Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged digital

Rss Feed Group items tagged

Paul Merrell

Securing Our Digital Economy | Internet Society - 0 views

  • Germany wants G20 leaders to agree to a concrete plan – one that includes affordable Internet access across the world by 2025, common technical standards and a focus on digital learning. Today, the G20 economies, like so many other economies around the world, are digital and interconnected. Digital services have opened up new avenues for sustainable economic growth. But, the digital economy will only continue to thrive and generate opportunities for citizens if the Internet is strong, secure, and trusted. Without this foundation, the global digital economy is at risk. Currently, there are 360 million people that take part in cross-border e-commerce. 28% of output in mature economies is digital. The Internet is set to contribute $6.6 trillion a year, or 7.1% of the total GDP in the G20 countries. And, by 2020, it’s estimated that more than 1 billion users will be added and there will be 30-50 billion additional connected devices. This level of interconnection will only boost the market. However, this cannot happen without a serious commitment by all parties to security and privacy. The truth is that economies can only function within a secure and trusted environment. Which brings us to encryption. Strong encryption is an essential piece to the future of the world’s economy and the Internet Society believes it should be the norm for all online transactions. It allows us to do our banking, conduct local and global business, run our power grids, operate, communications networks, and do almost everything else.
  • Encryption is a technical building block for securing infrastructure, communications and information. It should be made stronger and universal, not weaker. However, rather than being recognized as the way to secure our online transactions or our conversations, all too often the debate focuses on the use of encryption as a way to thwart law enforcement. To undermine the positive role of encryption in the name of security could have devastating consequences. Many great minds have already devoted considerable effort to resolving the conundrum posed by competing public policy objectives: providing security, safety and trust on the one hand, and law enforcement and legitimate policy goals on the other. But, it is time to stop kicking the encryption football up and down the field. Instead, we should recognize that encryption is key to the future digital economy and stop treating it as simply an obstacle to law enforcement. We need to deconstruct the issues faced by law enforcement and policy makers and agree together how we can achieve a trusted digital economy underpinned by encryption. This is the first time the G20 countries are holding a Ministerial on digital matters. It is also the first time that the G20 is inviting non-government stakeholders to contribute to these issues. This is a turning point that should not be missed. All views, including the technical perspective, must be at the table if we are to achieve progress on the G20’s ICT goals. If the G20 countries are serious about strengthening their economies and continuing to deliver economic and social prosperity to their citizens in future, there are three key principles they should endorse and implement immediately:
  • 1. Encryption is an important technical foundation for trust in the digital economy and should be the norm. All users (whether government, business or individual) should use encryption to protect infrastructure, communications and the privacy and integrity of their data. Encryption technologies should be strengthened, not weakened. 2. The security of the digital economy is a shared responsibility that needs the expertise and experience of all stakeholders, across border and across disciplines. It is an urgent need that will require open, inclusive collaboration. 3. Users’ rights should be at the heart of any decisions related to the digital economy. They are both the customers and the contributors to the success of the digital economy. The Internet Society calls for ubiquitous encryption for the Internet. We strongly believe that this is the best foundation for trust in the digital economy, and we urge the G20 nations to stand behind encryption.
Gary Edwards

Why Bitcoin Matters | Marc Andreessen - 0 views

  • First, Bitcoin at its most fundamental level is a breakthrough in computer science – one that builds on 20 years of research into cryptographic currency, and 40 years of research in cryptography, by thousands of researchers around the world. Bitcoin is the first practical solution to a longstanding problem in computer science called the Byzantine Generals Problem. To quote from the original paper defining the B.G.P.: “[Imagine] a group of generals of the Byzantine army camped with their troops around an enemy city. Communicating only by messenger, the generals must agree upon a common battle plan. However, one or more of them may be traitors who will try to confuse the others. The problem is to find an algorithm to ensure that the loyal generals will reach agreement.” More generally, the B.G.P. poses the question of how to establish trust between otherwise unrelated parties over an untrusted network like the Internet.
  • The practical consequence of solving this problem is that Bitcoin gives us, for the first time, a way for one Internet user to transfer a unique piece of digital property to another Internet user, such that the transfer is guaranteed to be safe and secure, everyone knows that the transfer has taken place, and nobody can challenge the legitimacy of the transfer. The consequences of this breakthrough are hard to overstate. What kinds of digital property might be transferred in this way? Think about digital signatures, digital contracts, digital keys (to physical locks, or to online lockers), digital ownership of physical assets such as cars and houses, digital stocks and bonds … and digital money. All these are exchanged through a distributed network of trust that does not require or rely upon a central intermediary like a bank or broker. And all in a way where only the owner of an asset can send it, only the intended recipient can receive it, the asset can only exist in one place at a time, and everyone can validate transactions and ownership of all assets anytime they want.
  • How does this work?
  • ...5 more annotations...
  • Bitcoin is a digital bearer instrument. It is a way to exchange money or assets between parties with no pre-existing trust: A string of numbers is sent over email or text message in the simplest case. The sender doesn’t need to know or trust the receiver or vice versa. Related, there are no chargebacks – this is the part that is literally like cash – if you have the money or the asset, you can pay with it; if you don’t, you can’t. This is brand new. This has never existed in digital form before. Bitcoin is a digital currency, whose value is based directly on two things: use of the payment system today – volume and velocity of payments running through the ledger – and speculation on future use of the payment system. This is one part that is confusing people. It’s not as much that the Bitcoin currency has some arbitrary value and then people are trading with it; it’s more that people can trade with Bitcoin (anywhere, everywhere, with no fraud and no or very low fees) and as a result it has value.
  • Bitcoin is an Internet-wide distributed ledger. You buy into the ledger by purchasing one of a fixed number of slots, either with cash or by selling a product and service for Bitcoin. You sell out of the ledger by trading your Bitcoin to someone else who wants to buy into the ledger. Anyone in the world can buy into or sell out of the ledger any time they want – with no approval needed, and with no or very low fees. The Bitcoin “coins” themselves are simply slots in the ledger, analogous in some ways to seats on a stock exchange, except much more broadly applicable to real world transactions. The Bitcoin ledger is a new kind of payment system. Anyone in the world can pay anyone else in the world any amount of value of Bitcoin by simply transferring ownership of the corresponding slot in the ledger. Put value in, transfer it, the recipient gets value out, no authorization required, and in many cases, no fees. That last part is enormously important. Bitcoin is the first Internetwide payment system where transactions either happen with no fees or very low fees (down to fractions of pennies). Existing payment systems charge fees of about 2 to 3 percent – and that’s in the developed world. In lots of other places, there either are no modern payment systems or the rates are significantly higher. We’ll come back to that.
  • Why would any merchant – online or in the real world – want to accept Bitcoin as payment, given the currently small number of consumers who want to pay with it? My partner Chris Dixon recently gave this example: “Let’s say you sell electronics online. Profit margins in those businesses are usually under 5 percent, which means conventional 2.5 percent payment fees consume half the margin. That’s money that could be reinvested in the business, passed back to consumers or taxed by the government. Of all of those choices, handing 2.5 percent to banks to move bits around the Internet is the worst possible choice. Another challenge merchants have with payments is accepting international payments. If you are wondering why your favorite product or service isn’t available in your country, the answer is often payments.” In addition, merchants are highly attracted to Bitcoin because it eliminates the risk of credit card fraud. This is the form of fraud that motivates so many criminals to put so much work into stealing personal customer information and credit card numbers. Since Bitcoin is a digital bearer instrument, the receiver of a payment does not get any information from the sender that can be used to steal money from the sender in the future, either by that merchant or by a criminal who steals that information from the merchant.
  • What’s the future of Bitcoin?
  • Bitcoin is a classic network effect, a positive feedback loop. The more people who use Bitcoin, the more valuable Bitcoin is for everyone who uses it, and the higher the incentive for the next user to start using the technology. Bitcoin shares this network effect property with the telephone system, the web, and popular Internet services like eBay and Facebook. In fact, Bitcoin is a four-sided network effect. There are four constituencies that participate in expanding the value of Bitcoin as a consequence of their own self-interested participation. Those constituencies are (1) consumers who pay with Bitcoin, (2) merchants who accept Bitcoin, (3) “miners” who run the computers that process and validate all the transactions and enable the distributed trust network to exist, and (4) developers and entrepreneurs who are building new products and services with and on top of Bitcoin. All four sides of the network effect are playing a valuable part in expanding the value of the overall system, but the fourth is particularly important.
  •  
    WOW! This is the must read article of the year. Great explanation of Bitcoin; what it is, how it works, and why it is so significant. Excellent analysis!
Paul Merrell

