e-Xploration
Follow
Find
21.8K views | +2 today
e-Xploration
antropologo.net, dataviz, collective intelligence, algorithms, social learning, social change, digital humanities
Curated by luiy
Your new post is loading...
Your new post is loading...
Scooped by luiy
Scoop.it!

#NSA Leaks Present a Business and Ethics Crisis for Silicon Valley | Wired | #privacy #dataawareness

#NSA Leaks Present a Business and Ethics Crisis for Silicon Valley | Wired | #privacy #dataawareness | e-Xploration | Scoop.it
The NSA's Bluffdale, Utah, data center under construction in Nov. 2011. (Photo: NSA) Late last week, as revelations about the National Security Agency'
luiy's insight:

Late last week, as revelations about the National Security Agency’s telephone and internet data gathering programs splashed across the news, attorney Michael Overly heard from one of his clients, a consumer product company that had been looking at moving email systems to a cloud service provider. They’d decided to put their cloud project on hold.

 

“They are simply concerned about their data being accessed by a third party without their knowledge or consent,” says Overly, a partner in the information technology practice at the Los Angeles firm Foley & Lardner. “They have all kinds of things that they’re working on, and they don’t want that information used unless they understand who’s using it.”

 

Overly couldn’t name the company, but their issue was with a top-secret NSA project called Prism. Over the weekend, the Guardian produced a NSA document claiming that $20 million Prism program gave the government direct access to systems at nine technology companies — including Apple, Google, Facebook, and Microsoft. Those companies maintain that the government has no direct access to their systems.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Brain Implants Could Help Alzheimer’s and Others with Severe Memory Damage | #neuroscience #health

Brain Implants Could Help Alzheimer’s and Others with Severe Memory Damage | #neuroscience #health | e-Xploration | Scoop.it
A maverick neuroscientist believes he has deciphered the code by which the brain forms long-term memories.
luiy's insight:

Theodore Berger, a biomedical engineer and neuroscientist at the University of Southern California in Los Angeles, envisions a day in the not too distant future when a patient with severe memory loss can get help from an electronic implant. In people whose brains have suffered damage from Alzheimer’s, stroke, or injury, disrupted neuronal networks often prevent long-term memories from forming. For more than two decades, Berger has designed silicon chips to mimic the signal processing that those neurons do when they’re functioning properly—the work that allows us to recall experiences and knowledge for more than a minute. Ultimately, Berger wants to restore the ability to create long-term memories by implanting chips like these in the brain.

 

The idea is so audacious and so far outside the mainstream of neuroscience that many of his colleagues, says Berger, think of him as being just this side of crazy. “They told me I was nuts a long time ago,” he says with a laugh, sitting in a conference room that abuts one of his labs. But given the success of recent experiments carried out by his group and several close collaborators, Berger is shedding the loony label and increasingly taking on the role of a visionary pioneer.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Bayesian Methods for Hackers | #datascience #bigdata

Bayesian Methods for Hackers | #datascience #bigdata | e-Xploration | Scoop.it

Bayesian Methods for Hackers is designed as a introduction to Bayesian inference from a computational/understanding-first, and mathematics-second, point of view. Of course as an introductory book, we can only leave it at that: an introductory book. For the mathematically trained, they may cure the curiosity this text generates with other texts designed with mathematical analysis in mind. For the enthusiast with less mathematical-background, or one who is not interested in the mathematics but simply the practice of Bayesian methods, this text should be sufficient and entertaining.

luiy's insight:

bayesian methods for hackers and data scientist.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Unique in the Crowd: The privacy bounds of human mobility : Scientific Reports | #NSA #privacy

Unique in the Crowd: The privacy bounds of human mobility : Scientific Reports | #NSA #privacy | e-Xploration | Scoop.it
We study fifteen months of human mobility data for one and a half million individuals and find that human mobility traces are highly unique.
luiy's insight:

