How to Protect Your Google Gmail from Russia’s Putin and WikiLeaks

Word is out from multiple intelligence sources and security researchers that Hillary Clinton campaign chairman John Podesta’s Gmail account was hacked by (you guessed it!) Russian hackers under the direction of the Russian government (aka Vladimir Putin), for public distribution of Podesta’s email messages via Putin’s propaganda publishing arm: Julian Assange’s WikiLeaks. All of this in furtherance of Putin’s “Get Ignorant Puppet Trump Elected U.S. President!” project.

Apparently Podesta fell victim to a typical “spear phishing” attack, typing his Google Gmail credentials into a convincing (but fake) Google login page.

People fall for this kind of thing every day.

But don’t blame Google, because Google already provides the means to make such attacks enormously more difficult — 2-Step (“2-Factor”) Verification.

The problem is that despite Google’s constantly entreating users to avail themselves of this, most people don’t want to bother until after they’ve been hacked!

To be clear, I don’t know for an absolute fact that Podesta wasn’t using Google 2-Step Verification. But the sequence of events being reported would appear to make it extremely unlikely, because while 2-factor systems don’t make such attacks absolutely impossible to succeed, they do indeed make successful phishing attacks less likely by orders of magnitude.

And it’s not as if Google doesn’t provide plenty of choices when setting up this kind of protection.

It can be done by text messages, by automatic calls to voice phone numbers, and by authenticator apps that don’t need network access. It can even by done via high security USB-based crypto keys and printed emergency backup codes!

It’s too late for Podesta. But it’s not too late for you to protect yourself from Putin, Assange, and the more prosaic crooks who wander the Net.

If you use Gmail or other Google services, go turn on 2-Step Verification. If you use some other email system that offers 2-factor protections, go and enable them — now!

I published a write-up earlier this year explaining how to do this with Google. It’s at: Do I really need to bother with Google’s 2-Step Verification system?

Now you know — the answer is YES. It’s not a bother, it’s Google helping you to protect yourself against evil.

And that’s the truth.

Be seeing you.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

Yahoo’s Email Spying Nightmare

:

“Yahoo was ordered last year to search incoming emails for the digital “signature” of a communications method used by a state-sponsored, foreign terrorist organization, according to a government official familiar with the matter.

The Justice Department obtained the order from a judge of the Foreign Intelligence Surveillance Court.

To comply, Yahoo used a modified version of its existing systems that were scanning all incoming email traffic for spam, malware and images of child pornography. The system stored and made available to the Federal Bureau of Investigation a copy of any messages it found that contained the digital signature.

Yahoo was forbidden from disclosing the order and the collection is no longer taking place, the official said Wednesday.”

 = = =

If this additional information is correct, it represents an enormously dangerous slippery slope. The inclusion of arbitrary signatures” at the behest of the government into malware/spam/cporn (“PhotoDNA”) scanning systems is a dramatic departure from firms cooperating with each other, into the realm of secret government mandates.

– – –

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

The Importance of “Google Assistant” and “Google Home”

There was a lot of fascinating stuff in the Google presentation this morning, but for me the section of most immediate interest — and that may perhaps be the most important going forward for many persons — related to Google Assistant and in particular the Google Home device for accessing Google Assistant.

True, Amazon has had a similar looking pedestal device around for awhile, but the access device is only the gateway — it’s the cloud/AI/connectivity resources behind it that really matter. And on those scores, Google’s far ahead of everyone else, and is likely to continue evolving much faster as well.

This class of “full room” connectivity isn’t just important for the slick “Star Trek Computer” factor, but for the critical accessibility aids that it could provide for a vast number of people — visually impaired, mobility impaired, on and on.

And this is only the very beginning of this path. Incredibly important.

One last thing for now. A number of people have asked me if the Home device is sending everything they say in a room up to Google. I don’t have specific information regarding this device, but I’d very strongly assume that the same operational model is being used as for other Google speech recognition products, where the attention phrase “OK Google” is recognized locally on the device, and only then is audio sent up to the cloud for full analysis (and you have control over what happens to that voice data once it reaches Google as well).

Great work!

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

Google Launches a New Consolidated Blog [GOOD], with a New Unreadable Font [AWFUL]

Google has launched a new consolidated central blog called The Keyword to make it easier to track Google products, research, and other activities. It will reportedly ultimately replace many other Google blogs.

Because Google has long had a multiplicity of blogs to follow, this could well be a very positive move, depending on the details.

This assumes, however, that you can actually read their new blog.

With their low contrast font selections, Google has once again failed users with aging or otherwise less than perfect vision.

This is unfortunately not the first time Google that has gone this route with various of their products, effectively devaluing significant segments of their user population.

If you talk to Google about this — and I have — they will assure you that their new designs meet visual accessibility standards and pass the associated test suites. The problem of course is that those standards are widely viewed (no pun intended) as inadequate, counterproductive, and worse.

Typical human vision begins to degrade in our early 20s. A rapidly growing segment of the Google user community is being directly disadvantaged by this trend toward low contrast fonts that are impossible for these persons to comfortably read, or in some cases even read at all.

Google can do far better.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

 

When Hell Freezes Over: AT&T preparing to pull “GigaPower” fiber down my street

I figured that hell would freeze over before I saw gigabit fiber here, but sometimes there’s a surprise.

The photo below shows AT&T preparing to pull gigabit fiber to the home (“GigaPower”) down my street.

This will be a trunk line since actual drops and demarcation points for where I am in my corner of L.A. are behind the houses, so feed lines will be run behind the houses as subscribers request installs.

It’s a bit difficult to see due to the lighting, but the left arrow points at a yellow “pull cord” that AT&T brought by in front of my house yesterday and is continuing to run today down the street.

The right arrow points to a pulley assembly hanging from the Time Warner Cable (now aka Charter/Spectrum) trunk cable above, with the pull cord threaded through it. The GigaPower fiber run will be fed from a large truck spool that will be parked nearby and then pulled down the street over the pulleys via the pull cord. The spool feeding the pull cord itself is visible near the AT&T trucks at the lower right.

AT&T’s pricing for their GigaPower offering varies widely depending on whether or not they have fiber competition (e.g., from Google Fiber — which isn’t here currently). AT&T also usually charges considerably more for GigaPower if you don’t want them snooping on your web browsing activities. 

That all said, it’s likely to be a damned sight faster than the comparatively crawling (especially upstream) speeds from TWC currently! 

I’d still much rather have Google Fiber, though.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

selection_252

Phony Trump and His Phony Debate Polls

Anybody with half a brain knows that Donald Trump was trounced by Hillary Clinton at the first presidential debate two days ago. Outside of his unhinged, confused, rambling, impolite world-class-jerk performance and self-defeating answers, his own reactions afterwards (not to mention those of Republican leaders in general) tell the story.