Reset The Net - Privacy Pack - 0 views

  • This June 5th, I pledge to take strong steps to protect my freedom from government mass surveillance. I expect the services I use to do the same.
  • Fight for the Future and Center for Rights will contact you about future campaigns. Privacy Policy
  •  
    I wound up joining this campaign at the urging of the ACLU after checking the Privacy Policy. The Reset the Net campaign seems to be endorsed by a lot of change-oriented groups, from the ACLU to Greenpeac to the Pirate Party. A fair number of groups with a Progressive agenda, but certainly not limited to them. The right answer to that situation is to urge other groups to endorse, not to avoid the campaign. Single-issue coalition-building is all about focusing on an area of agreement rather than worrying about who you are rubbing elbows with.  I have been looking for a a bipartisan group that's tackling government surveillance issues via mass actions but has no corporate sponsors. This might be the one. The reason: Corporate types like Google have no incentive to really butt heads with the government voyeurs. They are themselves engaged in massive surveillance of their users and certainly will not carry the battle for digital privacy over to the private sector. But this *is* a battle over digital privacy and legally defining user privacy rights in the private sector is just as important as cutting back on government surveillance. As we have learned through the Snowden disclosures, what the private internet companies have, the NSA can and does get.  The big internet services successfully pushed in the U.S. for authorization to publish more numbers about how many times they pass private data to the government, but went no farther. They wanted to be able to say they did something, but there's a revolving door of staffers between NSA and the big internet companies and the internet service companies' data is an open book to the NSA.   The big internet services are not champions of their users' privacy. If they were, they would be featuring end-to-end encryption with encryption keys unique to each user and unknown to the companies.  Like some startups in Europe are doing. E.g., the Wuala.com filesync service in Switzerland (first 5 GB of storage free). Compare tha
Paul Merrell

U.S. knocks plans for European communication network | Reuters - 0 views

  • The United States on Friday criticized proposals to build a European communication network to avoid emails and other data passing through the United States, warning that such rules could breach international trade laws. In its annual review of telecommunications trade barriers, the office of the U.S. Trade Representative said impediments to cross-border data flows were a serious and growing concern.It was closely watching new laws in Turkey that led to the blocking of websites and restrictions on personal data, as well as calls in Europe for a local communications network following revelations last year about U.S. digital eavesdropping and surveillance."Recent proposals from countries within the European Union to create a Europe-only electronic network (dubbed a 'Schengen cloud' by advocates) or to create national-only electronic networks could potentially lead to effective exclusion or discrimination against foreign service suppliers that are directly offering network services, or dependent on them," the USTR said in the report.
  • Germany and France have been discussing ways to build a European network to keep data secure after the U.S. spying scandal. Even German Chancellor Angela Merkel's cell phone was reportedly monitored by American spies.The USTR said proposals by Germany's state-backed Deutsche Telekom to bypass the United States were "draconian" and likely aimed at giving European companies an advantage over their U.S. counterparts.Deutsche Telekom has suggested laws to stop data traveling within continental Europe being routed via Asia or the United States and scrapping the Safe Harbor agreement that allows U.S. companies with European-level privacy standards access to European data. (www.telekom.com/dataprotection)"Any mandatory intra-EU routing may raise questions with respect to compliance with the EU's trade obligations with respect to Internet-enabled services," the USTR said. "Accordingly, USTR will be carefully monitoring the development of any such proposals."
  • U.S. tech companies, the leaders in an e-commerce marketplace estimated to be worth up to $8 trillion a year, have urged the White House to undertake reforms to calm privacy concerns and fend off digital protectionism.
  •  
    High comedy from the office of the U.S. Trade Representative. The USTR's press release is here along with a link to its report. http://www.ustr.gov/about-us/press-office/press-releases/2014/March/USTR-Targets-Telecommunications-Trade-Barriers The USTR is upset because the E.U. is aiming to build a digital communications network that does not route internal digital traffic outside the E.U., to limit the NSA's ability to surveil Europeans' communications. Part of the plan is to build an E.U.-centric cloud that is not susceptible to U.S. court orders. This plan does not, of course, sit well with U.S.-based cloud service providers.  Where the comedy comes in is that the USTR is making threats to go to the World Trade organization to block the E.U. move under the authority of the General Agreement on Trade in Services (GATS). But that treaty provides, in article XIV, that:  "Subject to the requirement that such measures are not applied in a manner which would constitute a means of arbitrary or unjustifiable discrimination between countries where like conditions prevail, or a disguised restriction on trade in services, nothing in this Agreement shall be construed to prevent the adoption or enforcement by any Member of measures: ... (c)      necessary to secure compliance with laws or regulations which are not inconsistent with the provisions of this Agreement including those relating to:   ... (ii)     the protection of the privacy of individuals in relation to the processing and dissemination of personal data and the protection of confidentiality of individual records and accounts[.]" http://www.wto.org/english/docs_e/legal_e/26-gats_01_e.htm#articleXIV   The E.U., in its Treaty on Human Rights, has very strong privacy protections for digital communications. The USTR undoubtedly knows all this, and that the WTO Appellate Panel's judges are of the European mold, sticklers for protection of human rights and most likely do not appreciate being subjects o
Gary Edwards

