Las humanidades digitales en la información falsa: una explicación científica de la posverdad – El Mostrador

Las indagaciones científicas publicadas por la revista Physical Review E. demostraron que, cuando en las redes existe más de un núcleo de personas con opiniones similares, conectadas a pocas fuentes de información y muchos medios de retransmisión, se generan círculos cerrados y autorreferentes, los que pierden la capacidad de absorber otras ideas.

Fuente: Las humanidades digitales en la información falsa: una explicación científica de la posverdad – El Mostrador


Digital gold: why hackers love Bitcoin | Technology | The Guardian

The WannaCry ransomware attackers demanded payment in the cryptocurrency. But its use in the ‘clean’ economy is growing, too, and could revolutionise how we use money

Fuente: Digital gold: why hackers love Bitcoin | Technology | The Guardian


The stench of the Iraq war lingers behind today’s preoccupation with fake news | Jeff Sparrow | Opinion | The Guardian

If world leaders can deceive voters about the greatest foreign policy debacle in a generation, why should a president today worry about casually lying about the crowds at his inauguration?

Fuente: The stench of the Iraq war lingers behind today’s preoccupation with fake news | Jeff Sparrow | Opinion | The Guardian


With the power of online transparency, together we can beat fake news | Jimmy Wales | Opinion | The Guardian

The rise of the internet may have created our current predicament, but the people who populate the internet can help us get out of it. Next time you go back and forth with someone over a controversial issue online, stick to facts with good sources, and engage in open dialogue. Most importantly, be nice. You may end up being a small part of the process whereby information chaos becomes knowledge.

Fuente: With the power of online transparency, together we can beat fake news | Jimmy Wales | Opinion | The Guardian


Watch How Casually False Claims are Published: New York Times and Nicholas Lemann Edition

Like most people, I’ve long known that factual falsehoods are routinely published in major media outlets. But as I’ve pointed out before, nothing makes you internalize just how often it really happens, how completely their editorial standards so often fail, like being personally involved in a story that receives substantial media coverage. I cannot count how many times I’ve read or heard claims from major media outlets about the Snowden story that I knew, from first-hand knowledge, were a total fabrication.We have a perfect example of how this happens from the New York Times today, in a book review by Nicholas Lemann, the Pulitzer-Moore professor of journalism at Columbia University as well as a long-time staff writer for The New Yorker.

Fuente: Watch How Casually False Claims are Published: New York Times and Nicholas Lemann Edition


The U.S. Government Thinks Thousands of Russian Hackers May Be Reading My Blog. They Aren’t.

It’s plausible, and in my opinion likely, that hackers under orders from the Russian government were responsible for the DNC and Podesta hacks in order to influence the U.S. election in favor of Donald Trump. But the Grizzly Steppe report fails to adequately back up this claim. My research, for example, shows that much of the evidence presented is evidence of nothing at all.

Fuente: The U.S. Government Thinks Thousands of Russian Hackers May Be Reading My Blog. They Aren’t.


WashPost Is Richly Rewarded for False News About Russia Threat While Public Is Deceived

The most ironic aspect of all this is that it is mainstream journalists — the very people who have become obsessed with the crusade against Fake News — who play the key role in enabling and fueling this dissemination of false stories. They do so not only by uncritically spreading them, but also by taking little or no steps to notify the public of their falsity.

Fuente: WashPost Is Richly Rewarded for False News About Russia Threat While Public Is Deceived


Russia Hysteria Infects WashPost Again: False Story About Hacking U.S. Electric Grid

Those interested in a sober and rational discussion of the Russia hacking issue should read the following:(1) Three posts by cybersecurity expert Jeffrey Carr: first, on the difficulty of proving attribution for any hacks; second, on the irrational claims on which the “Russia hacked the DNC” case is predicated; and third, on the woefully inadequate, evidence-free report issued by the Department of Homeland Security and FBI this week to justify sanctions against Russia.(2) Yesterday’s Rolling Stone article by Matt Taibbi, who lived and worked for more than a decade in Russia, titled: “Something About This Russia Story Stinks.”(3) An Atlantic article by David A. Graham on the politics and strategies of the sanctions imposed this week on Russia by Obama; I disagree with several of his claims, but the article is a rarity: a calm, sober, rational assessment of this debate.

Fuente: Russia Hysteria Infects WashPost Again: False Story About Hacking U.S. Electric Grid


A Clinton Fan Manufactured Fake News That MSNBC Personalities Spread to Discredit WikiLeaks Docs

The phrase “Fake News” has exploded in usage since the election, but the term is similar to other malleable political labels such as “terrorism” and “hate speech”; because the phrase lacks any clear definition, it is essentially useless except as an instrument of propaganda and censorship. The most important fact to realize about this new term: Those who most loudly denounce Fake News are typically those most aggressively disseminating it.

