Skip to main content

Home/ Future of the Web/ Group items tagged linkedin

Rss Feed Group items tagged

Paul Merrell

NSA contractors use LinkedIn profiles to cash in on national security | Al Jazeera America - 0 views

  • NSA spies need jobs, too. And that is why many covert programs could be hiding in plain sight. Job websites such as LinkedIn and Indeed.com contain hundreds of profiles that reference classified NSA efforts, posted by everyone from career government employees to low-level IT workers who served in Iraq or Afghanistan. They offer a rare glimpse into the intelligence community's projects and how they operate. Now some researchers are using the same kinds of big-data tools employed by the NSA to scrape public LinkedIn profiles for classified programs. But the presence of so much classified information in public view raises serious concerns about security — and about the intelligence industry as a whole. “I’ve spent the past couple of years searching LinkedIn profiles for NSA programs,” said Christopher Soghoian, the principal technologist with the American Civil Liberties Union’s Speech, Privacy and Technology Project.
  • On Aug. 3, The Wall Street Journal published a story about the FBI’s growing use of hacking to monitor suspects, based on information Soghoian provided. The next day, Soghoian spoke at the Defcon hacking conference about how he uncovered the existence of the FBI’s hacking team, known as the Remote Operations Unit (ROU), using the LinkedIn profiles of two employees at James Bimen Associates, with which the FBI contracts for hacking operations. “Had it not been for the sloppy actions of a few contractors updating their LinkedIn profiles, we would have never known about this,” Soghoian said in his Defcon talk. Those two contractors were not the only ones being sloppy.
  • And there are many more. A quick search of Indeed.com using three code names unlikely to return false positives — Dishfire, XKeyscore and Pinwale — turned up 323 résumés. The same search on LinkedIn turned up 48 profiles mentioning Dishfire, 18 mentioning XKeyscore and 74 mentioning Pinwale. Almost all these people appear to work in the intelligence industry. Network-mapping the data Fabio Pietrosanti of the Hermes Center for Transparency and Digital Human Rights noticed all the code names on LinkedIn last December. While sitting with M.C. McGrath at the Chaos Communication Congress in Hamburg, Germany, Pietrosanti began searching the website for classified program names — and getting serious results. McGrath was already developing Transparency Toolkit, a Web application for investigative research, and knew he could improve on Pietrosanti’s off-the-cuff methods.
  • ...2 more annotations...
  • “I was, like, huh, maybe there’s more we can do with this — actually get a list of all these profiles that have these results and use that to analyze the structure of which companies are helping with which programs, which people are helping with which programs, try to figure out in what capacity, and learn more about things that we might not know about,” McGrath said. He set up a computer program called a scraper to search LinkedIn for public profiles that mention known NSA programs, contractors or jargon — such as SIGINT, the agency’s term for “signals intelligence” gleaned from intercepted communications. Once the scraper found the name of an NSA program, it searched nearby for other words in all caps. That allowed McGrath to find the names of unknown programs, too. Once McGrath had the raw data — thousands of profiles in all, with 70 to 80 different program names — he created a network graph that showed the relationships between specific government agencies, contractors and intelligence programs. Of course, the data are limited to what people are posting on their LinkedIn profiles. Still, the network graph gives a sense of which contractors work on several NSA programs, which ones work on just one or two, and even which programs military units in Iraq and Afghanistan are using. And that is just the beginning.
  • Click on the image to view an interactive network illustration of the relationships between specific national security surveillance programs in red, and government organizations or private contractors in blue.
  •  
    What a giggle, public spying on NSA and its contractors using Big Data. The interactive network graph with its sidebar display of relevant data derived from LinkedIn profiles is just too delightful. 
Gonzalo San Gil, PhD.

5 Tips for Effectively Managing a LinkedIn Group | Social Media Examiner - 1 views

  •  
    [Are you currently managing your own LinkedIn group? Are you considering launching a LinkedIn group? Keep reading for five tips on how to better manage LinkedIn groups. ...]
Gonzalo San Gil, PhD.

The Influence of Music on Your Mood | Denise Dema | LinkedIn - 0 views

  •  
    [https://www.linkedin.com/in/denisedema] "I was listening to a CD a friend/DJ made for me last night and started thinking about the power of music's influence on mood. "
  •  
    [https://www.linkedin.com/in/denisedema] "I was listening to a CD a friend/DJ made for me last night and started thinking about the power of music's influence on mood. "
Gonzalo San Gil, PhD.

