Revealed: US spy operation that manipulates social media
Revealed: US spy operation that manipulates social media
— Military’s ‘sock puppet’ software creates fake online identities to spread pro-American propaganda
Nick Fielding and Ian Cobain, Guardian, 17 March 2011
which links to
America’s absurd stab at systematising sock puppetry
–The US has a chance to move on from a history of clandestine foreign policy – instead it acts like a clumsy spammer
Jeff Jarvis, Guardian, 17 March 2011
which links to
The internet: Everything you ever need to know
–In spite of all the answers the internet has given us, its full potential to transform our lives remains the great unknown. Here are the nine key steps to understanding the most powerful tool of our age – and where it’s taking us
John Naughton, Guardian, 20 June 2010
#INTERNET #encryption #PgP #P2P ~ Who owns the Internet and does it matter?
Well, I don’t that’s for certain. Just the PC, some copper cables and a router. I’ve got a computer ID and a URL for any site I maintain. I’ve no idea what happens to those little packets of digital data that stream in and out of the router. They tell me Skype is encrypted, but how would I know?
Plenty of people can learn lots about me. Social media give a lot away to anyone caring to look. Governments will almost certainly have automatic systems to check who is saying what to whom on the Internet. If they don’t they will be buying the software to do so right now.
Internet black holes
The logical direction is a full-encrypted P2P world. The downside of a PgP P2P (as opposed to client-server, where only servers supply) world is no one else can know what’s being said between these two people. (Entrance, stage left, cipherpunk Julian Assange, encryption software in hand) Sometimes even Internet People might be happy for their governments to have ways of finding things out. The trend is more towards individuals giving up their privacy in return for what the Internet and Web provides in exchange. Both governments and non-governmental organisations are taking full advantage of this while it lasts.
The give-up-your-privacy-social-media seem to be in a cross over graph with Govt 1.0 which is in the process of changing to Govt 2.0, most wholeheartedly in local govt. At the moment social media are just underneath the cross-over. WikiLeaks and others are pushing the whole thing up to the cross-over a lot quicker. The biggest thing from WikiLeaks will be a unrelenting exposure of kleptocratic government. Even non-kleptocrats will be worrying about this: so many democratic govts. have cosy relationships with kleptocrasies. France recently had one with Tunisia. Was that because they were selling them french made armaments? Some of the U.S.A’s best friends are keptocrats. Easier to do big arms deals with them, too. Who does Indonesia buy its military harware from? Israel, which is not a kleptocracy except in that the U.S. govt.hands an awful lot of American tax payer’s money over to it without asking. So in a sense it’s an inverse Kleptocracy, in which a state not individuals receives the handout. So the U.S. govt. is doing the stealing from its own people to keep another sate going.
Who owns the Internet is an important question. If governments feel they are getting locked out of individuals lives, they may want to more impose rules on Internet usage that P2P-type people don’t want or like.
Tim Bermers-Lee is the most prominent advocate of a neutral Net. Most people haven’t the faintest idea what this would mean or require in practice. It’s not going to happen if every no-democratic state keeps control of the copper wires, optical fibe and satellites they put into space.
The reason I found Wikileaks interesting and thought it would be a good idea to set up a WikiLeaks dedicated blog, was partly because it was an ideal opportunity to re-examine the wider implications of the Internet and Web. Anyone with half an ear for the digital zietgeist can’t fail to read up on the implications of WikLeaks and other areas of change in the digital arena.
One of these things is the Govt 2.0 The problem arises when a yawning Govt. 2.0 gap builds up, say between authoritarian states and democracies. This is not exactly a firm basis for net neutrality (or open data) if the U.S. becomes compeletely open and China remains closed. In fact, the ways things go, it is inevitable that the U.S. will drag China kicking and screaming intop the open world
Both types of states have an interest in reading the minds of their citizens. Interestinglt social media such as faceBook and twitter are the simplest and easiest way for them to do so. Every new digital technology has a downside.
P2P proper only arrives when there is Pretty Good privacy for all. And yet no govt. wasnt this because they have got used to checking on peopoe with the technology uptodate.