Reinventing Banking: From Russia to Iceland to Ecuador - 1 views

  • Global developments in finance and geopolitics are prompting a rethinking of the structure of banking and of the nature of money itself. Among other interesting news items: * In Russia, vulnerability to Western sanctions has led to proposals for a banking system that is not only independent of the West but is based on different design principles. * In Iceland, the booms and busts culminating in the banking crisis of 2008-09 have prompted lawmakers to consider a plan to remove the power to create money from private banks. * In Ireland, Iceland and the UK, a recession-induced shortage of local credit has prompted proposals for a system of public interest banks on the model of the Sparkassen of Germany. * In Ecuador, the central bank is responding to a shortage of US dollars (the official Ecuadorian currency) by issuing digital dollars through accounts to which everyone has access, effectively making it a bank of the people.
  • A major concern with stripping private banks of the power to create money as deposits when they make loans is that it will seriously reduce the availability of credit in an already sluggish economy. One solution is to make the banks, or some of them, public institutions. They would still be creating money when they made loans, but it would be as agents of the government; and the profits would be available for public use, on the model of the US Bank of North Dakota and the German Sparkassen (public savings banks). In Ireland, three political parties – Sinn Fein, the Green Party and Renua Ireland (a new party) — are now supporting initiatives for a network of local publicly-owned banks on the Sparkassen model. In the UK, the New Economy Foundation (NEF) is proposing that the failed Royal Bank of Scotland be transformed into a network of public interest banks on that model. And in Iceland, public banking is part of the platform of a new political party called the Dawn Party.
  • Particularly interesting is a proposal to provide targeted lending for businesses and industries by providing them with low-interest loans at 1-4 percent, financed through the central bank with quantitative easing (digital money creation). The proposal is to issue 20 trillion rubles for this purpose over a five year period. Using quantitative easing for economic development mirrors the proposal of UK Labour Leader Jeremy Corbin for “quantitative easing for people.”
  • ...8 more annotations...
  • William Engdahl concludes that Russia is in “a fascinating process of rethinking every aspect of her national economic survival because of the reality of the western attacks,” one that “could produce a very healthy transformation away from the deadly defects” of the current banking model.
  • Iceland’s Radical Money Plan Iceland, too, is looking at a radical transformation of its money system, after suffering the crushing boom/bust cycle of the private banking model that bankrupted its largest banks in 2008. According to a March 2015 article in the UK Telegraph: Iceland’s government is considering a revolutionary monetary proposal – removing the power of commercial banks to create money and handing it to the central bank. The proposal, which would be a turnaround in the history of modern finance, was part of a report written by a lawmaker from the ruling centrist Progress Party, Frosti Sigurjonsson, entitled “A better monetary system for Iceland”.
  • Under this “Sovereign Money” proposal, the country’s central bank would become the only creator of money. Banks would continue to manage accounts and payments and would serve as intermediaries between savers and lenders. The proposal is a variant of the Chicago Plan promoted by Kumhof and Benes of the IMF and the Positive Money group in the UK.
  • Ever since 2000, when Ecuador agreed to use the US dollar as its official legal tender, it has had to ship boatloads of paper dollars into the country just to conduct trade. In order to “seek efficiency in payment systems [and] to promote and contribute to the economic stability of the country,” the government of President Rafael Correa has therefore established the world’s first national digitally-issued currency.
  • Unlike Bitcoin and similar private crypto-currencies (which have been outlawed in the country), Ecuador’s dinero electronico is operated and backed by the government. The Ecuadorian digital currency is less like Bitcoin than like M-Pesa, a private mobile phone-based money transfer service started by Vodafone, which has generated a “mobile money” revolution in Kenya.
  • According to a National Assembly statement: Electronic money will stimulate the economy; it will be possible to attract more Ecuadorian citizens, especially those who do not have checking or savings accounts and credit cards alone. The electronic currency will be backed by the assets of the Central Bank of Ecuador.
  • That means there is no fear of the bank going bankrupt or of bank runs or bail-ins. Nor can the digital currency be devalued by speculative short selling. The government has declared that these are digital US dollars trading at 1 to 1 – take it or leave it – and the people are taking it. According to an October 2015 article titled “
  • Banking Moves into the 21st Century The catastrophic failures of the Western banking system mandate a new vision. These transformations, current and proposed, are constructive steps toward streamlining the banking system, eliminating the risks that have devastated individuals and governments, democratizing money, and promoting sustainable and prosperous economies.
  •  
    Excellent article on banking, lending, and currency reform initiatives.  Thanks to Marbux!
Gary Edwards

We Call a Top NSA Whistleblower … And Get the REAL SCOOP on Spying | Washingt... - 0 views

  •  
    "NSA whistleblower Thomas Drake corroborated Klein's assertions, testifying that while the NSA is using Israeli-made NARUS hardware to "seize and save all personal electronic communications." ..................... I then asked the NSA veteran Binney if the government's claim that it is only spying on metadata - and not content - was correct. We have extensively documented that the government is likely recording content as well. (And the government has previously admitted to "accidentally" collecting more information on Americans than was legal, and then gagged the judges so they couldn't disclose the nature or extent of the violations.) Binney said that was not true; the government is gathering everything, including content. Binney explained - as he has many times before - that the government is storing everything, and creating a searchable database … to be used whenever it wants, for any purpose it wants (even just going after someone it doesn't like). ..................... Binney said that former FBI counter-terrorism agent Tim Clemente is correct when he says that no digital data is safe (Clemente says that all digital communications are being recorded). Both Verint and Narus were founded in Israel in the 1990s. *** Binney next confirmed the statement of the author of the Patriot Act - Congressman Jim Sensenbrenner - that the NSA spying programs violate the Patriot Act. After all, the Patriot Act is focused on spying on external threats … not on Americans. Binney asked rhetorically: "How can an American court [FISA or otherwise] tell telecoms to cough up all domestic data?!" Update: Binney sent the following clarifying email about content collection: It's clear to me that they are collecting most e-mail in full plus other text type data on the web. As for phone calls, I don't think they would record/transcribe the approximately 3 billion US-to-US calls every day. It's more likely that they are reco
Paul Merrell

