Tag Archives: Google Plus

Three privacies walked into a bar

It is not merely the beginning of a bad joke; it has become a distasteful one. Now, for the most I have never really been against social media like Facebook, as it was free and nothing comes for free. Yet in this, I have always advocated and expected certain levels of decency. The Guardian revealed two days ago that large levels of decency have been trampled on to a much larger degree than ever contemplated, and the people remain silent. The people are so uppity uppity on possible transgressions by governments seeking criminals and terrorists, yet they will allow for any transgression towards greed and exploitation, how can we accept any of it?

  1. Show us your tits

It is an old expression, and I heard it first somewhere in the early 80’s. It broadly represents: ‘What have you got to offer?‘ Mostly used by people with absolutely no adherence to either diplomacy or good manners (unless a guy makes the joke to a good male friend). It is the first part in the stage that the Guardian offers in an article (at https://www.theguardian.com/technology/2018/dec/19/facebook-shared-user-data-private-messages-netflix-spotify-amazon-microsoft-sony) where we see not merely ‘bending’ the rules; it is the breaking of basic rights towards privacy that is now out in the open. Even as we accept to the smaller degree: “making user data available through loopholes to companies including Amazon, Microsoft and Sony“, can we even contemplate the impact that we would have to face through: “Facebook gave Netflix and Spotify the ability to read and even delete users’ private messages“, the fact that these two were allowed to ‘delete’ messages is crossing a line the width of the grand canyon and the fact that those fruits and nuts on Capitol Hill (aka Senators and Congressmen) are clueless in their interviews, showing one stupidity tainted example after another and questions like ‘giving away rights to delete private messages‘ remained largely undisclosed shows just how useless the elected officials have become towards the larger fields of technology.

  1. Merely the tip, or can I shove my whole penis in there?

A small reference to the comedian Jimmy Carr, who once stated: “I can’t get a word in there, let alone my cock“, and that setting gives us the New York Times view of: “Facebook allowed Microsoft’s Bing search engine to see the names of virtually all Facebook users’ friends without consent, the records show, and gave Netflix and Spotify the ability to read Facebook users’ private messages” (at https://www.nytimes.com/2018/12/18/technology/facebook-privacy.html#click=https://t.co/p565d1TX5L). As we contemplate: “Acknowledging that it had breached users’ trust, Facebook insisted that it had instituted stricter privacy protections long ago. Mark Zuckerberg, the chief executive, assured lawmakers in April that people “have complete control” over everything they share on Facebook“, we see a much larger field opening up. We can think on one side that Mark Zuckerberg had become clueless on what is going on, or he remains intentionally silent on what he believes are personal rights of privacy, the mere realisation that Facebook acknowledges that not one user on Facebook has any rights to privacy is at the core of this stage. It goes further with: “the deals described in the documents benefited more than 150 companies — most of them tech businesses, including online retailers and entertainment sites, but also automakers and media organizations. Their applications sought the data of hundreds of millions of people a month, the records show. The deals, the oldest of which date to 2010, were all active in 2017. Some were still in effect this year” there is a clear transgression going on, and it is merely speculative on my side when we considered the impact of Bing and Microsoft. They have become so afraid of what Google has become that they are willing to stage new settings of alliances against whatever fictive war they face, the innovations that Google has brought and the innovations that Chinese player Huawei is bringing is scaring these large players beyond belief. If they cannot get up to their imaginative version what it means to be ‘on par’ they feel that they will be considered as derelict and considered as merely trivial in the 5G field. That is a much larger realisation and people need to be aware that as they contemplate of what it means to be a major player in the 5G field, the mere perception that they are not that, that they have lost the trust of the people is a much larger hurdle.

The NY Times shows that part in their article with: “Mr. Zuckerberg was determined to weave Facebook’s services into other sites and platforms, believing it would stave off obsolescence and insulate Facebook from competition. Every corporate partner that integrated Facebook data into its online products helped drive the platform’s expansion, bringing in new users, spurring them to spend more time on Facebook and driving up advertising revenue. At the same time, Facebook got critical data back from its partners“. We could contemplate that this is optionally the Ponzi version of a data scheme, but it is as I personally see it more sinister than that. You see, the lower levels would never advance to a higher level and the data would merely flow up to the tip of the pyramid, leaving the rest as mere exploitable facilitators in all this.

