Please Support SilentVector:

Showing posts with label Vector. Show all posts
Showing posts with label Vector. Show all posts

Monday, January 18, 2016

One View On Sociology & Online Anonymity




One View On Sociology and Online Anonymity



(1)
      Privacy is a crucial element in an individual’s self-actualization and rehearsal of socially constructive reflexive behaviors.  In The Human Condition (1958), Ardent argues that “privacy guarantees psychological and social depth, containing things that cannot withstand the constant presence of others on the public scene; it undergirds the public by establishing boundaries, which fix identity; and it preserves the sacred and mysterious spaces of life.  Some phenomena are different if they are not private; confessions of shame or guilt made public become boastful; over-disclosure becomes false; terror, a guilty secret; love and goodness are destroyed.”(2)  The psychological benefits of privacy are important to individuals and their personal development.  If individuals benefit from the availability of privacy, one could logically come to the conclusion society as a whole benefits from it as well.

      I should have rights to my individual intellectual property (the information I produce, regardless of its origin), access to information and choices about what I choose to ingest (to include food and medicine), freedom to choose how I make positive impact with my life, as well as how (and under what circumstances) I spend my money.  Privacy, or the perceived lack of it, plays a crucial role in how we exercise these rights within society.  Indeed, “the concept of privacy also matters for another, deeper reason.  It is intimately connected to what it is to be an autonomous person.”(3)  A surveillance state, in which privacy does not exist, affects the social psychology of its citizens, their autonomy, stunts honest creativity, and negatively impacts important catalysts for change in social institutions.


(4)

      Since the time I began taking an interest in information security, corporate information brokers and United States government privacy policy posturing do not subscribe to the concept of private matters.  They are, in fact, so against the concept that many hacktivists who have exposed poor corporate security have been imprisoned under unusual conditions.(5)(6)  Famous whistleblowers who have played a part in exposing government surveillance,(7) service-members’ blatant disregard for human life are either seeking asylum in foreign countries or are imprisoned under harsh sentences and branded as traitors.  Additionally, the technologies, forums, and groups associated with these alleged crimes (The Onion Router (TOR) network, Bitcoin, the Silk Road, and online Anonymous collective) endure an interminable onslaught of media criticism and smear campaigns; this distorts the social lens through which these entities are observed and warps the public perception of people who believe online anonymity and privacy are fundamental human rights.

As an American citizen, these are people and situations I would like to be aware of.  I want to know if the details of my personal life are being recorded, if they’re analyzed and the nature of that data’s format, and what that information will be used for.  I am creating the data; therefore I should have the right to keep it private, unless I am under the scrutiny of a legitimate criminal investigation.


(8)

      “If you’re a non-criminal, you don’t need anonymous, untraceable financial transactions.  Or you could use cash, which is still almost completely anonymous.  But criminals have a different problem when it comes to cash.  Once your criminal business becomes successful, say from dealing drugs or running sex slaves or poaching rhinos, then the cash really starts to pile up.”(9)  To that, I would like to retort without an academic reference: it is a known fact that even socially sanctioned technologies are used to commit these crimes.  Cellular telephones and printed money are used in drug and human trafficking every day.  If these new, anonymity technologies are as detrimental to society as the media portrays them to be, why did two law Drug Enforcement Administration (DEA) agents steal $800,000 in Bitcoin during the Silk Road investigation?(10)(11)  If Bitcoin is considered a “currency for criminals,” I would think public officials would have no interest in maintaining vast personal stockpiles of it; not unless they’re dealing drugs, running sex slaves, or poaching rhinos.


(12)
Because I openly use Bitcoin, does this somehow indicate I am implicated in criminal activity?  If so, would the sociological way people view my hobby be different if Bitcoin were painted under a different light by the media?  I believe so.

