Welcome to the new version of European Tribune. It's just a new layout, so everything should work as before - please report bugs here.

A US censor 'gigs'

by Cat Sat Apr 14th, 2018 at 07:33:20 PM EST

6 November 2017, I did write.

The headline topic "Extremist Content and Russian Disinformation Online" is pretext to secure far more ranging cooperation from these publishers to police "user content", eg. number of cell text message responses to a posted solicitation, and legal identity of "users", eg. "beneficial owner of a (shell) corporation". In general, Democratic Party members were preoccupied with instances of suspected Russian "meddling and interference" such as false voter instructions; Republican Party members were skeptical of witnesses' claims in terms of operating capacities and technical expertise to avoid first amendment violations.
Approximately five months later comes news of US gov, Department of Homeland Security, request for proposals from private-sector firms to undertake surveillance of "social media communications," or "Media Monitoring Services," on behalf of US gov [1]
to monitor traditional news sources as well as social media, identify any and all media coverage related to the Department of Homeland Security or a particular event. Services shall provide media comparison tools, design and rebranding tools, communication tools, and the ability to identify top media influencers.[2]
The US federal government is preparing a secret list of individual domestic and foreign suspects (persons of interest) committing "influence" with a telecommunications device. One could characterized this project as "democratizing" a state's police apparatus.

The agency's requirements list for an applicant's consideration is formidable and precisely directed to configuring database reporting capabilities to the preferences of "users" employed in the obscure National Protection and Programs Directorate (NPPD) of DHS and its subdivisions. These are the Office of the Under Secretary (OUS), the Office of Cybersecurity and Communications (CS&C), the Office of infrastructure Protection (IP), the Federal Protective Service (FPS), the Office of Biometric Identity Management (OBIM) and the Office of Cyber and Infrastructure Analysis (OCIA).

One may note analogous, historical attempts by nation-state ray-geems to secure the obedience of constituents to legitimate public enterprise. None of that portends successful condition of freedom from arbitrary prosecution by the state, which is paradoxically us.


Display:
contract of adhesion

< wipes tears >

Ahead of GPDR effective date, disdainful US innerboob publishers are pushing EU cookie notice policy to the "next level." That is the concise version of existing Terms of Use notices published at their websites: LOVE IT OR LEAVE IT. ALL UR BELONG TO US.

hipster version

gangster version
Facebook Rolls Out New Privacy Settings Ahead of EU Data Law

Facebook's Rob Sherman, who is the company's deputy chief privacy officers, said Facebook will not let users opt out of having their data collected for targeted advertisements.

"People can choose to not be on Facebook if they want," Sherman said.

I for one am uncertain how US court will remedy imminent complaints of erstwhile users who-want-to-know-how-their-personal-data-is-used much less those of the my-PII-data-was-improperly-shared-somehow class.

Diversity is the key to economic and political evolution.

by Cat on Thu Apr 19th, 2018 at 12:01:19 AM EST
universal "ad block" trundling down the rails, pushed by unexpected opponents of free trade --the EPP group?
Geoffroy Didier, a French centre-right MEP, called the GDPR "a first step in the right direction".

"It is a necessary step, but it is not sufficient, which is why I propose that we go further than that and we demand that these platforms are no longer able to use our data for commercial purposes," Didier said. He called for new rules defining how tech platforms can store and use personal data.

Imagine this: A "one-click" switch required at every URL portal that turns off advertisers' content and programming.

How will The Developers survive on nothing but primitive page views and unique visitor stats?!!


Diversity is the key to economic and political evolution.

by Cat on Thu Apr 19th, 2018 at 02:54:35 PM EST
Innovation UPDATE: Mint Press News implemented commercial advertising a/o today. User control of the spot playback is "hidden" in the HTML "header". Playback cannot be controlled unless the user utilizes browser "developer tools." :15 sec spots automatically launch on entry to the site and roll through advertisers' media slots (A/V and V only) as the user scrolls the "front page."



This user has noted in a trend in aggressive push placement tech at a variety of MSM anglophone websites beginning 1Q2018. This particular script is a desperate, indeed disingenuous, tactic to generate income and marketing data absent genuine solicitation of readers for subscription fee or "donations" much less grants from institutional funders.