Fuente: A Clinton Fan Manufactured Fake News That MSNBC Personalities Spread to Discredit WikiLeaks Docs


A moment of truth for Mark Zuckerberg | John Naughton | Opinion | The Guardian

The study found that over the last three months of the election campaign, 20 top-performing false election stories from hoax sites and hyper-partisan blogs generated 8,711,000 shares, reactions, and comments on Facebook, whereas the 20 best-performing election stories from 19 major news websites generated a total of 7,367,000 shares, reactions and comments. In other words, if you run a social networking site, fake news is good for business, even if it’s bad for democracy.

Fuente: A moment of truth for Mark Zuckerberg | John Naughton | Opinion | The Guardian


Facebook announces new push against fake news after Obama comments | Technology | The Guardian

Facebook has “reached out” to “respected fact-checking organizations” for third-party verification, Zuckerberg said, though he did not provide specifics. He said the company also planned to make reporting false stories easier and to create “better technical systems to detect what people will flag as false before they do it themselves”.

Fuente: Facebook announces new push against fake news after Obama comments | Technology | The Guardian


La corrupción y la caída final de los Clinton – El Mostrador

Y pese a que la prensa mayoritaria lo negaba en forma maniaca, los correos filtrados por Wikileaks eran viralizados por las redes sociales, dando cuenta de una serie de situaciones como las siguientes: cerca de la mitad de las personas que lograron tener acceso a Hillary Clinton mientras era Secretaria de Estado, habían hecho, en los días previos, importantes donaciones a la Fundación Clinton (pay to play); su jefe de campaña era al mismo tiempo lobbista de los gobiernos de Arabia Saudita y Qatar (acusados de ser financistas de ISIS), para los cuales consiguió millonarias ventas de armas (durante el periodo en que Clinton fue Secretaria de Estado las exportaciones de armas duplicaron a las realizadas en tiempos de Bush).

Fuente: La corrupción y la caída final de los Clinton – El Mostrador


Three New Scandals Show How Pervasive and Dangerous Mass Surveillance Is in the West, Vindicating Snowden

While most eyes are focused on the presidential race between Hillary Clinton and Donald Trump, three major events prove how widespread, and dangerous, mass surveillance has become in the West. Standing alone, each event highlights exactly the severe threats that motivated Edward Snowden to blow his whistle; taken together, they constitute full-scale vindication of everything he’s done.

Fuente: Three New Scandals Show How Pervasive and Dangerous Mass Surveillance Is in the West, Vindicating Snowden


In the Democratic Echo Chamber, Inconvenient Truths Are Recast as Putin Plots

To see how extreme and damaging this behavior has become, let’s just quickly examine two utterly false claims that Democrats over the past four days — led by party-loyal journalists — have disseminated and induced thousands of people, if not more, to believe.

Fuente: In the Democratic Echo Chamber, Inconvenient Truths Are Recast as Putin Plots


Germany orders Facebook to stop collecting WhatsApp user data | Technology | The Guardian

National data protection authority blocks recent privacy changes made by social network and commands existing shared data and phone numbers be deleted for 35 million users

Fuente: Germany orders Facebook to stop collecting WhatsApp user data | Technology | The Guardian


Don’t let WhatsApp nudge you into sharing your data with Facebook | John Naughton | Opinion | The Guardian

The popular messaging app built its reputation on putting users first. Now its corporate owners are looking for payback at our expense

Fuente: Don’t let WhatsApp nudge you into sharing your data with Facebook | John Naughton | Opinion | The Guardian


Apple ordered to pay up to €13bn after EU rules Ireland broke state aid laws | Business | The Guardian

European commission says Apple got illegal help with tax breaks but CEO Tim Cook says ruling threatens investment in Europe

Fuente: Apple ordered to pay up to €13bn after EU rules Ireland broke state aid laws | Business | The Guardian


Swift: fraudulent messages sent over international bank transfer system | Technology | The Guardian

World money exchange tells 11,000 financial institutions to update their software after US$81m was stolen from account of Bangladesh central bank

Fuente: Swift: fraudulent messages sent over international bank transfer system | Technology | The Guardian


The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos

SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to a document obtained by The Intercept.

Fuente: The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos


La clave de cifrado global de BlackBerry, en manos de la polícia

Problemas para BlackBerry. Mientras Apple lucha en los tribunales -y fuera de ellos- para proteger la privacidad de los usuarios, Vice News desvela, a través de documentos por un caso de asesinato, cómo la Policía Canadiense habría obtenido la clave de cifrado global de BlackBerry, haciendo de la seguridad del sistema… algo prácticamente inservible y al servicio de las fuerzas y cuerpos de seguridad de Canadá. ¿Y lo peor del asunto? según fuentes de Vice, poseen esta clave desde 2010.

