netwit 2.01

Selling You on Facebook



Selling You on Facebook

–Many popular Facebook apps are obtaining sensitive information about users—and users’ friends—so don’t be surprised if details about your religious, political and even sexual preferences start popping up in unexpected places.


By Jennifer Valentino-DeVries, Shayndi Raice and Courtney Schley, WSJ, 8 April 2012



Advertisements

April 9, 2012 Posted by | apps, FaceBook, Helen Nissenbaum [privacy researcher], personal data, personal data economy, Privacy Bill of Rights, social media, social networks | , , , , , , , , | Leave a comment

#socialmedia #twitter #malcolmgladwell [http://nyr.kr/9BaUkk] [http://bit.ly/hH4AnD]



Small Change
– Why the revolution will not be tweeted.

by

Malcolm Gladwell

New Yorker October 4, 2010



January 29, 2011 Posted by | Malcolm Gladwell, social media, social networks, social silos, The Dragonfly Effect, Twitter | 2 Comments

#INTERNET #encryption #PgP #P2P ~ Who owns the Internet and does it matter?



Well, I don’t that’s for certain. Just the PC, some copper cables and a router. I’ve got a computer ID and a URL for any site I maintain. I’ve no idea what happens to those little packets of digital data that stream in and out of the router. They tell me Skype is encrypted, but how would I know?

Plenty of people can learn lots about me. Social media give a lot away to anyone caring to look. Governments will almost certainly have automatic systems to check who is saying what to whom on the Internet. If they don’t they will be buying the software to do so right now.



Internet black holes

The logical direction is a full-encrypted P2P world. The downside of a PgP P2P (as opposed to client-server, where only servers supply) world is no one else can know what’s being said between these two people. (Entrance, stage left, cipherpunk Julian Assange, encryption software in hand) Sometimes even Internet People might be happy for their governments to have ways of finding things out. The trend is more towards individuals giving up their privacy in return for what the Internet and Web provides in exchange. Both governments and non-governmental organisations are taking full advantage of this while it lasts.

The give-up-your-privacy-social-media seem to be in a cross over graph with Govt 1.0 which is in the process of changing to Govt 2.0, most wholeheartedly in local govt. At the moment social media are just underneath the cross-over. WikiLeaks and others are pushing the whole thing up to the cross-over a lot quicker. The biggest thing from WikiLeaks will be a unrelenting exposure of kleptocratic government. Even non-kleptocrats will be worrying about this: so many democratic govts. have cosy relationships with kleptocrasies. France recently had one with Tunisia. Was that because they were selling them french made armaments? Some of the U.S.A’s best friends are keptocrats. Easier to do big arms deals with them, too. Who does Indonesia buy its military harware from? Israel, which is not a kleptocracy except in that the U.S. govt.hands an awful lot of American tax payer’s money over to it without asking. So in a sense it’s an inverse Kleptocracy, in which a state not individuals receives the handout. So the U.S. govt. is doing the stealing from its own people to keep another sate going.

Who owns the Internet is an important question. If governments feel they are getting locked out of individuals lives, they may want to more impose rules on Internet usage that P2P-type people don’t want or like.

Tim Bermers-Lee is the most prominent advocate of a neutral Net. Most people haven’t the faintest idea what this would mean or require in practice. It’s not going to happen if every no-democratic state keeps control of the copper wires, optical fibe and satellites they put into space.

The reason I found Wikileaks interesting and thought it would be a good idea to set up a WikiLeaks dedicated blog, was partly because it was an ideal opportunity to re-examine the wider implications of the Internet and Web. Anyone with half an ear for the digital zietgeist can’t fail to read up on the implications of WikLeaks and other areas of change in the digital arena.

One of these things is the Govt 2.0 The problem arises when a yawning Govt. 2.0 gap builds up, say between authoritarian states and democracies. This is not exactly a firm basis for net neutrality (or open data) if the U.S. becomes compeletely open and China remains closed. In fact, the ways things go, it is inevitable that the U.S. will drag China kicking and screaming intop the open world

Both types of states have an interest in reading the minds of their citizens. Interestinglt social media such as faceBook and twitter are the simplest and easiest way for them to do so. Every new digital technology has a downside.