Cue "late stage capitalism" quips as is the custom rather than say, the market of activist/journalist/columnist/photographer/writer/vlogger//economists is saturated.


Diversity is the key to economic and political evolution.

by Cat on Thu Apr 19th, 2018 at 05:00:05 PM EST
[ Parent ]
re: LQD: A Civil Action, in which the parties decline to name Apple defendant in a suit litigating third-party ("app developer") acquisition of phone "owner" personal data, a class of plaintiffs alleging Apple misrepresentation of device security is denied certification, AND the FBI's capability in 2016 to decode encrypted user data is recalled.

recent public disclosures
A former Apple engineer released GreyKey, a software that breaks the security system on the iPhone

This method of breaking Apple's security system is not the first to emerge in the last few weeks. An Israeli company named Celebrite[1][2], who came to public attention a few years ago to offer unlocking services for an iPhone 5 for US services, has recently launched a similar solution.
Cops Around the Country Can Now Unlock iPhones, Records Show 12 Apr
FBI Director Christopher Wray recently said that law enforcement agencies are "increasingly unable to access" evidence stored on encrypted devices.

Wray is not telling the whole truth.
[...]
Grayshift has been shopping its iPhone cracking technology to police forces. The firm, which includes an ex-Apple security engineer on its staff, provided demonstrations to potential customers, according to one email.

"I attended your demo presentation recently held at the Montgomery County Police Headquarters and was pleased by your product's potential," an Assistant Commander from the Technical Investigations Section at the Maryland State Police wrote in an email to Grayshift in March.

There's no reason to assume authorities need physical possession of the device in order to "scrape" phone owner personal data... or validate "influence peddling" with the assistance of social media "platform" software.
The GrayKey itself is a small, 4x4 inches box with two lightning cables for connecting iPhones, according to photographs published by cybersecurity firm Malwarebytes. The device comes in two versions: a $15,000 one which requires online connectivity and allows 300 unlocks (or $50 per phone), and and an offline, $30,000 version which can crack as many iPhones as the customer wants. Marketing material seen by Forbes says GrayKey can unlock devices running iterations of Apple's latest mobile operating system iOS 11, including on the iPhone X, Apple's most recent phone.
[...]
David R. Bursten, chief public information officer from the Indiana State Police, wrote in an email to Motherboard that the force had only recently obtained the GrayKey device, but that "this investigative tool will be used, when legally authorized to do so, in any investigation where it may help advance an investigation to identify criminal actors with the goal of making arrests and presenting prosecutable cases to the proper prosecuting authority."
Alrighty then. No foreign agents need to be harmed in any caper of suspect "hacking." The question for "progressive" civil rights activists now is which US federal and state agency may be eliminated from the line up of "improper" sharing.
But to be clear, GrayKey is not the end of this debate. Whatever exploits GrayKey is taking advantage of may stop working at some point. The FBI wanted to force Apple to tweak the San Bernardino iPhone running in February 2016; Cellebrite announced it could crack devices running iOS 9--the particular iOS version the phone was using--in July 2016. Even when phone crackers eventually catch up, there can still be a period of time when agencies may indeed be dark on a suspect's phone.

This is, presumably, the reason the DOJ and FBI would like backdoors: they provide more guaranteed access over a period of time, rather than catching up with each iteration of a phone cracking product. Cost [!] might be a factor too--forcing tech companies to facilitate access could be cheaper [?!!] than buying more cracking tools.

wut

"The FBI does not comment on specific tools or technologies; however, there is no one size fits [!] all solution to Going Dark," an FBI spokesperson told Motherboard in a statement.

In March, FBI Director Wray said the Bureau had nearly 7,800 phones it could not unlock last year. Maybe the FBI could get in touch with the country's local police forces.

&tc.


Diversity is the key to economic and political evolution.
by Cat on Thu Apr 19th, 2018 at 08:48:58 PM EST
[ Parent ]


Display:
Go to: [ European Tribune Homepage : Top of page : Top of comments ]