Skip to main content

Home/ Indie Nation/ Group items tagged social

Rss Feed Group items tagged

John Lemke

A Social Networking Site For Criminals Lands Two Teens In Jail « The Blade by... - 0 views

  •  
    Most of us are familiar with Facebook, but has anyone heard of 'Crimebook'? The novel social networking site was set up by two British teens to entertain the criminal element of society. These teens were raking in the money to the tune of some $26M with some 8,000 crooks using the social site to exchange stolen credit card information. The teens also shared the bank accounts of some 65,000 customers who had their accounts hacked by the thieves.
John Lemke

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views

  • “The Art of Deception: Training for Online Covert Operations.”
  • Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. 
  • Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
    • John Lemke
       
      Wow, how is not changing pictures and creating false victims not identity theft and conspiracy?  
  • ...4 more annotations...
  • it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.
    • John Lemke
       
      Not only are you now guilty until proven innocent but, if you are guilty enough, we shall create a situation so that you are.
  • Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
    • John Lemke
       
      So one of the guys who advocates this and approves of it, gets to be on the NSA review committee?  Isn't that like Ted Kennedy on the Ethics Review Committee or the Warren Commission?
  • Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
John Lemke

Teaching robots to move like humans (w/ Video) - 0 views

  •  
    "It's important to build robots that meet people's social expectations because we think that will make it easier for people to understand how to approach them and how to interact with them," said Andrea Thomaz, assistant professor in the School of Interactive Computing at Georgia Tech's College of Computing. Thomaz, along with Ph.D. student Michael Gielniak, conducted a study in which they asked how easily people can recognize what a robot is doing by watching its movements.
John Lemke

US banks hit by more than a week of cyberattacks (Update) - 0 views

    • John Lemke
       
      They believe it was not a hacktivist attack because they are usually also associated with a rise in IRC and social network activity, those who would be joining the hacktivist event, and this even had no such spike.
  • Could a state actor be at play? U.S. Senator Joe Lieberman, without offering any proof, said he believed the assaults were carried out by Iran in retaliation for tightened economic sanctions imposed by the United States and its allies.
  • only a handful of groups out there that have the technical ability or incentive
  • ...3 more annotations...
  • at least half a dozen banks—including the Bank of America, JPMorgan Chase, and Citigroup—have witnessed traffic surges and disruptions. Not all have confirmed they were the victims of an online onslaught, but such surges are a hallmark of denial-of-service attacks, which work by drowning target websites with streams of junk data.
  • Such attacks are fairly common and generally don't compromise sensitive data or do any lasting damage. Still, they can be a huge headache for companies that rely on their websites to interact with customers.
  • Most say the recent spate of attacks has been unusually powerful. PNC bank, which was hit on Thursday, has never seen such a strong surge in traffic, spokesman Fred Solomon said in a telephone interview. Smith said he estimated the flow of data at 60 to 65 gigabits per second.
John Lemke

Snowden documents show British digital spies use viruses and 'honey traps' * The Register - 0 views

  • "deny, disrupt, degrade and deceive" by any means possible.
  • According to reports in Der Spiegel last year, British intelligence has tapped the reservations systems of over 350 top hotels around the world for the past three years to set up Royal Concierge. It was used to spy on trade delegations, foreign diplomats, and other targets with a taste for the high life.
  • A PowerPoint presentation from 2010 states that JTRIG activities account for five per cent of GCHQ's operations budget and uses a variety of techniques. These include "call bombing" to drown out a target's ability to receive messages, attacking targets in hotels, Psyops (psychological operations) against individuals, and going all the way up to disrupting a country's critical infrastructure.
  • ...1 more annotation...
  • Targets can also be discredited with a "honey trap", whereby a fake social media profile is created, maybe backed up by a personal blog to provide credibility. This could be used to entice someone into making embarrassing confessions, which the presentation notes described as "a great option" and "very successful when it works."
  •  
    All that evil spy stuff in the hands of the government.   Big Brother is real.  Too Fin' real.
John Lemke

Hundreds of Colorado students stage protest over history curriculum | World news | theg... - 0 views

