So I’m checking out the web…applications, services and what-not and it just dawned on me….WHAT THE HELL IS EVERYONE DOING??? Every site that I went to and attempted to use their free services asked me to log-in in with my Facebook account….now at first site it seems innocent enough, but then went the screen popped up that said that the site would be able to have access to my friends, all of my personal information and all of my friends personal information….. : ( what is this world now coming to. I see why they give their services and software away for free. They have a plethora of information at their disposal and in this day and age, information is power. So no longer is Facebook the lone wolf or shark in this media game, its everyone with a website that is willing to jump on the bandwagon and actively attempt to secretly trade free services for personal information. They are no longer waiting for the consumer to come to them. They want ALL of your personal information and they want it NOW! The normal procedures would have been for the consumer simply fill out a basic online form with minimum information so that they could receive the free services. Now, they want all of your friends, pictures, personal data that would NEVER be shared with a site like that. And to top it off….the consumer doesn’t have to be logged onto the site in order for the hosting site to access the users personal info and friends info. THEY CANE DO IT WHENEVER THEY WANT TO!!! I don’t know about you guys out there, but this IS scary! They know more about you than you actually remember you do. Soon there will be nowhere you can hide. THEY WILL FIND YOU!!! Good luck people…..I am praying for you.
Category: I Will Give You Security, If You Give Me Your Privacy…
Over the past few years it has been noticeably apparent that Facebook aims to deregulate standard privacy practices that users are accustomed to while using social media. Although Facebook’s stance is that if users are navigating their media platform, then they should be willing to fore-go the right to be anonymous browsers, IT DOES NOT MEAN THAT I SHOULD TRADE YOU MY PRIVACY FOR SOCIAL INTERACTIONS. But, Facebook doesn’t stop there. They go as far as to, not only fore-go standard privacy practices, but invite 3rd party API developers to have the same exact access to user’s personal information as the host site itself.
In a 2008 research study by Adrienne Felt, it was discovered that Facebook’s 3rd party API’s generally require none of the users personal information, but have complete access to it. Out of 150 studied Facebook applications, only 14 required private information. Of those 14 application, 4 of them violated Facebook’s Terms of Service Agreements. THIS IS WILD! Facebook is allowing 3rd party API developers to violate legal agreements set forth by the host site itself. They pull user data and add it to an in-application profile, making it visible to other application users who would otherwise not have access to it. I don’t know about you guys out there, but since beginning the class, Social Internet, I am much more aware, now, of certain privacy regulations and what is legitimate and what is not. SO users, beware because your information is up for grabs to Facebook API developers and the parties they sell their software to. C-R-E-E-P-Y!
GCIS CYBER-SECURITY BRIEFING: Internet “Kill Switch”: Mapping Out Governmententals Proper Role in Cybersecurity
ISSUED BY: GCIS Communications Command Center
SOURCE: The Heritage Foundation
GCIS CYBER-SECURITY UPDATE: The problem is indeed a challenging one. Clearly, the federal government needs the ability to protect its own interests, some of which require use of the private-sector portions of the Internet. Likewise, the government is charged with providing “for the common defense,” and all Americans would expect it to play a role in defending, say, the West Coast electrical grid against a Chinese assault.
The recent report of Chinese infiltration of Canadian government computers is a salient demonstration of the need for some defensive measures. And the reality is that if pre-enforcement judicial review of any governmental order is required, it is possible that the governmental response will be delayed so long that it proves ineffective.
But equally clearly, giving the government power over the private sector and the Internet is fraught with peril to civil liberties. Even though the legislation has explicit language denying presidential power to cut Americans off from the Internet generally (and even though any President of either party should not be presumed to exercise powers granted in a dictatorial way), the recent experiences in Egypt make it clear how relatively easy it is for an autocratically minded leader to take control of private conduct.
And even when government acts with good intent, mistakes happen—for example, the recent error in which DHS mistakenly seized a number of innocent domain names that it thought were tied to child pornography but were not. Post-enforcement judicial review is of less value after the order has already been given and implemented. (read full report)
“GCIS INTELLIGENCE UPDATE” is an intelligence briefing presented by Griffith Colson Intelligence Service, and provided to the public for informative purposes only. All subject matter is credited to it’s source of origin, and is not intended to represent original content authored by GCIS, it’s partners or affiliates. All opinions presented are those of the author, and not necessarily those of GCIS or it’s partners.
The military has issued a request for bids on software to let it spread messages and make online friends using non-existent identities on social media sites.
ISSUED BY: GCIS Communications Command Center
SOURCE: Information Week
GCIS CYBER-SECURITY UPDATE: The United States Air Force is taking an unusual approach to cyber-security with a request for bids for “Persona Management Software,” which would let someone command an online unit of non-existent identities on social media sites. The move became a major topic last week following the release of emails from private security firm HBGary, which were disclosed after an attack by Wikileaks competitor and collaborator Cryptome.org.
According to Solicitation Number: RTB220610 , the armed services division sought a software program that could manage 10 personas per user, including background; history; supporting details, and cyber presences that are ” technically, culturally and geographacilly [sic] consistent. Individual applications will enable an operator to exercise a number of different online persons from the same workstation and without fear of being discovered by sophisticated adversaries. Personas must be able to appear to originate in nearly any part of the world and can interact through conventional online services and social media platforms. The service includes a user friendly application environment to maximize the user’s situational awareness by displaying real-time local information.” (read full report)