What is YOUR Profile? Ask Google and Facebook

You have been profiled, but is it accurate? You have been sold and sold out.

Scary New Ways the Internet Profiles You

Morrison/DailyBeast: Facebook, Google, and the other Internet titans have ever more sophisticated and intrusive methods of mining your data, and that’s just the tip of the iceberg.

The success of the consumer Internet can be attributed to a simple grand bargain. We’ve been encouraged to search the web, share our lives with friends, and take advantage of all sorts of other free services. In exchange, the Internet titans that provide these services, as well as hundreds of other lesser-known firms, have meticulously tracked our every move in order to bombard us with targeted advertising. Now, this grand bargain is being tested by new attitudes and technologies.

Consumers who were not long ago blithely dismissive of privacy issues are increasingly feeling that they’ve lost control over their personal information. Meanwhile, Internet companies, adtech firms, and data brokers continue to roll out new technologies to build ever more granular profiles of hundreds of millions, if not billions, of consumers. And with next generation of artificial intelligence poised to exploit our data in ways we can’t even imagine, the simple terms of the old agreement seem woefully inadequate.

In the early days of the Internet, we were led to believe that all this data would deliver us to a state of information nirvana. We were going to get new tools and better communications, access to all the information we could possibly need, and ads we actually wanted to receive. Who could possibly argue with that?

For a while, the predictions seemed to be coming true. But then privacy goalposts were (repeatedly) moved, companies were caught (accidentally) snooping on us, and hackers showed us just how easy it is to steal our personal information. Advertisers weren’t thrilled either, particularly when we adopted mobile phones and tablets. That’s because the cookies that track us on our computers don’t work very well on mobile devices. And with our online activity split among our various devices, each of us suddenly appeared to be two or three different people.

This wasn’t a bad thing for consumers, because mobile phones emit data that enable companies to learn new things about us, such as where we go, who we meet, places we shop, and other habits that help them recognize and then predict our long-term patterns.

But now, new cross-device technologies are enabling the advertising industry to combine all our information streams into a single comprehensive profile by linking each of us to our desktop, mobile phone, and iPad. Throw in wearable devices like a Fitbit, connected TVs, and the Internet of Things, and the concept of cross-device tracking expands to potentially include anything that gives off a signal.

The ad industry is drooling over this technology because it can follow and target us as we move through our daily routines, whether we are searching on our desktop, surfing on our iPad, or out on the town with our phone in hand.

There are two methods to track people across devices. The more precise technique is deterministic tracking, which links devices to a single user when that person logs into the same site from a desktop computer, phone, and tablet. This is the approach used by Internet giants like Facebook, Twitter, Google, and Apple, all of which have enormous user bases that log into their mobile and desktop properties.

A quick glance at Facebook’s data privacy policy shows it records just about everything we do, including the content we provide, who we communicate with, what we look at on its pages, as well as information about us that our friends provide. Facebook saves payment information, details about the devices we use, location info, and connection details. The social network also knows when we visit third-party sites that use its services (such as the Like button, Facebook Log In, or the company’s measurement and advertising services). It also collects information about us from its partners.

Most of the tech giants have similar policies and they all emphasize that they do not share personally identifiable information with third parties. Facebook, for example, uses our data to deliver ads within its walled garden but says it does not let outsiders export our information. Google says it only shares aggregated sets of anonymized data.

Little-known companies—primarily advertising networks and adtech firms like Tapad and Drawbridge—are also watching us. We will never log into their websites, so they use probabilistic tracking techniques to link us to our devices. They start by embedding digital tags or pixels into the millions of websites we visit so they can identify our devices, monitor our browsing habits, look for time-based patterns, as well as other metrics. By churning massive amounts of this data through statistical models, tracking companies can discern patterns and make predictions about who is using which device. Proponents claim they are accurate more than 90 percent of the time, but none of this is visible to us and is thus very difficult to control.

In recent comments to the Federal Trade Commission, the Center for Democracy and Technology illustrated just how invasive cross-device tracking technology could be. Suppose a user searched for sexually transmitted disease (STD) symptoms on her personal computer, used a phone to look up directions to a Planned Parenthood clinic, visited a pharmacy, and then returned home. With this kind of cross-device tracking, it would be easy to infer that the user was treated for an STD.

