” The National Security Agency has been collecting contacts from people’s personal e-mail address books and instant messaging accounts in an effort to detect relationships that might be crucial to government security, the Washington Post is reporting.
The agency is collecting the data from overseas points and many of the contacts belong to Americans, the Post reports.
The Post bases its report on word from senior intelligence officials and top secret documents, including a Microsoft PowerPoint presentation, provided by former NSA contractor Edward Snowden..
The majority of the contacts harvested come from Yahoo and Hotmail accounts, but others also come from Facebook, Google and unspecified other providers, the Post reports. The contacts amount to a sizeable portion of the world’s e-mail and instant messaging accounts, according to the news organization.”
Tag Archive: Social Media
” The US National Security Agency has been spying on the social media profiles of an unknown number of users, including US citizens, since 2010 in what it calls an effort to “discover and track” connections between Americans and suspected terrorists.The New York Times reported Sunday that the latest revelation of NSA spying on Americans comes via documents provided to the paper by former NSA whistleblower Edward Snowden, who is wanted by the United States on espionage charges and is currently living in exile in Russia.
Under the new policy, the NSA is allowed to use social media, geo-location information, tax and insurance records, and other sources, both public and private, to improve spying on phone and electronic communications. The newly leaked documents reveal that the NSA authorized the “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every identifier, such as e-mail addresses and phone numbers.”
” A school in California has hired Geo Listening Company to begin tracking their 13,000 students through social media. Glendale Unified School District, in Los Angeles County, claims this is to crack down on law-breaking, bullying, and other harmful activities. At the price of $40,000 tax payer dollars they better be catching some serious bullies.
“All of the individual posts we monitor on social media networks are already made public by the students themselves. Therefore, no privacy is violated,” Geo Listening Company said, adding it does not “monitor email, SMS, MMS, phone calls, voicemails or unlock any privacy setting of a social network user.”
It claims it can track “bullying, cyber-bullying, despair, hate, harm, crime, vandalism, substance abuse, truancy” and much more, using popular services like Twitter, Facebook, Instagram, Picasa, Vine, Flickr, Ask.fm, YouTube, Google+ or anywhere else where people share information voluntarily.”
” Who would have known that the popularity of blogs would grow to reach such mammoth levels.
Social media has revolutionized the way we communicate, share and interact and this has provided the platforms and the marketing networks for bloggers to achieve global reach and influence.
Blogs such as Huffington Post, Mashable and Gawker now rank in the top 1,000 websites in the world.
This publishing revolution has in turn led to the increase in the popularity of “Blogger Outreach” programs. While the online community remains divided upon their opinions about this new age marketing strategy (some calling it a PR gimmick), others maintain that it is merely a symbiotic channel to further strengthen the relationships.”
” More than 200 teens descended upon a mall parking lot in Lauderhill, Fla., called by Facebook and Twitter to a fight that forced the partial closure of the mall Tuesday afternoon.
The trouble apparently began across the street from the shopping center, and grew as word spread on social media.
“I just heard that anybody that had beef with each other is supposed to come over here and fight,” said Frank Francis, a witness to the fight.
“People was getting hit by [traffic] cones,” Francis said. “Like fighting, like a brawl.”
” Ship shaped Hotel in S. Korea (Sun Cruise in Jungdongjin)”
Assuming that your data is being watched, what might you do to hide it?
First, consider not putting so much stuff out there in the first place. Wuergler devised a program he calls Stalker that can siphon off nearly all of your digital information to put together an amazingly complete portrait of your life and pretty much find out where you are at all times. Use Facebook if you must, but realize you’re making it easy for the government to track and find you when they choose to do so.
A second step toward increased privacy is to use a browser like DuckDuckGo, which does not collect the sort of information—say, your IP address—that can identify you with your Internet searches. Thus, if the government bangs on their doors to find out what you’ve been up to, DuckDuckGo has nothing to hand over. I have decided to make DuckDuckGo my default for general browsing, turning to Google only for items such as breaking news and scholarly articles. (Presumably, the NSA would be able to tap into my searches on DuckDuckGo in real time.)
Third, TOR offers free software and a network of relays that can shield your location from prying eyes. TOR operates by bouncing your emails and files around the Internet through encrypted relays. Anyone intercepting your message once it exits a TOR relay cannot trace it back to your computer and your physical location. TOR is used by dissidents and journalists around the world. On the downside, in my experience it operates more slowly than, say, Google.”