P2P proper only arrives when there is Pretty Good privacy for all. And yet no govt. wasnt this because they have got used to checking on peopoe with the technology uptodate.

Coinciding with a recent WikiLeaks leak a lot of publicity for Govt 2.0 and visualisation techniques through the work on the WikLeaks data but others.


repost:

OPEN DATA Initiatives and visualisation techniques



January 20, 2011 Posted by | anonymity online, Canberra cyber security centre, China, connective knowledge, connectivism, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberspace, cypherpunk, digital forensics, digital journalism, Electronic Frontier Foundation (EFF), encryption, FaceBook, FGI, free government information [FGI], Government 2.0, Govt 3.0, hacker culture, info-war, information silos, Internet, internet activism, Internet filtering, Julian Assange, Mark Zuckerberg, net neutrality, network anomalies, Network security, network theory, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, Pretty Good Privacy (PGP), privacy, Semantic Web, silo effect, social media, social networks, Tim Burners-Lee, trust models, Twitter, Web 2.0, Web 3.0, WikiLeaks | Leave a comment

#wikileaks #USembassycable #social media #Indonesia [http://bit.ly/hUj0Zy]



WikiLeaks: the latest developments
Turkish airbase used as refuelling stop for US rendition flights and fears on ‘Baby Doc’ Duvalier, plus social media strategy in Indonesia and the latest WikiLeaks news and views

* Guardian summary

Indonesia cable:

US embassy cables: Jakarta embassy requests $100k for its social media strategy

* Indonesia’s emerging Internet community:

“….roughly 10% of the population able to access the internet at least monthly, this represents over 25 million people, nearly half of whom are on Facebook. ”

* Mission Indonesia requests $100,000 immediately in order reach a goal of 1 million Facebook fans in just 30 days — just before POTUS visit.

” 6. This money would be used in three areas. First, it would increase direct advertising via Facebook. Currently, Embassy Jakarta spends less than $25 per day on advertising, and nets between 300-400 new fans daily. Increasing this tenfold over 30 days, results in a gain of 100,000 to 120,000 fans. The funds would also be used to promote the visit and our fan page as the place to learn more by extensively advertising on Indonesian online portals, banner ads, YouTube, Twitter, and other promotional efforts, including embedding bloggers, contests and giveaways, and using SMS technology. With over 100 million mobile phone users in Indonesia, texting is a powerful way to include a huge audience. Partnering with a major telecom provider, we can encourage Indonesians to sign up for real-time updates via their cell phone — a great way to reach those not yet online about the visit. Cost: $60,000.

7. Another key promotion strategy to generate interest will be offering a “golden ticket” via Facebook. We propose making a dream come true for one lucky Indonesian, by providing an opportunity to meet POTUS during his visit. If the White House approves, we could invite fans to post why they should meet President Obama, and in doing so, use our social media platform to connect fans to the visit, as well as build excitement beforehand and follow-up coverage afterwards. In addition, we could partner with a local TV station to have a “finalist” show and increase coverage. RSO would ensure any winner(s) are vetted for security issues. If the White House would not agree to this, an alternate “dream prize” might be an educational trip to the U.S. Cost: $15,000.

8. Third, in order to implement these ideas in this limited time-frame, we need short-term expert help on this promotion in the form of a qualified local digital marketing agency, who could assist the Embassy’s new media team (currently one officer and three FSNs working on it part-time). Cost: $25,000.”



January 18, 2011 Posted by | cognitive infilltration, FaceBook, Indonesia, Mission Indonesia, P2P, Peer-to-Peer, POTUS, social media, social networks, Twitter, U.S. diplomatic cables, U.S.Embassy cables, WikiLeaks, YouTube | Leave a comment

#SOCIALMEDIA #cyber-utopianism #internet-centrism #BBCNewsnight [http://bit.ly/fNrj7i] @evgenymorozov ~ The Power of the Internet, Not?



Eugeny Morozov{ EM about}, author of The Net Delusion, will be on Newsnight 17 Jan 2011.



