This week in Data Exploitation Issue 1*

Privacy International
Privacy International
9 min readApr 10, 2017

*An irregular newsletter about data and exploitation

We found this here.

What is data exploitation? Watch this and read below.

10 April, 2017

This week in a nutshell: security nightmares — especially when you’re poor, drones on drones automation, using artificial intelligence to solve artificial intelligence privacy problems, surveillance of activists, fog computing is the new cloud computing, data selfies, and ‘moral’ machines.

__in the news

UK tourists to US may get asked to hand in passwords or be denied entry

Although mitigation options exist, lawyers warn attempts to protect personal data may be seen as ‘probable cause’ for searching

US government drops effort to unmask anti-Trump Twitter account

Attempt to reveal identity behind an account criticizing Trump’s immigration policy sparked an outcry from free speech advocates and a lawsuit from Twitter

Wonga data breach could affect nearly 250,000 UK customers

Personal details from hundreds of thousands of accounts may have been illegally accessed, admits payday lender

Australian anti-war activist ‘among victims of alleged UK police hacking’

Ciaron O’Reilly one of 10 people named by whistleblower as having had emails illegally monitored by Scotland Yard

NYPD officers accessed Black Lives Matter activists’ texts, documents show

Exclusive: Documents obtained by the Guardian reveal details of how police posed as protesters amid unrest following the death of Eric Garner.

Open sesame — unless you complain about your ‘smart’ door opener

Who needs horror films? We have the IoT. Or, more precisely, the IoST: the Internet of Scary Things!

Watch Hackers Use a Drone-Mounted Laser to Control Malware Through a Scanner

Researchers in Israel have shown off a novel technique that would allow attackers to wirelessly command devices using a laser light, bypassing so-called air gaps.

Hackers set off Dallas’ 156 emergency sirens over a dozen times

Twice the normal volume of 911 calls came into the system early Saturday morning.

20,000-bots-strong Sathurbot botnet grows by compromising WordPress sites

A 20,000-bots-strong botnet is probing WordPress sites, trying to compromise them and spread a backdoor downloader Trojan called Sathurbot as far and as wide as possible.

We found this here.

__analysis / opinion

Global Inequality in Your Pocket: How Cheap Smartphones and Lax Policies Leave Us Vulnerable to Hacking

The people who can least afford are often the most vulnerable to fraud and harassment when their digital privacy is violated.

Call for encryption ban puts Rudd against industry and colleagues

A previous plan to ban end-to-end encryption was dropped after widespread opposition, including from David Davis

Source: The Guardian https://www.theguardian.com/technology/2017/mar/26/amber-rudd-battle-tech-firms-cabinet-whatsapp-david-davis

Insurers Scramble to Put a Price on a Cyber Catastrophe

Trying to estimate the maximum cost of a devastating cyber event before one actually happens.

The Future Of Technology Isn’t Mobile, It’s Contextual

Next up: Machines that understand you and everything you care about, anticipate your behavior and emotions, absorb your social graph, interpret your intentions, and make life, um, “easier.”

Fog Computing Brings Big Data Back to Earth

Cisco generally gets the credit for the term fog computing, aka edge computing. A 2015 whitepaper explains, “Today’s cloud models are not designed for the volume, variety, and velocity of data that the IoT generates. Billions of previously unconnected devices are generating more than two exabytes of data each day. An estimated 50 billion ‘things’ will be connected to the Internet by 2020.”

You can’t spend a penny without being snooped on

Coins and notes with the Queen’s head on them, endorsed by a sovereign state, are no longer sufficient for British Airways. It needs to know who we are.

Enter the new commercially lucrative world of DroneVSDrone technology

Startup AirSpace claims its own drone defense system can use computer vision algorithms and some mild in-flight autonomy to let it command a fleet of defense drones that can identify hostile drones and automatically fire net-guns at them.

Evidence of trauma: the impact of human rights work on advocates

It’s time to think seriously about the effects of trauma on human rights activists. A contribution to the openGlobalRights debate on mental health and well-being in the human rights.