Aerial View Of Taksim Square
” The mainstream media has yet to highlight the protests. Meanwhile, police brutality continues as over 900 people have been arrested and several have been killed.”
Blood in the Streets Of Istanbul
” Here are thirteen pictures from Twitter that show why we should take offense with mainstream media for not covering what could become an historic event.”
Editor’s Note : This story first appeared a year ago but we missed it . However , in light of recent revelations regarding what seems to be normal procedure for various agencies of the federal government we thought it would be of interest to our readers .
Dept. of Homeland Security Forced To Release List Of Keywords Used To Monitor Social Networking Sites
” In a story appearing earlier today on the U.K’s Daily Mail website, it was reported that the DHS has been forced to release a list of keywords and phrases it uses to monitor various social networking sites. The list provides a glimpse into what DHS describes as “signs of terrorist or other threats against the U.S.”
The list was posted by the Electronic Privacy Information Center who filed a request under the Freedom of Information Act, before suing to obtain the release of the documents. The documents were part of the department’s 2011 ’Analyst’s Desktop Binder‘ used by workers at their National Operations Center which instructs workers to identify ‘media reports that reflect adversely on DHS and response activities’.”
” (Update 1: Reading through the Desktop Binder, I discovered the DHS Twitter account is @dhsnocmmc1 and DHS appears to be using tweetdeck to monitor the various keywords. See Page 38 – Also interesting to note they seem to be using a Mac Mini as a server, and no password vaults. All Passwords appear to be shared in a plain text word document.)
(Update 2: On page 37, DHS instructs analysts to accept invalid SSL certificates forever without verification. Although invalid SSL warnings often appear in benign situations, they can also signal a man-in-the-middle attack.Not a good practice for the security conscience. Thanks to @obra on twitter for the tip.)”
Here are some of the keywords DHS is monitoring . Go here to see the whole list and read the DHS Desktop Binder.
Read up on how your government is reading your stuff
” The U.S. Department of Justice and the FBI believe they don’t need a search warrant to review Americans’ e-mails, Facebook chats, Twitter direct messages, and other private files, internal documents reveal.
Government documents obtained by the American Civil Liberties Union and provided to CNET show a split over electronic privacy rights within the Obama administration, with Justice Department prosecutors and investigators privately insisting they’re not legally required to obtain search warrants for e-mail. The IRS, on the other hand, publicly said last month that it would abandon a controversial policy that claimed it could get warrantless access to e-mail correspondence.”
” CBS anchor Scott Pelley said at a speech at Quinnipiac University that journalists “are getting big stories wrong, over and over again.”
“Our house is on fire,” said Pelley. The video of Pelley’s speech is courtesy of nowthisnews.com.
“These have been a bad few months for journalism,” he added. “We’re getting the big stories wrong, over and over again.” “
- CBS Anchor: ‘We Are Getting Big Stories Wrong, Over and Over Again’ (globalelite.tv)
- CBS Anchor: ‘We Are Getting Big Stories Wrong, Over and Over Again’ (weeklystandard.com)
- CBS anchor: ‘Big stories wrong, over and over again’ (wnd.com)
- CBS Anchor: ‘We Are Getting Big Stories Wrong, Over and Over Again’ (fromthetrenchesworldreport.com)
- CBS Anchor Pelley: ‘We Are Getting Big Stories Wrong, Over and Over Again’ (ijreview.com)
” That’s Sun Sports Rays reporter Kelly Nash at Fenway Park in Boston on Saturday. During batting practice, she decided to snap a picture of herself at the historic ball field. Her producer had warned her earlier that the balls were flying pretty close, but Nash decided to take a chance. She explains what happened next.”
Tamerlan Tsarnaev Had A Youtube Channel
” Steve Emerson, terrorism expert, on FOX speaking about the two Boston Bombers and saying they are Jihadists who both had youtube sites with very bloody videos against all non-muslims. They are jihadists against Russians and Americans. They speak of martyrdom when killing the infidel. Here is the youtube channel for the older brother who had posted 22 videos of this type in the last 3 years.”
“ BroBible has confirmed with more than one of his classmates that the Twitter account @j_tsar is owned by the one remaining Boston Marathon Bomber, Dzhokhar A. Tsarnaev.
Some of the tweets are rather noteworthy, like this these two from April 17. One is a retweet from a mufti.
John Hawkins has lots more . Pay him a visit .
