Skip to main content

Home/ TOK Friends/ Group items tagged spying

Rss Feed Group items tagged

Javier E

Revelations That Ikea Spied on Its Employees Stir Outrage in France - NYTimes.com - 0 views

  • kea’s investigations were conducted for various reasons, including the vetting of job applicants, efforts to build cases against employees accused of wrongdoing, and even attempts to undermine the arguments of consumers bringing complaints against the company. The going rate charged by the private investigators was 80 to 180 euros, or $110 to $247, per inquiry, court documents show. Between 2002 and 2012, the finance department of Ikea France approved more than €475,000 in invoices from investigators.
  • the spying cases occurred in a country that, in the digital age, has elevated privacy to a level nearly equal to the national trinity of Liberté, Égalité and Fraternité.
  • Last month, the company’s current chief, Stefan Vanoverbeke, and financial director, Dariusz Rychert, were questioned along with Mr. Baillot for 48 hours by the judicial police before being placed under formal investigation. That set in motion a process in which the next step, if it comes, would be the filing of criminal charges.
  • ...2 more annotations...
  • Very little of the surveillance yielded information Ikea was able to use against the targets of the data sweeps. But court documents indicate that investigators suspect that Ikea may have occasionally used knowledge of personal information to quell workplace grievances or to prompt a resignation.
  • In transcripts of police interviews, Mr. Paris and his colleagues in the risk management department acknowledged receiving frequent requests from Ikea store managers across France for criminal background checks, driving records and vehicle registrations — though only a fraction of those inquiries uncovered a notable offense. Usually the requests were limited to one or two people after a theft or a complaint of harassment among employees. But sometimes lists containing dozens of names of employees or job applicants were submitted for vetting, and then forwarded to one of a handful of trusted private investigators for processing.
dpittenger

Opinion: The disturbing consequences of ultra-connectivity - 0 views

  •  
    Today, most of the world is connected to the internet through their phones. Everyone's lives are on the internet and it can cause consequences. For one, the government uses this as a tool to spy, but so many other things can go badly with everyone being connected.
douglasn89

Russia mystery threatens to consume Washington - CNNPolitics.com - 0 views

  • Washington has become a hall of mirrors, where it's impossible to distinguish between rumor and fact as conspiracy theories and partisan paroxysms rage -- all arising from an alleged Russian spy plot to sway last year's election that is now clouding the new administration.
  • Often, President Trump himself reignites the drama — apparently to his detriment — as with his sensational claim Saturday that his predecessor Barack Obama tapped his phones.
  • The White House spokesman Sean Spicer insists that there is "no there, there" in the Russia intrigue.But the conduct of the President himself often undercuts that message. Some observers have noted that while there may be nothing nefarious going on, the President often acts in a way that suggests there is.
  • ...4 more annotations...
  • The credibility of the President's statements on the issue is also eroding."Russia is a ruse, I have nothing to do with Russia. To the best of my knowledge, no person that I deal with does," Trump said during his news conference on February 16.But since then, details have emerged of repeated meetings between Trump aides and Russian officials, casting doubt on the president's words.
  • A second reason why questions about Russia will linger is because what some observers see as Trump's odd fixation with Moscow raises constant questions about his motives.
  • The President's unique personality also appears at times to be exacerbating the sense of crisis being fostered in Washington.In theory, he could flush away questions about whether undeclared links with Russia are influencing his attitude to Moscow by releasing his tax returns.His refusal to do so gives oxygen to claims that he has some secret business or creditor relationships with Russia that compromise him.
  • Democrats have a clear political incentive to prolong a situation which is helping to unify them, to slow Trump's agenda by bogging the White House down with investigations and to present the President in a scary light.
  •  
    Washington has become a hall of mirrors, where it's impossible to distinguish between rumor and fact as conspiracy theories and partisan paroxysms rage -- all arising from an alleged Russian spy plot to sway last year's election that is now clouding the new administration.
Javier E

Whistleblower: Twitter misled investors, FTC and underplayed spam issues - Washington Post - 0 views

