Skip to main content

Home/ Future of the Web/ Group items tagged ways

Rss Feed Group items tagged

Paul Merrell

Civil Rights Coalition files FCC Complaint Against Baltimore Police Department for Ille... - 0 views

  • This week the Center for Media Justice, ColorOfChange.org, and New America’s Open Technology Institute filed a complaint with the Federal Communications Commission alleging the Baltimore police are violating the federal Communications Act by using cell site simulators, also known as Stingrays, that disrupt cellphone calls and interfere with the cellular network—and are doing so in a way that has a disproportionate impact on communities of color. Stingrays operate by mimicking a cell tower and directing all cellphones in a given area to route communications through the Stingray instead of the nearby tower. They are especially pernicious surveillance tools because they collect information on every single phone in a given area—not just the suspect’s phone—this means they allow the police to conduct indiscriminate, dragnet searches. They are also able to locate people inside traditionally-protected private spaces like homes, doctors’ offices, or places of worship. Stingrays can also be configured to capture the content of communications. Because Stingrays operate on the same spectrum as cellular networks but are not actually transmitting communications the way a cell tower would, they interfere with cell phone communications within as much as a 500 meter radius of the device (Baltimore’s devices may be limited to 200 meters). This means that any important phone call placed or text message sent within that radius may not get through. As the complaint notes, “[d]epending on the nature of an emergency, it may be urgently necessary for a caller to reach, for example, a parent or child, doctor, psychiatrist, school, hospital, poison control center, or suicide prevention hotline.” But these and even 911 calls could be blocked.
  • The Baltimore Police Department could be among the most prolific users of cell site simulator technology in the country. A Baltimore detective testified last year that the BPD used Stingrays 4,300 times between 2007 and 2015. Like other law enforcement agencies, Baltimore has used its devices for major and minor crimes—everything from trying to locate a man who had kidnapped two small children to trying to find another man who took his wife’s cellphone during an argument (and later returned it). According to logs obtained by USA Today, the Baltimore PD also used its Stingrays to locate witnesses, to investigate unarmed robberies, and for mysterious “other” purposes. And like other law enforcement agencies, the Baltimore PD has regularly withheld information about Stingrays from defense attorneys, judges, and the public. Moreover, according to the FCC complaint, the Baltimore PD’s use of Stingrays disproportionately impacts African American communities. Coming on the heels of a scathing Department of Justice report finding “BPD engages in a pattern or practice of conduct that violates the Constitution or federal law,” this may not be surprising, but it still should be shocking. The DOJ’s investigation found that BPD not only regularly makes unconstitutional stops and arrests and uses excessive force within African-American communities but also retaliates against people for constitutionally protected expression, and uses enforcement strategies that produce “severe and unjustified disparities in the rates of stops, searches and arrests of African Americans.”
  • Adding Stingrays to this mix means that these same communities are subject to more surveillance that chills speech and are less able to make 911 and other emergency calls than communities where the police aren’t regularly using Stingrays. A map included in the FCC complaint shows exactly how this is impacting Baltimore’s African-American communities. It plots hundreds of addresses where USA Today discovered BPD was using Stingrays over a map of Baltimore’s black population based on 2010 Census data included in the DOJ’s recent report:
  • ...2 more annotations...
  • The Communications Act gives the FCC the authority to regulate radio, television, wire, satellite, and cable communications in all 50 states, the District of Columbia and U.S. territories. This includes being responsible for protecting cellphone networks from disruption and ensuring that emergency calls can be completed under any circumstances. And it requires the FCC to ensure that access to networks is available “to all people of the United States, without discrimination on the basis of race, color, religion, national origin, or sex.” Considering that the spectrum law enforcement is utilizing without permission is public property leased to private companies for the purpose of providing them next generation wireless communications, it goes without saying that the FCC has a duty to act.
  • But we should not assume that the Baltimore Police Department is an outlier—EFF has found that law enforcement has been secretly using stingrays for years and across the country. No community should have to speculate as to whether such a powerful surveillance technology is being used on its residents. Thus, we also ask the FCC to engage in a rule-making proceeding that addresses not only the problem of harmful interference but also the duty of every police department to use Stingrays in a constitutional way, and to publicly disclose—not hide—the facts around acquisition and use of this powerful wireless surveillance technology.  Anyone can support the complaint by tweeting at FCC Commissioners or by signing the petitions hosted by Color of Change or MAG-Net.
  •  
    An important test case on the constitutionality of stingray mobile device surveillance.
Gonzalo San Gil, PhD.