That’s creepy enough, but consider this: by using the GPS or WiFi information generated by the patient’s mobile phone, it would not be difficult to discover her address. And by merging her online profile with offline information from a third-party data broker, it would be fairly simple to identify the patient.

So, should we be concerned that companies use cross-device tracking to compile more comprehensive profiles of us? Let us count the reasons:

Your data could be hacked: Privacy Rights Clearinghouse reports that in 2015 alone, hackers gained access to the records of 4.5 million patients at UCLA Health System, 37 million clients of online cheating website Ashley Madison, 15 million Experian accounts, 80 million Anthem customers, as well as more than 21 million individuals in the federal Office of Personnel Management’s security clearance database. And these were just the headliners that garnered media attention. No site or network is entirely safe and numerous researchers have already demonstrated how incredibly easy it is to “reidentify” or “deanonymize” individuals hidden in anonymized data.

Your profile could be sold: In fact, it typically is, in anonymized fashion. That’s the whole point. But in many cases, Internet companies’ privacy policies also make it clear our profiles are assets to be bought and sold should the company change ownership. This was the case when Verizon bought AOL and merged their advertising efforts, creating much more detailed profiles of their combined user base. Yahoo might be next should it decide to spin off its Internet properties.

Your data could be used in ways you did not anticipate: Google, Facebook, and other companies create customized web experiences based on our interests, behavior, and even our social circles. On one level, this makes perfect sense because none of us want to scroll through reams of irrelevant search results, news stories, or social media updates. But researchers have demonstrated that our online profiles also have real world consequences, including the prices we pay for products, the amount of credit extended to us, and even the job offers we may receive.

Our data is already used to build and test advanced analytics models for new services and features. There is much more to come. The Googles and the Facebooks of the Internet boast that newly emerging artificial intelligence will enable them to analyze greater amounts of our data to discern new behavioral patterns and to predict what we will think and want before we actually think and want it. These companies have only begun to scratch the surface of what is possible with our data.

We are being profiled in incredible and increasingly detailed ways, and our data may be exploited for purposes we cannot yet possibly understand. The old bargain—free Internet services in exchange for targeted advertising—is rapidly become a quaint relic of the past. And with no sense of how, when, or why our data might be used in the future, it is not clear what might take its place.

Obama Tells Israel, Take it or Leave it

Note: Haaretz is pro Obama regime and anti-Netanyahu

An unnamed US official urged Israel Sunday to accept a military aid offer which falls short of Israeli expectations, claiming the country would get no better offer from the next administration. According to Haaretz, the official said, “Israel will certainly not find a president more committed to Israel’s security than is President [Barack] Obama.”

Three rounds of talks to renegotiate US contributions to Israel’s military have largely led nowhere. A ten-year memorandum of understanding, signed in 2008, provided Israel with $3 billion annually. It is set to expire in the near future, and US congressional sources told Reuters that Israel is seeking an increase to $5 billion a year, starting in 2017. The same sources estimated the final agreement would settle between $4 and $5 billion.

On Sunday, Israeli Prime Minister Benjamin Netanyahu said during a weekly cabinet meeting, “Perhaps we won’t succeed in reaching an agreement with this administration and will have to reach an agreement with the next administration.” This prompted the angry response from US officials.

“Even as we grapple with a particularly challenging budget environment, this administration’s commitment to Israel’s security is such that we are prepared to sign an MOU [memorandum of understanding] with Israel that would constitute the largest single pledge of military assistance to any country in U.S. history,” the senior official told Haaretz.

“Israel is of course free to wait for the next administration to finalize a new MOU should it not be satisfied with such a pledge, but we would caution that the US budgetary environment is unlikely to improve in the next 1-2 years and Israel will certainly not find a president more committed to Israel’s security than is President Obama.”

The same official emphasized that negotiations are “taking place in the context of a challenging budgetary environment in the United States that has necessitated difficult tradeoffs amongst competing priorities including not just foreign assistance and defense but also domestic spending.” Currently, over 50 percent of America’s foreign military spending goes to Israel.