Coinciding with a recent WikiLeaks leak a lot of publicity for Govt 2.0 and visualisation techniques through the work on the WikLeaks data but others.
repost:
#SOCIALMEDIA #cyber-utopianism #internet-centrism #BBCNewsnight [http://bit.ly/fNrj7i] @evgenymorozov ~ The Power of the Internet, Not?
Eugeny Morozov{ EM about}, author of The Net Delusion, will be on Newsnight 17 Jan 2011.
#TUNISIA #WIKILEAKS #socialmedia #twitrev ~ Was What Happened in Tunisia a Twitter Revolution?
Was What Happened in Tunisia a Twitter Revolution?
Mathew Ingram, 14 Jan 2011
#TUNISIA #WIKILEAKS #socialmedia #twitrev ~ Twitter revolution and the new Arab Media Space?
Tunisia and the New Arab Media Space
Marc Lynch, Foreign Policy, 15 Jan 2011
Tunisia: Can We Please Stop Talking About ‘Twitter Revolutions’
Luke Allnutt, Tanglered Web blog, 15 Jan 2011
The WDIK column
Twitter is proving to be important. It wouldn’t be so important if there were no mobile feeds into the system.
The Tunisian authorities, it is reported, had the Internet as tight as a gnats bottom – as China has. Though the news is that just before he flew the coop to Malta/France/Saudi Arabia (probably right now sitting down by the poolside with an ice-cool Carlesberg, evoking for me the iconic Heinekin scene at the end of Ice Cold in Alex…oh, perhaps not, it’s a dry country),
Internet Ali removed some of the filters. Or – as we’ll learn sooner than later – the current regime did, in order to reduce the pressure.
#WIKILEAKS A capacity for trust model
CEOs say creativity most important in next 5 years
Both from The Practice of Leadership blog by George Ambler.
#INTERNET #privacy #digitalforensics [@4ensics] ~ On the Web, Children Face Intensive Tracking: http://budurl.com/PrivacyWSJ
On the Web, Children Face Intensive Tracking
by
Steve Stecklow, Wall Street Journal, 17 Sept 2010
steve.stecklow@wsj.com
also:
Shunned Profiling Technology on the Verge of Comeback
* On the reappearence of badform wiki:Phorm
In my scrabble to Rolodex this blog, I haven’t bothered to make any comments of my own, letting the trend of the material indicate where I am coming from/going to. It isn’t difficult to imagine Govt 1.0 scrambling to find technologies to help them keep ahead of their populations. Govt 2.0 and Citizen 2.0 evident in many places: it won’t be long before there is talk of Govt 3.0, which will be another way of talking P2P politics/society qua Michel Bauwens
INTERNET WEB Cyberspace Policy Review
Cyberspace Policy Review
– Assuring a Trusted and Resilient Information and Communications Infrastructure
* 76 page draft paper
* Useful timeline graphic on page 78, titled ‘History Informs Our Future’ from 1900 to the present, which highlights key technological and legal milestones.
Open in another tab to read.
Kim Cameron’s Identity Blog post 27 June 2010 gives short review:
INTERNET WEB National Strategy for Trusted Identities in Cyberspace #NSTIC
National Strategy for Trusted Identities in Cyberspace
– Creating Options for Enhanced Online Security and Privacy
June 25, 2010
* Department of Home Security draft paper
* Proposal for an Indentity Ecosystem Framework
* Appendix of terms
-
Archives
- August 2012 (1)
- May 2012 (1)
- April 2012 (8)
- February 2012 (1)
- January 2012 (14)
- December 2011 (11)
- October 2011 (11)
- September 2011 (7)
- July 2011 (5)
- June 2011 (9)
- May 2011 (26)
- April 2011 (17)
-
Categories
- "Collateral Murder" video
- #occupytheweb
- #ows
- 1917 Espionage Act
- 2703(d) order
- 2TE Corproration
- Aaron Barr
- ACLU
- ACTA
- actor-network theory
- Afghanistan documents
- Alan Rusbridger
- Amazon
- Amesys
- Amnesty International
- anarcho-capitalism
- Anders Johnsson
- anonymity
- anonymity online
- Anonymous
- anonymous networks
- anonymous remailers
- anonymous whistleblowing
- Antoine de Saint-Exupery
- Apple
- apps
- ASIO
- ASIS
- Assange
- Assange extradition
- asset misuse
- Bank of America
- Barrett Brown
- Bernard Keane
- Bill Gates
- Birgitta Jónsdóttir
- Bitcoin
- botnet
- Bradley Manning
- broadband
- Bruno Latour
- Bull S.A.
