e-Xploration
32.0K views | +1 today
Follow
e-Xploration
antropologiaNet, dataviz, collective intelligence, algorithms, social learning, social change, digital humanities
Curated by luiy
Your new post is loading...
Your new post is loading...
Scooped by luiy
Scoop.it!

Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election

Top-Secret NSA Report Details Russian Hacking Effort Days Before 2016 Election | e-Xploration | Scoop.it
The spear-phishing email contained a link directing the employees to a malicious, faux-Google website that would request their login credentials and then hand them over to the hackers. The NSA identified seven “potential victims” at the company. While malicious emails targeting three of the potential victims were rejected by an email server, at least one of the employee accounts was likely compromised, the agency concluded. The NSA notes in its report that it is “unknown whether the aforementioned spear-phishing deployment successfully compromised all the intended victims, and what potential data from the victim could have been exfiltrated.”

VR Systems declined to respond to a request for comment on the specific hacking operation outlined in the NSA document. Chief Operating Officer Ben Martin replied by email to The Intercept’s request for comment with the following statement:

Phishing and spear-phishing are not uncommon in our industry. We regularly participate in cyber alliances with state officials and members of the law enforcement community in an effort to address these types of threats. We have policies and procedures in effect to protect our customers and our company.
more...
No comment yet.
Scooped by luiy
Scoop.it!

Social Media and the ‘Spiral of Silence’ | #surveillance #privacy

Social Media and the ‘Spiral of Silence’ | #surveillance #privacy | e-Xploration | Scoop.it
Facebook, Twitter, and other platforms did not provide new outlets for the discussion of the Snowden-NSA revelations. People who thought their social media friends disagreed with them were less likely to discuss the issues in person and online.
luiy's insight:

An informed citizenry depends on people’s exposure to information on important political issues and on their willingness to discuss these issues with those around them. The rise of social media, such as Facebook and Twitter, has introduced new spaces where political discussion and debate can take place. This report explores the degree to which social media affects a long-established human attribute—that those who think they hold minority opinions often self-censor, failing to speak out for fear of ostracism or ridicule. It is called the “spiral of silence.”

more...
No comment yet.
Scooped by luiy
Scoop.it!

Here's how we take back the Internet | #Snowden #privacy #surveillance

Here's how we take back the Internet | #Snowden #privacy #surveillance | e-Xploration | Scoop.it

Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but requires a fundamental rethink of the role of the internet in our lives — and the laws that protect it. "Your rights matter,” he says, "because you never know when you're going to need them." Chris Anderson interviews, with special guest Tim Berners-Lee.

luiy's insight:

Why you should listen

 

Edward Snowden was just about to turn 28 when his face was suddenly splashed across every major newspaper in the US. In the summer of 2013 The Guardianpublished a series of leaked documents about the American National Security Agency (NSA), starting with an article about a secret court order demanding American phone records from Verizon, followed by an article on the NSA's top-secret Prism program, said to be accessing user data from Google, Apple and Facebook.

 

It wasn't long before Snowden came forward as the source, revealing that he had carefully planned the leak, copying documents when he was working as a contractor for the NSA. "I understand that I will be made to suffer for my actions," he said at the time, but "I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant." Snowden's actions have led to a global debate on the relationship between national security and online privacy. His leaks continue to have a lasting impact on the American public's view of the government, and has encouraged media scrutiny on the NSA.

 

Snowden had coordinated the leak with journalist Glenn Greenwald and filmmaker Laura Poitras from Hong Kong; after he revealed his identity, he fled and ended up in Moscow. Under charges of espionage by the American government, Snowden remains in Russia in temporary asylum.

more...
No comment yet.
Rescooped by luiy from The New Global Open Public Sphere
Scoop.it!

The Age of 'Infopolitics' | #privacy #dataAwareness #infopersons

The Age of 'Infopolitics' | #privacy #dataAwareness #infopersons | e-Xploration | Scoop.it
As digital persons, we’re vulnerable to new, digital injustices.

