Another Word For It Patrick Durusau on Topic Maps and Semantic Diversity

September 4, 2017

GIJN’s Complete Global Guide to Freedom of Information (Attn: Activists/Journalists)

Filed under: FOIA,Journalism,News,Reporting — Patrick Durusau @ 9:18 pm

Unlocking Laws to Set Information Free: GIJN’s New Global Guide by Toby McIntosh.

From the post:

More than 115 countries worldwide have laws that require officials to turn over public records. Of course, even in the countries that have no laws it never hurts to ask. But there’s an advantage to using an access law — variously called freedom of information laws, access to information laws, right to information and right to know laws.

There are many resources for journalists seeking to file records requests in countries with laws governing access to information. To help exploit these legal tools, we’ve lined up GIJN’s Complete Global Guide to Freedom of Information, a resource with three sections:

  • Tips and Tricks: A collection of the best advice on how to use access laws.
  • Inspirational FOI: Ideas of what to ask for and stories about journalists active in using FOI.
  • Global Resources: Country-by-country guidance and links to national resources.

Government information can be obtained by:

  • liberating government information
  • insiders leaking government information
  • “laws governing access to information”

Assuming you place credence in information a government disgorges voluntarily, this is a great resource for activists and journalists around the world.

If you like these resources, be sure to visit/support freedominfo.org.

September 3, 2017

Charity Based CyberSecurity For Mercenaries?

Filed under: Cybersecurity,Government,Protests,Security — Patrick Durusau @ 4:54 pm

That was my question when I read: Insecure: How A Private Military Contractor’s Hiring Files Leaked by Dan O’Sullivan.

The UpGuard Cyber Risk Team can now disclose that a publicly accessible cloud-based data repository of resumes and applications for employment submitted for positions with TigerSwan, a North Carolina-based private security firm, were exposed to the public internet, revealing the sensitive personal details of thousands of job applicants, including hundreds claiming “Top Secret” US government security clearances. TigerSwan has recently told UpGuard that the resumes were left unsecured by a recruiting vendor that TigerSwan terminated in February 2017. If that vendor was responsible for storing the resumes on an unsecured cloud repository, the incident again underscores the importance of qualifying the security practices of vendors who are handling sensitive information.

The exposed documents belong almost exclusively to US military veterans, providing a high level of detail about their past duties, including elite or sensitive defense and intelligence roles. They include information typically found on resumes, such as applicants’ home addresses, phone numbers, work history, and email addresses. Many, however, also list more sensitive information, such as security clearances, driver’s license numbers, passport numbers and at least partial Social Security numbers. Most troubling is the presence of resumes from Iraqi and Afghan nationals who cooperated with US forces, contractors, and government agencies in their home countries, and who may be endangered by the disclosure of their personal details.

While the process errors and vendor practices that result in such cloud exposures are all too common in the digital landscape of 2017, the month-long period during which the files remained unsecured after UpGuard’s Cyber Risk Team notified TigerSwan is troubling.

Amazing story isn’t it? Even more amazing is that UpGuard sat on the data for a month, waiting for TigerSwan to secure it. Not to mention UpGuard not publicly posting the data upon discovery.

In case you don’t recognize “TigerSwan,” let me refresh your memory:

UpGuard finds 9,402 resumes, applicants seeking employment with TigerSwan/Blackwater type employers.

Did they expose these resumes to the public?

Did they expose these resumes to the press?

Did they expose these resumes to prosecutors?

None of the above.

UpGuard spends a month trying to keep the data hidden from the public, the press and potential prosecutors!

Unpaid charity work so far as I know.

Thousands of mercenaries benefit from this charity work by UpGuard. Their kind can continue to violate the rights of protesters, murder civilians, etc., all the while being watched over by UpGuard. For free.

Would you shield torturers and murderers from their past or future victims?

Don’t be UpGuard, choose no.

September 2, 2017

Sharing Mis-leading Protest Data – Raspberry Pi PirateBox

Filed under: Cybersecurity,Protests,Security — Patrick Durusau @ 3:51 pm

Police surveillance of cellphone and Wi-Fi access points is standard procedure at all protests.