  1. Supply Filofax’s to the Russians, it is very organised crime

There is one additional part in all this that could be the beginning of the end for Facebook, as the NY Times gives us: “Facebook, in turn, used contact lists from the partners, including Amazon, Yahoo and the Chinese company Huawei — which has been flagged as a security threat by American intelligence officials — to gain deeper insight into people’s relationships and suggest more connections, the records show“, we are introduced to a much larger issue. Not only has the US been unable to prove the lie (read: non-truth) that Huawei is a National Security danger. We see the makings of the fact that American Corporation (read: Facebook) has been handing over the data voluntarily. As a business solution, Huawei had been able to see where the interactions were the largest and also predict where hardware and software would make it a much better regarded update for consumers, the fact that this data became available gives the first rise (after shown levels of non-comprehension) that technology firms are replacing politicians, politics and policy making them useless as these technology firms have been setting the beat of who gets what data and at which price, yet the US government is not allowed access, not when it can be sold at $14.99 per kilobyte of raw data.

This remains an evolving field and it is not until we get to the part “Apple devices also had access to the contact numbers and calendar entries of people who had changed their account settings to disable all sharing, the records show. Apple officials said they were not aware that Facebook had granted its devices any special access. They added that any shared data remained on the devices and was not available to anyone other than the users“, so not only does the new iPad pro bend under the smallest pressure, which Apple claims is normal (something the consumer was not informed about), we see that the ignorance of their own technology is now a much larger issue all over the playing field. the mere fact that disabled sharing of data still allowed for sharing is an architectural failure of much larger proportions than ever contemplated. In all this data sharing in Huawei devices remains unproven and in all this it seems that Google is not the black sheep some proclaim it is, all whilst Facebook is showing to be without ethics, without regards and without morals, so at what point will we relabel Facebook to Faecesbook?

So as the article ends with: “How closely Facebook monitored its data partners is uncertain. Most of Facebook’s partners declined to discuss what kind of reviews or audits Facebook subjected them to. Two former Facebook partners, whose deals with the social network dated to 2010, said they could find no evidence that Facebook had ever audited them. One was BlackBerry. The other was Yandex” gives a much larger rise to the lack of privacy that up to two billion users have not had for the longest of times. We could argue that it is in the interest of Google, to fix Google+ and allow people to port away from Facebook. When we look at the two players, it seems that Google+ is not nearly as dangerous as Facebook is more and more showing to be. Even as we are considering that Washington DC is suing Facebook, the realisation we get from: “Washington DC has sued Facebook for allowing the political consultancy Cambridge Analytica to gain access to the personal data of tens of millions of the site’s users without their permission“, when we set it against the stage that the guardian, the Times and the New York Times have shown the people. We merely have to print the log of all data shared and number all instances of data transgression will optionally show Facebook to be the most reckless and unethical corporation in the history of technology, that is quite the achievement, and it works for Microsoft as they might proclaim themselves to be saints in a tar pit.

When we consider the quote: “According to a letter that Facebook sent this fall to Senator Ron Wyden, the Oregon Democrat, PricewaterhouseCoopers reviewed at least some of Facebook’s data partnerships“, we see a massive failure by Facebook to police and protect the data of others, and as we already know, those who have the latest mobile phone, we need to realise that this is no longer a mobile phone, the latest phones and the ones for 5G are no longer merely mobile phones, they have become personal data servers and as we are seeing the impact where Facebook has made most of all that data shareable, with people you never agreed on having access, in how much anger will you be from January 1st 2019 and onwards? For me it works out nicely, it merely increases the value of my new IP, which is currently on the rise to a much larger degree than even I contemplated. 2019 might be finally be the year where my life turns largely to the better and at present I feel a lot safer handing that IP to Huawei than to anyone else, that is one reality that Washington DC has shown to the largest of degrees (Mountain View remains a strong contender for now).

The only part in all this is why large parts of all this was not shown clearly in the senate hearing of September 2018. Just contemplate this weekend, what else did that so called Senate hearing not figure out, and how unsafe would you like your personal data end up being in 2019?

 

Advertisements

Leave a comment

Filed under Finance, IT, Law, Media, Politics, Science

Just like everyone else

For the longest of times, I have worshiped Google. I have always been pro Google, and having worked in their offices for a year, being exposed to the options within Google is just overwhelming (and the food is pretty much the best in the world). So what happens when you are shown that Google is basically just like all the other large corporations? What when you wake up to an early e-mail where google advises you on the new Google Home Hub and the Google Pixels 3 (which is appealing even if it is at the price of your soul), yet 150 minutes later, you are shown by the Wall Street Journal that Google is just like every other corporation at present, how would you feel?