Derived from the Latin Privatus, meaning “withdraw from public life,” the notion of privacy has been foundational to the development of our diverse societies, forming the basis for individuals' rights such as free speech and religious freedom1. Despite its importance, privacy has mainly relied on informal protection mechanisms. For instance, tracking individuals' movements has been historically difficult, making them de-facto private. For centuries, information technologies have challenged these informal protection mechanisms. In 1086, William I of England commissioned the creation of the Doomsday book, a written record of major property holdings in England containing individual information collected for tax and draft purposes2. In the late 19th century, de-facto privacy was similarly threatened by photographs and yellow journalism. This resulted in one of the first publications advocating privacy in the U.S. in which Samuel Warren and Louis Brandeis argued that privacy law must evolve in response to technological changes3.

 

Modern information technologies such as the Internet and mobile phones, however, magnify the uniqueness of individuals, further enhancing the traditional challenges to privacy. Mobility data is among the most sensitive data currently being collected. Mobility data contains the approximate whereabouts of individuals and can be used to reconstruct individuals' movements across space and time. Individual mobility traces T [Fig. 1A–B] have been used in the past for research purposes4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18 and to provide personalized services to users19. A list of potentially sensitive professional and personal information that could be inferred about an individual knowing only his mobility trace was published recently by the Electronic Frontier Foundation20. These include the movements of a competitor sales force, attendance of a particular church or an individual's presence in a motel or at an abortion clinic.

 

-------------------------------------------------------------------------

 

Our dataset contains 15 months of mobility data for 1.5 M people, a significant and representative part of the population of a small European country, and roughly the same number of users as the location-based service Foursquare®31. Just as with smartphone applications or electronic payments, the mobile phone operator records the interactions of the user with his phone. This creates a comparable longitudinally sparse and discrete database [Fig. 3]. On average, 114 interactions per user per month for the nearly 6500 antennas are recorded. Antennas in our database are distributed throughout the country and serve, on average, ~ 2000 inhabitants each, covering areas ranging from 0.15 km2 in cities to 15 km2 in rural areas. The number of antennas is strongly correlated with population density (R2 = .6426) [Fig. 3C]. The same is expected from businesses, places in location-based social networks, or WiFi hotspots.

more...
No comment yet.
Rescooped by luiy from Social Network Analysis #sna
Scoop.it!

Free Archived Online Network Science Course from Dr. Barabasi of Northeastern University | #SNA #dataviz

Free Archived Online Network Science Course from Dr. Barabasi of Northeastern University | #SNA #dataviz | e-Xploration | Scoop.it
See on Scoop.it – Complex Networks Everywhere
Network Science Course Website
See on barabasilab.neu.edu
Extracted from syllabus:
PHYS 5116: Network Science
Lecturer:
Prof.

Via ukituki
more...
No comment yet.
Scooped by luiy
Scoop.it!

The Price of the Panopticon | #dragnet #surveillance

The Price of the Panopticon | #dragnet #surveillance | e-Xploration | Scoop.it
Pervasive N.S.A. surveillance may pose unforeseen dangers.
luiy's insight:

The N.S.A. dragnet of “connection data” — who communicates with whom, where, how often and for how long — aims at finding patterns between calls or messages, and between parties with given characteristics, which correlate with increased odds of terrorist activity. These patterns can in turn cue authorities to focus attention on possible terrorists.

 

The success rate in these operations is a matter of intense speculation, given the authorities’ closemouthed stance on the matter. But no serious analyst can doubt that such steps may be helping to pinpoint terrorist acts in advance, as supporters, like Senator Dianne Feinstein, Democrat of California, have insisted.

 

The question, though, is what comes next? Government planners have apparently invested billions of dollars to develop these new surveillance capabilities. Given the open-ended nature of this country’s relentless campaign against terrorism and other declared evils, it would be naïve to imagine that the state’s grip on “big data,” achieved at such cost, would be allowed to atrophy in the foreseeable future. It is far more likely that new uses — and, inevitably, abuses — will be found for these surveillance techniques.

more...
No comment yet.
Rescooped by luiy from Social Network Analysis #sna
Scoop.it!