Fuente: La clave de cifrado global de BlackBerry, en manos de la polícia


We cannot trust our government, so we must trust the technology | US news | The Guardian

Apple’s battle with the FBI is not about privacy v security, but a conflict created by the US failure to legitimately oversee its security service post Snowden

Fuente: We cannot trust our government, so we must trust the technology | US news | The Guardian


Regulators are failing to block fraudulent adverts – FT.com

You might have thought that an industry in which a tenth of transactions are fraudulent, which leaks billions of dollars a year, and in which many turn a blind eye to criminality would be raided by the police. So far, there is no sign of it. The

Fuente: Regulators are failing to block fraudulent adverts – FT.com


El escándalo de espionaje pone en apuros al Gobierno de Merkel | Internacional | EL PAÍS

El escándalo de espionaje pone en apuros al Gobierno de Merkel | Internacional | EL PAÍS.


La colaboración entre los servicios secretos de Alemania y EE UU desata una tormenta política

Alemania

La canciller alemana, Angela Merkel, en un acto en Berlín el 29 de abril. / JOHN MACDOUGALL (AFP)

El escándalo va creciendo hasta convertirse en una seria amenaza para la canciller Angela Merkel. Todo comenzó hace una semana, con la publicación de que los servicios secretos alemanes habían colaborado con sus colegas estadounidenses para espiar a algunas empresas y políticos. Pero el goteo de revelaciones ha ido subiendo la temperatura política en Alemania hasta que el jueves estalló una bomba de gran potencial destructivo para las relaciones de Berlín con sus socios europeos.

Según el Süddeutsche Zeitung, los estadounidenses se valieron de las instalaciones del BND —los servicios secretos alemanes— para espiar a altos funcionarios de instituciones tan relevantes como la Presidencia de la República Francesa, el Ministerio de Asuntos Exteriores francés o la Comisión Europea. Consultados por EL PAÍS, los portavoces del Gobierno ni confirman ni desmienten la información con el argumento de que no pueden interferir en una investigación parlamentaria.

La información, publicada también por las cadenas de televisión NDR y WDR, ha sacudido la política berlinesa. Ya no se trata solo de que los espías alemanes dieran alguna información aislada a la Agencia Nacional de Seguridadestadounidense, la famosa NSA. Las denuncias son ahora más graves. A la sospecha cada vez más fundada de queel ministro del Interior, Thomas de Maizière, mintió al Parlamento sobre el caso, se une la acusación de haber vulnerado la ley para pasar información sobre socios y teóricos amigos en un periodo indeterminado que podría ir de 2002 hasta 2013.

La líder alemana tiene ahora que decidir si cede a la presión y deja caer alguna cabeza. Podría ser la del presidente del BND, Gerhard Schindel. O incluso la del propio De Maizière, uno de sus hombres de confianza, que lo ha sido todo en los tres Gabinetes Merkel: primero jefe de la Cancillería, luego ministro de Defensa y en la última legislatura, titular de Interior.


Cover-up claims over revelation that Germany spied on EU partners for US | World news | The Guardian

Cover-up claims over revelation that Germany spied on EU partners for US | World news | The Guardian.

 The German secret service’s monitoring station in Bad Aibling, Bavaria.
The German secret service’s monitoring station in Bad Aibling, Bavaria. Photograph: Diether Endlicher/EPA

Germany has been spying and eavesdropping on its closest partners in the EU and passing the information to the US for more than a decade, a parliamentary inquiry in Berlin has found, triggering allegations of lying and cover-ups reaching to the very top of Chancellor Angela Merkel’s administration.

There was outrage in Germany two years ago over the revelations by NSA whistleblower Edward Snowden of US and British surveillance activities in Europe. The fresh disclosures are embarrassing for Berlin, which stands accused of hypocrisy in its protests about America spying on its allies.

“You don’t spy on your friends,” said Merkel when it was made known to her that her mobile phone was being monitored by the US National Security Agency (NSA). Since then, both sides have been embroiled in arguments about data privacy, with much talk among officials and diplomats of a collapse of German trust in the Americans.

But according to reports on a confidential Bundestag committee of inquiry into the NSA scandal, under a 2002 pact between German intelligence (BND) and theNSA, Berlin used its largest electronic eavesdropping facility in Bavaria to monitor email and telephone traffic at the Élysée Palace, the offices of the French president, and of key EU institutions in Brussels including the European commission.

Thomas de Maizière, the interior minister and a Merkel confidant, is in the firing line for allegedly lying about or covering up the German collaboration with the Americans. The minister has denied the allegations robustly and promised to answer before the parliamentary inquiry “the sooner the better”.