Make it Free: Fifty Years of Content Marketing Grateful Dead Style | David Meerman Scot... - 0 views

  •  
    [https://www.linkedin.com/in/davidmeermanscott] "The Grateful Dead used free content to build a social network of fans before Mark Zuckerberg was even born. They pioneered many of the ideas we now use in social media and content marketing."
  •  
    [https://www.linkedin.com/in/davidmeermanscott] "The Grateful Dead used free content to build a social network of fans before Mark Zuckerberg was even born. They pioneered many of the ideas we now use in social media and content marketing."
Gonzalo San Gil, PhD.

Take Control Of Your Online Reputation | Frank Iacono | LinkedIn [# ! Via Frank Iacono ... - 0 views

  •  
    "What is Online Reputation Management? In today's highly competitive marketplace, protecting a brand image online is the most important thing a company can do. Online Reputation Management (ORM) is more than simply monitoring to see who mentions your name."
Gonzalo San Gil, PhD.

LinkedIn Breach Exposed 117 Million User Accounts - eSecurity Planet [# :/ Note... to k... - 0 views

  •  
    "The stolen database holds 167 million records, of which 117 million include email addresses and passwords. By Jeff Goldman | Posted May 20, 201"
Gonzalo San Gil, PhD.

Lessig for President | Enrique Dans | LinkedIn - 0 views

  • Lawrence Lessig is, without doubt, one of America’s most respected and prestigious intellectuals.
Gonzalo San Gil, PhD.

Facebook vs. Twitter: Who Wins The Battle For Our Social Attention? | Steve Tappin | Li... - 0 views

  •  
    [In 2014, as the hype and newness die down, social media is increasingly something we take for granted in our daily lives. There's a big battle going on to keep our social attention: which of these two companies will prove dominant and win? ...]
  •  
    [In 2014, as the hype and newness die down, social media is increasingly something we take for granted in our daily lives. There's a big battle going on to keep our social attention: which of these two companies will prove dominant and win? ...]
Gonzalo San Gil, PhD.

Here's why patents are innovation's worst enemy | Vivek Wadhwa | LinkedIn - 1 views

  •  
    "The Founding Fathers of the United States considered intellectual property so important that they gave it a special place in the Constitution: "To promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries.""
  •  
    "The Founding Fathers of the United States considered intellectual property so important that they gave it a special place in the Constitution: "To promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries.""
  •  
    The quote is somewhat misleading because it is out of context. The section is preceded by: "The Congress shall have Power ..." Those are words of discretion, not commandment. Nothing in the Constitution *requires* that patent and copyright systems be established. "Stable ownership is the gift of social law, and is given late in the progress of society. It would be curious then, if an idea, the fugitive fermentation of an individual brain, could, of natural right, be claimed in exclusive and stable property. If nature has made any one thing less susceptible than all others of exclusive property, it is the action of the thinking power called an idea, which an individual may exclusively possess as long as he keeps it to himself; but the moment it is divulged, it forces itself into the possession of every one, and the receiver cannot dispossess himself of it. Its peculiar character, too, is that no one possesses the less, because every other possesses the whole of it. He who receives an idea from me, receives instruction himself without lessening mine; as he who lights his taper at mine, receives light without darkening me. That ideas should freely spread from one to another over the globe, for the moral and mutual instruction of man, and improvement of his condition, seems to have been peculiarly and benevolently designed by nature, when she made them, like fire, expansible over all space, without lessening their density in any point, and like the air in which we breathe, move, and have our physical being, incapable of confinement or exclusive appropriation. Inventions then cannot, in nature, be a subject of property. Society may give an exclusive right to the profits arising from them, as an encouragement to men to pursue ideas which may produce utility, *but this may or may not be done, according to the will and convenience of the society, without claim or complaint from any body."* VI Writings of Thomas Jefferson, at 180-181 (Washington ed.).
Gonzalo San Gil, PhD.

How the MPAA Can Become Great Again | Gary Shapiro | LinkedIn - 0 views

  •  
    "Gary Shapiro Influencer President and CEO at Consumer Electronics Association" [How does one of the most famous and important American trade groups reinvent itself? For 30-plus years, I fought against and occasionally worked with the Motion Picture Association of America (MPAA). ...]
  •  
    "Gary Shapiro Influencer President and CEO at Consumer Electronics Association"
Gonzalo San Gil, PhD.

