Skip to main content

Home/ Digit_al Society/ Group items tagged metadata

Rss Feed Group items tagged

dr tech

I know where your cat lives (privacy and metadata) ^JB - cs4fn - 0 views

  •  
    "German Green party MP, Malte Spitz, went a step further and published 6 months of records kept (at the time by law) by his phone company about him. To emphasise how scary it was privacy-wise he published it in the form of a minute by minute interactive map, so anyone could follow his exact location (just like the phone company) as though in real time from the location metadata his phone was giving away all the time. The metadata was combined with his freely available social networking data, allowing anyone to see not just where he was but often what he was doing. Germany no longer requires phone companies to keep this metadata, but other countries have antiterrorist laws that require similar information to be kept for everyone. You can explore Malte's movements at (archived link: www.zeit.de/datenschutz/malte-spitz-data-retention) to get an idea of how your life is being tracked by metadata."
dr tech

US drones could be killing the wrong people because of metadata errors - Boing Boing - 1 views

  •  
    "As Redditor actual_hacker said in a thread, the big point of this article: "The US has built a SIM-card kill list. They're shooting missiles at cell phones without caring about who is holding the phone. That is why so many innocent people keep getting killed. That is what this story is about. The next time someone says "it's just metadata," remember this story. Innocent people die because of NSA's use of metadata: the story cites 14 women and 21 children killed in just one operation. All because of metadata.""
dr tech

MetaPhone: The Sensitivity of Telephone Metadata « Web Policy - 0 views

  •  
    "The dataset that we analyzed in this report spanned hundreds of users over several months. Phone records held by the NSA and telecoms span millions of Americans over multiple years. Reasonable minds can disagree about the policy and legal constraints that should be imposed on those databases. The science, however, is clear: phone metadata is highly sensitive."
dr tech

Email is broken - but Dark Mail Alliance is aiming to fix it | Technology | theguardian... - 0 views

  •  
    ""We were sitting on metadata [information about emails, such as sender, recipient and time of delivery], so we knew it was only a matter of time before someone would come to us," says Mike Janke, Silent Circle's co-founder and chief executive. "Email was different - the rest of our products have no metadata, no IP logging, no way - but email was fundamentally broken.""
dr tech

NSA surveillance: don't underestimate the extraordinary power of metadata | Technology ... - 0 views

  •  
    "President Obama has reassured US citizens that 'nobody is listening to your calls', but it's not the content of conversations that intelligence agencies crave"
dr tech

The hidden fingerprint inside your photos - BBC Future - 0 views

  •  
    "When you take a photo, your smartphone or digital camera stores "metadata" within the image file. This automatically and parasitically burrows itself into every photo you take. It is data about data, providing identifying information such as when and where an image was captured, and what type of camera was used."
dr tech

Microsoft productivity score feature criticised as workplace surveillance | Microsoft |... - 0 views

  •  
    ""Employers are increasingly exploiting metadata logged by software and devices for performance analytics and algorithmic control," Christl added. "MS is providing the tools for it. Practices we know from software development (and factories and call centres) are expanded to all white-collar work.""
dr tech

Silent Circle on secure electronic communications: 'You may wish to avoid email altoget... - 0 views

  •  
    "As examples, Kowolowski noted that companies wanting to protect their intellectual property or individuals sending tax returns may be happy to use traditional PGP/SMIME technology to encrypt the body of their messages, but that "a freedom fighter working on an oppressive country" would be just as concerned about the metadata."
dr tech

How the NSA searches the world's intercepted private communications - Boing Boing - 0 views

  •  
    "XKEYSCORE is a secret NSA program that indexes data slurped up from covert fiber-taps, hacked systems, and smartphones, including "full take" data and metadata. "
dr tech

Unethical uses for public Twitter data - Adrian Short - 0 views

  •  
    "But the bigger problem with things like public tweets is that no-one knows what information can be derived from them, either now or in the future. I write as a data analyst who's done a fair bit of work with this kind of material. What follows are a few techniques that aren't at all obvious to the average Twitter user. They go far beyond reading the surface text (or metadata) of an individual tweet. And these are just some of the techniques currently used to mine this data, ethically or unethically, legally or illegally."
dr tech