Barrier Breakers 2016: A Project of Correct The Record - Correct The Record - 0 views

  • Task force will help Clinton supporters push back on online harassment and thank superdelegates Anonymous online attacks, from both sides of the political spectrum, have sought to spread lies and misleading narratives about Secretary Hillary Clinton. Hillary’s supporters are more enthusiastic than Sen. Bernie Sanders’ supporters, yet oftentimes are discouraged from engaging online and are “often afraid to voice their thoughts” because of the fear of online harassment. Many of Hillary Clinton’s female supporters in particular have been subject to intense cyber-bullying and sexist attacks from swarms of anonymous attackers. Among the many Hillary Clinton supporters attacked online, superdelegates have been subject to vicious attacks for supporting her. Even the director of MoveOn, which has endorsed Sen. Sanders, denounced this harassment. In response to these attacks on supporters and superdelegates, Correct The Record is launching the Barrier Breakers 2016 digital task force. While Hillary Clinton fights to break down barriers and bring America together, the Barrier Breakers 2016 digital task force will serve as a resource for supporters looking for positive content and push-back to share with their online progressive communities, as well as thanking prominent supporters and committed superdelegates on social media.
  • ask force will help Clinton supporters push back on online harassment and thank superdelegates Anonymous online attacks, from both sides of the political spectrum, have sought to spread lies and misleading narratives about Secretary Hillary Clinton. Hillary’s supporters are more enthusiastic than Sen. Bernie Sanders’ supporters, yet oftentimes are discouraged from engaging online and are “often afraid to voice their thoughts” because of the fear of online harassment. Many of Hillary Clinton’s female supporters in particular have been subject to intense cyber-bullying and sexist attacks from swarms of anonymous attackers. Among the many Hillary Clinton supporters attacked online, superdelegates have been subject to vicious attacks for supporting her. Even the director of MoveOn, which has endorsed Sen. Sanders, denounced this harassment. In response to these attacks on supporters and superdelegates, Correct The Record is launching the Barrier Breakers 2016 digital task force. While Hillary Clinton fights to break down barriers and bring America together, the Barrier Breakers 2016 digital task force will serve as a resource for supporters looking for positive content and push-back to share with their online progressive communities, as well as thanking prominent supporters and committed superdelegates on social media.
  • Correct The Record will invest more than $1 million into Barrier Breakers 2016 activities, including the more than tripling of its digital operation to engage in online messaging both for Secretary Clinton and to push back against attackers on social media platforms like Twitter, Facebook, Reddit, and Instagram. Barrier Breakers 2016 is a project of Correct The Record and the brainchild of David Brock, and the task force will be overseen by President of Correct The Record Brad Woodhouse and Digital Director Benjamin Fischbein. The task force staff’s backgrounds are as diverse as the community they will be engaging with and include former reporters, bloggers, public affairs specialists, designers, Ready for Hillary alumni, and Hillary super fans who have led groups similar to those with which the task force will organize. Lessons learned from online engagement with “Bernie Bros” during the Democratic Primary will be applied to the rest of the primary season and general election–responding quickly and forcefully to negative attacks and false narratives. Additionally, as the general election approaches, the task force will begin to push out information to Sanders supporters online, encouraging them to support Hillary Clinton. The task force currently combats online political harassment, having already addressed more than 5,000 individuals who have personally attacked Secretary Clinton on Twitter. The task force will provide a presence and space online where Clinton supporters can organize and engage with one another and are able to obtain graphics, videos, gifs, and messaging to use in their own social spaces. Additionally, the Barrier Breakers 2016 task force hopes to embrace the creativity of Hillary Clinton’s supporters by sharing their efforts and content with other groups.
Paul Merrell

Catalog Reveals NSA Has Back Doors for Numerous Devices - SPIEGEL ONLINE - 0 views

  • When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." Despite these assurances, though, there is one attacker none of these products can fend off -- the United States' National Security Agency.
  • Specialists at the intelligence organization succeeded years ago in penetrating the company's digital firewalls. A document viewed by SPIEGEL resembling a product catalog reveals that an NSA division called ANT has burrowed its way into nearly all the security architecture made by the major players in the industry -- including American global market leader Cisco and its Chinese competitor Huawei, but also producers of mass-market goods, such as US computer-maker Dell.
  • The specialists at ANT, which presumably stands for Advanced or Access Network Technology, could be described as master carpenters for the NSA's department for Tailored Access Operations (TAO). In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet. Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.
  • ...3 more annotations...
  • These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. For nearly every lock, ANT seems to have a key in its toolbox. And no matter what walls companies erect, the NSA's specialists seem already to have gotten past them. This, at least, is the impression gained from flipping through the 50-page document. The list reads like a mail-order catalog, one from which other NSA employees can order technologies from the ANT division for tapping their targets' data. The catalog even lists the prices for these electronic break-in tools, with costs ranging from free to $250,000. In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." This malware burrows into Juniper firewalls and makes it possible to smuggle other NSA programs into mainframe computers. Thanks to FEEDTROUGH, these implants can, by design, even survive "across reboots and software upgrades." In this way, US government spies can secure themselves a permanent presence in computer networks. The catalog states that FEEDTROUGH "has been deployed on many target platforms."
  • The ANT division doesn't just manufacture surveillance hardware. It also develops software for special tasks. The ANT developers have a clear preference for planting their malicious code in so-called BIOS, software located on a computer's motherboard that is the first thing to load when a computer is turned on. This has a number of valuable advantages: an infected PC or server appears to be functioning normally, so the infection remains invisible to virus protection and other security programs. And even if the hard drive of an infected computer has been completely erased and a new operating system is installed, the ANT malware can continue to function and ensures that new spyware can once again be loaded onto what is presumed to be a clean computer. The ANT developers call this "Persistence" and believe this approach has provided them with the possibility of permanent access. Another program attacks the firmware in hard drives manufactured by Western Digital, Seagate, Maxtor and Samsung, all of which, with the exception of the latter, are American companies. Here, too, it appears the US intelligence agency is compromising the technology and products of American companies.
  • Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment. There is no information in the documents seen by SPIEGEL to suggest that the companies whose products are mentioned in the catalog provided any support to the NSA or even had any knowledge of the intelligence solutions. "Cisco does not work with any government to modify our equipment, nor to implement any so-called security 'back doors' in our products," the company said in a statement. Contacted by SPIEGEL reporters, officials at Western Digital, Juniper Networks and Huawei also said they had no knowledge of any such modifications. Meanwhile, Dell officials said the company "respects and complies with the laws of all countries in which it operates." Many of the items in the software solutions catalog date from 2008, and some of the target server systems that are listed are no longer on the market today. At the same time, it's not as if the hackers within the ANT division have been sleeping on the job. They have continued to develop their arsenal. Some pages in the 2008 catalog, for example, list new systems for which no tools yet exist. However, the authors promise they are already hard at work developing new tools and that they will be "pursued for a future release."
  •  
    Oh, great. My router and all of my hard drives have NSA backdoors in them. And my BIOS on the Linux box may be infected with a backdoor. What are the odds that NSA has not developed similar capability for the UEFI on our two newer Windows boxes? 
Gary Edwards