  • Hundreds of students walked out of classrooms around suburban Denver on Tuesday in protest over a conservative-led school board proposal to focus history education on topics that promote citizenship, patriotism and respect for authority, in a show of civil disobedience that the new standards would aim to downplay.
  • nvolving six high schools in the state’s second-largest school district follows a sick-out from teachers that shut down two high schools in the politically and economically diverse area that has become a key political battleground.
  • organized by word of mouth and social media.
  • ...2 more annotations...
  • The proposal from Julie Williams, part of the board’s conservative majority, has not been voted on and was put on hold last week. She didn’t return a call from the Associated Press seeking comment Tuesday, but previously told Chalkbeat Colorado, a school news website, that she recognizes there are negative events that are part of US history that need to be taught.
  • The proposal comes from an elected board with three conservative members who took office in November. The other two board members were elected in 2011 and oppose the new plan, which was drafted in response to a national framework for teaching history that supporters say encourages discussion and critical thinking. Detractors, however, say it puts an outsize emphasis on the nation’s problems. Tension over high school education has cropped up recently in Texas, where conservative school board officials are facing criticism over new textbooks. Meanwhile, in South Carolina, conservatives have called on an education oversight committee to ask the College Board, which oversees Advanced Placement courses, to rewrite their framework to make sure there is no ideological bias.
John Lemke

Police Chief Tells Parents To Hack Kids' Facebook Accounts | Techdirt - 0 views

  •  
    with the security news stories
John Lemke

Online Community Building and the Secret Sauce | Spin Sucks - 0 views

  • the real juice is in the content.
  • I read a blog post he wrote about community. He said (I’m paraphrasing) that you don’t have a community until people begin talking to one another without your participation. Until then, it’s just comments. And he’s right. You know you’ve hit community mecca when people come to your site to talk to one another, with your content as the conversation starter.
John Lemke

Better Identification of Viking Corpses Reveals: Half of the Warriors Were Female | Tor... - 0 views

  • By studying osteological signs of gender within the bones themselves, researchers discovered that approximately half of the remains were actually female warriors, given a proper burial with their weapons.
  • I'm a historian who studies burial in the early middle ages, and the burial of women with weapons is one of my specialties! I'm in the process of publishing research about a woman buried with a spear in the 6th century, and am excited to see this important topic being discussed here outside the ivory tower at Tor.com.
  • The key thing to note is the word 'settlers': the article is arguing that women migrated from Scandinavia to England with the invading Viking army in the 9th century. Several of these women, the article notes, were buried with weapons, but they are still far outnumbered by the armed men. Most of the women settlers mentioned in the study were buried with 'traditional' female outfits: brooches that held up their aprons.
  • ...4 more annotations...
  • Archaeologists have been using bones to identify the biological sex of skeletons for the past century, but when burials were found which didn't fit their notions of 'normal,' they tended to assume that the bone analysts had made a mistake. This is not entirely unreasonable, because bones are often so badly decomposed that it is impossible to tell the sex of the person. But I can point to cases where the bones clearly belong to a woman, and the archaeologists insisted that it had to be a man because only men were warriors. That's modern sexism plain and simple, and bad archaeology. But thankfully, archaeologists in recent decades have become aware of this problem, and as a result, more and more women are showing up with weapons!
  • But women with weapons are still a minority, usually fewer than 10% at any given cemetery.
  • First, we're just talking about graves (because that's what survives for archaeologists to dig up). Just because a woman is buried in an apron, does not mean she wasn't a warrior before she died. There was no rule (as far as we know) that warriors had to be buried with their weapons.
  • Second, we can't be sure that everyone buried with a weapon was a warrior. We find infants buried with weapons sometimes; they clearly weren't fighters (though perhaps they would have been had they grown up?). Weapons were powerful ritual objects with lots of magic and social power, and a woman might be buried with one for a reason other than fighting, such as her connection to the ruling family, ownership of land, or role as priestess or magical healer.
John Lemke

Feds Say Legally Dead Is Slightly Alive - Lowering the Bar - 0 views

  • Under state law a person can be presumed dead after five years. Miller had been gone for eight, and efforts to find him (for child-support purposes) had been unsuccessful.
  • So "I don't know where that leaves you," Judge Davis told Miller, "but you're still deceased as far as the law is concerned." And he still is, because he did not appeal that ruling
  • in April the Social Security Administration sent letters to Miller's two daughters, demanding that they pay back the federal death benefits they got while Miller was legally dead. They got about $100 a week until they were 18, and the payments totaled less than $30,000. Including fees and interest, the SSA sought $47,256 from the daughters. It reportedly said that if it couldn't get the money from them, it would then seek it from the ex-wife, and only if she also couldn't pay would it go after the guy who abandoned them in the first place.
1 - 10 of 10
Showing 20 items per page