Skip to main content

Home/ Future of the Web/ Group items matching "Media" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Gonzalo San Gil, PhD.

Whatever You Call It -- Open Journalism, Social Media Journalism, Open-Source Intelligence -- It's Going Mainstream | Techdirt - 0 views

  •  
    "from the first-draft-of-first-draft dept We've written a couple of times about the use of publicly-available information, typically posted on social networks, to verify developing stories where traditional sources are scarce or unreliable. This new field doesn't seem to have a fixed name yet -- open journalism, social media journalism, open-source intelligence are all used -- but whatever it is, it's clearly going mainstream, as this announcement on the YouTube blog of The First Draft Coalition makes clear: "
Paul Merrell

FBI Flouts Obama Directive to Limit Gag Orders on National Security Letters - The Intercept - 0 views

  • Despite the post-Snowden spotlight on mass surveillance, the intelligence community’s easiest end-run around the Fourth Amendment since 2001 has been something called a National Security Letter. FBI agents can demand that an Internet service provider, telephone company or financial institution turn over its records on any number of people — without any judicial review whatsoever — simply by writing a letter that says the information is needed for national security purposes. The FBI at one point was cranking out over 50,000 such letters a year; by the latest count, it still issues about 60 a day. The letters look like this:
  • Recipients are legally required to comply — but it doesn’t stop there. They also aren’t allowed to mention the order to anyone, least of all the person whose data is being searched. Ever. That’s because National Security Letters almost always come with eternal gag orders. Here’s that part:
  • That means the NSL process utterly disregards the First Amendment as well. More than a year ago, President Obama announced that he was ordering the Justice Department to terminate gag orders “within a fixed time unless the government demonstrates a real need for further secrecy.” And on Feb. 3, when the Office of the Director of National Intelligence announced a handful of baby steps resulting from its “comprehensive effort to examine and enhance [its] privacy and civil liberty protections” one of the most concrete was — finally — to cap the gag orders: In response to the President’s new direction, the FBI will now presumptively terminate National Security Letter nondisclosure orders at the earlier of three years after the opening of a fully predicated investigation or the investigation’s close. Continued nondisclosures orders beyond this period are permitted only if a Special Agent in Charge or a Deputy Assistant Director determines that the statutory standards for nondisclosure continue to be satisfied and that the case agent has justified, in writing, why continued nondisclosure is appropriate.
  • ...6 more annotations...
  • Despite the use of the word “now” in that first sentence, however, the FBI has yet to do any such thing. It has not announced any such change, nor explained how it will implement it, or when. Media inquiries were greeted with stalling and, finally, a no comment — ostensibly on advice of legal counsel. “There is pending litigation that deals with a lot of the same questions you’re asking, out of the Ninth Circuit,” FBI spokesman Chris Allen told me. “So for now, we’ll just have to decline to comment.” FBI lawyers are working on a court filing for that case, and “it will address” the new policy, he said. He would not say when to expect it.
  • There is indeed a significant case currently before the federal appeals court in San Francisco. Oral arguments were in October. A decision could come any time. But in that case, the Electronic Frontier Foundation (EFF), which is representing two unnamed communications companies that received NSLs, is calling for the entire NSL statute to be thrown out as unconstitutional — not for a tweak to the gag. And it has a March 2013 district court ruling in its favor. “The gag is a prior restraint under the First Amendment, and prior restraints have to meet an extremely high burden,” said Andrew Crocker, a legal fellow at EFF. That means going to court and meeting the burden of proof — not just signing a letter. Or as the Cato Institute’s Julian Sanchez put it, “To have such a low bar for denying persons or companies the right to speak about government orders they have been served with is anathema. And it is not very good for accountability.”
  • In a separate case, a wide range of media companies (including First Look media, the non-profit digital media venture that produces The Intercept) are supporting a lawsuit filed by Twitter, demanding the right to say specifically how many NSLs it has received. But simply releasing companies from a gag doesn’t assure the kind of accountability that privacy advocates are saying is required by the Constitution. “What the public has to remember is a NSL is asking for your information, but it’s not asking it from you,” said Michael German, a former FBI agent who is now a fellow with the Brennan Center for Justice. “The vast majority of these things go to the very large telecommunications and financial companies who have a large stake in maintaining a good relationship with the government because they’re heavily regulated entities.”
  • So, German said, “the number of NSLs that would be exposed as a result of the release of the gag order is probably very few. The person whose records are being obtained is the one who should receive some notification.” A time limit on gags going forward also raises the question of whether past gag orders will now be withdrawn. “Obviously there are at this point literally hundreds of thousands of National Security Letters that are more than three years old,” said Sanchez. Individual review is therefore unlikely, but there ought to be some recourse, he said. And the further back you go, “it becomes increasingly implausible that a significant percentage of those are going to entail some dire national security risk.” The NSL program has a troubled history. The absolute secrecy of the program and resulting lack of accountability led to systemic abuse as documented by repeated inspector-general investigations, including improperly authorized NSLs, factual misstatements in the NSLs, improper requests under NSL statutes, requests for information based on First Amendment protected activity, “after-the-fact” blanket NSLs to “cover” illegal requests, and hundreds of NSLs for “community of interest” or “calling circle” information without any determination that the telephone numbers were relevant to authorized national security investigations.
  • Obama’s own hand-selected “Review Group on Intelligence and Communications Technologies” recommended in December 2013 that NSLs should only be issued after judicial review — just like warrants — and that any gag should end within 180 days barring judicial re-approval. But FBI director James Comey objected to the idea, calling NSLs “a very important tool that is essential to the work we do.” His argument evidently prevailed with Obama.
  • NSLs have managed to stay largely under the American public’s radar. But, Crocker says, “pretty much every time I bring it up and give the thumbnail, people are shocked. Then you go into how many are issued every year, and they go crazy.” Want to send me your old NSL and see if we can set a new precedent? Here’s how to reach me. And here’s how to leak to me.
Alexandra IcecreamApps