XKeyscore: NSA tool collects 'nearly everything a user does on the internet' | World ne... - 1 views

  • The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight.
  • The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10
  • "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email".
  • ...23 more annotations...
  • US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do."
  • But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed.
  • XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers "nearly everything a typical user does on the internet", including the content of emails, websites visited and searches, as well as their metadata.
  • Analysts can also use XKeyscore and other NSA systems to obtain ongoing "real-time" interception of an individual's internet activity.
  • Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a 'US person', though no such warrant is required for intercepting the communications of Americans with foreign targets.
  • But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.
  • One training slide illustrates the digital activity constantly being collected by XKeyscore and the analyst's ability to query the databases at any time.
  • The purpose of XKeyscore is to allow analysts to search the metadata as well as the content of emails and other internet activity, such as browser history, even when there is no known email account (a "selector" in NSA parlance) associated with the individual being targeted.
  • Analysts can also search by name, telephone number, IP address, keywords, the language in which the internet activity was conducted or the type of browser used.
  • One document notes that this is because "strong selection [search by email address] itself gives us only a very limited capability" because "a large amount of time spent on the web is performing actions that are anonymous."
  • Email monitoring
  • One top-secret document describes how the program "searches within bodies of emails, webpages and documents", including the "To, From, CC, BCC lines" and the 'Contact Us' pages on websites".
  • To search for emails, an analyst using XKS enters the individual's email address into a simple online search form, along with the "justification" for the search and the time period for which the emails are sought.
  • One document, a top secret 2010 guide describing the training received by NSA analysts for general surveillance under the Fisa Amendments Act of 2008, explains that analysts can begin surveillance on anyone by clicking a few simple pull-down menus designed to provide both legal and targeting justifications.
  • Once options on the pull-down menus are selected, their target is marked for electronic surveillance and the analyst is able to review the content of their communications:
  • Chats, browsing history and other internet activity
  • Beyond emails, the XKeyscore system allows analysts to monitor a virtually unlimited array of other internet activities, including those within social media.
  • An NSA tool called DNI Presenter, used to read the content of stored emails, also enables an analyst using XKeyscore to read the content of Facebook chats or private messages.
  • The XKeyscore program also allows an analyst to learn the IP addresses of every person who visits any website the analyst specifies.
  • The quantity of communications accessible through programs such as XKeyscore is staggeringly large. One NSA report from 2007 estimated that there were 850bn "call events" collected and stored in the NSA databases, and close to 150bn internet records. Each day, the document says, 1-2bn records were added.
  • William Binney, a former NSA mathematician, said last year that the agency had "assembled on the order of 20tn transactions about US citizens with other US citizens", an estimate, he said, that "only was involving phone calls and emails". A 2010 Washington Post article reported that "every day, collection systems at the [NSA] intercept and store 1.7bn emails, phone calls and other type of communications."
  • The ACLU's deputy legal director, Jameel Jaffer, told the Guardian last month that national security officials expressly said that a primary purpose of the new law was to enable them to collect large amounts of Americans' communications without individualized warrants.
  • "The government doesn't need to 'target' Americans in order to collect huge volumes of their communications," said Jaffer. "The government inevitably sweeps up the communications of many Americans" when targeting foreign nationals for surveillance.
  •  
    "One presentation claims the XKeyscore program covers 'nearly everything a typical user does on the internet' ................................................................. A top secret National Security Agency program allows analysts to search with no prior authorization through vast databases containing emails, online chats and the browsing histories of millions of individuals, according to documents provided by whistleblower Edward Snowden. The NSA boasts in training materials that the program, called XKeyscore, is its "widest-reaching" system for developing intelligence from the internet. The latest revelations will add to the intense public and congressional debate around the extent of NSA surveillance programs. They come as senior intelligence officials testify to the Senate judiciary committee on Wednesday, releasing classified documents in response to the Guardian's earlier stories on bulk collection of phone records and Fisa surveillance court oversight. The files shed light on one of Snowden's most controversial statements, made in his first video interview published by the Guardian on June 10. "I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email". US officials vehemently denied this specific claim. Mike Rogers, the Republican chairman of the House intelligence committee, said of Snowden's assertion: "He's lying. It's impossible for him to do what he was saying he could do." But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA's "widest reaching" system developing intelligence from computer networks - what the agency calls Digital Network Intelligence (DNI). One
  •  
    "But training materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. " Note in that regard that Snowden said in an earlier interview that use of this system rarely was audited and that when audited, the most common request if changes were requested was to beef up the justification for the search. The XScore system puts the lie to just about everything the Administration has claimed about intense oversight by all three branches of federal government and about not reading emails or listening to (Skype) phone calls. The lies keep stacking up in an ever-deepening pile.
Gary Edwards

How IT Costs More Jobs than It Creates - Technology Review - 0 views

  • Brynjolfsson and McAfee cite evidence that—in addition to other macroeconomic problems, and the 2008 financial crisis—the U.S. economy is undergoing a structural change wrought by technology. "It's not just the crash, it's something that is changing fundamentally in the way people use technology," Brynjolfsson says
    • Gary Edwards
       
      Maybe it's true that technological changes to "productivity" are coming so fast, and with such dramatic improvements, that people can't adapt and keep up; creating a human vs tech productivity gap.  Maybe though, productivity / employment is not the most accurate gauge for measuring income, prosperity and wealth.  Consumption and investment have to be factored in.  The Fair Tax is a better fit for this high tech  productivity world than the Progressive Income Tax. Societies that carry a huge militaristic and/or socialistic cost to citizenship and governance are certainly at a competitive disadvantage in a global economy.  The cost of productivity has to carry the weight of militaristic/socialist government.  In the US, near 50% of the population exist on government subsidized income/re-distribution.  If it wasn't for tech pumped productivity, where the return on investment jumps also as labor cost and the cost of product/services distribution falls, it would be impossible for the US private sector to carry the enormous weight of government. It seems to me though that consumption has it's own internal balancing mechanism, if only the government would get out of the way and let it work.  Citizens can't consume if they don't produce.  Regardless of the the tech productivity bump factor!   The other point is that much of this discussion rests on the gravitational law that digital information represents reality; and digital services make reality more efficient with global distribution possibilities (larger markets).  But you can't eat "digital representations of reality".  You can't physically fly from San Francisco to NYC using strictly digital representations, even though you can simulate communication and connectivity "digitally". At the end of the day, digital machines enable us to work reality in new and efficient ways.  But they are still machines.  And a reality of physical dimensions remains.
Paul Merrell