  • Twitter executives deceived federal regulators and the company’s own board of directors about “extreme, egregious deficiencies” in its defenses against hackers, as well as its meager efforts to fight spam, according to an explosive whistleblower complaint from its former security chief.
  • The complaint from former head of security Peiter Zatko, a widely admired hacker known as “Mudge,” depicts Twitter as a chaotic and rudderless company beset by infighting, unable to properly protect its 238 million daily users including government agencies, heads of state and other influential public figures.
  • Among the most serious accusations in the complaint, a copy of which was obtained by The Washington Post, is that Twitter violated the terms of an 11-year-old settlement with the Federal Trade Commission by falsely claiming that it had a solid security plan. Zatko’s complaint alleges he had warned colleagues that half the company’s servers were running out-of-date and vulnerable software and that executives withheld dire facts about the number of breaches and lack of protection for user data, instead presenting directors with rosy charts measuring unimportant changes.
  • ...56 more annotations...
  • The complaint — filed last month with the Securities and Exchange Commission and the Department of Justice, as well as the FTC — says thousands of employees still had wide-ranging and poorly tracked internal access to core company software, a situation that for years had led to embarrassing hacks, including the commandeering of accounts held by such high-profile users as Elon Musk and former presidents Barack Obama and Donald Trump.
  • the whistleblower document alleges the company prioritized user growth over reducing spam, though unwanted content made the user experience worse. Executives stood to win individual bonuses of as much as $10 million tied to increases in daily users, the complaint asserts, and nothing explicitly for cutting spam.
  • Chief executive Parag Agrawal was “lying” when he tweeted in May that the company was “strongly incentivized to detect and remove as much spam as we possibly can,” the complaint alleges.
  • Zatko described his decision to go public as an extension of his previous work exposing flaws in specific pieces of software and broader systemic failings in cybersecurity. He was hired at Twitter by former CEO Jack Dorsey in late 2020 after a major hack of the company’s systems.
  • “I felt ethically bound. This is not a light step to take,” said Zatko, who was fired by Agrawal in January. He declined to discuss what happened at Twitter, except to stand by the formal complaint. Under SEC whistleblower rules, he is entitled to legal protection against retaliation, as well as potential monetary rewards.
  • “Security and privacy have long been top companywide priorities at Twitter,” said Twitter spokeswoman Rebecca Hahn. She said that Zatko’s allegations appeared to be “riddled with inaccuracies” and that Zatko “now appears to be opportunistically seeking to inflict harm on Twitter, its customers, and its shareholders.” Hahn said that Twitter fired Zatko after 15 months “for poor performance and leadership.” Attorneys for Zatko confirmed he was fired but denied it was for performance or leadership.
  • A person familiar with Zatko’s tenure said the company investigated Zatko’s security claims during his time there and concluded they were sensationalistic and without merit. Four people familiar with Twitter’s efforts to fight spam said the company deploys extensive manual and automated tools to both measure the extent of spam across the service and reduce it.
  • Overall, Zatko wrote in a February analysis for the company attached as an exhibit to the SEC complaint, “Twitter is grossly negligent in several areas of information security. If these problems are not corrected, regulators, media and users of the platform will be shocked when they inevitably learn about Twitter’s severe lack of security basics.”
  • Zatko’s complaint says strong security should have been much more important to Twitter, which holds vast amounts of sensitive personal data about users. Twitter has the email addresses and phone numbers of many public figures, as well as dissidents who communicate over the service at great personal risk.
  • This month, an ex-Twitter employee was convicted of using his position at the company to spy on Saudi dissidents and government critics, passing their information to a close aide of Crown Prince Mohammed bin Salman in exchange for cash and gifts.
  • Zatko’s complaint says he believed the Indian government had forced Twitter to put one of its agents on the payroll, with access to user data at a time of intense protests in the country. The complaint said supporting information for that claim has gone to the National Security Division of the Justice Department and the Senate Select Committee on Intelligence. Another person familiar with the matter agreed that the employee was probably an agent.
  • “Take a tech platform that collects massive amounts of user data, combine it with what appears to be an incredibly weak security infrastructure and infuse it with foreign state actors with an agenda, and you’ve got a recipe for disaster,” Charles E. Grassley (R-Iowa), the top Republican on the Senate Judiciary Committee,
  • Many government leaders and other trusted voices use Twitter to spread important messages quickly, so a hijacked account could drive panic or violence. In 2013, a captured Associated Press handle falsely tweeted about explosions at the White House, sending the Dow Jones industrial average briefly plunging more than 140 points.
  • After a teenager managed to hijack the verified accounts of Obama, then-candidate Joe Biden, Musk and others in 2020, Twitter’s chief executive at the time, Jack Dorsey, asked Zatko to join him, saying that he could help the world by fixing Twitter’s security and improving the public conversation, Zatko asserts in the complaint.
  • In 1998, Zatko had testified to Congress that the internet was so fragile that he and others could take it down with a half-hour of concentrated effort. He later served as the head of cyber grants at the Defense Advanced Research Projects Agency, the Pentagon innovation unit that had backed the internet’s invention.
  • But at Twitter Zatko encountered problems more widespread than he realized and leadership that didn’t act on his concerns, according to the complaint.
  • Twitter’s difficulties with weak security stretches back more than a decade before Zatko’s arrival at the company in November 2020. In a pair of 2009 incidents, hackers gained administrative control of the social network, allowing them to reset passwords and access user data. In the first, beginning around January of that year, hackers sent tweets from the accounts of high-profile users, including Fox News and Obama.
  • Several months later, a hacker was able to guess an employee’s administrative password after gaining access to similar passwords in their personal email account. That hacker was able to reset at least one user’s password and obtain private information about any Twitter user.
  • Twitter continued to suffer high-profile hacks and security violations, including in 2017, when a contract worker briefly took over Trump’s account, and in the 2020 hack, in which a Florida teen tricked Twitter employees and won access to verified accounts. Twitter then said it put additional safeguards in place.
  • This year, the Justice Department accused Twitter of asking users for their phone numbers in the name of increased security, then using the numbers for marketing. Twitter agreed to pay a $150 million fine for allegedly breaking the 2011 order, which barred the company from making misrepresentations about the security of personal data.
  • After Zatko joined the company, he found it had made little progress since the 2011 settlement, the complaint says. The complaint alleges that he was able to reduce the backlog of safety cases, including harassment and threats, from 1 million to 200,000, add staff and push to measure results.
  • But Zatko saw major gaps in what the company was doing to satisfy its obligations to the FTC, according to the complaint. In Zatko’s interpretation, according to the complaint, the 2011 order required Twitter to implement a Software Development Life Cycle program, a standard process for making sure new code is free of dangerous bugs. The complaint alleges that other employees had been telling the board and the FTC that they were making progress in rolling out that program to Twitter’s systems. But Zatko alleges that he discovered that it had been sent to only a tenth of the company’s projects, and even then treated as optional.
  • “If all of that is true, I don’t think there’s any doubt that there are order violations,” Vladeck, who is now a Georgetown Law professor, said in an interview. “It is possible that the kinds of problems that Twitter faced eleven years ago are still running through the company.”
  • The complaint also alleges that Zatko warned the board early in his tenure that overlapping outages in the company’s data centers could leave it unable to correctly restart its servers. That could have left the service down for months, or even have caused all of its data to be lost. That came close to happening in 2021, when an “impending catastrophic” crisis threatened the platform’s survival before engineers were able to save the day, the complaint says, without providing further details.
  • One current and one former employee recalled that incident, when failures at two Twitter data centers drove concerns that the service could have collapsed for an extended period. “I wondered if the company would exist in a few days,” one of them said.
  • The current and former employees also agreed with the complaint’s assertion that past reports to various privacy regulators were “misleading at best.”
  • For example, they said the company implied that it had destroyed all data on users who asked, but the material had spread so widely inside Twitter’s networks, it was impossible to know for sure
  • As the head of security, Zatko says he also was in charge of a division that investigated users’ complaints about accounts, which meant that he oversaw the removal of some bots, according to the complaint. Spam bots — computer programs that tweet automatically — have long vexed Twitter. Unlike its social media counterparts, Twitter allows users to program bots to be used on its service: For example, the Twitter account @big_ben_clock is programmed to tweet “Bong Bong Bong” every hour in time with Big Ben in London. Twitter also allows people to create accounts without using their real identities, making it harder for the company to distinguish between authentic, duplicate and automated accounts.
  • In the complaint, Zatko alleges he could not get a straight answer when he sought what he viewed as an important data point: the prevalence of spam and bots across all of Twitter, not just among monetizable users.
  • Zatko cites a “sensitive source” who said Twitter was afraid to determine that number because it “would harm the image and valuation of the company.” He says the company’s tools for detecting spam are far less robust than implied in various statements.
  • “Agrawal’s Tweets and Twitter’s previous blog posts misleadingly imply that Twitter employs proactive, sophisticated systems to measure and block spam bots,” the complaint says. “The reality: mostly outdated, unmonitored, simple scripts plus overworked, inefficient, understaffed, and reactive human teams.”
  • The four people familiar with Twitter’s spam and bot efforts said the engineering and integrity teams run software that samples thousands of tweets per day, and 100 accounts are sampled manually.
  • Some employees charged with executing the fight agreed that they had been short of staff. One said top executives showed “apathy” toward the issue.
  • Zatko’s complaint likewise depicts leadership dysfunction, starting with the CEO. Dorsey was largely absent during the pandemic, which made it hard for Zatko to get rulings on who should be in charge of what in areas of overlap and easier for rival executives to avoid collaborating, three current and former employees said.
  • For example, Zatko would encounter disinformation as part of his mandate to handle complaints, according to the complaint. To that end, he commissioned an outside report that found one of the disinformation teams had unfilled positions, yawning language deficiencies, and a lack of technical tools or the engineers to craft them. The authors said Twitter had no effective means of dealing with consistent spreaders of falsehoods.
  • Dorsey made little effort to integrate Zatko at the company, according to the three employees as well as two others familiar with the process who spoke on the condition of anonymity to describe sensitive dynamics. In 12 months, Zatko could manage only six one-on-one calls, all less than 30 minutes, with his direct boss Dorsey, who also served as CEO of payments company Square, now known as Block, according to the complaint. Zatko allegedly did almost all of the talking, and Dorsey said perhaps 50 words in the entire year to him. “A couple dozen text messages” rounded out their electronic communication, the complaint alleges.
  • Faced with such inertia, Zatko asserts that he was unable to solve some of the most serious issues, according to the complaint.
  • Some 30 percent of company laptops blocked automatic software updates carrying security fixes, and thousands of laptops had complete copies of Twitter’s source code, making them a rich target for hackers, it alleges.
  • A successful hacker takeover of one of those machines would have been able to sabotage the product with relative ease, because the engineers pushed out changes without being forced to test them first in a simulated environment, current and former employees said.
  • “It’s near-incredible that for something of that scale there would not be a development test environment separate from production and there would not be a more controlled source-code management process,” said Tony Sager, former chief operating officer at the cyberdefense wing of the National Security Agency, the Information Assurance divisio
  • Sager is currently senior vice president at the nonprofit Center for Internet Security, where he leads a consensus effort to establish best security practices.
  • Zatko stopped the material from being presented at the Dec. 9, 2021 meeting, the complaint said. But over his continued objections, Agrawal let it go to the board’s smaller Risk Committee a week later.
  • “A best practice is that you should only be authorized to see and access what you need to do your job, and nothing else,” said former U.S. chief information security officer Gregory Touhill. “If half the company has access to and can make configuration changes to the production environment, that exposes the company and its customers to significant risk.”
  • The complaint says Dorsey never encouraged anyone to mislead the board about the shortcomings, but that others deliberately left out bad news.
  • The complaint says that about half of Twitter’s roughly 7,000 full-time employees had wide access to the company’s internal software and that access was not closely monitored, giving them the ability to tap into sensitive data and alter how the service worked. Three current and former employees agreed that these were issues.
  • An unnamed executive had prepared a presentation for the new CEO’s first full board meeting, according to the complaint. Zatko’s complaint calls the presentation deeply misleading.
  • The presentation showed that 92 percent of employee computers had security software installed — without mentioning that those installations determined that a third of the machines were insecure, according to the complaint.
  • Another graphic implied a downward trend in the number of people with overly broad access, based on the small subset of people who had access to the highest administrative powers, known internally as “God mode.” That number was in the hundreds. But the number of people with broad access to core systems, which Zatko had called out as a big problem after joining, had actually grown slightly and remained in the thousands.
  • The presentation included only a subset of serious intrusions or other security incidents, from a total Zatko estimated as one per week, and it said that the uncontrolled internal access to core systems was responsible for just 7 percent of incidents, when Zatko calculated the real proportion as 60 percent.
  • When Dorsey left in November 2021, a difficult situation worsened under Agrawal, who had been responsible for security decisions as chief technology officer before Zatko’s hiring, the complaint says.
  • Agrawal didn’t respond to requests for comment. In an email to employees after publication of this article, obtained by The Post, he said that privacy and security continues to be a top priority for the company, and he added that the narrative is “riddled with inconsistences” and “presented without important context.”
  • On Jan. 4, Zatko reported internally that the Risk Committee meeting might have been fraudulent, which triggered an Audit Committee investigation.
  • Agarwal fired him two weeks later. But Zatko complied with the company’s request to spell out his concerns in writing, even without access to his work email and documents, according to the complaint.
  • Since Zatko’s departure, Twitter has plunged further into chaos with Musk’s takeover, which the two parties agreed to in May. The stock price has fallen, many employees have quit, and Agrawal has dismissed executives and frozen big projects.
  • Zatko said he hoped that by bringing new scrutiny and accountability, he could improve the company from the outside.
  • “I still believe that this is a tremendous platform, and there is huge value and huge risk, and I hope that looking back at this, the world will be a better place, in part because of this.”
Javier E