What's Your Threat Score? | Alternet [Via] - 1 views

  •  
    "it's a computer algorithm that steals your data and calculates your likelihood of risk and threat for the fuzz." [# Via Janet Innes-Kirkwood https://www.linkedin.com/in/janet-innes-kirkwood-23669b64]
  •  
    "it's a computer algorithm that steals your data and calculates your likelihood of risk and threat for the fuzz." [# Via Janet Innes-Kirkwood https://www.linkedin.com/in/janet-innes-kirkwood-23669b64]
Paul Merrell

NSA Director Finally Admits Encryption Is Needed to Protect Public's Privacy - 0 views

  • NSA Director Finally Admits Encryption Is Needed to Protect Public’s Privacy The new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. By Carey Wedler | AntiMedia | January 22, 2016 Share this article! https://mail.google.com/mail/?view=cm&fs=1&to&su=NSA%20Director%20Finally%20Admits%20Encryption%20Is%20Needed%20to%20Protect%20Public%E2%80%99s%20Privacy&body=http%3A%2F%2Fwww.mintpress
  • Rogers cited the recent Office of Personnel Management hack of over 20 million users as a reason to increase encryption rather than scale it back. “What you saw at OPM, you’re going to see a whole lot more of,” he said, referring to the massive hack that compromised the personal data about 20 million people who obtained background checks. Rogers’ comments, while forward-thinking, signify an about face in his stance on encryption. In February 2015, he said he “shares [FBI] Director [James] Comey’s concern” about cell phone companies’ decision to add encryption features to their products. Comey has been one loudest critics of encryption. However, Rogers’ comments on Thursday now directly conflict with Comey’s stated position. The FBI director has publicly chastised encryption, as well as the companies that provide it. In 2014, he claimed Apple’s then-new encryption feature could lead the world to “a very dark place.” At a Department of Justice hearing in November, Comey testified that “Increasingly, the shadow that is ‘going dark’ is falling across more and more of our work.” Though he claimed, “We support encryption,” he insisted “we have a problem that encryption is crashing into public safety and we have to figure out, as people who care about both, to resolve it. So, I think the conversation’s in a healthier place.”
  • At the same hearing, Comey and Attorney General Loretta Lynch declined to comment on whether they had proof the Paris attackers used encryption. Even so, Comey recently lobbied for tech companies to do away with end-to-end encryption. However, his crusade has fallen on unsympathetic ears, both from the private companies he seeks to control — and from the NSA. Prior to Rogers’ statements in support of encryption Thursday, former NSA chief Michael Hayden said, “I disagree with Jim Comey. I actually think end-to-end encryption is good for America.” Still another former NSA chair has criticized calls for backdoor access to information. In October, Mike McConnell told a panel at an encryption summit that the United States is “better served by stronger encryption, rather than baking in weaker encryption.” Former Department of Homeland Security chief, Michael Chertoff, has also spoken out against government being able to bypass encryption.
  • ...2 more annotations...
  • Regardless of these individual defenses of encryption, the Intercept explained why these statements may be irrelevant: “Left unsaid is the fact that the FBI and NSA have the ability to circumvent encryption and get to the content too — by hacking. Hacking allows law enforcement to plant malicious code on someone’s computer in order to gain access to the photos, messages, and text before they were ever encrypted in the first place, and after they’ve been decrypted. The NSA has an entire team of advanced hackers, possibly as many as 600, camped out at Fort Meade.”
  • Rogers statements, of course, are not a full-fledged endorsement of privacy, nor can the NSA be expected to make it a priority. Even so, his new stance denotes a growing awareness within the government that Americans are not comfortable with the State’s grip on their data. “So spending time arguing about ‘hey, encryption is bad and we ought to do away with it’ … that’s a waste of time to me,” Rogers said Thursday. “So what we’ve got to ask ourselves is, with that foundation, what’s the best way for us to deal with it? And how do we meet those very legitimate concerns from multiple perspectives?”
Gonzalo San Gil, PhD.

How The Internet Is Destroying Our Lives Too | LinkedIn - 0 views

  •  
    "Govindraj Ethiraj Founder, Ping Digital Broadcast, IndiaSpend Imagine visiting your doctor one day complaining of a headache. And your doctor says, just as you sit down, "Well, you could have anything from a hangover to a brain tumour.""
  •  
    "Govindraj Ethiraj Founder, Ping Digital Broadcast, IndiaSpend Imagine visiting your doctor one day complaining of a headache. And your doctor says, just as you sit down, "Well, you could have anything from a hangover to a brain tumour.""
Gonzalo San Gil, PhD.

Hungry for Authentic Journalism? Picture This! | Jerry Ashton | LinkedIn - 0 views

  •  
    "One of the most significant outcomes so far in this election cycle has been the exposure of Main Stream Media (MSM) as a sham and the noisy emergence of its antidote - Alternative Media (Alt.M)."
  •  
    "One of the most significant outcomes so far in this election cycle has been the exposure of Main Stream Media (MSM) as a sham and the noisy emergence of its antidote - Alternative Media (Alt.M)."
Gonzalo San Gil, PhD.

10 alternative social networks for business professionals | ITworld - 1 views

  •  
    [LinkedIn maybe No. 1 when it comes to professional social networking, but your quest to connect doesn't need to stop there. Here's a look at 10 social networks for professionals that offer a variety of features such as Facebook integration, career advice, resume critiques and more.]
Gonzalo San Gil, PhD.

