Terrorist Attacks and Social Media: Who Should Be Held Accountable?

Suit Social Media Photo

When 9/11 took place, social media was still fresh and in the infant stages. To receive the news and to watch the events unfold, Americans and people across the nation were glued to their TVs, radios, and newspapers. Now, in 2017 social media is a way of life for many. It has been implemented in our everyday lives and it appears as though it will not disappear anytime soon. In addition to many terrorist attacks that have followed since then.

 

The use of social media and terrorist attacks sparked controversial debate amongst government officials, politicians, citizens, and more. Government across the world are feuding with technology companies to decide the future of the internet. The UK government is actually leading a battle to force tech companies to delete content at will, an entity that is crucial for counter-extremism projects but which experts explain will lead to censorship and could potentially put people at great risk of attack(s). As a result of this, many countries are following the UK in an attempt to decide what is published online. In recent years, the Government has focused more on removing the ability to discuss or spread terrorist propaganda from the internet. That marks a major withdrawal from its previous abandoned strategy, which had originally focused on the security tools that were being used to protect messages.

 

Initially, this shift came when Theresa May (U.K’s prime minister), attempted to force tech companies to stop using strong encryption so that intelligence agencies could read messages. This resulted in severe pushback from tech companies, who argued it wouldn’t be possible to break security just for terrorists without endangering all of their users.

 

A growing agreement on that argument has led the Government to instead focus on terrorist content, not the delivery tools used to spread that content. And so, the focus has shifted to social media and tech companies like YouTube and Facebook, rather than messaging companies like WhatsApp and Apple.

 

Additionally, the U.S, who allows tech companies a substantial amount of freedom has revealed that it wants to limit what they’re allowed to publish, and may follow U.K’s model.

 

Despite all of the criticism, internet companies are doing more to crack down on terror and making that effort as public as they can. Facebook, Google, Twitter, and YouTube this summer founded the Global Internet Forum to Combat Terrorism. It’s supposed to help create new technological solution tools to detect bad content and pass those findings to smaller companies.

Google, for instance, has been working on counter-speech work, which attempts early intervention before people have actually been radicalized, and tries to change people’s mind when they begin searching.

If people appear to be looking for terrorist content or propaganda, like searching “how to join Isis”, for example, then Google will display content intended to change that person’s mind. Google has also given out Adwords grants, so that non-governmental organization can buy ads on problematic searches for free, on which they can put links to counter-extremist content.

 

But the problem isn’t practical or technical it ultimately comes down to questions about what exactly tech companies are and what they do. Social media companies tend to refer to themselves not as publishers (which would make them liable for any content hosted there) but as platforms, a designation for which there is a much less clear regulatory and ethical framework.

 

This reminds me of the time in class when Bart explained to us that no one controls the internet. I also remember having this talk with someone explaining who should be held accountable for details about potential terrorist attacks posted on social media sites, Reddit, online forums, the dark web, etc. It’s interesting to see that countries are trying to push effective strategies on how to deal with terrorism online. I think Twitter is a huge social media site that has many terrorist organizations trying to recruit people such as; ISIS, white supremacy groups, etc. There is a lot of controversy with how they handle suspending/deleting accounts that post hateful messages that can incite violence. What do you think?

 

Do you agree with the U.S joining the fight to hold social media platforms accountable for stopping potential terrorist attacks? Or do you think this could lead to larger damage and more attacks than we ever expected?

 

Griffin, A. (2017, Oct., 23) Tech Companies and Governments Fight Over Who’s Responsible For Stopping Terror Attacks. Retrieved from:

http://www.independent.co.uk/life-style/gadgets-and-tech/news/technology-terror-theresa-may-uk-government-twitter-facebook-google-youtube-extremism-a8011856.html