43 Pictures From Eyewitnesses : Warning Some Are Extremely Graphic
One of the blast sites on Boylston Street near the finish line. Picture: AP
For those of you that desire to see the carnage at it’s most explicit , LiveLeak has what you are looking for . We’ll post no samples of this one . Be forewarned … brutal pictures
” Whether you believe in an afterlife or nothing at all, there’s one slightly morbid question that might be keeping you up at night. What happens to your emails when you die?
Well, you can finally rest easy. Google, that great resolver of all life’s mysteries, recently announced its plan for helping you manage your own digital demise.
The company added its Inactive Account Manager as a part of Account Settings this week. The Account Manager is a tool that allows Gmail users to decide what will happen to their emails, photos and documents when they kick the bucket.
This move by Google is following on the heels of recent proposals by state legislators to give the executors of a will legal access to a deceased person’s social media and email accounts. Google preempts the need for such legislation by allowing account owners themselves to specify what will happen to their accounts posthumously.”
- Google unveils service to manage digital afterlife (thehindu.com)
- Google launches tool to help users plan their digital afterlife (metro.co.uk)
- Plan your digital afterlife with Inactive Account Manager (googlepublicpolicy.blogspot.com)
- Google launches ‘digital afterlife’ tool (stuff.co.nz)
- Google Death Manager: New Feature To Tell The Company What To Do With … (forbes.com)
” North Korea’s official Twitter and Flickr accounts have been hacked and two of its main websites defaced, in hacker group Anonymous’s latest efforts to disrupt the communist county’s online presence.
Last week, hackers that purported to be part of the ‘hacktivist’ collective claimed to have swiped 15,000 passwords from North Korea’s Uriminzokkiri.com news and information site in response to the North Korean regime and its nuclear weapons program. While that feat remains unclear since the hackers posted details of just six of the accounts that they claimed to have gotten, there is no doubt about the latest efforts.
Here’s a screenshot of the hacked tweets from @uriminzok, which has around 15,000 followers. The first of which was sent at 22:45 PDT on Wednesday.”
“ A Pastebin note from hackers claims that the group has members inside of North Korea who are helping with the efforts against authorities in the country:
We have a few guys on the ground who managed to bring the real internet into the country using a chain of long distance WiFi repeaters with proprietary frequencies, so they’re not jammed (yet). We also have access to some N.K. phone landlines which are connected to Kwangmyong through dial-ups. Last missing peace of puzzle was to interconnect the two networks, which those guys finally managed to do.”
- North Korea’s Twitter and Flickr Accounts Have Been Hacked (gizmodo.com)
- Anonymous Hacks North Korea’s Propaganda Website Uriminzokkiri, Steals 15,000 Passwords (leaksource.wordpress.com)
- Anonymous says hello to North Korea with multiple hacks, sites defaced (freakoutnation.com)
- Just What the Tensions with North Korea Needed: Anonymous! (betabeat.com)
- Hacking of North Korea’s Twitter and Flickr accounts includes pic of Kim Jong Un with a snout (twitchy.com)
- Anonymous hacks North Korea’s Twitter page (siliconrepublic.com)
” Bosses investigating allegations of workplace misconduct in the State of Washington could soon legally obtain passwords and full access to individual employees’ social media accounts.
CBS Seattle reports a bill before the Washington Legislature could be amended to create the exemption, which would permit employers to “require or demand access to a personal account if an employee or prospective employee has allegations of workplace misconduct or giving away an employer’s proprietary information.” “
- Giving employers an out to demand your online passwords (mynorthwest.com)
- Bill would allow bosses to seek Facebook passwords (komonews.com)
- Bill amendment would let bosses demand Facebook passwords during investigations in Washington state (oregonlive.com)
- Bill could let your boss get your Facebook password (king5.com)
” Saying that he’s probably done all he could possibly do at this point, Twitter user Aaron Gartner confirmed Tuesday that after posting 10,000 tweets and accumulating just 15 followers, the 26-year-old is pretty much ready to pack it in and discontinue his account.
Gartner, whose most avid followers consist mainly of his aunt, his roommate, and an unfamiliar Twitter account from Argentina with the profile photo of an egg, told reporters that he got a sense his time was about up when he decided to live-tweet the Golden Globes and actually lost three followers. At one point last year, Gartner said, he was averaging 900 tweets per follower—a statistic that the sales manager admitted was “pretty much the writing on the wall.” “
2. Purge the old, disaffected messaging leaders from your ranks.
6. Acknowledge young Republicans, who are doing the extraordinarily difficult job of being conservative on a college campus.