Mapping #occupygezi #direngeziparki Tweets

Mapping #occupygezi #direngeziparki Tweets | e-Xploration | Scoop.it

Data from Social Media and Political Participation Lab (New York University) http://smapp.nyu.edu


Via ukituki
more...
ukituki's curator insight, June 10, 2013 6:50 PM
This video displays all geolocated tweets related to the #occupygezi #direngezipark protests in Istanbul, from May 31 to June 3, 2013. It shows the high volume of activity on Twitter over this period, and how the protest started in Gezi Park but then spread to the entire city in the matter of hours.
Rescooped by luiy from Didactics and Technology in Education
Scoop.it!

Teenage Usability (Jakob Nielsen's Alertbox) | #behaviors

Teenage Usability (Jakob Nielsen's Alertbox) | #behaviors | e-Xploration | Scoop.it
Teens often work on laptops with track pads, making interactions that require precision — such as drop-down menus, drag-n-drop, and small buttons — difficult. Design elements such as rollover effec...

Via Official AndreasCY, Rui Guimarães Lima
more...
No comment yet.
Scooped by luiy
Scoop.it!

#telepresence : Robots with your face want to invade workplaces and hospitals | #ehealth

#telepresence : Robots with your face want to invade workplaces and hospitals | #ehealth | e-Xploration | Scoop.it
So-called robotic telepresence allows people to communicate remotely. Will it take off?
luiy's insight:

Bedford, Mass.,-based iRobot (IRBT) believes it's finally changed that. The company -- perhaps best known for its adorable, automated floor-sweeping Roomba robots -- has a long, established record of understanding its customer, adequately maturing its technologies, and producing the right solution for its end users, whether that user is an immaculately clean apartment-dweller or a Navy explosives ordnance disposal specialist disarming IEDs in Afghanistan. (iRobot builds those robots too.) Earlier this year iRobot quietly rolled out its RP-VITA telemedicine robot in seven North American hospitals (six in the U.S. and one in Mexico City), and how they are received in the hospital environment could spell big things not only for iRobot and its technology partnerInTouch Health, but for telerobotics at large.

more...
No comment yet.
Rescooped by luiy from Transmedia Think & Do Tank since 2010
Scoop.it!

OMNSH | Observatoire des Mondes Numériques en Sciences Humaines

OMNSH | Observatoire des Mondes Numériques en Sciences Humaines | e-Xploration | Scoop.it
Nous sommes un collectif de chercheurs en sciences humaines et sociales, et nous étudions les technologies numériques

Via Transmedia Ready
more...
No comment yet.
Rescooped by luiy from Google Apps Script
Scoop.it!

Exporting a Google Spreadsheet as #JSON

Exporting a Google Spreadsheet as #JSON | e-Xploration | Scoop.it

" I frequently use Google Spreadsheets as a lightweight database, by setting up some columns, encouraging my colleagues to update it, and subscribing to notifications of changes. Then I export the spreadsheet as JSON and update a json file in our codebase. Sometimes I also just use the jsonp output of a published spreadsheet, but if I'm worried about performance or the information getting mis-updated, then I'll use the export-and-update approach. In order to export it as JSON, I used to use a Google Spreadsheets Gadget but now that those are deprecated, I use a Google Apps Script."


Via Martin Hawksey
more...
No comment yet.
Scooped by luiy
Scoop.it!

New Algorithms Force Scientists to Revise the Tree of Life | #Algorithms #bioinformatics

New Algorithms Force Scientists to Revise the Tree of Life | #Algorithms #bioinformatics | e-Xploration | Scoop.it
More genetic data is available than ever before to help build evolutionary trees, but scientists are finding that different genes even in the same organism can tell conflicting stories.
luiy's insight:

According to a new study partly focused on yeast, the conflicting picture from individual genes is even broader than scientists suspected. “They report that every single one of the 1,070 genes conflicts somewhat,” saidMichael Donoghue, an evolutionary biologist at Yale who was not involved in the study. “We are trying to figure out the phylogenetic relationships of 1.8 million species and can’t even sort out 20 [types of] yeast,” he said.