Best Free Audio Converters for Windows - Icecream Tech Digest - 0 views

  •  
    With great power comes great responsibility and with fast development of media technologies comes a wide variety of media formats. Each audio format has its own significant features: some maintain excellent quality, some offer compact size, some can be played … Continue reading →
  •  
    With great power comes great responsibility and with fast development of media technologies comes a wide variety of media formats. Each audio format has its own significant features: some maintain excellent quality, some offer compact size, some can be played … Continue reading →
Gonzalo San Gil, PhD.

UK Media Regulator Again Threatens RT for "Bias": This Time, Airing "Anti-Western Views" - The Intercept - 0 views

  •  
    "In 2001, Her Majesty Queen Elizabeth II used the occasion of the annual "Queen's Speech" to unveil a new statutory proposal to regulate all media operating in her realm, one provision of which was the creation of the "Office of Communications" (Ofcom) to monitor and punish television outlets which exhibit "bias.""
  •  
    "In 2001, Her Majesty Queen Elizabeth II used the occasion of the annual "Queen's Speech" to unveil a new statutory proposal to regulate all media operating in her realm, one provision of which was the creation of the "Office of Communications" (Ofcom) to monitor and punish television outlets which exhibit "bias.""
Gonzalo San Gil, PhD.

German Publishers Grant Google A 'Free License' Google Never Needed To Post News Snippets | Techdirt - 2 views

  •  
    "from the well-that-solves-that dept Remember earlier this year when German newspaper publishers, led by rights management firm VG Media, demanded Google pay them a massive amount of money (11% of all ad revenue on any page linking to their works) for having the gall to send those publishers traffic via Google News? VG Media insisted that Google's use of "snippets" was illegal." []
  •  
    "from the well-that-solves-that dept Remember earlier this year when German newspaper publishers, led by rights management firm VG Media, demanded Google pay them a massive amount of money (11% of all ad revenue on any page linking to their works) for having the gall to send those publishers traffic via Google News? VG Media insisted that Google's use of "snippets" was illegal."
Paul Merrell

Israel eyes world coalition to force social media platforms to block incitement | The Times of Israel - 2 views

  • Israel is aiming to build an international coalition to force the world’s leading social media giants to prevent their platforms from being abused to peddle incitement to terrorism. The move, which was unveiled by Public Security Minister Gilad Erdan at Sunday’s cabinet meeting, aims at requiring Facebook, Twitter, Youtube, and other social networks to take greater responsibility for such content.
  • While some experts consider the idea unworkable — arguing that the terms of service of such platforms protect them from any legal threat, and that the preventative measures Erdan wants to see introduced are not possible technologically, others say a coalition pushing for change could be effective, and certainly stands more of a chance than an effort led by Israel alone.
  •  
    With social media censorship ramping up in the West, it's good to keep in mind who started it. From 2016.
Gonzalo San Gil, PhD.