Trump said that the moderator was unfair, while at the same moment his own campaign manager was proclaiming that the moderator did a great job.

Trump blamed his microphone (perhaps a conspiracy, he suggested).

His mic was fine — it picked up every one of his bizarre sniffles with perfect clarity.

Here’s a handy rule of thumb: Debate winners never complain afterwards about conditions at a debate — hasn’t happened in the history of debating reaching back at least to ancient Greece.

His own people (at least off the record) now are saying that they really want him to be prepared for the next debate (implicitly admitting what was obvious, that he was woefully unprepared for the first one), but express concerns about whether he has the patience, attention span, and willingness to do so. They’re not just whistling Dixie.

Near the end of the debate, Trump said that he has the best temperament (to laughter from the audience). Trump claiming that he has the best temperament in this context is like a drowning man screaming “I have the best swimming!”

We already know that Trump’s knowledge of and interest in actual science and technology is somewhere pretty much south of downtown nil, but he doesn’t mind touting fake statistics if they seem to be in his favor.

That’s why we’ve been treated now to his rants — and various postings from his moronic, thuggish minions — claiming that after-debate polls say he won, he won big, he won huge over Hillary.

He won nothing that means anything. And that’s even if we ignore the supposed CBS poll he claimed that he won, that CBS has proclaimed never even existed!

Because not a single scientific, statistically valid poll of which I’m aware showed Trump as the winner. Every one showed Hillary the winner to varying degrees — often by a dramatically large win.

Scientifically valid polls are carefully designed to reach statistically valid samples of voters from whom it’s possible to derive meaningful data that can be used to accurately extrapolate to the population at large. This is getting more difficult in an age of call blocking and cellphones, but when we look at the averages of multiple modern scientific polls over time the results are typically quite accurate.

The kinds of polls that Trump is touting are the fake polls that appear on websites around the Net as clickbait on various stories. They have pretty much the same scientific validity as extracting polling data from a Ouija board — likely far less. They drive real pollsters crazy, since they confuse people about how valid, scientific polls actually work.

These fake polls’ participants are “self-selected” — that is, only people who happen to be on those pages and then choose to participate are counted in the polls. If a story is more likely to attract Trump supporters, those are who you’ll find mostly voting in any polls on that page.

Such fake polls are easily manipulated. Many make no serious effort (or sometimes any effort at all) to prevent repeat voting. They are obvious targets for mass social media action — “Hey fellow Nazis, let’s all get over to that page and vote for our man Donald!”

And they’re also trivial targets for automated, robotic voting as another simple means to skew the counts.

Even the execs over at right-wing FOX News realize this. In the wake of the debate and several of their on-air personalities announcing those fake poll results as if they were scientific, statistically valid polls, a memo was sent around internally reminding everyone there that those polls do not meet FOX New’s editorial standards (try to restrain your chuckling now, please!) and that such polls are “just for fun” — with no validity of any kind beyond that. Notably, even in the wake of this admonition, various FOX News personalities apparently have ignored the memo and are continuing to join Trump in promoting these fantasy polls and their non-data. Shameful all around.

All that said, it does occur to me though that Trump might have one legit gripe about the debate microphone. After all, it was working perfectly. That was indeed a problem for him.

Because if the 84 million or so people who were watching the debate hadn’t been able to actually hear his bizarre performance, he probably would have come out looking better even in the scientific polls.

My advice: Skip the mic check next time, Donald.

You can thank me later.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

By Not Condemning Its Co-Founder, Oculus Effectively Supports White Supremacists

Let’s be very clear about this. Virtual Reality firm co-founder Palmer Luckey, a 24-year-old with some $700 million burning a hole in his pocket thanks to Facebook buying his company and VR headset invention, has every right as an individual to secretly (well, not so secretly now!) bankroll neo-Nazi, white supremacist, pro-Trump hate groups. For the moment at least — assuming racist sociopath Trump isn’t given the keys to the White House and the control of our nuclear arsenal that could destroy civilization — “it’s a free country” as the questionable saying goes. 

But what’s not acceptable is for Oculus the company to effectively endorse his actions by not clearly and decisively condemning them.

Other than some rather milquetoast “we’re disappointed” comments from a couple of Oculus execs, the firm itself has as far as I know issued no formal statement to make clear that from a corporate standpoint such activities are unacceptable and call into question Luckey’s future roles in the direction and actions of Oculus going forward.

To not firmly condemn Luckey’s actions is to provide the hate groups that Luckey funded with a form of tacit approval and support courtesy of Oculus itself. There is no middle-ground between support and condemnation of such groups.

Keep in mind that Luckey is such a “poor little rich kid” jerk that he didn’t even have the guts to openly support these horrific hate groups like a man — he tried to hide it all and only admitted involvement when his carefully constructed charade collapsed around him. What a dismal excuse for a human being. You can see how he fit right in with the neo-Nazi Trump crowd.

Some VR developers are appropriately already pulling support for Oculus in the wake of these revelations.

Oculus basically has two choices now.

They can stay effectively silent and be forever stained by their tacit endorsement of their co-founder’s contemptible behavior. 

Or Oculus can issue a clear and forceful statement of condemnation, along with a plan for making sure that Luckey’s operational roles in the firm are minimized to the greatest extent practicable.

The VR development world awaits Oculus’ response. Oculus can either step up to the plate and act in a responsible manner, or they can continue their current apparent “non-action” course and likely see the VR community wish Oculus a direct and rapid descent into a self-made technological hell.

We shall see which path Oculus chooses.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

Google’s War on Trolls Could Help Save the Internet

As I’ve noted before, pretty much every day I receive emailed queries (and sometimes phone calls) from desperate persons who have been driven effectively largely offline for fear of retaliation from anything that they might say publicly online.

I don’t usually know them. They don’t usually know me except perhaps by reputation. They’re taking a leap of faith anyway.

They almost inevitably begin with words to the effect of “I hope that I can trust you” — and the fact that they’ve been driven to tell a total stranger some of the most intimate details of their lives is heartbreaking beyond measure.

I do what I can for them in terms of offering advice, but the range of options is in reality quite limited. Law enforcement is usually uninterested in dealing with these cases even when they’ve risen to obviously dangerous levels — their typical response to concerned persons is along the lines of “stay off the Internet.”

And the fact is that nowadays it’s a vast understatement to say that you can’t safely have a thin skin if you’re going to make public statements in most Net venues.

I’ve been at this game for a long time — effectively since the earliest days of the Internet — so my skin is pretty damned thick by now.

But even I’m not completely immune to twinges of discomfort when I survey the scope of attacks that I routinely receive.