The best-selling tabloid Bildzeitung depicted de Maiziere as Pinocchio this week and accused him of “lying with impunity”. From 2005-9 he served as Merkel’s chief of staff, the post in Berlin that exercises authority over the BND. He is said to have been told of the spying activities in 2008.

German media reports are asserting that if De Maizière knew what was going on he has covered it up, and that if he did not know he was failing in his job while the BND ranged out of political control.

According to the newspaper Süddeutsche Zeitung and the public broadcasters WDR and NDR, citing information from the closed parliamentary inquiry, the BND’s biggest listening post at Bad Aibling in Bavaria “was abused for years for NSA spying on European states”.


Netanyahu's Spying Denials Contradicted by Secret NSA Documents – The Intercept

Netanyahu’s Spying Denials Contradicted by Secret NSA Documents – The Intercept.

Israeli Prime Minister Benjamin Netanyahu yesterday vehemently denied aWall Street Journal report, leaked by the Obama White House, that Israel spied on U.S. negotiations with Iran and then fed the intelligence to Congressional Republicans. His office’s denial was categorical and absolute, extending beyond this specific story to U.S.-targeted spying generally, claiming: “The state of Israel does not conduct espionage against the United States or Israel’s other allies.”

Featured photo - Netanyahu’s Spying Denials Contradicted by Secret NSA Documents

Israel’s claim is not only incredible on its face. It is also squarely contradicted by top-secret NSA documents, which state that Israel targets the U.S. government for invasive electronic surveillance, and does so more aggressively and threateningly than almost any other country in the world. Indeed, so concerted and aggressive are Israeli efforts against the U.S. that some key U.S. government documents — including the top secret 2013 intelligence budget — list Israel among the U.S.’s most threatening cyber-adversaries and as a “hostile” foreign intelligence service.


Google 'illegally took content from Amazon, Yelp, TripAdvisor,' report finds | Technology | The Guardian

Google ‘illegally took content from Amazon, Yelp, TripAdvisor,’ report finds | Technology | The Guardian.

 Google has been a leading silicon valley supporter of the Obama administration. Photograph: Marcio Jose Sanchez/AP
Google sign at the company's headquarters in Mountain View, California

Google manipulated its search results to promote its own services over those of rival websites in ways that led to “real harm to consumers”, a previously unpublished report by American regulators has concluded.

The revelations were seized on by those calling for Brussels to challenge Google’s monopoly over search in Europe, and have sparked new claims that the search giant’s financing of Barack Obama’s re-election campaign swayed US regulators.

America’s Federal Trade Commission (FTC) voted unanimously to end its investigation into Google in early 2013 after extracting concessions from the silicon valley company.

But documents accidentally handed to the Wall Street Journal show the FTC’s own investigators claim Google’s “conduct has resulted – and will result – in real harm to consumers and to innovation in the online search and advertising markets”.

The findings, contained in a report produced in 2012 by FTC staff to advise commissioners before their final decision on the case, claim Google also caused “harm to many vertical competitors”.


Facebook sigue sin cumplir con la legislación europea de privacidad

Facebook sigue sin cumplir con la legislación europea de privacidad.


Un informe elaborado por la Universidad de Lovaina concluye que Facebook sigue violando la legislación europea sobre privacidad, pese a que cambió sus políticas en enero

La red social se atribuye la potestad de rastrear a sus usuarios en webs y dispositivos, usar sus fotos de perfil para propósitos comerciales y no comerciales y recopilar información

En lo que se refiere al smartphone, Facebook no ofrece ninguna manera de que no se cree un registro con la localización del usuario a través de su aplicación móvil

El Centro Interdisciplinario para las Leyes y las Tecnologías de la Información y de la comunicación, perteneciente a la Universidad de Lovaina (en Bélgica), ha publicado un informe acerca de cómo casan los términos de servicio de Facebook con la legislación europea. Y las conclusiones presentadas indican que la red social viola la normativa europea en varios aspectos.

El trabajo lo ha encargado la Comisión de Privacidad de Bélgica, que ahora debe valorar los resultados. El informe está orientado a evaluar los cambios que Facebook hizo en sus condiciones y sus políticas respecto al usuario, que entraron en vigor a partir del 30 de enero. En el texto se apunta que la actualización solo ha “expandido políticas y prácticas antiguas”, mientras que “todavía viola la ley europea de protección al consumidor”.


From GCHQ to tech giants: why the fight for your personal data matters | Technology | The Guardian

From GCHQ to tech giants: why the fight for your personal data matters | Technology | The Guardian.

It's now possible to find out what personal data GCHQ holds on you.It’s now possible to find out what personal data GCHQ holds on you. Photograph: GCHQ / British Ministry of Defence/EPA

Government agencies and companies across the world hold large amounts of data on each and every one of us. From profiles of your favourite movies to where you ate out last night, this vast mountain of data is a representation of you that you can do little about.

