Tag: current events

Silicon Valley starts a war against fake news

Article

Facebook and Google to block ads on fake news websites | Adnews

Facebook Employees Are In Revolt Over Fake News | Gizmodo

Google and Facebook Take Aim at Fake News Sites | New York Times

Does the internet have a fake-news problem? | CNet

Google CEO says fake news is a problem and should not be distributed | The Verge

Want to keep fake news out of your newsfeed? College professor creates list of sites to avoid | Los Angeles Times

My Comments

Since Donald Trump gained election victory in the USA, there has been some concern amongst a few of Silicon Valley’s tech companies regarding the existence of “fake news”.

This is typically a story that is presented in order to refer to an actual news event but doesn’t relate to any actual news event. In some cases, such stories a hyped-up versions of an existing news item but in a lot of cases, these stories are built up on rumours.

The existence of Internet-distributed fake news has been of concern amongst journalists especially where newsroom budgets are being cut back and more news publishers and broadcasters are resorting to “rip-and-read” journalism, something previously associated with newscasts provided by music-focused FM radio stations.

Similarly, most of us are using Internet-based news sources as part of our personal news-media options or or only source of news, especially when we are using portable devices like ultraportable laptops, tablets or smartphones as our main Internet terminals for Web browsing.

Silicon Valley also see the proliferation of fake news as a threat to the provision of balanced coverage of news and opinion because they see this as a vehicle for delivering the populist political agenda rather than level-headed intelligent news. This is typically because the headline and copy in “fake news” reports is written in a way to whip up an angry sentiment regarding the topics concerned, thus discouraging further personal research.

But Facebook and Google are tackling this problem initially by turning off the advertising-money tap for fake-news sites. Facebook will apply this to ad-funded apps that work alongside these sites while Google will apply this as a policy for people who sign up to the AdSense online display-ads platform.

There is the issue of what kind of curating exists in the algorithms that list search results or news items on a search-engine or social-media page. It also includes how the veracity of news content is being deemed, even though Google and Facebook are avoiding being in a position where they can be seen as “arbiters of truth”.

The big question that can exist is what other actions could Silicon Valley take to curb the dissemination of fake news beyond just simply having their ad networks turn off the supply of advertising to these sites? This is because the popular search engines are essentially machine-generated indexes of the Web, while the Social Web and the blogosphere are ways where people share links to resources that exist on the Web.

Some people were suggesting the ability for a search engine like Google or a social network site like Facebook to have its user interface “flag” references to known fake-news stories, based on user or other reports. Similarly, someone could write desktop or mobile software like a browser add-on that does this same thing, or simply publish a publicly-available list of known “fake-news” Websites for people to avoid.

This is infact an angle that a US-based college professor had taken where she prepared a Google Docs resource listing the Websites hosting that kind of news, in order to help people clean their RSS newsfeeds of misinformation, with some mainstream online news sources including the New York Magazine providing a link to this resource.

The issue of fake news distributed via the Internet is becoming a real problem, but Silicon Valley is looking at different ways to solve this problem and bring to it the same level of respect that was associated with traditional media.

Beware of fake posts and online scams relating to the Nepal earthquake

Previous coverage

Malaysia Airlines air disaster–another event bringing out the online scams

My Comments

Just lately, a disaster that has affected many people has occurred with many casualties in the form of the Nepal earthquake.

But what follows on the tail of these disasters is an avalanche of spam email and flaky social-media posts that offer extra insight or paths to assistance for people who are touched by these events. As well, it is the time when scams pretending to be charity appeals intending to provide aid to the victims of this earthquake also appear on the Internet. It is something I have drawn attention to previously when there was the Malaysian Airlines MH370 air disaster which drew out these scams and am drawing attention to in relation to the latest earthquake. But they lead you to malware or to harvest users’ personal or financial details. In these situations, it pays to think before you click on that link so you are safe with the Net.

Check for legitimate resources that offer information about your relatives’ or friends’ wellbeing and some of these could include Nepalese consulates in your area, the Red Cross or similar services and work with them “from the horse’s mouth”. That means to deal with official websites that are known to the public and are usually published by the media as part of their coverage on the issue.

Facebook does offer a legitimate Safety Check service which comes in to play during civil emergencies. Here, it would identify if one was in an affected geographical area and allow the person to interact with them to know if they are safe and this status would appear in your Facebook Friends’ news feed. For that concerned person, they would be able to check on the News Feed for their relative’s or friend’s status. But be careful of any “fake friends” that appear around the time of this disaster and any post from a friend of yours that isn’t known to be in the area but is out of order should be questioned.

As for charity appeals, most of the media provide information about legitimate fundraising efforts that are taking place so you don’t get fleeced easily.

What to do is to be aware and careful with using the Internet to find details about who is affected by a major event and check with trusted resources.