I can tell you that an ice bucket of water over your head at that point would have seemed a soft caress in contrast to the rude awakening I was made privy to.

To get the better view, we need to go back to May 2108, where we were treated to: “Google Australia’s boss Jason Pellegrino, who spoke on a CEO panel at Sydney’s CeBIT tech conference today, told the audience there had to be a “utility exchange” for the data a business obtains, adding if there is no trust, it can prove detrimental“, as well as ““That was about a leaky bucket. That data was going to places that consumers didn’t expect, didn’t agree with and got not value out of themselves. “None of these data buckets should be leaky. However, it’s started a discussion about what’s in the bucket itself. The data that’s there has been used to deliver a great service – no one has been sitting there saying Netflix ‘I can’t believe the data that you’re sharing’ – because they are delivering a wonderful service.”“. So as we were given on Monday ‘Google Exposed User Data, Feared Repercussions of Disclosing to Public‘ with the two quotes: “Google exposed the private data of hundreds of thousands of users of the Google+ social network and then opted not to disclose the issue this past spring, in part because of fears that doing so would draw regulatory scrutiny and cause reputational damage, according to people briefed on the incident and documents reviewed by The Wall Street Journal“, as well as “A software glitch in the social site gave outside developers potential access to private Google+ profile data between 2015 and March 2018, when internal investigators discovered and fixed the issue, according to the documents and people briefed on the incident“, so basically Jason Pellegrino (not the exquisite Italian sparkling water) was basically calling the kettle black, whilst we can agree at this point that he had no business opening his mouth in the first place in light of 3 years of hidden software screw ups. It seems to me that both are in equal hot waters. Even if we water it down (not using sparking Pellegrino) into a setting that Cambridge Analytica was doing it on purpose and that the implied setting by Alphabet Inc. is that their software engineers basically did not know what they were doing (to some extent). We can call a fair dinkum, but something this hidden for three years. What optional issues can we expect from the Google Pixel 3, with Android version 3.14159265418 (Android Pie), as well as the Google Home Hub where the consumer is optionally revealing all their daily needs (including the speculatively implied and roughly estimated 54,233 daily attempts to watch Pornhub) with or without the optional keywords Jennifer Lawrence, Kate Upton, Ariana Grande, Shania Twain, Selena Gomez, Kirsten Dunst and Taylor Swift. Yes, that is the data those marketeers are willing to pay handsomely for, not to mention those unnamed parties speculatively involved in election persuasion consultancy projects.

It gets even more interesting that the Home Hub could potentially reveal when a person is at home or not (like on vacation), because there is no one who would want that data, right? Last week we would not have given it a second thought, yet with the revelations in the Wall Street Journal (at https://www.wsj.com/articles/google-exposed-user-data-feared-repercussions-of-disclosing-to-public-1539017194) we now have a much larger issue. It was fun to see the review on the Verge where we see this puppy in action (the Google Home Hub) where the operator asks for the overview of the Pixel 2, whilst pre-orders of the Pixel 3 are happening all over the world, another fallen blobby in all this.

So as we see the turmoil that one of the world’s biggest tech giants will face over the last quarter of the year, we need to realise that you should never meet your idol whilst he is still alive. I reckon that Google Chief Executive Sundar Pichai will be able to hold his cool for the smallest amount when he meets me, but that is presently not a given.

So as well are treated to “The closure of Google+ is part of a broader review of privacy practices by Google that has determined the company needs tighter controls on several major products, the people said. In its announcement Monday, the company said it is curtailing the access it gives outside developers to user data on Android smartphones and Gmail” we need to wonder what is next for the social media people. I actually preferred Google+ as it was less junk driven then Facebook. And it also gave me the timeline as a first instead of the populist drive, which still annoys me in Facebook. So even as some at Google as trying to wane us to slumber, the cold reality is : ‘the company has no evidence that any outside developers misused the data but acknowledges it has no way of knowing for sure‘. That is the immediate setting in this, we no longer know who has our details and we might never know how we were optionally specifically phished and targeted as per 2015, is that not a nice new reality to face?