The Raspberry Pi PirateBox enables protesters to re-purpose that surveillance to share mis-leading data with police officers, anonymously.

Using prior protests as a model, even re-using audio/video footage, create “fake” reports and imagery for posting to your “My Little Protest News Site.” (Pick a less obvious name.)

With any luck, news media reps will be picking up stories your news site, which will increase the legitimacy of your “fake” reports. Not to mention adding to the general confusion.

Mix in true but too late to be useful news and even some truthful, prior to happening calls for movement so your reports are deemed mostly credible.

Predicting flare gun attacks on reserve formations, only moments before it happens, will go a long way to earning your site credibility with its next prediction of an uptick in action.

The legality of distributing fake reports and use of flare guns at protests varies from jurisdiction to jurisdiction. Always consult with legal counsel about such conduct.

September 1, 2017

US Labor Day (sic) Security Reading

Filed under: Cybersecurity,Government,Privacy,Security — Patrick Durusau @ 9:16 pm

I know, for the US to have a “labor day” holiday is a jest too cruel for laughter.

But, many people will have a long weekend, starting tomorrow, so suggested reading is in order.

Surveillance Self-Defense, a project of the EFF, has security “playlists” for:

Academic researcher? Learn the best ways to minimize harm in the conduct of your research.

Activist or protester? How to keep you and your communications safe wherever your campaigning takes you.

Human rights defender? Recipes for organizations who need to keep safe from government eavesdroppers.

Journalism student? Lessons in security they might not teach at your j-school.

Journalist on the move? How to stay safe online anywhere without sacrificing access to information.

LGBTQ Youth Tips and tools to help you more safely access LGBTQ resources, navigate social networks, and avoid snoopers.

Mac user? Tips and tools to help you protect your data and communications.

Online security veteran? Advanced guides to enhance your surveillance self-defense skill set.

Want a security starter pack? Start from the beginning with a selection of simple steps.

Have a great weekend!

Google As Censorship Repeat Offender : The Kashmir Hill Story

Filed under: Censorship,Free Speech — Patrick Durusau @ 10:59 am

That Google is a censorship repeat offender surprises no one. Censorship is part and parcel of its toadyism to governments and its delusional war against “dangerous” ideas.

Kashmir Hill‘s story of Google censorship put a personal spin on censorship too massive to adequately appreciate.

Reporter: Google successfully pressured me to take down critical story by Timothy B. Lee.

From the post:

The recent furor over a Google-funded think tank firing an anti-Google scholar has inspired Gizmodo journalist Kashmir Hill to tell a story about the time Google used its power to squash a story that was embarrassing to the company.

The incident occurred in 2011. Hill was a cub reporter at Forbes, where she covered technology and privacy. At the time, Google was actively promoting Google Plus and was sending representatives to media organizations to encourage them to add “+1” buttons to their sites. Hill was pulled into one of these meetings, where the Google representative suggested that Forbes would be penalized in Google search results if it didn’t add +1 buttons to the site.

Hill thought that seemed like a big story, so she contacted Google’s PR shop for confirmation. Google essentially confirmed the story, and so Hill ran with it under the headline: “Stick Google Plus Buttons On Your Pages, Or Your Search Traffic Suffers.”

Hill described what happened next:

No government, practitioners of censorship themselves, will punish Google for this and its continuing acts of censorship.

Some things you can do:

  • Follow and support Kashmir Hill, who is likely to catch a lot of shit over this report.
  • Follow and support Ars Technica, anyone for boosting their search results?
  • Vote with your feet for other search services.
  • Place ads with other search services.
  • Hackers, well, do what you do best.

And to those who respond: “Well, that’s just good business.”

For some sense of “good business,” sure. But users are also free to make their own choices about “good business.”

If Google ad revenue takes a measurable hit between now and December 31, 2017, user choices may be heard.

« Newer Posts

Powered by WordPress