      Bitcoin is an unregulated, digital currency that uses a decentralized monetary system built on complex encryption algorithms.  What is fascinating about Bitcoin is that it records each transaction in a public ledger called the “blockchain,” which is fed back into the encryption algorithm that keeps Bitcoin user identities secure.  Each time a user conducts a transaction they are charged a “mining fee” to compute the transaction.  The transaction is “hashed” (transaction information is shortened into a numerical, mathematic equivalent) and an exchange event is created based on the time of the transaction, currency exchange amount, “wallet” (or Bitcoin account) number, among other electronic details.  This hash is recorded into the Bitcoin blockchain by Bitcoin “miners” (individuals who purchase Bitcoin transaction processing hardware to collecting mining fees), to be used in deriving hashes for use in future transactions.  The user is also issued a new, uniquely random wallet (or account) number after each transaction, and old wallet number is discarded.  Condensing the previous paragraph was no easy task, but by comparison, the electronic function of Bitcoin is even more mind-bogglingly complex.


(13)
Bitcoin has come under scrutiny because of its decentralized nature, “lack of clarity about its legal structure,” and “creates challenges for regulatory authorities.”(14)  Comprehensively, Bitcoin derives its value from the dollars exchanged into the blockchain, but ultimately from the perceived level of privacy it can provide to its users regardless of structure or regulation.
Recently, a prominent Bitcoin dealer began “stress testing” the Bitcoin blockchain by introducing a large volume of transactions that were of little value; they were of less value than the mining fee collected by Bitcoin miners, which put significant strain on the blockchain transaction network.(15)  Since the stress tests began, the Bitcoin software development core engineers have been submitting proposals to expand the transaction capability of the Bitcoin network.(16)
Anyone who enjoyed profitable Bitcoin trading in the first half of this year woke to bad news on July 11, 2015, after Bitcoin reached a peak of $310.00 for the 2015 year.  Investors watched Bitcoin’s value slide and by August the currency had been devalued by nearly a third to $213.00.
 

(17)
The devaluation indicates two important points about anonymity services: first, there is nothing broken about the Bitcoin blockchain except that its core functional promise of anonymity and privacy had been undermined.  Second, while it is encouraging that Bitcoin’s Developer Core is addressing the problem through Bitcoin Improvement Proposals (BIP), at least one of the proposals would utilize a software mechanism (called a “hard XT fork”) that could potentially reveal a user’s identity or location, while also exposing users of an online anonymity service called The Onion Router (Tor) network.(18)  Proposals of this type caused the Bitcoin to lose value even more drastically than anticipated, and sewed distrust amongst Tor users.

As an example of monetary values placed on anonymizing services and their related software, Bitcoin is only one product.  The entire situation implicates it in an entirely new arena of online anonymity: a human’s right to privacy on the Internet.
      The Onion Router (Tor) anonymity network comes bundled in a powerful suite of privacy and encryption software named TAILS Linux.  Tor circumvents typical Internet Protocol (IP) address assignment methods and makes it appear as if the user’s computer is located in another country.
There is an ambiguous controversy surrounding Tor.  On one hand, the infamous illicit drug market Silk Road was built using Tor technology.  On the other hand, this technology is immeasurably valuable in protecting activists, “journalists, whistleblowers, domestic abuse victims, and dissidents living under repressive regimes.”(19)

Within the computer science field, it is rumored that United States federal agencies have attempted to arrest control of (at least parts of) the Tor network.  As a skeptic, I tentatively dismissed these rumors as conspiracy theories and consigned them to the back of my head for use in a future information security thriller novel.  However, on September 10, 2015, an article was published describing the interaction between a library in New Hampshire that wanted to offer Tor services to its patrons, and the Department of Homeland Security (DHS).  I whole-heartedly agree with the library’s position, even if Tor is merely used for educational purposes within the library.  I was baffled at the reasons for DHS’s reservation in allowing the library to offer Tor services; DHS spokesman Shawn Neudauer was quoted in the article, saying “the protections that Tor offers can be attractive to criminal enterprises or actors and HSI [Homeland Security Investigations] will continue to pursue those individuals who seek to use the anonymizing technology to further their illicit activity.”(20)
While I was reading the article, I asked myself why citizens of the city were not being asked to offer their opinions on the issue.  Near the bottom, the library’s director reflected my concerns, saying “we need to find out what the community thinks.  The only groups that have been represented so far are the Police Department and City Hall.”  The article was updated on September 16, 2015, mentioning the “overwhelming support from the community to restart its participation in the anonymous Web browsing project.”(21)


(22)
The library board Chairman Francis Oscadal, at a meeting about the Tor service, said “with any freedom there is risk, it came to me that I could vote in favor of the good… or I could vote against the bad.  I’d rather vote for the good because there is value to this.”(23)  The community support for Tor is just a small example of public interest in anonymity technology.  Another, much broader example of public interest in anonymity, clothed as a global sociological Internet movement, is the group Anonymous.


