Internet Privacy and Security Risks Rising
The internet and social media have provided unimaginable convenience, however, the price may be privacy and security, as well as democracy. The more we are connected, the greater the risks. Regulation unfortunately is a very late afterthought with many barriers and loopholes preventing meaningful oversight. There is much denial about the true risks of high tech. Instead of enabling our society it is disrupting, distorting and disabling it. Marc Goodman who wrote in an article about technology and synthetic biology in Wired Magazine, “The internet was built for redundancy, not security. As a result, we have the omnipresent spectre of cybercrime looming over us. Before we enter the age of programmable biology, we must contemplate what we might do differently to avoid the mistakes we made in our development of silicon-based computing. DNA is the common thread that runs through all living things. Without it, there is no life. As such, we have no alternative to seriously considering how we will protect the world’s original operating system.”
5G and Cybersecurity Concerns
Experts at Brookings (2019) have noted the increased vulnerabilities of 5G to cyberattacks. There are 5 ways 5G networks are more vulnerable.
- The network has moved away from centralized hardware-based systems with hardware choke points where cyber hygiene can be practiced.
- 5G uses primarily software functions i.e. standardized Internet Protocol, which are more vulnerable
- The network is managed by software which again is more vulnerable
- The expansion of bandwidth and multiple small cells which wirelessly transmit makes 5G more vulnerable
- Multiple small IoT devices (mini computers) are each uniquely vulnerable
Blockchain Threats to Privacy
Social Impact Bonds, “Pay for Success, Results-Based Contracting and Blockchain Digital Identity Systems. Scoop-it. https://www.scoop.it/topic/social-impact-bonds-by-edurox
Blockchain Threats to Digital Privacy. Scoop-it. https://www.scoop.it/topic/social-impact-bonds-by-edurox?q=blockchain
New York Times Privacy Project Raising Eyebrows and Alarms
The New York Times published their comprehensive report on privacy and cell phone use and well an in interactive site that shows the activities of millions of Americans who are constantly surveilled, not just governments or cell phone companies, but third party agents who sell this data to other companies. In their article they mention how easy it is to track everyone from celebrities to school kids. They state, “One search turned up more than a dozen people visiting the Playboy Mansion, some overnight. Without much effort we spotted visitors to the estates of Johnny Depp, Tiger Woods and Arnold Schwarzenegger, connecting the devices’ owners to the residences indefinitely.” One nation Tracked: An investigation into the Smartphone Tacking, provides a disturbing view of just how far Big Telecom, Big Wireless, Big Tech and cottage data collecting industries have gone for profit. The Wild West is back, but not with guns, it is with cell phones and cell towers.
AI Robots in a Brave New World- 60 minutes
Robots with AI capability are being constructed ad sold to foreign governments with no ethical standards, safety standards or regulation. Boston Dynamics: Inside the workshop where robots of the future are being built. https://www.cbsnews.com/news/boston-dynamics-robots-humans-animals-60-minutes-2021-03-28/
Headlines Privacy and Hacking
- Why 5G requires new approaches to cybersecurity. Brookings. Sept 3, 2019 https://www.brookings.edu/research/why-5g-requires-new-approaches-to-cybersecurity/
- Social Impact Bonds, “Pay for Success” : The Swindle of Innovative Educational Finance. Kenneth Saltman. https://manifold.umn.edu/read/6bfc4e20-77f8-49df-b2cc-02aa02f854a4/section/dbb43e6a-754a-412e-9242-0b860d9dcc73#ch02
- The hidden dangers of blockchain: An essential guide for enterprise use. Tech Beacon. Peter Wayner. https://techbeacon.com/security/hidden-dangers-blockchain-essential-guide-enterprise-use
- Blockchain – Chock full of problems for medical data privacy. Jessica Berger, MLIS, CIPM. June 4, 2018. https://ischoolblogs.sjsu.edu/blockchains/blockchain-chock-full-of-problems-for-medical-data-privacy-by-jessica-berger-mlis-cipm/
- DNA hacking is the biggest opportunity since cyberattacks. DNA is the common thread that runs through all living things. A crime futurist and a biotech expert sound a warning.May 28, 2013. Marc Goodman and Andrew Hessel. Wired. https://www.wired.co.uk/article/the-bio-crime-prophecy
Privacy at School
The Student Data Privacy Project works to protect private student data from exploitation and misuse. They issued a press release July 7, 2021 stating, “On July 9, 2021, parents of school-age children from Maryland to Alaska, in collaboration with the Student Data Privacy Project (SDPP), will file over a dozen complaints with the U.S. Department of Education (DoE) demanding accountability for the student data that schools share with Educational Technology (EdTech) vendors.Formed during the pandemic, SDPP is comprised of parents concerned about how their children’s personally identifiable information (PII) is increasingly being mined by EdTech vendors, with the consent of our schools, and without parental consent or school oversight. With assistance and support from SDPP, 14 parents from 9 states filed requests with their school districts under the Family Educational Rights and Privacy Act (FERPA) seeking access to the PII collected about their children by EdTech vendors. No SDPP parents were able to obtain all of the requested PII held by EdTech vendors, a clear violation of FERPA.” FERPA is a 1974 Act which states that parents have a right to know what information is being collected about their children, and how that data is being used. https://www.studentdataprivacyproject.com
Parents coalition MC, Maryland – https://parentscoalitionmc.blogspot.com/2021/07/arents-nationwide-file-complaints-with.html
Predictive AI Algorithm Software Labels Students of Color
Over 500 universities in the U.S. have been using predictive AI software that may exacerbate racial disparities by labeling students of color as a higher risk for failure and placing them in easier classes. An article in the Markup discusses how this can change the academic and professional trajectory of student without their knowing it. Ruha Benjamin, author of “Race After Technology” and a professor of African American studies at Princeton stated in the article, “This opens the door to even more educational steering. College advisors tell Black, Latinx, and indigenous students not to aim for certain majors. But now these gatekeepers are armed with ‘complex’ math.”
