Please Support SilentVector:

Showing posts with label BTC. Show all posts
Showing posts with label BTC. Show all posts

Monday, July 13, 2015

Ethics of Harnessing Crowd-Sourcing Technologies

Ethics of Harnessing Crowd-Sourced Technologies

     I have always been in awe of the collective power created by connecting people through the Internet.  Part of these incredibly potent abilities comes from crowd-sourcing.  Crowd-sourcing is the collective accomplishment of a task by giving a group of people small segments of work to be completed.  When each piece of work is completed, the individual parts are reassembled into a functioning product or information utility.  Examples of this are seen in crowd-funding, social networking, and the assignment of metadata to digital information to create meaningful content.

     When “Web 2.0” was built, the function of the Internet shifted.  In 2006, Time Magazine chose “You” as the person of the year because of the amount of useful information being produced by the general population.  Seamlessly, all around us all the time, we create information that is collectively changing the world.  Some of the smallest things we do on the Internet are having the largest impacts.  If we are the primary creators of Internet content, interesting ethical questions arise when owners of crowd-sourced products use our collective accomplishments in ways we did not intend.  Technology continues to pervade the most intimate aspects of our lives rapidly and lawmakers scramble to keep abreast of this development.  An important, modern, poorly documented and sparsely discussed question arises: If we produce so much valuable content, how much of the created products do we actually own and what is the difference between ethical and unethical use of information we create?

     One of the positive examples of crowd-sourcing I mentioned is the reCAPTCHA (Completely Automated Public Turn test to tell Computers and Humans Apart) project owned and run by Google.  Google uses reCAPTCHA information for a variety of projects, to include Google Books.  It is in the process of digitizing scans of books for wider availability and distribution.  Google Maps is in the process of tagging numbered addresses to be used on Google Maps and Google Street View.

     Google uses high resolution digital cameras and software called Optical Character Recognition (OCR) when it scans books or addresses.  Words and numbers the OCR software cannot identify are sent to reCAPTCHA on websites to be translated by humans.  Luis Von Ahn, co-creator of reCAPTCHA says “According to our estimates, humans around the world type more than 100 million CAPTCHAs every day” (“ReCAPTCHA: Human-Based Character Recognition via Web Security Measures,” 2008).

     Based on Mr. Von Ahn’s estimates of how many reCAPTCHAs are processed per day, the following chart shows how long it would take to digitize famous literary works:



Figure 1:  According to Luis Von Ahn, co-founder of reCAPTCHA, how long it would take to digital famous novels based on their world counts and daily reCAPTCHA usage statistics.  Data source: www.commonplacebook.com, “Word Count for Famous Novels”: http://commonplacebook.com/culture/literature/books/word-count-for-famous-novels/

     I excluded data on my graph about the 44 million words included in the Encyclopedia Britannica because the data dwarfs the other page counts. If reCAPTCHA focused the output of all its users on digitizing the Encyclopedia Britannica, our collective effort would transcribe its data in less than twelve hours. This is an immensely powerful tool for the enrichment and dissemination of human knowledge, but it also provides useful benefits to its users.

     The security created by reCAPTCHA prevents fake accounts and bot programs from flooding Internet websites with Spam. Words and number sequences correctly identified by users are collected by Google. This information is used to complete books and maps, strengthening the usability of Google’s products. In my opinion, this is a great use of crowd-sourcing because both the users and the company providing the service both equally benefit. I found another product that leveraged the unique qualities of crowd-sourced information for more secretive, ethically ambiguous reasons.

     The majority of Facebook’s content is created by its users. Wall Street will disagree with me, but I believe Facebook’s value is determined by its customers. If Facebook didn’t have users to create content for the site, it would be an online advertising billboard; I wouldn’t visit. I assumed a website dependent on its customers for the existence of its business would be transparent and forthcoming when dealing with crowd-sourced information.

     I vaguely remembered a story that broke in the news about Facebook manipulating user’s feeds for some kind of psychological experiment. During my research, I came across the original study and read it in its entirety. What I found was a terrifying example of crowd-sourcing gone wrong. According to a study published in the National Academy of Sciences (“Experimental Evidence of Massive-scale Emotional Contagion Through Social Networks,” 2014), English Facebook users were selected and the “experiment manipulated the extent to which people were exposed to emotional expressions in their News Feed. This tested whether exposure to emotions led people to change their own posting behaviors, in particular whether exposure to emotional content led people to post content that was consistent with the exposure—thereby testing whether exposure to verbal affective expressions leads to similar verbal expressions, a form of emotional contagion.”