Contributing to an Open Source Project | FOSS Force - 0 views

  •  
    "Phil Shapiro There are many ways to contribute to an open source project. There are also many reasons for doing so. But before jumping in, you might want to know how things generally work within these projects."
  •  
    "Phil Shapiro There are many ways to contribute to an open source project. There are also many reasons for doing so. But before jumping in, you might want to know how things generally work within these projects."
Gonzalo San Gil, PhD.

[# ! #Tech:] Discover to which package a file belongs to - Linux Audit - 0 views

  •  
    "Sometimes you want to know the related package of a file, before installation, or when it is already there. This is of great help during system hardening or general system cleanups. In this article we have a look at several ways to determine the relationships between files and the package they belong to."
  •  
    "Sometimes you want to know the related package of a file, before installation, or when it is already there. This is of great help during system hardening or general system cleanups. In this article we have a look at several ways to determine the relationships between files and the package they belong to."
Gonzalo San Gil, PhD.

Appeals Court Tells Government It Must Extend Educational Institution FOIA Fee Price Br... - 0 views

  •  
    "The perennial FOIA Reform Masquerade Ball is again under way, with legislators attempting to dodge blustery requests to "cut in" by administration officials and similarly-motivated federal agencies. The dance usually ends with Congressional committee chairmen yanking needles from records and booting everyone out of the dancehall. Meanwhile, limited headway is being made in another branch of the government, far from the muffled protests of overwhelming majorities who have been shouted down by parties of one. The DC Appeals Court has just ruled that the government must extend its FOIA fee discounts to students at educational institutions, rather than just to instructors and administration. "
  •  
    "The perennial FOIA Reform Masquerade Ball is again under way, with legislators attempting to dodge blustery requests to "cut in" by administration officials and similarly-motivated federal agencies. The dance usually ends with Congressional committee chairmen yanking needles from records and booting everyone out of the dancehall. Meanwhile, limited headway is being made in another branch of the government, far from the muffled protests of overwhelming majorities who have been shouted down by parties of one. The DC Appeals Court has just ruled that the government must extend its FOIA fee discounts to students at educational institutions, rather than just to instructors and administration. "
Alexandra IcecreamApps

How to Convert Scanned PDF to Word - Icecream Tech Digest - 0 views

  •  
    Converting PDF to Word is a great way to edit PDF documents just like any other text files. The main difficulty is to edit and, as we just found out, convert scanned PDF documents. We decided to figure out the … Continue reading →
  •  
    Converting PDF to Word is a great way to edit PDF documents just like any other text files. The main difficulty is to edit and, as we just found out, convert scanned PDF documents. We decided to figure out the … Continue reading →
Alexandra IcecreamApps

How to Make a GIF - Icecream Tech Digest - 0 views

  •  
    GIF files are a widespread and popular way of sharing small animation. Such images are widely used on entertainment resources thanks to the fact that they can show some motion but take considerably smaller space than videos. You can make … Continue reading →
  •  
    GIF files are a widespread and popular way of sharing small animation. Such images are widely used on entertainment resources thanks to the fact that they can show some motion but take considerably smaller space than videos. You can make … Continue reading →
Gonzalo San Gil, PhD.

The "Internet Governance" Farce and its "Multi-stakeholder" Illusion | La Quadrature du... - 0 views

  •  
    by Jérémie Zimmermann For almost 15 years, "Internet Governance" meetings1 have been drawing attention and driving our imaginaries towards believing that consensual rules for the Internet could emerge from global "multi-stakeholder" discussions. A few days ahead of the "NETmundial" Forum in Sao Paulo it has become obvious that "Internet Governance" is a farcical way of keeping us busy and hiding a sad reality: Nothing concrete in these 15 years, not a single action, ever emerged from "multi-stakeholder" meetings, while at the same time, technology as a whole has been turned against its users, as a tool for surveillance, control and oppression.
  •  
    by Jérémie Zimmermann For almost 15 years, "Internet Governance" meetings1 have been drawing attention and driving our imaginaries towards believing that consensual rules for the Internet could emerge from global "multi-stakeholder" discussions. A few days ahead of the "NETmundial" Forum in Sao Paulo it has become obvious that "Internet Governance" is a farcical way of keeping us busy and hiding a sad reality: Nothing concrete in these 15 years, not a single action, ever emerged from "multi-stakeholder" meetings, while at the same time, technology as a whole has been turned against its users, as a tool for surveillance, control and oppression.
Gonzalo San Gil, PhD.