(24)
Anonymous is an Internet collective with no central leadership, which uses its vast membership and a number ideological propinquities found within its members to carry out vigilante forms of social justice.  They were founded within the Internet message board 4chan.org and evolved into the first Internet collective to physically protest in the streets while conducting disruptive operations online simultaneously.


(25)
I agree that a portion of Anonymous’ activities, both on and off-line, are morally questionable.  Modern Anonymous is fractured and misdirected, but there must be a social mechanism that is not being fulfilled elsewhere if so many citizens flock to its ranks.  Dabbling in Anonymous’ communications, even momentarily, reveals a jarring (but often respectable) point of view that seeks to be a new type of online “agent of socialization” by bringing attention to issues of racial discrimination, animal cruelty, pedophilia, government overreach, and the atrocities of war.(26)
 
  

(27)
If nothing else, it seems the collective thrust of its members is to burst the bubble of comfort that citizens surround themselves with, in a much less-carefully packaged material than is delivered from main-stream media companies.  Media produced by Anonymous often depicts the Guy Fawkes mask wearing activists as typical people, powerfully poised to restore justice and power to the common citizen.


(28)
In 2011, a prominent member of Anonymous and co-founder of the infamous hacking group LulzSec(29) became an informant for the United States Federal Bureau of Investigation (FBI).(30)  Other members who chose to “unmask” themselves became targets of law enforcement sting operations, which led to a convoluted string of convictions under questionable circumstances.(31)(32)(33)


(34)
Why does fear of unknown, and recently-invented methods of social construction and digital protest illicit such a fierce response from authority?  Dissenting opinion and competition between ideas is healthy for the development of more enlightened ideas and social change, but also seem to provide enough “evidence” of crimes by Internet security activists, privacy advocates, and disruptive journalists to convict them, geographically banish them, or place them in solitary confinement.  Not only does this disrupt the communications for prominent advocates for these technologies, but it distorts the sociological narrative of remaining members by inciting fear and self-censorship.

If so many people subscribe to these collective values, why are they not spoken about publicly and encouraged as a contradictory point of view in wider debate?  My belief is, they challenge the purpose and roles of long-standing social institutions (such as government, the war on drugs, the monetary system, and war in general), change the dynamics of typical roles within a society, and in some ways it puts power back into the hands of members of society when they cannot be pursued or prosecuted for their most genuine beliefs unless they reveal their identities. 

      Within the complex debate of one’s right to privacy, the point is often lost between the laws of the land and the responsibilities and roles of citizens within society.  This causes an ambiguously poignant, yet sometimes hopeful paroxysm in what I feel my role is within society: to be unafraid, give a second look to technology that protects the human rights of individuals, and educate others in this technology’s intended utility.

      The Internet isn't going away.  Human beings will continue to use it to socially organize, to express our concerns, and our most fervent hopes.


(35)



Works Cited:
(1) Grabpage.info (n.d.) Privacy Banner. [computer generated graphic]. Retrieved from http://grabpage.info/t/www.bing.com:80/images/search?q=Entrepreneurial+Consulting+Services+Banner&FORM=RESTAB

(2) Ardendt, H. (1958). The Human Condition.  Chicago: University of Chicago Press.