     In 2014, the study famously brought to light a peculiar social experiment being conducted by Facebook. In summary, Facebook crowd-sourced its users to test the propagation of “emotional contagions” (i.e. contentment, depression, happiness, anger) based on posts from Facebook user walls. Experiences with Facebook were deliberately distorted, evoking measurable positive or negative emotional responses in users who conveyed their feelings as new posts. This user-generated data further manipulated the moods of others involved in the project. Facebook users were oblivious to the experiment until the story broke in 2014. The reaction of the public was disappointing and became as fleeting as the Facebook timelines it was manipulating.

     As a user of social media, I am alarmed research like this is being conducted at all. I ponder what purpose it serves. It is an unsettling feeling to second guess if what I see on social media is a genuine representation of my personal network of friends and family. It is also concerns me that my colleagues, friends, and relatives may perceive my digital persona inaccurately if Facebook is manipulating my data for frivolous social experiments. Were any of my posts distributed or weighted differently with unfair bias, possibly casting me in an unfavorable light with people I work with, trust, and love?

     Most concerning, I do not recall an option to opt in or out of the experiment (other than to stop using Facebook or learn another language besides English). It is also interesting to point out Facebook has since introduced a new suicide hotline function on their website, only after the experiment was brought to light. The value of this tool in saving human life will prove to be invaluable, but I wonder if it doesn’t serve another purpose to deflect possible litigation hinged on public knowledge of Facebook’s experiment.

     Even in 1942, Doctors and ethics professionals had a clear vision of the parameters in which to conduct their experiments on human beings. Dr. A.N. Richards, chairman of the University of Pennsylvania School of Medicine explained in a letter that “when any risks are involved, volunteers only should be utilized as subjects, and these only after the risks have been fully explained and after signed statements have been obtained which shall prove that the volunteer offered his services with full knowledge and that claims for damages will be waived. An accurate record should be kept of the terms in which the risks involved were described” (Richards, 1942).

     The experiment Dr. Richards is referring to was a bioethics experiment during World War II, but the intent of his words applies today. The spirit of responsibility and accountability is undeniable in this decades old correspondence; so what happened? What thought processes took place in the designers of Facebook’s experiment? What made them believe they could bypass regulation, conduct emotional research, misinform their consumers, and conceal the purpose of their research. The most disconcerting aspect of the whole situation is from Facebook’s users: silence.

     It is my position that legal, ethical crowd-sourcing will positively change the Internet and many of its associated products. Clever uses of crowd-sourcing will continue to be an engine for the accomplishment of undesirable, menial tasks for the benefit of a broader consumer base. With oversight and careful consideration of data quality, crowd-sourcing can construct literal libraries of useful information. A dangerous line is crossed when consumers are not made aware of how their digital personas are manipulated, for any reason. This practice sows distrust between consumers and ultimately undermines a company’s business when they exercise unethical liberties on their users.


References:

Von Ahn, L., Maurer, B., Mcmillen, C., Abraham, D., & Blum, M. (2008). “ReCAPTCHA: Human-Based Character Recognition via Web Security Measures.” Science, 321(5895), 1465-1468.

Kramer, Adam D. I., Guillory, Jamie E., and Hancock, Jeffrey T. (2014) "Experimental Evidence of Massive-Scale Emotional Contagion Through Social Networks." Proceedings of the National Academy of Sciences of the United States of America 111.24 (2014) http://www.pnas.org/.

Richards, A. N., (1942) “Reply of A. N. Richards, Chaiman, To Dr. J. E. Moore” Reproduction of the National Archives.  http://bioethics.gov/sites/default/files/NARA-II_0000132.pdf

Sunday, July 12, 2015

SilentVector33: July 5 - 12, 2015 Digest

Hacking Team - July 5, 2015



On July 5, 2015 Italian-based information security company Hacking Team (@HackingTeam) was breached.  400GB of software, email traffic, and internal details of the company's operations were leaked through links tweeted on its own Twitter account.  Embarrassing, indeed.  But embarrassment was the least of the company's problems until WikiLeaks published the information and pumped it through Twitter, where thousands of skilled information managers began to dissect it.



The online machinations of Twitter information security professionals may not pique your interest, but it should.  The trove of information gleaned from these accounts has much to do with the everyday Internet user.  Hacking Team's scope of operations is frightening, invades your privacy, and whether you like it or not, brings dangerous software and its effects directly into your living room.



Hacking Team Privacy Implications


Potentially dangerous implications of this type have not been revealed since Edward Snowden fled the country after revealing the inner-workings of the Prism project, directed by the United States National Security Agency.  If you have ever watched a YouTube video, accessed your banking or utilities statements online, the revelations of the Hacking Team's exploits could have potentially uncovered your identity.