So as we need to realise “The company will stop letting most outside developers gain access to SMS messaging data, call log data and some forms of contact data on Android phones“, we might think it is no big deal, but this has the data potential to be a lot larger than any nightmare scenario that the UK ‘Hacked Off‘ ever envisioned in their nightmare settings that the press would have been up to, when people with less scruples (not by much though) have been given optional access to and let’s not forget, the criminals tend to be more creative then the law enforcers ever have been (or some of the intelligence services for that matter).

So even as we accept that the Google plus issue is a dwarf compared to the Facebook scandal, it still optionally victimised the setting through: “It found 496,951 users who had shared private profile data with a friend could have had that data accessed by an outside developer, the person said. Some of the individuals whose data was exposed to potential misuse included paying users of G Suite, a set of productivity tools including Google Docs and Drive, the person said. G Suite customers include businesses, schools and governments“.

I am not alone in this, a few hours ago, the New York Times are giving us: ‘How Will Google Play Its New Product Announcements on the Back of a Data Scandal?‘ (at https://www.nytimes.com/2018/10/09/business/dealbook/google-data-products.html). It is not merely that part, we need to consider that at present only Apple has a seemingly clean slate and they can use this to their advantage. It is in the end watered down by the NY Times through “They’re all part of Google’s strategy to highlight the company’s services via hardware (rather than necessarily become best-sellers in their own right)“, they are all still ruled by software and the cold setting here is that it is their software that was incompletely tested and prodded by those who should have done so. I refuse to merely blame a programmer here, it is a much larger problem!

The failing here can be seen in places like Ubisoft, EA Games, Bethesda, Microsoft and several other large developers. The non-stop trivialisation of proper testing and proper timelines to test settings is at the back of all this. It is not merely a lacking QA, it is a non believe in the power of testers and longer conversations in their insights that is here as well. Issues seen in FIFA 19, several shortcomings in NHL 19, AC Odyssey bugs reported mere hours ago and the less said regarding the Microsoft Surface Go the better and the list goes on. These issues shows that Google is part of the entire problem, the quality testing and scrutiny is seemingly not done (or not done to the extent needed), and with the Google Pixel 3 just around the corner, with a lessened confidence level at present, would you at that point trust the Google Pixel 3XL 128GB at $1500, or will you play it cautiously and select the less powerful, but still a large step forward when selecting the Huawei nova 3i 128GB Handset at $600, in this day and age, can we feel comfortable with spending an optional $900 too much? I will admit that there are a few alternatives at that price, not merely Huawei, but the list of quality choices is very small.

The revelation that the Wall Street Journal exposed us to on Monday is probably the most inconvenient that Google has faced in a long time. Even before we see whatever Google has to promote in the near future on 5G capabilities and enabling technologies, they now have a visible problem to address. It is not merely a dent in their armour, it now shows us a Google that was optionally never the knight in shining armour it has largely been seen as, which is a much larger problem for Google then they are willing to admit to any day soon.

Too many are hiding behind hype terms like AI and machine learning, yet the realisation that non repudiation and authentication was required on many more levels where data is involved in all this, is a failing on several levels, predominantly the developers one and it is there that Google will possibly face a very hard time to come.

#Halfwaytotheweekendnow

 

Leave a comment

Filed under Finance, IT, Media, Science

Within the realm of privacy

We all have an inherent need for privacy, we want things to be at our leisure of contemplated sharing. Yet, what is privacy? On one side we want privacy, but the next moment ladies will share whether their carpet is a landing strip or a martini glass, I for one do not care. If they want to share certain parts that’s fine with me. I am not too much about sharing. On the other side, apart from a few MP3 files, there is nothing interesting on my mobile. I reckon that my mobile is one of the dullest ones around.

So when I initially heard about the FBI wanting to access the iPhone of Syed Farook, I shrugged my shoulders and went ‘whatever!’ meaning that I was not opposed and I did not care. It was the techdirt site that has an interesting fact from the court case.