January 17, 2011 Posted by | "Collateral Murder" video, actor-network theory, Afghanistan documents, anonymity online, anonymous whistleblowing, Birgitta Jónsdóttir, Bradley Manning, Canberra cyber security centre, China, Citizen 2.0, citizen journalism, cognitive infilltration, connective knowledge, connectivism, crowd sourcing, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberpunk, cyberspace, Cyberspace Policy Review, cypherpunk, Daniel Domscheit-Berg, Daniel Ellsberg, data journalism, data leakage, data security, data-dump journalism, Defence Signals Directorate (DSD, Department of Homeland Security, Der Spiegel, digital forensics, digital journalism, diplomatic cables, Echelon spy system, Electronic Frontier Foundation (EFF), encryption, Evgeny Morozov, FaceBook, FGI, free government information [FGI], Frontline Club, Government 2.0, hacker culture, Hrafnsson, Indentity Ecosystem Framework, info-war, information silos, insider security, insider threats, Internet, internet activism, internet-centrism, investigative journalism, Iraq War 2003, Iraq war logs, Jaron Lanier, Jónsdóttir, Julian Assange, Manning, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, Network security, network theory, NSA, on-line rights, ontology, Open data, open source, organisational network analysis, P2P, P2P Foundation, Peer-to-Peer, Phorm, Pretty Good Privacy (PGP), privacy, Protecting Cyberspace as a National Asset Act (PCNAA), rogue employee, Semantic Web, silo effect, Single Person Organisation [SPO], social media, social networks, social semantic web, social silos, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, Tor, trust, trust models, Twitter, Virtual Private Network (VPN), virtual tunnel, visualisation, Web 2.0, WikiLeaks | Leave a comment

#TUNISIA #WIKILEAKS #socialmedia #twitrev ~ Was What Happened in Tunisia a Twitter Revolution? II



[1] The febrile debate in the social media about Tunisia is comical because the bien pensers know little about Tunisia, are rushing to conclusions with the basics, cobbling together their social network theories from what they think/guess to be a good example of a digitial revolution, and hoping for the best. Though the Internet, Web and social media, must have played a part, it’s primarily a political debate which I doubt many of the social media types are qualified to engage in – more a bit of a shouting match in a pub.

A few are getting really excited because they have written books on similar themes and think they might be writing a few more on the back of this crisis, and be invited into the TV studious as experts on the Twitter revolution. Have any, one wonders, even had a holiday Djerba?

Tunisia has been under the thumb from way back in the days of Bourguiba.

[2] The riots are a middle class phenomenon. Use your eyes! The No comment Euronews video yesterday showed middle-aged laywers still in their black robes, mingling with and shouting encouragement to the youth in centre of Tunis! And in those masses were students shouting that they were educated and had no jobs.

[3] The 1789 French Revolution was undoubtedly a revolution of the small, mobile printing press – the press facilitated the spread of ideas that led to the coup. But the French Revolution was a revolt of the middle-classes against arbitrary Monarchic rule, as was the American Revolution. Here, we need to Google our Gore Vidal YouTubes to see his barbed comments about the United States of America never having been a democracy.

[4] WikiLeaks showed two things about Tunisia:

[a] The U.S. supported Tunisia because Tunisia supported the U.S. over the war on terror. We have to ask if Tunisia might have been involved in extraordinary rendition like Morocco and Egypt were. Maybe not, but the likihood is great – Tunisia has been under authoritarian rule since 1957.

[b] The diplomatic cables showed the U.S. was aware that something was brewing in Tunisia.



January 15, 2011 Posted by | actor-network theory, Citizen 2.0, citizen journalism, connective knowledge, connectivism, cyber security, cyber-utopianism, cyberpunk, cyberspace, cypherpunk, data journalism, digital journalism, diplomatic cables, Government 2.0, info-war, Internet, P2P, Protecting Cyberspace as a National Asset Act (PCNAA), social media, social networks, techno-libertarianism, U.S. diplomatic cables, U.S.Embassy cables, Web 2.0, WikiLeaks | Leave a comment

#TUNISIA #WIKILEAKS #socialmedia #twitrev ~ Twitter revolution and the new Arab Media Space?



Tunisia and the New Arab Media Space
Marc Lynch, Foreign Policy, 15 Jan 2011


Tunisia: Can We Please Stop Talking About ‘Twitter Revolutions’
Luke Allnutt, Tanglered Web blog, 15 Jan 2011




The WDIK column
Twitter is proving to be important. It wouldn’t be so important if there were no mobile feeds into the system.