- Major Universities are Using Race as a “High Impact Predictor” of Student Success: Students, professors, and education experts worry that that’s pushing Black students in particular out of math and science Todd Feathers. March 2, 2021. https://themarkup.org/news/2021/03/02/major-universities-are-using-race-as-a-high-impact-predictor-of-student-success
- The Rise—and the Recurring Bias—of Risk Assessment Algorithms. The Markup. Julia Angwin. https://www.getrevue.co/profile/themarkup/issues/the-rise-and-the-recurring-bias-of-risk-assessment-algorithms-418128
- Machine Bias: There’s Software Around the Country To Predict Future Criminals and It’s Used Against Blacks. Julia Angwin. May 23, 2016. Pro Publica. https://www.propublica.org/article/machine-bias-risk-assessments-in-criminal-sentencing
Coded Bias: The Threat of Artificial Intelligence
This film looks at the inaccurate technology of facial recognition and how this is a threat to democracy. Researcher Joy Buolamwini of MIT, found that Facial recognition incorrectly identifies non-white and women’s faces 10 times that of people of color. Inherent bias flaws can be used for mass surveillance. In China this technology is being used to track Muslim minority. This technology can lead to mistaken identity and false arrest and accusations and is more than an inconvenience she notes.
Coded Bias: New Film Looks at Fight Against Racial Bias in Facial Recognition and AI Technology.
The Social Dilemma
The new Netflix movie, “The Social Dilemma”, reveals the deliberate manipulation of our psychology by social media companies to harvest our data and change our minds. With interviews of leaders in Google, Facebook, Twitter and Pintrest this movie shows us a disturbing reality about a technology that generations are addicted to. This is reprogramming our civilization, threatening our democracy and more importantly reshaping our future…and not all for good. A Guardian article on the movie notes Professor Shoshana Zuboff coined the term “Surveillance Capitalism” and goes on to sate,” Most people seem to have twigged the “surveillance” part of the term, but overlooked the second word. Which is a pity because the business model of social media is not really a mutant version of capitalism: it’s just capitalism doing its thing – finding and exploiting resources from which profit can be extracted. Having looted, plundered and denuded the natural world, it has now turned to extracting and exploiting what’s inside our heads. And the great mystery is why we continue to allow it to do so.”
The Social Dilemma Official Trailer
New York Times Reports Wireless Carriers Violated Federal Law by Selling Data
On Feb 1, 2020, the New York Times reported that the FCC plans to take action over the unauthorized sale of user wireless phone data, allowing customers to be tracked. U.S. Senator Ron Wyden said he was, “eager to see whether the FCC will truly hold wireless companies accountable, or let them off with a slap on the wrist.”
Reuters reported a similar story on May 18, 2018, FCC investigating website flaw that exposed mobile phone locations. The report stated “A security researcher said earlier this week that data from LocationSmart, a California-based tech firm, could have been used to track AT&T Inc (T.N), Verizon Communications Inc (VZ.N), Sprint Corp (S.N) and T-Mobile US (TMUS.O) mobile consumers within a few hundred yards of their location and without their consent.” Senator Ron Wyden noted then that a , “hacker could have used this site to know when you were in your house so they would know when to rob it. A predator could have tracked your child’s cell phone to know when they were alone.”
The AP News reported, a Missouri sheriff pleads guilty to cellphone tracking charges, after he used the cellphones of a judge and other law enforcement officers to track their whereabouts. He used a company called Securus Technologies Inc., which was providing law enforcement services to the sheriff’s department. The New York Times noted the same company could track you.
The European Union General Data Protection Regulation (GDPR)
The European Union GDPR is the most comprehensive data protection regulation in the world. This was approved by the European Parliament April 2016.
Its objectives are to
- Harmonize data privacy laws across Europe,
- Protect and empower all EU citizens data privacy
- Reshape the way organizations across the region approach data privacy
The United States has no such regulation.
California Privacy Law Helpful but Not Strong Enough
The California Consumer Privacy is the first major internet privacy law in the United States but the battle to get this passed left some casualties, including the bill itself. Mary Stone Ross who was instrumental in drafting the legislation write in her article, I helped draft California’s new privacy law. Here’s why it doesn’t go far enough, that it was watered down, largely toothless and still under attack by industry.