The End of Courtship? - NYTimes.com - 0 views

  • “The word ‘date’ should almost be stricken from the dictionary,” Ms. Silver said. “Dating culture has evolved to a cycle of text messages, each one requiring the code-breaking skills of a cold war spy to interpret.”
  • Raised in the age of so-called “hookup culture,” millennials — who are reaching an age where they are starting to think about settling down — are subverting the rules of courtship.
  • Instead of dinner-and-a-movie, which seems as obsolete as a rotary phone, they rendezvous over phone texts, Facebook posts, instant messages and other “non-dates” that are leaving a generation confused about how to land a boyfriend or girlfriend.
  • ...13 more annotations...
  • Blame the much-documented rise of the “hookup culture” among young people, characterized by spontaneous, commitment-free (and often, alcohol-fueled) romantic flings. Many students today have never been on a traditional date,
  • Hookups may be fine for college students, but what about after, when they start to build an adult life? The problem is that “young people today don’t know how to get out of hookup culture,”
  • In interviews with students, many graduating seniors did not know the first thing about the basic mechanics of a traditional date. “They’re wondering, ‘If you like someone, how would you walk up to them? What would you say? What words would you use?’ ”
  • Traditional courtship — picking up the telephone and asking someone on a date — required courage, strategic planning and a considerable investment of ego (by telephone, rejection stings). Not so with texting, e-mail, Twitter or other forms of “asynchronous communication,” as techies call it. In the context of dating, it removes much of the need for charm; it’s more like dropping a line in the water and hoping for a nibble.
  • Online dating services, which have gained mainstream acceptance, reinforce the hyper-casual approach by greatly expanding the number of potential dates. Faced with a never-ending stream of singles to choose from, many feel a sense of “FOMO” (fear of missing out), so they opt for a speed-dating approach — cycle through lots of suitors quickly.
  • “I’ve seen men put more effort into finding a movie to watch on Netflix Instant than composing a coherent message to ask a woman out,” said Anna Goldfarb, 34, an author and blogger in Moorestown, N.J. A typical, annoying query is the last-minute: “Is anything fun going on tonight?” More annoying still are the men who simply ping, “Hey” or “ ’sup.”
  • The mass-mailer approach necessitates “cost-cutting, going to bars, meeting for coffee the first time,” he added, “because you only want to invest in a mate you’re going to get more out of.”
  • in  a world where “courtship” is quickly being redefined, women must recognize a flirtatious exchange of tweets, or a lingering glance at a company softball game, as legitimate opportunities for romance, too.
  • THERE’S another reason Web-enabled singles are rendering traditional dates obsolete. If the purpose of the first date was to learn about someone’s background, education, politics and cultural tastes, Google and Facebook have taken care of that.
  • Dodgy economic prospects facing millennials also help torpedo the old, formal dating rituals. Faced with a lingering recession, a stagnant job market, and mountains of student debt, many young people — particularly victims of the “mancession” — simply cannot afford to invest a fancy dinner or show in someone they may or may not click with.
  • “Maybe there’s still a sense of a man taking care of a woman, but our ideology is aligning with the reality of our finances,” Ms. Rosin said. As a man, you might “convince yourself that dating is passé, a relic of a paternalistic era, because you can’t afford to take a woman to a restaurant.”
  • “A lot of men in their 20s are reluctant to take the girl to the French restaurant, or buy them jewelry, because those steps tend to lead to ‘eventually, we’re going to get married,’ ” Mr. Edness, 27, said. In a tight economy, where everyone is grinding away to build a career, most men cannot fathom supporting a family until at least 30 or 35, he said.
  • Even in an era of ingrained ambivalence about gender roles, however, some women keep the old dating traditions alive by refusing to accept anything less. Cheryl Yeoh, a tech entrepreneur in San Francisco, said that she has been on many formal dates of late — plays, fancy restaurants. One suitor even presented her with red roses. For her, the old traditions are alive simply because she refuses to put up with anything less. She generally refuses to go on any date that is not set up a week in advance, involving a degree of forethought. “If he really wants you,” Ms. Yeoh, 29, said, “he has to put in some effort.”
sissij

Watch How Casually False Claims are Published: New York Times and Nicholas Lemann Edition - 1 views