(3) Lynch, M. P. (June 22, 2013). Privacy and the Threat to the Self.  Retrieved from http://opinionator.blogs.nytimes.com/2013/06/22/privacy-and-the-threat-to-the-self/?_r=0

(4) Alienteitsolutions.net (n.d.) Privacy Banner. [photograph, computer generated graphic]. Retrieved from http://www.alienteitsolutions.net/wp-content/uploads/2015/06/privacy_banner_img_large.jpg

(5) Farivar, C. (April 6, 2015). Barrett Brown Suddenly Stripped of Prison e-mail After Talking to Press. Retrieved from http://arstechnica.com/tech-policy/2015/04/barrett-brown-suddenly-stripped-of-prison-e-mail-after-talking-to-press/

(6) Rozsa, M. (June 24, 2015). Solitary Confinement is Torture.  Retrieved from http://www.dailydot.com/opinion/solitary-confinement-mental-illness-barrett-brown/

(7) Bamford, J. (August 8, 2013). Edward Snowden: The Untold Story. Retrieved from http://www.wired.com/2014/08/edward-snowden/

(8) Wired Magazine (September 2014) Cover2. [magazine cover, photograph]. Retrieved from http://www.wired.com/wp-content/uploads/2014/08/cover2.png

(9) Moss, S. (July 13, 2010). Julian Assange: The Whistleblower. Retrieved http://www.theguardian.com/media/2010/jul/14/julian-assange-whistleblower-wikileaks

(10) Jeong, S. (April 17, 2015). Could the Crimes of Two Corrupt Agents Free Ross Ulbricht? Retrieved from http://www.forbes.com/sites/sarahjeong/2015/04/17/could-the-crimes-of-two-corrupt-agents-free-ross-ulbricht/

(11) Greenberg, A. (March 30, 2015). DEA Agent Charged With Acting as a Paid Mole for Silk Road. Retrieved from http://www.wired.com/2015/03/dea-agent-charged-acting-paid-mole-silk-road/

(12) BTCNews.com.au (n.d.) Handcuffs and Bitcoin Props. [photograph]. Retrieved from http://btcnews.com.au/banks-warn-bitcoin-poses-potential-terrorist-threat.html

(13) Wired Magazine (n.d.) Bitcoin Artwork. [computer generated image]. Retrieved from http://www.wired.co.uk/news/archive/2015-08/03/bitcoin-users-criminals-computer-programmers-study

(14) Shcherbak, S. (2014). How Should Bitcoin Be Regulated? Retrieved from http://www.ejls.eu/15/183UK.pdf

(15) Buntinx, J. P. (September 16, 2015). CoinWallet Keeps Stress Testing Bitcoin Network Indirectly. Retrieved from http://digitalmoneytimes.com/crypto-news/coinwallet-keeps-stress-testing-bitcoin-network-indirectly/

(16) Genjix (September 19, 2015). Bitcoin Improvement Proposals. Retrieved from https://en.bitcoin.it/wiki/Bitcoin_Improvement_Proposals

(17) CoinBase (September 14, 2015) CoinBase Currency Comparison Before and After the XT Fork Bitcoin Improvement Proposal (BIP). [Chart screen-shots]. Retrieved from https://www.coinbase.com/charts

(18) Galt, J. S. (August 20, 2015). Bitcoin XT Fork Can ‘Blacklist’ Tor Exits, May Reveal Users’ IP Addresses. Retrieved from http://cointelegraph.com/news/115153/bitcoin-xt-fork-can-blacklist-tor-exits-may-reveal-users-ip-addresses

(19) Smith, G. (August 19, 2013). Meet Tor, The Military-Made Privacy Network That Counts Edward Snowden As A Fan. Retrieved from http://www.huffingtonpost.com/2013/07/18/tor-snowden_n_3610370.html

(20) Angwin, J. (September 10, 2015). First Library to Support Anonymous Internet Browsing Effort Stops After DHS Email. Retrieved from https://www.propublica.org/article/library-support-anonymous-internet-browsing-effort-stops-after-dhs-email

(21) Biello, P. (September 16, 2015). N.H. Public Library Reconsiders Support For Anonymous Internet Network Tor. Retrieved from http://www.npr.org/2015/09/16/440914105/n-h-public-library-reconsiders-support-for-anonymous-internet-network-tor

(22) ProPublica.org (September 10, 2015) Library Tor. [photograph]. Retrieved from https://www.propublica.org/images/ngen/gypsy_og_image/20150910-library-tor-1200x630.jpg

(23) Doyle-Burr, N. (September 16, 2015). Despite Law Enforcement Concerns, Lebanon Board Will Reactivate Privacy Network Tor at Kilton Library. Retrieved from http://www.vnews.com/home/18620952-95/despite-law-enforcement-concerns-lebanon-board-will-reactivate-privacy-network-tor-at-kilton-library



(26) Newman, D. M. (2014). Sociology: Exploring the Architecture of Everyday Life (10th Edition). p. 134. SAGE Publications, Inc. ISBN 978-1-4522-7594-9.