Some of them are from trolls who make the mistake of incorrectly assuming that I’m female — the speed with which they retreat if I direct them to my Harley profile shot can be awesome to behold. And of course there are the usual antisemitic morons and other white supremacist cretins, right-wing imbeciles, and all the rest. These days they seem to almost inevitably be Donald Trump supporters. As we know, he joyfully attracts them like flies to you-know-what.

Among the Internet’s — and so the world’s — most crucial questions are ones of freedom of speech vs. privacy — open communications vs. trolling, threats, and hate speech.

It’s an incredibly delicate balance — how to limit hateful attacks that drive people to desperation, without creating a social media ecosystem that unreasonably limits free speech.

There are various ways to approach this set of difficult problems.

Over in Italy right now they’re taking exactly the wrong path — proposing a law that would fine “site managers” 100,000 euros if they don’t take action against posts that simply “mock” another person. The proposal’s standard is that a person simply “feels” that they were insulted. Laughably insane, impractical, and unworkable. Pretty much anybody could really rake it in under a law like that!

Back in the real world, Internet services with a sense of responsibility have long used their Terms of Service agreements to deal with posting abuse, with various degrees of success. Keep in mind that these firms have the utterly appropriate right to determine what they will permit and host — this is reasonable editorial responsibility, not censorship (I usually view censorship per se as almost inevitably being repressive actions by governments against third parties).

It has long seemed clear to me that appropriately dealing with the rising tide of trolls and other social media posting abuses would inevitably require an intensifying partnership between automated detection systems and human insights, each bringing different strengths and limitations to the table.

This is why I wholeheartedly support the ongoing efforts of Google (or more precisely, the “Jigsaw” division of Google’s parent Alphabet, Inc.) to leverage Google’s sophisticated and powerful artificial intelligence assets to help deal with the growing trolling and hate speech scourge.

I won’t attempt to summarize the details of their project here — you can read about it at the link just above.

But I did want to take this opportunity to express my view that while obviously we cannot expect any particular efforts to completely solve the deeply complicated and significantly multidisciplinary problems of social media posting abuse, I am convinced that Google’s approach shows enormous promise.

Through the efforts of Google and others working along multiple paths of research and associated policy analysis, we have some excellent opportunities to make seriously positive inroads against posting abusers, and in the process making the Internet a better place for the vast majority of its users and the global community at large. Communications will be greatly encouraged when the “fear factor” that holds so many wonderful people back from public postings is significantly reduced.

And frankly, if these efforts also have the side-effect of reducing the number of horrific posting abuse nightmares that fill my inbox from desperate persons seeking help, that will personally be for me a very welcome plus as well.

Be seeing you.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

Hillary Was Wrong About Trump’s “50% Deplorables” — They’re Actually Much Higher

Hillary Clinton apologized today for a remark she made yesterday where she said that around half of Trump’s supporters were in a “basket of deplorables” –“the racist, sexist, homophobic, xenophobic, Islamophobic — you name it.”

Her remark was wrong, but she shouldn’t have apologized.

It was wrong because she significantly understated the degree to which Trump’s supporters are horrific, racist pigs — and far worse.

Polling data backs this up decisively.

A full two-thirds of Trump supporters cling to the racist and xenophobic belief that Obama is a secret Muslim. Almost that many still insist that he wasn’t born in the USA — a popular Trump claim that he has never repudiated.

But those opinions are a walk in the park compared with some of the other data on Trump’s salivating minions.

A third of them think that the WWII Japanese internment camps — one of the darkest actions in USA history, were a good idea.

Almost a third would support banning LGBT people from entering this country.

A full 30% of Trump voters feel that the white race is “superior” or aren’t sure that it is.

Of course the stink from Trump supporters comes directly from the top with Trump’s own xenophobic, racist, and fascist remarks and behavior — not limited to his love fest with racist dictator Putin — and from the bottom with his overwhelming support from white supremacist monsters like David Duke and the rest of the sickening, racist,  “Alt-Right” movement — some of whom now hold high positions in Trump’s own campaign organization.

And in a vivid proof of the “rotten father: rotten son” theorem, zombie son Eric Trump has continued this past week Tweeting false stories, including regarding imaginary Hillary secret earphones and — just today — a fake, doctored photo claiming to have been of a Trump rally last night (it was actually from last year). Talk about a family that’s rotten to the core.

It is undoubtedly true that not every single Trump voter is themselves a racist per se.

But there’s an old saying: “If you sleep with dogs, expect to arise with fleas.”

And by allying themselves with the racist, duplicitous creature of evil that is Donald Trump, his supporters have voluntary accepted unto themselves Trump’s filth, his disease, his hideous sensibilities that have no place outside of a nest of dung-feeding roaches — no offense meant to roaches, of course.

This is why Hillary’s estimate of the depth of Trump’s followers’ depravities was too conservative, too “politically correct” as it were.

Because Trump’s followers — by the mere fact that they’d be willing to put an ignorant, perverted sociopath like Trump in control of nuclear weapons that could destroy civilization on Earth many times over — have demonstrated that they are at the very least “deplorable” — and by most measures simply supplicants to Donald Trump’s evil itself.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

The Downsides of Google’s Chrome Security Push

Google has world class security and privacy teams, but I continue to have misgivings about certain aspects of their Chrome browser security push — particularly regarding warnings to users when connections are using unencrypted http: as opposed to https: encryption.

While the push to encrypt Internet connections by default is a laudable one, it is also essential that fundamental aspects of practicality and user reactions also be carefully considered.

I touched on some of this over a year ago in “Falling Into the Encryption Trap” — but now that Google has made more explicit their plans for browser address bar warnings to users regarding http: connections, I’m again concerned.

Apparently in January of next year Google intends to replace the current quite reasonable “information circle” indicating non-encrypted pages, with an explicit “Not secure” warning — ultimately to be displayed in bright red with a danger triangle.

I am absolutely certain — based on the many queries I receive routinely from users who are already confused and concerned about other security warnings they see and misunderstand — that the escalation to these sorts of warnings by Chrome will vastly and unnecessarily increase confusion and even panic among significant categories of non-techie users when accessing various sites important to them.

Because the truth of the matter is that it remains both impractical and unnecessary for all sites to convert to https: at this time.

It is certainly true that theoretically any site could become a vector for misinformation or malware via man-in-the-middle manipulation of their connections, and the use of various insecure and/or poorly managed ad networks increases the risks in this context.

But as a practical matter, the vast majority of exploits that users must contend with do not come from the manipulation of Internet connections. Rather, infections via email phishing, contaminated sites, and similar techniques represent the overwhelming majority of successful attack vectors.