  •  wrote my favorite sentence about this whole affair, one which I often quoted in my speeches to great audience laughter: “there are only three possible explanations for the Snowden heist: 1) It was a Russian espionage operation; 2) It was a Chinese espionage operation; or 3) It was a joint Sino-Russian operation.”
  • demanding that they only publish those which expose information necessary to inform the public debate: precisely because he did not want to destroy NSA programs he believes are justifiable.
  • As is true of most leaks – from the routine to the spectacular – those publishing decisions rested solely in the hands of the media outlets and their teams of reporters, editors and lawyers.
  • ...6 more annotations...
  • There have of course been some stories where my calculation of what is not public interest differs from that of reporters, but it is for this precise reason that publication decisions were entrusted to journalists and their editors.
  • it is so often the case that the most influential media outlets publish factually false statements using the most authoritative tones.
  • Ironically, the most controversial Snowden stories – the type his critics cite as the ones that should not have been published because they exposed sensitive national security secrets – were often the ones the NYT itself decided to publish, such as its very controversial exposé on how NSA spied on China’s Huawei.
  • Snowden didn’t decide what stayed secret. The press did.
  • journalist-driven process that determined which documents got published
  • But Snowden never said anything like that.
  •  
    The reporting on Snowden shows that how bad our new system can be. Although it is arguable that this article can be false as well because we can never know the exact truth except the Snowden himself. Our flaws in logic and perception makes us very vulnerable to bad news. There was time in social media called the "Yellow News". During that time, the news publications weren't taking their responsibility as a guide to the general population. We surely need better news and prevent the era that we publish our news based on its "hotness" instead of accuracy. --Sissi (1/12/2017)
sissij

All the Ways Your Wi-Fi Router Can Spy on You - The Atlantic - 0 views

  • But it can also be used to monitor humans—and in surprisingly detailed ways.
  • y analyzing the exact ways that a Wi-Fi signal is altered when a human moves through it, researchers can “see” what someone writes with their finger in the air, identify a particular person by the way that they walk, and even read a person’s lips with startling accuracy—in some cases even if a router isn’t in the same room as the person performing the actions.
  • Many researchers presented their Wi-Fi sensing technology as a way to preserve privacy while still capturing important data.
  • ...2 more annotations...
  • Ali said the system only works in controlled environments, and with rigorous training. “So, it is not a big privacy concern for now, no worries there,” wrote Ali, a Ph.D. student at Michigan State University, in an email.
  • Routers could soon keep kids and older adults safe, log daily activities, or make a smart home run more smoothly—but, if invaded by a malicious hacker, they could also be turned into incredibly sophisticated hubs for monitoring and surveillance.
  •  
    Everything has pros and cons. Gain always comes with loss. The development of new technology always comes with concerns. It reminded me of the scientific findings in quantum that leads to the invention of the atomic bombs. I think this wifi sensor technology can make our life much more convenient. Science enables us to see the world differently. --Sissi (1/25/2017)
Javier E

Ex-Security Chief Questions Israel's Handling of Iran - NYTimes.com - 1 views

  • The recently retired chief of Israel’s internal security agency said Friday night that he had “no faith” in the ability of the current leadership to handle the Iranian nuclear threat
  • “I don’t believe in a leadership that makes decisions based on messianic feelings,” said Yuval Diskin, who stepped down last May after six years running the Shin Bet, Israel’s version of the F.B.I.
  • “I have observed them from up close,” Mr. Diskin said. “I fear very much that these are not the people I’d want at the wheel.” Echoing Meir Dagan, the former head of the Mossad, Israel’s spy agency, Mr. Diskin also said that the government was “misleading the public” about the likely effectiveness of an aerial strike on Iran’s nuclear facilities.
  • ...4 more annotations...
  • “A lot of experts have long been saying that one of the results of an Israeli attack on Iran could be a dramatic acceleration of the Iranian nuclear program,” Mr. Diskin said at a community forum in Kfar Saba, a central Israeli city of 80,000. “What the Iranians prefer to do today slowly and quietly, they would have the legitimacy to do quickly and in a much shorter time.”
  • Shin Bet does not deal with foreign affairs, and Mr. Diskin was careful to say that he was not saying that attacking Iran “is not a legitimate decision,” but instead he was questioning the leaders’ motives and abilities. “I am just very afraid that they are not the people who I truly would want to be holding the wheel when we set out on an endeavor of that sort,
  • Mr. Diskin’s comments were significant because he left the government in good stead with Mr. Netanyahu — unlike Mr. Dagan, who was forced out — and because he was widely respected “for being professional and honest and completely disconnected from politics.”
  • Mr. Diskin did not limit his critique to Iran. He said Israel had in recent years become “more and more racist,” and, invoking the 1995 assassination of Yitzhak Rabin, said there are many extremist Jews today who “would be willing to take up arms against their Jewish brothers.”
Javier E

When No One Is Just a Face in the Crowd - NYTimes.com - 0 views

  • Facial recognition technology, already employed by some retail stores to spot and thwart shoplifters, may soon be used to identify and track the freest spenders in the aisles.
  • And companies like FaceFirst, in Camarillo, Calif., hope to soon complement their shoplifter-identification services with parallel programs to help retailers recognize customers eligible for special treatmen
  • . “Instantly, when a person in your FaceFirst database steps into one of your stores, you are sent an email, text or SMS alert that includes their picture and all biographical information of the known individual so you can take immediate and appropriate action.”
  • ...3 more annotations...
  • Because facial recognition can be used covertly to identify and track people by name at a distance, some civil liberties experts call it unequivocally intrusive. In view of intelligence documents made public by Edward J. Snowden, they also warn that once companies get access to such data, the government could, too. “This is you as an individual being monitored over time and your movements and habits being recorded,”
  • facial recognition may soon let companies link a person’s online persona with his or her actual offline self at a specific public location. That could seriously threaten our ability to remain anonymous in public.
  • industry and consumer advocates will have to contend with nascent facial-recognition apps like NameTag; it is designed to allow a user to scan photographs of strangers, then see information about them — like their occupations or social-network profiles.
Javier E

WhatsApp urges users to update app after discovering spyware vulnerability | Technology... - 0 views

  • WhatsApp is encouraging users to update to the latest version of the app after discovering a vulnerability that allowed spyware to be injected into a user’s phone through the app’s phone call function.
  • The spyware was developed by the Israeli cyber intelligence company NSO Group, according to the Financial Times,
  • Attackers could transmit the malicious code to a target’s device by calling the user and infecting the call whether or not the recipient answered the call.
  • ...3 more annotations...
  • The spyware’s capabilities are near absolute. Once installed on a phone, the software can extract all of the data that’s already on the device (text messages, contacts, GPS location, email, browser history, etc) in addition to creating new data by using the phone’s microphone and camera to record the user’s surroundings and ambient sounds, according to a 2016 report by the New York Times.
  • NSO limits sales of its spyware, Pegasus, to state intelligence agencies
  • þffWhatsApp has about 1.5bn users around the world. The messaging app uses end-to-end encryption, making it popular and secure for activists and dissidents. The Pegasus spyware does not affect or involve the app’s encryption.
Javier E