Call for Papers | thinktwice.com | Creativity, Human Rights, Hacktivism [# Via FB's Francisco George x Arif Yıldırım] Deadline July 18th 2014 - 0 views

  •  
    "Call for Papers CALL FOR SUBMISSIONS We are looking for session submissions from Pirates, NGOs and Academia to following tracks: (other topics are allowed as well) Creativity: copyrights, patents, collaboration, citizen journalism, media, DRM, open access, FOI, public licensing, policy reform, education, etc… Human Rights: security, data protection, surveillance, FOI, basic income, emigration, voting rights, drones, non-proliferation, dual use technology, encryption, anonymity, transparency, net neutrality, open data, egovernment, society, whistle blowing, political science, etc… Activism|Hacktivism: Future, innovation, liquid democracy, transhumanism, cyborgs, startups, vision, 3d-printing, crowdsourcing, big data, participation, pirate parties, artificial intelligence, globalization, space travel, social networks, freemanning, freehammond, hacktivism, activism, civil disobedience, hacker culture, cyberpunk, cypherpunk, wikileaks, surveillance, digital activism, etc..."
  • ...1 more comment...
  •  
    "Call for Papers CALL FOR SUBMISSIONS We are looking for session submissions from Pirates, NGOs and Academia to following tracks: (other topics are allowed as well) Creativity: copyrights, patents, collaboration, citizen journalism, media, DRM, open access, FOI, public licensing, policy reform, education, etc… Human Rights: security, data protection, surveillance, FOI, basic income, emigration, voting rights, drones, non-proliferation, dual use technology, encryption, anonymity, transparency, net neutrality, open data, egovernment, society, whistle blowing, political science, etc… Activism|Hacktivism: Future, innovation, liquid democracy, transhumanism, cyborgs, startups, vision, 3d-printing, crowdsourcing, big data, participation, pirate parties, artificial intelligence, globalization, space travel, social networks, freemanning, freehammond, hacktivism, activism, civil disobedience, hacker culture, cyberpunk, cypherpunk, wikileaks, surveillance, digital activism, etc..."
  •  
    "Call for Papers CALL FOR SUBMISSIONS We are looking for session submissions from Pirates, NGOs and Academia to following tracks: (other topics are allowed as well) Creativity: copyrights, patents, collaboration, citizen journalism, media, DRM, open access, FOI, public licensing, policy reform, education, etc… Human Rights: security, data protection, surveillance, FOI, basic income, emigration, voting rights, drones, non-proliferation, dual use technology, encryption, anonymity, transparency, net neutrality, open data, egovernment, society, whistle blowing, political science, etc… Activism|Hacktivism: Future, innovation, liquid democracy, transhumanism, cyborgs, startups, vision, 3d-printing, crowdsourcing, big data, participation, pirate parties, artificial intelligence, globalization, space travel, social networks, freemanning, freehammond, hacktivism, activism, civil disobedience, hacker culture, cyberpunk, cypherpunk, wikileaks, surveillance, digital activism, etc..."
  •  
    [# Via FB's Francisco George x Arif Yıldırım] Deadline July 18th 2014 "Call for Papers CALL FOR SUBMISSIONS We are looking for session submissions from Pirates, NGOs and Academia to following tracks: (other topics are allowed as well) Creativity: copyrights, patents, collaboration, citizen journalism, media, DRM, open access, FOI, public licensing, policy reform, education, etc… Human Rights: security, data protection, surveillance, FOI, basic income, emigration, voting rights, drones, non-proliferation, dual use technology, encryption, anonymity, transparency, net neutrality, open data, egovernment, society, whistle blowing, political science, etc… Activism|Hacktivism: Future, innovation, liquid democracy, transhumanism, cyborgs, startups, vision, 3d-printing, crowdsourcing, big data, participation, pirate parties, artificial intelligence, globalization, space travel, social networks, freemanning, freehammond, hacktivism, activism, civil disobedience, hacker culture, cyberpunk, cypherpunk, wikileaks, surveillance, digital activism, etc..."
Gonzalo San Gil, PhD.