Still, it is inarguable that all else being equal, having all connections as encrypted https: rather than unencrypted http: is extremely desirable.

Unfortunately, all else isn’t equal.

There are uncountably vast numbers of legacy sites that provide widely referenced information to enormous numbers of users, yet do not sell anything, don’t collect usernames or passwords or other private information, and don’t participate in any ad networks.

Many of these sites have been online not just for many years, but even for decades. They typically use older software systems that are difficult or impractical to directly update, and frequently operate on a shoestring (or even zero) budget, while not creating any income at all.

It will frequently prove impossible from a money and/or time standpoint for the operators of such sites to convert to https: — yet Chrome’s warning system will likely confuse their users into assuming that they are actually being spied on — rather than the actual fact that such surveillance is in any given case theoretical (and in practice an extremely low probability) on those individual connections.

And while the cost of encryption certificates has now dropped to zero with the advent of services such as “Let’s Encrypt” — the effort required to actually make them work can be anything but trivial.

I recently converted all of my sites, some of very long standing, to https: using Let’s Encrypt. Even though my sites are not fancy in any way, it was an enormous amount of work, and required every ounce of knowledge I had regarding the sites’ internal architectures. While Let’s Encrypt promotes scripts to supposedly handle such conversions automatically, I cannot recommend those procedures except for the very most trivial and simplistic of sites — anything beyond that and you’re liable to end up with a mangled site configuration nightmare — you’d better have good backups handy!

I’m frankly uncertain how to best achieve a practical compromise position regarding browser security warnings.

I do know that a scary red “Not secure” warning is likely to unnecessarily panic many users and unreasonably disadvantage many sites.

This is especially true when there is no explicit indication to users as to how they can obtain more information about that warning — such as what does it really mean in terms of actual risks? — in language that non-techies will actually understand. Even now, the security details that Chrome provides if one knows to click on the address bar security icon are pretty much technical gobbledygook as far as most users are concerned.

My sense is that despite their great skills in privacy and security matters, Google has not genuinely considered the impacts of their upcoming browser warnings on significant segments of the user and site populations, who by and large do not live 24/7 in the same rarefied security worlds as do many of us.

Luckily, this is a fixable problem, if Google is willing to put forth the effort and outreach to fix it. I respectively urge them to do so.

Be seeing you.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

Oscar’s Ageism and Society’s Disposable Workers

I’ve long had a policy of avoiding involving myself in Hollywood politics — not always easy having resided here in L.A. for my entire life to date.

But something’s going on with Oscar — or more precisely the Academy of Motion Picture Arts and Sciences (AMPAS) — that is disturbing both in and of itself, and for what it says about our society at large (including here in the tech world).

The Academy Award (Oscar) presentations have always tended to be quite “white” — more so than ever in recent years, leading to calls of racism and protests.

The Academy does have real problems in this respect. It’s not purposeful racism per se, but it is a form of effective racism that has been an outgrowth of AMPAS membership policies and the structural history of popular films and Hollywood production patterns pretty much since the dawn of the movie industry.

With recent protests being particularly embarrassing to the Academy, AMPAS has now moved to try deal with what they perceive to be their “too many voting old white men” problem.

But they’re doing it in exactly the wrong way, exchanging their existing diversity problems for outright ageism.

Rather than changing their membership and voting rules going forward for new members in a manner that would encourage racial and other diversity, they’ve decided to try cull their oldest members — some in their 90s who have been Academy members for many decades and have always played by the rules — by stripping them of their Oscar voting rights.

While this obviously does not rise to the level of the kind of rampant workplace ageism and discrimination as reported recently by The New York Times, it still is a slap in the face to loyal, older AMPAS members who have done absolutely nothing wrong, and is yet another example of society kicking older persons in the gut as an ostensible “quick fix” solution for complex structural problems. Quick “fixes” — I might add — that typically make those problems far worse rather than fixing anything at all.

Outside of the Hollywood ecosystem, the intricacies of who votes for or receives Oscars is not a matter of much import to most people.

But what AMPAS’ actions tell us about the treatment of older persons in general is very much in scope, and perhaps the sheer ham-handed, doltish approach of the Academy to their very real diversity problems shines a key light on society’s failings in this regard — illuminating the broader issues in a way especially difficult to dismiss or ignore.

And that’s the truth.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

Network Solutions Still Operates Like a Bunch of Crooks

I still have a couple of my oldest Internet domains — including one that turned thirty years old this year and was among the first 40 dot-com domains ever issued — with Network Solutions (NSI) for historical reasons, and I continue to be impressed with the firm’s ability to closely emulate the practices of the worst kind of Internet crooks.

NSI sends out important notifications missing key information, worded like spam or phishing attacks, transmitted from unfamiliar domains, and as HTML-only email messages. All the hallmarks of illicit contacts, or at least of rank amateurs in action.

Their “off the shelf” domain renewal prices are abysmal of course, but even worse are their outrageous attempts at upselling during the domain renewal process.

They by default select (pre-check) expensive options like “private” domain registration (as far as I’m concerned, anyone doing business over the Internet should not be permitted to have a private registration, absent some relatively rare special situations — but that’s a discussion for another time). 

Their form sequences attempt to trick you into switching your domains to their DNS servers, to sign up for hosting services you don’t want or need, and they employ all of the lowlife tricks — confusing interfaces, low contrast decline buttons — you know the drill.

Network Solutions has been pulling these kinds of stunts for years, but it seems like they’re continually striving to reach even new lows.

These clowns don’t deserve our business. Hell, they don’t deserve to be in business. They’re a stain on the Internet. 

If you haven’t already done so, shun them as soon as you can.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

A Horrific New Animal Cruelty Commercial from Toyota

Toyota is running a new TV spot (internally titled “Camping”). It’s already triggering letters and petitions to Toyota to remove it from the air immediately. It’s breathtakingly stupid and could easily trigger dangerous copycats.

It features a moronic couple who throw a stick into a rapidly flowing river so that their dog will chase after it into the water. You then see the dog being rapidly washed away down the middle of the river. The couple races ahead downstream in their new Toyota to meet up with the dog who has somehow managed to survive the ordeal.

Then the woman says “My turn!” and throws the stick back into the river to bait the dog into the rapidly flowing water yet again.

It’s obviously supposed to be funny. Instead it’s hideous.

Whomever green-lighted this monstrosity at Toyota and their ad agency should be fired and never permitted to own animals of their own. What kind of total idiots produce a commercial like this that is bound to inspire other idiots to try the same thing?

Breathtakingly evil. Here’s the video of the spot. I’m told that there apparently is at least one additional version of this commercial that is even more disturbing.