- Cambridge Union
- Canberra cyber security centre
- CCDCOE
- censorship-circumventing software
- Centre for Security and Intelligence Studies
- China
- Chris Dodd
- Citizen 2.0
- citizen journalism
- Clay Shirkey
- Cloud computing
- cognitive infilltration
- cognitive infiltration
- COICA
- Combating Online Infringement and Counterfeits Act [COICA]
- community wireless networks
- compliance
- connective knowledge
- connectivism
- conspiracy
- Conspiracy as Governance
- Cooperative Cyber Defence Centre of Excellence
- Cory Doctorow
- crowd sourcing
- cyber attacks
- Cyber Command
- cyber crime
- Cyber Defence League [Estonia]
- cyber espionage
- cyber rights
- cyber security
- cyber terrorism
- cyber warfare
- cyber-activism
- cyber-arms
- cyber-auxiliaries
- cyber-optimism
- cyber-pessimism
- cyber-tools
- cyber-utopianism
- cyber-war
- cybersiege [Estonia]
- cyberspace
- Cyberspace Policy Review
- cypherpunk
- cypherpunk philosophy
- cypherpunk rejectionists
- Czechoslovakia
- Daniel Domscheit-Berg
- Daniel Ellsberg
- Darwinism
- data analysis
- data journalism
- data leakage
- data security
- data-dump journalism
- David Correira
- David Friedman
- David Leigh
- DDOS
- DebateGraph
- Declan McCullagh
- Defence Signals Directorate
- Defence Signals Directorate (DSD
- Defense Advanced Research Projects Agency
- Denial of Service
- Department of Homeland Security
- Department of Justice [U.S.]
- Der Spiegel
- digileaks
- digital cash
- digital forensics
- digital journalism
- diplomatic cables
- DNSSEC
- DOJ
- DSD
- Duncan Frissell
- E-PARASITE Act
- Eagle System
- Echelon spy system
- Ed Cummings
- Egypt
- El País
- Electronic Frontier Foundation
- Electronic Frontier Foundation (EFF)
- encryption
- Eric Holder
- Eric Hughes
- Espionage Act
- Esther Dyson
- Estonia
- Estonian Internet Community (EIC)
- European Arrest Warrants (EAWs)
- European Counter Network [ECN]
- Evgeny Morozov
- FBI
- FGI
- fiat currency
- Finland
- France
- free government information [FGI]
- Friedrich Kittler
- Frontline Club
- GCHQ
- Global Online Freedom Act
- Government 1.0
- Government 2.0
- Govt 3.0
- graphic literacy
- Guantánamo
- Guardian
- hacker culture
- hackerworld
- hacking
- hacking tools
- hacktivism
- hacktivist
- Hans Ulrich Obrist
- HBGary
- HBGary Federal
- Helen Nissenbaum [privacy researcher]
- HQ2
- Hrafnsson
- i2e Technologies
- Ibsen
- Indentity Ecosystem Framework
- Indonesia
- info-war
- information security
- information silos
- Inside Wikileaks
- insider security
- insider threats
- insurance.aes256
- Inter-Parliamentary Union
- intercept
- International Transfer of Prisoners (ITP) scheme
- Internet
- internet activism
- Internet censorship
- internet engineers
- Internet filtering
- internet in a suitcase
- internet monitoring
- Internet packet
- Internet Relay Chat [IRC]
- internet-centrism
- interpersonal ties
- investigative journalism
- Iran
- Iraq War 2003
- Iraq war logs
- IRC
- ISP
- Israel Shamir
- Jacob Appelbaum
- James Ball
- Jan Palach
- Jaron Lanier
- Jónsdóttir
- Jeff Jarvis
- John Gilmore
- John Naughton
- Jonathan Stray
- Jonathan Zittrain
- journalism
- JP Rangaswami
- Julian Assange
- Kevin Mitnick
- kill switch
- L-3 Communications
- lamestream media
- Le Monde
- Lockheed Martin
- Low Orbit Ion Cannon [LOIC]