How to Overcome the Shortcomings of Automated Sentiment Analysis - 0 views

  •  
    "Automated sentiment analysis software that grades news articles and social media posts as positive, negative or neutral is becoming more popular in media measurement for public relations and marketing."
Gonzalo San Gil, PhD.

Diccionario Social Media: 100 palabras del Community Manager - 0 views

  •  
    " Elena Charameli 24 marzo, 2014 Bienvenido al diccionario del Community Manager de Aula CM icon smile Diccionario Social Media: Las 100 palabras del Community Manager Hemos recopilado las definiciones más importantes y los conceptos que más repetimos en nuestras clases para ayudar a todos nuestros alumnos y a todo el que lo necesite. "
Gonzalo San Gil, PhD.

Installing VLC Media Player in Fedora 20 | Abhishek's Blog - 0 views

  •  
    So you wish to install VLC Media Player in your Fedora ! Here's how: Step 1: Install RPM Fusion. RPM Fusion is a repository of add-on packages for Fedora and EL+EPEL maintained by a group of volunt...
Gonzalo San Gil, PhD.

Social media for slackers | All Things Open 2014 lightning talk with Rikki Endsley | Opensource.com - 0 views

  •  
    "Rikki Endsley, Community Evangelist at Red Hat, shares insights gleaned from composing 140 character tweets, handling hashtags, and tweaking Hootsuite for open source-centric social media accounts."
  •  
    "Rikki Endsley, Community Evangelist at Red Hat, shares insights gleaned from composing 140 character tweets, handling hashtags, and tweaking Hootsuite for open source-centric social media accounts."
Gonzalo San Gil, PhD.

Media Companies Track Pirated Downloads For Marketing Purposes | TorrentFreak [# ! note -edit...] - 0 views

  •  
    [ Ernesto on February 18, 2015 C: 0 Breaking A new report released by Tru Optik shows that there are hundreds of millions of active BitTorrent users who together shared 18 billion files last year. The data is being used to show media companies the scale of the "unmonetized" demand for their products while offering a tool to target pirates with the right offerings. ...] [# ! yes, sharers must be respected and rewarded as industry # ! advanced advisors, instead of being persecuted...]
Gonzalo San Gil, PhD.

Schedule your social media marketing with CampaignChain | Linux User & Developer - the Linux and FOSS mag for a GNU generation - 0 views

  •  
    "Posted by Oliver Hill CampaignChain, an open source tool for social media marketing, makes every campaign easier "
Gonzalo San Gil, PhD.

Social media addiction is a bigger problem than you think | ITNews - 0 views

  •  
    Can't stay away from social media? You're not alone; social networking is engineered to be as habit-forming as crack cocaine. By Mike Elgan
Gonzalo San Gil, PhD.

Setup A Centralized Media Server Using Emby Server | Unixmen - 0 views

  •  
    "Yes, you read it right. Meet Emby, a free and open source application that let your personal media library, such as home videos, audios and photos, to be accessible from anywhere using any device."
Paul Merrell

US spy lab hopes to geotag every outdoor photo on social media | Ars Technica - 0 views

  • Imagine if someone could scan every image on Facebook, Twitter, and Instagram, then instantly determine where each was taken. The ability to combine this location data with information about who appears in those photos—and any social media contacts tied to them—would make it possible for government agencies to quickly track terrorist groups posting propaganda photos. (And, really, just about anyone else.) That's precisely the goal of Finder, a research program of the Intelligence Advanced Research Projects Agency (IARPA), the Office of the Director of National Intelligence's dedicated research organization. For many photos taken with smartphones (and with some consumer cameras), geolocation information is saved with the image by default. The location is stored in the Exif (Exchangable Image File Format) data of the photo itself unless geolocation services are turned off. If you have used Apple's iCloud photo store or Google Photos, you've probably created a rich map of your pattern of life through geotagged metadata. However, this location data is pruned off for privacy reasons when images are uploaded to some social media services, and privacy-conscious photographers (particularly those concerned about potential drone strikes) will purposely disable geotagging on their devices and social media accounts.
Paul Merrell