(27) DigitalJournal (February 23, 2014) Old Screen Shot (Website Has Since Changed). [screen shot] Retrieved from http://www.digitaljournal.com/news/world/facebook-pedophiles-being-exposed-by-anonymous/article/372667

(28) elRobotPescador.com (July 20, 2015) Anonymous. [photograph] Retrieved from http://i.ytimg.com/vi/jrCDJfiI7vw/maxresdefault.jpg

(29) Olsen, P. (2012). We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. Little, Brown. p. 248. ISBN 978-0-316-21354-7.

(30) Pilkington, E. (December 9, 2014). Anonymous Superhacker Turned FBI Informant Sabu Remains Defiant Over Snitching. Retrieved from http://www.theguardian.com/us-news/2014/dec/09/hacker-sabu-defends-informing-anonymous-fbi-interview

(31) Hankoff, N. (March 16, 2015). Bilk Road: The Unconstitutional Trial of Ross Ulbricht. Retrieved from http://www.voicesofliberty.com/article/bilk-road-the-unconstitutional-trial-of-ross-ulbricht/

(32) Mian, R. (April 4, 2014). Barrett Brown: American Journalist, Whistleblower & Prisoner. Retrieved from https://www.longislandpress.com/2014/04/04/barrett-brown-american-journalist-whistleblower-prisoner/

(33) Newman, A. (November 18, 2013). Activist hacker Hammond Slams Government Crimes at Sentencing. Retrieved from http://www.thenewamerican.com/usnews/crime/item/16973-activist-hacker-hammond-slams-government-crimes-at-sentencing

(34) IBTimes.co.uk (n.d.) Anonymous Mask. [photograph] Retrieved from http://d.ibtimes.co.uk/en/full/1390974/anonymous-mask-tayeb-abu-shehada.png?w=198&h=135&l=50&t=40


(35) ABC News (January 7, 2015). Je Suis Charlie: Not Afraid. [photograph] Retrieved from http://a.abcnews.go.com/images/International/ap_paris_shooting_12_kb_150107_1_16x9_992.jpg

Monday, July 13, 2015

Ethics of Harnessing Crowd-Sourcing Technologies

Ethics of Harnessing Crowd-Sourced Technologies

     I have always been in awe of the collective power created by connecting people through the Internet.  Part of these incredibly potent abilities comes from crowd-sourcing.  Crowd-sourcing is the collective accomplishment of a task by giving a group of people small segments of work to be completed.  When each piece of work is completed, the individual parts are reassembled into a functioning product or information utility.  Examples of this are seen in crowd-funding, social networking, and the assignment of metadata to digital information to create meaningful content.

     When “Web 2.0” was built, the function of the Internet shifted.  In 2006, Time Magazine chose “You” as the person of the year because of the amount of useful information being produced by the general population.  Seamlessly, all around us all the time, we create information that is collectively changing the world.  Some of the smallest things we do on the Internet are having the largest impacts.  If we are the primary creators of Internet content, interesting ethical questions arise when owners of crowd-sourced products use our collective accomplishments in ways we did not intend.  Technology continues to pervade the most intimate aspects of our lives rapidly and lawmakers scramble to keep abreast of this development.  An important, modern, poorly documented and sparsely discussed question arises: If we produce so much valuable content, how much of the created products do we actually own and what is the difference between ethical and unethical use of information we create?

     One of the positive examples of crowd-sourcing I mentioned is the reCAPTCHA (Completely Automated Public Turn test to tell Computers and Humans Apart) project owned and run by Google.  Google uses reCAPTCHA information for a variety of projects, to include Google Books.  It is in the process of digitizing scans of books for wider availability and distribution.  Google Maps is in the process of tagging numbered addresses to be used on Google Maps and Google Street View.