Please let Toyota know how you feel about this. Thanks.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

When Associated Press + Twitter = The Big Lie About Hillary Clinton

 

UPDATE (8 September 2016): The Associated Press today is deleting a 2-week-old tweet about Hillary Clinton’s meetings as Cabinet secretary after concluding the tweet fell short of AP standards by omitting essential context.”

– – –

The venerable Associated Press news agency was formed in 1846 by New York City newspapers to fund a Pony Express route for obtaining news regarding the Mexican War. In the approaching two centuries since then, AP has maintained a solid reputation for diligence and accuracy in its reporting, that’s depended upon by the vast number of news outlets and other media that publish AP’s reports.

In my own dealings with AP over the years, I’ve found their reporters to be knowledgeable, intelligent, and fair-minded, working hard to get to the facts of events. In AP items where I’ve been quoted, my referenced quotes have always been correct and in the appropriate context.

So it’s difficult for me to fathom AP’s behavior in the current controversy over their direct misstatement of facts regarding Hillary Clinton and the Clinton Foundation, and their refusal to admit that they royally botched this up, even in the face of virtually universal condemnation regarding this case.

AP started down this self-humiliating path last Tuesday, when it tweeted:

BREAKING: AP analysis: More than half those who met Clinton as Cabinet secretary gave money to Clinton Foundation.

That tweet is still up on AP’s Twitter feed. AP continues to refuse to remove it or admit that as written it was a totally false statement — that is, a lie.

In reality, that statistic applied to an extremely limited subset of meetings — only 154 out of many thousands — that Hillary Clinton had held in her official capacity with both government employees and private citizens during her tenure at the State Dept.

The AP’s cowardly explanation of this tweet and their failure to report accurately regarding this matter basically boils down to their frustration that the State Dept. has been slowly releasing Clinton’s calendar records from the period — so apparently they felt it appropriate just to go ahead and misrepresent the available small subset of data as if it were the entirety of the data that will ultimately become available for analysis.

It’s pretty easy to guess what happened next. Someone in AP’s social media department presumably wanted the most “bang for the buck” when they tweeted this story, and composed a clickbait tweet that would fit within Twitter’s 140 character limit.

That the tweet utterly misrepresented the actual facts, and instantly provided Donald Trump and other Hillary haters a handy piece of false propaganda to yell at rallies, apparently was not within the sphere of AP’s concern.

We all understand what’s been happening in the news biz. Clicks and eyeballs increasingly come before facts and truth. But to see AP sink to this low level is painful and distressing.

To make matters worse, AP appears to now be channeling Trump himself, refusing to admit that their story was misleading and that their tweet was an outright travesty. They’re refusing to apologize or correct the record, and are displaying much the same sort of intransigence that Trump himself famously displays when caught in misrepresentations, half-truths, or outright lies.

Perhaps worst of all, we’re now faced with the inevitable question of how much we should trust AP’s future stories, tweets, and other pronouncements, especially while AP continues to permit that original false tweet to stand.

In a sea of rapidly declining journalistic standards around the world, Associated Press has stood out like a bright beacon of truth amid the gloom. Now it appears that even that light is dimming.

I hope that AP changes course and admits their errors and misjudgments in this matter. They can still avoid the fate of so many other news organizations who have permitted themselves to devolve into lowest common denominator clickbait pablum.

But this is indeed a dark time for journalism. And it’s an even darker time for all of us who depend upon professional journalists to fairly and accurately help us understand what’s going on in the world around us.

And that’s the truth.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

Foolish and Dangerous: Europe’s Clothing Attacks Against Muslim Women

UPDATE (26 August 2016): France’s “burkini” ban has wisely been overturned by the country’s top administrative court.

– – –

I am probably among the last guys on this planet who would normally ever become concerned about issues related to clothing fashions of either women or men. But I do care a lot about civil liberties and fighting terrorism, so it’s impossible for me to ignore the stupid, inane, and frankly dangerous actions by officials in France who have been banning the women’s fashion popularly known as the “burkini” from beaches along the Riviera.

The burkini — primarily a choice of some Muslim women but reportedly with around 40% of sales going to non-Muslims — is a beach garment that only exposes the face, hands, and feet. Frankly, given the increase in ultraviolet radiation and risks of sunburn or much worse these days, this indeed sounds like an eminently practical garment for a lot of folks, irrespective of their religion.

Oh, but not in France. Not in the land of “Liberté, Égalité, Fraternité” (Liberty, Equality, Fraternity), from where photos and videos are appearing showing armed police forcing women to remove clothing at the beach, then ticketing them for failure to wear “an outfit respecting good morals and secularism.”

But beaches where women can go topless or nude in France? Hey, no problem there, eh?

Now, I have nothing against “clothing optional” beaches.

But the sheer hypocrisy on display by French officials in the context of the burkini ban is nothing short of breathtaking.

While French officials have attempted to claim otherwise, their actions are a direct attack specifically on women who choose to dress modestly at the beach — and yes, while that doesn’t mean only Muslim women, the French focus against Islam in this instance is obvious to everyone.

This is only one example of Europe’s growing obsession with restricting the clothing choices of Muslim women.

It’s not just burkinis under attack, but also other forms of traditional Muslim dress ranging from burkas to simple head scarves.

Ironically, these European governments are imposing their own “clothing oppression” while claiming that they’re protecting Muslim women from religious oppression! This displays either vast ignorance or massive hypocrisy or both — since many Muslim women prefer these modest forms of dress, and are not forced nor coerced into wearing them.

In any case, for governments to dictate women’s clothing choices in this manner is abominable.

I’m not a religious person, but I consider religious freedoms being trampled this way by ostensibly enlightened countries in Europe to be utterly disgraceful.

Worse, it’s potentially extremely dangerous, since it plays directly into the hands of radicals who can easily leverage these government actions into “War on Islam” propaganda to inspire terrorists and other criminals. It’s almost as if these governments are purposely choosing dictates most likely to provide terrorists with as much ammunition as possible for evil efforts.

France and the rest of Europe need to get their figurative heads out of their figurative behinds. They need to be working on the foundational issues of conflict within and related to the Middle East, not women’s choices in clothing.

And they need to stop behaving as if the West is on the verge of a new Crusade against Islam.

Europe’s current approach is wrong and foolhardy, and can only lead down the path toward further intolerance and hatred — and risks sucking the entire world down into an endless nightmare significantly of these governments’ own making.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

When Hiding Passwords Is Stupid — or Worse!

As I’ve noted a number of times previously, the fact that we still have accounts “secured” by passwords this far into the 21st century is pretty much a security abomination. Adding on multiple-factor security tokens and such is a big help, but passwords themselves remain a weak link in the chain of security, and a vast number of sites and apps rely on passwords without any additional authentication measures at all.

