Advanced Search
Content Type: Examples
Over the years from 2005, when Facebook was still known as "Thefacebook" and its membership was still limited to verifiable Harvard students, to 2010, Facebook changed its privacy policies many times. Over that time, the default circle of who could view users' data widened over time, first to include schools and local areas, then to the entire Facebook network, then to the wider internet, and finally to third-party apps and advertisers. Taken together, the story is one of a service that began…
Content Type: Examples
The first iteration of Facebook, which then-student Mark Zuckerberg launched at Harvard University in 2003, was known as "Facemash", and was based on a popular website of the day, Am I Hot or Not? Using photographs of students scraped from those collected by the university's houses of residence, the site showed users pairs of randomly selected photographs and asked them to choose the "hotter" person in order to compile student attractiveness rankings. Zuckerberg was forced to take the site down…
Content Type: Examples
A data breach at the Internet Research Agency, the Russian troll farm at the centre of Russia's interference in the 2016 US presidential election, reveals that one way the IRA operated was to use identities stolen from Americans. Using these accounts and other fake ones, the troll farm interacted via social media with genuine US activists and recruited them to participate in and help organise rallies, all in the interests of aggravating long-standing American social divisions.
https://…
Content Type: Examples
According to whistleblower Christopher Wylie, during the 2014 US midtern elections, Cambridge Analytica, needing data to complete the new products it had promised to political advisor Steve Bannon, harvested private information from the Facebook profiles of more than 50 million users without their permission. There was enough information about 30 million of these users to match them to other records and build psychographic profiles.
After the news became public in March 2018, Facebook…
Content Type: Examples
In March 2018, Facebook announced it was scrapping plans to show off new home products at its developer conference in May, in part because revelations about the use of internal advertising tools by Cambridge Analytica have angered the public. The new products were expected to include connected speakers with digital assistant and video chat; they are now undergoing a review to ensure that they incorporate the right approach to user data. At the developer conference the company will also explain…
Content Type: Examples
Users downloading their Facebook histories have been startled to find that the company has been collecting call and SMS data. The company has responded by saying users are in control of what's uploaded to Facebook. However, the company also says it's a widely used practice when users first sign in on their phones to a messaging or social media app to begin by uploading the phone's contact list. That data then becomes part of the company's friend recommendation algorithm. On versions of Android…
Content Type: Examples
The Houston, Texas-based online dating startup Pheramor claims to use 11 "attraction genes" taken from DNA samples in its matchmaking algorithm. Launched in February 2018 in Houston with 3,000 users, Pheramor also encourages users to connect it to their social media profiles so it can datamine them for personality traits and common interests. Members pay $19.99 plus a $10 monthly fee and send in a cheek swab using a kit Pheramor supplies. In response, the company combines the genetic and social…
Content Type: Examples
Behind the colourful bicycles and games rooms, Silicon Valley tech giants operate a strict code of secrecy, relying on a combination of cultural pressure, digital and physical surveillance, legal threats, and restricted stock to prevent and detect not only criminal activity and intellectual property theft but also employees and contracts who speak publicly about their working conditions. Apple has long been known for requiring employees to sign project-specific non-disclosure agreements (NDAs…
Content Type: Examples
The small, portable GrayKey box, costing $15,000 for an internet-connected version tied to a specific location or $30,000 for an offline version usable anywhere, takes two minutes to install proprietary software designed to guess an iPhone's passcode. Intended for use by law enforcement officials, the box can take from a few hours to crack a short passcode to several days for a longer one. Once cracked, the passcode is displayed on the iPhone's screen; then the iPhone can be reconnected to the…
Content Type: Examples
As part of its attempt to keep its 40,000 drivers operating on the streets of London after Transport for London ruled in October 2017 it was not "fit and proper" to run a taxi service, Uber has promised to share its anonymised data on travel conditions and journey times. TfL said in February 2018 that sharing travel pattern data could help it improve understanding of operators' services.
https://uk.reuters.com/article/us-uber-britain/uber-to-share-its-london-data-in-latest-charm-…
Content Type: Examples
The accuracy of Facebook's ad targeting sometimes leads users to believe that Facebook is spying on them by tapping the microphones in their phones. Facebook has denied the practice - and is likely telling the truth because uploading and scanning the amount of audio data such a system would involve an unattainable amount of processing power to understand context.