But is that strictly true? Can you find out what GCHQ, Facebook or Google hold on you? And can you get it removed?


Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise – The Intercept

Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise – The Intercept.

Featured photo - Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise

The U.S., U.K. and Canadian governments characterize hackers as a criminal menace, warn of the threats they allegedly pose to critical infrastructure, and aggressively prosecute them, but they are also secretly exploiting their information and expertise, according to top secret documents.

In some cases, the surveillance agencies are obtaining the content of emails by monitoring hackers as they breach email accounts, often without notifying the hacking victims of these breaches. “Hackers are stealing the emails of some of our targets… by collecting the hackers’ ‘take,’ we . . .  get access to the emails themselves,” reads one top secret 2010 National Security Agency document.

These and other revelations about the intelligence agencies’ reliance on hackers are contained in documents provided by whistleblower Edward Snowden. The documents—which come from the U.K. Government Communications Headquarters agency and NSA—shed new light on the various means used by intelligence agencies to exploit hackers’ successes and learn from their skills, while also raising questions about whether governments have overstated the threat posed by some hackers.

By looking out for hacking conducted “both by state-sponsored and freelance hackers” and riding on the coattails of hackers, Western intelligence agencies have gathered what they regard as valuable content:

Recently, Communications Security Establishment Canada (CSEC) and Menwith Hill Station (MHS) discovered and began exploiting a target-rich data set being stolen by hackers. The hackers’ sophisticated email-stealing intrusion set is known as INTOLERANT. Of the traffic observed, nearly half contains category hits because the attackers are targeting email accounts of interest to the Intelligence Community. Although a relatively new data source, [Target Offices of Primary Interest] have already written multiple reports based on INTOLERANT collect.

The hackers targeted a wide range of diplomatic corps, human rights and democracy activists and even journalists:

INTOLERANT traffic is very organized. Each event is labeled to identify and categorize victims. Cyber attacks commonly apply descriptors to each victim – it helps herd victims and track which attacks succeed and which fail. Victim categories make INTOLERANT interesting:

A = Indian Diplomatic & Indian Navy
B = Central Asian diplomatic
C = Chinese Human Rights Defenders
D = Tibetan Pro-Democracy Personalities
E = Uighur Activists
F = European Special Rep to Afghanistan and Indian photo-journalism
G = Tibetan Government in Exile

In those cases, the NSA and its partner agencies in the United Kingdom and Canada were unable to determine the identity of the hackers who collected the data, but suspect a state sponsor “based on the level of sophistication and the victim set.”


Latest FBI Claim of Disrupted Terror Plot Deserves Much Scrutiny and Skepticism – The Intercept

Latest FBI Claim of Disrupted Terror Plot Deserves Much Scrutiny and Skepticism – The Intercept.

BY GLENN GREENWALD AND ANDREW FISHMAN 

Featured photo - Latest FBI Claim of Disrupted Terror Plot Deserves Much Scrutiny and Skepticism

The Justice Department on Wednesday issued a press release trumpeting its latest success in disrupting a domestic terrorism plot, announcing that “the Joint Terrorism Task Force has arrested a Cincinnati-area man for a plot to attack the U.S. Capitol and kill government officials.” The alleged would-be terrorist is 20-year-old Christopher Cornell (above), who is unemployed, lives at home, spends most of his time playing video games in his bedroom, still addresses his mother as “Mommy” and regards his cat as his best friend; he was described as “a typical student” and “quiet but not overly reserved” by the principal of the local high school he graduated in 2012.

The affidavit filed by an FBI investigative agent alleges Cornell had “posted comments and information supportive of [ISIS] through Twitter accounts.” The FBI learned about Cornell from an unnamed informant who, as the FBI put it, “began cooperating with the FBI in order to obtain favorable treatment with respect to his criminal exposure on an unrelated case.” Acting under the FBI’s direction, the informant arranged two in-person meetings with Cornell where they allegedly discussed an attack on the Capitol, and the FBI says it arrested Cornell to prevent him from carrying out the attack.

Family members say Cornell converted to Islam just six months ago and claimed he began attending a small local mosque. Yet The Cincinnati Enquirer could not find a single person at that mosque who had ever seen him before, and noted that a young, white, recent convert would have been quite conspicuous at a mosque largely populated by “immigrants from West Africa,” many of whom “speak little or no English.”

The DOJ’s press release predictably generated an avalanche of scary media headlines hailing the FBI. CNN: “FBI says plot to attack U.S. Capitol was ready to go.” MSNBC: “US terror plot foiled by FBI arrest of Ohio man.” Wall St. Journal: “Ohio Man Charged With Plotting ISIS-Inspired Attack on U.S. Capitol.”