Iran's Secret Manual for Controlling Protesters' Mobile Phones - 0 views

  •  
    "According to these internal documents, SIAM is a computer system that works behind the scenes of Iranian cellular networks, providing its operators a broad menu of remote commands to alter, disrupt, and monitor how customers use their phones. The tools can slow their data connections to a crawl, break the encryption of phone calls, track the movements of individuals or large groups, and produce detailed metadata summaries of who spoke to whom, when, and where. Such a system could help the government invisibly quash the ongoing protests - or those of tomorrow - an expert who reviewed the SIAM documents told The Intercept."
dr tech

With These New Digital Tools, Citizens Can Help Police Solve Crimes | Technology on GOOD - 0 views

  •  
    As our connectivity increases, we're seeing a growing number of cases of law enforcement using social media and other digital tools to help solve crimes. A study from Accenture, a global management and consulting agency, showed that 72 percent of respondent citizens believe that social media can help in crime investigations and in the prosecution of offenders.
dr tech

5 Real World Problems That Are Straight Out Of Black Mirror - 0 views

  •  
    "Thanks to a map that shows the jogging habits of the 27 million people who use Fitbits and the like, we can see splotches of activity in otherwise dark areas, like Iraq and Syria. Some of those splotches are known American military sites full of exercising soldiers, and some, by extrapolation, are sites that the military would rather keep unknown. One journalist saw a lot of exercise activity on a Somalian beach that was suspected to be home to a CIA base. Someone else spotted a suspected missile site in Yemen, and a web of bases in Afghanistan were also revealed."
dr tech

After You Die, Microsoft Wants to Resurrect You as a Chatbot - 0 views

  •  
    "Last month, the U.S. Patent and Trademark Office granted a patent to Microsoft that outlines a process to create a conversational chatbot of a specific person using their social data. In an eerie twist, the patent says the chatbot could potentially be inspired by friends or family members who are deceased, which is almost a direct plot of a popular episode of Netflix's Black Mirror."
dr tech

Opinion | They Stormed the Capitol. Their Apps Tracked Them. - The New York Times - 0 views

  •  
    "Surrendering our privacy to the government would be foolish enough. But what is more insidious is the Faustian bargain made with the marketing industry, which turns every location ping into currency as it is bought and sold in the marketplace of surveillance advertising. Now, one year later, we're in a very similar position. But it's far worse. A source has provided another data set, this time following the smartphones of thousands of Trump supporters, rioters and passers-by in Washington, D.C., on January 6, as Donald Trump's political rally turned into a violent insurrection. At least five people died because of the riot at the Capitol. Key to bringing the mob to justice has been the event's digital detritus: location data, geotagged photos, facial recognition, surveillance cameras and crowdsourcing."
dr tech

How fraudsters can use the forgotten details of your online life to reel you in | Scams... - 0 views

  •  
    ""The social engineering type of attack does not tend to scale [up] easily given the time and effort required to succeed, and therefore is more often than not used by individuals rather than the 'call centre' approach of criminal enterprises," Goddard says. "The trigger to target an individual could be targeted, or opportunistic such as overhearing a conversation or getting access to sensitive or exploitable information like a picture or bank statement.""
dr tech

Locating The Netherlands' Most Wanted Criminal By Scrutinising Instagram - bellingcat - 0 views

  •  
    "Locating The Netherlands' Most Wanted Criminal By Scrutinising Instagram"
dr tech

'The Gospel': how Israel uses AI to select bombing targets in Gaza | Israel | The Guardian - 0 views

  •  
    "Sources familiar with how AI-based systems have been integrated into the IDF's operations said such tools had significantly sped up the target creation process. "We prepare the targets automatically and work according to a checklist," a source who previously worked in the target division told +972/Local Call. "It really is like a factory. We work quickly and there is no time to delve deep into the target. The view is that we are judged according to how many targets we manage to generate." A separate source told the publication the Gospel had allowed the IDF to run a "mass assassination factory" in which the "emphasis is on quantity and not on quality". A human eye, they said, "will go over the targets before each attack, but it need not spend a lot of time on them". For some experts who research AI and international humanitarian law, an acceleration of this kind raises a number of concerns."
1 - 20 of 20
Showing 20 items per page