Google & Facebook: Alliances with intelligence to make privacy obsolete. Matthaus Litteken CS 305
|
|
|
- Sybil Shields
- 10 years ago
- Views:
Transcription
1 Google & Facebook: Alliances with intelligence to make privacy obsolete Matthaus Litteken CS 305
2 Google Ties To CIA Robert David Steele - Google took money from the CIA when it was poor and it was starting up. In June 1999, the then up-start Google received a $25 million round of equity funding led by Sequoia Capital and Kleiner Perkins Caufeld & Byers, the latter of which the CIA s In-Q-Tel had developed a close relationship with to advance priority technologies of value to the intelligence community.
3 Google Ties To NSA the NSA awarded Google a $2 million contract. NSA bought four Google search appliances, two-years replacement warranty on all of them, and 100 hours of consulting support. Google is also providing the search features for a Wikipedia-style site, called Intellipedia, on which agents post information about their targets that can be accessed and appended by colleagues Google is teaming up with the National Security Agency to investigate the recent hack attack against its network in a bid to prevent another assault.
4 Facebook Ties to CIA Facebook funds came indirectly from a corporation with strong CIA ties. It s a long chain of association: once Facebook begins to take of, venture capital frm ACCEL gives Facebook $12.7 million. One of the 18 member investors of ACCEL, James Bryer, is also on the board of a venture capital frm called NVCA. Sitting on the board of NVCA with Bryer is Gilman Louie, who is on the board of In-Q-Tel.
5 In-Q-Tel In-Q-TEL is a non-proft venture capital frm, a frm run by the CIA to invest in high-tech companies for the sole purpose of keeping the CIA equipped with the latest in information technology in support of United States intelligence capability. In-Q-TEL primarily invests in new Data Mining Technologies. Technologies that mine places like Myspace, and Facebook essentially give the CIA access to trends in various demographics as well as their thought patterns and behaviors.
6 Changes to Privacy People more willing to share private information with friends and strangers indiscriminately Current and previous employment Friends, family, address, contact info Hobbies, interests, political views & afliations Photos of everyone & everything Relationship status, home town, education Broadcasting private thoughts, current activities, current location
7 Picasa Encourages people to share photos online Google Apps Tag photos online by participants using facial recognition. Teach Picasa and Google to better recognize faces, yours and your friends. Google Earth & Google Maps GPS on smart phone to get directions, now Google knows where you are and where you're going
8
9
10
11
12 Social Media & The Government Training course that describes how IRS employees may use various Internet tools -- including social networking sites and Google Street View -- to investigate taxpayers. The Justice Department released a presentation entitled "Obtaining and Using Evidence from Social Networking Sites." The slides detail several social media companies' data retention practices and responses to law enforcement requests. It notes that Facebook was often cooperative with emergency requests while complains about Twitter s short data retention policies and refusal to preserve data without legal process.
13 Profling NSA is funding research into the mass harvesting of social networks that could harness advances in internet technology - specifcally the forthcoming "semantic web" championed by the web standards organization W3C - to combine data from social networking websites with details such as banking, retail and property records, allowing the NSA to build extensive, all-embracing personal profles of individuals.
14 Profling Continued Spindex - Microsoft revealed Spindex, a Web service designed to aggregate its users various social-networking feeds onto a single screen. The application is a product of Microsoft s FUSE Labs, a Microsoft division devoted to building software with a social connectivity focus. We're doing their work for them. We create pages all about ourselves and our friends and family. We describe what we do, what we like, who we are.
15 Profling Continued Police and Intelligence agencies used to have to leave their ofces to gather information on people they were profling. Now they just need to visit a few social media sites and connect the dots. Social media aggregators like Spindex will only make their jobs easier. It will connect the dots for them.
16 Conclusion Ties between Google, Facebook and intelligence tenuous but real Huge amounts of personal (and private?) information at their disposal. Who is they? Who has access? How is it used? People have been trained to profle themselves Even if you aren't profling yourself, your friends and family may be profling you Is privacy impossible in today's world?