Via Pierre Levy
luiy's insight:

We need a concept of infopolitics precisely because we have become infopersons. What should we do about our Internet and phone patterns’ being fastidiously harvested and stored away in remote databanks where they await inspection by future algorithms developed at the National Security Agency, Facebook, credit reporting firms like Experian and other new institutions of information and control that will come into existence in future decades? What bits of the informational you will fall under scrutiny? The political you? The sexual you? What next-generation McCarthyisms await your informational self? And will those excesses of oversight be found in some Senate subcommittee against which we democratic citizens might hope to rise up in revolt — or will they lurk among algorithmic automatons that silently seal our fates in digital filing systems?


----------------------------


Infopolitics, infopersons, algorithms, NSA, informational self, data awareness.

 

more...
Mlik Sahib's curator insight, January 31, 2014 12:31 AM

"As soon as we learn to see ourselves and our politics as informational, we can begin to see the importance of surveillance reforms of the sort proposed by Senator Ron Wyden, Democrat  of Oregon, as well as the wisdom implicit in the transgressions of “hacktivists” whose ethics call for anonymity and untraceability. Despite their decidedly different political sensibilities, what links together the likes of Senator Wyden and the international hacker network known as Anonymous is that they respect the severity of what is at stake in our information. They understand that information is a site for the call of justice today, alongside more quintessential battlefields like liberty of thought and equality of opportunity. Willingness to see ourselves as informational persons subject to informational powers could help us bring into view what will be required to protect the many individual rights and social ties now inhering in all those bits and bytes."

Scooped by luiy
Scoop.it!

Timeline of #NSA Domestic Spying 1952-2014 | #surveillance #privacy

Timeline of #NSA Domestic Spying 1952-2014 | #surveillance #privacy | e-Xploration | Scoop.it
All of the evidence found in this timeline can also be found in the Summary of Evidence we submitted to the court in Jewel v. National Security Agency (NSA).
luiy's insight:

The timeline also includes documents leaked by the Guardian in June 2013 that confirmed the domestic spying by the NSA. The documents range from a Top Secret Court Order by the secret court overseeing the spying, the Foreign Intelligence Surveillance Court (FISA Court), to a working draft of an NSA Inspector General report detailing the history of the program. The "NSA Inspectors General Reports" tab consists of one of three documents: a July 10, 2009 report written by Inspectors General of the Department of Justice (DOJ), NSA, Department of Defense (DOD), Central Intelligence Agency (CIA), and the Office of the Director of National Intelligence; an internal working draft NSA Inspector General report leaked by the Guardian on June 27, 2013; and, an "End to End Review" of the Section 215 program conducted by the NSA for the FISA Court. For a short description of the people involved in the spying you can look at our Profiles page, which includes many of the key characters from the NSA Domestic Spying program.

more...
No comment yet.
Rescooped by luiy from Science-fiction & innovation
Scoop.it!

Big Brother EXISTE... et tout le monde se fout de la menace : les raisons de notre étrange anesthésie collective

Big Brother EXISTE... et tout le monde se fout de la menace : les raisons de notre étrange anesthésie collective | e-Xploration | Scoop.it

Alors que la construction par la NSA d'un "super-ordinateur" capable de briser n'importe quel code vient d'être révélée, les opinions publiques semblent de moins en moins se préoccuper de la protection de leur vie privée. Une indifférence qui n'est pas sans rappeler celle des masses apathiques décrites dans "1984" par Georges Orwell. ...

 

 


Via Alcofribas, association concert urbain, Lockall
luiy's insight:

Thiébaut Devergranne : Le principal problème en la matière est que des systèmes comme PRISM ne portent pas directement et physiquement atteinte aux personnes qui en sont victimes. Lorsque les services de renseignements connectent de façon massive, quasi-totale, nos données personnelles (sites fréquentés, communications…) nous ne le voyons pas, ne le sentons pas, ni ne l'entendons. Une personne pourra éventuellement s'en apercevoir en bout de course, en se voyant notamment refuser sans raisons particulières un poste important (haute fonction publique, nucléaire, sécurité…). En dehors de ce type d'événement, le phénomène reste toutefois entièrement imperceptible.