“Despite these [budgetary] limitations, based on extensive consultations with Israel on its threat environment and in-depth discussions within the U.S. government regarding Israel’s defense needs, we are confident that a new [memorandum] could meet Israel’s top security requirements and preserve its qualitative military edge,” the official added.

White House officials stressed that Israel’s security is a top priority of the Obama administration, as demonstrated by its spending to date. “From the $20.5 billion in Foreign Military Financing to the additional $3 billion in missile defense funding the United States has provided under his leadership, no other U.S. Administration in history has done more for Israel’s security.”

A senior Israeli official noted that, while negotiations are ongoing, it would likely take presidential intervention to make any real progress. “It’s not a subject for staff, but rather for decisions by leaders,” he said. This may happen in the near future, as Defense Minister Moshe Ya’alon is scheduled to visit his American counterpart, Ashton Carter, in Washington next month, followed two weeks later by a visit to the US by Netanyahu, who is expected to meet with Obama at that time.

***

16 Aug 2007

 

A memorandum of understanding (MOU) was signed by Israel and the United States at a ceremony today (16 August) at the Ministry of Foreign Affairs. The MOU outlines defense aid to be provided to Israel by the Americans to the tune of $30 billion in the next decade.

Representing the United States at the ceremony were Undersecretary of State R. Nicholas Burns and US Ambassador to Israel Richard Jones. On the Israeli side, Bank of Israel Governor Stanley Fisher, Director General of the Foreign Ministry Aaron Abramovich, Director General of the Ministry of Defense Pinchas Buchris and Israel’s Ambassador to the United States, Salai Meridor, attended.

*** Contacts between Israel and the United States on the security memorandum of understanding are expected to be stepped up a notch. Defense Minister Moshe Ya’alon is expected to visit Washington at the beginning of March to meet with his American counterpart, Ashton Carter. About two weeks later, Netanyahu will come to Washington to attend the conference of the pro-Israel lobby AIPAC, the American Israel Public Affairs Committee. In all probability, he will also meet with Obama in an effort to achieve a breakthrough in the talks.

Will Kerry Give Mahmoud Abbas a P5+1 Deal?

ToI: Former Palestinian peace negotiator Nabil Shaath said in an interview earlier this month that he often asks Westerners whether Arabs have to “hijack your planes and destroy your airports again” to make the world take notice of the Palestinian cause

In a February 1 interview with the Palestinian Authority’s Awdha TV, translated by MEMRI, Shaath slammed American efforts at Israeli-Palestinian peacemaking.

Asked about a French proposal for an international peace conference, Shaath replied, “Well, anything is better than American control of the negotiations. Anything. The US has never been a reliable honest broker. Never. It is the strategic ally of Israel. Period. Therefore any discussion of a different formula is a positive thing.”

But, he added, “an international conference is not what is needed. What is needed is a smaller framework. Today, at the African Union summit, President [Mahmoud] Abbas reiterated that we want something similar to the 5+1 framework” of six world powers who negotiated the nuclear deal with Iran.

“Like it or not, the US will be part of it. But we want France, Germany, Britain, the EU, Russia, China, Brazil, India. From the Arab countries we want Egypt at least. We want a small international framework.”

***

Shaath then turned to what he described as Western apathy toward suffering in the Middle East.

“If the Syrian problem had not been exported to Europe through the refugees on the one hand and terrorism on the other, the Europeans would not have cared even if the entire Syrian people had died,” he charged.

“But when all of a sudden there were four million Syrian refugees in Europe, 1.2 million of them in Germany alone, and when this was accompanied by Islamic State operations in France and elsewhere, all these countries began to fear that IS might have infiltrated through the refugees. And this started a debate about racial transformation in Europe with the entrance of non-white, non-European, non-Anglo-Saxon races, like the Syrian refugees, the Africans and others. This is what made the Syrian problem the most pressing from their perspective.”

He added: “I always say to these people, after I tell them about Syria and IS: ‘Do we have to hijack your planes and destroy your airports again to make you care about our cause? Are you waiting for us to cut off your oil supply? You always wait for things to reach boiling point and explode, causing you harm, before you intervene to end the crimes and violations.’”  

