Tracks

By Valdis Krebs | Who is mining, mapping and measuring the tracks you leave behind on the Internet.

Brian Eno is MORE DARK THAN SHARK

INTERVIEWS, REVIEWS & RELATED ARTICLES<br>"Craft is what enables you to be successful<br>when you're not inspired." - Brian Eno<p>THE WELL OF FREEDOM IS RUNNING …

This audacious study will track 10,000 New Yorkers' every move for 20 years

"There will be the ability to get greater precision on one's fate — and people will have to decide if they want to know it or not"<p>"Do I think that as we understand the human condition more deeply, that will influence the way we live our lives? Of course."<p>"These are people who are, because of their …

Flickr

Liberal, Moderate or Conservative? See How Facebook Labels You

You may think you are discreet about your political views. But Facebook, the world’s largest social media network, has come up with its own determination of your political leanings, based on your activity on the site.<p>And now, it is easy to find out how Facebook has categorized you — as very liberal …

Facebook

Secret Cameras Record Baltimore’s Every Move From Above

Since January, police have been testing an aerial surveillance system adapted from the surge in Iraq. And they neglected to tell the public.<p>By Monte …

Surveillance

How Cell Phones Can Map The CIA: Is Location Secrecy Dead?

Last week I asked whether government secrecy is dead in the internet and social media era. Yet, the web is just one of the myriad commercially-owned data streams that poses a challenge to government secrecy in modern times. The nearly ubiquitous presence of cellphones in daily life and the …

Maps

The NSA hack proves Apple was right to fight the FBI

After the unprecedented breach of hacking tools and exploits stolen from the US National Security Agency's elite hacking unit, some privacy advocates see it as clear vindication of Apple in its fight with the FBI earlier this year.<p>"The component of the government that is supposed to be absolutely …

National Security Agency (NSA)

Comment: Microsoft just demonstrated why Apple was right to stand up to the FBI

I wrote an opinion piece predating the San Bernardino shootings on why Apple was right to stand firm on encryption even in the face of terrorist attacks, and another one afterwards explaining why it would be too dangerous to give the FBI the iPhone master key they demanded.<p>My main argument was that …

FBI

What A Neural Network Thinks About Your Neighborhood—And Why It Matters

What makes us perceive a place as safe, or even beautiful? AI is confirming century-old suspicions.<p>We hold certain truths about cities to be self-evident. That includes the theories put forth by urbanists like Jane Jacobs decades ago—like the idea that design elements such as glazing and street …

Architecture

If the 2016 election is hacked, it's because no one listened to these people

Ever since the Supreme Court ordered the nation's voting authorities to get their act together in 2002 in the wake of <i>Bush v Gore</i>, tech companies have …

Elections

The (not so) secret life of a networked and networking scholar

[Image credit: https://pixabay.com/static/uploads/photo/2016/05/01/20/12/swing-1365713_960_720.jpg ]<p>Not a day passes or there is not another blog or …

Trump Campaign Says Donald Would Loosen Civil Service Laws to Root Out Feds Loyal to Obama

A key Donald Trump ally unveiled this week how the Republican nominee would reform the civil service as president, and it could dramatically change …

Bill Rand Analyzes Facebook, Twitter Initiatives to Expand Marketing Capabilities

Hello, I am Riad Khan. I am full time online marketer and also chief trainer of "Best IT Center". Here is my personal information below.... …

How technology disrupted the truth

One Monday morning last September, Britain woke to a depraved news story. The prime minister, David Cameron, had committed an “obscene act with a dead pig’s head”, according to the Daily Mail. “A distinguished Oxford contemporary claims Cameron once took part in an outrageous initiation ceremony at …

Journalism

Nuclear weapons contractors repeatedly stifle whistleblowers, auditors say

At laboratories and factories where American nuclear weapons are designed and built, and at the sites still being cleansed of the toxic wastes …

Information Warfare Initiative.