Read more at http://www.atlantico.fr/decryptage/big-brother-existe%E2%80%A6-et-tout-monde-se-fout-menace-raisons-notre-etrange-anesthesie-collective-michel-nesterenko-thiebaut-devergra-943598.html#dEdRDeX4Oj6ClajJ.99

more...
No comment yet.
Scooped by luiy
Scoop.it!

La NSA a "continuellement" enfreint la loi pour collecter des données I #privacy #NSA #DataAwareness

La NSA a "continuellement" enfreint la loi pour collecter des données I #privacy #NSA #DataAwareness | e-Xploration | Scoop.it
D'anciens juges de la cour censée surveiller l'agence de renseignement américaine ont dénoncé à plusieurs reprises des collectes illégales de données.
luiy's insight:

DONNÉES COLLECTÉES ILLÉGALEMENT, EXPLOITÉES LÉGALEMENT


Dans son ordonnance, Colleen Kollar-Kotelly s'interroge notamment sur deux techniques, qui permettent d'enregistrer les informations entrantes et sortantes des communications téléphoniques (et potentiellement internet) : le "pen register"et les "trap & trace devices". Des méthodes de collecte jamais clairement définies par la loi, qui englobent selon elle "un spectre exceptionnellement large de collecte" de données.


Le juge John Bates, qui lui a succédé en 2006, abonde dans son sens : "La NSA a continuellement outrepassé les limites de l'acquisition légale" d'informations."Presque chaque" enregistrement réalisé par le programme "comprenait des données dont la collecte n'était pas autorisée", écrit-il. Or, le quotidien britannique rapportait en août qu'un vide juridique permettait à l'agence américaine d'exploiterdes informations collectées illégalement (en dehors de tout mandat), mais "par inadvertance". Quelques jours plus tard, l'actuel président de la FISC, Reggie B. Walton, reconnaissait dans le Washington Post manquer de moyens pour menersa mission de surveillance de la NSA.

more...
No comment yet.
Rescooped by luiy from Cloud Central
Scoop.it!

#privacy : The BIG TECH companys and the privacy resposability | #dataawareness

#privacy : The BIG TECH companys and the privacy resposability | #dataawareness | e-Xploration | Scoop.it
The Electronic Freedom Foundation calls out Sonic.net for actively protecting personal data from the government, and Verizon, AT&T and Apple for, well, not.

Via Peter Azzopardi
luiy's insight:

Twitter and Sonic.net took top scores in a new Electronic Freedom Foundation (EFF) report rating tech companies' stewardship of users' personal data and their willingness to hand over data to the government. The two companies got high marks on each of the EFF's six privacy best practices categories, which include things like "require a warrant for content," "tell users about government data demands," and "publish transparency reports."


On the other end of the scale were Verizon, AT&T and Apple. Verizon failed to get a star in even one category, while AT&T and Apple earned just one apiece. 

more...
Peter Azzopardi's curator insight, June 9, 2013 10:37 AM

After we have learnt that the National Security Agency's PRISM  programme tapped directly into the servers of most of the web's largest companies, monitoring user's search history, the content of emails, file transfers, and live chats this infographic importance takes on a new meaning.

 

Shame on Verizon, AT&T and Apple!

Scooped by luiy
Scoop.it!

Interactive timeline of the PRISM scandal - Virostatiq

Interactive timeline of the PRISM scandal - Virostatiq | e-Xploration | Scoop.it

Constructing the visualization.