It sounds believable: Joanna Stern's mother told her to buy the decongestant Sudafed in the morning, and by afternoon she sees…
Content Type: Examples
The CEO of MoviePass, an app that charges users $10 a month in return for allowing them to watch a movie every day in any of the 90% of US theatres included in its programme, said in March 2018 that the company was exploring the idea of monetising the location data it collects. MoviePass was always open about its plans to profit from the data it collects, but it seems likely that its 1.5 million users assumed that meant ticket sales, movie choice, promotions, and so on - not detailed tracking…
Content Type: Examples
The Danish company Blip Systems deploys sensors in cities, airports, and railway stations to help understand and analyse traffic flows and improve planning. In the UK's city of Portsmouth, a network of BlipTrack sensors was installed in 2013 by VAR Smart CCTV, and the data it has collected is used to identify problem areas and detect changing traffic patterns. The city hope that adding more sensors to identify individual journeys will help reduce commuting times, fuel consumption, and vehicular…
Content Type: Examples
In 2015, the University of Arizona began tracking freshman students’ ID card swipes as part of a project to try to lower the rate at which students drop out or leave for another university. The cards, which include an embedded sensor and are given to all students, can be read at almost 700 locations, including the entrance to residence halls and the student recreation centre, the library, and vending machines. The published policy for the CatCard student IDs does not disclose the practice.
In a…
Content Type: Examples
Designed for use by border guards, Unisys' LineSight software uses advanced data analytics and machine learning to help border guards decide whether to inspect travellers more closely before admitting them into their country. Unisys says the software assesses each traveller's risk beginning with the initial intent to travel and refines its assessment as more information becomes available at each stage of the journey - visa application, reservation, ticket purchase, seat selection, check-in, and…
Content Type: Examples
On August 1, 2017, Wisconsin company Three Square Market began offering its employees the option of implanting a tiny chip between their thumb and index finger. The chip enables employees to wave at hand at any of the company's RFID readers in order to enter the building, pay for food in the cafeteria, or use other company services. More than 50 out of the 80 staff at its headquarters volunteered; a few are said to be considering incorporating the chip into a piece of jewellery rather than have…
Content Type: Examples
Like other countries, the US began incorporating RFID chips into its passports in 2006. The chips, which store passport information including name, date of birth, passport number, photo, and biometric identifiers, enable machine-readable border controls like those now seen at an increasing number of airports. For authentication and to prevent counterfeiting and tampering, the chips also include a cryptographic signature (certificate) that authenticates the country issuing the passport. This…
Content Type: Examples
Car companies have long collected data about the consumers who buy their cars. Now, they hope to aggregate and sell customer preferences to outside vendors for marketing purposes much as online tech giants like Google and Facebook already do. The companies say that exploiting this data will help them improve the driving experience, enabling predictive maintenance and enhancing driving intelligence. A study published in July 2017 by the US Government Accountability Office found that none of the…
Content Type: Examples
In 2012, Durham Constabulary, in partnership with computer science academics at Cambridge University, began developing the Harm Assessment Risk Tool (HART), an artificial intelligence system designed to predict whether suspects are at low, moderate, or high risk of committing further crimes in the next two years. The tool is used to decide whether to recommend referral to the rehabilitation programme Checkpoint, which aims to reduce reoffending by helping remediate the individual's problems,…
Content Type: Examples
Reporter Kashmir Hill tested life in a smart home by adding numerous connected devices. The self-heating bed gave her daily reports on whether she'd reached her "sleep goal". She liked the convenience of the voice-activated lights, coffee maker, and music, the ability to convey a message to a toddler through a toy, and the robot vacuum cleaner. Meanwhile, colleague Surya Mattu built a Raspberry Pi router to monitor these devices to find out what data they collected and where they wanted to send…
Content Type: Examples
