e-Xploration
28.4K views | +9 today
Follow
e-Xploration
antropologiaNet, dataviz, collective intelligence, algorithms, social learning, social change, digital humanities
Curated by luiy
Your new post is loading...
Your new post is loading...
Scooped by luiy
Scoop.it!

Social Media and the ‘Spiral of Silence’ | #surveillance #privacy

Social Media and the ‘Spiral of Silence’ | #surveillance #privacy | e-Xploration | Scoop.it
Facebook, Twitter, and other platforms did not provide new outlets for the discussion of the Snowden-NSA revelations. People who thought their social media friends disagreed with them were less likely to discuss the issues in person and online.
luiy's insight:

An informed citizenry depends on people’s exposure to information on important political issues and on their willingness to discuss these issues with those around them. The rise of social media, such as Facebook and Twitter, has introduced new spaces where political discussion and debate can take place. This report explores the degree to which social media affects a long-established human attribute—that those who think they hold minority opinions often self-censor, failing to speak out for fear of ostracism or ridicule. It is called the “spiral of silence.”

more...
No comment yet.
Scooped by luiy
Scoop.it!

Here's how we take back the Internet | #Snowden #privacy #surveillance

Here's how we take back the Internet | #Snowden #privacy #surveillance | e-Xploration | Scoop.it

Appearing by telepresence robot, Edward Snowden speaks at TED2014 about surveillance and Internet freedom. The right to data privacy, he suggests, is not a partisan issue, but requires a fundamental rethink of the role of the internet in our lives — and the laws that protect it. "Your rights matter,” he says, "because you never know when you're going to need them." Chris Anderson interviews, with special guest Tim Berners-Lee.

luiy's insight:

Why you should listen

 

Edward Snowden was just about to turn 28 when his face was suddenly splashed across every major newspaper in the US. In the summer of 2013 The Guardianpublished a series of leaked documents about the American National Security Agency (NSA), starting with an article about a secret court order demanding American phone records from Verizon, followed by an article on the NSA's top-secret Prism program, said to be accessing user data from Google, Apple and Facebook.

 

It wasn't long before Snowden came forward as the source, revealing that he had carefully planned the leak, copying documents when he was working as a contractor for the NSA. "I understand that I will be made to suffer for my actions," he said at the time, but "I will be satisfied if the federation of secret law, unequal pardon and irresistible executive powers that rule the world that I love are revealed even for an instant." Snowden's actions have led to a global debate on the relationship between national security and online privacy. His leaks continue to have a lasting impact on the American public's view of the government, and has encouraged media scrutiny on the NSA.

 

Snowden had coordinated the leak with journalist Glenn Greenwald and filmmaker Laura Poitras from Hong Kong; after he revealed his identity, he fled and ended up in Moscow. Under charges of espionage by the American government, Snowden remains in Russia in temporary asylum.

more...
No comment yet.
Rescooped by luiy from Science-fiction & innovation
Scoop.it!

Big Brother EXISTE... et tout le monde se fout de la menace : les raisons de notre étrange anesthésie collective

Big Brother EXISTE... et tout le monde se fout de la menace : les raisons de notre étrange anesthésie collective | e-Xploration | Scoop.it

Alors que la construction par la NSA d'un "super-ordinateur" capable de briser n'importe quel code vient d'être révélée, les opinions publiques semblent de moins en moins se préoccuper de la protection de leur vie privée. Une indifférence qui n'est pas sans rappeler celle des masses apathiques décrites dans "1984" par Georges Orwell. ...

 

 


Via Alcofribas, association concert urbain, Lockall
luiy's insight:

Thiébaut Devergranne : Le principal problème en la matière est que des systèmes comme PRISM ne portent pas directement et physiquement atteinte aux personnes qui en sont victimes. Lorsque les services de renseignements connectent de façon massive, quasi-totale, nos données personnelles (sites fréquentés, communications…) nous ne le voyons pas, ne le sentons pas, ni ne l'entendons. Une personne pourra éventuellement s'en apercevoir en bout de course, en se voyant notamment refuser sans raisons particulières un poste important (haute fonction publique, nucléaire, sécurité…). En dehors de ce type d'événement, le phénomène reste toutefois entièrement imperceptible.


Read more at http://www.atlantico.fr/decryptage/big-brother-existe%E2%80%A6-et-tout-monde-se-fout-menace-raisons-notre-etrange-anesthesie-collective-michel-nesterenko-thiebaut-devergra-943598.html#dEdRDeX4Oj6ClajJ.99

more...
No comment yet.
Rescooped by luiy from The Rise of the Algorithmic Medium
Scoop.it!

From the NSA to OKCupid, 5 Algorithms That Rule Your World | #algorithms

From the NSA to OKCupid, 5 Algorithms That Rule Your World | #algorithms | e-Xploration | Scoop.it
From the NSA to OKCupid.

Via Pierre Levy
luiy's insight:

1. The NSA’s Surveillance Algorithm

The NSA’s surveillance programs work, or so they claim, by collecting metadata: not the content of your phone calls and emails, but their length, who they connect you to, and when they happen.