The Tunisian authorities, it is reported, had the Internet as tight as a gnats bottom – as China has. Though the news is that just before he flew the coop to Malta/France/Saudi Arabia (probably right now sitting down by the poolside with an ice-cool Carlesberg, evoking for me the iconic Heinekin scene at the end of Ice Cold in Alex…oh, perhaps not, it’s a dry country),



Internet Ali removed some of the filters. Or – as we’ll learn sooner than later – the current regime did, in order to reduce the pressure.



January 15, 2011 Posted by | actor-network theory, anonymity online, anonymous whistleblowing, China, Citizen 2.0, citizen journalism, connective knowledge, connectivism, cyber security, cyber-utopianism, cyberspace, data journalism, data leakage, data security, data-dump journalism, digital journalism, diplomatic cables, Government 2.0, Govt 3.0, Indentity Ecosystem Framework, info-war, insider security, insider threats, Internet, internet activism, internet-centrism, investigative journalism, Julian Assange, Manning, media, net neutrality, Network security, network theory, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, privacy, Single Person Organisation [SPO], social media, social networks, techno-libertarianism, Tim Burners-Lee, trust, trust models, Twitter, U.S. diplomatic cables, U.S.Embassy cables, Web 2.0, Web 3.0, WikiLeaks, WikiLeaks vs. The Yes Men | Leave a comment

#WIKILEAKS A capacity for trust model




CEOs say creativity most important in next 5 years





Both from The Practice of Leadership blog by George Ambler.



January 15, 2011 Posted by | actor-network theory, anonymity online, anonymous whistleblowing, Citizen 2.0, citizen journalism, cognitive infilltration, connective knowledge, connectivism, conspiracy, crowd sourcing, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, data leakage, data security, digital forensics, Electronic Frontier Foundation (EFF), encryption, Government 2.0, Govt 3.0, hacker culture, Indentity Ecosystem Framework, info-war, insider security, Internet, internet activism, investigative journalism, Julian Assange, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, network e-discovery, Network security, network theory, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, Semantic Web, social media, social networks, social semantic web, trust, trust models, Twitter, Web 2.0, WikiLeaks | Leave a comment

#INTERNET #privacy ~ Australia’s new cyber-warefare facility [http://bit.ly/fjOrlJ]



Australia’s new cyber-warefare facility



January 12, 2011 Posted by | ASIO, Canberra cyber security centre, Citizen 2.0, cognitive infilltration, connective knowledge, connectivism, conspiracy, cyber attacks, cyber crime, cyber espionage, cyber security, cyber terrorism, cyber warfare, cyber-utopianism, cyberspace, Cyberspace Policy Review, cypherpunk, data journalism, data leakage, Defence Signals Directorate, Defence Signals Directorate (DSD, Department of Homeland Security, digital forensics, digital journalism, DSD, encryption, free government information [FGI], Government 2.0, Govt 3.0, hacker culture, Indentity Ecosystem Framework, info-war, information silos, insider security, insider threats, Internet, internet activism, Julian Assange, Manning, National Center for Cybersecurity and Communications (NCCC), National Security Agency [NSA], National Strategy for Trusted Identities in Cyberspace, net neutrality, network anomalies, Network security, on-line rights, Open data, open source, P2P, P2P Foundation, Peer-to-Peer, Phorm, privacy, Protecting Cyberspace as a National Asset Act (PCNAA), Semantic Web, silo effect, Single Person Organisation [SPO], social media, social networks, social semantic web, techno-libertarianism, The Crypto Anarchist Manifesto, Tim Burners-Lee, U.S. diplomatic cables, U.S.Embassy cables, Unique Personality Organisation [UPO], Web 2.0, Web 3.0, WikiLeaks | Leave a comment

WEB WEBSITE #URLsematicweb {#sematicweb #RDAa #Facebook #Twitter #Google}



#RDFa Support: How Do #Google, #Facebook & #Twitter Compare? And How Will This Impact Their Position In The #Semantic #Search #Engine Market?


Bernard Lunn,  26 June 2010


*  plumps for #Facebook at time of writing



January 10, 2011 Posted by | connective knowledge, FaceBook, Google, RDF, Semantic Web, social media, social networks, social semantic web, Timothy C. May, Twitter, Web 2.0, Web 3.0 | Leave a comment