Digital currencies could 'challenge sovereignty' - RTÉ News - 0 views

  • A senior Central Bank official has warned that virtual and digital currencies have the potential to challenge the sovereignty of states. Gareth Murphy was this afternoon addressing Bitfin 2014, a conference on digital money in Dublin. Mr Murphy said rivals to national legal tender pose challenges to central banks' ability to influence the price of credit for the whole economy. He also warned that there would be a substantial threat to the country's finances if more and more transactions for goods and services disappear from the tax net through the use of digital currencies. Mr Murphy cautioned that a loss of consumer confidence in currencies can cause uncertainty, which in turn can lead to a drop in economic activity. The Central Bank has consistently said that it does not recognise and therefore does not regulate digital currencies such as Bitcoin in this country.
  • Mr Murphy, who is Director of Markets Supervision at the Central Bank, said it was well-documented that virtual currencies could provide an alternative channel for people to purchase goods and services using the proceeds for crime. In such scenarios, he added, the application of current anti-money laundering regulations will be tested. Mr Murphy warned that any failure of the payments and settlement infrastructure or "financial plumbing" in Ireland, would have a severe impact on consumer confidence and economic activity in the country. He also cautioned that virtual currencies pose a new challenge to central banks' control over the important functions of monetary and exchange rate policy. Their more widespread use would also make it more difficult for statistical agencies to gather data on economic activity, which are used by governments to steer the economy.
bestmsit01

Best MS IT - Digital WordPress Creation & Any Web Page ( Etsy, Shopify, eBay, Tikto... - 0 views

  •  
    Best MS IT ✅ What services does BestMSIT Digital Marketing Agency offer? Best MS IT helps businesses grow online. They do SEO, paid ads, and social media. They also write content, send emails, and track data. Their team makes plans that fit each business. This way, more people see the business, visit the site, and become new customers. ✅ Is BestMSIT a full-service digital marketing agency? Yes, Best MS IT does it all. They plan, design, and run ads. They help with SEO and social media. They also build sites and track results. This helps each brand stay the same everywhere online. It makes it easier for businesses to get more sales and grow fast. ✅ What makes BestMSIT different from other digital marketing agencies? Best MS IT makes special plans for each client. They use data and clear reports. Their team mixes new ideas with numbers to see what works best. They keep checking and improving. This helps each business grow strong and stand out from others online. ✅ Does BestMSIT provide website design and development services? Yes, Best MS IT makes websites for all needs. They build sites that look good and work on any device. Each site is easy to find on Google and simple to use. They also design shops online. This helps each brand look strong and sell more. ✅ Does BestMSIT specialize in any specific industries? Best MS IT works with many industries. They help online stores, health care, tech, real estate, and more. The team makes plans for each field. They know what each business needs. This helps clients get noticed and grow their business. ✅ Can BestMSIT help with SEO and Google Ads campaigns? Yes, Best MS IT helps you get seen on Google. They improve your site's ranking with SEO and run ads to bring visitors fast. They find the right words, write ads, set bids, and check results. This helps you reach your goals and get the most from your budget. ✅ Does BestMSIT offer social media marketing and management? Yes, Best MS IT
Paul Merrell

EU high court strikes down metadata collection law | Ars Technica - 0 views

  • While the United States continues to debate metadata collection conducted in secret by the National Security Agency, the European Union has been openly collecting the same sort of data for eight years. In the wake of terrorist attacks in Madrid (2004) and London (2005), the European Union passed a directive in 2006 requiring that all telecommunications providers retain all kinds of telephone and Internet metadata for at least six months and provide it to law enforcement upon request. According to a ruling handed down Tuesday by the European Court of Justice, that directive is now invalid. The case was brought by activists at Digital Rights Ireland and the Austrian Working Group on Data Retention. The two organizations had challenged the law as it had been imposed in their respective countries.
  • While the United States continues to debate metadata collection conducted in secret by the National Security Agency, the European Union has been openly collecting the same sort of data for eight years. In the wake of terrorist attacks in Madrid (2004) and London (2005), the European Union passed a directive in 2006 requiring that all telecommunications providers retain all kinds of telephone and Internet metadata for at least six months and provide it to law enforcement upon request. According to a ruling handed down Tuesday by the European Court of Justice, that directive is now invalid. The case was brought by activists at Digital Rights Ireland and the Austrian Working Group on Data Retention. The two organizations had challenged the law as it had been imposed in their respective countries.
  • The European judges concluded: The Court takes the view that, by requiring the retention of those data and by allowing the competent national authorities to access those data, the directive interferes in a particularly serious manner with the fundamental rights to respect for private life and to the protection of personal data. Furthermore, the fact that data are retained and subsequently used without the subscriber or registered user being informed is likely to generate in the persons concerned a feeling that their private lives are the subject of constant surveillance. . . . Although the retention of data required by the directive may be considered to be appropriate for attaining the objective pursued by it, the wide-ranging and particularly serious interference of the directive with the fundamental rights at issue is not sufficiently circumscribed to ensure that that interference is actually limited to what is strictly necessary.
Paul Merrell

'UK surveillance is worse than 1984' says UN privacy chief (Wired UK) - 0 views

  • The UN's newly appointed special rapporteur on privacy, Joseph Cannataci, has described digital surveillance in the UK as "worse" than anything imagined in George Orwell's totalitarian dystopia 1984.Speaking to the Guardian, Cannataci -- who doesn't own a Facebook account or use Twitter -- lambasted the oversight of British digital surveillance as "a rather bad joke at its citizens' expense".Warning against the steady erosion of privacy and increasing levels of government intrusion, he also drew sinister parallels with Orwell's vision of a mass-surveilled society, adding that today's reality was far worse than the fiction: "At least Winston [a character in Orwell's 1984] was able to go out in the countryside and go under a tree and expect there wouldn't be any screen, as it was called. Whereas today there are many parts of the English countryside where there are more cameras than George Orwell could ever have imagined."
  • Cannataci, who holds posts as a professor of technology of law at the University of Groningen, and as head of the department of Information Policy and Governance at the University of Malta, also called for a "Geneva convention-style law" for the internet. "Some people may not want to buy into it. But you know, if one takes the attitude that some countries will not play ball, then, for example, the chemical weapons agreement would never have come about."
  • As part of his new role -- which elevates digital privacy to the same level of importance as other human rights -- Cannataci has vowed to begin systematically reviewing government policies and the business models of large corporations, which he accuses of "very often taking the data that you never even knew they were taking". Although the privacy chief admits that his mandate is more than likely "impossible to achieve in the next three years", he stressed the importance of a "longer-term view" in an effort to help protect people's data and safeguard their digital rights.
Paul Merrell