Under a secret deal beginning in 2012, the data mining company Palantir provided software to a New Orleans Police Department programme that used a variety of data such as ties to gang members, criminal histories, and social media to predict the likelihood that individuals would commit acts of violence or become victims. This partnership was extended three times through February 21, 2018. Even city council members had no idea the arrangement existed even though Palantir has used its New Orleans…
Content Type: Examples
LinkNYC, a system of 1,000 public wifi kiosks across all five boroughs of New City administered by the private consortium CityBridge, offers free high-speed wifi, phone calls, a charging station for mobile devices, and a built-in tablet to access a variety of city services. Announced by the mayor's office in November 2014 and deployed in 2016, the system is funded by advertisers, who pay for time on the kiosks' displays on either side. The initial privacy policy allowed LinkNYC to store…
Content Type: Examples
In a draft January 2018 report obtained by Foreign Policy and produced at the request of US Customs and Border Protection Commissioner Kevin McAleenan, the Department of Homeland Security called for continuous vetting of Sunni Muslim immigrants deemed to have "at-risk" profiles. Based on studying 25 terrorist attacks within the US between 2001 and December 2017, the report also suggested that immigrants to the US should be tracked on a long-term basis. Implementing the recommendations…
Content Type: Examples
In 2016, Facebook and its photo-sharing subsidiary Instagram rolled out a new reporting tool that lets users anonymously flag posts that suggest friends are threatening self-harm or suicide. The act of flagging the post triggers a message from Instagram to the user in question offering support including access to a help line and suggestions such as calling a friend. These messages are also triggered if someone searches the service for certain terms such as "thinspo", which is associated with…
Content Type: Examples
Recruiters are beginning to incorporate emotional recognition technology into the processes they use for assessing video-based job applications. Human, a London-based start-up, claims its algorithms can match the subliminal facial expressions of prospective candidates to personality traits. It then scores the results against characteristics the recruiter specifies. HireVue, which sells its service to Unilever, uses the emotion database of Affectiva, a specialist in emotion recognition that…
Content Type: Examples
A former Facebook insider explains to Wired Magazine why it's almost certain that the Trump campaign's skill using the site's internal advertising infrastructure was more important in the 2016 US presidential election than Russia's troll farm was. The first was the ads auction; the second a little-known product called Custom Audience and its accompanying Lookalike Audiences. Like Google's equivalent, Facebook's auction has advertisers bid with an ad, an ideal user specification, and a bid for…
Content Type: Examples
In 2018, pending agreement from its Institutional Review Board, the University of St Thomas in Minnesota will trial sentiment analysis software in the classroom in order to test the software, which relies on analysing the expressions on students' faces captured by a high-resolution webcam. Instructors will be able to see the aggregate detected emotions of up to 42 students displayed in a glance at their computer screen. The project hopes to help teachers adapt their approaches in response, but…
Content Type: Examples
In a report on mobile security updates, the US Federal Trade Commission finds that because of the complexity of the mobile ecosystem applying security updates to operating system software on some mobile devices is time-consuming and complicated. Based on information gathered from eight device manufacturers - Apple, Blackberry, Google, HTC, LG, Microsoft, Motorola, and Samsung, the FTC recommends that manufacturers should deploy these updates more quickly and suggests that manufacturers should…
Content Type: Examples
Two of the most notorious malware outbreaks of 2017 were the ransomware WannaCry and the wiper malware NotPetya. Both relied on the NSA's EternalBlue exploit of the Microsoft Server Message Block, which was leaked online by the hacker group The Shadow Brokers. Along with EternalBlue, The Shadow Brokers also leaked three other exploits: EternalSynergy, EternalRomance, and EternalChampion. In early 2018, RiskSense security researcher Sean Dillon ported these three to work on Windows versions…
Content Type: Examples
In February 2018 the US Immigration and Customs Enforcement (ICE) signed a contract with Vigilant Solutions, giving it access to the company's giant database of billions of license plate records, which can be searched to produce every place a given license plate has been seen in the last five years and issue instantaneous email alerts whenever a particular plate is newly sighted. Vigilant collects few of its own photos, but it acquires data from vehicle repossession agencies and other private…