     Google uses high resolution digital cameras and software called Optical Character Recognition (OCR) when it scans books or addresses.  Words and numbers the OCR software cannot identify are sent to reCAPTCHA on websites to be translated by humans.  Luis Von Ahn, co-creator of reCAPTCHA says “According to our estimates, humans around the world type more than 100 million CAPTCHAs every day” (“ReCAPTCHA: Human-Based Character Recognition via Web Security Measures,” 2008).

     Based on Mr. Von Ahn’s estimates of how many reCAPTCHAs are processed per day, the following chart shows how long it would take to digitize famous literary works:



Figure 1:  According to Luis Von Ahn, co-founder of reCAPTCHA, how long it would take to digital famous novels based on their world counts and daily reCAPTCHA usage statistics.  Data source: www.commonplacebook.com, “Word Count for Famous Novels”: http://commonplacebook.com/culture/literature/books/word-count-for-famous-novels/

     I excluded data on my graph about the 44 million words included in the Encyclopedia Britannica because the data dwarfs the other page counts. If reCAPTCHA focused the output of all its users on digitizing the Encyclopedia Britannica, our collective effort would transcribe its data in less than twelve hours. This is an immensely powerful tool for the enrichment and dissemination of human knowledge, but it also provides useful benefits to its users.

     The security created by reCAPTCHA prevents fake accounts and bot programs from flooding Internet websites with Spam. Words and number sequences correctly identified by users are collected by Google. This information is used to complete books and maps, strengthening the usability of Google’s products. In my opinion, this is a great use of crowd-sourcing because both the users and the company providing the service both equally benefit. I found another product that leveraged the unique qualities of crowd-sourced information for more secretive, ethically ambiguous reasons.

     The majority of Facebook’s content is created by its users. Wall Street will disagree with me, but I believe Facebook’s value is determined by its customers. If Facebook didn’t have users to create content for the site, it would be an online advertising billboard; I wouldn’t visit. I assumed a website dependent on its customers for the existence of its business would be transparent and forthcoming when dealing with crowd-sourced information.

     I vaguely remembered a story that broke in the news about Facebook manipulating user’s feeds for some kind of psychological experiment. During my research, I came across the original study and read it in its entirety. What I found was a terrifying example of crowd-sourcing gone wrong. According to a study published in the National Academy of Sciences (“Experimental Evidence of Massive-scale Emotional Contagion Through Social Networks,” 2014), English Facebook users were selected and the “experiment manipulated the extent to which people were exposed to emotional expressions in their News Feed. This tested whether exposure to emotions led people to change their own posting behaviors, in particular whether exposure to emotional content led people to post content that was consistent with the exposure—thereby testing whether exposure to verbal affective expressions leads to similar verbal expressions, a form of emotional contagion.”

     In 2014, the study famously brought to light a peculiar social experiment being conducted by Facebook. In summary, Facebook crowd-sourced its users to test the propagation of “emotional contagions” (i.e. contentment, depression, happiness, anger) based on posts from Facebook user walls. Experiences with Facebook were deliberately distorted, evoking measurable positive or negative emotional responses in users who conveyed their feelings as new posts. This user-generated data further manipulated the moods of others involved in the project. Facebook users were oblivious to the experiment until the story broke in 2014. The reaction of the public was disappointing and became as fleeting as the Facebook timelines it was manipulating.

     As a user of social media, I am alarmed research like this is being conducted at all. I ponder what purpose it serves. It is an unsettling feeling to second guess if what I see on social media is a genuine representation of my personal network of friends and family. It is also concerns me that my colleagues, friends, and relatives may perceive my digital persona inaccurately if Facebook is manipulating my data for frivolous social experiments. Were any of my posts distributed or weighted differently with unfair bias, possibly casting me in an unfavorable light with people I work with, trust, and love?

     Most concerning, I do not recall an option to opt in or out of the experiment (other than to stop using Facebook or learn another language besides English). It is also interesting to point out Facebook has since introduced a new suicide hotline function on their website, only after the experiment was brought to light. The value of this tool in saving human life will prove to be invaluable, but I wonder if it doesn’t serve another purpose to deflect possible litigation hinged on public knowledge of Facebook’s experiment.