The visualization was constructed entirely in HTML5 and JavaScript. Four major libraries were used: 


-  Sigma.js for displaying the networks. The latest version does not contain some key functionality for dynamically and additively loading and unloading of subgraphs into the main graph, so the source code was updated with required methods. Separate article on that topic is upcoming. 


- Three.js for rotating Earth and all geographically-related work. Simile Timeline for the timeline.


- Flot for the bar graph.

more...
No comment yet.
Scooped by luiy
Scoop.it!

#NSA files decoded: Edward Snowden's #surveillance revelations explained | #ddj

#NSA files decoded: Edward Snowden's #surveillance revelations explained | #ddj | e-Xploration | Scoop.it
In the last five months, the NSA's surveillance practices have been revealed to be a massive international operation, staggering in scope. But how do all of the NSA's programmes fit together – and what does it mean for you?
luiy's insight:

Faced with growing public and political concern over the quantities of data it is collecting, the NSA has sought to reassure people, arguing that it collected only a tiny proportion of the world’s internet traffic, roughly equivalent to a “dime on a basketball court”. But in reality, that is still a huge amount of data. The Library of Congress, one of the biggest libraries in the world, gathers 5 terabytes a month. The NSA sucks up much, much more.

more...
No comment yet.
Scooped by luiy
Scoop.it!

This Beautiful Map of the Internet Is Insanely Detailed | #NSA #surveillance #privacy

This Beautiful Map of the Internet Is Insanely Detailed | #NSA #surveillance #privacy | e-Xploration | Scoop.it
Visualizing the internet is almost as difficult as ignoring trolls, but that didn't stop Jay Jason Simons from having a damn good try. The result is this beautiful and insanely detailed map.
luiy's insight:

This poster includes one full map of the internet, 4 mini maps showcasing NSA surveillance, most used social networks, most used internet browser, and worldwide internet penetration, list of Alexa Top 500 websites, a quick timeline of the Internet History, top software companies and much more!

more...
No comment yet.
Scooped by luiy
Scoop.it!

Google acquiert DeepMind, start-up en intelligence artificielle | #algorithms #NSA

Google acquiert DeepMind, start-up en intelligence artificielle | #algorithms #NSA | e-Xploration | Scoop.it
Google continue de surfer sur la vague de la robotique et de l’intelligence artificielle. En rachetant la startup britannique DeepMind, spécialisée dans l’AI, le géant du web dévoile ses intentions un peu plus.
luiy's insight:

Google vient d’acquérir DeepMind Technologies pour environ 400.000 dollars. DeepMind se définit comme une startup combinant les meilleures méthodes d’apprentissage automatique et des neurosciences des systèmes pour construire des algorithmes utilisables dans la vie de tous les jours. DeepMind commercialise ses applications pour des simulations e-commerce et les jeux vidéos.

 

-------------------------------------------------------

 

Plus aucun doute : Google axe sa stratégie autour de l’intelligence artificielle, indispensable notamment pour ses applications de traduction ainsi que ses solutions de reconnaissance vocale. Après le recrutement de Ray Kurzweil, le père des théories sur la singularité technologique et la création en mai dernier d’un laboratoire baptiséQuantum Artificial Intelligence Lab en collaboration avec la NASA, Google se donne un peu plus les moyens de développer des algorithmes capables de faire des prévisions plus précises.

more...
No comment yet.
Rescooped by luiy from Cybersécurité - Sécurité
Scoop.it!

Lutte contre la #surveillance: les #hackers doivent passer de la technique au #politique

Lutte contre la #surveillance: les #hackers doivent passer de la technique au #politique | e-Xploration | Scoop.it
«On est dans cette violence émotionnelle du moment où la réalité est devant nos yeux.

Via Patrick W., Pascal Paul
luiy's insight:
L'ébauche d'un mouvement civil

Une «internationale hacker» en gestation? Voire. La centralisation n'est pas le trait culturel dominant du mouvement —bien au contraire. Et le discours «classe contre classe», ou «camp contre camp», n'est pas sans soulever des objections.