“Zucked: Waking Up to the Facebook Catastrophe”.
One of the leaders in bringing the issue of internet manipulation forward is Roger McNamee, who discusses the history of Silicon Valley in his new book “Zucked: Waking Up to the Facebook Catastrophe”. He describes how the development of this technological wonderland appears to be taking us down a rabbit hole that keeps us addicted, distracted and exposed to threats of privacy and democracy. In an Oct 23, 2019 interview on Democracy Now, he highlights the downsides to Big Tech that were not foreseen.
Zucked: Early Facebook Investor Roger McNamee on How the Company Became a Threat to Democracy.
Early tech investor Roger McNamee describes his new insights about the high tech industry on Democracy Now.
The Great Hack
The true workings of Cambridge Analytica and its role in the 2016 election are becoming more transparent with a new documentary, The Great Hack. Democracy Now interviewed former Cambridge Analytica employee and whistleblower Brittany Kaiser as well as the producers of The Great Hack, who clearly present the Orwellian nature of the current internet and wireless communications industry.
The Great Hack Official Trailer
The Great Hack uncovers the dark world of data exploitation through the compelling personal journeys of players on different sides of the explosive Cambridge Analytica/Facebook data scandal.
Democracy Now Interviews Brittany Kaiser, Cambridge Analytica Whistleblower
An interview with Brittany Kaiser, the Cambridge Analytica whistleblower featured in “The Great Hack” and author of “Targeted: The Cambridge Analytica Whistleblower’s Inside Story of How Big Data, Trump, and Facebook Broke Democracy and How It Can Happen Again”.
The Disinformation Machine
Journalists from Investigate Europe have created this short video, The Disinformation Machine, about Facebook’s involvement in elections.
Investigate Europe highlights how bots spread fake news and hate speech on the internet by acting as real people. Social media platforms amplify the fake messages with click bait headlines, spinning these viral. Ultimately no one knows how or what news is filtered. These large internet media platforms (Google, Facebook and Twitter), have turned into gatekeepers of information, true “Ministries of Truth”.
They have also created a short video on the 5G Mass Experiment: Big Promises, Unknown Risks.
5G High Security Risk
In an article by Harvard Kennedy School lecturer Bruce Schneier, China Isn’t the Only Problem With 5G, the author notes that while there have been improvements in in 5G with encryption, authentication, integrity protection, privacy, and network availability, this is not enough. 5G Geopolitics is complicated and not getting any simpler.
Why 5G is inherently insecure
- 5G is too complex and actually increases points of vulnerability with so many devices connected to the internet. 11 design weaknesses of 5G have been identified.
- 5G depends on 4G – thus 5G will inherit the old vulnerabilities
- 5G security measures are optional – similar to 4G- with development, cost, time to market prioritized over security – an afterthought
- Law Enforcement Needs these Backdoor Openings – U.S. Intelligence Agencies like the NSA as well as law enforcement depend on inadvertent insecurities for their own data collection
Mr Schneier ends on a concerning note, “The technology will quickly become critical national infrastructure, and security problems will become life-threatening. Both criminal attacks and government cyber-operations will become more common and more damaging. Eventually, Washington will have do so something. That something will be difficult and expensive—let’s hope it won’t also be too late.”
He has also authored Click Here to Kill Everybody: Security and Survival in a Hyper-connected World.
ACLU Attorney DiscussesSecurity Risks of 5G and The Internet of Things
ACLU Attorney in Houston, Texas warning that 5G Smart Grid Could be a “Wolf in Sheep’s clothing”.
Boris Johnson on Smart Technology and Digital Authoritarianism as an Emerging Reality
British Prime Minister Boris Johnson gives an impassioned speech at the United Nations about the unintended consequences of the digital age. He calls this “the gathering force reshaping the world”. He notes the internet is a scientific breakthrough like nuclear power which can be used for good or bad. He underscores that we have used technology for our advantage in the past but in this digital age this technology can be used for invasive surveillance. Alexa will be pretending to take orders but she will be stamping her foot for you to march. Your mattress will monitor your nightmares, your refrigerator will beep for more cheese, your front door will sweep wide when you approach the door. Everyone will be transcribing your every habit in some great cloud of data oppressively over the human race. We have no control when the precipitation take place. Humans are now a resource of data , which is the crude oil of the modern age. Who should own the data and how should it be used? Are we doomed to a cold future with computer algorithms as the emperor. “Do we bequeath an Orwellian world designed for censorship, repression and control or emancipation, debate and learning?” He points out that the UN Joint Declaration upholds freedom of opinion and expression, the privacy of home and correspondence and the right to seek and impart information and ideas.” The mission of the UK and all who share our values must be to ensure that emerging technology are designed at the outset..to have the right safeguards….Industry is writing the rulebooks of the future…New advances must reflect our values.”
- China Isn’t the Only Problem With 5G: The network has plenty of other security weaknesses, including ones the United States doesn’t want to fix since they help its own surveillance efforts. January 10, 2020. Bruce Schneier. Foreign Policy News. https://foreignpolicy.com/2020/01/10/5g-china-backdoor-security-problems-united-states-surveillance/