Footnote 7, on page 18 details four possible ways that Apple and the FBI had previously discussed accessing the content on the device without having to undermine the basic security system of the iPhone, and one of them only failed because Farook’s employers reset the password after the attacks, in an attempt to get into the device“, so the boss went into ‘auto-moronic’ mode and did not check? He acted without knowing? So when we see “The ‘owner’ of course, being the San Bernardino Health Department, who employed Farook and gave him the phone. Basically, what this is saying is that if the password hadn’t been reset, it would have been possible to try to connect the phone to a ‘trusted’ network, and force an automatic backup to iCloud — which (as has been previously noted) was available to the FBI. But by ‘changing’ the password, apparently that option went away“, should we consider that his boss was stupid, or that his boss was scared he had done something wrong and this was his/her way of covering the mess up? (at https://www.techdirt.com/articles/20160219/17463033656/footnote-reveals-that-san-bernardino-health-dept-reset-syed-farooks-password-which-is-why-were-now-this-mess.shtml).

For the record, that was clear speculation on my side!

What happened was that Apple, the firm that initially ‘screwed over’ its customer base with error 53. A few days ago, the Guardian reported ‘Apple ordered to decrypt iPhone of San Bernardino shooter for FBI‘ (at http://www.theguardian.com/us-news/2016/feb/17/apple-ordered-to-hack-iphone-of-san-bernardino-shooter-for-fbi). In there we see the important quote: “In 2014, Apple began making iPhones with additional encryption software that they said they could not unlock, even if faced with a court order. Apple said this was done in the name of consumer privacy and cybersecurity, but the company has been locked in a public feud with the FBI since“. I understand that there is a need for privacy. My issue is why THIS level of privacy is needed. One could speculate that this is to keep the financial adviser’s customer base happy. I reckon that those people look for other means the moment their actions could be monitored, or investigated afterwards. Again, speculation from my side.

You see, I do not comprehend why law abiding citizens are so in fear, of what the government finds out. Most people can’t stop selfie themselves, their fashion and body parts to social media on a global scale. They tend to Facebook all details, especially when they are far away from home to ‘all’ their friends, so that the department of discreet entry and removal operations can empty their homestead in the meantime. With so much sharing, what privacy do you think you still have?

So back to the Granny Smith of automation, the next article (again the Guardian) gives us ‘FBI escalates war with Apple: ‘marketing’ bigger concern than terror‘ (at http://www.theguardian.com/technology/2016/feb/19/fbi-apple-san-bernardino-shooter-court-order-iphone), here we see the subtitle ‘Court filing from Department of Justice says Apple is more concerned with ‘its marketing strategy’ than helping FBI unlock San Bernardino shooter’s iPhone‘, which is fair enough when we consider that a failed marketing equals an alleged death in those houses. The quote “Cook called for public debate and has been backed in his fight by some of tech’s biggest names, including Google’s chief executive Sundar Pichai, WhatsApp and whistle-blower Edward Snowden“. I think that this is less about Americans and more about the 7 billion non-Americans that have this false fear of the CIA and the NSA. Yet in all this, the only true group to fear this is the 0.0001% of the population, I do not even register and in that regard most do not even register. Like the previous mass surveillance marketing ploy, simple fear mongering.

Now, let it be said that I have nothing against a person’s privacy and there is nothing wrong with wanting privacy, yet when we consider the 1.5 billion on Facebook, the 100 million on Instagram, the 307 million on Twitter and over 100 million users on Pinterest, we have well over 80% of the iPhone users on social media all sharing from mere events attended up to the grooming of the most private of parts, Which makes the shout for privacy a little too hilarious.

So how does this fit legally?

Well first there is the part that the DoJ is now relying on. It is the All Writs Act of 1789, which states “The Supreme Court and all courts established by Act of Congress may issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law“, which sounds rather nice,

Yet the fact that the DoJ needs to rely on an act that has, according to several press sources, only been used thrice is a little too novel.

When we consider that the ‘self-destruct’ was enable by Farook’s boss (making the device useless to thieves), only leaves the DoJ without options. What is interesting is when the last cloud backup has happened, had it happened at all? Too many question that are all in the realm of speculation and none of it gives way to legislation. The question becomes should it be? I am not opposing the FBI, CIA or NSA. Yet these alphabet groups do know that they are fishing in murky waters. You cannot expect a corporation to set a product meant for 1,000 million to have options for the internally build exemption of 5,000-7,000 users. The math just does not add up!

I was talking about the legality, so let’s continue there.