IDG Connect - Friday Rant: The Internet Is Broken - 0 views

  •  
    " Posted by Alex Cruickshank on May 30 2014 The internet has come a long way in 20 years. The infrastructure is older than that, of course, but it was 1994 when the amazing new World Wide Web started to make a serious impression on me and my colleagues and friends. Firing up Netscape Navigator 1.0 on Windows 3.11 with a wobbly TCP/IP stack and a 14.4kbps modem, typing in a cryptic URL and seeing information from the other side of the world, instantly! It was an incredible experience."
  •  
    " Posted by Alex Cruickshank on May 30 2014 The internet has come a long way in 20 years. The infrastructure is older than that, of course, but it was 1994 when the amazing new World Wide Web started to make a serious impression on me and my colleagues and friends. Firing up Netscape Navigator 1.0 on Windows 3.11 with a wobbly TCP/IP stack and a 14.4kbps modem, typing in a cryptic URL and seeing information from the other side of the world, instantly! It was an incredible experience."
Gonzalo San Gil, PhD.

Digital Content Online Should Be Free, Children Say | TorrentFreak - 0 views

  •  
    " Andy on June 20, 2014 C: 67 Breaking A new survey of young children and adults has found consensus on what should be charged for content online. In both groups, 49% said that people should be able to download content they want for free, with a quarter of 16-24 year olds stating that file-sharing was the only way they could afford to obtain it."
  •  
    " Andy on June 20, 2014 C: 67 Breaking A new survey of young children and adults has found consensus on what should be charged for content online. In both groups, 49% said that people should be able to download content they want for free, with a quarter of 16-24 year olds stating that file-sharing was the only way they could afford to obtain it."
Gary Edwards

Microsoft Office whips Google Docs: It's finally game over | Computerworld Blogs - 0 views

  •  
    "If there was ever any doubt about whether Microsoft or Google would win the war of office suites, there should be no longer. Within the last several weeks, Microsoft has pulled so far ahead that it's game over. Here's why. When it comes to which suite is more fully featured, there's never been any real debate: Microsoft Office wins hands down. Whether you're creating entire presentations, creating complicated word-processing documents, or even doing something as simple as handling text attributes, Office is a far better tool. Until the last few weeks, Google Docs had one significant advantage over Microsoft Office: It's available for Android and the iPad as well as PCs because it's Web-based. The same wasn't the case for Office. So if you wanted to use an office suite on all your mobile devices, Google Docs was the way to go. Google Docs lost that advantage when Microsoft released Office for the iPad. There's not yet a native version for Android tablets, but Microsoft is working on that, telling GeekWire, "Let me tell you conclusively: Yes, we are also building Android native applications for tablets for Word, Excel and PowerPoint." Google Docs is still superior to Office's Web-based version, but that's far less important than it used to be. There's no need to go with a Web-based office suite if a superior suite is available as a native apps on all platforms, mobile or otherwise. And Office's collaboration capabilities are quite considerable now. Of course, there's always the question of price. Google Docs is free. Microsoft Office isn't. But at $100 a year for up to five devices, or $70 a year for two, no one will be going broke paying for Microsoft Office. It's worth paying that relatively small price for a much better office suite. Google Docs won't die. It'll be around as second fiddle for a long time. But that's what it will always remain: a second fiddle to the better Microsoft Office."
  •  
    Google acquired "Writely", a small company in Portola Valley that pioneered document editing in a browser. Writely was perhaps the first cloud computing editor to go beyond simple HTML; eventually crafting some really cool CSS-JavaScript-JSON document layout and editing methods. But it can't edit native MSOffice documents. It converts them. There are more than a few problems with the Google Docs approach to editing advanced "compound" documents, but two stick out and are certain to give pause to anyone making the great transition from local workgroup computing, to the highly mobile, always connected, cloud computing. The first problem certain to become a show stopper is that Google converts documents to their native on-line format for editing and collaboration. And then they convert back. To many this isn't a problem. But if the document is part of a workflow or business process, conversion is a killer. There is an old saw affectionately known as "Reuters Law", dating back to the ODF-OXML document wars, that emphatically states; "Conversion breaks documents." The breakage includes both the visual layout of the document, and, the "compound" aspects and data connections that are internal to the document. Think of this way. A business document that is part of a legacy Windows Workgroup workflow is opened up in gDocs. Google converts the document for editing purposes. The data and the workflow internals that bind the document to the local business system are broken on conversion. The look of the document is also visually shredded as the gDocs layout engine is applied. For all practical purposes, no matter what magic editing and collaboration value is added, a broken document means a broken business process. Let me say that again, with the emphasis of having witnessed this first hand during the year long ODF transition trials the Commonwealth of Massachusetts conducted in 2005 and 2006. The business process broke every time a conversion was conducted "on a busines
Paul Merrell