How Fiction Becomes Fact on Social Media

We have looked at echo chambers in class and in homework assignments, and learned about how they are created, maintained, and strengthened on social media, especially Facebook. This New York Times article takes a psychological look at how fake news is spread, and what made (or makes) it so easy for Russia to manipulate it to influence American elections. Using the spread of Las Vegas shooting conspiracy theories as a recent example, we see that social media users accelerate news spreading by sharing without even stopping to read the article fully.  We know that Russia uses fake companies to create and spread fake news through Facebook. We also  know that Facebook encourages this because it keeps eyes on their platform, becoming a “marketer of misinformation.” The key part however, is us. What makes the information considered to be “truth” is the individual biases of users. Basically, it is the wanting the statement to be true. People are not interested in digging deeper or getting to the bottom of it. The “false initial connection” with the claim is what sticks. After that, the repetition by circulation reinforces the idea and makes the claims ring true to susceptible users. This is strengthened by what is called social alliances, which mean that people are more likely to believe something if it is coming from a trusted friend. “Was Obama Muslim?” “Is Trump a Nazi?” “Is Clinton a sex offender?” each person’s bias determines what they remember and accept to be correct. Individuals choose their own truth, Facebook and its fake news only facilitates.

 

3D CAD technology can affect the Architecture

If you are Architect how can you design the building and house and what tools are used in the designing? In nowadays, 3D CAD is widely used on the Architecture because of many advantages of using this software. First, we can reduce the cost of redesigning. When we design through the 2D software we can make a mistake about sizing. This makes a cost of re-modeling however if we use 3D CAD we can design more precisely than the 2D therefore, we can reduce the mistake. Next, the blueprint which made by 3D CAD can reduce the lead time of introducing to the customer. The 3D blueprint shows how exactly the building looks like thus, we do not have to explain specifically. We can more easily and quickly introduce to the customer how this building or home will be constructed.

Finally, the 3D CAD system offers the sensing the error from the design. Because of modeling on 3D perspective, the program can compare more easily with the real size. To be specific, the software can see the modeling as third dimensions. Almost architecture company use the 3D CAD for modeling the building however in the future, more companies will use 3D blueprints and it will be more developed than now. We can also expect to 3D modeling architecture as combined with virtual reality.

 

(2014, September 12). Architectural Drafting Services: 3 Advantages of 3D CAD Modeling. Retrieved October 14, 2017, from http://theaecassociates.com/blog/3d-cad-modeling-architectural-drafting-services/

3D CAD Modeling for Architectural Drafting Services [Photograph]. (n.d.)

The Future of Ransomware and Cyber Security

As technology advances more with computer and data management everyday, there are always hackers creating new methods to break into data systems. The most popular method is they use ransomware to scam money out of people and businesses, usually through Bitcoin. These hackers usually target against smaller businesses that don’t have much protection on their data systems. However, with the increase of ransomware accounts, this opens doors to many cyber security jobs.

Cyber Security is the way to prevent hackers from breaking into systems, including important ones that you use today, such as banking. After a WannaCry ransomware attack, there is an increase awareness of how vital cyber security is for businesses today. Cyber Security is currently a growing market that is learning new ways to counter hackers. Because of the increased importance of cyber security, hackers have grown concern with ransomware. Hackers are learning new ways to make more dangerous ransomware while cyber security is making more advanced measures. This means that it will eventually become very difficult to create any type of malware outside of the ransomware field.

While malware and hackers continue to be a threat in today’s society, they are the ones that fuel the cyber security area. The future of hackers in unpredictable, as ransomware can either become obsolete, or hackers can eventually create a new method to make malware break through security easily. Nevertheless, cyber security continues to show its importance in today’s society in terms of both protection and the working world.

https://www.forbes.com/sites/ktorpey/2017/09/29/bitcoin-and-ransomware-incentivizing-better-computer-security-says-europol-report/#3df1f92c4014

Does regulating artificial intelligence save humanity or just stifle innovation

Image result for artifical intelligence

With the rise of artificial intelligence coming to stage where it will be integrated into our everyday lives people are worried about there privacy and want there to be regulations of how these creations will be used. The things that A.I. are supposed to help people with like helping them shop, recommending movies or TV shows or even having personalized tutors session all involve the A.I. to watch your movements and basically track what you do. Tis is where most people have the problem. For the most part people would like to know if this information is being used to do something other than its general purpose.

This article states that there are already existing rules that will control the uses of A.I and additional regulations are needed and will hinder innovation. I completely agree. Some of the examples given are that  drones must obey FAA regulations, and the self-driving car AI must obey regular traffic laws to operate on public roadways. With these laws there will be room for improvement and specification to A.I but to create additional rules would just be redundant.