17 Sources Microsoft Unveils Spindex, Social Networking Aggregator - eweek.com - Nicholas Kolakowski May 5, Collaboration/Microsoft-Unveils-Spindex-Social-Networking-Aggregator / While Fending Off DoJ Subpoena, Google Continues Longstanding Relationship With US Intelligence - Homeland Security Today - Anthony L. Kimery January 25, Ex-Agent: CIA Seed Money Helped Launch Google - Steele goes further than before in detailing ties, names Google's CIA liaison Paul Joseph Watson - Prison Planet Alex Jones - December 6, In-Q-Tel Wikipedia - Five cases that highlight evil at Google - Techtangerine February 21, Zuckerberg: I know that people don't want privacy cnet news January 10, by Chris Matyszczyk - Facebook, the CIA, and You. - Brainsturbator by thirtyseven July 6, CIA enlists Google's help for spy work Times Online - Jonathan Richards March 31, Google intelligence cooperation reprise Homeland Stupidity Michael Hampton October 30, Google Asks NSA to Help Secure Its Network - wired.com - Kim Zetter - February 4, CIA Invests in Social Media Monitoring Firm Mashable Jennifer Van Grove - October 19, EFF Posts Documents Detailing Law Enforcement Collection of Data From Social Media Sites Electronic Frontier Foundation Marcia Hofmann March 16, CIA s Venture Capital Arm, In-Q-Tel, Invests in Social Web Monitoring Firm Resource Shelf Noah Shachtman - October 19, FBI, Feds collect Facebook, social media data; Why are you surprised ZDNet - Larry Dignan March 17,
experts in your field Get the profile: Managing your online reputation A Progressive Recruitment career guide Managing your online reputation
experts in your field Get the profile: A Progressive Recruitment career guide Contents Introduction... 2 Why you need an online reputation... 3 Monitoring your online reputation... 3 How to protect your
What is Prospect Analytics?
What is Prospect Analytics? Everything you need to know about this new sphere of sales and marketing technology and how it can improve your business Table of Contents Executive Summary... 2 The Power of
Social Media Strategy:
Social Media Strategy: The Beginners Guide to Strategy Success in 7 Steps A Simple Guide In association with: Chapter Title Contents Page Page 2 What is Social Media...3 What is a Social Media Strategy
IT Tools for SMEs and Business Innovation
Purpose This Quick Guide is one of a series of information products targeted at small to medium sized enterprises (SMEs). It is designed to help SMEs better understand, and take advantage of, new information
The adidas Group Social Media Guidelines
The adidas Group Social Media Guidelines pagina 1 van 17 pagina 2 van 17 1. You have a voice! (...but please remember: only very few people are official spokesperson for the Group or its brands) 2. You
Smart Policing Initiative Website and Social Media
Smart Policing Initiative Website and Social Media Vivian Chu, CNA Research Specialist Iris Gonzalez, CNA Project Manager February 8, 2012 This project was supported by Grant No. 2009-DG-BX-K021 awarded
Freedom of Information Act Request and Request for Expedited Processing
February 24, 2014 Arnetta Mallory - FOIA Initiatives Coordinator National Security Division U.S. Department of Justice 950 Pennsylvania Avenue, N.W. Room 6150 Washington, DC 20530-0001 BY EMAIL [email protected]
Quick Guide: Selecting ICT Tools for your Business
Quick Guide: Selecting ICT Tools for your Business This Quick Guide is one of a series of information products targeted at small to medium sized businesses. It is designed to help businesses better understand,
A Guide to Promoting your Project
Contents 1. Introduction 2. Why Promotion? 3. Channels Traditional Media i. Television ii. Radio iii. Print Digital Media 4. Planning Assigning Roles i. Coordinating ii. Speaking iii. Writing iv. Photographer
Connect Startup Toolbox: Social Media Marketing by Alyssa Gregory
Connect Startup Toolbox: Social Media Marketing by Alyssa Gregory Social media has given small business owners a quick, accessible and low-cost way to promote their businesses online. In fact, time is
Facebook and Social Networking Security
Facebook and Social Networking Security By Martin Felsky November 2009 Table of Contents Introduction... 1 What is Facebook?... 2 Privacy Settings... 5 Friends... 7 Applications... 8 Twitter... 9 Should
Bloomberg BusinessWeek Business Exchange. Available on the ipad
1 of 7 30.08.10 09:53 Bloomberg BusinessWeek Business Exchange Available on the ipad Home Blogs Lifestyle Magazine Newsletters Slide Shows Special Reports The Debate Room Videos Finance Finance Home Companies
Espionage and Intelligence. Debra A. Miller, Book Editor
Espionage and Intelligence Debra A. Miller, Book Editor Intelligence... has always been used by the United States to support U.S. military operations, but much of what forms today s intelligence system
American Graduate: Let s Make It Happen Social Media Best Practices
American Graduate: Let s Make It Happen Social Media Best Practices Making the best of your American Graduate efforts includes creating a social media strategy. How do I post in 140 characters? What makes
The structure and organization of the Fusion Center takes its direction from four key documents, they are:
The structure and organization of the Fusion Center takes its direction from four key documents, they are: Northern Operational Office MISSION We incorporate information and utilize relationships formed
COPPA. How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online. The Children s Online Privacy Protection Act
The Children s Online Privacy Protection Act COPPA How COPPA & Parental Intelligence Systems Help Parents Protect Their Kids Online A uknow White Paper by Tim Woda, co founder of uknow.com, Inc Overview
PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.