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet - The In... - 0 views

  • The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.
  • he “tools” have been assigned boastful code names. They include invasive methods for online surveillance, as well as some of the very techniques that the U.S. and U.K. have harshly prosecuted young online activists for employing, including “distributed denial of service” attacks and “call bombing.” But they also describe previously unknown tactics for manipulating and distorting online political discourse and disseminating state propaganda, as well as the apparent ability to actively monitor Skype users in real-time—raising further questions about the extent of Microsoft’s cooperation with spy agencies or potential vulnerabilities in its Skype’s encryption. Here’s a list of how JTRIG describes its capabilities: • “Change outcome of online polls” (UNDERPASS) • “Mass delivery of email messaging to support an Information Operations campaign” (BADGER) and “mass delivery of SMS messages to support an Information Operations campaign” (WARPARTH) • “Disruption of video-based websites hosting extremist content through concerted target discovery and content removal.” (SILVERLORD)
  • • “Active skype capability. Provision of real time call records (SkypeOut and SkypetoSkype) and bidirectional instant messaging. Also contact lists.” (MINIATURE HERO) • “Find private photographs of targets on Facebook” (SPRING BISHOP) • “A tool that will permanently disable a target’s account on their computer” (ANGRY PIRATE) • “Ability to artificially increase traffic to a website” (GATEWAY) and “ability to inflate page views on websites” (SLIPSTREAM) • “Amplification of a given message, normally video, on popular multimedia websites (Youtube)” (GESTATOR) • “Targeted Denial Of Service against Web Servers” (PREDATORS FACE) and “Distributed denial of service using P2P. Built by ICTR, deployed by JTRIG” (ROLLING THUNDER)
  • ...1 more annotation...
  • • “A suite of tools for monitoring target use of the UK auction site eBay (www.ebay.co.uk)” (ELATE) • “Ability to spoof any email address and send email under that identity” (CHANGELING) • “For connecting two target phone together in a call” (IMPERIAL BARGE) While some of the tactics are described as “in development,” JTRIG touts “most” of them as “fully operational, tested and reliable.” It adds: “We only advertise tools here that are either ready to fire or very close to being ready.”
Gonzalo San Gil, PhD.

Let's stand together to promote open access worldwide. | EFF Action Center - 0 views

  •  
    "Diego Gomez, a Colombian graduate student, currently faces up to eight years in prison for doing something thousands of researchers do every day: posting research results online for those who would not otherwise have a way to access them."
  •  
    "Diego Gomez, a Colombian graduate student, currently faces up to eight years in prison for doing something thousands of researchers do every day: posting research results online for those who would not otherwise have a way to access them."
Gonzalo San Gil, PhD.

Learn GNU/Linux the Fun Way | Linux Journal - 0 views

  •  
    "Oct 02, 2014 By Doc Searls in Education Sometimes a gift just falls in your lap. This month, it came in the form of an e-mail out of the blue from Jared Nielsen, one of two brothers (the other is J.R. Nielsen) who created The Hello World Program, "an educational web series making computer science fun and accessible to all". If it had been just that, I might not have been interested. "
  •  
    "Oct 02, 2014 By Doc Searls in Education Sometimes a gift just falls in your lap. This month, it came in the form of an e-mail out of the blue from Jared Nielsen, one of two brothers (the other is J.R. Nielsen) who created The Hello World Program, "an educational web series making computer science fun and accessible to all". If it had been just that, I might not have been interested. "
Gonzalo San Gil, PhD.