 

To resolve this paradox, the researchers developed an algorithm, based on information theory, to gauge the level of certainty in specific parts of the tree. They hope the new approach will help to clarify periods of evolution that are potentially the most illuminating but also the most conflicted, such as the Cambrian explosion — the rapid diversification of animal life that occurred about 540 million years ago.

 

“Historically, the areas of the tree of life that have attracted a lot of attention and disagreement usually have to do with the most interesting episodes,” such as the origins of animals, vertebrates and flowering plants, said Antonis Rokas, a biologist at Vanderbilt University who led the new study.

 

Based on the results of the new algorithm, scientists can select only the most informative genes to build phylogenetic trees, an approach that could make the process more accurate and efficient. “I think it will help us quite a bit in speeding up the reconstruction of the tree of life,” said Khidir Hilu, a biologist at Virginia Tech in Blacksburg.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Google, Ray Kurzweil and the deep learning.. | #neuralnetwork #AI

Google, Ray Kurzweil and the deep learning.. | #neuralnetwork #AI | e-Xploration | Scoop.it
With massive amounts of computational power, machines can now recognize objects and translate speech in real time. Artificial intelligence is finally getting smart.
luiy's insight:

Kurzweil was attracted not just by Google’s computing resources but also by the startling progress the company has made in a branch of AI called deep learning. Deep-learning software attempts to mimic the activity in layers of neurons in the neocortex, the wrinkly 80 percent of the brain where thinking occurs. The software learns, in a very real sense, to recognize patterns in digital representations of sounds, images, and other data.

 

The basic idea—that software can simulate the neocortex’s large array of neurons in an artificial “neural network”—is decades old, and it has led to as many disappointments as breakthroughs. But because of improvements in mathematical formulas and increasingly powerful computers, computer scientists can now model many more layers of virtual neurons than ever before.

 

With this greater depth, they are producing remarkable advances in speech and image recognition. Last June, a Google deep-learning system that had been shown 10 million images from YouTube videos proved almost twice as good as any previous image recognition effort at identifying objects such as cats. Google also used the technology to cut the error rate on speech recognition in its latest Android mobile software. In October, Microsoft chief research officer Rick Rashid wowed attendees at a lecture in China with a demonstration of speech software that transcribed his spoken words into English text with an error rate of 7 percent, translated them into Chinese-language text, and then simulated his own voice uttering them in Mandarin. That same month, a team of three graduate students and two professors won a contest held by Merck to identify molecules that could lead to new drugs. The group used deep learning to zero in on the molecules most likely to bind to their targets.

more...
No comment yet.
Rescooped by luiy from Social Foraging
Scoop.it!

#health : Can six billion cells phones collecting data on how people move lead to better human health? | #dataphones #datascience

#health : Can six billion cells phones collecting data on how people move lead to better human health? | #dataphones #datascience | e-Xploration | Scoop.it

Collecting and analyzing information from simple cell phones can provide surprising insights into how people move about and behave—and even help us understand the spread of diseases.

 

At a computer in her office at the Harvard School of Public Health in Boston, epidemiologist Caroline Buckee points to a dot on a map of Kenya’s western highlands, representing one of the nation’s thousands of cell-phone towers. In the fight against malaria, Buckee explains, the data transmitted from this tower near the town of Kericho has been epidemiological gold.

 

When she and her colleagues studied the data, she found that people making calls or sending text messages originating at the Kericho tower were making 16 times more trips away from the area than the regional average. What’s more, they were three times more likely to visit a region northeast of Lake Victoria that records from the health ministry identified as a malaria hot spot. The tower’s signal radius thus covered a significant waypoint for transmission of malaria, which can jump from human to human via mosquitoes. Satellite images revealed the likely culprit: a busy tea plantation that was probably full of migrant workers. The implication was clear, Buckee says. “There will be a ton of infected [people] there.”