Europe Wants Apple's Mountains of Cash: Top Stories for Monday | LinkedIn - 0 views

  •  
    "HILLS OF CASH - Tim Cook has bigger than "Bendghazi" on his mind right now. Apple may be fined billions of euros in back taxes in Europe over its tax arrangements in Ireland dating back to 1991"
  •  
    "HILLS OF CASH - Tim Cook has bigger than "Bendghazi" on his mind right now. Apple may be fined billions of euros in back taxes in Europe over its tax arrangements in Ireland dating back to 1991"
Gonzalo San Gil, PhD.

Binney: the NSA is destroying democracy | ITWeb - 1 views

  •  
    [The US's National Security Agency is destroying democracy by collecting data on everyone in the world, says the agency's former technical director, William Binney. This, he says, is a situation he feels partly responsible for. ...]
Paul Merrell

Hacking Team Asks Customers to Stop Using Its Software After Hack | Motherboard - 1 views

  • But the hack hasn’t just ruined the day for Hacking Team’s employees. The company, which sells surveillance software to government customers all over the world, from Morocco and Ethiopia to the US Drug Enforcement Agency and the FBI, has told all its customers to shut down all operations and suspend all use of the company’s spyware, Motherboard has learned. “They’re in full on emergency mode,” a source who has inside knowledge of Hacking Team’s operations told Motherboard.
  • A source told Motherboard that the hackers appears to have gotten “everything,” likely more than what the hacker has posted online, perhaps more than one terabyte of data. “The hacker seems to have downloaded everything that there was in the company’s servers,” the source, who could only speak on condition of anonymity, told Motherboard. “There’s pretty much everything here.” It’s unclear how the hackers got their hands on the stash, but judging from the leaked files, they broke into the computers of Hacking Team’s two systems administrators, Christian Pozzi and Mauro Romeo, who had access to all the company’s files, according to the source. “I did not expect a breach to be this big, but I’m not surprised they got hacked because they don’t take security seriously,” the source told me. “You can see in the files how much they royally fucked up.”
  • Hacking Team notified all its customers on Monday morning with a “blast email,” requesting them to shut down all deployments of its Remote Control System software, also known as Galileo, according to multiple sources. The company also doesn’t have access to its email system as of Monday afternoon, a source said. On Sunday night, an unnamed hacker, who claimed to be the same person who breached Hacking Team’s competitor FinFisher last year, hijacked its Twitter account and posted links to 400GB of internal data. Hacking Team woke up to a massive breach of its systems.
  • ...2 more annotations...
  • For example, the source noted, none of the sensitive files in the data dump, from employees passports to list of customers, appear to be encrypted. “How can you give all the keys to your infrastructure to a 20-something who just joined the company?” he added, referring to Pozzi, whose LinkedIn shows he’s been at Hacking Team for just over a year. “Nobody noticed that someone stole a terabyte of data? You gotta be a fuckwad,” the source said. “It means nobody was taking care of security.”
  • The future of the company, at this point, it’s uncertain. Employees fear this might be the beginning of the end, according to sources. One current employee, for example, started working on his resume, a source told Motherboard. It’s also unclear how customers will react to this, but a source said that it’s likely that customers from countries such as the US will pull the plug on their contracts. Hacking Team asked its customers to shut down operations, but according to one of the leaked files, as part of Hacking Team’s “crisis procedure,” it could have killed their operations remotely. The company, in fact, has “a backdoor” into every customer’s software, giving it ability to suspend it or shut it down—something that even customers aren’t told about. To make matters worse, every copy of Hacking Team’s Galileo software is watermarked, according to the source, which means Hacking Team, and now everyone with access to this data dump, can find out who operates it and who they’re targeting with it.
Gonzalo San Gil, PhD.

Crowdfunding Sherpas, una guía gratuita para emprendedores y creadores [# ! V... - 0 views

    • Gonzalo San Gil, PhD.
       
      [# ! Via Raúl López's LinkedIn...]
  •  
    [¿Qué tienen en común una pandereta, una película de astronautas, un juego de cartas para parejas, un submarino científico y un CD de música? Todos ellos consiguieron financiación a través de Crowdfunding. Y ahora sus creadores te cuentan cómo en esta guía gratuita. ...]
Gonzalo San Gil, PhD.

Apple Music Didn't Kill Spotify. Amazon's New Streaming Service Won't, Either. | Katie ... - 0 views

  •  
    "Amazon is working on a 'Spotify killer'. Sound familiar? Apple Music was hailed as such by basically everyone. Google's All Access was called the same, back in 2013. Even Tidal got the label. And now it's Amazon's turn. As first "
1 - 20 of 34 Next ›
Showing 20 items per page