Since the dawn of online systems, it has been standard practice to obscure the display of entered passwords by one means or another.

There are basically two reasons for this. One is the obvious issue of someone looking over your shoulder while you’re logging in.

The other is steeped in computing history.

Early online systems were primarily accessed with paper printing terminals (e.g. Teletype Model 33, IBM 2741, etc.), and leaving around or carelessly disposing of a printout with your password visible could be a serious mistake.

The earliest printing terminal systems were often “half-duplex” in design, meaning that typed characters were echoed locally. To obscure passwords in this instance, the common technique was for the system to overprint a bunch of characters a number of times before the user entered their password over the resulting black blob of ink. This wasn’t foolproof, but was remarkably effective at the time.

For printers on full-duplex circuits, it was possible simply to suppress any echoing of the user password at all, or to print a character like asterisk in place of each typed character.

This same basic model continues today on the Web and in app ecosystems.

Entered passwords either aren’t echoed, or commonly are replaced with asterisks. Some app systems will give you a brief glimpse of the input character before replacing it with an asterisk.

Unfortunately, these kinds of techniques have become decreasingly useful as users have been encouraged or required to use ever longer, ever more complex passwords and passphrases, because the probability of mistyping these entries increases with their complexity.

And it isn’t just a matter of having problems logging in.

The same obscuration techniques are often employed when setting or changing passwords, typically combined with the ever-popular “enter it again” prompt or field, based on the flawed theory that you’d never type the same obscured input in error twice and so set your password incorrectly (and locking yourself out) as a result.

For that matter, even typing the same complex password twice in a row in an obscured field to set the password correctly can be an exercise in frustration.

Recently, the trend toward obscuring input fields has been spreading to all manner of other entries as well, including check account data, credit card numbers, even dates of birth — and much more. I’ve seen forms where even the fields for inputting your first and last names were obscured with asterisks!

Such obfuscations wouldn’t be such a significant problem if there existed a routine way for the user to disable them on demand.

It’s stupid — bordering on insane — to force users to jump through the hoops of blindly entering complicated passwords or other data when they’re alone and there’s no risk of anyone surreptitiously peering at their screen.

And for users with poor typing abilities, motor skill or visual limitations, or other related issues, these input methodologies can be downright abusive. This is one of the most common complaints showing up in my inbox about interface issues.

But wait, it gets even worse!

Many user interface designers, laboring under a twisted misconception of security, purposely make it even more difficult for users to enter their passwords, by rigging their pages or apps to prevent copy/pasting of passwords, and/or by blocking the use of password managers, field autofill systems, and so on.

This really isn’t rocket science.

Except in crucial enterprise environments or especially elevated security situations, it should be common practice for user interfaces to provide a method for the user to see their passwords or other data as they enter it if they choose to do so — a simple enabling checkbox with an appropriate warning would suffice. And this would be the display of the entire password or other input, not just a flash of each letter as it’s being typed.

Some systems already provide this to one degree or another, but this is relatively unusual to find.

Android for example has a little “eye” symbol next to where you enter Wi-Fi passwords, that can be clicked to display the password. This is good, though I’ve had many users tell me that they had no idea of what that symbol meant and so didn’t realize that they could view their Wi-Fi passwords in that manner.

But again, this is an exception to the more general situation of user interfaces across the Web and app worlds that don’t provide such options.

We should be striving to completely eliminate passwords from our systems, replacing them with more robust authentication and security models.

For now though, we still must live with passwords in most cases, and the option should be routinely provided for users to display entered passwords or other obscured data when they choose to do so.

And as for those user interface designers who purposely and unnecessarily block tools and techniques that would make it simpler for users to enter complex passwords — well, since this is a family-friendly blog I won’t mention here what I feel should really happen to them!

Be seeing you.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

Google Questions & Unofficial Answers: “Does Google Make Junk Solicitation Phone Calls?”

This is a new entry from my Google+ Community Google Questions & Unofficial Answers.

It seems like almost every day I get junk solicitation phone calls “from Google.” They call about my Google business local listings, about my not being on the first page of Google search results, and so on — and they want me to pay them to “fix” this stuff. When I look up the Caller ID numbers they use, I often finds pages of people claiming they’re Google phone numbers. Sometimes the Caller ID display actually says Google! Is Google really doing this?

Negative. NONE of these calls are from Google. Zero. Zilch. Nada.

These callers are inevitably “SEO” (Search Engine Optimization) scammers of one sort or another. They make millions of “cold calls” to businesses using public phone listings (from the Web or other sources) or using phone number lists purchased from brokers.

If you ever actually deal with them, you’ll find that their services typically range from useless to dangerous — “black hat” SEO firms often use illicit techniques to try boost search rank, which can result in your being demoted or even banned from Google search entirely.

These callers usually either falsely identify themselves as actually calling “from Google” — or they may say they’re “calling about your Google account” — or similar words to that effect.

Now about those “Google, Inc.” Caller ID numbers on these calls. They’re always fakes of one sort or another.

As you may have heard, Caller ID — which a relatively ancient control and signalling methodology not designed for the 21st century — is easily and widely spoofed with false names and numbers. You cannot put any reliance whatsoever on what Caller ID tells you these days.

For example, one common technique is for a scammer in some distant call center “boiler room” to set the Caller ID to a “local”-appearing number, sometimes combined with the name of a local business, in an attempt to make the call more attractive for you to answer. As you can imagine, the innocent parties whose names or numbers are abused in this manner are also victims of these spammers and scammers.

And that’s how these SEO crooks operate. They spoof the Caller ID system to falsely show numbers (and/or names) that are associated with Google — such as numbers used for 2-factor authentication calls or various Google Voice numbers — to try fool you into thinking that the calls themselves are coming from Google, Inc.

Various persons unaware of how this spoofing works then list those numbers on “spam alert” site pages claiming that the numbers indicate that Google is actually making the calls. They are incorrect — again, Google never is the source of such calls.

Also — and this is very important and an issue I touched on in some other Q&As on this page — Google NEVER uses the phone numbers you provide them for account recovery and/or 2-factor authentication for any other purpose without your explicit permission, never uses them for solicitation calls, doesn’t sell them to third parties — and … you get the idea. And by the way, you really do want to proactively set up account recovery and 2-factor — as per the Q&A items at:

https://plus.google.com/+LaurenWeinstein/posts/L3DcshM4Nmi

and:

https://plus.google.com/+LaurenWeinstein/posts/avKcX7QmASi

The bottom line is that none of those harassing, scammy SEO phone calls are from Google.

And frankly, you really don’t want to deal with any of the firms who are actually making those calls — unless you’re a masochist with money to burn who wants to ruin your site’s reputation, that is.