Via Ashish Umre
more...
Rescooped by luiy from Technoculture
Scoop.it!

Does the government even need PRISM snooping? It's got Facebook

Does the government even need PRISM snooping? It's got Facebook | e-Xploration | Scoop.it

What you like and who you're connected to can tell a lot more than many people realize.
 


Via Luca Baptista
luiy's insight:

"My point here is to help people realize that data they give out willingly about themselves can be used by anyone with a computer and some knowledge of statistical analysis to find out a lot more than you might realize. This doesn't mean it's time to drop off the grid and fit yourself for a tin-foil hat, but it probably does mean you may want to make sure you truly "like" someone, some company or some cause before clicking the button on Facebook."

more...
No comment yet.
Scooped by luiy
Scoop.it!

Over the edge: Twitter API 1.1 makes “Follows” edges hard to get | #sna #dataviz #nodexl

Over the edge: Twitter API 1.1 makes “Follows” edges hard to get | #sna #dataviz #nodexl | e-Xploration | Scoop.it
luiy's insight:

This has an impact on people who have been collecting and analyzing data from Twitter.  Twitter has given and taken away with the new 1.1 API.  Mostly taken away.  More Tweets are sometimes available from the new API, up to 18,000 rather than the old 1,500 tweet limit.  This is a big change, but normal users often do not get much benefit from the limit increase if the topic they are interested in has fewer tweets.  The length of time tweets are retained and served is not much longer than it was.

 

The big change is the effective loss of the “Follows” edge.  Some users of the 1.0 API used to be able to get a significant number of queries that asked about who each user followed.  These queries generated data that allowed a network to be created based on which users followed which other users.  The “Follows” network in Twitter has been very informative, pointing to the key people and groups in social media discussions.  But now the “Follows” edge will be effectively impossible to use.

 

Twitter API 1.1 changes the limit on the number of queries about who follow who in Twitter to 60 per hour.  In practice, a network may have several hundred or thousand people in it, making a query for each person’s network of followers impractical. With the follows edge effectively gone, the remaining edges, “reply” and “mention” become more important. These edges are far less common than the “Follows’ edge.  Many people follow lots of other people but mention the name or directly reply to very few. With the loss of the Followers edge, Twitter networks can become very sparse, with few connections remaining.  Dense structures give way to confetti.

more...
No comment yet.
Scooped by luiy
Scoop.it!

The Network Thinkers: Connecting the Calls | #NSA #privacy #dataviz

The Network Thinkers: Connecting the Calls | #NSA #privacy #dataviz | e-Xploration | Scoop.it
luiy's insight:

It appears that the US Government, via their National Security Agency (NSA), has collected a lot of data on who calls/emails whom both nationally and internationally (meta data of time, place, duration and source/destination of communication).  The NSA's Prism program is truly big data.  But is it enough data?  Is it the right data?  Is it the data the USA needs to stop both domestic and international terror attacks?

Assume they had the Prism data before September 11, 2001... would the NSA be able to map out the Al Qaeda(AQ) network below?  The two red nodes are AQ operatives who were known to be living in Los Angeles in 1999, the blue nodes came to the USA sometime in 2000 or 2001, the green nodes are foreign operatives supporting the 9-11 attacks.  A link shows who interacts with whom, via regular phone or email contact.  Here is a more detailed analysis of this terror network.

more...
No comment yet.
Rescooped by luiy from Anthropology, communication & technology
Scoop.it!

3 Suggested Readings on the Politics of #Surveillance - ENGAGED ANTHROPOLOGY, PEACEBUILDING, HUMAN RIGHTS | #privacy #dataawareness

Obama scandals seem not to end. The disclosure that the Obama administration has continued the tradition inaugurated by president George W. Bush to routinely collect metadata of phone calls has sparked a lively debate on social media and in political circles. The disclosure came first from The Guardian newspaper, which described the process by which the National Security Agency and the F.B.I. have obtained a secret warrant to compel Verizon to turn over phone data. The first report was followed by a The Guardian and The Washington Post article revealing that the Obama administration was mining also data from nine U.S. Internet companies such as Google, Facebook, Skype and Apple. The PrismProgram , as it is known, was until now, a top secret program.