UN votes to protect privacy in digital age - 0 views

  • The U.N. General Assembly unanimously adopted a resolution aimed at protecting the right to privacy against unlawful surveillance in the digital age on Wednesday in the most vocal global criticism of U.S. eavesdropping. Germany and Brazil introduced the resolution following a series of reports of U.S. surveillance, interception, and data collection abroad — including on Brazil's President Dilma Rousseff and German Chancellor Angela Merkel — that surprised and angered friends and allies. The resolution "affirms that the same rights that people have offline must also be protected online, including the right to privacy."
  • It calls on the 193 U.N. member states "to respect and protect the right to privacy, including in the context of digital communication," to take measures to end violations of those rights, and to prevent such violations including by ensuring that national legislation complies with international human rights law. It also calls on all countries "to review their procedures, practices and legislation regarding the surveillance of communications, their interception and collection of personal data, including mass surveillance, interception and collection, with a view to upholding the right to privacy of all their obligations under international human rights law." The resolution calls on U.N. members to establish or maintain independent and effective oversight methods to ensure transparency, when appropriate, and accountability for state surveillance of communications, their interception and collection of personal data.
  • General Assembly resolutions are not legally binding but they do reflect world opinion and carry political weight.
  • ...1 more annotation...
  • The key compromise dropped the contention that the domestic and international interception and collection of communications and personal data, "in particular massive surveillance," may constitute a human rights violation. The resolution instead expresses deep concern at "the negative impact" that such surveillance, "in particular when carried out on a mass scale, may have on the exercise and enjoyment of human rights."
Paul Merrell

Alex Pareene Joins Matt Taibbi's New Digital Magazine as Executive Editor - First Look ... - 0 views

  • The new digital magazine to be launched by Matt Taibbi as part of First Look Media, today announced that Alex Pareene has joined the site as executive editor. Pareene will work closely with Taibbi on First Look’s second digital magazine set to launch in the coming months. He will oversee political content.
  •  
    Matt Taibbi has moved from Rolling Stone to First Look Media, where he will head a new digital magazine, alongside Glenn Greenwald's Intercept. 
Paul Merrell

Al Jazeera America to Close Down | Al Jazeera America - 0 views

  • Al Jazeera America will shutter its cable TV and digital operations by April 30 of this year, the company announced Wednesday. The decision by the AJAM board was “driven by the fact that our business model is simply not sustainable in light of the economic challenges in the U.S. media marketplace,” said AJAM CEO Al Anstey.
  • The announcement of AJAM’s closure coincides with a decision by its global parent company to commit to a significant expansion of its worldwide digital operations into the U.S. market. “As audiences increasingly turn to multiple platforms, including mobile devices, for news and information, this expansion will allow U.S. and non-U.S. consumers alike to access the network’s journalism and content wherever and whenever they want,” the Al Jazeera Media Network said in a statement. “By expanding its digital content and distribution services to now include the U.S., the network will be better positioned to innovate and compete in an overwhelmingly digital world to serve today’s 24-hour digitally focused audience.”
  •  
    This is good news to me. Al Jazeera America ("AJAM") was a big disappointment and was coupled with geo-blocking the U.S. from internet access to Al Jazeera English, which is a stunningly great news operation.  Blame the cable television companies, who made it a condition of carrying AJAM that all of its content had to originate in the U.S., preventing AJAM from showing the content generated by Al Jazeera English.  It was pure censorship, almost undoubtedly as the result of pressure from the U.S. government on the cable companies. AJAM hired staff away from other cable news competitors in the U.S., resulting in journalism that was far more like CNN than that of Al Jazeera English, just more mainstream media mush rather than having any unique editorial policy.    The Al Jazeera international organization is headquartered in Doha, Qatar and is partially subsidized by the Qatar ruling family. The Al Jazeera English news organization produces content in the finest hard-hitting British journalism style. Unfettered by the need to attract and keep advertisers, its staff has been left remarkably free to pursue stories that they want to write, with an understandable residual avoidance of criticism for the Qatar government. But as to any government in the world, they are cut no slack at Al Jazeera English. Al Jazeera English is unique in my mind because it qualifies both as mainstream media and as a source of consistently hard-hitting journalism. That is not true of any other mainstream media outlet that I know of. I'm looking forward to not having to fire up the Tor browser to evade the geoblocking and access Al Jazeera English. 
Gary Edwards

The Fourth Industrial Revolution: what it means and how to respond - Agenda - The World... - 0 views