Dustin Moskovitz, the world’s youngest billionaire.
” There are 1,426 billionaires in the world this year. They are the wealthiest of the wealthy. But only 29 members of this elite list are under 40 years old, with that exciting combination of money and youth.
Those 29 have a total of $119 billion between them. Ten come from the technology sector, including four from social networking giant Facebook. Eleven come from the United States, the rest from countries abroad. Five are newcomers to the billionaire ranks. Read the full list below.”
- The World’s Youngest Billionaires Are Facebook’s Founders (socialbarrel.com)
- Mark Zuckerberg Falls To No. 66 On ‘Forbes’ Billionaires List (allfacebook.com)
- Rinehart 36th richest as Forbes names world’s billionaires – The Australian Financial Review (afr.com)
- Report: U.S., China dominate global billionaires (wyff4.com)
- Must watch self-made technology entrepreneurs: Youngest tech billionaires under 40 (ceoworld.biz)
- The World’s Richest Tech Billionaires (forbes.com)
” Are you surprised that Obama won the youth vote even though his policies are a complete disaster for the young?
We are losing the fight to the lowest of low information voters, who are pushed toward a liberal agenda by very smart and talented people who understand the power of social media in a way we don’t.
So often when I ask readers to follow us on Facebook and Twitter, I’m met with comments about privacy concerns on Facebook and “I don’t do Twitter” type responses. Fair enough, but at least understand the swarm effect a website like Upworthy can create based on dumbed-down politically-savvy social media interactions, and how that swarm may result in Elizabeth Warren being on the Democratic 2016 ticket if Hillary doesn’t run.”
- How to make meaningful stories go viral: @Upworthy discloses a secret (nextlevelofnews.com)
- Read About All Things Social Media With ‘Social Media Insights’ (businessinsider.com)
- 3 Ways to Turn Social Media Followers Into Promoters of Your Brand (news.terra.com)
- Pinterest Catches Up With Twitter, Digital Divide Shrinks | Alex Forss on Social Media (alexforssmarketing.wordpress.com)
- Twitter is the Boss of Social Media (anaffairinredsquare.com)
- Netiquette – playing nice on social media (maturinuk.com)
” The social media site said its security team discovered the breach last month. It occurred when a small group of employees visited a mobile developer website that was compromised, Facebook said. The compromised website allowed malware to be installed on the employees’ laptops .”
- Facebook Admits They Were Hacked, Assures That User Data Not Compromised (ubergizmo.com)
- Facebook hacked in ‘sophisticated attack’ (guardian.co.uk)
- Facebook says it was hacked (thehindu.com)
- Facebook hacked, says no user data compromised (cnn.com)
- Facebook Says It Was Hacked, No Data Compromised (techland.time.com)
” This has been a good week for those of us at war with the media. Late last week, many of the same elite media members who attempt to falsely link conservatives to every imaginable tragedy (most notably, Sarah Palin), found their own names approvingly mentioned in a suspected mass-murderer’s manifesto. And then, just this morning,Washington Post contributor Suzi Parker (that’s her photo below — isn’t she precious? — is Rachel Maddow missing a pair of “smart girl” glasses?) made a very public spectacle of herself.
In a blog post snarkily titled “Sarah Palin’s plan to reach ‘millions of devoutly religious people’ through al-Jazeera,” Parker used the Web pages of the once-legendaryWashington Post to spread the incredible news that Palin had joined Al-Jazeera. This news was then used by Parker as the basis for a piece of left-wing smuggery that ripped Palin for being so desperate to stay relevant. “
- Sarah Palin strikes back at Washington Post (politico.com)
- WaPo wrong on Palin’s new job (politico.com)
- Suzi Parker, Ace Reporter (breitbart.com)
- Parody Website Fools The Washington Post Into Thinking Sarah Palin Heading To Al Jazeera (mediaite.com)
- Washington Post Punked, Says Palin to Join Al Jazeera (newser.com)
- Sarah Palin joining Al-Jazeera? Obnoxious ‘real journalist’ at WaPo falls for obvious satire (twitchy.com)
- Aw, snap! Sarah Palin zings ‘real journalist’ Suzi Parker and WaPo (twitchy.com)
- The Washington Post Corrects A Story That Reported Sarah Palin Was Joining Al Jazeera (businessinsider.com)
- Washington Post reporter fooled by satirical story on Sarah Palin (redalertpolitics.com)