Secrecy, and its relationship to power, and to presidential power in particular, is emerging as a theme of public debate because of the secrecy masking both the details of the use of U.S. predator drones in the Middle East and the covertsurveillance of phone calls and Internet data. For a president, who campaigned on a promise of transparency and accountability, secrecy is turning into a defining trait of his administration.

President Barack Obama provided a strong defense of the surveillance program.“You can’t have 100 percent security and then also have 100 percent privacy and zero inconvenience,” the president said.

In light of the ensuing debate, I suggest below three readings by anthropologists that can help to think anthropologically about the surveillance program, the relationship of power to secrecy, and more in general about the hegemony of today’s security paradigm. As Elias Cannetti wrote, “Secrecy lies at the very core of power.”


Via Andrea Naranjo
more...
No comment yet.
Rescooped by luiy from Augmented Collective Intelligence
Scoop.it!

The nature of collective intelligence | #CI @hrheingold @plevy

The nature of collective intelligence | #CI @hrheingold @plevy | e-Xploration | Scoop.it

Digital data stem from our own personal and social cognitive processes and thus express them in one way or another. But we still don’t have any scientific tools to make sense of the data flows produced by online creative conversations at the scale of the digital medium as a whole.


Via Ucka Ludovic Ilolo, Howard Rheingold
more...
Liliane Clavel Pardo's curator insight, June 16, 2013 6:11 AM

J'adore les articles selectionnés par cet internaute...

Erika Harrison's curator insight, July 17, 2013 11:17 PM

Levy on how human communications and digital media create platforms for augmented collective intelligence.

Klaus Meschede's curator insight, July 21, 2013 3:24 PM

Vortrag 2010, immer noch interessant

Rescooped by luiy from OSINT News
Scoop.it!

The new systems : From "cyber-criminalité" to surveillance ... | #controverses #privacy

The new systems : From "cyber-criminalité" to surveillance ... | #controverses #privacy | e-Xploration | Scoop.it
RSA annonce la nouvelle version de RSA Silver Tail 4.0, sa solution de détection des menaces Web.

Via Paulo Félix
luiy's insight:

Voici les nouveautés de RSA Silver Tail : 

· Streaming Analytics : la technologie de RSA Silver Tail a été conçue pour classifier les menaces en temps réel, clic après clic, selon une analyse plus intelligente des comportements et des risques de manière à détecter et contrer les menaces plus rapidement. L'outil Streaming Analytics emploie une technologie d'analyse propriétaire pour la détection en temps réel de la dernière génération d'attaques complexes de sites internet. 


· Gestion des incidents : fonction de détection des menaces qui permet de les détecter de manière plus simple et de comprendre les causes pour en remonter à la source. 


· Interface utilisateur intelligente : s'adapte aux équipes de sécurité et de lutte contre la fraude. Ses fonctions de visualisation du Big Data particulièrement interactives simplifient les opérations de détection et d'investigation en générant des listes de priorités, avec adresses IP suspectes, noms des utilisateurs, détails des pages et sessions Web, pour guider les enquêteurs et leur faire gagner du temps.

more...
No comment yet.
Scooped by luiy
Scoop.it!

“No quiero vivir en un mundo en el que se graba todo lo que digo y lo que hago” | #NSA #dataawareness

“No quiero vivir en un mundo en el que se graba todo lo que digo y lo que hago” | #NSA #dataawareness | e-Xploration | Scoop.it
Edward Snowden explica los motivos que le llevaron a filtrar los detalles del programa de datos de la NSA
luiy's insight:

Pregunta: ¿Por qué decidió denunciar las actuaciones de la NSA?