EU digital single market: Death by compromise - POLITICO (*) - 0 views

  •  
    By Ryan Heath and Zoya Sheftalovich 6/5/15, 5:30 AM CET Updated 6/5/15, 12:07 PM CET The long-awaited, much-ballyhooed Digital Single Market strategy is set to be published at noon Wednesday by the European Commission. Reaction will be quick, loud and vociferous, but look for clues to the answer to one key question: Will this document really change anything? [*The structure of Media supply/demand keeps on being vertical: Users will only access what Big Companies offer. There must be a way -via watermarking, perhaps- to allow people to consume whatever they want, and fairly monetize it later... If not, the contents will be keep restricted to editors will: that is censorship and restrictions in te age of abundance and freedom] "A user's guide to the Commission's latest brainstorm. By Ryan Heath and Zoya Sheftalovich 6/5/15, 5:30 AM CET Updated 6/5/15, 12:07 PM CET"
  •  
    By Ryan Heath and Zoya Sheftalovich 6/5/15, 5:30 AM CET Updated 6/5/15, 12:07 PM CET The long-awaited, much-ballyhooed Digital Single Market strategy is set to be published at noon Wednesday by the European Commission. Reaction will be quick, loud and vociferous, but look for clues to the answer to one key question: Will this document really change anything? [*The structure of Media supply/demand keeps on being vertical: Users will only access what Big Companies offer. There must be a way -via watermarking, perhaps- to allow people to consume whatever they want, and fairly monetize it later... If not, the contents will be keep restricted to editors will: that is censorship and restrictions in te age of abundance and freedom] "A user's guide to the Commission's latest brainstorm. By Ryan Heath and Zoya Sheftalovich 6/5/15, 5:30 AM CET Updated 6/5/15, 12:07 PM CET"
Gonzalo San Gil, PhD.

NSA mass phone surveillance revealed by Edward Snowden ruled illegal | US news | The Gu... - 0 views

  •  
    "The US court of appeals has ruled that the bulk collection of telephone metadata is unlawful, in a landmark decision that clears the way for a full legal challenge against the National Security Agency."
  •  
    "The US court of appeals has ruled that the bulk collection of telephone metadata is unlawful, in a landmark decision that clears the way for a full legal challenge against the National Security Agency."
Gonzalo San Gil, PhD.

Get into Docker - A Guide for Total Newbies | Voxxed - 1 views

  •  
    "Have you heard about Docker? Most likely. If not, don't worry, I'll try to summarise it for you. Docker is probably one of the hottest technologies at the moment. It has the potential to revolutionise the way we build, deploy and distribute applications. At the same time, it's already having a huge impact in the development process. "
  •  
    "Have you heard about Docker? Most likely. If not, don't worry, I'll try to summarise it for you. Docker is probably one of the hottest technologies at the moment. It has the potential to revolutionise the way we build, deploy and distribute applications. At the same time, it's already having a huge impact in the development process. "
Gonzalo San Gil, PhD.

Google: Targeting Downloaders Not The Best Solution to Fight Piracy | TorrentFreak - 0 views

  •  
    " Ernesto on May 22, 2015 C: 0 News A few days ago it was revealed that Google is forwarding controversial settlement demands from copyright holders to its subscribers. Responding to the news, Google says the notices are forwarded in an effort to be as transparent as possible. However, the company adds that targeting individual downloaders isn't the best way to solve piracy. "
  •  
    " Ernesto on May 22, 2015 C: 0 News A few days ago it was revealed that Google is forwarding controversial settlement demands from copyright holders to its subscribers. Responding to the news, Google says the notices are forwarded in an effort to be as transparent as possible. However, the company adds that targeting individual downloaders isn't the best way to solve piracy. "
Paul Merrell

Even the Former Director of the NSA Hates the FBI's New Surveillance Push - The Daily B... - 0 views

  • The head of the FBI has spent the last several months in something of a panic, warning anyone who will listen that terrorists are “going dark”—using encrypted communications to hide from the FBI—and insisting that the bureau needs some kind of electronic back door to get access to those chats.It’s an argument that civil libertarians and technology industry executives have largely rejected. And now, members of the national security establishment—veterans of both the Obama and Bush administrations—are beginning to speak out publicly against FBI Director Jim Comey’s call to give the government a skeleton key to your private talks.
  • The encryption issue was also one of several small, but telling, ways in which Comey seemed out of sync with some of his fellow members of the national security establishment here at the Aspen Security Forum.
  • This isn’t the first intra-government fight over encryption, Chertoff noted. The last time an administration insisted on a technological back door—in the 1990s—Congress shot down the idea. And despite cries of “going dark” back then, the government found all kinds of new ways to spy. “We collected more than ever. We found ways to deal with that issue,” Chertoff told the forum.
Gonzalo San Gil, PhD.

9 ways developers can rebuild trust on the Internet | ITworld - 0 views

  •  
    "Public keys, trusted hardware, block chains -- developers should use these tech tools to help secure the Internet for all Peter Wayner By Peter Wayner Follow InfoWorld | July 20, 2015 "
« First ‹ Previous 41 - 60 of 427 Next › Last »
Showing 20 items per page