Hospitals Are Prescribing Home Surveillance to Save Lives

As the US healthcare system faces turmoil, hospitals around the country are changing the way they practice medicine. Using new monitoring technologies, doctors are beginning to get an uninterrupted view into the medical lives of their patients after they leave the office.

__long reads

A.I. versus M.D.

What happens when diagnosis is automated?

Banks and Tech Firms Battle Over Something Akin to Gold: Your Data

The big banks and Silicon Valley are waging an escalating battle over your personal financial data: your dinner bill last night, your monthly mortgage payment, the interest rates you pay.

How statistics lost their power — and why we should fear what comes next

The ability of statistics to accurately represent the world is declining. In its wake, a new age of big data controlled by private companies is taking over — and putting democracy in peril

We found this here.

__investigations

Minority Neighborhoods Pay Higher Car Insurance Premiums Than White Areas With the Same Risk

Our analysis of premiums and payouts in California, Illinois, Texas and Missouri shows that some major insurers charge minority neighborhoods as much as 30 percent more than other areas with similar accident costs.

__academic papers

Google Thinks It Can Solve Artificial Intelligence’s Privacy Problem

Google suggested a novel solution in a new blog and research paper this week, which explain what the company is calling “federated learning.” If all goes according to plan, Google will be able to train its deep learning AI on sensitive data from millions of phones without Google ever seeing the data itself.

When Apps Secretly Team Up to Steal Your Data

An analysis of the top 100,000 Android apps found tens of thousands of pairings that leak sensitive data.

Differential Privacy: A Primer for a Non-technical Audience

This document is a primer on differential privacy, which is a formal mathematical frame- work for guaranteeing privacy protection when analyzing or releasing statistical data. Recently emerging from the theoretical computer science literature, differential privacy is now in ini- tial stages of implementation and use in various academic, industry, and government settings. Using intuitive illustrations and limited mathematical formalism, this document provides an introduction to differential privacy for non-technical practitioners, who are increasingly tasked with making decisions with respect to differential privacy as it grows more widespread in use. In particular, the examples in this document illustrate ways in which social scientists can conceptualize the guarantees provided by differential privacy with respect to the decisions they make when managing personal data about research subjects and informing them about the privacy protection they will be afforded.

ActiVis: Visual Exploration of Industry-Scale Deep Neural Network Models

While deep learning models have achieved state-of-the-art accuracies for many prediction tasks, understanding these models remains a challenge. Despite the recent interest in developing visual tools to help users interpret deep learning models, the complexity and wide variety of models deployed in industry, and the large-scale datasets that they used, pose unique design challenges that are inadequately addressed by existing work. Through participatory design sessions with over 15 researchers and engineers at Facebook, we have developed, deployed, and iteratively improved ActiVis, an interactive visualization system for interpreting large-scale deep learning models and results. By tightly integrating multiple coordinated views, such as a computation graph overview of the model architecture, and a neuron activation view for pattern discovery and comparison, users can explore complex deep neural network models at both the instance- and subset-level. ActiVis has been deployed on Facebook’s machine learning platform. We present case studies with Facebook researchers and engineers, and usage scenarios of how ActiVis may work with different models.

https://arxiv.org/abs/1704.01942

__cool projects

Welcome to the Moral Machine!

A platform for gathering a human perspective on moral decisions made by machine intelligence, such as self-driving cars.

Data Selfies

This short piece examines Data Selfie, an open-source Chrome browser extension that collects and analyses data about your behaviour on facebook.com.

Launch: The Public Data Lab

The Public Data Lab seeks to facilitate research, democratic engagement and public debate around the future of the data society.

__past conferences #FOMO

We Robot 2017

http://www.werobot2017.com/

International Journalism Festival

http://www.journalismfestival.com/

The Challenges of Transparency in the Digital Age

http://www.crassh.cam.ac.uk/events/27130

--

--