 

2. Encryption Algorithms

Another way to combat surveillance is to confuse the algorithms—turning their own capabilities against them. Encryption algorithms encode your data, using a secret formula to turn it into an unreadable mass that entities like the NSA can’t process. That’s how post-PRISM services like Silent Circle and Least Authority protect their users’ phone calls and messages from snooping. But encryption algorithms have a very long history.

 

3. Google Search

If you’ve ever had Google fill in the rest of your search text like a mind-reader, you’ve also experienced an algorithm at work. Compounding what you’ve previously searched with what other users search for every day, Google’s algorithms can predict what you’re looking for with a frightening degree of accuracy.

 

4. High-Frequency Trading Algorithms

In the heyday of Wall Street, traders shouted across exchange floors to buy and sell stocks. These days, it’s a whole lot quieter—around 50 percent of trading is done by firms specializing in “high-frequency trading” (HFT), which refers to rapid-fire share buys and sells carried out by computer programs rather than humans. Hedge funds that specialize in HFT develop proprietary algorithms to determine what they buy and sell and when, then the programs carry out those instructions in milli- or microseconds. 

 

5. OKCupid

Algorithms influence even our intimate relationships. The now-iconic surveys of OKCupid, the question-and-answer sessions the dating site spews out to help match its users, provide the data for the site’s compatibility algorithms.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Data privacy. Data brokers and I.. | #privacy #dataAwareness

Data privacy. Data brokers and I.. | #privacy #dataAwareness | e-Xploration | Scoop.it
Data privacy. Data brokers and I.., by Luiy: My data, my info, my privacy and the databrokers
more...
No comment yet.
Scooped by luiy
Scoop.it!

#NSA files decoded: Edward Snowden's #surveillance revelations explained | #ddj

#NSA files decoded: Edward Snowden's #surveillance revelations explained | #ddj | e-Xploration | Scoop.it
In the last five months, the NSA's surveillance practices have been revealed to be a massive international operation, staggering in scope. But how do all of the NSA's programmes fit together – and what does it mean for you?
luiy's insight:

Faced with growing public and political concern over the quantities of data it is collecting, the NSA has sought to reassure people, arguing that it collected only a tiny proportion of the world’s internet traffic, roughly equivalent to a “dime on a basketball court”. But in reality, that is still a huge amount of data. The Library of Congress, one of the biggest libraries in the world, gathers 5 terabytes a month. The NSA sucks up much, much more.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Timeline of #NSA Domestic Spying 1952-2014 | #surveillance #privacy

Timeline of #NSA Domestic Spying 1952-2014 | #surveillance #privacy | e-Xploration | Scoop.it
All of the evidence found in this timeline can also be found in the Summary of Evidence we submitted to the court in Jewel v. National Security Agency (NSA).
luiy's insight:

The timeline also includes documents leaked by the Guardian in June 2013 that confirmed the domestic spying by the NSA. The documents range from a Top Secret Court Order by the secret court overseeing the spying, the Foreign Intelligence Surveillance Court (FISA Court), to a working draft of an NSA Inspector General report detailing the history of the program. The "NSA Inspectors General Reports" tab consists of one of three documents: a July 10, 2009 report written by Inspectors General of the Department of Justice (DOJ), NSA, Department of Defense (DOD), Central Intelligence Agency (CIA), and the Office of the Director of National Intelligence; an internal working draft NSA Inspector General report leaked by the Guardian on June 27, 2013; and, an "End to End Review" of the Section 215 program conducted by the NSA for the FISA Court. For a short description of the people involved in the spying you can look at our Profiles page, which includes many of the key characters from the NSA Domestic Spying program.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Thanks, Snowden! Now All The Major Tech Companies Reveal How Often They Give Data To Government | #PRISM

Thanks, Snowden! Now All The Major Tech Companies Reveal How Often They Give Data To Government | #PRISM | e-Xploration | Scoop.it
An infographic to compare how often tech companies get government search queries and how many of their users are affected.
more...
No comment yet.
Rescooped by luiy from The New Global Open Public Sphere
Scoop.it!

#NSA director set to lose powers over US cyber warfare and defence | #privacy #surveillance

#NSA director set to lose powers over US cyber warfare and defence | #privacy #surveillance | e-Xploration | Scoop.it
The NSA director could soon lose power over Cyber Command, the US unit in charge of cyber warfare and defence, a source familiar with discussions has...

Via Pierre Levy
more...
No comment yet.
Scooped by luiy
Scoop.it!

Interactive timeline of #PRISM scandal with a dynamic network graph | #dataviz #SNA_indatcom

Interactive timeline of #PRISM scandal with a dynamic network graph | #dataviz #SNA_indatcom | e-Xploration | Scoop.it
This is an interactive timeline of events about the Prism scandal, chronicled by selected media in online news articles, giving a summarized view of events as they unfolded.
luiy's insight:

It’s intended as a parody of a NSA software to track people and analyze their metadata. It consists of these parts:


•the chronological order of articles, visualized as a timeline,
•a network of people, places and organizations that appear in the articles,
•geographic information that the articles refer to, and
•a bar graph showing wordcounts of interesting words, associated with the main theme.


Note: it won't work in IE.

more...
No comment yet.