— Lauren —
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –

The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

Care About Science and Tech? Our Job One: STOP TRUMP

When we think of politically-oriented publications, it’s unlikely that venerable, more than 170-year-old Scientific American typically comes to mind. 

So I was definitely stopped in my tracks when I saw their new editorial titled “Donald Trump’s Lack of Respect for Science Is Alarming” — that included these very accurate words:

“Scientific American is not in the business of endorsing political candidates. But we do take a stand for science — the most reliable path to objective knowledge the world has seen — and the Enlightenment values that gave rise to it. For more than 170 years we have documented, for better and for worse, the rise of science and technology and their impact on the nation and the world. We have strived to assert in our reporting, writing and editing the principle that decision making in the sphere of public policy should accept the conclusions that evidence, gathered in the spirit and with the methods of science, tells us to be true.”

For those of us who care about science and technology, about demonstrable truths vis-à-vis ignorant, tinfoil-hat ramblings, it’s clear that we’ve now come to a critical, likely historic, moment of reckoning. 

It’s long been de rigueur for scientists and technologists — most of whom have spent entire careers working tirelessly (and often vastly underpaid) to advance the developments in their fields for the sake of the global community at large — to be told that they should avoid directly engaging in political matters, even when their work is directly involved.

There have always been some individuals in these fields who have ignored this dictum and spoken out anyway — sometimes to the serious detriment of their careers and livelihoods.

But when a publication with the stature of Scientific American raises the red flag about a major presidential candidate, it’s time for everyone in the tech and science fields to take notice and do some serious soul searching.

Because the dangerous, ignorant, fascist, racist, misogynist, continually lying monster that is Donald Trump is significantly of own creation.

We must now come to terms with this truth while we still can, much as ultimately did J. Robert Oppenheimer relating to his key role in the creation of nuclear weapons.

By staying relatively silent regarding specific political matters and in particular regarding specific political candidates, we have permitted anti-science, anti-technology propaganda, misinformation, lies, and fantasies to flourish — all of which can have and have had serious detrimental real-world impacts.

Fear of invoking the Streisand Effect or being accused of “not being balanced” has caused various major tech firms to not speak out directly against obviously false statements by ignorant and opportunistic politicians regarding established scientific principles and technological realities — this holds true for everything from climate change to Internet competition and net neutrality, and far beyond.

We have also more explicitly contributed to the chain of events that has led to a hideous, sociopathic, erratic creation like Trump, who — if given control over our nuclear arsenal as USA president — could literally destroy human civilization on this planet in only slightly more time than it currently takes him to send out a stream of incoherent, babbling Tweets.

The incredible global Internet that we have spent decades building and nurturing is a quintessential tool that can be used for both incredible good and for horrific evil. 

There’s no avoiding the fact that it is very much various aspects of the Internet and Web that have enabled “echo chambers” where like-minded thugs, bullies, white supremacists, and other ignorant and violent haters could congregate and then coalesce around Donald Trump, who feeds on their vileness as a diseased-laden mosquito feeds on human blood.

Censorship of such demons is of course not an answer — but political action is indeed the solution.

If you honor humanity and civilization, if you care about science and technology and what’s factually true on our world and in the greater universe, then you must accept that keeping Donald Trump out of the White House is of the very highest priority. For his presence behind the desk of the Oval Office and his possession of nuclear codes could quite literally be the greatest threat to all that we have created and hold dear since the rise of civilization.

All legal means must be employed to STOP TRUMP. It’s not enough just to register to vote and to get your friends, family, and associates to register. Actually following through and voting for Hillary Clinton — even with her various acknowledged faults — is the only effective means to stop the human nightmare of Trump in his tracks.

Complacency in this election — not actually bothering to vote, or throwing away a vote on a third-party candidate (even in states that Trump is overwhelmingly unlikely to win) — would be a disastrous mistake that could net Trump a victory that would cause fascists and racists of the past to smile broadly from their graves. 

Nor is it enough to simply stop Trump on Tuesday, November 8th. 

He needs to be overwhelmingly beaten, massively crushed in a landslide if possible. We must send a message to future right-wing, racist demagogues — who could be even more dangerous than Trump given similar heinous sensibilities but fewer of his obvious, self-defeating character flaws — that they will not be anointed with political power and that American patriots will always reject their vile rants of hate.

Early voting starts in less than six weeks in some locales. I ask that you please take a few minutes away from your current projects to consider carefully what is at risk in this election and what a Donald Trump presidency would mean for us all should he and his ignorant band of anti-science, anti-technology cronies gain such awesome power.

I earnestly hope that the thought sends a chill down your spine. 

Now we must move from that very real fear to very real political action. There is no time to waste. History would never forgive our faltering at this crucial juncture.

STOP DONALD TRUMP.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

“Highly Illogical”: The Hysteria Over Google’s Wi-Fi Scanning

 

(Original posting date: 28 May 2010)

Greetings. I don’t find many opportunities (nor do I have much inclination) to channel characters from Star Trek, but I can only imagine Mr. Spock’s likely bemusement related to the shrill and illogical brouhaha over Google’s Street View Wi-Fi scanning.

To quote the ungrammatical Mr. Bumble, a reprehensible yet occasionally insightful character in Charles Dicken’s Oliver Twist, sometimes “the law is a ass–a idiot.”

Such is the case — as far as I’m concerned — when it comes to laws and controversies regarding the scanning of open Wi-Fi networks.

Let’s start with a basic truth — an open Wi-Fi network is, duh … open!

While the number of open Wi-Fi networks has been falling relative to nets secured at least with weak WEP crypto, or much better with WPA (or better yet, WPA2), there are still vast numbers of open Wi-Fi networks that pop up without prompting all over the world.

Raise your hand if you’ve never seen an open Wi-Fi net when attempting to connect your laptop to the Internet. Very few hands raised out there, I’ll wager.

Now raise your hand if you’ve ever opportunistically connected to an open Wi-Fi net, without permission. Lots of hands raised now.

And have you ever driven around your neighborhood with wardriving software enabled on your laptop or phone, listening to the “pings” as Wi-Fi sites registered at nearly every home or business you passed — and perhaps you saved the data and created Wi-Fi maps to use and share?

This is not just a hobbyist activity. Companies like Skyhook Wireless have built entire businesses around geolocation systems that involve the scanning of Wi-Fi signals.

And why not? Wi-Fi networks are essentially as obvious to outside observers, walking down the sidewalk or driving up the street, as are porch lights, or the flickering TV screens visible through curtains after dark.

Even when Wi-Fi access points are configured with their “SSID” beacons disabled — which tends to cause various user complications — Wi-Fi routers and hotspots are about as secret as a full moon on a cloudless night, and pretty much just as impossible to actually hide.

