Friday, July 27, 2018

Penetrating a Social Network

Almanac: William Hazlitt on perfectionism
“Those who aim at faultless regularity will only produce mediocrity, and no one ever approaches perfection except by stealth, and unknown to themselves.” William Hazlitt, “Thoughts on Taste” ... read more

The only real sadness, the only real failure, the only great tragedy in life, is not to become a saint.
— Leon Bloy, born in 1846

"A city, like a book, can be read"




Characters who wanted MEdia Dragon  hounded moan  over being hounded Attractive, Funny and Rich

Mark Zuckerberg is a horror show. But there’s a glimmer of truth hidden in his latest blunder. Margaret Sullivan, WaPo








Australia comes in second place in latest UN digital gov rankings
The United Nations thinks we’re doing well at digital transformation — or everyone else is doing worse.


IN THE MAIL: The Courage to Be Disliked: The Japanese Phenomenon That Shows You How to Change Your Life and Achieve Real Happiness

Amar Singh is Victoria police's most wanted

Poynter has updated this very useful guide – Here’s where governments are taking action against online misinformation – subject matter includes hate speech law, misinformation. media literacy, fake news, election misinformation, political bots and advertising, foreign disinformation campaigns, media regulation, internet regulation.

Pew – As the #BlackLivesMatter hashtag turns 5 years old, a look at its evolution on Twitter and how Americans view social media’s impact on political and civic engagement: “This month marks the fifth anniversary of the #BlackLivesMatter hashtag, which was first coinedfollowing the acquittal of George Zimmerman in the shooting death of unarmed black teenager Trayvon Martin. In the course of those five years, #BlackLivesMatter has become an archetypal example of modern protests and political engagement on social media: A new Pew Research Center analysis of public tweets finds the hashtag has been used nearly 30 million times on Twitter – an average of 17,002 times per day – as of May 1, 2018

HONEY TRAP: Judge Orders Accused Russian Spy to Stay Behind Bars as DOJ Alleges Sex Offered for Political Influence


ABA Journal, ABA Reveals $1.3M Theft by a Now-Former Staff Member on Tax Form:
The American Bar Association has posted a tax form that reveals a onetime staff member diverted about $1.3 million from the ABA over a period of eight years.
The ABA became aware of the theft by a nonmanagerial staff member last September, according to Form 990 (see page 118) and an interview with ABA Executive Director Jack Rives.



PGP encryption isn’t dead, despite the panic over EFAIL

Press Release, Treasury Department and IRS Announce Significant Reform to Protect Personal Donor Information to Certain Tax-Exempt Organizations:
The Treasury Department and IRS announced today that the IRS will no longer require certain tax-exempt organizations to file personally-identifiable information about their donors as part of their annual return.  The revenue procedure released today does not affect the statutory reporting requirements that apply to tax-exempt groups organized under section 501(c)(3) or section 527, but it relieves other tax-exempt organizations of an unnecessary reporting requirement that was previously added by the IRS. 
Modern threats have emerged from the prevalence of social networks. Hostile actors, such as extremist groups or foreign governments, utilize these networks to run propaganda campaigns with different aims. For extremists, these campaigns are designed for recruiting new members or inciting violence. For foreign governments, the aim may be to create instability in rival nations. Proper social network counter-measures are needed to combat these threats. Here we present one important counter-measure: penetrating social networks. This means making target users connect with or follow agents deployed in the social network. Once such connections are established with the targets, the agents can influence them by sharing content which counters the influence campaign. In this work we study how to penetrate a social network, which we call the follow-back problem. 

New tool helps you find 48,000+ open Amazon S3 buckets The Daily Swig: “Hundreds of thousands of potentially sensitive files are publically available through open Amazon buckets, a new online tool can reveal. The free tool, created by software engineer GrayhatWarfare, is a searchable database where a current list of 48,623 open S3 buckets can be found. Amazon’s S3 cloud storage, or Simple Storage Service, is used by the private and public sector alike as a popular way to cache content. Files are allocated buckets, which are secured and private by default, but can easily be set for public access. While it is perfectly acceptable to set S3 buckets as available for all to read, numerous data breaches have been the result of an administrator’s misconfiguration. In March of this year, for example, an unsecured bucket at a US-based jewelry company resulted in the exposure of the personal details of over 1.3 million people, including addresses, emails, and IP identifiers. Bob Diachenko of Kromtech Security was the first to report the incident, and has helped create a tool aimed at detecting bucket permissions, similar to the one created by GrayhatWarefare.
“On the one hand, it [GrayhatWarfare’s tool] follows the same path as Shodan does,” Diachenko told The Daily Swig. “It gives researchers and the general audience a possibility to check if their infrastructure is safe. At the same time, it opens doors for ‘passwords-seekers’ and people with malicious intents to leverage upon data found in this ‘Semsem’ cave…”








Putin: The one-man show the West doesn’t understand

Bulletin of the Atomic Scientists – Putin: The one-man show the West doesn’t understand, Published online: 13 Apr 2016.
“The West is at an inflection point in its relations with Russia; the stakes for having an accurate understanding of its president, Vladimir Putin, have never been higher. A misreading of this man – now one of the most consequential international political figures and challengers to the US-led world order since the end of the Cold War – could have catastrophic consequences. Russia’s 8,000 nuclear weapons (and the vehicles to deliver them to any point on the globe) underscore the huge risks of not understanding who Putin is, what he wants, how he thinks, and why. Where do his ideas and conceptions come from?

The Data Transfer Project (DTP) “is a collaboration of organizations committed to building a common framework with open-source code that can connect any two online service providers, enabling a seamless, direct, user initiated portability of data between the two platforms. The Data Transfer Project was formed in 2017 to create an open-source, service-to-service data portability platform so that all individuals across the web could easily move their data between online service providers whenever they want. The contributors to the Data Transfer Project believe portability and interoperability are central to innovation. Making it easier for individuals to choose among services facilitates competition, empowers individuals to try new services and enables them to choose the offering that best suits their needs. Current contributors include: Facebook, Google, Microsoft and Twitter.
  • How does it work – The Data Transfer Project uses services’ existing APIs and authorization mechanisms to access data. It then uses service specific adapters to transfer that data into a common format, and then back into the new service’s API. Learn More
  • Why do we need DTP – Users should be in control of their data on the web, part of this is the ability to move their data. Currently users can download a copy of their data from most services, but that is only half the battle in terms of moving their data. DTP aims make move data between providers significantly easier for users.” Learn More