Like many other people in the online era, Mario Costeja González found himself in an uncomfortable situation: When people Googled his name the top result was a piece of potentially embarrassing information from his now-distant past. But unlike many others caught in a similar predicament, he did something about it: He went to court. The Read More…
Technology
US Admits to Implanting Cyberweapons in Critical Russian Infrastructure
(AntiWar) A new report from the Washington Post today quoted a series of Obama Administration officials reiterating their official narrative on Russia’s accused hacking of the 2016 election. While most of the article is simply rehashes and calls for sanctions, they also revealed a secret order by President Obama in the course of “retaliation” for Read More…
Google Promises To Bury “Questionable” Content On YouTube
The issue of filtering out content that advocates or glorifies terrorism on widely-used media sites like Alphabet’s YouTube has come under renewed scrutiny since authorities learned that 23-year-old Salman Abedi was radicalized after watching videos of an American preacher posted on the site. So unsurprisingly, barely two weeks after UK Prime Minister Theresa May accused Read More…
Facebook, The CIA, And The Clintons
This article recounts key events along a time line that stretches from 1986 to the present. Follow the bouncing ball. Since Facebook went public with an IPO (Initial Public Offering) of stock in 2012, I’ve been following the trail of its stock price. In 2012, I wrote: “But now the Facebook stock has tanked. On Read More…
Google And Jigsaw Get Serious About “Extremist” Content
Faced with fines in Europe, Google will enforce four new steps to identify “terrorist-related content” on its YouTube subsidiary. “We are working with government, law enforcement and civil society groups to tackle the problem of violent extremism online. There should be no place for terrorist content on our services,” writes Kent Walker, general counsel for Read More…
New Documents From WikiLeaks Expose How The CIA Exploits Wireless Devices
In the latest ongoing WikiLeaks whistleblowing scandal, the website has published documents from the CIA’s CherryBlossom project, exposing agency’s exploitation of Wi-Fi device security vulnerabilities. Released on Thursday, the new batch of CIA classified documents comes from the Vault 7 project. In a press release, WikiLeaks said: “Today, June 15th 2017, WikiLeaks publishes documents from the Read More…