 

«La vision politique de cette communauté est forte, nécessaire, et utile, mais il n'y a pas de sens de la nuance, et ce n'est pas sain, déplore Nadim Kobeissi, le principal développeur du chat chiffré Cryptocat. On peut améliorer la vie privée des utilisateurs sans pour autant définir un ennemi, les “bons” contre les “méchants”, ou se poser en super-héros. Il y a quelque chose d'un peu tribal dans tout ça.»


Pragmatisme versus idéologie: la tension, en vérité, traverse depuis longtemps le mouvement hacker. Ce que l'affaire Snowden pourrait avoir changé en profondeur, c'est la manière dont il se perçoit —comme le noyau dur d'un mouvement plus vaste de défense de la vie privée et des libertés en ligne.

 

«En tant que techniciens, en tant que hackers, on doit travailler avec les législateurs, avec les groupes de pression, pour avoir plus d'impact politique», avance ainsi Jurre Van Bergen. Reste à en trouver les moyens. Car si le CCC joue depuis longtemps un rôle d'expert auprès des autorités allemandes [2], et si les associations de défense des libertés en ligne tirent régulièrement la sonnette d'alarme, tout le monde ne joue pas dans la même catégorie. Un vrai problème en Europe, selon Chris Soghoian:

more...
No comment yet.
Scooped by luiy
Scoop.it!

Living in a #surveillance state: Mikko Hypponen I #privacy

In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TED...
more...
No comment yet.
Rescooped by luiy from Social Network Analysis
Scoop.it!

Use These Secret #NSA Google Search Tips to Become Your Own Spy Agency | Wired | #privacy #surveillance

Use These Secret #NSA Google Search Tips to Become Your Own Spy Agency | Wired | #privacy #surveillance | e-Xploration | Scoop.it
Want to know how to "'hack" Google like the pros? The NSA has released a book it produced for its workers on how to find intelligence on the web.

Via Pierre Levy, Jay Ratcliff
luiy's insight:

The 643-page tome, called Untangling the Web: A Guide to Internet Research (.pdf), was just released by the NSA following a FOIA request filed in April by MuckRock, a site that charges fees to process public records for activists and others.

 

The book was published by the Center for Digital Content of the National Security Agency, and is filled with advice for using search engines, the Internet Archive and other online tools. But the most interesting is the chapter titled “Google Hacking.”

 

Say you’re a cyberspy for the NSA and you want sensitive inside information on companies in South Africa. What do you do?

Search for confidential Excel spreadsheets the company inadvertently posted online by typing “filetype:xls site:za confidential” into Google, the book notes.

 

Want to find spreadsheets full of passwords in Russia? Type “filetype:xls site:ru login.” Even on websites written in non-English languages the terms “login,” “userid,” and “password” are generally written in English, the authors helpfully point out.

 

Misconfigured web servers “that list the contents of directories not intended to be on the web often offer a rich load of information to Google hackers,” the authors write, then offer a command to exploit these vulnerabilities — intitle: “index of” site:kr password.

 

“Nothing I am going to describe to you is illegal, nor does it in any way involve accessing unauthorized data,” the authors assert in their book. Instead it “involves using publicly available search engines to access publicly available information that almost certainly was not intended for public distribution.” You know, sort of like the “hacking” for which Andrew “weev” Aurenheimer was recently sentenced to 3.5 years in prison for obtaining publicly accessible information from AT&T’s website.

 

Stealing intelligence on the internet that others don’t want you to have might not be illegal, but it does come with other risks, the authors note: “It is critical that you handle all Microsoft file types on the internet with extreme care. Never open a Microsoft file type on the internet. Instead, use one of the techniques described here,” they write in a footnote. The word “here” is hyperlinked, but since the document is a PDF the link is inaccessible. No word about the dangers that Adobe PDFs pose. But the version of the manual the NSA released was last updated in 2007, so let’s hope later versions cover it.

more...
No comment yet.