Opinion | The Apps on My Phone Are Stalking Me - The New York Times - 0 views

  • There is much about the future that keeps me up at night — A.I. weaponry, undetectable viral deepfakes
  • but in the last few years, one technological threat has blipped my fear radar much faster than others.That fear? Ubiquitous surveillance.
  • I am no longer sure that human civilization can undo or evade living under constant, extravagantly detailed physical and even psychic surveillance
  • ...24 more annotations...
  • as a species, we are not doing nearly enough to avoid always being watched or otherwise digitally recorded.
  • our location, your purchases, video and audio from within your home and office, your online searches and every digital wandering, biometric tracking of your face and other body parts, your heart rate and other vital signs, your every communication, recording, and perhaps your deepest thoughts or idlest dreams
  • in the future, if not already, much of this data and more will be collected and analyzed by some combination of governments and corporations, among them a handful of megacompanies whose powers nearly match those of governments
  • Over the last year, as part of Times Opinion’s Privacy Project, I’ve participated in experiments in which my devices were closely monitored in order to determine the kind of data that was being collected about me.
  • I’ve realized how blind we are to the kinds of insights tech companies are gaining about us through our gadgets. Our blindness not only keeps us glued to privacy-invading tech
  • it also means that we’ve failed to create a political culture that is in any way up to the task of limiting surveillance.
  • few of our cultural or political institutions are even much trying to tamp down the surveillance state.
  • Yet the United States and other supposedly liberty-loving Western democracies have not ruled out such a future
  • like Barack Obama before him, Trump and the Justice Department are pushing Apple to create a backdoor into the data on encrypted iPhones — they want the untrustworthy F.B.I. and any local cop to be able to see everything inside anyone’s phone.
  • the fact that both Obama and Trump agreed on the need for breaking iPhone encryption suggests how thoroughly political leaders across a wide spectrum have neglected privacy as a fundamental value worthy of protection.
  • Americans are sleepwalking into a future nearly as frightening as the one the Chinese are constructing. I choose the word “sleepwalking” deliberately, because when it comes to digital privacy, a lot of us prefer the comfortable bliss of ignorance.
  • Among other revelations: Advertising companies and data brokers are keeping insanely close tabs on smartphones’ location data, tracking users so precisely that their databases could arguably compromise national security or political liberty.
  • Tracking technologies have become cheap and widely available — for less than $100, my colleagues were able to identify people walking by surveillance cameras in Bryant Park in Manhattan.
  • The Clearview AI story suggests another reason to worry that our march into surveillance has become inexorable: Each new privacy-invading technology builds on a previous one, allowing for scary outcomes from new integrations and collections of data that few users might have anticipated.
  • The upshot: As the location-tracking apps followed me, I was able to capture the pings they sent to online servers — essentially recording their spying
  • On the map, you can see the apps are essentially stalking me. They see me drive out one morning to the gas station, then to the produce store, then to Safeway; later on I passed by a music school, stopped at a restaurant, then Whole Foods.
  • But location was only one part of the data the companies had about me; because geographic data is often combined with other personal information — including a mobile advertising ID that can help merge what you see and do online with where you go in the real world — the story these companies can tell about me is actually far more detailed than I can tell about myself.
  • I can longer pretend I’ve got nothing to worry about. Sure, I’m not a criminal — but do I want anyone to learn everything about me?
  • more to the point: Is it wise for us to let any entity learn everything about everyone?
  • The remaining uncertainty about the surveillance state is not whether we will submit to it — only how readily and completely, and how thoroughly it will warp our society.
  • Will we allow the government and corporations unrestricted access to every bit of data we ever generate, or will we decide that some kinds of collections, like the encrypted data on your phone, should be forever off limits, even when a judge has issued a warrant for it?
  • In the future, will there be room for any true secret — will society allow any unrecorded thought or communication to evade detection and commercial analysis?
  • How completely will living under surveillance numb creativity and silence radical thought?
  • Can human agency survive the possibility that some companies will know more about all of us than any of us can ever know about ourselves?
aprossi

Elon Musk is trying to win China back - CNN - 0 views

  • Elon Musk is trying to win China back
  • Elon Musk's Tesla has endured a rough couple of months in China. Now he's working overtime to win Beijing back
  • The Tesla CEO lavished praise on China during an interview with state broadcaster China Central Television (CCTV), where he pledged that the country would become his electric carmaker's "biggest market" in the long run
  • ...6 more annotations...
  • He also lauded China's economic and climate goals — the country is currently the world's top greenhouse emitter, but has promised to drastically reduce the emissions over the next decade or so.
  • The charm offensive may be pivotal to Tesla's future in China. While the company has enjoyed special treatment from Chinese authorities in the past few years, it has faced an onslaught of criticism in recent weeks.
  • Last month, Tesla (TSLA) was summoned by Chinese officials to face questions about the quality of its Shanghai-made cars
  • Musk addressed those spying concerns on Saturday, saying at a Chinese development conference that his company's cars would never be used for such purposes.
  • "These are very aggressive goals. And I think they are great goals. And I wish more countries actually had these goals," Musk said. "I'm very confident that future of China is gonna be great."
  • Musk is one of the most popular American business leaders in China
Javier E