The article then goes into more about what if the A.I. decided that its doesn’t need humans anymore and decided that the would be a better place without them. To combat these ideas the A.I would have to be programed with 3 rules. Robots cannot injure humans or allow them to come to harm. they must obey humans unless it would harm humans and protect themselves as long as this doesn’t harm humans or ignore and order.

Artificial intelligence systems have the potential to we do everything. The people who come up with technology shouldn’t be help down.  Ever since the beginning of the internet there has always been the concern of someone or something using the “new” technology for somethin evil. Overall this article is a very interesting read I feel that it talks about some of the things we have discussed or are discussing in class right now.

http://www.sfgate.com/news/article/Does-regulating-artificial-intelligence-save-12297859.php

Twitter making a user-friendly change

I thought this was an interesting topic to share because as our dependence on technology becomes more advanced, our priority for our security becomes imperative. Whether it’s through Twitter, Facebook, Instagram, or any other social media site, now more than ever there are more ways in which we can have confidential information taken from us and used in ways that can be harmful.

Twitter making this announcement is important for its brand particularly because it touches on the subject of trying to prevent nudity at all on twitter. This is twitter essentially digging into the topic of whether or not the material posted is owned by the person or the person who is in the photo, and in this instance by default the company is siding with the latter. In my opinion, I think this is only fair, especially if the content relates to very personal matters.

I personally think this is something Twitter needed to crack down on, particularly because social media giant Instagram has made it a big point to crack down on this sort of activity in the past. Instagram reserves the right to delete any content that they deem to be in violation of their censorship code of conduct. Things like this make the app more user friendly, which in turn leads to more users and thus revenue.

http://www.foxnews.com/tech/2017/10/20/twitter-aims-to-boost-user-safety-updates-its-rules.html

Artificial Intelligence Talents

Adobe demos new imaging editing features in their Max conference. These new features are generated and powered by technology called Sensei. This article reviews some of the new featured demos that make your image editing skills look amateur.

For example, instead of filling Photoshop holes with patterns and texture, Adobe uses Scene Stitch to search a database of similar pictures to fill that hole. Similar to Scene Stitch, another featured called Cloak essentially does the same thing but for videos, allowing you to edit certain objects out of frame entirely. In addition to Scene Stitch and Cloak, a feature called Project Puppertron analyzes drawings and applies “that same look” to an original photograph. Adobe also demoed Project Scribbler, a feature that adds corresponding color texture to black and white images. And then there’s SonicScape. Unlike any other, this feature generates appropriate sound to 360-degree videos as you move around. the article describes it as, “literally surround sound, but reactive to your head movements.”

It is quite obvious that artificial intelligence is expanding at what seems like a drastic rate, but Adobe’s Sensei platform is every Photoshopers’ dream. Sensei is going to differentiate between amateur’s and professionals. However, with all these features, is it too much? Do you have trouble identifying what is real and what is fake?

Source: https://www.msn.com/en-us/news/technology/adobe-is-training-ai-to-be-a-better-photo-and-video-editor-than-you/ar-AAtO5q9

Cell Phone Service Companies are Disregarding Your Privacy

In a world where the concept of privacy already seems to be fleeting, it just took yet another hit from the major U.S. cell phone service providers.  Thanks to both AT&T and Verizon, authorized third-party companies can access our personal information.  The worst part?  The data is not anonymous at all and these companies have been able to access it since late 2013.Locked Cell Phone (literally)

According to recent article from Medium, two companies partnered with AT&T, Danal and Payfone, released demos to the public so we could see what information they could pull up about us.  Through a financial contract, AT&T is actually assisting companies like these and “these services are using your mobile phone’s IP address to look up your phone number, your billing information and possibly your phone’s current location as provided by cell phone towers (no GPS or phone location services required)” (Neustrom).  If that isn’t scary enough, just know that these are not the only businesses with this kind of access.  After further research, the article goes on to state “US telcos appear to be selling direct, non-anonymized, real-time access to consumer telephone data to third party services — not just federal law enforcement officials — who are then selling access to that data” (Neustrom).   This non-consensual sale of private data from our own cell phones is truly alarming, and I definitely believe that regardless of the current state of internet privacy, steps need to be taken to protect users.

How do you feel about these cell phone companies now after reading this?  What steps do you feel should be taken, if any?  Leave a comment below.