The source for concern is born from a skilled computer security professional's ability to trace Hacking Team's business dealings back to Symantec Corporation.  Symantec is one of the keystone organizations that provides security for the everyday Internet user.  They are partnered with Norton Antivirus and Spyware Removal; some of the most trusted and connected computer security companies in the world.  Most modern computers ship with a version of the Microsoft Windows operating system already installed; Microsoft has a close corporate relationship with both Symantec and Norton Security.


To break it down, there are several different types of internet security certificates issued to reputable companies to do business online.  One is a Secure Socket Layer (SSL) certificate that assists in encrypting your private communications when you deal with your bank (that "lock" icon displayed in your web browser is an example).  
Hacking Team was given a "code signing" certificate, which according to Symantec "will help protect users from downloading compromised files or applications."  This includes "vetting and approval of software publishers, code signing, key protection, revocation, administrative controls and audit logs.  This cloud-based service also features unique or rotating keys to sign apps and centralized protection in Symantec's military-grade data centers."

If you have read Hacking Team's list of clients, that statement is terrifying.  Their clients include the governments of Mexico, Sudan, Morocco, and the United Arab Emirates.  Also listed on their client list are the United States Federal Bureau of Investigation (code named "Phoebe") and the Department of External Affairs (code named "Katie").  If you examine the human rights violations and government corruption of some of the countries on their client list, it is not difficult to question the purpose of their dealings with the United States.

Even more disturbing are file systems found within Hacking Team's leaks which contain traces of child pornography files, installed covertly on the systems of their company's targets.  Coding within their leaked documents shows executable malicious code capable of remotely installing these files on a target computer, which would make an open-and-shut case easily possible, but absolutely illegal.  According to American constitutional law, the execution of this code would be a violation of 4th Amendment rights if a warrant was executed by these means.

Further, all of this code is now in the hands of whomever visits the WikiLeaks website.  The initial breach was exploited because of the most fundamental security flaw imaginable: the CEO of Hacking Team's account was laughably protected by a simple aberration of the word "password."  When you continue reading this, remember that this malicious code and the "professionals" that produced it are still at large.

"Cyber-war"

According to wired.com, the events that took place on July 8, 2015 are the equivalent of a cyber-war.  United Airlines grounded all flights, the New York Stock Exchange was taken offline for three-and-a-half hours, and the Wall Street Journal's website was taken down.  Isn't it interesting only three days after the largest IT upset (that did not make the evening news) since 2013 was followed by a huge information outage only three days later, after the Hacking Team's malicious files were released to the Internet?  No one is talking about this.

The government's official statement was that they did not suspect "malicious actors" were responsible for the NYSE computer crash.  Many media outlets blamed a so-called "Black Squirrel" incident, similar to ones that have crashed Wall Street's computer systems in previous years.

From a security perspective, it is now known that the New York Stock Exchange does not immediately route the most current trading data to its floor in the event of a data interruption.  Arguably, the most powerful financial network in the western hemisphere can be crashed by miscreant squirrels chewing through random wires.  Why backup systems, isolated from one another in quadruplicate are not prepared to process this critical financial data are not in place, makes me question the validity of the entire day's events as reported in the press.  Either the reports are faulty, or the information security professionals they hire are inept to plan for such occurrences.

These are not "technical glitches" like hiccups in your Internet connection.  If they are so simple to explain, Wall Street should take a hard look a how they occur and inform the public so their taxes can be better spent defending our infrastructure.



Greece & BitCoin


Because of the ongoing financial crisis in Greece, Bitcoin continues to improve performance.  At the time of publishing this article, @Bitcoin10min reports from July 6 - July 12:


July 6 = $271.59 | €249.09 | ¥1699.32 | £181.93

1h -0.84% | 1d +0.34% | 7d +5.97% | 1m +19.89%



$311.06 | €280.63 | ¥1974.55 | £207.15

1h +1.16% | 1d +6.19% | 7d +14.59% | 1m +33.84%

A $1000USD investment would have yielded $338.40USD since July 6, 2015.

Because of bank closures and the inability to withdraw money from Greek financial institutions, many Greeks have abandoned the Euro to seek shelter in BitCoin.  Price is expected to stay nearly level, with a slight increase as negotiations between Greece and the European Union continue.

Ghost Security & OpISIS


Operations continue between #GhostSec and their initiative, #OpISIS against the Islamic State.  GhostSec uses a unique reporting system, through a handle named the Controlling Section (#CtrlSec) to wage war against the propaganda machine ISIS continues to attempt to maneuver.

In the news, there are often reports of citizens being duped online, crossing borders, and ultimately assisting the Islamic State.  You, reading this right now, you have a voice.  Follow #CtrlSec and get involved.

Former United States Veterans, you can assist in the fight against ISIS by volunteering your skills.  Visit www.ghostsec.org for more information.