- Luke Harding
- Malcolm Gladwell
- Manning
- Mark S. Granovetter
- Mark Zuckerberg
- MARUTUKKU
- massive intercept gear
- MasterCard
- MayFirst/People Link
- media
- Micah Sifry
- Misha Glenny
- Mission Indonesia
- Mitch Kapor
- Mixmaster
- Mohamed Bouazizi
- MPAA
- MTI
- Myanmar
- Narus
- Natanz
- Nate Anderson
- National Center for Cybersecurity and Communications (NCCC)
- National Open Source Intelligence Centre
- National Security Agency [NSA]
- National Strategy for Trusted Identities in Cyberspace
- native apps
- Nepal
- net activism
- net neutrality
- netizen
- NetOwl Programme
- network anomalies
- network e-discovery
- Network security
- network silos
- network theory
- network-based pedagogy
- New York Times
- NSA
- NSTIC
- OECD
- on-line rights
- online anonymity
- online privacy
- ontology
- Open data
- open source
- Openleaks
- OPSEC [operations security]
- organisational network analysis
- P2P
- P2P Foundation
- Pakistan Papers
- Paul Carr
- PayPal
- PCNAA
- Peer-to-Peer
- Peiter Zatko
- Pentagon
- Pentagon Papers
- perfect forward secrecy
- personal data
- personal data economy
- Personal Democracy Forum
- Peter Ludlow
- Phil Zimmerman
- Phorm
- PIPA
- post-representational networks
- PostFinance
- POTUS
- Pretty Good Privacy (PGP)
- privacy
- Privacy Act
- Privacy Bill of Rights
- Protecting Cyberspace as a National Asset Act (PCNAA)
- public statistics
- public-key cryptography
- Radia Tapes
- Rap News 5
- RDF
- Reality Distortion Field
- redaction
- remailers
- Reporters Without Borders
- RIIA
- Riseup Networks
- rogue employee
- Ron Paul
- Rop Gonggrijp
- routing censorship
- Royal Institute of International Affairs
- RT
- RT [Russia Today]
- Sarah Lacy
- Sarah Palin
- Sascha Meinrath
- Scott Ludham
- Scott Ludlam
- Semantic Web
- Shell/Nigeria
- Shoe-Thrower's Index
- Signals Intelligence Automation Research Center [SARC]
- silo effect
- Single Person Organisation [SPO]
- SIPRNET
- Skype
- slacktivism
- Slavoj Žižek
- Smári McCarthy
- social media
- social networks
- social semantic web
- social silos
- socket puppets
- SOPA
- SPARQL
- SQL injection
- SRA
- SSL encryption
- Stephen Downes
- Stop Online Piracy Act
- Strict Transport Security
- Stuxnet
- Suelette Dreyfus
- sureveilance technology
- surveillance technology
- tactical media
- Takedown
- techno-libertarianism
- Telecommunications Interceptions and Access Act
- The Colbert Report
- The Crypto Anarchist Manifesto
- The Dragonfly Effect
- ThinThread
- Tim Burners-Lee
- Tim May
- Timothy C. May
- Timothy Garton Ash
- Titan Rain attacks
- Tom Espiner
- Tor
- Tor Project
- TrapWire
- trust
- trust models
- Tsutomu Shimamura
- Tunisia
- Tunisian cyberactivists
- Twitter data logs
- Twitter No Logs campaign
- U.S. diplomatic cables
- U.S.Embassy cables
- Uncategorized
- Unique Personality Organisation [UPO]
- Uprising Index
- US Department of Justice
- USCYBERCOM
- V for Vendetta
- VASTech
- Virtual Private Network (VPN)
- virtual tunnel
- Visa
- visualisation
- VPN
- Wall Street Journal
- walled gardens
- warrantless surveillance program
- Wau Holland
- Web 2.0
- Web 3.0
- web scraping
- whistleblowers
- WiFi
- WikiLeaks
- WikiLeaks rival
- WikiLeaks vs. The Yes Men
- Yemen
- You Loop
- YouTube
- Zeynep Tufekci
- Zizek
- ZXMT System
-
RSS
Entries RSS
Comments RSS