PRIVACY POLICY This Policy was last changed on March 31, 2015. Kids Sports Entertainment, Inc. d/b/a The Whistle ( Whistle Sports ) and its affiliates operate this website, and any and all Whistle Sports
Tutorial: Big Data Algorithms and Applications Under Hadoop KUNPENG ZHANG SIDDHARTHA BHATTACHARYYA
Tutorial: Big Data Algorithms and Applications Under Hadoop KUNPENG ZHANG SIDDHARTHA BHATTACHARYYA http://kzhang6.people.uic.edu/tutorial/amcis2014.html August 7, 2014 Schedule I. Introduction to big data
SOCIAL MEDIA VALUATION AND THE VALUE OF A USER
SOCIAL MEDIA VALUATION AND THE VALUE OF A USER Overview What is a social media website worth? What are you worth to these sites and companies? The answer might surprise you. Understanding social media
Spy Software Gets a Second Life on Wall Street - WSJ
This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers visit http://www.djreprints.com. http://www.wsj.com/articles/spy-software-gets-a-second-life-on-wall-street-
Big Data. What is Big Data? Over the past years. Big Data. Big Data: Introduction and Applications
Big Data Big Data: Introduction and Applications August 20, 2015 HKU-HKJC ExCEL3 Seminar Michael Chau, Associate Professor School of Business, The University of Hong Kong Ample opportunities for business
WHITE PAPER. Virtual Impact. The Internet s Effect on How Candidates Look for Jobs and How Companies Look for Candidates. www.princetonone.
WHITE PAPER Virtual Impact The Internet s Effect on How Candidates Look for Jobs and How Companies Look for Candidates O ver the last 20 years, the way people search and apply for jobs has changed drastically.
Facebook Advertising Playbook
Facebook Advertising Playbook TABLE OF CONTENTS I. INTRODUCTION 6 II. ABOUT THIS REPORT 6 III. ABOUT IMPARTURE 7 1. INTRODUCTION TO FACEBOOK ADVERTISING 8 1.1 UNDERSTANDING TERMINOLOGY 8 2. THE CASE FOR
Privacy and data protection in a post-snowden world. Carly Nyst Head of International Advocacy
Privacy and data protection in a post-snowden world Carly Nyst Head of International Advocacy The great irony is that we re the only ones not spying on the American people. - Keith Alexander, head of the
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007
CSIS Security Research and Intelligence Research paper: Threats when using Online Social Networks Date: 16/05-2007 Written by Dennis Rand [email protected] http://www.csis.dk Table of contents Table of contents...
Adaptive Business Management Systems Privacy Policy
Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information
The key to knowing the best price is to fully understand consumer behavior.
A price optimization tool designed for small to mid-size companies to optimize infrastructure and determine the perfect price point per item in any given week DEBORAH WEINSWIG Executive Director- Head,
DEVELOP ROBOTS DEVELOPROBOTS. We Innovate Your Business
DEVELOP ROBOTS DEVELOPROBOTS We Innovate Your Business Security & Encryption Develop Robots has helped banks, real estate companies, law firms and many other businesses to secure and encrypt their database
Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013
Internet Security Priorities Prepared for: Presented by: Benenson Strategy Group and American Viewpoint December 20, 2013 Methodology The Benenson Strategy Group and American Viewpoint conducted 1,000
Cloud Computing: The Gathering Storm
Cloud Computing: Independent research Martin Wootton, RS Consulting Cloud Computing: The Gathering Storm What UK consumers really feel about cloud-based services We rely more than ever on computing and
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
Digital marketing strategy
Digital marketing strategy You don t need a digital strategy, you need a business strategy for the digital age Judy Goldberg, Sony Pictures #HRVision14 Branding goes Digital Understand your brand before
POSEIDON social network for carers
PersOnalized Smart Environments to increase Inclusion of people with DOwn s syndrome Deliverable D5.5 POSEIDON social network for carers Call: Objective: FP7- ICT- 2013-10 ICT- 2013.5.3 ICT for smart and
OPSEC and Safe Social Networking
OPSEC and Safe Social Networking Agenda Introduction Did you know? Social media access What not to post Privacy settings Geotagging Social Media OPSEC for units Social media concerns for Families and Family
Capturing Meaningful Competitive Intelligence from the Social Media Movement
Capturing Meaningful Competitive Intelligence from the Social Media Movement Social media has evolved from a creative marketing medium and networking resource to a goldmine for robust competitive intelligence
Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations
Educator s Guide to Digital Citizenship: Responsibility and Digital Reputations Overview: Students examine their participation in digital life. They explore how information shared through digital media
EQUIPMENT RENTAL by George M. Keen, Senior Consultant
EQUIPMENT RENTAL by George M. Keen, Senior Consultant Rental is an interesting area to examine from a strategic point of view. Let's look at rental growth in the last 20 years. In 1987, did you consciously
Social Media: Managing Your Online Presence
Social Media: Managing Your Online Presence What does Google say about you? Many employers now run online searches before offering an interview, so your online reputation will precede you. This workshop
What is Content Marketing? http://socialmediachimps.com/infographics/content-marketing-infographic-historytrends-and-opportunities/
1 Early historical content marketing examples: 4200 B.C. cave drawings, 1895 John Deere s launch of its first customer magazine Areas of web content marketing: Social Media Networking Sites & Social Media
RESEARCH 33 STATS TO KNOW WHEN MARKETING TO THE CONSTRUCTION INDUSTRY
RESEARCH 33 STATS TO KNOW WHEN MARKETING TO THE CONSTRUCTION INDUSTRY SOURCES: The 33 contractor statistics in this slide show were compiled from two sources: The Equipment World 2014 Connectivity Study
Robert Birmingham / Consultant GetMoreClicks.net [email protected] 772-215-8269. What is Online Reputation Management?
What is Online Reputation Management? Everything you do or say these days has the potential to end up on the internet. The world of George Orwell s book 1984 is far more of a reality than any of us care
Big Data Big Security Problems? Ivan Damgård, Aarhus University
Big Data Big Security Problems? Ivan Damgård, Aarhus University Content A survey of some security and privacy issues related to big data. Will organize according to who is collecting/storing data! Intelligence
TOOLS YOU CAN USE Maximizing a Film s Outreach with Web 2.0 By Kristin Henry, Working Films, Project Manager and Website Administrator
TOOLS YOU CAN USE Maximizing a Film s Outreach with Web 2.0 By Kristin Henry, Working Films, Project Manager and Website Administrator As an independent filmmaker working on a social justice documentary,
Preparing Millennials to Lead in Cyberspace October 2014
Preparing Millennials to Lead in Cyberspace October 2014 Results from the Raytheon-NCSA Millennial Survey of career aspirations, attitudes and behaviors of young American adults online Overview In this
SOCIAL MEDIA CHRIS SIGFRIDS SENIOR ONLINE MARKETING MANAGER CARIE FREIMUTH VICE PRESIDENT, ASSOCIATE PUBLISHER
SOCIAL MEDIA CHRIS SIGFRIDS SENIOR ONLINE MARKETING MANAGER CARIE FREIMUTH VICE PRESIDENT, ASSOCIATE PUBLISHER INTRODUCTIONS SOCIAL MEDIA Why? SOCIAL MEDIA We are living in the first generation where the
Corporate Spying An Overview
Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential
How To Be Successful With Social Media And Email Marketing
Brought to you by: ExtremeDigitalMarketing.com B2B Social Media + Email Marketing: Rock Solid Strategies For Doing It Right! Businesses Connecting With Businesses Through The Power Of Social Media! By
Everyone s online, but not everyone s secure. It s up to you to make sure that your family is.
TrendLabs Everyone s online, but not everyone s secure. It s up to you to make sure that your family is. We live out our digital lives on the Internet. There, communication is quicker and easier, and our
Unlocking The Value of the Deep Web. Harvesting Big Data that Google Doesn t Reach
Unlocking The Value of the Deep Web Harvesting Big Data that Google Doesn t Reach Introduction Every day, untold millions search the web with Google, Bing and other search engines. The volumes truly are
With Internet.org, Facebook Looks to Do Well While Doing Good
With Internet.org, Facebook Looks to Do Well While Doing Good Chris Daniels, head of Facebook's Internet.org. Photo by Jane Goldman. By Eric P. Newcomer Jul. 25, 2014 9:35 AM PDT A year ago, Facebook announced
Katy Young s Guide to... Twitter
21/08/13 Step by step guide followed by advanced techniques guide INTRODUCTION Twitter is a social media platform where users tweet content. It s culture is open and encourages users to tweet without needing
Crowdfunding KEVIN M. MCGOVERN FAMILY CENTER FOR VENTURE DEVELOPMENT IN THE LIFE SCIENCES. The new buzzword in Capital Formation
KEVIN M. MCGOVERN FAMILY CENTER FOR VENTURE DEVELOPMENT IN THE LIFE SCIENCES Crowdfunding The new buzzword in Capital Formation Enzo Villani May 17, 2013 What is crowdfunding? 1 st person to coin the term?