Shaath served as the PA’s first foreign minister, and has served as a top peace negotiator and

The DoJ Hacked, DHS Files Compromised

Hackers leaked DHS staff records, 200GB of files are in their hands

A hacker accessed an employee’s email account at the Department of Justice and stole 200GB of files including records of 9,000 DHS staffers and 20,000 FBI employees.

SecurityAffairs: Yesterday, the data related a Department of Homeland Security (DHS) staff directory were leaked online, a Twitter account shared the link to an archive containing 9,355 names.

The responsible for the data leakage first contacted Motherboard to share the precious archive.

Each record of the DHS Staff Directory includes name, title, email address, and phone number.

Going deep in the archive it is possible to note that it includes information of DHS security specialists, program analysts, InfoSec and IT and also 100 employees with a title “Intelligence”.

The same Twitter account has announced later the imminent release of an additional data dump containing 20,000 FBI employees.

DHS firewall

Are the records authentic?

Motherboard that obtained the archive reached the operations center of the FBI, and in one case the individual who pick up the phone presented himself with the same name associated with that number in the archive. A similar circumstance occurred with a DHS employee, Motherboard so confirmed that the information is legit.

Which is the source of data?

According to Motherboard, a hacker accessed an employee’s email account at the Department of Justice. As proof, the hacker sent the email message to Motherboard’s contributor Joseph Cox directly from the compromised account.

“A hacker, who wishes to remain anonymous, plans to dump the apparent names, job titles, email addresses and phone numbers of over 20,000 supposed Federal Bureau of Investigation (FBI) employees, as well as over 9,000 alleged Department of Homeland Security (DHS) employees, Motherboard has learned.” wrote Cox in a blog post.

“The hacker also claims to have downloaded hundreds of gigabytes of data from a Department of Justice (DOJ) computer, although that data has not been published.”

The hacker first tried to use the compromised credentials to access a DOJ staff portal, but without success, then he called the department directly and obtained the access through social engineering techniques.

The hacker accessed the DoJ intranet where the database is hosted, then he downloaded around the, out of 1TB that he had access to.

“I HAD access to it, I couldn’t take all of the 1TB,” the hacker told to MotherBoard.

The hackers confirmed his intention to release the rest of the data in the near future.Which is the motivation behind the attack?

It is not clear at the moment why the hacker released the archive, surely it’s not financially motivated. The hacker only left the following message when has leaked the data-

“This is for Palestine, Ramallah, West Bank, Gaza, This is for the child that is searching for an answer…” which are the verses of “Long Live Palestine”

The only certainty right now is that similar incidents are becoming too frequent, apparently the government staff is not properly trained on the main cyber threats or the hacking technique. Similar incidents show the lack of knowledge on the most basic security measures.
Whenever a hacker leaks so sensitive data, I think the number of his peers who had access to the same information with the intent to use them in other attacks or resell them, perhaps to a foreign government.

Pierluigi Paganini

*** As a reminder, in 2014 a much more dangerous hack intrusion happened at the DHS:

The Department of Homeland Security (DHS) alerted critical infrastructure operators to recent breaches within the sector – including the hack of a U.S. public utility that was vulnerable to brute-force attacks.

This week, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), a subgroup of DHS, revealed information about the incidents in a newsletter (PDF).

According to ICS-CERT, industrial control systems were compromised in two, new incidents: one, involving the hack of an unnamed public utility, and another scenario where a control system server was remotely accessed by a “sophisticated threat actor.”

After investigating the public utility hack, ICS-CERT found that the system’s authentication mechanism was susceptible to brute-force attacks – where saboteurs routinely run through a list of passwords or characters to gain access to targeted systems. The control system used a simple password mechanism, the newsletter revealed.

In

Hey Janet and Jeh, How do you Square This?

May 2015, speech in part: DHS Secretary Jeh Johnson, “The FBI continues to identify, investigate, interdict and help the Department of Justice prosecute attempted terrorist plots to the homeland. With the help of DHS, the FBI has also made a number of arrests of those who attempt to become foreign fighters, before they can get on an airplane and leave the country.

In reaction to terrorist groups’ public calls for attacks on government installations in the West, and following the attack last fall in Ottawa, I directed that our Federal Protective Service enhance its security and presence at federal office buildings around the country. This enhanced security remains in place.