Just as predictably, political officials instantly exploited the news to justify their powers of domestic surveillance. House Speaker John Boehner claimed yesterday that “the National Security Agency’s snooping powers helped stop a plot to attack the Capitol and that his colleagues need to keep that in mind as they debate whether to renew the law that allows the government to collect bulk information from its citizens.” He warned: “We live in a dangerous country, and we get reminded every week of the dangers that are out there.” 


Cops Are Handing Out Spyware to Parents—With Zero Oversight | WIRED

Cops Are Handing Out Spyware to Parents—With Zero Oversight | WIRED.

Mere days after a government crackdown on a spyware manufacturer comes the startling revelation that law enforcement agencies have been purchasing commercial spyware themselves and handing it out to the public for free.

Police departments around the country have been distributing thousands of free copies of spyware to parents to monitor their children’s activity, a fact that’s come to light in the wake of a federal indictment this week against the maker of one commercial spyware tool on wiretapping charges.

The tool being distributed by agencies, known as ComputerCOP, has been purchased in bulk by more than two hundred police departments in thirty-five states as well as by sheriff’s offices and district attorneys. It’s designed to search computers for files and videos based on a keyword dictionary that comes with the software and also can log every keystroke on a computer, sending some of that data—in an unsecured manner—to a server belonging to the company that makes the software.

But according to the Electronic Frontier Foundation, which examined the spyware and uncovered the arrangement with law enforcement agencies, the spyware works badly and there is nothing to prevent parents who receive it from using it against other adults.

Computer Cop Promotional Poster

Computer Cop Promotional Poster EFF

“It’s certainly ironic that law enforcement agencies are going after spyware makers while also distributing software that could be used for the same purposes,” says Dave Maas, an investigator with the EFF. “Obviously there’s a difference in how these were marketed by the maker. But certainly law enforcement needs to train their magnifying glasses on their own operations.”


You Can Get Hacked Just By Watching This Cat Video on YouTube – The Intercept

You Can Get Hacked Just By Watching This Cat Video on YouTube – The Intercept.

By 190

Many otherwise well-informed people think they have to do something wrong, or stupid, or insecure to get hacked—like clicking on the wrong attachments, or browsing malicious websites. People also think that the NSA and its international partners are the only ones who have turned the internet into a militarized zone. But according to research I am releasing today at the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, many of these commonly held beliefs are not necessarily true. The only thing you need to do to render your computer’s secrets—your private conversations, banking information, photographs—transparent to prying eyes is watch a cute cat video on YouTube, and catch the interest of a nation-state or law enforcement agency that has $1 million or so to spare.

To understand why, you have to realize that even in today’s increasingly security-conscious internet, much of the traffic is still unencrypted. You might be surprised to learn that even popular sites that advertise their use of encryption frequently still serve some unencrypted content or advertisements. While people now recognize that unencrypted traffic can be monitored, they may not recognize that it also serves as a direct path into compromising their computers.

Companies such as Hacking Team and FinFisher sell devices called “network injection appliances.” These are racks of physical machines deployed inside internet service providers around the world, which allow for the simple exploitation of targets. In order to do this, they inject malicious content into people’s everyday internet browsing traffic. One way that Hacking Team accomplishes this is by taking advantage of unencrypted YouTube video streams to compromise users. The Hacking Team device targets a user, waits for that user to watch a YouTube clip like the one above, and intercepts that traffic and replaces it with malicious code that gives the operator total control over the target’s computer without his or her knowledge. The machine also exploits Microsoft’s login.live.com web site in the same manner.

Fortunately for their users, both Google and Microsoft were responsive when alerted that commercial tools were being used to exploit their services, and have taken steps to close the vulnerability by encrypting all targeted traffic. There are, however, many other vectors for companies like Hacking Team and FinFisher to exploit.

In today’s internet, there are few excuses for any company to serve content unencrypted. Anyunencrypted traffic can be maliciously tampered with in a manner that is invisible to the average user. The only way to solve this problem is for web providers to offer fully encrypted services.


El largo brazo del lobby de Microsoft y sus redes en la clase política – El Mostrador

El largo brazo del lobby de Microsoft y sus redes en la clase política – El Mostrador.

Los lobbistas del gigante norteamericano se reunieron con varios diputados en los últimos meses, buscando bloquear el proyecto que instaba al fisco a utilizar software libre. El PPD Daniel Farcas, quien reconoce una “larga relación” con los desarrolladores de softwares pagados, fue el único que accedió a respaldarlos. En el Senado, la empresa operó a través del presidente de la Asech, Juan Pablo Swett, y en el gobierno de Piñera logró un jugoso beneficio tributario. La historia de Microsoft en Chile incluye cooptación de ex funcionarios públicos y millonarios tratos con el Estado.