Information Warfare Initiative<p>10 July 2016<p>03 July 2016<p>27 June 2016<p>10 July 2016<p>10 July 2016<p>03 July 2016<p>20 June 2016<p>18 May 2016<p>06 May 2016<p>11 May 2016<p>10 …

From Snowden to Panama, all hail the power of the press

Fifa corruption, Snowden and surveillance, Rotherham child abuse, drugged athletes, Stephen Lawrence, WikiLeaks, MPs’ expenses, phone hacking, HSBC, cash for questions, cricket fixing, extraordinary rendition, Olympic bribery, Slater Walker share fixing, DC-10 crashes, thalidomide, corruption at …

Corruption

Who Will Own Your Data If the Tech Bubble Bursts?

Corporations, data brokers, and even criminals might buy failed companies just for their users’ personal information.<p>Imagine that Silicon Valley’s nightmare comes true: The bubble bursts. Unicorns fall to their knees. The tech giants that once fought to attract talented developers with mini-golf …

Fortune 500

Netflix says Geography, Age, and Gender are “Garbage” for Predicting Taste

Big Data is making broad categories irrelevant for targeting consumers.<p>Netflix rolled out to 130 new countries earlier this year, and you might expect that it began carefully tailoring its offerings for each of them, or at least for various regions. But as a new <i>Wired</i> feature reveals, that couldn’t …

Netflix

Watch "Ending up on the wrong side of the tracks: Valdis Krebs at TEDxRiga" Video at TEDxTalks

MIT's digital lookout in the crows nest of cyber warfare

"Think about the system as a virtual analyst," says Kaylan Veermachaneni, co-creator of MIT's latest artificial intelligence. He's a research scientist at the university's Computer Science and Artificial Intelligence lab that, along with Ignacio Arnaldo, built an AI that acts as a lookout for the …

Cyberwarfare

FBI paid professional hackers one-time fee to crack San Bernardino iPhone

The FBI cracked a San Bernardino terrorist’s phone with the help of professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter.<p>The new information was then used to create a piece of hardware that helped …

iPhone

Apple’s Penchant for Consumer Security

At a security “deep dive” at Apple on Friday, executives went into depth on Apple security philosophy and technological approach to the matter. I’ve …

Security

This Wearable of the Future Will Track Your Carbon Footprint

Benjamin Hubert spends his time imagining a greener future—and trying to create the environmentally friendly technologies to go along with it. Most …

Speed is Key to Threat Intelligence Sharing at Every Level

Speed and communication are key elements to effective threat intelligence in the government, according to panelists at the Akamai Government Forum on …

Matthew Collings – A Requiem for Edward Snowden

A <i>Requiem</i><i></i> is usually written ‘<i>for the repose of the soul or souls of one or more deceased persons</i>‘, but the term ‘<i>has subsequently been applied to</i> …

Edward Snowden

Journalists will not share Panama Papers with Justice Department

Police officers stand guard next to a company list showing the Mossack Fonseca law firm outside their office in Panama City April 12, 2016. REUTERS/Carlos Jasso<p>| WASHINGTON<p>The media group that coordinated the Panama Papers investigation into offshore companies said on Thursday it would not …

Crime

Anna Porter: Punishing Russia's murderous kleptocrats

Bill Browder is a marked man. It’s hard to think of him in that context when visiting his modern offices in London, but it is also hard to come to …

Russia

Tracing the path of four terrorists sent to Europe by the Islamic State

SALZBURG, Austria — On a crisp morning last October, 198 migrants arrived on the Greek island of Leros, all of them seemingly desperate people seeking sanctuary in Europe. But hiding among them were four men with a very different agenda.<p>The four were posing as war-weary Syrians — all carrying …

Europe

Hollywood hospital held to ransom by hackers

<b>Ransomware is a growing menace for computer users - but when a hospital is targeted, it makes the disruption far more serious.</b><p>Computer systems at …