     Even in 1942, Doctors and ethics professionals had a clear vision of the parameters in which to conduct their experiments on human beings. Dr. A.N. Richards, chairman of the University of Pennsylvania School of Medicine explained in a letter that “when any risks are involved, volunteers only should be utilized as subjects, and these only after the risks have been fully explained and after signed statements have been obtained which shall prove that the volunteer offered his services with full knowledge and that claims for damages will be waived. An accurate record should be kept of the terms in which the risks involved were described” (Richards, 1942).

     The experiment Dr. Richards is referring to was a bioethics experiment during World War II, but the intent of his words applies today. The spirit of responsibility and accountability is undeniable in this decades old correspondence; so what happened? What thought processes took place in the designers of Facebook’s experiment? What made them believe they could bypass regulation, conduct emotional research, misinform their consumers, and conceal the purpose of their research. The most disconcerting aspect of the whole situation is from Facebook’s users: silence.

     It is my position that legal, ethical crowd-sourcing will positively change the Internet and many of its associated products. Clever uses of crowd-sourcing will continue to be an engine for the accomplishment of undesirable, menial tasks for the benefit of a broader consumer base. With oversight and careful consideration of data quality, crowd-sourcing can construct literal libraries of useful information. A dangerous line is crossed when consumers are not made aware of how their digital personas are manipulated, for any reason. This practice sows distrust between consumers and ultimately undermines a company’s business when they exercise unethical liberties on their users.


References:

Von Ahn, L., Maurer, B., Mcmillen, C., Abraham, D., & Blum, M. (2008). “ReCAPTCHA: Human-Based Character Recognition via Web Security Measures.” Science, 321(5895), 1465-1468.

Kramer, Adam D. I., Guillory, Jamie E., and Hancock, Jeffrey T. (2014) "Experimental Evidence of Massive-Scale Emotional Contagion Through Social Networks." Proceedings of the National Academy of Sciences of the United States of America 111.24 (2014) http://www.pnas.org/.

Richards, A. N., (1942) “Reply of A. N. Richards, Chaiman, To Dr. J. E. Moore” Reproduction of the National Archives.  http://bioethics.gov/sites/default/files/NARA-II_0000132.pdf

Sunday, July 12, 2015

SilentVector33: July 5 - 12, 2015 Digest

Hacking Team - July 5, 2015



On July 5, 2015 Italian-based information security company Hacking Team (@HackingTeam) was breached.  400GB of software, email traffic, and internal details of the company's operations were leaked through links tweeted on its own Twitter account.  Embarrassing, indeed.  But embarrassment was the least of the company's problems until WikiLeaks published the information and pumped it through Twitter, where thousands of skilled information managers began to dissect it.



The online machinations of Twitter information security professionals may not pique your interest, but it should.  The trove of information gleaned from these accounts has much to do with the everyday Internet user.  Hacking Team's scope of operations is frightening, invades your privacy, and whether you like it or not, brings dangerous software and its effects directly into your living room.



Hacking Team Privacy Implications


Potentially dangerous implications of this type have not been revealed since Edward Snowden fled the country after revealing the inner-workings of the Prism project, directed by the United States National Security Agency.  If you have ever watched a YouTube video, accessed your banking or utilities statements online, the revelations of the Hacking Team's exploits could have potentially uncovered your identity.



The source for concern is born from a skilled computer security professional's ability to trace Hacking Team's business dealings back to Symantec Corporation.  Symantec is one of the keystone organizations that provides security for the everyday Internet user.  They are partnered with Norton Antivirus and Spyware Removal; some of the most trusted and connected computer security companies in the world.  Most modern computers ship with a version of the Microsoft Windows operating system already installed; Microsoft has a close corporate relationship with both Symantec and Norton Security.


