.
  • Researchers at the University of Washington, for example, are developing a technology called Vanish that makes electronic data “self-destruct” after a specified period of time. Instead of relying on Google, Facebook or Hotmail to delete the data that is stored “in the cloud” — in other words, on their distributed servers — Vanish encrypts the data and then “shatters” the encryption key. To read the data, your computer has to put the pieces of the key back together, but they “erode” or “rust” as time passes, and after a certain point the document can no longer be read.
  • Plenty of anecdotal evidence suggests that young people, having been burned by Facebook (and frustrated by its privacy policy, which at more than 5,000 words is longer than the U.S. Constitution), are savvier than older users about cleaning up their tagged photos and being careful about what they post.
  • norms are already developing to recreate off-the-record spaces in public, with no photos, Twitter posts or blogging allowed. Milk and Honey, an exclusive bar on Manhattan’s Lower East Side, requires potential members to sign an agreement promising not to blog about the bar’s goings on or to post photos on social-networking sites, and other bars and nightclubs are adopting similar policies. I’ve been at dinners recently where someone has requested, in all seriousness, “Please don’t tweet this” — a custom that is likely to spread.
  • There’s already a sharp rise in lawsuits known as Twittergation — that is, suits to force Web sites to remove slanderous or false posts.
  • strategies of “soft paternalism” that might nudge people to hesitate before posting, say, drunken photos from Cancún. “We could easily think about a system, when you are uploading certain photos, that immediately detects how sensitive the photo will be.”
  • It’s sobering, now that we live in a world misleadingly called a “global village,” to think about privacy in actual, small villages long ago. In the villages described in the Babylonian Talmud, for example, any kind of gossip or tale-bearing about other people — oral or written, true or false, friendly or mean — was considered a terrible sin because small communities have long memories and every word spoken about other people was thought to ascend to the heavenly cloud. (The digital cloud has made this metaphor literal.) But the Talmudic villages were, in fact, far more humane and forgiving than our brutal global village, where much of the content on the Internet would meet the Talmudic definition of gossip: although the Talmudic sages believed that God reads our thoughts and records them in the book of life, they also believed that God erases the book for those who atone for their sins by asking forgiveness of those they have wronged. In the Talmud, people have an obligation not to remind others of their past misdeeds, on the assumption they may have atoned and grown spiritually from their mistakes. “If a man was a repentant [sinner],” the Talmud says, “one must not say to him, ‘Remember your former deeds.’ ” Unlike God, however, the digital cloud rarely wipes our slates clean, and the keepers of the cloud today are sometimes less forgiving than their all-powerful divine predecessor.
  • On the Internet, it turns out, we’re not entitled to demand any particular respect at all, and if others don’t have the empathy necessary to forgive our missteps, or the attention spans necessary to judge us in context, there’s nothing we can do about it.
  • Gosling is optimistic about the implications of his study for the possibility of digital forgiveness. He acknowledged that social technologies are forcing us to merge identities that used to be separate — we can no longer have segmented selves like “a home or family self, a friend self, a leisure self, a work self.” But although he told Facebook, “I have to find a way to reconcile my professor self with my having-a-few-drinks self,” he also suggested that as all of us have to merge our public and private identities, photos showing us having a few drinks on Facebook will no longer seem so scandalous. “You see your accountant going out on weekends and attending clown conventions, that no longer makes you think that he’s not a good accountant. We’re coming to terms and reconciling with that merging of identities.”
  • a humane society values privacy, because it allows people to cultivate different aspects of their personalities in different contexts; and at the moment, the enforced merging of identities that used to be separate is leaving many casualties in its wake.
  • we need to learn new forms of empathy, new ways of defining ourselves without reference to what others say about us and new ways of forgiving one another for the digital trails that will follow us forever
Ed Webb

How the U.S. Military Buys Location Data from Ordinary Apps - 0 views

  • The U.S. military is buying the granular movement data of people around the world, harvested from innocuous-seeming apps, Motherboard has learned. The most popular app among a group Motherboard analyzed connected to this sort of data sale is a Muslim prayer and Quran app that has more than 98 million downloads worldwide. Others include a Muslim dating app, a popular Craigslist app, an app for following storms, and a "level" app that can be used to help, for example, install shelves in a bedroom.
  • The Locate X data itself is anonymized, but the source said "we could absolutely deanonymize a person." Babel Street employees would "play with it, to be honest,"
  • "Our access to the software is used to support Special Operations Forces mission requirements overseas. We strictly adhere to established procedures and policies for protecting the privacy, civil liberties, constitutional and legal rights of American citizens."
  • ...7 more annotations...
  • In March, tech publication Protocol first reported that U.S. law enforcement agencies such as Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) were using Locate X. Motherboard then obtained an internal Secret Service document confirming the agency's use of the technology. Some government agencies, including CBP and the Internal Revenue Service (IRS), have also purchased access to location data from another vendor called Venntel.
  • the company tracks 25 million devices inside the United States every month, and 40 million elsewhere, including in the European Union, Latin America, and the Asia-Pacific region
  • Motherboard found another network of dating apps that look and operate nearly identically to Mingle, including sending location data to X-Mode. Motherboard installed another dating app, called Iran Social, on a test device and observed GPS coordinates being sent to the company. The network of apps also includes Turkey Social, Egypt Social, Colombia Social, and others focused on particular countries.
  • Senator Ron Wyden told Motherboard in a statement that X-Mode said it is selling location data harvested from U.S. phones to U.S. military customers."In a September call with my office, lawyers for the data broker X-Mode Social confirmed that the company is selling data collected from phones in the United States to U.S. military customers, via defense contractors. Citing non-disclosure agreements, the company refused to identify the specific defense contractors or the specific government agencies buying the data,"
  • some apps that are harvesting location data on behalf of X-Mode are essentially hiding the data transfer. Muslim Pro does not mention X-Mode in its privacy policy, and did not provide any sort of pop-up when installing or opening the app that explained the transfer of location data in detail. The privacy policy does say Muslim Pro works with Tutela and Quadrant, two other location data companies, however. Motherboard did observe data transfer to Tutela.
  • The Muslim Mingle app provided no pop-up disclosure in Motherboard's tests, nor does the app's privacy policy mention X-Mode at all. Iran Social, one of the apps in the second network of dating apps that used much of the same code, also had the same lack of disclosures around the sale of location data.
  • "The question to ask is whether a reasonable consumer of these services would foresee of these uses and agree to them if explicitly asked. It is safe to say from this context that the reasonable consumer—who is not a tech person—would not have military uses of their data in mind, even if they read the disclosures."
1 - 10 of 10
Showing 20 items per page