In reaction to terrorists’ public calls for attacks on U.S. military installations and personnel, the Department of Defense has enhanced its security at bases in the U.S.

Given the new reality of the global terrorist threat — which involves the potential for small-scale homegrown attacks by those who could strike with little or no notice, we are working in closer collaboration with state and local law enforcement. Given the nature of the evolving threat, the local cop on the beat may actually be the first to detect a terrorist attack on the homeland.

So, as often as several times a week, the Department of Homeland Security and the FBI share terrorist threat information and intelligence with Joint Terrorism Task Forces, state fusion centers, and local police chiefs and sheriffs.” Full speech here and note the some of the attendees.

Maybe we should be seeking a subpoena of Janet Napolitano and Jeh Johnson.

***

Enter Philip Haney, again:

DHS Official: I Was Ordered to Purge Records of Islamic Terror Ties
A veteran official with the Department of Homeland Security claims he and other staff were ordered to destroy records on a federal database that showed links between possible jihadists and Islamic terrorist groups.

“After leaving my 15-year career at DHS, I can no longer be silent about the dangerous state of America’s counter-terror strategy, our leaders’ willingness to compromise the security of citizens for the ideological rigidity of political correctness—and, consequently, our vulnerability to devastating, mass-casualty attack,” the former employee, Patrick Haney, wrote in an explosive column that was published late Friday on The Hill website.

Haney alleges that the Obama administration has been “engaged in a bureaucratic effort” to destroy the raw material and intelligence the Department of Homeland Security has been collecting for years, leaving the United States open to mass-casualty attacks.

His story starts in 2009, when during the holiday travel season, a 23-year-old Nigerian Muslim,  Umar Farouk Abdulmutallab, boarded Northwest Airlines Flight 253, with explosives packed in his underwear and the hopes of slaughtering 290 travelers flying on Christmas Day from the Netherlands to Detroit, Michigan. Passengers subdued the jihadist and he was arrested, thwarting the plot.

After the attempt, Haney writes, President Barack Obama “threw the intelligence community under the bus for its failure to ‘connect the dots,’ saying that it was not a failure to collect the intelligence that could have stopped the attack, but rather “‘a failure to integrate and understand the intelligence that we already had.'”

But most Americans were not aware that the Department of Homeland Security’s employees suffered enormous damage to their morale from Obama’s words, Haney said.

Further, many were infuriated “because we knew his administration had been engaged in a bureaucratic effort to destroy the raw material — the actual intelligence we had collected for years, and erase those dots. The dots constitute the intelligence needed to keep Americans safe, and the Obama administration was ordering they be wiped away.”

Just one month before the attempted attack, Haney said, his DHS supervisors ordered him to either delete or modify the records for several hundred people tied to Islamist terror organizations, including Hamas, from the Treasury Enforcement Communications System, the federal database.

Those records give DHS the ability to “connect dots,” explained Haney, and every day, the agency’s Custom and Border Protection officials use the database while watching people who are associated with known terrorist affiliations seeking patterns that could indicate a pending attack.

“Enforcing a political scrubbing of records of Muslims greatly affected our ability to do that,” said Haney.

“Even worse, going forward, my colleagues and I were prohibited from entering pertinent information into the database,” he wrote.

And even weeks after the attempted Christmas Day attack, Haney said, he was still being ordered to delete and scrub terrorists’ records, making it more difficult to connect dots in the future.

The number of attempted and successful Islamic terrorist attacks kept increasing, notes Haney, including the 2013 Boston Marathon bombing, conducted by Dzhokhar and Tamerlan Tsarnaev; Muhammad Youssef Abdulazeez’ shooting of two military installations in Chattanooga, Tennessee last year; the attack conducted by Faisal Shahzad in May 2010; Detroit “honor” killer Rahim Alfatlawi in 2011; Amine El Khalifi, who plotted to blow up the U.S. Capitol in 2012; and Oklahoma beheading suspect Alton Nolen in 2014.

He believes it is “very plausible” that one or more of those homeland incidents could have been prevented, if DHS subject matter experts had been allowed to keep doing their jobs.

“It is demoralizing — and infuriating — that today, those elusive dots are even harder to find, and harder to connect, than they were during the winter of 2009,” Haney concluded.