To break it down, there are several different types of internet security certificates issued to reputable companies to do business online.  One is a Secure Socket Layer (SSL) certificate that assists in encrypting your private communications when you deal with your bank (that "lock" icon displayed in your web browser is an example).  
Hacking Team was given a "code signing" certificate, which according to Symantec "will help protect users from downloading compromised files or applications."  This includes "vetting and approval of software publishers, code signing, key protection, revocation, administrative controls and audit logs.  This cloud-based service also features unique or rotating keys to sign apps and centralized protection in Symantec's military-grade data centers."

If you have read Hacking Team's list of clients, that statement is terrifying.  Their clients include the governments of Mexico, Sudan, Morocco, and the United Arab Emirates.  Also listed on their client list are the United States Federal Bureau of Investigation (code named "Phoebe") and the Department of External Affairs (code named "Katie").  If you examine the human rights violations and government corruption of some of the countries on their client list, it is not difficult to question the purpose of their dealings with the United States.

Even more disturbing are file systems found within Hacking Team's leaks which contain traces of child pornography files, installed covertly on the systems of their company's targets.  Coding within their leaked documents shows executable malicious code capable of remotely installing these files on a target computer, which would make an open-and-shut case easily possible, but absolutely illegal.  According to American constitutional law, the execution of this code would be a violation of 4th Amendment rights if a warrant was executed by these means.

Further, all of this code is now in the hands of whomever visits the WikiLeaks website.  The initial breach was exploited because of the most fundamental security flaw imaginable: the CEO of Hacking Team's account was laughably protected by a simple aberration of the word "password."  When you continue reading this, remember that this malicious code and the "professionals" that produced it are still at large.

"Cyber-war"

According to wired.com, the events that took place on July 8, 2015 are the equivalent of a cyber-war.  United Airlines grounded all flights, the New York Stock Exchange was taken offline for three-and-a-half hours, and the Wall Street Journal's website was taken down.  Isn't it interesting only three days after the largest IT upset (that did not make the evening news) since 2013 was followed by a huge information outage only three days later, after the Hacking Team's malicious files were released to the Internet?  No one is talking about this.

The government's official statement was that they did not suspect "malicious actors" were responsible for the NYSE computer crash.  Many media outlets blamed a so-called "Black Squirrel" incident, similar to ones that have crashed Wall Street's computer systems in previous years.

From a security perspective, it is now known that the New York Stock Exchange does not immediately route the most current trading data to its floor in the event of a data interruption.  Arguably, the most powerful financial network in the western hemisphere can be crashed by miscreant squirrels chewing through random wires.  Why backup systems, isolated from one another in quadruplicate are not prepared to process this critical financial data are not in place, makes me question the validity of the entire day's events as reported in the press.  Either the reports are faulty, or the information security professionals they hire are inept to plan for such occurrences.

These are not "technical glitches" like hiccups in your Internet connection.  If they are so simple to explain, Wall Street should take a hard look a how they occur and inform the public so their taxes can be better spent defending our infrastructure.



Greece & BitCoin


Because of the ongoing financial crisis in Greece, Bitcoin continues to improve performance.  At the time of publishing this article, @Bitcoin10min reports from July 6 - July 12:


July 6 = $271.59 | €249.09 | ¥1699.32 | £181.93

1h -0.84% | 1d +0.34% | 7d +5.97% | 1m +19.89%



$311.06 | €280.63 | ¥1974.55 | £207.15

1h +1.16% | 1d +6.19% | 7d +14.59% | 1m +33.84%

A $1000USD investment would have yielded $338.40USD since July 6, 2015.

Because of bank closures and the inability to withdraw money from Greek financial institutions, many Greeks have abandoned the Euro to seek shelter in BitCoin.  Price is expected to stay nearly level, with a slight increase as negotiations between Greece and the European Union continue.

Ghost Security & OpISIS


Operations continue between #GhostSec and their initiative, #OpISIS against the Islamic State.  GhostSec uses a unique reporting system, through a handle named the Controlling Section (#CtrlSec) to wage war against the propaganda machine ISIS continues to attempt to maneuver.

In the news, there are often reports of citizens being duped online, crossing borders, and ultimately assisting the Islamic State.  You, reading this right now, you have a voice.  Follow #CtrlSec and get involved.

Former United States Veterans, you can assist in the fight against ISIS by volunteering your skills.  Visit www.ghostsec.org for more information.