Thieves of experience: On the rise of surveillance capitalism - 1 views

  • Harvard Business School professor emerita Shoshana Zuboff argues in her new book that the Valley’s wealth and power are predicated on an insidious, essentially pathological form of private enterprise—what she calls “surveillance capitalism.” Pioneered by Google, perfected by Facebook, and now spreading throughout the economy, surveillance capitalism uses human life as its raw material. Our everyday experiences, distilled into data, have become a privately-owned business asset used to predict and mold our behavior, whether we’re shopping or socializing, working or voting.
  • By reengineering the economy and society to their own benefit, Google and Facebook are perverting capitalism in a way that undermines personal freedom and corrodes democracy.
  • Under the Fordist model of mass production and consumption that prevailed for much of the twentieth century, industrial capitalism achieved a relatively benign balance among the contending interests of business owners, workers, and consumers. Enlightened executives understood that good pay and decent working conditions would ensure a prosperous middle class eager to buy the goods and services their companies produced. It was the product itself — made by workers, sold by companies, bought by consumers — that tied the interests of capitalism’s participants together. Economic and social equilibrium was negotiated through the product.
  • ...72 more annotations...
  • By removing the tangible product from the center of commerce, surveillance capitalism upsets the equilibrium. Whenever we use free apps and online services, it’s often said, we become the products, our attention harvested and sold to advertisers
  • this truism gets it wrong. Surveillance capitalism’s real products, vaporous but immensely valuable, are predictions about our future behavior — what we’ll look at, where we’ll go, what we’ll buy, what opinions we’ll hold — that internet companies derive from our personal data and sell to businesses, political operatives, and other bidders.
  • Unlike financial derivatives, which they in some ways resemble, these new data derivatives draw their value, parasite-like, from human experience.To the Googles and Facebooks of the world, we are neither the customer nor the product. We are the source of what Silicon Valley technologists call “data exhaust” — the informational byproducts of online activity that become the inputs to prediction algorithms
  • Another 2015 study, appearing in the Journal of Computer-Mediated Communication, showed that when people hear their phone ring but are unable to answer it, their blood pressure spikes, their pulse quickens, and their problem-solving skills decline.
  • The smartphone has become a repository of the self, recording and dispensing the words, sounds and images that define what we think, what we experience and who we are. In a 2015 Gallup survey, more than half of iPhone owners said that they couldn’t imagine life without the device.
  • So what happens to our minds when we allow a single tool such dominion over our perception and cognition?
  • Not only do our phones shape our thoughts in deep and complicated ways, but the effects persist even when we aren’t using the devices. As the brain grows dependent on the technology, the research suggests, the intellect weakens.
  • he has seen mounting evidence that using a smartphone, or even hearing one ring or vibrate, produces a welter of distractions that makes it harder to concentrate on a difficult problem or job. The division of attention impedes reasoning and performance.
  • internet companies operate in what Zuboff terms “extreme structural independence from people.” When databases displace goods as the engine of the economy, our own interests, as consumers but also as citizens, cease to be part of the negotiation. We are no longer one of the forces guiding the market’s invisible hand. We are the objects of surveillance and control.
  • Social skills and relationships seem to suffer as well.
  • In both tests, the subjects whose phones were in view posted the worst scores, while those who left their phones in a different room did the best. The students who kept their phones in their pockets or bags came out in the middle. As the phone’s proximity increased, brainpower decreased.
  • In subsequent interviews, nearly all the participants said that their phones hadn’t been a distraction—that they hadn’t even thought about the devices during the experiment. They remained oblivious even as the phones disrupted their focus and thinking.
  • The researchers recruited 520 undergraduates at UCSD and gave them two standard tests of intellectual acuity. One test gauged “available working-memory capacity,” a measure of how fully a person’s mind can focus on a particular task. The second assessed “fluid intelligence,” a person’s ability to interpret and solve an unfamiliar problem. The only variable in the experiment was the location of the subjects’ smartphones. Some of the students were asked to place their phones in front of them on their desks; others were told to stow their phones in their pockets or handbags; still others were required to leave their phones in a different room.
  • the “integration of smartphones into daily life” appears to cause a “brain drain” that can diminish such vital mental skills as “learning, logical reasoning, abstract thought, problem solving, and creativity.”
  •  Smartphones have become so entangled with our existence that, even when we’re not peering or pawing at them, they tug at our attention, diverting precious cognitive resources. Just suppressing the desire to check our phone, which we do routinely and subconsciously throughout the day, can debilitate our thinking.
  • They found that students who didn’t bring their phones to the classroom scored a full letter-grade higher on a test of the material presented than those who brought their phones. It didn’t matter whether the students who had their phones used them or not: All of them scored equally poorly.
  • A study of nearly a hundred secondary schools in the U.K., published last year in the journal Labour Economics, found that when schools ban smartphones, students’ examination scores go up substantially, with the weakest students benefiting the most.
  • Data, the novelist and critic Cynthia Ozick once wrote, is “memory without history.” Her observation points to the problem with allowing smartphones to commandeer our brains
  • Because smartphones serve as constant reminders of all the friends we could be chatting with electronically, they pull at our minds when we’re talking with people in person, leaving our conversations shallower and less satisfying.
  • In a 2013 study conducted at the University of Essex in England, 142 participants were divided into pairs and asked to converse in private for ten minutes. Half talked with a phone in the room, half without a phone present. The subjects were then given tests of affinity, trust and empathy. “The mere presence of mobile phones,” the researchers reported in the Journal of Social and Personal Relationships, “inhibited the development of interpersonal closeness and trust” and diminished “the extent to which individuals felt empathy and understanding from their partners.”
  • The evidence that our phones can get inside our heads so forcefully is unsettling. It suggests that our thoughts and feelings, far from being sequestered in our skulls, can be skewed by external forces we’re not even aware o
  •  Scientists have long known that the brain is a monitoring system as well as a thinking system. Its attention is drawn toward any object that is new, intriguing or otherwise striking — that has, in the psychological jargon, “salience.”
  • even in the history of captivating media, the smartphone stands out. It is an attention magnet unlike any our minds have had to grapple with before. Because the phone is packed with so many forms of information and so many useful and entertaining functions, it acts as what Dr. Ward calls a “supernormal stimulus,” one that can “hijack” attention whenever it is part of our surroundings — and it is always part of our surroundings.
  • Imagine combining a mailbox, a newspaper, a TV, a radio, a photo album, a public library and a boisterous party attended by everyone you know, and then compressing them all into a single, small, radiant object. That is what a smartphone represents to us. No wonder we can’t take our minds off it.
  • The irony of the smartphone is that the qualities that make it so appealing to us — its constant connection to the net, its multiplicity of apps, its responsiveness, its portability — are the very ones that give it such sway over our minds.
  • Phone makers like Apple and Samsung and app writers like Facebook, Google and Snap design their products to consume as much of our attention as possible during every one of our waking hours
  • Social media apps were designed to exploit “a vulnerability in human psychology,” former Facebook president Sean Parker said in a recent interview. “[We] understood this consciously. And we did it anyway.”
  • A quarter-century ago, when we first started going online, we took it on faith that the web would make us smarter: More information would breed sharper thinking. We now know it’s not that simple.
  • As strange as it might seem, people’s knowledge and understanding may actually dwindle as gadgets grant them easier access to online data stores
  • In a seminal 2011 study published in Science, a team of researchers — led by the Columbia University psychologist Betsy Sparrow and including the late Harvard memory expert Daniel Wegner — had a group of volunteers read forty brief, factual statements (such as “The space shuttle Columbia disintegrated during re-entry over Texas in Feb. 2003”) and then type the statements into a computer. Half the people were told that the machine would save what they typed; half were told that the statements would be erased.
  • Afterward, the researchers asked the subjects to write down as many of the statements as they could remember. Those who believed that the facts had been recorded in the computer demonstrated much weaker recall than those who assumed the facts wouldn’t be stored. Anticipating that information would be readily available in digital form seemed to reduce the mental effort that people made to remember it
  • The researchers dubbed this phenomenon the “Google effect” and noted its broad implications: “Because search engines are continually available to us, we may often be in a state of not feeling we need to encode the information internally. When we need it, we will look it up.”
  • as the pioneering psychologist and philosopher William James said in an 1892 lecture, “the art of remembering is the art of thinking.”
  • Only by encoding information in our biological memory can we weave the rich intellectual associations that form the essence of personal knowledge and give rise to critical and conceptual thinking. No matter how much information swirls around us, the less well-stocked our memory, the less we have to think with.
  • As Dr. Wegner and Dr. Ward explained in a 2013 Scientific American article, when people call up information through their devices, they often end up suffering from delusions of intelligence. They feel as though “their own mental capacities” had generated the information, not their devices. “The advent of the ‘information age’ seems to have created a generation of people who feel they know more than ever before,” the scholars concluded, even though “they may know ever less about the world around them.”
  • That insight sheds light on society’s current gullibility crisis, in which people are all too quick to credit lies and half-truths spread through social media. If your phone has sapped your powers of discernment, you’ll believe anything it tells you.
  • A second experiment conducted by the researchers produced similar results, while also revealing that the more heavily students relied on their phones in their everyday lives, the greater the cognitive penalty they suffered.
  • When we constrict our capacity for reasoning and recall or transfer those skills to a gadget, we sacrifice our ability to turn information into knowledge. We get the data but lose the meaning
  • We need to give our minds more room to think. And that means putting some distance between ourselves and our phones.
  • Google’s once-patient investors grew restive, demanding that the founders figure out a way to make money, preferably lots of it.
  • nder pressure, Page and Brin authorized the launch of an auction system for selling advertisements tied to search queries. The system was designed so that the company would get paid by an advertiser only when a user clicked on an ad. This feature gave Google a huge financial incentive to make accurate predictions about how users would respond to ads and other online content. Even tiny increases in click rates would bring big gains in income. And so the company began deploying its stores of behavioral data not for the benefit of users but to aid advertisers — and to juice its own profits. Surveillance capitalism had arrived.
  • Google’s business now hinged on what Zuboff calls “the extraction imperative.” To improve its predictions, it had to mine as much information as possible from web users. It aggressively expanded its online services to widen the scope of its surveillance.
  • Through Gmail, it secured access to the contents of people’s emails and address books. Through Google Maps, it gained a bead on people’s whereabouts and movements. Through Google Calendar, it learned what people were doing at different moments during the day and whom they were doing it with. Through Google News, it got a readout of people’s interests and political leanings. Through Google Shopping, it opened a window onto people’s wish lists,
  • The company gave all these services away for free to ensure they’d be used by as many people as possible. It knew the money lay in the data.
  • the organization grew insular and secretive. Seeking to keep the true nature of its work from the public, it adopted what its CEO at the time, Eric Schmidt, called a “hiding strategy” — a kind of corporate omerta backed up by stringent nondisclosure agreements.
  • Page and Brin further shielded themselves from outside oversight by establishing a stock structure that guaranteed their power could never be challenged, neither by investors nor by directors.
  • What’s most remarkable about the birth of surveillance capitalism is the speed and audacity with which Google overturned social conventions and norms about data and privacy. Without permission, without compensation, and with little in the way of resistance, the company seized and declared ownership over everyone’s information
  • The companies that followed Google presumed that they too had an unfettered right to collect, parse, and sell personal data in pretty much any way they pleased. In the smart homes being built today, it’s understood that any and all data will be beamed up to corporate clouds.
  • Google conducted its great data heist under the cover of novelty. The web was an exciting frontier — something new in the world — and few people understood or cared about what they were revealing as they searched and surfed. In those innocent days, data was there for the taking, and Google took it
  • Google also benefited from decisions made by lawmakers, regulators, and judges — decisions that granted internet companies free use of a vast taxpayer-funded communication infrastructure, relieved them of legal and ethical responsibility for the information and messages they distributed, and gave them carte blanche to collect and exploit user data.
  • Consider the terms-of-service agreements that govern the division of rights and the delegation of ownership online. Non-negotiable, subject to emendation and extension at the company’s whim, and requiring only a casual click to bind the user, TOS agreements are parodies of contracts, yet they have been granted legal legitimacy by the court
  • Law professors, writes Zuboff, “call these ‘contracts of adhesion’ because they impose take-it-or-leave-it conditions on users that stick to them whether they like it or not.” Fundamentally undemocratic, the ubiquitous agreements helped Google and other firms commandeer personal data as if by fiat.
  • n the choices we make as consumers and private citizens, we have always traded some of our autonomy to gain other rewards. Many people, it seems clear, experience surveillance capitalism less as a prison, where their agency is restricted in a noxious way, than as an all-inclusive resort, where their agency is restricted in a pleasing way
  • Zuboff makes a convincing case that this is a short-sighted and dangerous view — that the bargain we’ve struck with the internet giants is a Faustian one
  • but her case would have been stronger still had she more fully addressed the benefits side of the ledger.
  • there’s a piece missing. While Zuboff’s assessment of the costs that people incur under surveillance capitalism is exhaustive, she largely ignores the benefits people receive in return — convenience, customization, savings, entertainment, social connection, and so on
  • hat the industries of the future will seek to manufacture is the self.
  • Behavior modification is the thread that ties today’s search engines, social networks, and smartphone trackers to tomorrow’s facial-recognition systems, emotion-detection sensors, and artificial-intelligence bots.
  • All of Facebook’s information wrangling and algorithmic fine-tuning, she writes, “is aimed at solving one problem: how and when to intervene in the state of play that is your daily life in order to modify your behavior and thus sharply increase the predictability of your actions now, soon, and later.”
  • “The goal of everything we do is to change people’s actual behavior at scale,” a top Silicon Valley data scientist told her in an interview. “We can test how actionable our cues are for them and how profitable certain behaviors are for us.”
  • This goal, she suggests, is not limited to Facebook. It is coming to guide much of the economy, as financial and social power shifts to the surveillance capitalists
  • Combining rich information on individuals’ behavioral triggers with the ability to deliver precisely tailored and timed messages turns out to be a recipe for behavior modification on an unprecedented scale.
  • it was Facebook, with its incredibly detailed data on people’s social lives, that grasped digital media’s full potential for behavior modification. By using what it called its “social graph” to map the intentions, desires, and interactions of literally billions of individuals, it saw that it could turn its network into a worldwide Skinner box, employing psychological triggers and rewards to program not only what people see but how they react.
  • spying on the populace is not the end game. The real prize lies in figuring out ways to use the data to shape how people think and act. “The best way to predict the future is to invent it,” the computer scientist Alan Kay once observed. And the best way to predict behavior is to script it.
  • competition for personal data intensified. It was no longer enough to monitor people online; making better predictions required that surveillance be extended into homes, stores, schools, workplaces, and the public squares of cities and towns. Much of the recent innovation in the tech industry has entailed the creation of products and services designed to vacuum up data from every corner of our lives
  • “The typical complaint is that privacy is eroded, but that is misleading,” Zuboff writes. “In the larger societal pattern, privacy is not eroded but redistributed . . . . Instead of people having the rights to decide how and what they will disclose, these rights are concentrated within the domain of surveillance capitalism.” The transfer of decision rights is also a transfer of autonomy and agency, from the citizen to the corporation.
  • What we lose under this regime is something more fundamental than privacy. It’s the right to make our own decisions about privacy — to draw our own lines between those aspects of our lives we are comfortable sharing and those we are not
  • Other possible ways of organizing online markets, such as through paid subscriptions for apps and services, never even got a chance to be tested.
  • Online surveillance came to be viewed as normal and even necessary by politicians, government bureaucrats, and the general public
  • Google and other Silicon Valley companies benefited directly from the government’s new stress on digital surveillance. They earned millions through contracts to share their data collection and analysis techniques with the National Security Agenc
  • As much as the dot-com crash, the horrors of 9/11 set the stage for the rise of surveillance capitalism. Zuboff notes that, in 2000, members of the Federal Trade Commission, frustrated by internet companies’ lack of progress in adopting privacy protections, began formulating legislation to secure people’s control over their online information and severely restrict the companies’ ability to collect and store it. It seemed obvious to the regulators that ownership of personal data should by default lie in the hands of private citizens, not corporations.
  • The 9/11 attacks changed the calculus. The centralized collection and analysis of online data, on a vast scale, came to be seen as essential to national security. “The privacy provisions debated just months earlier vanished from the conversation more or less overnight,”
Javier E