HART: Homeland Security's Massive New Database Will Include Face Recognition, DNA, and Peoples' "Non-Obvious Relationships" | Electronic Frontier Foundation - 0 views

  • The U.S. Department of Homeland Security (DHS) is quietly building what will likely become the largest database of biometric and biographic data on citizens and foreigners in the United States. The agency’s new Homeland Advanced Recognition Technology (HART) database will include multiple forms of biometrics—from face recognition to DNA, data from questionable sources, and highly personal data on innocent people. It will be shared with federal agencies outside of DHS as well as state and local law enforcement and foreign governments. And yet, we still know very little about it.The records DHS plans to include in HART will chill and deter people from exercising their First Amendment protected rights to speak, assemble, and associate. Data like face recognition makes it possible to identify and track people in real time, including at lawful political protests and other gatherings. Other data DHS is planning to collect—including information about people’s “relationship patterns” and from officer “encounters” with the public—can be used to identify political affiliations, religious activities, and familial and friendly relationships. These data points are also frequently colored by conjecture and bias.
  • DHS currently collects a lot of data. Its legacy IDENT fingerprint database contains information on 220-million unique individuals and processes 350,000 fingerprint transactions every day. This is an exponential increase from 20 years ago when IDENT only contained information on 1.8-million people. Between IDENT and other DHS-managed databases, the agency manages over 10-billion biographic records and adds 10-15 million more each week.
  • DHS’s new HART database will allow the agency to vastly expand the types of records it can collect and store. HART will support at least seven types of biometric identifiers, including face and voice data, DNA, scars and tattoos, and a blanket category for “other modalities.” It will also include biographic information, like name, date of birth, physical descriptors, country of origin, and government ID numbers. And it will include data we know to by highly subjective, including information collected from officer “encounters” with the public and information about people’s “relationship patterns.”
  • ...1 more annotation...
  • DHS’s face recognition roll-out is especially concerning. The agency uses mobile biometric devices that can identify faces and capture face data in the field, allowing its ICE (immigration) and CBP (customs) officers to scan everyone with whom they come into contact, whether or not those people are suspected of any criminal activity or an immigration violation. DHS is also partnering with airlines and other third parties to collect face images from travelers entering and leaving the U.S. When combined with data from other government agencies, these troubling collection practices will allow DHS to build a database large enough to identify and track all people in public places, without their knowledge—not just in places the agency oversees, like airports, but anywhere there are cameras.Police abuse of facial recognition technology is not a theoretical issue: it’s happening today. Law enforcement has already used face recognition on public streets and at political protests. During the protests surrounding the death of Freddie Gray in 2015, Baltimore Police ran social media photos against a face recognition database to identify protesters and arrest them. Recent Amazon promotional videos encourage police agencies to acquire that company’s face “Rekognition” capabilities and use them with body cameras and smart cameras to track people throughout cities. At least two U.S. cities are already using Rekognition.DHS compounds face recognition’s threat to anonymity and free speech by planning to include “records related to the analysis of relationship patterns among individuals.” We don’t know where DHS or its external partners will be getting these “relationship pattern” records, but they could come from social media profiles and posts, which the government plans to track by collecting social media user names from all foreign travelers entering the country.
Paul Merrell

Time to 'Break Facebook Up,' Sanders Says After Leaked Docs Show Social Media Giant 'Treated User Data as a Bargaining Chip' | Common Dreams News - 0 views