In McCabe v British American Tobacco Australia Services Ltd,’ and the appeal, British American Tobacco Australia Services Ltd v Cowell (Representing the Estate of McCabe (deceased)), exposed some of the difficulties that plaintiffs who sue large corporations may face in litigation involving access to documentation. The Victorian Court of Appeal reversed the first instance decision which had struck out the defence of a tobacco company (‘BAT’). The basis for the first instance decision was that BAT had systematically destroyed documents that might have been relevant to the plaintiff’s case. It important to state WHO destroyed documents. You see, in case of Farook it was the boss who ‘destroyed’ the options for information retrieval. The important issue is that INTENT becomes near impossible to prove. In addition that case gives us: “The High Court declined the opportunity to clarify the law in this important area by refusing leave to appeal. The effect of this case, absent statutory reform, is that corporations may destroy potential evidence provided that their actions do not constitute an attempt to pervert the course of justice or a contempt of court. These are notoriously difficult to establish” (source: Playing for keeps? Tobacco litigation, document retention, corporate culture and legal ethics by Matthew Harvey and Suzanne Lemire. The reason for going towards this case is that the entire approach to mobile architecture and auto-backup could instigate updates where the mirror is encrypted extern from Apple. Which means that any phone would have an XML set-up and data object, but the object would be irretrievable. The ‘responsibility’ for proper password maintenance would be kept with the ‘client’ or end user. Taking Apple out of the equation leaving the DoJ with the apple pie made from the famous Granny Smith (AKA Janet Abigail Doe).

This takes the entire cyber conversation towards Spoliated Evidence, where we see “a party is faced with the fact that certain key evidence has been destroyed, altered, or simply lost“, destroyed implies intent, but proving that is next to impossible (which got us the tobacco case. Altered is basically what the DoJ faces as the boss decided to reset the password, again malicious intent becomes next to impossible to prove, whilst lost is not in play in this case but could clearly complicate the issue if that was the case, as the DoJ would have no implied evidence at all.

This entire endeavour goes even further south when we consider Federal Insurance Co. v. Allister, 622 So. 2d 1348, 1351 (Fla. 4th DCA 1993), where the Fourth District decided to set forth five factors to consider before imposing sanctions for spoliation of evidence. They were:

  • whether there is prejudice;
  • whether the prejudice can be cured;
  • the practical importance of the evidence;
  • the good faith or bad faith surrounding the loss of evidence;
  • Possible abuse if the evidence is not excluded.

As bad faith is now linked to the degree of wilfulness, we get back to intent. If mere ‘negligent loss’ does not cut the cake and the cake cannot be devoured without the essential evidence, the entire issue goes nowhere really fast. Basically, it boils down to the boss of Farook having one set of glasses on with the limiting mindset of cost if his mobile was ‘abused in usage’, leaving Apple in the clear shrugging their shoulders going ‘not my problem now’, whilst in all this we are left with no evidence linking to intent or malice. That small scope that was available will in all expectations to be diminished further. It basically solves all of Apple’s problems.

In the need for privacy we have gone from exceptionally rare to just hilariously ridiculous. The Guardian article (at http://www.theguardian.com/technology/2016/feb/20/apple-fbi-iphone-explainer-san-bernardino) shows in equal measure another side. Which comes from Senator Ron Wyden, Democrat from Oregon. Here we read “Some are calling for the United States to weaken Americans’ cybersecurity by undermining strong encryption with backdoors for the government,” he wrote on Medium on Friday afternoon. “But security experts have shown again and again that weakening encryption will make it easier for foreign hackers, criminals and spies to break into Americans’ bank accounts, health records and phones, without preventing terrorists from ‘going dark’“, as such correctly implying that the medication will end up being a lot worse than the disease they face. In addition to that, should Farook have relied on another path, for example receive orders and message a ‘guild’ within a Facebook RPG game, the wasted time on the iPhone becomes nothing more than an iconic episode of the Comedy Capers. With these games receiving billions of messages a day, parsing though 1 of a dozen games would take years. The fact that none of this required any encrypted android or IOS system, just a mere desktop like millions of students use makes for the case against the Alphabet teams. When looking at Extremetech, we see a quote that is important in all this, the quote: “how terrorist organization uses social media to spread its message and radicalize curious readers. GWU’s research found that while ISIS uses a wide range of services, including Facebook, Google Plus, Kik, WhatsApp, and Tumblr, Twitter is the social media site of choice. Twitter already patrols and bans the accounts of ISIS supporters“, it casually forgets the 3-4 dozen accounts that do not raise any flags, the accounts that ACTUALLY bring details of the attacks to the transgressors.

 

 

 

Leave a comment

Filed under IT, Law, Media, Politics