Opinion | Why Fox News Slimed a Purple Heart Recipient - The New York Times - 0 views

  • In anticipation of Lt. Col. Alexander Vindman’s recent public testimony in the House’s impeachment inquiry, the Fox News host Laura Ingraham and a guest concocted an insulting fantasy on her show: the idea that Colonel Vindman might be a Ukrainian spy.
  • as a former Fox News opinion talk-show guest host and contributor for 14 years, it didn’t shock me.
  • First, we must talk about narratives. In my time at Fox News, narratives were weapons of mass emotional manipulation, what the Nobel laureate Robert J. Shiller defines in “Narrative Economics” as “contagious stories” — as he put it in a paper of the same name, “a simple story or easily expressed explanation of events that many people want to bring up in conversation or on news or social media because it can be used to stimulate the concerns or emotions of others, and/or because it appears to advance self-interest.”
  • ...13 more annotations...
  • we find information or misinformation “22 times more memorable in narrative form.”
  • It’s a contagion, and thanks to social media, or “participatory propaganda,” highly viral
  • The Fox News counternarrative model is as simple as it is cunning. The segment producer’s job is to get the answers to two questions: What is the most emotionally engaging story we have right now
  • The next question is, how do we construct a counternarrative that includes as many existing other believable meta-narratives as possible
  • The hunt for the killer narrative starts with the “Morning Memo” to the producers. It shares the interpretation from the vice president of news of the highest-trending articles on Foxnews.com and Drudge
  • The next move is to get a few Fox News contributor regulars — elected officials and paid pundits — not just to deliver the new counternarrative but also to wrap it inside an existing or new meta-narrative.
  • What do the ratings tell the producers are the most engaging meta-narratives for the over 80 million Fox News viewers on all digital platforms?
  • Conspiracy theories.
  • Why do people love conspiracy stories? It’s human behavior
  • The emotional payoff from being on the inside of a conspiracy is a self-esteem jolt that makes you feel smarter than your tribal foe and keeps your eyeballs glued to screens
  • Every successful Fox News segment producer has the conspiracy script down cold. These segments work best when the “proof” of a conspiracy against a tribal leader — in this case the Republican president — makes the viewer feel under attack as well
  • it helps when a proposed conservative thought leader mixes in the meta-narrative to the effect that “we are victimized again by the condescending Beltway elites.”
  • Believing in conspiracy theories is a psychological construct for people to take back some semblance of control in their lives. It inflates their sense of importance. It makes them feel they have access to “special knowledge” that the rest of the world is “too blind,” “too dumb” or “too corrupt” to understand.
knudsenlu