Chinese spies now charged with cyber espionage

Articles

IT-focused News

FBI Issues Wanted Posters For Five Chinese Army Officers | Gizmodo

DOJ’s charges against China reframe security, surveillance debate | PC World

US authorities name five Chinese military hackers wanted for espionage | The Register (UK)

General News

US Charges China With Cyber-Spying On American Firms | NBC News

Previous coverage on this topic

Symantec Symposium 2012 – My Observations From This Event

The issue of cybercrime now reaches the national level

My Comments

I have heard and will cite previous coverage about the issue of nation states engaging in cyber espionage against other nation states and businesses within these other nation states. For example, I attended the Symantec Symposium in 2012 and listened to the keynote speech by a guest speaker from the Australian Federal Police and he mentioned about organised crime and nation states engaging in the cyber-espionage or sabotage. He even said that it isn’t just servers or regular computers that were at risk but mobile devices like smartphones, point-of-sale / point-of-payment equipment and other dedicated-purpose computing devices being also at risk.

Subsequently, I watched the ABC Four Corners “Hacked” broadcast which covered the issue of cybercrime reaching a national level. This telecast covered key points including a small business who manufactured electronic equipment for defence purposes that fell victim to a Chinese cyber attack along with the theft of blueprints for ASIO’s new offices,

The recent indictment of Chinese military officers by the US government, along with FBI serving “wanted notices” on these officers has underscored the issue of nation states being involved in cyber espionage. It highlights the theft of intellectual property that private companies or government departments hold close to their heart for economic or strategic advantage.

It was even looked at in the context of the National Security Authority debate regarding cyber surveillance by that government department of Uncle Sam’s especially when there was the leaks that were put out by Edward Snowden, The US President Barack Obama even wanted to establish a global discussion regarding the cyber hacking and surveillance.

It got to the point where Mark Zwillinger, the Department Of Justice lawyer ran this line:The only computers these days that are safe from Chinese government hackers are computers that are turned off, unplugged, and thrown in the back seat of your car. Personally I would take this further by saying that the only computers these days safe from the Chinese government hackers are those that are turned off fully, unplugged and securely locked in the boot (trunk) of a sedan (saloon) or similar car.

As well, it would have us “wake up and smell the bacon” when it comes to nation states, especially those that don’t respect human rights, engaging in cyber warfare.

Malaysia Airlines air disaster–another event bringing out the online scams

Article

Fake Malaysia Airlines links spread malware | CNET News

My Comments

Every time there is a major event that affects many people or brings out mass intrigue, a computer-security situation climbs on to that event’s tail.

What happens is that Websites with a questionable motive pop up like nobody’s business and links to these sites appear in spam emails or on the Social Web. The “link-bait” text draws people to these sites are laden with malware or set up to harvest Web-surfers’ personal or financial information for questionable purposes. The Malaysian Airlines air disaster drew out its own link-bait in the form of fake news links that purport to lead to video footage of the plane being discovered or survivors being found.

A proper practice is to keep the software on personal and other computer equipment “lock-step” with the latest software updates and patches and simply to “think before you click”. This is more so with anything that appears “too good to be true” or “out of the norm” for that situation.

Facebook users also have to be careful about the “fake events” which are being used as a spam-distribution vector. Here, as I previously covered, this causes notifications to appear in the user’s Facebook Notification list with your computer or mobile device popping up messages and sounding an audible alert to these notifications if a Facebook client is running. As well, if a user accepts these events, information appears on their Timeline about that event.

Farewell Steve Jobs–one of the pillars of the personal computer

Initially when I heard that Steve Jobs was to permanently resign from Apple due to ill-health, I thought it was simply retirement from one of the pillar companies of the personal-computing age.

Now, the man responsible for the Macintosh computing platform which commercialised and legitimised the “WIMP” (windows, icons, mouse, pointer) user-interface style and the iPhone and iPad devices which also did the same for touchscreen computing, has now passed away.

Many will remember his style of commercialising these technologies through a vertically-integrated method which requires the use of Apple products and services for full benefit, but this let the competitors implement systems that implemented these usage metaphors on their own platforms.

This was all from him and Steve Wozniak turning the proceeds from selling that VW Bus (Kombi-van) into capital for the Apple company. Here, Steve Jobs and Steve Wozniak worked on the development of the Apple II which became one of the beacons of the personal-computing age in the late 1970s.

A lot of commentators had said that Steve Jobs, through his efforts at Apple with the Apple II, the Macintosh and the iPhone and iPad devices had personalised computing. I have observed this through the demonstration software that came with Apple II computers in the 1980s, the boot sequence that was used in all the incarnations of the Macintosh platform and the design of computing products from the iMac onwards.

Whether its through the evolution of a computing technology or the passing of one of the people who influenced the direction of personal computing and communications; I would see this simply as a milestone to the connected lifestyle.