 

Neustrom, Philip. “Want to See Something Crazy? Open This Link on Your Phone with WiFi Turned off.” Medium, Medium, 12 Oct. 2017, medium.com/@philipn/want-to-see-something-crazy-open-this-link-on-your-phone-with-wifi-turned-off-9e0adb00d024.

Image: http://www.howtovanish.com/images/Camera-Cell-Phone-Privacy.jpg

Social Engineering: What You Need to Know so They Don’t Find Out

During Tuesday’s lecture on ethics, privacy, and security, Dr. Pursel outlined different security threats that we all face in today’s technologically-powered world.  One particularly interesting method that others use to steal important information is social engineering.  Social engineering, at its base, is an attack technique that utilizes social and psychological manipulation to influence victims to divulge confidential information or to allow the attacker into a restricted area.  Usually this is done face-to-face in an attempt to get into a building, but today it is being used more over the internet or phone to gain important personal or financial information.  An example of this would be the recent rise in fraudulent phone calls where the attacker employs the pretext of being an IRS agent to trick people into giving up their data.

Social Engineering    In a recent VICE article, a woman by the name of Sophie Daniel described her experiences as a physical penetration tester.  In a nutshell, she is hired by businesses to attempt to break into their buildings and detail how they could improve their security as a company.  In general, she states that “very rarely do I go through an entire assessment without some sort of social engineering” (Daniel).  Some of the social manipulation strategies that she uses include performing basic social media research to make connections with her victims, as well as playing different fake roles like secretaries over the phone and interior designers in person to trick people into letting their guard down around her so that she could steal private data.  Through this and the mistakes of her victims (such as not verifying her identity), she is usually successful with her break-ins.  Overall, she claims that “there are ways to protect yourself and your company from attacks like this. I think it starts by sharing stories like these, and educating and empowering each other to be vigilant” (Daniel).

Since privacy as we know it is being killed off more and more by the day, it is integral now more than ever to pay attention to what information we are sharing, particularly online, and who we are sharing it with.  Awareness of social engineering and stories like Sophie’s are crucial to protecting ourselves and our businesses.

Daniel, Sophie. “How I Socially Engineer Myself Into High Security Facilities.” Motherboard, VICE, 20 Oct. 2017, motherboard.vice.com/en_us/article/qv34zb/how-i-socially-engineer-myself-into-high-security-facilities.

Image: https://wraysec.com/wp-content/uploads/2015/10/Social-engineering-security.png

A New Startup With A Goal of Making Documents Better

A new startup company co-founded by Shishir Mehrotra and Alex DeNeui are designing a next-generation spreadsheet that could very well make Excel a distant memory. Mehrotra, a former employee at Youtube, and DeNeui a former employee at Google have put their minds together to develop a document that combines a word processor and a spreadsheet, called Coda.

The goal for Coda is to have the ability to have a document that is as powerful as an app. When you open Coda, it can be seen as a blank document similar to a Google doc or a Microsoft doc. But when you start to add things, you quickly realize you can build on top of the document. For example, you can insert google maps into a Coda document and it will provide directions. The reason Coda has the ability to do this is because of its own formula language that integrates other services into its spreadsheets.

Of course, this isn’t the first time that a company has tried to reinvent a version of Microsoft. But so far, Coda has raised over $60 million from extremely notable investors, making many people think that Coda has the potential to be revolutionary.

Uber has been using Coda testing it out since the summer, having employees move some of Uber’s data slowly into Coda from Google Sheets. The main reason Coda is extremely useful for Uber, is because of the ability to link many documents together while constantly adding live data that updates automatically.

Although Coda is only available for desktops right now and has a long way to go, it is a very exciting step for businesses and people worldwide.

Newton, Casey. “Coda Is a next-Generation Spreadsheet Designed to Make Excel a Thing of the Past.” The Verge, The Verge, 19 Oct. 2017, www.theverge.com/2017/10/19/16497444/coda-spreadsheet-krypton-shishir-mehrotra.

Mashable. “Here’s How Bill McCoy Became a Legendary Rum Runner during the Prohibition.” Mashable, Mashable, 19 Oct. 2017, mashable.com/2017/10/19/crackle-the-real-mccoy/.