 

Respuesta: La NSA ha levantado una infraestructura que le permite interceptar prácticamente todo y capturar la inmensa mayoría de las comunicaciones humanas de manera automática y sin seleccionar los objetivos. Si, por ejemplo, yo quiero ver sus correos electrónicos o el teléfono de su mujer, lo único que necesito es usar métodos de interceptación, que me permiten obtener correos, contraseñas, historiales de teléfono, datos de tarjetas de crédito. No quiero vivir en una sociedad que hace ese tipo de cosas... No quiero vivir en un mundo en el que se graba todo lo digo y lo que hago. Es algo que no estoy dispuesto a defender ni con lo quiera vivir.

more...
No comment yet.
Scooped by luiy
Scoop.it!

Why Patent #Trolls Greatest Threat To Innovation Is Invisible

Why Patent #Trolls Greatest Threat To Innovation Is Invisible | e-Xploration | Scoop.it
The White House is taking on patent trolls--legal entities that buy up vague, over-broad patents and use them to extort money from companies.
luiy's insight:

The White House is taking on patent trolls--legal entities that buy up vague, over-broad patents and use them to extort money from companies. The specifics of the president’s plan will be hashed out in the coming days, but it’s a good time to take a look at a small example of a very big problem.

 

How big? The White House announcement was accompanied by a report from the National Economic Council and the Council of Economic Advisers, which notes that patent troll lawsuits have jumped by 250% in the last two years and now make up the majority (62%) of patent infringement suits. That means the vast majority of patent lawsuits aren’t inventors protecting their intellectual property, but specialized legal entities that will never produce anything.

more...
No comment yet.
Rescooped by luiy from sociology of the Web
Scoop.it!

Social Media and the Culture of #Surveillance | #privacy #databrokers

Tablet Magazine The Emerging Culture of Surveillance Tablet Magazine Under the classified program revealed Thursday, the federal government has been secretly collecting information on foreigners overseas for nearly six years from the nation's...

Via nukem777
luiy's insight:

The internet–and the alleged world beyond the internet–is abuzz as the public, its intellectuals, and its runners-up debate the recent leaks about secret surveillance programs.

Under the classified program revealed Thursday, the federal government has been secretly collecting information on foreigners overseas for nearly six years from the nation’s largest Internet companies like Google, Facebook and, most recently, Apple, in search of national security threats. The revelation came just hours after government officials acknowledged a separate seven-year effort to sweep up records of telephone calls inside the United States.

The reaction has been varied with some people seeing this as a continuation of old policies, an effort to protect Americans, and otherwise, not a big deal, while others viewing the ordeal as a serious affront to American rights to privacy mixed with betrayal by complicit companies

more...
No comment yet.
Rescooped by luiy from Cloud Central
Scoop.it!

#privacy : The BIG TECH companys and the privacy resposability | #dataawareness

#privacy : The BIG TECH companys and the privacy resposability | #dataawareness | e-Xploration | Scoop.it
The Electronic Freedom Foundation calls out Sonic.net for actively protecting personal data from the government, and Verizon, AT&T and Apple for, well, not.

Via Peter Azzopardi
luiy's insight:

Twitter and Sonic.net took top scores in a new Electronic Freedom Foundation (EFF) report rating tech companies' stewardship of users' personal data and their willingness to hand over data to the government. The two companies got high marks on each of the EFF's six privacy best practices categories, which include things like "require a warrant for content," "tell users about government data demands," and "publish transparency reports."


On the other end of the scale were Verizon, AT&T and Apple. Verizon failed to get a star in even one category, while AT&T and Apple earned just one apiece. 

more...
Peter Azzopardi's curator insight, June 9, 2013 10:37 AM

After we have learnt that the National Security Agency's PRISM  programme tapped directly into the servers of most of the web's largest companies, monitoring user's search history, the content of emails, file transfers, and live chats this infographic importance takes on a new meaning.

 

Shame on Verizon, AT&T and Apple!