ANTITERRORISM AWARENESS FOR SOCIAL NETWORKING
ANTITERRORISM AWARENESS FOR SOCIAL NETWORKING AUGUST 2015 Photo by Spc. Michael J. MacLeod, US Army Terrorists have said they are hunting people and their families at home. An al-qaeda handbook tells its
VerIS a Framework for Gathering Risk Management Informa8on from Security Incidents
VerIS a Framework for Gathering Risk Management Informa8on from Security Incidents Wade Baker Alex Hutton Chris Porter Risk Intelligence Verizon Cybertrust Security Verizon Risk Intelligence View of Information
Marketing Director s Guide to Selecting CRM
The Marketing Director s Guide to Selecting CRM A Publication www.collierpickard.co.uk Ltd 2014 Forging the Future As Marketing Director the responsibility for deciding the future direction of your organisation
Setting the Standard for Safe City Projects in the United States
Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,
Resume to apply for phd program >>>CLICK HERE<<<
Resume to apply for phd program. I then put together an order form to sell the greeting cards twenty cents a piece (you can always raise the price later). Resume to apply for phd program >>>CLICK HERE
Using mobile apps to build your business
Using mobile apps to build your business Most of us know by now what an app is; but just to clarify mobile applications (apps) are software programs for hand-held communication devices such as mobile phones,
Counterterrorism and Cybersecurity
Newton Lee Counterterrorism and Cybersecurity Total Information Awareness Spri Part I Counterterrorism in Retrospect: Then and Now 1 September 11 Attacks 3 1.1 September 3 Disney's Responses to the Attacks
Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation
Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie Developments in Security Regulation Agenda Introduction PM & C Cybersecurity Review Mandatory Data Retention Legislation Overview
As the US debates email privacy a Berlin start up surges with...
TOP STORIES / SCI-TECH DATA PROTECTION As the US debates email privacy a Berlin start up surges with 'anonymous post' No matter how much we say we're angry about the NSA scandal, we still use all the services
Cloud Computing TODAY S TOPICS WHAT IS CLOUD COMPUTING? ICAC Webinar Cloud Computing September 4, 2012. What Cloud Computing is and How it Works
Cloud Computing TODAY S TOPICS What Cloud Computing is and How it Works Security & Privacy Issues Investigative Challenges WHAT IS CLOUD COMPUTING? Cloud computing refers to software or processes offered
MEMBER SOCIAL MEDIA SETUP GUIDEBOOK
MEMBER SOCIAL MEDIA SETUP GUIDEBOOK I n t r o d u c t i o n The use of social media to support Have the Talk of a Lifetime SM Social media has become a part of everyone s life and provides a powerful platform
Things to remember when using social media
Things to remember when using social media July 2014 email [email protected] phone 01484 437454 Yorkshire studio The Media Centre 7 Northumberland St. Huddersfield West Yorkshire HD1 1RL London office
CAM Coach. How Technology Supports Complementary and Alternative Practice
The www.onlinetherapyinstitute.com CAM Coach How Technology Supports Complementary and Alternative Practice Mark Shields In 2012, The CAM Coach book was launched in the U.K. This book has become known
A Parents' Guide to. 2014 ConnectSafely.org
A Parents' Guide to 2014 ConnectSafely.org Top 5 Questions Parents Have About Instagram 1. Why do kids love Instagram? Because they love media, sharing it and socializing with it on their phones, and Instagram
INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Cloud Computing Outsourcing Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Background...2 2. Legislative and Policy Requirements...3 3.
This Privacy Policy applies to all of our sites. This Privacy Policy does not apply to our in store public WiFi.
Effective April 13, 2015 This Privacy Policy applies to all of our sites. This Privacy Policy does not apply to our in store public WiFi. AG Jewelers knows that you care how information about you is used
How To Market Your Law Firm Through Social Media
A Social Media Primer for Lawyers Introduction What Is Social Media and Should You Be Using It? Many lawyers have questions about the new social media phenomena. What is it? Should they use it? What is