  • The First Industrial Revolution used water and steam power to mechanize production. The Second used electric power to create mass production. The Third used electronics and information technology to automate production. Now a Fourth Industrial Revolution is building on the Third, the digital revolution that has been occurring since the middle of the last century. It is characterized by a fusion of technologies that is blurring the lines between the physical, digital, and biological spheres.
  • Like the revolutions that preceded it, the Fourth Industrial Revolution has the potential to raise global income levels and improve the quality of life for populations around the world. To date, those who have gained the most from it have been consumers able to afford and access the digital world; technology has made possible new products and services that increase the efficiency and pleasure of our personal lives. Ordering a cab, booking a flight, buying a product, making a payment, listening to music, watching a film, or playing a game—any of these can now be done remotely.
  • In the future, technological innovation will also lead to a supply-side miracle, with long-term gains in efficiency and productivity. Transportation and communication costs will drop, logistics and global supply chains will become more effective, and the cost of trade will diminish, all of which will open new markets and drive economic growth.
  • ...16 more annotations...
  • As automation substitutes for labor across the entire economy, the net displacement of workers by machines might exacerbate the gap between returns to capital and returns to labor. On the other hand, it is also possible that the displacement of workers by technology will, in aggregate, result in a net increase in safe and rewarding jobs.
  • I am convinced of one thing—that in the future, talent, more than capital, will represent the critical factor of production.
  • This will give rise to a job market increasingly segregated into “low-skill/low-pay” and “high-skill/high-pay” segments, which in turn will lead to an increase in social tensions.
  • In addition to being a key economic concern, inequality represents the greatest societal concern associated with the Fourth Industrial Revolution.
  • The largest beneficiaries of innovation tend to be the providers of intellectual and physical capital—the innovators, shareholders, and investors—which explains the rising gap in wealth between those dependent on capital versus labor.
  • Technology is therefore one of the main reasons why incomes have stagnated, or even decreased, for a majority of the population in high-income countries: the demand for highly skilled workers has increased while the demand for workers with less education and lower skills has decreased. The result is a job market with a strong demand at the high and low ends, but a hollowing out of the middle.
  • A winner-takes-all economy that offers only limited access to the middle class is a recipe for democratic malaise and dereliction.
  • An underlying theme in my conversations with global CEOs and senior business executives is that the acceleration of innovation and the velocity of disruption are hard to comprehend or anticipate and that these drivers constitute a source of constant surprise, even for the best connected and most well informed. Indeed, across all industries, there is clear evidence that the technologies that underpin the Fourth Industrial Revolution are having a major impact on businesses.
  • On the supply side, many industries are seeing the introduction of new technologies that create entirely new ways of serving existing needs and significantly disrupt existing industry value chains. Disruption is also flowing from agile, innovative competitors who, thanks to access to global digital platforms for research, development, marketing, sales, and distribution, can oust well-established incumbents faster than ever by improving the quality, speed, or price at which value is delivered.
  • Major shifts on the demand side are also occurring, as growing transparency, consumer engagement, and new patterns of consumer behavior (increasingly built upon access to mobile networks and data) force companies to adapt the way they design, market, and deliver products and services.
  • A key trend is the development of technology-enabled platforms that combine both demand and supply to disrupt existing industry structures, such as those we see within the “sharing” or “on demand” economy. These technology platforms, rendered easy to use by the smartphone, convene people, assets, and data—thus creating entirely new ways of consuming goods and services in the process. In addition, they lower the barriers for businesses and individuals to create wealth, altering the personal and professional environments of workers. These new platform businesses are rapidly multiplying into many new services, ranging from laundry to shopping, from chores to parking, from massages to travel.
  • On the whole, there are four main effects that the Fourth Industrial Revolution has on business—on customer expectations, on product enhancement, on collaborative innovation, and on organizational forms.
  • Overall, the inexorable shift from simple digitization (the Third Industrial Revolution) to innovation based on combinations of technologies (the Fourth Industrial Revolution) is forcing companies to reexamine the way they do business. The bottom line, however, is the same: business leaders and senior executives need to understand their changing environment, challenge the assumptions of their operating teams, and relentlessly and continuously innovate.
  • governments will increasingly face pressure to change their current approach to public engagement and policymaking, as their central role of conducting policy diminishes owing to new sources of competition and the redistribution and decentralization of power that new technologies make possible.
  • Ultimately, the ability of government systems and public authorities to adapt will determine their survival. If they prove capable of embracing a world of disruptive change, subjecting their structures to the levels of transparency and efficiency that will enable them to maintain their competitive edge, they will endure. If they cannot evolve, they will face increasing trouble.
  • In the end, it all comes down to people and values. We need to shape a future that works for all of us by putting people first and empowering them. In its most pessimistic, dehumanized form, the Fourth Industrial Revolution may indeed have the potential to “robotize” humanity and thus to deprive us of our heart and soul. But as a complement to the best parts of human nature—creativity, empathy, stewardship—it can also lift humanity into a new collective and moral consciousness based on a shared sense of destiny. It is incumbent on us all to make sure the latter prevails.
bestmsit01

Buy Google Play Developer Account - 100% Best Quality & Full Verified Account - 0 views

  •  
    Best MS IT ✅ What services does BestMSIT Digital Marketing Agency offer? Best MS IT helps businesses grow online. They do SEO, paid ads, and social media. They also write content, send emails, and track data. Their team makes plans that fit each business. This way, more people see the business, visit the site, and become new customers. ✅ Is BestMSIT a full-service digital marketing agency? Yes, Best MS IT does it all. They plan, design, and run ads. They help with SEO and social media. They also build sites and track results. This helps each brand stay the same everywhere online. It makes it easier for businesses to get more sales and grow fast. ✅ What makes BestMSIT different from other digital marketing agencies? Best MS IT makes special plans for each client. They use data and clear reports. Their team mixes new ideas with numbers to see what works best. They keep checking and improving. This helps each business grow strong and stand out from others online. ✅ Does BestMSIT provide website design and development services? Yes, Best MS IT makes websites for all needs. They build sites that look good and work on any device. Each site is easy to find on Google and simple to use. They also design shops online. This helps each brand look strong and sell more. ✅ Does BestMSIT specialize in any specific industries? Best MS IT works with many industries. They help online stores, health care, tech, real estate, and more. The team makes plans for each field. They know what each business needs. This helps clients get noticed and grow their business. ✅ Can BestMSIT help with SEO and Google Ads campaigns? Yes, Best MS IT helps you get seen on Google. They improve your site's ranking with SEO and run ads to bring visitors fast. They find the right words, write ads, set bids, and check results. This helps you reach your goals and get the most from your budget. ✅ Does BestMSIT offer social media marketing and management? Yes, Best MS IT
Paul Merrell

Are all telephone calls recorded and accessible to the US government? | Glenn Greenwald... - 0 views

  • On Wednesday night, Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could:BURNETT: Tim, is there any way, obviously, there is a voice mail they can try to get the phone companies to give that up at this point. It's not a voice mail. It's just a conversation. There's no way they actually can find out what happened, right, unless she tells them?
  • CLEMENTE: "No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. It's not necessarily something that the FBI is going to want to present in court, but it may help lead the investigation and/or lead to questioning of her. We certainly can find that out.BURNETT: "So they can actually get that? People are saying, look, that is incredible.CLEMENTE: "No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not."
  • "All of that stuff" - meaning every telephone conversation Americans have with one another on US soil, with or without a search warrant - "is being captured as we speak". On Thursday night, Clemente again appeared on CNN, this time with host Carol Costello, and she asked him about those remarks. He reiterated what he said the night before but added expressly that "all digital communications in the past" are recorded and stored:
  • ...1 more annotation...
  • Let's repeat that last part: "no digital communication is secure", by which he means not that any communication is susceptible to government interception as it happens (although that is true), but far beyond that: all digital communications - meaning telephone calls, emails, online chats and the like - are automatically recorded and stored and accessible to the government after the fact. To describe that is to define what a ubiquitous, limitless Surveillance State is.
1 - 20 of 269 Next › Last »
Showing 20 items per page