You can still pass laws to ban Wi-Fi scanning of course — just as the order can be given to ignore the fact that the emperor actually is parading down the central square stark naked. But reality generally triumphs over nonsensical laws in the long run.

Laws related to Wi-Fi scanning don’t exist in a vacuum, and seem to often be related to laws that attempt to ban photography of imagery that can be easily seen by observers from public places. Such illogic has been used to attack Google’s Street View photos, in much the same way that Google is now being chastised for Wi-Fi scanning associated with Street View vehicles.

Amusingly — in a sick kind of way — the fact is that the same government entities who tend to push forth a dramatic show of disdain for Street View — and now Google’s Wi-Fi scanning — are often the same ones rapidly deploying massive real-time CCTV (closed circuit TV) surveillance systems, with vast amounts of real-time imagery data pouring into government servers to be used in often unspecified ways for indefinite periods of time. Some of these entities have also conducted mass and sometimes illegal surveillance of their telephone and Internet networks.

Their complaining about Street View and Wi-Fi therefore seems highly disingenuous — but obviously politically expedient.

Google did made mistakes — they’ve publicly taken responsibility for these — related to the Wi-Fi Street View controversy. It probably would have been wise to publicly announce their Wi-Fi scanning capabilities before beginning the project, so that various governmental entities could register any concerns based on their associated national laws — however ridiculous those laws might be in this sphere, given the ease with which anyone with simple tools can scan Wi-Fi anywhere.

But since Google’s “adversaries” now “pile on” at every opportunity, proactive discussion of the Wi-Fi aspects of Street View might have avoided a fair amount of the current controversy.

The ostensibly more dramatic aspect of Google’s Wi-Fi situation relates to their revelation that their Wi-Fi scanning systems were unintentionally collecting highly fragmentary “payload” data from open Wi-Fi nets, in addition to locationally-related (e.g., SSID) data.

Google critics have been screaming — how could this possibly happen by accident? “What kind of nightmarish, nefarious plot is in play?” — they demand to know.

First, contrary to some of the accusatory claims being made, it’s extremely unlikely that any banking or similarly sensitive data was exposed even in fragmentary form, for the simple reason that virtually all sites dealing with such data use SSL/TLS security systems (https:) that would provide typical encryption protections regardless of the open, unencrypted nature of (extremely unwisely configured) underlying Wi-Fi systems.

And while clearly the collection of Wi-Fi payload data by Google was a significant oversight, it’s the kind of mistake that is actually very easy to make.

It’s completely ordinary for network diagnostic tools and related software to include mechanisms for the viewing and collection not only of “envelope” data but also of test data “payload” traffic flows. Virtually every Linux user has a tool available for this purpose that can provide these functions — the ubiquitous “tcpdump” command.

In Google’s case, it seems highly likely that a procedural breakdown — not criminal intent of any kind — led to the payload data capture portion of the Wi-Fi scanning tools not being appropriately disabled. Such procedural problems are naturally to be avoided, but for critics to try balloon such an issue into fear mongering and conspiracy theories just doesn’t make sense.

And given the very high capacity of inexpensive disk drives today, it’s simple to see how even relatively large amounts of data — like accidentally collected payload data — could collect unnoticed in an obscure directory somewhere deep in a file system over long periods of time.

Like I say, I’m not a lawyer. Other heads will thrash out the legal aspects of this situation.

In my own view, the entire saga has been blown out of proportion, largely by forces primarily interested in unfairly and inappropriately scoring points against Google, rather than treating the situation — both as relates to Google’s Wi-Fi scanning and more broadly to Street View itself — in a logical and evenhanded manner.

But then, that’s pretty much what we’ve come to expect from you humans.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t fall into the trap of using the latter. It’s just plain wrong!

Right-Wing Internet Sites in Panic over FBI Smartphone App Solicitation

One of my rather right-wing correspondents sent me a note this morning with materials making the rounds of right-wing Internet sites about a new surveillance-oriented FBI smartphone app solicitation.

While most of the stuff on those sites is total hogwash, this particular solicitation actually does exist — dated 29 July 2016 — and is worthy of some analysis.

The solicitation itself:

Smartphone-Based Audio Recorder
Solicitation Number: DJF-16-1200-N-0007
Agency: Department of Justice
Office: Federal Bureau of Investigation
Location: Procurement Section

And the quite interesting draft technical requirements are available for download.

The background description includes capabilities such as:

– Running on Android, iOS, or Windows
– Overt (e.g. interview) and stealth/remote control surveillance modes
– Not requiring jailbreaking for installation
– Storing and streaming of audio, plus GPS, and eventually video
– Cryptographic hash for data integrity and chain of custody control
– Encryption of data on phone not required
– And more

So what’s really going on here?

Right-wing sites are spinning this as “the government is going to turn all our smartphones into bugs!” That clearly is not the goal here.

First, we know that there are already a large number apps available for these phones that provide many of the capabilities asked for in this solicitation. We can be sure that governments are already using these off-the-shelf apps for surveillance purposes.

But the solicitation technical requirements reveal the government’s main “problems” in this regard: authentication and chain of custody.

When the government goes to court currently with such recordings, they often have to provide testimony vouching for the veracity of the recordings, and provide technical details in open court that they’d prefer not to discuss. As the solicitation itself notes: “In fact, the Government works diligently to limit and control who has access to these details as they could be used against us.”

Here’s what I think this all boils down to:

The government wants to replace their current rather ad hoc recording/surveillance apps with a system that would include integral verification that the recorded and/or streamed audio/video/gps data had not been edited or tampered with in any way.

This would have obvious benefits for the government, as in making presentation of such evidence in court potentially much more streamlined, but could also benefit innocent defendants who would be less likely to face evidence that had been unscrupulously altered in the government’s favor.

It does seem odd that encryption of data on the phone is not a requirement, since this suggests that the data could be exposed “in the clear” if the phone fell into unauthorized hands — even if we assume that https: crypto is used for actual data streaming out from the phone.

Perhaps the bottom line question here isn’t whether the government is planning mass deployment of smartphone control and surveillance systems as the right-wing Internet sites appear to fear — that’s clearly false.

But a completely valid question for consideration is whether such a “new and improved” recording/surveillance app would encourage its use in targeted situations where surveillance wouldn’t have been considered (or accepted by courts) in the absence of such an app, and to what extent that could encourage actual overreach and potential abuse by the FBI and other government agencies in specific cases.

–Lauren–
I have consulted to Google, but I am not currently doing so — my opinions expressed here are mine alone.
– – –
The correct term is “Internet” NOT “internet” — please don’t
fall into the trap of using the latter. It’s just plain wrong!