 

 

 


El lobby de Microsoft en un mercado de 36 mil millones de pesos y la pérdida de inocencia del diputado Vlado Mirosevic – El Mostrador

El lobby de Microsoft en un mercado de 36 mil millones de pesos y la pérdida de inocencia del diputado Vlado Mirosevic – El Mostrador.

En juego estaban los miles de millones de pesos que el Estado gasta por año en licencias de softwares. Un reportaje de la Revista Sábado de El Mercurio revela cómo cinco parlamentarios de la Nueva Mayoría cambiaron de opinión en menos de 24 horas y el rol que jugaron los diputados Daniel Farcas y Jorge Insunza. El impacto se sintió en el protocolo de Reforma Tributaria que este martes se vota en la Sala del Senado.

file_20140518210456

Un extenso reportaje de la Revista Sábado, acompañado de una entrevista al diputado Vlado Mirosevic, revela el lobby de Microsoft para mantener control del mercado de software en el aparato del Estado.

En juego estaban 36 mil millones de pesos que el Estado gasta por año en licencias de softwares. La cifra no incluye las consultorías asociadas a las ventas. El reportaje muestra cómo cinco parlamentarios de la Nueva Mayoría cambiaron de opinión en menos de 24 horas y el rol clave que jugaron los diputados Daniel Farcas y Jorge Insunza. El impacto se sintió en el protocolo de Reforma Tributaria que este martes se vota en la Sala del Senado.


Sitio de citas online OkCupid confiesa sus experimentos con personas – BioBioChile

Sitio de citas online OkCupid confiesa sus experimentos con personas – BioBioChile.


OkCupid

OkCupid

Publicado por Denisse Charpentier | La Información es de Agencia AFP
Un mes después de que acusaran a Facebook de manipular las emociones de sus usuarios, el sitio de citas online estadounidense OkCupid decidió salir del closet: ellos también experimentaron con personas y vincularon parejas incompatibles para ver qué pasaba.

OkCupid, uno de los más populares sitios de citas online de Estados Unidos, dijo que había redefinido su fórmula para armar parejas con la idea de estudiar mejor el arte (o el negocio) del celestinaje.

Su fundador Christian Rudder escribió esta confidencia el lunes, en una entrada en su blog titulada “Nosotros experimentamos con seres humanos”, luego de que una ola de críticas rompiera sobre Facebook por manipular los “estados” de sus usuarios para estudiar cómo estos influencian las emociones.

“Notamos recientemente que a la gente no le gustó que Facebook ‘experimentara’ con sus perfiles”, dijo Rudder.

“Pero adivinen qué: si usan internet, ustedes son sujeto de cientos de experimentos en cualquier momento, en cualquier sitio. Así es como funcionan las páginas web”.


Is the internet now just one big human experiment? | Dan Gillmor | Comment is free | theguardian.com

Is the internet now just one big human experiment? | Dan Gillmor | Comment is free | theguardian.com.

It’s not only Facebook treating us like lab rats. Dating sites can manipulate our emotions, too – and blame it on user testing. The possibilities are endlessly scary

 

 

frankenstein in love
‘I understand … why the anger is there,’ OKCupid’s co-founder said. ‘But people also need to understand that … nobody launches a redesign without testing on different users.’ Photograph: Pelle Sten / Flickr via Creative Commons (Art: Frankenstein in Love, by Mogul)

 

If you thought the internet industry was chastened by the public firestorm after Facebook revealed it had manipulated the news feeds of its own users to affect their emotions, think again: OKCupid.com, the dating site, is now bragging that it deliberately arranged matches between people whom its algorithms determined were not compatible – just to get data on how well the site was working.

In a Monday blog post entitled – I’m not making this up – “We Experiment On Human Beings!” the site’s co-founder, Christian Rudder, essentially told us to face the facts of our modern world … at least as he sees them:

[G]uess what, everybody: if you use the Internet, you’re the subject of hundreds of experiments at any given time, on every site. That’s how websites work.

Human experimentation is definitely part of how websites work, in a way, because all online services of considerable size do something called A/B testing – seeing how users respond to tweaks, then adjusting accordingly. But that doesn’t mean sites can, do or should routinely and deliberately deceive their users or customers.

Yet Rudder – whose observations about data on his site’s “OKTrends” blog were almost always fascinating when he was posting regularly – acknowledges that OKCupid wasn’t merely A/B testing when it recently tried to figure out whether its human recommendation algorithm was actually correct:

To test this, we took pairs of bad matches (actual 30% match) and told them they were exceptionally good for each other (displaying a 90% match.)

Where I come from, we call this deception, and the Washington Post’s Brian Fung asks, reasonably, “If you’re lying to your users in an attempt to improve your service, what’s the line between A/B testing and fraud?”