  • After NBC News on Wednesday published a trove of leaked documents that show how Facebook "treated user data as a bargaining chip with external app developers," White House hopeful Sen. Bernie Sanders declared that it is time "to break Facebook up."
  • When British investigative journalist Duncan Campbell first shared the trove of documents with a handful of media outlets including NBC News in April, journalists Olivia Solon and Cyrus Farivar reported that "Facebook CEO Mark Zuckerberg oversaw plans to consolidate the social network's power and control competitors by treating its users' data as a bargaining chip, while publicly proclaiming to be protecting that data." With the publication Wednesday of nearly 7,000 pages of records—which include internal Facebook emails, web chats, notes, presentations, and spreadsheets—journalists and the public can now have a closer look at exactly how the company was using the vast amount of data it collects when it came to bargaining with third parties.
  • According to Solon and Farivar of NBC: Taken together, they show how Zuckerberg, along with his board and management team, found ways to tap Facebook users' data—including information about friends, relationships, and photos—as leverage over the companies it partnered with. In some cases, Facebook would reward partners by giving them preferential access to certain types of user data while denying the same access to rival companies. For example, Facebook gave Amazon special access to user data because it was spending money on Facebook advertising. In another case the messaging app MessageMe was cut off from access to data because it had grown too popular and could compete with Facebook.
  • ...2 more annotations...
  • The document dump comes as Facebook and Zuckerberg are facing widespread criticism over the company's political advertising policy, which allows candidates for elected office to lie in the ads they pay to circulate on the platform. It also comes as 47 state attorneys general, led by Letitia James of New York, are investigating the social media giant for antitrust violations.
  • The call from Sanders (I-Vt.) Wednesday to break up Facebook follows similar but less definitive statements from the senator. One of Sanders' rivals in the 2020 Democratic presidential primary race, Sen. Elizabeth Warren (D-Mass.), released her plan to "Break Up Big Tech" in March. Zuckerberg is among the opponents of Warren's proposal, which also targets other major technology companies like Amazon and Google.
Paul Merrell

Big Tech companies appeal to Supreme Court to strike down Texas law banning political censorship - LifeSite - 0 views

  • Facebook and Google are among multiple Big Tech companies seeking to have Texas’ new law banning political censorship on social media axed by the Supreme Court. According to The Washington Post, advocacy groups NetChoice and the Computer & Communications Industry Association (CCIA) filed an emergency application with the U.S. Supreme Court on Friday on behalf of Facebook, Google and other Big Tech companies, with the intention of striking down the new Texas law that prohibits censorship based on political ideology on social media. In a statement about the emergency filing, NetChoice counsel Chris Marchese argues that the Texas law, which went into effect last Wednesday, “strips private online businesses of their speech rights, forbids them from making constitutionally protected editorial decisions, and forces them to publish and promote objectionable content.”
  • “Left standing, [the Texas law] will turn the First Amendment on its head — to violate free speech, the government need only claim to be ‘protecting’ it,” Marchese added. Under the law, Texas residents and the state’s attorney general would be permitted to sue social media companies based in the United States if they believe their social media accounts were censored based on their political views. While the law was initially blocked by a federal district judge after it was signed last September by Texas Gov. Greg Abbot, the injunction was ultimately lifted by an appeals court last Wednesday. Big Tech companies have been consistently charged with weaponizing their “Terms of Service” agreements with users in an effort to ban or censor those expressing traditionally conservative or right-wing views on their extremely large and influential platforms.
Paul Merrell

How the GOP muzzled the coalition fighting foreign propaganda on Twitter, Facebook and beyond - 0 views

  • A once-robust alliance of federal agencies, tech companies, election officials and researchers that worked together to thwart foreign propaganda and disinformation has fragmented after years of sustained Republican attacks.The GOP offensive started during the 2020 election as public critiques and has since escalated into lawsuits, governmental inquiries and public relations campaigns that have succeeded in stopping almost all coordination between the government and social media platforms.The most recent setback came when the FBI put an indefinite hold on most briefings to social media companies about Russian, Iranian and Chinese influence campaigns. Employees at two U.S. tech companies who used to receive regular briefings from the FBI’s Foreign Influence Task Force told NBC News that it has been months since the bureau reached out. In a testimony last week to the Senate Homeland Security Committee, FBI Director Christopher Wray signaled a significant pullback in communications with tech companies and tied the move to rulings by a conservative federal judge and appeals court that said some government agencies and officials should be restricted from communicating and meeting with social media companies to moderate content. The case is now on hold pending Supreme Court review.“We’re having some interaction with social media companies,” Wray said. “But all of those interactions have changed fundamentally in the wake of the court rulings.”
‹ Previous 21 - 40 of 353 Next › Last »
Showing 20 items per page