You Are Already Living Inside a Computer - The Atlantic - 1 views

  • Nobody really needs smartphone-operated bike locks or propane tanks. And they certainly don’t need gadgets that are less trustworthy than the “dumb” ones they replace, a sin many smart devices commit. But people do seem to want them—and in increasing numbers.
  • Why? One answer is that consumers buy what is on offer, and manufacturers are eager to turn their dumb devices smart. Doing so allows them more revenue, more control, and more opportunity for planned obsolescence. It also creates a secondary market for data collected by means of these devices. Roomba, for example, hopes to deduce floor plans from the movement of its robotic home vacuums so that it can sell them as business intelligence.
  • And the more people love using computers for everything, the more life feels incomplete unless it takes place inside them.
  • ...15 more annotations...
  • Computers already are predominant, human life already takes place mostly within them, and people are satisfied with the results.
  • These devices pose numerous problems. Cost is one. Like a cheap propane gauge, a traditional bike lock is a commodity. It can be had for $10 to $15, a tenth of the price of Nokē’s connected version. Security and privacy are others. The CIA was rumored to have a back door into Samsung TVs for spying. Disturbed people have been caught speaking to children over hacked baby monitors. A botnet commandeered thousands of poorly secured internet-of-things devices to launch a massive distributed denial-of-service attack against the domain-name syste
  • Reliability plagues internet-connected gadgets, too. When the network is down, or the app’s service isn’t reachable, or some other software behavior gets in the way, the products often cease to function properly—or at all.
  • Turing guessed that machines would become most compelling when they became convincing companions, which is essentially what today’s smartphones (and smart toasters) do.
  • But Turing never claimed that machines could think, let alone that they might equal the human mind. Rather, he surmised that machines might be able to exhibit convincing behavior.
  • People choose computers as intermediaries for the sensual delight of using computers
  • ne such affection is the pleasure of connectivity. You don’t want to be offline. Why would you want your toaster or doorbell to suffer the same fate? Today, computational absorption is an ideal. The ultimate dream is to be online all the time, or at least connected to a computational machine of some kind.
  • Doorbells and cars and taxis hardly vanish in the process. Instead, they just get moved inside of computers.
  • “Being a computer” means something different today than in 1950, when Turing proposed the imitation game. Contra the technical prerequisites of artificial intelligence, acting like a computer often involves little more than moving bits of data around, or acting as a controller or actuator. Grill as computer, bike lock as computer, television as computer. An intermediary
  • Or consider doorbells once more. Forget Ring, the doorbell has already retired in favor of the computer. When my kids’ friends visit, they just text a request to come open the door. The doorbell has become computerized without even being connected to an app or to the internet. Call it “disruption” if you must, but doorbells and cars and taxis hardly vanish in the process. Instead, they just get moved inside of computers, where they can produce new affections.
  • The present status of intelligent machines is more powerful than any future robot apocalypse.
  • Why would anyone ever choose a solution that doesn’t involve computers, when computers are available? Propane tanks and bike locks are still edge cases, but ordinary digital services work similarly: The services people seek out are the ones that allow them to use computers to do things—from finding information to hailing a cab to ordering takeout. This is a feat of aesthetics as much as it is one of business. People choose computers as intermediaries for the sensual delight of using computers, not just as practical, efficient means for solving problems.
  • This is not where anyone thought computing would end up. Early dystopic scenarios cautioned that the computer could become a bureaucrat or a fascist, reducing human behavior to the predetermined capacities of a dumb machine. Or else, that obsessive computer use would be deadening, sucking humans into narcotic detachment.Those fears persist to some extent, partly because they have been somewhat realized. But they have also been inverted. Being away from them now feels deadening, rather than being attached to them without end. And thus, the actions computers take become self-referential: to turn more and more things into computers to prolong that connection.
  • But the real present status of intelligent machines is both humdrum and more powerful than any future robot apocalypse. Turing is often called the father of AI, but he only implied that machines might become compelling enough to inspire interaction. That hardly counts as intelligence, artificial or real. It’s also far easier to achieve. Computers already have persuaded people to move their lives inside of them. The machines didn’t need to make people immortal, or promise to serve their every whim, or to threaten to destroy them absent assent. They just needed to become a sufficient part of everything human beings do such that they can’t—or won’t—imagine doing those things without them.
  • . The real threat of computers isn’t that they might overtake and destroy humanity with their future power and intelligence. It’s that they might remain just as ordinary and impotent as they are today, and yet overtake us anyway.
runlai_jiang

Trump-North Korea meeting: US 'knows the risks', says spy chief - BBC News - 0 views

  • CIA director Mike Pompeo has defended Donald Trump's decision to meet North Korean leader Kim Jong-un, saying the president understands the risks.
  • No sitting US president has ever met a North Korean leader. Mr Trump reportedly accepted the offer to do so on the spot when it was relayed by South Korean envoys on Thursday, taking his own administration by surprise.
  • Speaking to the same channel, Democratic Senator Elizabeth Warren raised fears that what she called the "decimated" US State Department lacked officials familiar with Pyongyang's methods.
  • ...1 more annotation...
  • Trump: North Korea 'wants peace'At a political rally in Pennsylvania on Saturday, Mr Trump told supporters he believed North Korea wanted to "make peace". But he said he might leave the talks quickly if it didn't look like progress for nuclear disarmament could be made.
runlai_jiang

How Cellphone Chips Became a National-Security Concern - WSJ - 0 views

  • The U.S. made clear this week that containing China’s growing clout in wireless technology is now a national-security priority. Telecommunications-industry leaders say such fears are justified—but question whether the government’s extraordinary intervention in a corporate takeover battle that doesn’t even involve a Chinese company will make a difference.
  • Those worries are rooted in how modern communication works. Cellular-tower radios, internet routers and related electronics use increasingly complex hardware and software, with millions of lines of code
  • Hackers can potentially control the equipment through intentional or inadvertent security flaws, such as the recently disclosed “Meltdown” and “Spectre” flaws that could have affected most of the world’s computer chips.
  • ...4 more annotations...
  • Qualcomm is one of the few American leaders in developing standards and patents for 5G, the next generation of wireless technology that should be fast enough to enable self-driving cars and other innovations. The CFIUS letter said a weakened Qualcomm could strengthen Chinese rivals, specifically Huawei Technologies Co., the world’s top cellular-equipment maker and a leading smartphone brand.
  • Washington has taken unusual steps to hinder Huawei’s business in the U.S., concerned that Beijing could force the company to exploit its understanding of the equipment to spy or disable telecom networks.
  • Many European wireless carriers, including British-based Vodafone Group PLC, praise Huawei’s equipment, saying it is often cheaper and more advanced that those of its competitors. That is another big worry for Washington.
  • board and senior management team are American. “It’s barely a foreign company now, but politics and logic aren’t often friends,” said Stacy Rasgon, a Bernstein Research analyst. “I’m just not convinced that Qualcomm’s going to slash and burn the 5G roadmap and leave it open to Huawei” if Broadcom buys it.
1 - 20 of 22 Next ›
Showing 20 items per page