Hacking Online Polls and Other Ways British Spies Seek to Control the Internet – The Intercept

Hacking Online Polls and Other Ways British Spies Seek to Control the Internet – The Intercept.

By 390
Featured photo - Hacking Online Polls and Other Ways British Spies Seek to Control the Internet

The secretive British spy agency GCHQ has developed covert tools to seed the internet with false information, including the ability to manipulate the results of online polls, artificially inflate pageview counts on web sites, “amplif[y]” sanctioned messages on YouTube, and censor video content judged to be “extremist.” The capabilities, detailed in documents provided by NSA whistleblower Edward Snowden, even include an old standby for pre-adolescent prank callers everywhere: A way to connect two unsuspecting phone users together in a call.

The tools were created by GCHQ’s Joint Threat Research Intelligence Group (JTRIG), and constitute some of the most startling methods of propaganda and internet deception contained within the Snowden archive. Previously disclosed documents have detailed JTRIG’s use of “fake victim blog posts,” “false flag operations,” “honey traps” and psychological manipulation to target online activists, monitor visitors to WikiLeaks, and spy on YouTube and Facebook users.

But as the U.K. Parliament today debates a fast-tracked bill to provide the government with greater surveillance powers, one which Prime Minister David Cameron has justified as an “emergency” to “help keep us safe,” a newly released top-secret GCHQ document called “JTRIG Tools and Techniques” provides a comprehensive, birds-eye view of just how underhanded and invasive this unit’s operations are. The document—available in full here—is designed to notify other GCHQ units of JTRIG’s “weaponised capability” when it comes to the dark internet arts, and serves as a sort of hacker’s buffet for wreaking online havoc.


ZumZuneo: Operación secreta en ciberguerra de EE.UU. contra Cuba estalla en los medios | SurySur

ZumZuneo: Operación secreta en ciberguerra de EE.UU. contra Cuba estalla en los medios | SurySur.

abr 4 2014

 

cuba ciberguerra-press

El mundo amaneció este 3 de abril con el escándalo, revelado por un reportaje de investigación de la agencia Associated Press, que reproducen las páginas digitales de numerosos periódicos estadounidenses, latinoamericanos y europeos y varios canales de televisión: Estados Unidos gastó ilegalmente más de un millón y medio de dólares en una red social llamada ZunZuneo para el “cambio de régimen” en Cuba, financiada por la Agencia de Estados Unidos para la Ayuda al Desarrollo (USAID).

 

Esta es una historia de guerra secreta que tiene de todo: Clandestinidad, ilegalidad, extraterritorialidad, humor y sobre todo fracaso.El gobierno de Estados Unidos se involucró así en una red de empresas fantasmas y  flujos financieros en paraísos ficales y violó sus propias leyes para esconder la trama que acaba de salir a la luz.

 

Con una investigación que abarca más de mil páginas de documentos y entrevistas a personas involucradas, varios elementos destacan en las revelaciones que seguramente tendrán consecuencias sobre la administración norteamericana del presidente Barack Obama.


The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket – The Intercept

The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda Bucket – The Intercept.

By 
Featured photo - The “Cuban Twitter” Scam Is a Drop in the Internet Propaganda BucketA woman uses her cellphone as she sits on the Malecon in Havana, Cuba. Image credit: Franklin Reyes/AP

This week, the Associated Press exposed a secret program run by the U.S. Agency for International Development to create “a Twitter-like Cuban communications network” run through “secret shell companies” in order to create the false appearance of being a privately owned operation. Unbeknownst to the service’s Cuban users was the fact that “American contractors were gathering their private data in the hope that it might be used for political purposes”–specifically, to manipulate those users in order to foment dissent in Cuba and subvert its government. According to top-secret documents published today by The Intercept, this sort of operation is frequently discussed at western intelligence agencies, which have plotted ways to covertly use social media for ”propaganda,” “deception,” “mass messaging,” and “pushing stories.”

These ideas–discussions of how to exploit the internet, specifically social media, to surreptitiously disseminate viewpoints friendly to western interests and spread false or damaging information about targets–appear repeatedly throughout the archive of materials provided by NSA whistleblower Edward Snowden. Documents prepared by NSA and its British counterpart GCHQ–and previously published by The Intercept as well as some by NBC News–detailed several of those programs, including a unit devoted in part to “discrediting” the agency’s enemies with false information spread online.

The documents in the archive show that the British are particularly aggressive and eager in this regard, and formally shared their methods with their U.S. counterparts. One previously undisclosed top-secret documentprepared by GCHQ for the 2010 annual “SIGDEV” gathering of the “Five Eyes” surveillance alliance comprising the UK, Canada, New Zealand, Australia, and the U.S.–explicitly discusses ways to exploit Twitter, Facebook, YouTube, and other social media as secret platforms for propaganda.